Analysis

  • max time kernel
    61s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 22:55

General

  • Target

    5083633efcfb44e72660fe9a928ed814807c3c4b597f234c8f39a26bd4ed9502.exe

  • Size

    700KB

  • MD5

    32afaa768831764c2cac7697429adb56

  • SHA1

    9e5f9621af61d6503e8c8855802faf57a778613b

  • SHA256

    5083633efcfb44e72660fe9a928ed814807c3c4b597f234c8f39a26bd4ed9502

  • SHA512

    8da41ac558a7e18d4658a820a0314ec950a16987a2a2c64ad49c39c13af785e1fd678b69b663505da219085178da051f990ca6093b185c49863d445f13b6bf93

  • SSDEEP

    12288:hMrry90TN44Xybf7X+A816FN+j5nZi9XFO7Nj7u8gZiDzXtd:eyw5ybfj+AW5nUOJHulZiDzXn

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5083633efcfb44e72660fe9a928ed814807c3c4b597f234c8f39a26bd4ed9502.exe
    "C:\Users\Admin\AppData\Local\Temp\5083633efcfb44e72660fe9a928ed814807c3c4b597f234c8f39a26bd4ed9502.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1400
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un782526.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un782526.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2472
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8838.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8838.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1812
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1812 -s 1080
          4⤵
          • Program crash
          PID:2480
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0591.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0591.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4320
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4320 -s 1344
          4⤵
          • Program crash
          PID:3800
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si697061.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si697061.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:484
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1812 -ip 1812
    1⤵
      PID:1572
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4320 -ip 4320
      1⤵
        PID:1672

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si697061.exe

        Filesize

        175KB

        MD5

        78d0a55c01248b59f6d74abdc624f152

        SHA1

        ab84638a9083cc9e2b3a5d7b933f66896d0ae293

        SHA256

        8cbbf6824af13d3ab5dd0987c7f403dfb29d17f1b8cf12c41e277c45c5ce9843

        SHA512

        c4217ba61ffa60da5cd8d0f24f040f23f432ba626b42c48844e8c84bf0c55d71c9212cc88607d72e69ee4a8e669f6ea6f4b0903f9d6d54715f3b6e9eba9ca2c5

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si697061.exe

        Filesize

        175KB

        MD5

        78d0a55c01248b59f6d74abdc624f152

        SHA1

        ab84638a9083cc9e2b3a5d7b933f66896d0ae293

        SHA256

        8cbbf6824af13d3ab5dd0987c7f403dfb29d17f1b8cf12c41e277c45c5ce9843

        SHA512

        c4217ba61ffa60da5cd8d0f24f040f23f432ba626b42c48844e8c84bf0c55d71c9212cc88607d72e69ee4a8e669f6ea6f4b0903f9d6d54715f3b6e9eba9ca2c5

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un782526.exe

        Filesize

        558KB

        MD5

        c0e51222e262263933f32a0c00dad77f

        SHA1

        c940a7075a16eaee9f1bcc4823b5908940413549

        SHA256

        ca0a791e2c135e26ee492267b0c5c3096147e48007c10e5e4ade15d27f371a9e

        SHA512

        227c68ec18b9537e1c552ae8bc3608dc1bc6330a059d096b0c0f51701b8a21376499f63db069996bfbf5bdbcc32ddd8f5f1a059c08faf1272963c26c559f82d4

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un782526.exe

        Filesize

        558KB

        MD5

        c0e51222e262263933f32a0c00dad77f

        SHA1

        c940a7075a16eaee9f1bcc4823b5908940413549

        SHA256

        ca0a791e2c135e26ee492267b0c5c3096147e48007c10e5e4ade15d27f371a9e

        SHA512

        227c68ec18b9537e1c552ae8bc3608dc1bc6330a059d096b0c0f51701b8a21376499f63db069996bfbf5bdbcc32ddd8f5f1a059c08faf1272963c26c559f82d4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8838.exe

        Filesize

        307KB

        MD5

        72b746ad1dae9fb986426f9d3d085b10

        SHA1

        42a2f584b4e591c73a78ae0e915e1c60a102b916

        SHA256

        d4691c37c50ca06b07680a0a197310c4deee052268493ce421bc0466a2c6d2fb

        SHA512

        e7e8e410c1d010d0f0a651b1f9d60e16fcdbba48c1ea10ebb34719306f26ec72773f2a170c656d04a79a35b1d2f1392c7b825fee68aa6c80a20cd3755904a218

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8838.exe

        Filesize

        307KB

        MD5

        72b746ad1dae9fb986426f9d3d085b10

        SHA1

        42a2f584b4e591c73a78ae0e915e1c60a102b916

        SHA256

        d4691c37c50ca06b07680a0a197310c4deee052268493ce421bc0466a2c6d2fb

        SHA512

        e7e8e410c1d010d0f0a651b1f9d60e16fcdbba48c1ea10ebb34719306f26ec72773f2a170c656d04a79a35b1d2f1392c7b825fee68aa6c80a20cd3755904a218

