Analysis

  • max time kernel
    82s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 22:46

General

  • Target

    d379a37f5c5c7b2da42166112a10412268ed904ffd5f585106cd3462c332bf74.exe

  • Size

    699KB

  • MD5

    afbd8bade4aa62ab02d68ac503a3cbc1

  • SHA1

    6e6d97c0d5dc3489672d9b63447546f88b7997ef

  • SHA256

    d379a37f5c5c7b2da42166112a10412268ed904ffd5f585106cd3462c332bf74

  • SHA512

    7bb0e671fbd25c4ad7f288e9fa0834135da774612d6141926ad06d2981188b08cefe2ffb7e866a400fdbf5926d3e03cf7ae4f837da5bdc5e733be5973c499f15

  • SSDEEP

    12288:rMrfy90OechFFHorvzKdADDAjlMyAaNvj50uDmj7LBq9zjNK:cyj1h8rvu+DDKlMyT50SmHLBq9zjo

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d379a37f5c5c7b2da42166112a10412268ed904ffd5f585106cd3462c332bf74.exe
    "C:\Users\Admin\AppData\Local\Temp\d379a37f5c5c7b2da42166112a10412268ed904ffd5f585106cd3462c332bf74.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un129736.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un129736.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:432
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5063.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5063.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4532
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4532 -s 1080
          4⤵
          • Program crash
          PID:3836
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7179.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7179.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3544
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3544 -s 1644
          4⤵
          • Program crash
          PID:3044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si475150.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si475150.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4720
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4532 -ip 4532
    1⤵
      PID:5020
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3544 -ip 3544
      1⤵
        PID:4724

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si475150.exe

        Filesize

        175KB

        MD5

        d007bccc25f4a58e330bd16abd297ca0

        SHA1

        0a862ff17a9d14cadd2c9463cef03dd21905493f

        SHA256

        3e988c7cf3143d2898fe2b372b162394f4da7dca7b84f9b82735a7f3d7c8e7e8

        SHA512

        8344d760154f6e708995224440037288342bae58f62e2979b54b1bce3291c0ea8c43bba640e4459e08b98c10bb90b3149886226324b63d560da362c242e1dfbc

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si475150.exe

        Filesize

        175KB

        MD5

        d007bccc25f4a58e330bd16abd297ca0

        SHA1

        0a862ff17a9d14cadd2c9463cef03dd21905493f

        SHA256

        3e988c7cf3143d2898fe2b372b162394f4da7dca7b84f9b82735a7f3d7c8e7e8

        SHA512

        8344d760154f6e708995224440037288342bae58f62e2979b54b1bce3291c0ea8c43bba640e4459e08b98c10bb90b3149886226324b63d560da362c242e1dfbc

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un129736.exe

        Filesize

        558KB

        MD5

        f0abb96e9d9f7f178cce8e392450585f

        SHA1

        e1828eed12849d273934157f2122403f01d49b8f

        SHA256

        ebae6c7413305be55dfc15f2835befeebb4d4711638f3104b5428b5cc1b90bcc

        SHA512

        e4101b6de1df10b23cd04b49d60c69d90e7fea540ba2888a903807066ad5750948d711ea3b3e418c756de8f0ca7918b61ba94a1fbe210ca3d9fa03033893705c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un129736.exe

        Filesize

        558KB

        MD5

        f0abb96e9d9f7f178cce8e392450585f

        SHA1

        e1828eed12849d273934157f2122403f01d49b8f

        SHA256

        ebae6c7413305be55dfc15f2835befeebb4d4711638f3104b5428b5cc1b90bcc

        SHA512

        e4101b6de1df10b23cd04b49d60c69d90e7fea540ba2888a903807066ad5750948d711ea3b3e418c756de8f0ca7918b61ba94a1fbe210ca3d9fa03033893705c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5063.exe

        Filesize

        307KB

        MD5

        38789be6104c691293e54b76d78dd109

        SHA1

        53eaae27efa3e9f31eaf0bfa0b08125489eae4f0

        SHA256

        57345e5f520f0d8a3330a4c4e728e618ac9350572d0cdd5a64041814e37bbe51

        SHA512

        1494daa255dbdaa1b7f057b8f7b53ad470d8aaf9dc69065504df4ed079f199d786a237a317d6f8d846265331f4d6305e338b67542a55621e925b365a4d5b6c51

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5063.exe

        Filesize

        307KB

        MD5

        38789be6104c691293e54b76d78dd109

        SHA1

        53eaae27efa3e9f31eaf0bfa0b08125489eae4f0

        SHA256

        57345e5f520f0d8a3330a4c4e728e618ac9350572d0cdd5a64041814e37bbe51

        SHA512

        1494daa255dbdaa1b7f057b8f7b53ad470d8aaf9dc69065504df4ed079f199d786a237a317d6f8d846265331f4d6305e338b67542a55621e925b365a4d5b6c51

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7179.exe

        Filesize

        365KB

        MD5

        11af4e2c3b213ab8ff3b0a92979a1eb9

        SHA1

        2b44ace042700298f273c8cf4587b6630c8251b5

        SHA256

        90b1db929ff18f8e4e3af58658b849242320ad23e0fe04aea7c4b57153a18497

        SHA512

        4545668571fef1188e9fea27a9ec919de20979dec0dacfe9565505122c99e17954c3b000f364cee117d735f0d0a4479b50a0f38a65ee998c8c8756de3c1587c4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7179.exe

        Filesize

        365KB

        MD5

        11af4e2c3b213ab8ff3b0a92979a1eb9

        SHA1

        2b44ace042700298f273c8cf4587b6630c8251b5

        SHA256

        90b1db929ff18f8e4e3af58658b849242320ad23e0fe04aea7c4b57153a18497

        SHA512

        4545668571fef1188e9fea27a9ec919de20979dec0dacfe9565505122c99e17954c3b000f364cee117d735f0d0a4479b50a0f38a65ee998c8c8756de3c1587c4

      • memory/3544-227-0x0000000002760000-0x000000000279F000-memory.dmp

        Filesize

        252KB

      • memory/3544-1102-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/3544-1115-0x0000000006C20000-0x000000000714C000-memory.dmp

        Filesize

        5.2MB

      • memory/3544-1114-0x0000000006A50000-0x0000000006C12000-memory.dmp

        Filesize

        1.8MB

      • memory/3544-1113-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/3544-1112-0x00000000069E0000-0x0000000006A30000-memory.dmp

        Filesize

        320KB

      • memory/3544-1111-0x0000000006950000-0x00000000069C6000-memory.dmp

        Filesize

        472KB

      • memory/3544-1110-0x0000000006610000-0x00000000066A2000-memory.dmp

        Filesize

        584KB

      • memory/3544-1109-0x0000000005F50000-0x0000000005FB6000-memory.dmp

        Filesize

        408KB

      • memory/3544-1108-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/3544-1107-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/3544-1106-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/3544-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/3544-1103-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/3544-1101-0x0000000005B20000-0x0000000005C2A000-memory.dmp

        Filesize

        1.0MB

      • memory/3544-1100-0x0000000005500000-0x0000000005B18000-memory.dmp

        Filesize

        6.1MB

      • memory/3544-225-0x0000000002760000-0x000000000279F000-memory.dmp

        Filesize

        252KB

      • memory/3544-223-0x0000000002760000-0x000000000279F000-memory.dmp

        Filesize

        252KB

      • memory/3544-221-0x0000000002760000-0x000000000279F000-memory.dmp

        Filesize

        252KB

      • memory/3544-219-0x0000000002760000-0x000000000279F000-memory.dmp

        Filesize

        252KB

      • memory/3544-217-0x0000000002760000-0x000000000279F000-memory.dmp

        Filesize

        252KB

      • memory/3544-215-0x0000000002760000-0x000000000279F000-memory.dmp

        Filesize

        252KB

      • memory/3544-214-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/3544-191-0x0000000002760000-0x000000000279F000-memory.dmp

