Analysis

  • max time kernel
    93s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 22:42

General

  • Target

    d4fa47022155f34dc0d01dbdad0497c9edc4dc0eef8c3e79db64c85a4b583186.exe

  • Size

    700KB

  • MD5

    2ebd2884c9469457bda795909c9f04e2

  • SHA1

    de041e88502b3947b171a90c5faa7ef36e59c1ac

  • SHA256

    d4fa47022155f34dc0d01dbdad0497c9edc4dc0eef8c3e79db64c85a4b583186

  • SHA512

    8b80a8bff7d0f1612d8810413acb47c41960991569457c3b1302fe9fdc217dfb689eb1bcddf74c1e8005b32bd2d10034e6a0835c2d5486ae21d90f4e590243b3

  • SSDEEP

    12288:aMrpy90gd47BTMF3FfjJp9D7tcAZ8F5pZ/cchf0p0fvm0JDNd:by+arLNZ8zpZPhMp0fe0JD/

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4fa47022155f34dc0d01dbdad0497c9edc4dc0eef8c3e79db64c85a4b583186.exe
    "C:\Users\Admin\AppData\Local\Temp\d4fa47022155f34dc0d01dbdad0497c9edc4dc0eef8c3e79db64c85a4b583186.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un945295.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un945295.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:972
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4672.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4672.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1492
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1492 -s 1084
          4⤵
          • Program crash
          PID:4988
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7310.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7310.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4948
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 1908
          4⤵
          • Program crash
          PID:3892
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si052564.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si052564.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4468
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1492 -ip 1492
    1⤵
      PID:4748
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4948 -ip 4948
      1⤵
        PID:1852

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si052564.exe

        Filesize

        175KB

        MD5

        5fc0b6aff80dcab82a0282cefc435943

        SHA1

        1f0e28a0dfa015243f8f76de8f67c9acca3c94fb

        SHA256

        b5ac9b2df6af69af1b3e7ae5993f5d88506d59a48c3946e3d389ce38829e6eaf

        SHA512

        d7f1eb99636d323c66591efc091ad341b67899256514d80e243566395296bb6c22670ff990942e83e080503b6cf20c9158e82d4174e308bceda0cfdc4aea40ec

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si052564.exe

        Filesize

        175KB

        MD5

        5fc0b6aff80dcab82a0282cefc435943

        SHA1

        1f0e28a0dfa015243f8f76de8f67c9acca3c94fb

        SHA256

        b5ac9b2df6af69af1b3e7ae5993f5d88506d59a48c3946e3d389ce38829e6eaf

        SHA512

        d7f1eb99636d323c66591efc091ad341b67899256514d80e243566395296bb6c22670ff990942e83e080503b6cf20c9158e82d4174e308bceda0cfdc4aea40ec

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un945295.exe

        Filesize

        558KB

        MD5

        9b4aaabc4903909495aad31ea48c7c48

        SHA1

        c4771a68f8cdbc0ffdfeab255fec91b5bd9ebad3

        SHA256

        0e5a43488dd415dd175c54dcb8aebd9f408ba361beb746da1707f084c2326753

        SHA512

        f5cc73655f7c4a475cefa3390b4e486ed9d2f801168dcb94d1a0a65cfaf438e2f58da7045641d8492526421d01b8b7e2990445dd15024c3dcb2c91250fbb54eb

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un945295.exe

        Filesize

        558KB

        MD5

        9b4aaabc4903909495aad31ea48c7c48

        SHA1

        c4771a68f8cdbc0ffdfeab255fec91b5bd9ebad3

        SHA256

        0e5a43488dd415dd175c54dcb8aebd9f408ba361beb746da1707f084c2326753

        SHA512

        f5cc73655f7c4a475cefa3390b4e486ed9d2f801168dcb94d1a0a65cfaf438e2f58da7045641d8492526421d01b8b7e2990445dd15024c3dcb2c91250fbb54eb

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4672.exe

        Filesize

        307KB

        MD5

        e710c8d29f03a97b2ff5ad204bed778c

        SHA1

        da5148e8446b4503c6fffce206a710962e923d35

        SHA256

        05eea50a3f75c7ffa3a69515762adbee199cc21bc321691705765673d34d8cda

        SHA512

        915de5830041f8c8639d1fab6f82929fc1e48b7435e31807c3193e740b497a8bc9a4e23a223202e88af1f75762436543de83178f23106b44e00d9474e8a721a0

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4672.exe

        Filesize

        307KB

        MD5

        e710c8d29f03a97b2ff5ad204bed778c

        SHA1

        da5148e8446b4503c6fffce206a710962e923d35

        SHA256

        05eea50a3f75c7ffa3a69515762adbee199cc21bc321691705765673d34d8cda

        SHA512

        915de5830041f8c8639d1fab6f82929fc1e48b7435e31807c3193e740b497a8bc9a4e23a223202e88af1f75762436543de83178f23106b44e00d9474e8a721a0

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7310.exe

        Filesize

        365KB

        MD5

        58c508f50d076aafaa099c01497431a2

        SHA1

        41ead3349a94c88bc37034d30d55f9bea34c34b6

        SHA256

        c35d6765b947b0b5debe587255d06773af612cd7464fb68fe2dc64e740c0460a

        SHA512

        16d0709577bd403b41ad79c867278338d90d62c590e390e5b056e85dadcf17f20a3a57dd1a7079ea450ae88fbb29f97b85012a6186a12ba4c20f11f5b9f667a4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7310.exe

