Analysis

  • max time kernel
    137s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 22:48

General

  • Target

    7db52f0491ae8923a78b285652445c3780f1cfdfbfd6e207d678aaed6f1f65f7.exe

  • Size

    700KB

  • MD5

    484dce48d39d1ddfd78f73754377d66d

  • SHA1

    7e5ee498b0e2915c6a43bce3a7eebbd93ef06d8f

  • SHA256

    7db52f0491ae8923a78b285652445c3780f1cfdfbfd6e207d678aaed6f1f65f7

  • SHA512

    26fdcc0cb4bcb28ed57c4974e6c08d76b5b1fe0dca7d6940cd97f4a1963768d52ea74d9a8392a2617140f3c0a1564a628d59a6ef6fdadde6f5c17cb81f5b1b4b

  • SSDEEP

    12288:jMrhy90YteX9Kd2Hv12o9DMacA1GIgPhNU2JjCD8tQdf:Ky5etEMv12W1GICh+ujltQdf

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7db52f0491ae8923a78b285652445c3780f1cfdfbfd6e207d678aaed6f1f65f7.exe
    "C:\Users\Admin\AppData\Local\Temp\7db52f0491ae8923a78b285652445c3780f1cfdfbfd6e207d678aaed6f1f65f7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1880
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un327991.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un327991.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4028
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7160.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7160.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1972
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1972 -s 1084
          4⤵
          • Program crash
          PID:4088
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4453.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4453.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4196
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4196 -s 1532
          4⤵
          • Program crash
          PID:1420
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si891767.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si891767.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2784
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1972 -ip 1972
    1⤵
      PID:5048
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4196 -ip 4196
      1⤵
        PID:3760

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si891767.exe

        Filesize

        175KB

        MD5

        b4b9f5ee9e4363c77f717c8cf06af9c6

        SHA1

        7e3062abe8919ebaf17a9eb8456f7de96ade20d4

        SHA256

        1b7ca2b68af4f88e939f5a374c02ea6c7e699453c1a13723c5981ea7a03a002e

        SHA512

        0f510f213e61d7af7a5195e5f2fb17ee6eeca411bf7d60bb914b965ab920537553357c70be4e69705f8df414a76c349fb57243bc8f1b8ea1d8c3fc319303a6f6

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si891767.exe

        Filesize

        175KB

        MD5

        b4b9f5ee9e4363c77f717c8cf06af9c6

        SHA1

        7e3062abe8919ebaf17a9eb8456f7de96ade20d4

        SHA256

        1b7ca2b68af4f88e939f5a374c02ea6c7e699453c1a13723c5981ea7a03a002e

        SHA512

        0f510f213e61d7af7a5195e5f2fb17ee6eeca411bf7d60bb914b965ab920537553357c70be4e69705f8df414a76c349fb57243bc8f1b8ea1d8c3fc319303a6f6

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un327991.exe

        Filesize

        558KB

        MD5

        cb8da298d3480a38c239d8404d544637

        SHA1

        531e8a76da56af618ff0103d1d6966bdbd26dc34

        SHA256

        fefa7cb2ccf21b54cf1aa0a8d55f0c2fed251e39f1a172d58f012a1e0198685b

        SHA512

        ea87bcb86aa0efba0934fa6efc9aee015f78ee7a5e076e1596095bae542d67a829865529b5b630b0cc4a724fa6df6e0e192b8ec3795b25f8954c7025de02e247

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un327991.exe

        Filesize

        558KB

        MD5

        cb8da298d3480a38c239d8404d544637

        SHA1

        531e8a76da56af618ff0103d1d6966bdbd26dc34

        SHA256

        fefa7cb2ccf21b54cf1aa0a8d55f0c2fed251e39f1a172d58f012a1e0198685b

        SHA512

        ea87bcb86aa0efba0934fa6efc9aee015f78ee7a5e076e1596095bae542d67a829865529b5b630b0cc4a724fa6df6e0e192b8ec3795b25f8954c7025de02e247