        Filesize

        252KB

      • memory/3544-192-0x0000000002760000-0x000000000279F000-memory.dmp

        Filesize

        252KB

      • memory/3544-194-0x0000000002760000-0x000000000279F000-memory.dmp

        Filesize

        252KB

      • memory/3544-196-0x0000000002760000-0x000000000279F000-memory.dmp

        Filesize

        252KB

      • memory/3544-198-0x0000000002760000-0x000000000279F000-memory.dmp

        Filesize

        252KB

      • memory/3544-200-0x0000000002760000-0x000000000279F000-memory.dmp

        Filesize

        252KB

      • memory/3544-202-0x0000000002760000-0x000000000279F000-memory.dmp

        Filesize

        252KB

      • memory/3544-204-0x0000000002760000-0x000000000279F000-memory.dmp

        Filesize

        252KB

      • memory/3544-206-0x0000000002760000-0x000000000279F000-memory.dmp

        Filesize

        252KB

      • memory/3544-208-0x0000000002760000-0x000000000279F000-memory.dmp

        Filesize

        252KB

      • memory/3544-211-0x0000000000720000-0x000000000076B000-memory.dmp

        Filesize

        300KB

      • memory/3544-213-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/3544-210-0x0000000002760000-0x000000000279F000-memory.dmp

        Filesize

        252KB

      • memory/4532-174-0x0000000002490000-0x00000000024A2000-memory.dmp

        Filesize

        72KB

      • memory/4532-160-0x0000000002490000-0x00000000024A2000-memory.dmp

        Filesize

        72KB

      • memory/4532-151-0x00000000024C0000-0x00000000024D0000-memory.dmp

        Filesize

        64KB

      • memory/4532-184-0x00000000024C0000-0x00000000024D0000-memory.dmp

        Filesize

        64KB

      • memory/4532-183-0x00000000024C0000-0x00000000024D0000-memory.dmp

        Filesize

        64KB

      • memory/4532-182-0x00000000024C0000-0x00000000024D0000-memory.dmp

        Filesize

        64KB

      • memory/4532-181-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/4532-150-0x00000000024C0000-0x00000000024D0000-memory.dmp

        Filesize

        64KB

      • memory/4532-180-0x0000000002490000-0x00000000024A2000-memory.dmp

        Filesize

        72KB

      • memory/4532-178-0x0000000002490000-0x00000000024A2000-memory.dmp

        Filesize

        72KB

      • memory/4532-153-0x0000000002490000-0x00000000024A2000-memory.dmp

        Filesize

        72KB

      • memory/4532-176-0x0000000002490000-0x00000000024A2000-memory.dmp

        Filesize

        72KB

      • memory/4532-186-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/4532-172-0x0000000002490000-0x00000000024A2000-memory.dmp

        Filesize

        72KB

      • memory/4532-156-0x0000000002490000-0x00000000024A2000-memory.dmp

        Filesize

        72KB

      • memory/4532-168-0x0000000002490000-0x00000000024A2000-memory.dmp

        Filesize

        72KB

      • memory/4532-166-0x0000000002490000-0x00000000024A2000-memory.dmp

        Filesize

        72KB

      • memory/4532-164-0x0000000002490000-0x00000000024A2000-memory.dmp

        Filesize

        72KB

      • memory/4532-162-0x0000000002490000-0x00000000024A2000-memory.dmp

        Filesize

        72KB

      • memory/4532-152-0x0000000004E90000-0x0000000005434000-memory.dmp

        Filesize

        5.6MB

      • memory/4532-158-0x0000000002490000-0x00000000024A2000-memory.dmp

        Filesize

        72KB

      • memory/4532-170-0x0000000002490000-0x00000000024A2000-memory.dmp

        Filesize

        72KB

      • memory/4532-154-0x0000000002490000-0x00000000024A2000-memory.dmp

        Filesize

        72KB

      • memory/4532-149-0x00000000024C0000-0x00000000024D0000-memory.dmp

        Filesize

        64KB

      • memory/4532-148-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/4720-1121-0x00000000004A0000-0x00000000004D2000-memory.dmp

        Filesize

        200KB

      • memory/4720-1122-0x0000000005250000-0x0000000005260000-memory.dmp

        Filesize

        64KB