Analysis

  • max time kernel
    135s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 23:15

General

  • Target

    7eca82c189cfc71f22cd95fc930cca67f4c4e4052437708453a78391a0df6447.exe

  • Size

    701KB

  • MD5

    c68a3ca58d194074f0053b1bc1a2bf64

  • SHA1

    761c73ae9ca726ebfba64522db88539b27696375

  • SHA256

    7eca82c189cfc71f22cd95fc930cca67f4c4e4052437708453a78391a0df6447

  • SHA512

    3e66cc09feeb3bfd38b322d0301d901686013c11fc0e4c553c14eedbce9aee3589b56462729a80b9d79a0ecb029cf2a23961f90a3c115290270e1cc6ca7bf08b

  • SSDEEP

    12288:LMrey90TcR0URlEa/HyYr9DMbcANFcPpqNPqaoaTQcHVu60OOjYMyS:RyXHlEWsNFcPpMq4n8nx

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7eca82c189cfc71f22cd95fc930cca67f4c4e4052437708453a78391a0df6447.exe
    "C:\Users\Admin\AppData\Local\Temp\7eca82c189cfc71f22cd95fc930cca67f4c4e4052437708453a78391a0df6447.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1484
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un838924.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un838924.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1768
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9733.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9733.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2672
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 1084
          4⤵
          • Program crash
          PID:4936
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1137.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1137.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:840
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 840 -s 980
          4⤵
          • Program crash
          PID:4900
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si570623.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si570623.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3688
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2672 -ip 2672
    1⤵
      PID:3604
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 840 -ip 840
      1⤵
        PID:2232

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si570623.exe
        Filesize

        175KB

        MD5

        2f5576f21e2194d0f11c4a54ac48cd54

        SHA1

        17831013defd6b922ed87d569558d98f5bf9a1b7

        SHA256

        fa4bc938da3cb6fe130b8d085d270d9410abb14ecb7a2ba0727728712ea65afb

        SHA512

        efb495c2bc99c23205cc70f71b637e12fc05efa9be824820dc84b4ace41d79cd57c9c0c25634548e6e8756357279d382083c2cb5e107e9b7ee75dcec8f0cb8a5

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si570623.exe
        Filesize

        175KB

        MD5

        2f5576f21e2194d0f11c4a54ac48cd54

        SHA1

        17831013defd6b922ed87d569558d98f5bf9a1b7

        SHA256

        fa4bc938da3cb6fe130b8d085d270d9410abb14ecb7a2ba0727728712ea65afb

        SHA512

        efb495c2bc99c23205cc70f71b637e12fc05efa9be824820dc84b4ace41d79cd57c9c0c25634548e6e8756357279d382083c2cb5e107e9b7ee75dcec8f0cb8a5

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un838924.exe
        Filesize

        558KB

        MD5

        d8676120f232936804d242613125a2a8

        SHA1

        2a506f14872817f9be4f118834197b7ef60f59f6

        SHA256

        d7d1a24153590820062c7aa68069bfef58b36b5b3fcddd71254cfeff5e041019

        SHA512

        26dc0af7b4188ddb35309bdc2ccb2785de4871e20252bec60bc10bc82c512ec15b7acddba19ef84ed37bbe6a178aa96a228a6cbb9ef372349c1734cea530b258

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un838924.exe
        Filesize

        558KB

        MD5

        d8676120f232936804d242613125a2a8

        SHA1

        2a506f14872817f9be4f118834197b7ef60f59f6

        SHA256

        d7d1a24153590820062c7aa68069bfef58b36b5b3fcddd71254cfeff5e041019

        SHA512

        26dc0af7b4188ddb35309bdc2ccb2785de4871e20252bec60bc10bc82c512ec15b7acddba19ef84ed37bbe6a178aa96a228a6cbb9ef372349c1734cea530b258

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9733.exe
        Filesize

        307KB

        MD5

        83993a0dbca81a3b2c1967453eff4322

        SHA1

        643c0e8b6eed58a2663baeea55ed6a0155db62ce

        SHA256

        5abb4926ec27b998a7d87c38a2762d76281a2c2f8aa5af6e15fa86165c3ccfbe

        SHA512

        142e0151caa2e1cfbc361f3be750d5a443c0aeeaacb2976fd279688efed9cd3c1b65b6fb14af53fb0091fb082e0af5170b99d6ba21364b6329685ff74520621a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9733.exe
        Filesize

