Analysis

  • max time kernel
    84s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 22:24

General

  • Target

    644ddf487ce0770598b0c1cb27f80c46c1fac9fc4f0c247b17b9417d0d6cfbbd.exe

  • Size

    701KB

  • MD5

    214d113f313941dddc10a1f078f8cf3c

  • SHA1

    689006644698d4cf4645b9a0ee2996d41ed663c8

  • SHA256

    644ddf487ce0770598b0c1cb27f80c46c1fac9fc4f0c247b17b9417d0d6cfbbd

  • SHA512

    278cf9b091c541b73e5f6e6c902a3450aa6bf2272d85b1b2b203eb0efa12091e6ebea71c302a8d3f535c62151b8d38535b4d3db352e0daead65516cac2dcf94f

  • SSDEEP

    12288:zMrjy90Me0MUq8jTrid0H115BSPCuF4dC2Sw/coUy7WMnpgBPi:UyfezUrfHBBPBd1SuUySkpCi

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\644ddf487ce0770598b0c1cb27f80c46c1fac9fc4f0c247b17b9417d0d6cfbbd.exe
    "C:\Users\Admin\AppData\Local\Temp\644ddf487ce0770598b0c1cb27f80c46c1fac9fc4f0c247b17b9417d0d6cfbbd.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2348
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un179224.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un179224.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4700
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8974.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8974.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4304
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4304 -s 1084
          4⤵
          • Program crash
          PID:4344
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4346.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4346.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1828
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1828 -s 1352
          4⤵
          • Program crash
          PID:3216
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si805970.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si805970.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3224
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4304 -ip 4304
    1⤵
      PID:264
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 1828 -ip 1828
      1⤵
        PID:3472

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si805970.exe

        Filesize

        175KB

        MD5

        03d7fdb12cb9de8a80ee12ffc99c0dde

        SHA1

        7b793de771a81f7a9f9c4b0877f5ec2c73645646

        SHA256

        6336686757d115eceb0377e6fa6ef849d4254d1f704a9b53a8bb32f6b38a6a86

        SHA512

        a3a443610c405eb2f1c9084577b4711d4caf3d63b4e2b7233ffaabdfdbcd00cbc29cdfdc262267fc92f6145f28a9e68aa4ae7657a8f18f893ff18e7fb030d141

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si805970.exe

        Filesize

        175KB

        MD5

        03d7fdb12cb9de8a80ee12ffc99c0dde

        SHA1

        7b793de771a81f7a9f9c4b0877f5ec2c73645646

        SHA256

        6336686757d115eceb0377e6fa6ef849d4254d1f704a9b53a8bb32f6b38a6a86

        SHA512

        a3a443610c405eb2f1c9084577b4711d4caf3d63b4e2b7233ffaabdfdbcd00cbc29cdfdc262267fc92f6145f28a9e68aa4ae7657a8f18f893ff18e7fb030d141

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un179224.exe

        Filesize

        558KB

        MD5

        28d829ab6dc089e045e05dd24a464eee

        SHA1

        1e2fd267038a30b35154f93647e34c61f7fdae53

        SHA256

        6fbd753d0a1ca02165aa2f559539b8b34693c9a05b8b8a9a885839b43e96bb3f

        SHA512

        58c72141448193261b8e85092202eb7b2babea3ad581264035f21b04efdc9652c6711275d9a915674e44827db6b69e91f2dd571723a3d97531fd772424760183

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un179224.exe

        Filesize

        558KB

        MD5

        28d829ab6dc089e045e05dd24a464eee

        SHA1

        1e2fd267038a30b35154f93647e34c61f7fdae53

        SHA256

        6fbd753d0a1ca02165aa2f559539b8b34693c9a05b8b8a9a885839b43e96bb3f

        SHA512

        58c72141448193261b8e85092202eb7b2babea3ad581264035f21b04efdc9652c6711275d9a915674e44827db6b69e91f2dd571723a3d97531fd772424760183

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8974.exe

        Filesize

        307KB

        MD5

        4eccf34ea8636960d2ae5ac757d24699

        SHA1

        853fcd20f3e9c60c0dce5c7365455f49038fbd5e

        SHA256

        2862c4118ecd56b4a02a8426a23abe79279d0070ac7c1cdd90f8c11a31464ace

        SHA512

        80c559ae7b804e6e66abc1df897873fe474088d3c802558bd0c3709ed0ffaf27e495d8dc71a2bc907cbc3012e63ecb59c0f5bd0edd5b0bbd503107fd44b3340f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8974.exe

        Filesize

        307KB

        MD5

        4eccf34ea8636960d2ae5ac757d24699

        SHA1

        853fcd20f3e9c60c0dce5c7365455f49038fbd5e

        SHA256

        2862c4118ecd56b4a02a8426a23abe79279d0070ac7c1cdd90f8c11a31464ace

        SHA512

        80c559ae7b804e6e66abc1df897873fe474088d3c802558bd0c3709ed0ffaf27e495d8dc71a2bc907cbc3012e63ecb59c0f5bd0edd5b0bbd503107fd44b3340f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4346.exe