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0591.exe

        Filesize

        365KB

        MD5

        336da6bf0929f19436b41cfc71fea7f1

        SHA1

        943d219e2a58a73346661a31b6d944e63dd63eb4

        SHA256

        fd3fa3f4865e05c32d6deeb48c60f2a89d8dda50566f1f4c2beb3e2d10807d8a

        SHA512

        86c03b31040476cfd8918cc8e6810931fbd2d196befe968603013c7dbddf15478f4337deaa6dba7d5c953d1696a862756cf49dab3f1bf283cb29bcef91d07bf9

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0591.exe

        Filesize

        365KB

        MD5

        336da6bf0929f19436b41cfc71fea7f1

        SHA1

        943d219e2a58a73346661a31b6d944e63dd63eb4

        SHA256

        fd3fa3f4865e05c32d6deeb48c60f2a89d8dda50566f1f4c2beb3e2d10807d8a

        SHA512

        86c03b31040476cfd8918cc8e6810931fbd2d196befe968603013c7dbddf15478f4337deaa6dba7d5c953d1696a862756cf49dab3f1bf283cb29bcef91d07bf9

      • memory/484-1120-0x0000000000EE0000-0x0000000000F12000-memory.dmp

        Filesize

        200KB

      • memory/484-1121-0x0000000005770000-0x0000000005780000-memory.dmp

        Filesize

        64KB

      • memory/1812-159-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/1812-169-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/1812-153-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/1812-152-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/1812-155-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/1812-157-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/1812-151-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB

      • memory/1812-161-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/1812-163-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/1812-165-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/1812-167-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/1812-150-0x0000000004D90000-0x0000000005334000-memory.dmp

        Filesize

        5.6MB

      • memory/1812-171-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/1812-173-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/1812-175-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/1812-177-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/1812-179-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/1812-180-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/1812-181-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB

      • memory/1812-182-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB

      • memory/1812-184-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/1812-148-0x0000000000810000-0x000000000083D000-memory.dmp

        Filesize

        180KB

      • memory/1812-149-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB

      • memory/4320-194-0x00000000027E0000-0x000000000281F000-memory.dmp

        Filesize

        252KB

      • memory/4320-261-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/4320-196-0x00000000027E0000-0x000000000281F000-memory.dmp

        Filesize

        252KB

      • memory/4320-198-0x00000000027E0000-0x000000000281F000-memory.dmp

        Filesize

        252KB

      • memory/4320-200-0x00000000027E0000-0x000000000281F000-memory.dmp

        Filesize

        252KB

      • memory/4320-202-0x00000000027E0000-0x000000000281F000-memory.dmp

        Filesize

        252KB

      • memory/4320-204-0x00000000027E0000-0x000000000281F000-memory.dmp

        Filesize

        252KB

      • memory/4320-206-0x00000000027E0000-0x000000000281F000-memory.dmp

        Filesize

        252KB

      • memory/4320-208-0x00000000027E0000-0x000000000281F000-memory.dmp

        Filesize

        252KB

      • memory/4320-210-0x00000000027E0000-0x000000000281F000-memory.dmp

        Filesize

        252KB

      • memory/4320-212-0x00000000027E0000-0x000000000281F000-memory.dmp

        Filesize

        252KB

      • memory/4320-214-0x00000000027E0000-0x000000000281F000-memory.dmp

        Filesize

        252KB

      • memory/4320-216-0x00000000027E0000-0x000000000281F000-memory.dmp

        Filesize

        252KB

      • memory/4320-218-0x00000000027E0000-0x000000000281F000-memory.dmp

        Filesize

        252KB

      • memory/4320-220-0x00000000027E0000-0x000000000281F000-memory.dmp

        Filesize

        252KB

      • memory/4320-222-0x00000000027E0000-0x000000000281F000-memory.dmp

        Filesize

        252KB

      • memory/4320-255-0x00000000007F0000-0x000000000083B000-memory.dmp

        Filesize

        300KB

      • memory/4320-257-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/4320-259-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/4320-192-0x00000000027E0000-0x000000000281F000-memory.dmp

        Filesize

        252KB

      • memory/4320-1099-0x00000000055C0000-0x0000000005BD8000-memory.dmp

        Filesize

        6.1MB

      • memory/4320-1100-0x0000000005BE0000-0x0000000005CEA000-memory.dmp

        Filesize

        1.0MB

      • memory/4320-1101-0x0000000004D50000-0x0000000004D62000-memory.dmp

        Filesize

        72KB

      • memory/4320-1102-0x0000000004D70000-0x0000000004DAC000-memory.dmp

        Filesize

        240KB

      • memory/4320-1103-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/4320-1105-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/4320-1106-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/4320-1107-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/4320-1108-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/4320-1109-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/4320-1110-0x0000000007AD0000-0x0000000007C92000-memory.dmp

        Filesize

        1.8MB

      • memory/4320-1111-0x0000000007CA0000-0x00000000081CC000-memory.dmp

        Filesize

        5.2MB

      • memory/4320-1112-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/4320-190-0x00000000027E0000-0x000000000281F000-memory.dmp

        Filesize

        252KB

      • memory/4320-189-0x00000000027E0000-0x000000000281F000-memory.dmp

        Filesize

        252KB

      • memory/4320-1113-0x00000000022A0000-0x0000000002316000-memory.dmp

        Filesize

        472KB

      • memory/4320-1114-0x00000000082F0000-0x0000000008340000-memory.dmp

        Filesize

        320KB