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7160.exe

        Filesize

        307KB

        MD5

        0a4f16c4267073511e956d83a16d2be8

        SHA1

        358fd1f06e43792d2b3456481533879f80e55260

        SHA256

        0cf508466422d8fcace43b1ae2298396a9860febfa38f983fba7737b2dee0ac5

        SHA512

        601676f1e40e44f6a76f6c501a803d0006c9130370dda4e0af400038ef17853ab6f72b0586ca8de8682da9db0ad001fa2057aa63df56de307e7c7890a14c27a5

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7160.exe

        Filesize

        307KB

        MD5

        0a4f16c4267073511e956d83a16d2be8

        SHA1

        358fd1f06e43792d2b3456481533879f80e55260

        SHA256

        0cf508466422d8fcace43b1ae2298396a9860febfa38f983fba7737b2dee0ac5

        SHA512

        601676f1e40e44f6a76f6c501a803d0006c9130370dda4e0af400038ef17853ab6f72b0586ca8de8682da9db0ad001fa2057aa63df56de307e7c7890a14c27a5

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4453.exe

        Filesize

        365KB

        MD5

        9b01feef7f83e1f49d76dc2389b08a7b

        SHA1

        81383189e6576bb98fcc080e941e296ad3634acc

        SHA256

        f1b79792199a5f8605196a99b457a2039e48634c6b2ec283c39cc26f6b0a6fc6

        SHA512

        6b3213b93f56ed3678655024af25a842da8b8cdccacc55b860a3b2cc8fa8c6c6e12f4daadb1c1e27e245cc795ce993aed55877a02969ffecbcb8bc91a2c86c1f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4453.exe

        Filesize

        365KB

        MD5

        9b01feef7f83e1f49d76dc2389b08a7b

        SHA1

        81383189e6576bb98fcc080e941e296ad3634acc

        SHA256

        f1b79792199a5f8605196a99b457a2039e48634c6b2ec283c39cc26f6b0a6fc6

        SHA512

        6b3213b93f56ed3678655024af25a842da8b8cdccacc55b860a3b2cc8fa8c6c6e12f4daadb1c1e27e245cc795ce993aed55877a02969ffecbcb8bc91a2c86c1f

      • memory/1972-148-0x0000000000800000-0x000000000082D000-memory.dmp

        Filesize

        180KB

      • memory/1972-149-0x0000000004F30000-0x0000000004F40000-memory.dmp

        Filesize

        64KB

      • memory/1972-150-0x0000000004F30000-0x0000000004F40000-memory.dmp

        Filesize

        64KB

      • memory/1972-151-0x0000000004F30000-0x0000000004F40000-memory.dmp

        Filesize

        64KB

      • memory/1972-152-0x0000000004F40000-0x00000000054E4000-memory.dmp

        Filesize

        5.6MB

      • memory/1972-153-0x0000000002960000-0x0000000002972000-memory.dmp

        Filesize

        72KB

      • memory/1972-154-0x0000000002960000-0x0000000002972000-memory.dmp

        Filesize

        72KB

      • memory/1972-156-0x0000000002960000-0x0000000002972000-memory.dmp

        Filesize

        72KB

      • memory/1972-158-0x0000000002960000-0x0000000002972000-memory.dmp

        Filesize

        72KB

      • memory/1972-160-0x0000000002960000-0x0000000002972000-memory.dmp

        Filesize

        72KB

      • memory/1972-162-0x0000000002960000-0x0000000002972000-memory.dmp

        Filesize

        72KB

      • memory/1972-164-0x0000000002960000-0x0000000002972000-memory.dmp

        Filesize

        72KB

      • memory/1972-166-0x0000000002960000-0x0000000002972000-memory.dmp

        Filesize

        72KB

      • memory/1972-168-0x0000000002960000-0x0000000002972000-memory.dmp

        Filesize

        72KB

      • memory/1972-170-0x0000000002960000-0x0000000002972000-memory.dmp

        Filesize

        72KB

      • memory/1972-172-0x0000000002960000-0x0000000002972000-memory.dmp

        Filesize

        72KB

      • memory/1972-174-0x0000000002960000-0x0000000002972000-memory.dmp

        Filesize

        72KB

      • memory/1972-176-0x0000000002960000-0x0000000002972000-memory.dmp

        Filesize

        72KB

      • memory/1972-178-0x0000000002960000-0x0000000002972000-memory.dmp

        Filesize

        72KB

      • memory/1972-180-0x0000000002960000-0x0000000002972000-memory.dmp

        Filesize

        72KB

      • memory/1972-181-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/1972-182-0x0000000004F30000-0x0000000004F40000-memory.dmp