        Filesize

        365KB

        MD5

        58c508f50d076aafaa099c01497431a2

        SHA1

        41ead3349a94c88bc37034d30d55f9bea34c34b6

        SHA256

        c35d6765b947b0b5debe587255d06773af612cd7464fb68fe2dc64e740c0460a

        SHA512

        16d0709577bd403b41ad79c867278338d90d62c590e390e5b056e85dadcf17f20a3a57dd1a7079ea450ae88fbb29f97b85012a6186a12ba4c20f11f5b9f667a4

      • memory/1492-148-0x0000000004D40000-0x00000000052E4000-memory.dmp

        Filesize

        5.6MB

      • memory/1492-149-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/1492-151-0x00000000025D0000-0x00000000025E0000-memory.dmp

        Filesize

        64KB

      • memory/1492-150-0x00000000025D0000-0x00000000025E0000-memory.dmp

        Filesize

        64KB

      • memory/1492-152-0x00000000025D0000-0x00000000025E0000-memory.dmp

        Filesize

        64KB

      • memory/1492-154-0x0000000002730000-0x0000000002742000-memory.dmp

        Filesize

        72KB

      • memory/1492-153-0x0000000002730000-0x0000000002742000-memory.dmp

        Filesize

        72KB

      • memory/1492-156-0x0000000002730000-0x0000000002742000-memory.dmp

        Filesize

        72KB

      • memory/1492-158-0x0000000002730000-0x0000000002742000-memory.dmp

        Filesize

        72KB

      • memory/1492-160-0x0000000002730000-0x0000000002742000-memory.dmp

        Filesize

        72KB

      • memory/1492-162-0x0000000002730000-0x0000000002742000-memory.dmp

        Filesize

        72KB

      • memory/1492-164-0x0000000002730000-0x0000000002742000-memory.dmp

        Filesize

        72KB

      • memory/1492-166-0x0000000002730000-0x0000000002742000-memory.dmp

        Filesize

        72KB

      • memory/1492-168-0x0000000002730000-0x0000000002742000-memory.dmp

        Filesize

        72KB

      • memory/1492-170-0x0000000002730000-0x0000000002742000-memory.dmp

        Filesize

        72KB

      • memory/1492-172-0x0000000002730000-0x0000000002742000-memory.dmp

        Filesize

        72KB

      • memory/1492-174-0x0000000002730000-0x0000000002742000-memory.dmp

        Filesize

        72KB

      • memory/1492-176-0x0000000002730000-0x0000000002742000-memory.dmp

        Filesize

        72KB

      • memory/1492-178-0x0000000002730000-0x0000000002742000-memory.dmp

        Filesize

        72KB

      • memory/1492-180-0x0000000002730000-0x0000000002742000-memory.dmp

        Filesize

        72KB

      • memory/1492-181-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/1492-182-0x00000000025D0000-0x00000000025E0000-memory.dmp

        Filesize

        64KB

      • memory/1492-183-0x00000000025D0000-0x00000000025E0000-memory.dmp

        Filesize

        64KB

      • memory/1492-184-0x00000000025D0000-0x00000000025E0000-memory.dmp

        Filesize

        64KB

      • memory/1492-186-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/4468-1122-0x00000000001A0000-0x00000000001D2000-memory.dmp

        Filesize

        200KB

      • memory/4468-1124-0x0000000004AC0000-0x0000000004AD0000-memory.dmp

        Filesize

        64KB

      • memory/4468-1123-0x0000000004AC0000-0x0000000004AD0000-memory.dmp

        Filesize

        64KB

      • memory/4948-194-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4948-228-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4948-198-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4948-200-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4948-202-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4948-204-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4948-206-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4948-208-0x0000000000720000-0x000000000076B000-memory.dmp

        Filesize

        300KB

      • memory/4948-212-0x0000000004C90000-0x0000000004CA0000-memory.dmp

        Filesize

        64KB

      • memory/4948-210-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4948-214-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4948-213-0x0000000004C90000-0x0000000004CA0000-memory.dmp

        Filesize

        64KB

      • memory/4948-216-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4948-209-0x0000000004C90000-0x0000000004CA0000-memory.dmp

        Filesize

        64KB

      • memory/4948-218-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4948-220-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4948-222-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4948-224-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4948-226-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4948-196-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4948-1101-0x0000000005460000-0x0000000005A78000-memory.dmp

        Filesize

        6.1MB

      • memory/4948-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/4948-1103-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/4948-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/4948-1105-0x0000000004C90000-0x0000000004CA0000-memory.dmp

        Filesize

        64KB

      • memory/4948-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/4948-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/4948-1108-0x0000000006810000-0x00000000069D2000-memory.dmp

        Filesize

        1.8MB

      • memory/4948-1109-0x00000000069F0000-0x0000000006F1C000-memory.dmp

        Filesize

        5.2MB

      • memory/4948-1111-0x0000000004C90000-0x0000000004CA0000-memory.dmp

        Filesize

        64KB

      • memory/4948-1112-0x0000000004C90000-0x0000000004CA0000-memory.dmp

        Filesize

        64KB

      • memory/4948-1113-0x0000000004C90000-0x0000000004CA0000-memory.dmp

        Filesize

        64KB

      • memory/4948-192-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4948-191-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4948-1114-0x0000000004C90000-0x0000000004CA0000-memory.dmp

        Filesize

        64KB

      • memory/4948-1115-0x0000000008470000-0x00000000084E6000-memory.dmp

        Filesize

        472KB

      • memory/4948-1116-0x0000000008500000-0x0000000008550000-memory.dmp

        Filesize

        320KB