Analysis

  • max time kernel
    84s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 23:02

General

  • Target

    ac45a803d8b22c9be9ff25c75e940e9e0b098793614612956bfe854b560fd750.exe

  • Size

    700KB

  • MD5

    e7050ababab3205b6407d278e309c1ea

  • SHA1

    513b6717cee4d695c9938e7077dd9e672d03401f

  • SHA256

    ac45a803d8b22c9be9ff25c75e940e9e0b098793614612956bfe854b560fd750

  • SHA512

    897d54aa74c9d1f612d8337fd5da077dbabcaa90583e25f275b2d461ceef20a486577c6dab568457521846a9815c7ea0e0b6184b9203c03ebcfdedc44521320e

  • SSDEEP

    12288:UMrUy90FSkZAjyIMoPISg9DAqcASNBqc5tTQp+D4xu60GO1/n3:wyHj5MS4SqS5ZD4Qxv

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac45a803d8b22c9be9ff25c75e940e9e0b098793614612956bfe854b560fd750.exe
    "C:\Users\Admin\AppData\Local\Temp\ac45a803d8b22c9be9ff25c75e940e9e0b098793614612956bfe854b560fd750.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4628
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un564071.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un564071.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3352
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3152.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3152.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4204
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4204 -s 1096
          4⤵
          • Program crash
          PID:4500
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5451.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5451.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4456
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4456 -s 1352
          4⤵
          • Program crash
          PID:1564
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si580046.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si580046.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:652
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4204 -ip 4204
    1⤵
      PID:4184
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4456 -ip 4456
      1⤵
        PID:1284

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si580046.exe

        Filesize

        175KB

        MD5

        b5f3efdd032cb6b704a15bd7c5c26689

        SHA1

        0876b95132aaca06f1384ffb85276996cc7a7db4

        SHA256

        58f3eea0e6e64763fac7db1cf881cc9db87925439c9cf714748b469443e388e2

        SHA512

        f43604b1d0b5665576344b65e60e60aed454ff7fd89f39d3d531e85bf0a1a01ede5c57c8d5d6265699cc6ff023a858f7212472383c29f382cc02e7b3efe2db08

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si580046.exe

        Filesize

        175KB

        MD5

        b5f3efdd032cb6b704a15bd7c5c26689

        SHA1

        0876b95132aaca06f1384ffb85276996cc7a7db4

        SHA256

        58f3eea0e6e64763fac7db1cf881cc9db87925439c9cf714748b469443e388e2

        SHA512

        f43604b1d0b5665576344b65e60e60aed454ff7fd89f39d3d531e85bf0a1a01ede5c57c8d5d6265699cc6ff023a858f7212472383c29f382cc02e7b3efe2db08

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un564071.exe

        Filesize

        558KB

        MD5

        d50e52f6439b11a2236d43f14fe6a417

        SHA1

        f76c901e34e2d4cff0ba8e61d4160e5710a8bb45

        SHA256

        29cad6fee9983e16de00650960b68a26f7e0b4fc752e3ae8b516b93a71f5df8e

        SHA512

        be43669b415bcd67714dffe1263867ff684594b557ed0d95ddbd69d6a8bf19ef269329581497e4aad155c48bee8f372207460e275edfab317d10157d353c2625

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un564071.exe

        Filesize

        558KB

        MD5

        d50e52f6439b11a2236d43f14fe6a417

        SHA1

        f76c901e34e2d4cff0ba8e61d4160e5710a8bb45

        SHA256

        29cad6fee9983e16de00650960b68a26f7e0b4fc752e3ae8b516b93a71f5df8e

        SHA512

        be43669b415bcd67714dffe1263867ff684594b557ed0d95ddbd69d6a8bf19ef269329581497e4aad155c48bee8f372207460e275edfab317d10157d353c2625

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3152.exe

        Filesize

        307KB

        MD5

        d538ad1ba7fa676211f75351cac298e7

        SHA1

        4bb364ebaeca6eea197dab7b116925140cb8defc

        SHA256

        6ad29609781401afe1f4d22ff8d801c17470d97aacc70dc2fe51d31f8b14abeb

        SHA512

        35a52f350c985faa77ee6d7083f321a5631a248c2efaf232c95d5dfe622552bb831e7bb6925a39b806ec9496a680d339e9f97740467b47ed10d2c027a5a719cc

