Analysis

  • max time kernel
    52s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 22:59

General

  • Target

    65beeffbab42394c72bba46bc2f9b2e072793e1c059aec5a222f3b7968183b2a.exe

  • Size

    700KB

  • MD5

    0fa69235664dc018f0fb9de085fccfe8

  • SHA1

    b611020e7d63b9d62092e30a6384ea312b7be335

  • SHA256

    65beeffbab42394c72bba46bc2f9b2e072793e1c059aec5a222f3b7968183b2a

  • SHA512

    426cf0239c706a5dec336002f8103a646c912c794662c4122d8926d12a27bfa656e53179801bdb5cd486206502c93701d60f71e8c550e712afda7c57970dd781

  • SSDEEP

    12288:XMrZy903RhyBsV6rS3kPC9DMVcAmPurcOF4Bu/fB97OiVs+WsCyRPtyFAd:yywsBm6rS3cPmPurcOqyfBls+WsCl2

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\65beeffbab42394c72bba46bc2f9b2e072793e1c059aec5a222f3b7968183b2a.exe
    "C:\Users\Admin\AppData\Local\Temp\65beeffbab42394c72bba46bc2f9b2e072793e1c059aec5a222f3b7968183b2a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un846457.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un846457.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4712
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1584.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1584.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4668
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4668 -s 1080
          4⤵
          • Program crash
          PID:412
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8593.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8593.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3544
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3544 -s 1328
          4⤵
          • Program crash
          PID:1120
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si873859.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si873859.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4640
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4668 -ip 4668
    1⤵
      PID:4980
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3544 -ip 3544
      1⤵
        PID:1156

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si873859.exe

        Filesize

        175KB

        MD5

        549589c884c90615cfc723f0684a3d70

        SHA1

        22afb7d064646f51b91d6c5b055ab4868725aa79

        SHA256

        af28804ba078053c5360a95c5b3e653a967193c634524fcaa0688139bebd0d89

        SHA512

        bb2fbe0158d3880b508d8e3fc464d68c78a95ac96a83242f79c5d5b1d493acb3b380bedb6762e15dca361987d8c26c2d2e4b604febc476bd82e549201b270a18

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si873859.exe

        Filesize

        175KB

        MD5

        549589c884c90615cfc723f0684a3d70

        SHA1

        22afb7d064646f51b91d6c5b055ab4868725aa79

        SHA256

        af28804ba078053c5360a95c5b3e653a967193c634524fcaa0688139bebd0d89

        SHA512

        bb2fbe0158d3880b508d8e3fc464d68c78a95ac96a83242f79c5d5b1d493acb3b380bedb6762e15dca361987d8c26c2d2e4b604febc476bd82e549201b270a18

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un846457.exe

        Filesize

        558KB

        MD5

        7b4345f3b4af6dd3a8c9c222831b795a

        SHA1

        d99d081c6ceaeea086687dbc6a95b7aabdea43f9

        SHA256

        0dd72dd64f539eff1d6210a32e03e35f78c1902a397dd571c3dfb1f205e33d3d

        SHA512

        6060b298b01fcee0599908a4e04b78755826e7c8e9e8e8ca204ef6418c41c8969b75472b6346b6aa3e62b38bad5aee790e8d002bf3f5bb5c1f816e23a41d6f02

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un846457.exe

        Filesize

        558KB

        MD5

        7b4345f3b4af6dd3a8c9c222831b795a

        SHA1

        d99d081c6ceaeea086687dbc6a95b7aabdea43f9

        SHA256

        0dd72dd64f539eff1d6210a32e03e35f78c1902a397dd571c3dfb1f205e33d3d

        SHA512

        6060b298b01fcee0599908a4e04b78755826e7c8e9e8e8ca204ef6418c41c8969b75472b6346b6aa3e62b38bad5aee790e8d002bf3f5bb5c1f816e23a41d6f02

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1584.exe

        Filesize

        307KB

        MD5

        df512ea43191b08e4113893eadee4084

        SHA1

        4d1a60f7ced20338940fa5bbf7123b88f9c3f1bb

        SHA256

        51886fd383be05d2327d0201d389ecf342842e8d2cf829859eabee4f03b12bc6

        SHA512

        83c9be78a628ec84305546a45352f9e7b1eb98b7e7887c4cbc95330a197851a16dcb297bdc759b90b36c1d8af9f4a15ebefa1a4a20219e9028bf8d765bc797f1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1584.exe

        Filesize

        307KB

        MD5

        df512ea43191b08e4113893eadee4084

        SHA1

        4d1a60f7ced20338940fa5bbf7123b88f9c3f1bb

        SHA256

        51886fd383be05d2327d0201d389ecf342842e8d2cf829859eabee4f03b12bc6

        SHA512

        83c9be78a628ec84305546a45352f9e7b1eb98b7e7887c4cbc95330a197851a16dcb297bdc759b90b36c1d8af9f4a15ebefa1a4a20219e9028bf8d765bc797f1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8593.exe

        Filesize

        365KB

        MD5

        32e37c440937d09d8bbb1856e1a2693a

        SHA1

        21d8fa7c66aa8163d341364139af813791eb95bf

        SHA256

        6d121ffa0f4b6f654676f2eac689ac2f80fdb77c00591d6ff37908196da17791

        SHA512

        6097811e84f45f17841247e17d582c17671c9e050fe9145c35bbea776ad6fb2de1254748cb43fefda2d4883d58b138d1917630788b045a044b6d01767db6581b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8593.exe