        Filesize

        365KB

        MD5

        aa6133b0fd4eefc62fca29a995c18815

        SHA1

        2ffb4bef5e7f1059c7594dc29e7c9efcc818e3ad

        SHA256

        cbdeeaa2a94b477e5153bec76dd1f35149e99959c79e55d55855d72b9f6c033f

        SHA512

        f493db98be6bc291bf520a82eb794a26ea8fb476e21f02f3bfec1b4dc1593180e0105c2915e85be87033b1063351c8ccbbbcec76df701edaa01c8a45c058af77

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4346.exe

        Filesize

        365KB

        MD5

        aa6133b0fd4eefc62fca29a995c18815

        SHA1

        2ffb4bef5e7f1059c7594dc29e7c9efcc818e3ad

        SHA256

        cbdeeaa2a94b477e5153bec76dd1f35149e99959c79e55d55855d72b9f6c033f

        SHA512

        f493db98be6bc291bf520a82eb794a26ea8fb476e21f02f3bfec1b4dc1593180e0105c2915e85be87033b1063351c8ccbbbcec76df701edaa01c8a45c058af77

      • memory/1828-1102-0x00000000059C0000-0x0000000005ACA000-memory.dmp

        Filesize

        1.0MB

      • memory/1828-1101-0x0000000005320000-0x0000000005938000-memory.dmp

        Filesize

        6.1MB

      • memory/1828-220-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/1828-218-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/1828-204-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/1828-206-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/1828-1115-0x0000000002530000-0x0000000002540000-memory.dmp

        Filesize

        64KB

      • memory/1828-1114-0x0000000006FB0000-0x0000000007000000-memory.dmp

        Filesize

        320KB

      • memory/1828-1113-0x0000000006F30000-0x0000000006FA6000-memory.dmp

        Filesize

        472KB

      • memory/1828-1112-0x0000000002530000-0x0000000002540000-memory.dmp

        Filesize

        64KB

      • memory/1828-208-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/1828-1111-0x0000000002530000-0x0000000002540000-memory.dmp

        Filesize

        64KB

      • memory/1828-1110-0x00000000068B0000-0x0000000006DDC000-memory.dmp

        Filesize

        5.2MB

      • memory/1828-1109-0x00000000066D0000-0x0000000006892000-memory.dmp

        Filesize

        1.8MB

      • memory/1828-1107-0x0000000005EB0000-0x0000000005F16000-memory.dmp

        Filesize

        408KB

      • memory/1828-1106-0x0000000005E10000-0x0000000005EA2000-memory.dmp

        Filesize

        584KB

      • memory/1828-1105-0x0000000002530000-0x0000000002540000-memory.dmp

        Filesize

        64KB

      • memory/1828-1104-0x0000000005B20000-0x0000000005B5C000-memory.dmp

        Filesize

        240KB

      • memory/1828-1103-0x0000000005B00000-0x0000000005B12000-memory.dmp

        Filesize

        72KB

      • memory/1828-222-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/1828-233-0x0000000002530000-0x0000000002540000-memory.dmp

        Filesize

        64KB

      • memory/1828-231-0x0000000002530000-0x0000000002540000-memory.dmp

        Filesize

        64KB

      • memory/1828-229-0x0000000002530000-0x0000000002540000-memory.dmp

        Filesize

        64KB

      • memory/1828-192-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/1828-191-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/1828-194-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/1828-196-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/1828-198-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/1828-200-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/1828-202-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/1828-216-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/1828-227-0x00000000007F0000-0x000000000083B000-memory.dmp

        Filesize

        300KB

      • memory/1828-224-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/1828-210-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/1828-212-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/1828-214-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/3224-1121-0x0000000000180000-0x00000000001B2000-memory.dmp

        Filesize

        200KB

      • memory/3224-1122-0x0000000004A90000-0x0000000004AA0000-memory.dmp

        Filesize

        64KB

      • memory/3224-1123-0x0000000004A90000-0x0000000004AA0000-memory.dmp

        Filesize

        64KB

      • memory/4304-181-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/4304-170-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4304-149-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/4304-152-0x0000000002780000-0x0000000002790000-memory.dmp

        Filesize

        64KB

      • memory/4304-150-0x0000000002780000-0x0000000002790000-memory.dmp

        Filesize

        64KB

      • memory/4304-186-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/4304-184-0x0000000002780000-0x0000000002790000-memory.dmp

        Filesize

        64KB

      • memory/4304-151-0x0000000002780000-0x0000000002790000-memory.dmp

        Filesize

        64KB

      • memory/4304-183-0x0000000002780000-0x0000000002790000-memory.dmp

        Filesize

        64KB

      • memory/4304-182-0x0000000002780000-0x0000000002790000-memory.dmp

        Filesize

        64KB

      • memory/4304-153-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4304-180-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4304-178-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4304-176-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4304-174-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4304-172-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4304-168-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4304-166-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4304-164-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4304-162-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4304-160-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4304-148-0x0000000004CC0000-0x0000000005264000-memory.dmp

        Filesize

        5.6MB

      • memory/4304-158-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4304-156-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4304-154-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB