Analysis

  • max time kernel
    135s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 22:39

General

  • Target

    5865379649391f5a8d84ba4df995c5e06347e50ba161253f0d30aea3856bfa39.exe

  • Size

    701KB

  • MD5

    593a1f21bce127775943b2c84ab07865

  • SHA1

    a76420fb725eedfd40e9e23c76271c825ebda9fc

  • SHA256

    5865379649391f5a8d84ba4df995c5e06347e50ba161253f0d30aea3856bfa39

  • SHA512

    483161fe0b8479abfe929d2a53f0e057e1a2024141cfcf21d404723afc7092f6fc2f8c90a7d05bf85e150da2bd084fc88856ea941172b98d9ec7941607693c7d

  • SSDEEP

    12288:7Mrsy90FFPYq5mcOLko2NJxm58F7+BvMpbj5o/eYato4o:LyOPYYmccQnF7+18j2mYlB

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5865379649391f5a8d84ba4df995c5e06347e50ba161253f0d30aea3856bfa39.exe
    "C:\Users\Admin\AppData\Local\Temp\5865379649391f5a8d84ba4df995c5e06347e50ba161253f0d30aea3856bfa39.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1176
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un435714.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un435714.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:548
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0171.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0171.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2120
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 1064
          4⤵
          • Program crash
          PID:3144
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0177.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0177.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3624
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3624 -s 1320
          4⤵
          • Program crash
          PID:4832
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si204951.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si204951.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:764
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2120 -ip 2120
    1⤵
      PID:4584
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 3624 -ip 3624
      1⤵
        PID:2592

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si204951.exe

        Filesize

        175KB

        MD5

        b682222832457e66cba17500ece81d06

        SHA1

        50d5ce36b1b3a300d4da0954859e8c296634e94b

        SHA256

        bf7271be34d00f60aea85abb2c6d4be96ec9879415a59447973227b21cd4c4dc

        SHA512

        ad992c5714fbb85b3298d91bdcbf643540ccfd27610e3ec54d09aa918b81198e184376d1e17dca861b62644249d674d2302f7eb3eba00569aa35bcceab517855

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si204951.exe

        Filesize

        175KB

        MD5

        b682222832457e66cba17500ece81d06

        SHA1

        50d5ce36b1b3a300d4da0954859e8c296634e94b

        SHA256

        bf7271be34d00f60aea85abb2c6d4be96ec9879415a59447973227b21cd4c4dc

        SHA512

        ad992c5714fbb85b3298d91bdcbf643540ccfd27610e3ec54d09aa918b81198e184376d1e17dca861b62644249d674d2302f7eb3eba00569aa35bcceab517855

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un435714.exe

        Filesize

        558KB

        MD5

        16d609e05110f1c8686fc98f73e94e35

        SHA1

        e84e5d07f936efc602496458ee8d9446fda03138

        SHA256

        25189ee8ffc022e215daed336f7b23500884255c47004614b7d812b4c225b061

        SHA512

        25398007408b6554bc66570a6bce81fed710a203fa5ce33d1bacfec8a89d2b9b090ff4ad67f178686677ca3dd97ab6356dae4edc31f73d10e0c1325ce9991acb

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un435714.exe

        Filesize

        558KB

        MD5

        16d609e05110f1c8686fc98f73e94e35

        SHA1

        e84e5d07f936efc602496458ee8d9446fda03138

        SHA256

        25189ee8ffc022e215daed336f7b23500884255c47004614b7d812b4c225b061

        SHA512

        25398007408b6554bc66570a6bce81fed710a203fa5ce33d1bacfec8a89d2b9b090ff4ad67f178686677ca3dd97ab6356dae4edc31f73d10e0c1325ce9991acb

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0171.exe

        Filesize

        307KB

        MD5

        a7419b4b488c9174ef53a9b59748a3b3

        SHA1

        e149773b612c002640769aa659cccfb410890469

        SHA256

        e88446d137a9d3280e28b4b7d152b5004efe3ed4291aa334ac8da68b4dbcb5e2

        SHA512

        13d655619ca9de2e5869326b58ef99814d11a3e882fdfdaed70874c6d156007aab34a864f32e5d02038f397ddd3f916b5502c9096cced7a26bde9c7e912d9860

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0171.exe

        Filesize

        307KB

        MD5

        a7419b4b488c9174ef53a9b59748a3b3

        SHA1

        e149773b612c002640769aa659cccfb410890469

        SHA256

        e88446d137a9d3280e28b4b7d152b5004efe3ed4291aa334ac8da68b4dbcb5e2

        SHA512

        13d655619ca9de2e5869326b58ef99814d11a3e882fdfdaed70874c6d156007aab34a864f32e5d02038f397ddd3f916b5502c9096cced7a26bde9c7e912d9860

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0177.exe

        Filesize

        365KB

        MD5

        1a92986d6edf0b913168e28305d966f2

        SHA1

        78cdab661d47068a1ce4e504772fa1068738d015

        SHA256

        bc51801697c7cfbc0a6ed237516ca804b2a97b91e1dd6e400d8e2278bd48fb0d

        SHA512

        3e724b1de1bf58256ba3a0b5f703ba236a43a92612cd45a4dbb46454251ddcf1824cdd76634397da32e063e1fa96d31a66c5745d38192a56389e0d497afac44c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0177.exe

        Filesize

        365KB

        MD5

        1a92986d6edf0b913168e28305d966f2

        SHA1

        78cdab661d47068a1ce4e504772fa1068738d015

        SHA256

        bc51801697c7cfbc0a6ed237516ca804b2a97b91e1dd6e400d8e2278bd48fb0d

        SHA512

        3e724b1de1bf58256ba3a0b5f703ba236a43a92612cd45a4dbb46454251ddcf1824cdd76634397da32e063e1fa96d31a66c5745d38192a56389e0d497afac44c

      • memory/764-1121-0x0000000004F90000-0x0000000004FA0000-memory.dmp

        Filesize

        64KB

      • memory/764-1120-0x0000000000630000-0x0000000000662000-memory.dmp

        Filesize

        200KB

      • memory/764-1122-0x0000000004F90000-0x0000000004FA0000-memory.dmp

        Filesize

        64KB

      • memory/2120-155-0x00000000027E0000-0x00000000027F2000-memory.dmp

        Filesize

        72KB

      • memory/2120-169-0x00000000027E0000-0x00000000027F2000-memory.dmp

        Filesize

        72KB

      • memory/2120-152-0x00000000027E0000-0x00000000027F2000-memory.dmp

        Filesize

        72KB

      • memory/2120-153-0x00000000027E0000-0x00000000027F2000-memory.dmp

        Filesize

        72KB

      • memory/2120-157-0x00000000027E0000-0x00000000027F2000-memory.dmp

        Filesize

        72KB

      • memory/2120-150-0x0000000004CF0000-0x0000000004D00000-memory.dmp

        Filesize

        64KB

      • memory/2120-159-0x00000000027E0000-0x00000000027F2000-memory.dmp

        Filesize

        72KB

      • memory/2120-161-0x00000000027E0000-0x00000000027F2000-memory.dmp

        Filesize

        72KB

      • memory/2120-163-0x00000000027E0000-0x00000000027F2000-memory.dmp

        Filesize

        72KB

      • memory/2120-165-0x00000000027E0000-0x00000000027F2000-memory.dmp

        Filesize

        72KB

      • memory/2120-167-0x00000000027E0000-0x00000000027F2000-memory.dmp

        Filesize

        72KB

      • memory/2120-151-0x0000000004CF0000-0x0000000004D00000-memory.dmp

        Filesize

        64KB

      • memory/2120-171-0x00000000027E0000-0x00000000027F2000-memory.dmp

        Filesize

        72KB

      • memory/2120-173-0x00000000027E0000-0x00000000027F2000-memory.dmp

        Filesize

        72KB

      • memory/2120-175-0x00000000027E0000-0x00000000027F2000-memory.dmp

        Filesize

        72KB

      • memory/2120-177-0x00000000027E0000-0x00000000027F2000-memory.dmp

        Filesize

        72KB

      • memory/2120-179-0x00000000027E0000-0x00000000027F2000-memory.dmp

        Filesize

        72KB

      • memory/2120-180-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/2120-181-0x0000000004CF0000-0x0000000004D00000-memory.dmp

        Filesize

        64KB

      • memory/2120-182-0x0000000004CF0000-0x0000000004D00000-memory.dmp

        Filesize

        64KB

      • memory/2120-183-0x0000000004CF0000-0x0000000004D00000-memory.dmp

        Filesize

        64KB

      • memory/2120-185-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/2120-149-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/2120-148-0x0000000004D00000-0x00000000052A4000-memory.dmp

        Filesize

        5.6MB

      • memory/3624-190-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/3624-235-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB

      • memory/3624-197-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/3624-199-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/3624-201-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/3624-203-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/3624-205-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/3624-207-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/3624-209-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/3624-211-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/3624-213-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/3624-215-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/3624-217-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/3624-219-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/3624-221-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/3624-223-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/3624-231-0x0000000000830000-0x000000000087B000-memory.dmp

        Filesize

        300KB

      • memory/3624-195-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/3624-232-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB

      • memory/3624-1099-0x0000000005470000-0x0000000005A88000-memory.dmp

        Filesize

        6.1MB

      • memory/3624-1100-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/3624-1101-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/3624-1102-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB

      • memory/3624-1103-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/3624-1104-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/3624-1105-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/3624-1108-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB

      • memory/3624-1107-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB

      • memory/3624-1109-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB

      • memory/3624-1110-0x00000000067F0000-0x0000000006866000-memory.dmp

        Filesize

        472KB

      • memory/3624-1111-0x0000000006880000-0x00000000068D0000-memory.dmp

        Filesize

        320KB

      • memory/3624-193-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/3624-191-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

        Filesize

        252KB

      • memory/3624-1112-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB

      • memory/3624-1113-0x0000000007BC0000-0x0000000007D82000-memory.dmp

        Filesize

        1.8MB

      • memory/3624-1114-0x0000000007F90000-0x00000000084BC000-memory.dmp

        Filesize

        5.2MB