        307KB

        MD5

        83993a0dbca81a3b2c1967453eff4322

        SHA1

        643c0e8b6eed58a2663baeea55ed6a0155db62ce

        SHA256

        5abb4926ec27b998a7d87c38a2762d76281a2c2f8aa5af6e15fa86165c3ccfbe

        SHA512

        142e0151caa2e1cfbc361f3be750d5a443c0aeeaacb2976fd279688efed9cd3c1b65b6fb14af53fb0091fb082e0af5170b99d6ba21364b6329685ff74520621a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1137.exe
        Filesize

        365KB

        MD5

        223ac58592aabda6ed265bcfecaa55ef

        SHA1

        c4e79816a47531af458b917635a7ca05c9b944ae

        SHA256

        bba2aeba6ac359424e26627e59ab8489fd009a089eec87dc1520d1a72cf89c7e

        SHA512

        b571c5fe081124fcc3bff01a38c2bfcd2d7bbd5dc4bc12d5eee3d411f81dbc02732d50c3e97b344329014e8940a8987e22c3e94629f000331d2ed29c74c11cf7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1137.exe
        Filesize

        365KB

        MD5

        223ac58592aabda6ed265bcfecaa55ef

        SHA1

        c4e79816a47531af458b917635a7ca05c9b944ae

        SHA256

        bba2aeba6ac359424e26627e59ab8489fd009a089eec87dc1520d1a72cf89c7e

        SHA512

        b571c5fe081124fcc3bff01a38c2bfcd2d7bbd5dc4bc12d5eee3d411f81dbc02732d50c3e97b344329014e8940a8987e22c3e94629f000331d2ed29c74c11cf7

      • memory/840-552-0x00000000023F0000-0x0000000002400000-memory.dmp
        Filesize

        64KB

      • memory/840-1102-0x0000000005C40000-0x0000000005C52000-memory.dmp
        Filesize

        72KB

      • memory/840-1115-0x00000000023F0000-0x0000000002400000-memory.dmp
        Filesize

        64KB

      • memory/840-1114-0x0000000006C10000-0x000000000713C000-memory.dmp
        Filesize

        5.2MB

      • memory/840-1113-0x0000000006A30000-0x0000000006BF2000-memory.dmp
        Filesize

        1.8MB

      • memory/840-1112-0x00000000023F0000-0x0000000002400000-memory.dmp
        Filesize

        64KB

      • memory/840-1111-0x00000000023F0000-0x0000000002400000-memory.dmp
        Filesize

        64KB

      • memory/840-1110-0x00000000023F0000-0x0000000002400000-memory.dmp
        Filesize

        64KB

      • memory/840-1109-0x0000000006880000-0x00000000068D0000-memory.dmp
        Filesize

        320KB

      • memory/840-1108-0x00000000067F0000-0x0000000006866000-memory.dmp
        Filesize

        472KB

      • memory/840-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp
        Filesize

        408KB

      • memory/840-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp
        Filesize

        584KB

      • memory/840-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp
        Filesize

        240KB

      • memory/840-1103-0x00000000023F0000-0x0000000002400000-memory.dmp
        Filesize

        64KB

      • memory/840-1101-0x0000000005B00000-0x0000000005C0A000-memory.dmp
        Filesize

        1.0MB

      • memory/840-1100-0x0000000005460000-0x0000000005A78000-memory.dmp
        Filesize

        6.1MB

      • memory/840-226-0x00000000052A0000-0x00000000052DF000-memory.dmp
        Filesize

        252KB

      • memory/840-224-0x00000000052A0000-0x00000000052DF000-memory.dmp
        Filesize

        252KB

      • memory/840-222-0x00000000052A0000-0x00000000052DF000-memory.dmp
        Filesize

        252KB

      • memory/840-220-0x00000000052A0000-0x00000000052DF000-memory.dmp
        Filesize

        252KB

      • memory/840-218-0x00000000052A0000-0x00000000052DF000-memory.dmp
        Filesize

        252KB

      • memory/840-216-0x00000000052A0000-0x00000000052DF000-memory.dmp
        Filesize

        252KB

      • memory/840-190-0x0000000000720000-0x000000000076B000-memory.dmp
        Filesize

        300KB

      • memory/840-191-0x00000000023F0000-0x0000000002400000-memory.dmp
        Filesize

        64KB

      • memory/840-192-0x00000000023F0000-0x0000000002400000-memory.dmp
        Filesize

        64KB

      • memory/840-193-0x00000000052A0000-0x00000000052DF000-memory.dmp
        Filesize