        Filesize

        365KB

        MD5

        32e37c440937d09d8bbb1856e1a2693a

        SHA1

        21d8fa7c66aa8163d341364139af813791eb95bf

        SHA256

        6d121ffa0f4b6f654676f2eac689ac2f80fdb77c00591d6ff37908196da17791

        SHA512

        6097811e84f45f17841247e17d582c17671c9e050fe9145c35bbea776ad6fb2de1254748cb43fefda2d4883d58b138d1917630788b045a044b6d01767db6581b

      • memory/3544-414-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

        Filesize

        64KB

      • memory/3544-1102-0x0000000005B00000-0x0000000005B12000-memory.dmp

        Filesize

        72KB

      • memory/3544-1115-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

        Filesize

        64KB

      • memory/3544-1114-0x0000000006990000-0x0000000006EBC000-memory.dmp

        Filesize

        5.2MB

      • memory/3544-1113-0x00000000067B0000-0x0000000006972000-memory.dmp

        Filesize

        1.8MB

      • memory/3544-1112-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

        Filesize

        64KB

      • memory/3544-1111-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

        Filesize

        64KB

      • memory/3544-1110-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

        Filesize

        64KB

      • memory/3544-1109-0x0000000006640000-0x0000000006690000-memory.dmp

        Filesize

        320KB

      • memory/3544-1108-0x00000000065B0000-0x0000000006626000-memory.dmp

        Filesize

        472KB

      • memory/3544-1107-0x00000000064D0000-0x0000000006562000-memory.dmp

        Filesize

        584KB

      • memory/3544-1106-0x0000000005E10000-0x0000000005E76000-memory.dmp

        Filesize

        408KB

      • memory/3544-1104-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

        Filesize

        64KB

      • memory/3544-1103-0x0000000005B20000-0x0000000005B5C000-memory.dmp

        Filesize

        240KB

      • memory/3544-1101-0x00000000059F0000-0x0000000005AFA000-memory.dmp

        Filesize

        1.0MB

      • memory/3544-1100-0x0000000005390000-0x00000000059A8000-memory.dmp

        Filesize

        6.1MB

      • memory/3544-411-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

        Filesize

        64KB

      • memory/3544-412-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

        Filesize

        64KB

      • memory/3544-409-0x0000000000840000-0x000000000088B000-memory.dmp

        Filesize

        300KB

      • memory/3544-223-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/3544-221-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/3544-219-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/3544-190-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/3544-191-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/3544-193-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/3544-195-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/3544-197-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/3544-199-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/3544-201-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/3544-203-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/3544-205-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/3544-207-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/3544-209-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/3544-211-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/3544-213-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/3544-215-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/3544-217-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/4640-1121-0x0000000000520000-0x0000000000552000-memory.dmp

        Filesize

        200KB

      • memory/4640-1122-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/4668-173-0x00000000027B0000-0x00000000027C2000-memory.dmp

        Filesize

        72KB

      • memory/4668-148-0x0000000005030000-0x00000000055D4000-memory.dmp

        Filesize

        5.6MB

      • memory/4668-182-0x0000000005020000-0x0000000005030000-memory.dmp

        Filesize

        64KB

      • memory/4668-181-0x0000000005020000-0x0000000005030000-memory.dmp

        Filesize

        64KB

      • memory/4668-151-0x0000000005020000-0x0000000005030000-memory.dmp

        Filesize

        64KB

      • memory/4668-180-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/4668-179-0x00000000027B0000-0x00000000027C2000-memory.dmp

        Filesize

        72KB

      • memory/4668-153-0x00000000027B0000-0x00000000027C2000-memory.dmp

        Filesize

        72KB

      • memory/4668-177-0x00000000027B0000-0x00000000027C2000-memory.dmp

        Filesize

        72KB

      • memory/4668-175-0x00000000027B0000-0x00000000027C2000-memory.dmp

        Filesize

        72KB

      • memory/4668-152-0x00000000027B0000-0x00000000027C2000-memory.dmp

        Filesize

        72KB

      • memory/4668-183-0x0000000005020000-0x0000000005030000-memory.dmp

        Filesize

        64KB

      • memory/4668-165-0x00000000027B0000-0x00000000027C2000-memory.dmp

        Filesize

        72KB

      • memory/4668-167-0x00000000027B0000-0x00000000027C2000-memory.dmp

        Filesize

        72KB

      • memory/4668-169-0x00000000027B0000-0x00000000027C2000-memory.dmp

        Filesize

        72KB

      • memory/4668-163-0x00000000027B0000-0x00000000027C2000-memory.dmp

        Filesize

        72KB

      • memory/4668-161-0x00000000027B0000-0x00000000027C2000-memory.dmp

        Filesize

        72KB

      • memory/4668-159-0x00000000027B0000-0x00000000027C2000-memory.dmp

        Filesize

        72KB

      • memory/4668-157-0x00000000027B0000-0x00000000027C2000-memory.dmp

        Filesize

        72KB

      • memory/4668-155-0x00000000027B0000-0x00000000027C2000-memory.dmp

        Filesize

        72KB

      • memory/4668-149-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/4668-171-0x00000000027B0000-0x00000000027C2000-memory.dmp

        Filesize

        72KB

      • memory/4668-185-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/4668-150-0x0000000005020000-0x0000000005030000-memory.dmp

        Filesize

        64KB