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3152.exe

        Filesize

        307KB

        MD5

        d538ad1ba7fa676211f75351cac298e7

        SHA1

        4bb364ebaeca6eea197dab7b116925140cb8defc

        SHA256

        6ad29609781401afe1f4d22ff8d801c17470d97aacc70dc2fe51d31f8b14abeb

        SHA512

        35a52f350c985faa77ee6d7083f321a5631a248c2efaf232c95d5dfe622552bb831e7bb6925a39b806ec9496a680d339e9f97740467b47ed10d2c027a5a719cc

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5451.exe

        Filesize

        365KB

        MD5

        78779a47a3166450d9c032ed0e748c31

        SHA1

        7dae8f5e2cb198c3cb78c28a7241f8109f9b5cb4

        SHA256

        86d2027f7062cf6d720e50e7265e0773fa121d7725d5b9d8ec21b6c0f90f46e9

        SHA512

        dc7e79a87f23ace0a3825aa5088250f94b6bf363b8e537ccae9a5278d05d7d7fe7af8518f593e6bff15267ea79ec75e3d5df7c02ce7ae96875d8e971564af9ba

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5451.exe

        Filesize

        365KB

        MD5

        78779a47a3166450d9c032ed0e748c31

        SHA1

        7dae8f5e2cb198c3cb78c28a7241f8109f9b5cb4

        SHA256

        86d2027f7062cf6d720e50e7265e0773fa121d7725d5b9d8ec21b6c0f90f46e9

        SHA512

        dc7e79a87f23ace0a3825aa5088250f94b6bf363b8e537ccae9a5278d05d7d7fe7af8518f593e6bff15267ea79ec75e3d5df7c02ce7ae96875d8e971564af9ba

      • memory/652-1120-0x0000000000CD0000-0x0000000000D02000-memory.dmp

        Filesize

        200KB

      • memory/652-1121-0x00000000055B0000-0x00000000055C0000-memory.dmp

        Filesize

        64KB

      • memory/4204-156-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/4204-166-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/4204-152-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/4204-151-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/4204-153-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/4204-154-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/4204-149-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/4204-158-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/4204-160-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/4204-162-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/4204-164-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/4204-150-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/4204-168-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/4204-170-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/4204-172-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/4204-174-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/4204-176-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/4204-178-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/4204-180-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/4204-181-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/4204-182-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/4204-183-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/4204-185-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/4204-148-0x0000000004F50000-0x00000000054F4000-memory.dmp

        Filesize

        5.6MB

      • memory/4456-191-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4456-222-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4456-197-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4456-195-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4456-199-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4456-201-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4456-203-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4456-205-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4456-208-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/4456-209-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4456-210-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/4456-206-0x0000000000720000-0x000000000076B000-memory.dmp

        Filesize

        300KB

      • memory/4456-212-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4456-214-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4456-216-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4456-218-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4456-220-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4456-193-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4456-224-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4456-226-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4456-1099-0x00000000053D0000-0x00000000059E8000-memory.dmp

        Filesize

        6.1MB

      • memory/4456-1100-0x00000000059F0000-0x0000000005AFA000-memory.dmp

        Filesize

        1.0MB

      • memory/4456-1101-0x0000000005B00000-0x0000000005B12000-memory.dmp

        Filesize

        72KB

      • memory/4456-1102-0x0000000005B20000-0x0000000005B5C000-memory.dmp

        Filesize

        240KB

      • memory/4456-1103-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/4456-1104-0x0000000005E10000-0x0000000005EA2000-memory.dmp

        Filesize

        584KB

      • memory/4456-1105-0x0000000005EB0000-0x0000000005F16000-memory.dmp

        Filesize

        408KB

      • memory/4456-1107-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/4456-1108-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/4456-1109-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/4456-1110-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/4456-1111-0x0000000007940000-0x0000000007B02000-memory.dmp

        Filesize

        1.8MB

      • memory/4456-190-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/4456-1112-0x0000000007B10000-0x000000000803C000-memory.dmp

        Filesize

        5.2MB

      • memory/4456-1113-0x0000000006600000-0x0000000006676000-memory.dmp

        Filesize

        472KB

      • memory/4456-1114-0x0000000006680000-0x00000000066D0000-memory.dmp

        Filesize

        320KB