        252KB

      • memory/840-194-0x00000000052A0000-0x00000000052DF000-memory.dmp
        Filesize

        252KB

      • memory/840-196-0x00000000052A0000-0x00000000052DF000-memory.dmp
        Filesize

        252KB

      • memory/840-198-0x00000000052A0000-0x00000000052DF000-memory.dmp
        Filesize

        252KB

      • memory/840-200-0x00000000052A0000-0x00000000052DF000-memory.dmp
        Filesize

        252KB

      • memory/840-202-0x00000000052A0000-0x00000000052DF000-memory.dmp
        Filesize

        252KB

      • memory/840-204-0x00000000052A0000-0x00000000052DF000-memory.dmp
        Filesize

        252KB

      • memory/840-206-0x00000000052A0000-0x00000000052DF000-memory.dmp
        Filesize

        252KB

      • memory/840-208-0x00000000052A0000-0x00000000052DF000-memory.dmp
        Filesize

        252KB

      • memory/840-210-0x00000000052A0000-0x00000000052DF000-memory.dmp
        Filesize

        252KB

      • memory/840-212-0x00000000052A0000-0x00000000052DF000-memory.dmp
        Filesize

        252KB

      • memory/840-214-0x00000000052A0000-0x00000000052DF000-memory.dmp
        Filesize

        252KB

      • memory/2672-172-0x00000000026B0000-0x00000000026C2000-memory.dmp
        Filesize

        72KB

      • memory/2672-185-0x0000000000400000-0x000000000070F000-memory.dmp
        Filesize

        3.1MB

      • memory/2672-170-0x00000000026B0000-0x00000000026C2000-memory.dmp
        Filesize

        72KB

      • memory/2672-168-0x00000000026B0000-0x00000000026C2000-memory.dmp
        Filesize

        72KB

      • memory/2672-182-0x0000000004D90000-0x0000000004DA0000-memory.dmp
        Filesize

        64KB

      • memory/2672-181-0x0000000000400000-0x000000000070F000-memory.dmp
        Filesize

        3.1MB

      • memory/2672-150-0x0000000004D90000-0x0000000004DA0000-memory.dmp
        Filesize

        64KB

      • memory/2672-180-0x00000000026B0000-0x00000000026C2000-memory.dmp
        Filesize

        72KB

      • memory/2672-178-0x00000000026B0000-0x00000000026C2000-memory.dmp
        Filesize

        72KB

      • memory/2672-153-0x00000000026B0000-0x00000000026C2000-memory.dmp
        Filesize

        72KB

      • memory/2672-176-0x00000000026B0000-0x00000000026C2000-memory.dmp
        Filesize

        72KB

      • memory/2672-174-0x00000000026B0000-0x00000000026C2000-memory.dmp
        Filesize

        72KB

      • memory/2672-151-0x0000000004D90000-0x0000000004DA0000-memory.dmp
        Filesize

        64KB

      • memory/2672-152-0x0000000004D90000-0x0000000004DA0000-memory.dmp
        Filesize

        64KB

      • memory/2672-183-0x0000000004D90000-0x0000000004DA0000-memory.dmp
        Filesize

        64KB

      • memory/2672-166-0x00000000026B0000-0x00000000026C2000-memory.dmp
        Filesize

        72KB

      • memory/2672-164-0x00000000026B0000-0x00000000026C2000-memory.dmp
        Filesize

        72KB

      • memory/2672-162-0x00000000026B0000-0x00000000026C2000-memory.dmp
        Filesize

        72KB

      • memory/2672-160-0x00000000026B0000-0x00000000026C2000-memory.dmp
        Filesize

        72KB

      • memory/2672-158-0x00000000026B0000-0x00000000026C2000-memory.dmp
        Filesize

        72KB

      • memory/2672-156-0x00000000026B0000-0x00000000026C2000-memory.dmp
        Filesize

        72KB

      • memory/2672-154-0x00000000026B0000-0x00000000026C2000-memory.dmp
        Filesize

        72KB

      • memory/2672-149-0x0000000000710000-0x000000000073D000-memory.dmp
        Filesize

        180KB

      • memory/2672-148-0x0000000004DA0000-0x0000000005344000-memory.dmp
        Filesize

        5.6MB

      • memory/3688-1121-0x0000000000B40000-0x0000000000B72000-memory.dmp
        Filesize

        200KB

      • memory/3688-1122-0x00000000053E0000-0x00000000053F0000-memory.dmp
        Filesize

        64KB