        Filesize

        64KB

      • memory/1972-183-0x0000000004F30000-0x0000000004F40000-memory.dmp

        Filesize

        64KB

      • memory/1972-185-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/2784-1121-0x00000000000F0000-0x0000000000122000-memory.dmp

        Filesize

        200KB

      • memory/2784-1122-0x00000000049D0000-0x00000000049E0000-memory.dmp

        Filesize

        64KB

      • memory/4196-191-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/4196-225-0x00000000027A0000-0x00000000027DF000-memory.dmp

        Filesize

        252KB

      • memory/4196-193-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/4196-194-0x00000000027A0000-0x00000000027DF000-memory.dmp

        Filesize

        252KB

      • memory/4196-195-0x00000000027A0000-0x00000000027DF000-memory.dmp

        Filesize

        252KB

      • memory/4196-197-0x00000000027A0000-0x00000000027DF000-memory.dmp

        Filesize

        252KB

      • memory/4196-199-0x00000000027A0000-0x00000000027DF000-memory.dmp

        Filesize

        252KB

      • memory/4196-201-0x00000000027A0000-0x00000000027DF000-memory.dmp

        Filesize

        252KB

      • memory/4196-203-0x00000000027A0000-0x00000000027DF000-memory.dmp

        Filesize

        252KB

      • memory/4196-205-0x00000000027A0000-0x00000000027DF000-memory.dmp

        Filesize

        252KB

      • memory/4196-207-0x00000000027A0000-0x00000000027DF000-memory.dmp

        Filesize

        252KB

      • memory/4196-209-0x00000000027A0000-0x00000000027DF000-memory.dmp

        Filesize

        252KB

      • memory/4196-211-0x00000000027A0000-0x00000000027DF000-memory.dmp

        Filesize

        252KB

      • memory/4196-215-0x00000000027A0000-0x00000000027DF000-memory.dmp

        Filesize

        252KB

      • memory/4196-213-0x00000000027A0000-0x00000000027DF000-memory.dmp

        Filesize

        252KB

      • memory/4196-217-0x00000000027A0000-0x00000000027DF000-memory.dmp

        Filesize

        252KB

      • memory/4196-219-0x00000000027A0000-0x00000000027DF000-memory.dmp

        Filesize

        252KB

      • memory/4196-221-0x00000000027A0000-0x00000000027DF000-memory.dmp

        Filesize

        252KB

      • memory/4196-223-0x00000000027A0000-0x00000000027DF000-memory.dmp

        Filesize

        252KB

      • memory/4196-192-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/4196-227-0x00000000027A0000-0x00000000027DF000-memory.dmp

        Filesize

        252KB

      • memory/4196-1100-0x0000000005550000-0x0000000005B68000-memory.dmp

        Filesize

        6.1MB

      • memory/4196-1101-0x0000000005B70000-0x0000000005C7A000-memory.dmp

        Filesize

        1.0MB

      • memory/4196-1102-0x0000000004E50000-0x0000000004E62000-memory.dmp

        Filesize

        72KB

      • memory/4196-1103-0x0000000005C80000-0x0000000005CBC000-memory.dmp

        Filesize

        240KB

      • memory/4196-1104-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/4196-1105-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/4196-1106-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/4196-1107-0x0000000006710000-0x00000000068D2000-memory.dmp

        Filesize

        1.8MB

      • memory/4196-1108-0x00000000068F0000-0x0000000006E1C000-memory.dmp

        Filesize

        5.2MB

      • memory/4196-1110-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/4196-1111-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/4196-1112-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/4196-190-0x0000000000720000-0x000000000076B000-memory.dmp

        Filesize

        300KB

      • memory/4196-1113-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/4196-1114-0x00000000071B0000-0x0000000007226000-memory.dmp

        Filesize

        472KB

      • memory/4196-1115-0x0000000007230000-0x0000000007280000-memory.dmp

        Filesize

        320KB