Analysis

  • max time kernel
    53s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 23:01

General

  • Target

    afbd8bade4aa62ab02d68ac503a3cbc1.exe

  • Size

    699KB

  • MD5

    afbd8bade4aa62ab02d68ac503a3cbc1

  • SHA1

    6e6d97c0d5dc3489672d9b63447546f88b7997ef

  • SHA256

    d379a37f5c5c7b2da42166112a10412268ed904ffd5f585106cd3462c332bf74

  • SHA512

    7bb0e671fbd25c4ad7f288e9fa0834135da774612d6141926ad06d2981188b08cefe2ffb7e866a400fdbf5926d3e03cf7ae4f837da5bdc5e733be5973c499f15

  • SSDEEP

    12288:rMrfy90OechFFHorvzKdADDAjlMyAaNvj50uDmj7LBq9zjNK:cyj1h8rvu+DDKlMyT50SmHLBq9zjo

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\afbd8bade4aa62ab02d68ac503a3cbc1.exe
    "C:\Users\Admin\AppData\Local\Temp\afbd8bade4aa62ab02d68ac503a3cbc1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4608
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un129736.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un129736.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3208
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5063.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5063.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2844
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 1080
          4⤵
          • Program crash
          PID:2384
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7179.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7179.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1208
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1208 -s 1468
          4⤵
          • Program crash
          PID:1072
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si475150.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si475150.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5088
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2844 -ip 2844
    1⤵
      PID:3816
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1208 -ip 1208
      1⤵
        PID:3380

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si475150.exe

        Filesize

        175KB

        MD5

        d007bccc25f4a58e330bd16abd297ca0

        SHA1

        0a862ff17a9d14cadd2c9463cef03dd21905493f

        SHA256

        3e988c7cf3143d2898fe2b372b162394f4da7dca7b84f9b82735a7f3d7c8e7e8

        SHA512

        8344d760154f6e708995224440037288342bae58f62e2979b54b1bce3291c0ea8c43bba640e4459e08b98c10bb90b3149886226324b63d560da362c242e1dfbc

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si475150.exe

        Filesize

        175KB

        MD5

        d007bccc25f4a58e330bd16abd297ca0

        SHA1

        0a862ff17a9d14cadd2c9463cef03dd21905493f

        SHA256

        3e988c7cf3143d2898fe2b372b162394f4da7dca7b84f9b82735a7f3d7c8e7e8

        SHA512

        8344d760154f6e708995224440037288342bae58f62e2979b54b1bce3291c0ea8c43bba640e4459e08b98c10bb90b3149886226324b63d560da362c242e1dfbc

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un129736.exe

        Filesize

        558KB

        MD5

        f0abb96e9d9f7f178cce8e392450585f

        SHA1

        e1828eed12849d273934157f2122403f01d49b8f

        SHA256

        ebae6c7413305be55dfc15f2835befeebb4d4711638f3104b5428b5cc1b90bcc

        SHA512

        e4101b6de1df10b23cd04b49d60c69d90e7fea540ba2888a903807066ad5750948d711ea3b3e418c756de8f0ca7918b61ba94a1fbe210ca3d9fa03033893705c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un129736.exe

        Filesize

        558KB

        MD5

        f0abb96e9d9f7f178cce8e392450585f

        SHA1

        e1828eed12849d273934157f2122403f01d49b8f

        SHA256

        ebae6c7413305be55dfc15f2835befeebb4d4711638f3104b5428b5cc1b90bcc

        SHA512

        e4101b6de1df10b23cd04b49d60c69d90e7fea540ba2888a903807066ad5750948d711ea3b3e418c756de8f0ca7918b61ba94a1fbe210ca3d9fa03033893705c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5063.exe

        Filesize

        307KB

        MD5

        38789be6104c691293e54b76d78dd109

        SHA1

        53eaae27efa3e9f31eaf0bfa0b08125489eae4f0

        SHA256

        57345e5f520f0d8a3330a4c4e728e618ac9350572d0cdd5a64041814e37bbe51

        SHA512

        1494daa255dbdaa1b7f057b8f7b53ad470d8aaf9dc69065504df4ed079f199d786a237a317d6f8d846265331f4d6305e338b67542a55621e925b365a4d5b6c51

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5063.exe

        Filesize

        307KB

        MD5

        38789be6104c691293e54b76d78dd109

        SHA1

        53eaae27efa3e9f31eaf0bfa0b08125489eae4f0

        SHA256

        57345e5f520f0d8a3330a4c4e728e618ac9350572d0cdd5a64041814e37bbe51

        SHA512

        1494daa255dbdaa1b7f057b8f7b53ad470d8aaf9dc69065504df4ed079f199d786a237a317d6f8d846265331f4d6305e338b67542a55621e925b365a4d5b6c51

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7179.exe

        Filesize

        365KB

        MD5

        11af4e2c3b213ab8ff3b0a92979a1eb9

        SHA1

        2b44ace042700298f273c8cf4587b6630c8251b5

        SHA256

        90b1db929ff18f8e4e3af58658b849242320ad23e0fe04aea7c4b57153a18497

        SHA512

        4545668571fef1188e9fea27a9ec919de20979dec0dacfe9565505122c99e17954c3b000f364cee117d735f0d0a4479b50a0f38a65ee998c8c8756de3c1587c4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7179.exe

        Filesize

        365KB

        MD5

        11af4e2c3b213ab8ff3b0a92979a1eb9

        SHA1

        2b44ace042700298f273c8cf4587b6630c8251b5

        SHA256

        90b1db929ff18f8e4e3af58658b849242320ad23e0fe04aea7c4b57153a18497

        SHA512

        4545668571fef1188e9fea27a9ec919de20979dec0dacfe9565505122c99e17954c3b000f364cee117d735f0d0a4479b50a0f38a65ee998c8c8756de3c1587c4

      • memory/1208-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/1208-226-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/1208-200-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/1208-202-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/1208-1115-0x0000000006930000-0x0000000006AF2000-memory.dmp

        Filesize

        1.8MB

      • memory/1208-1114-0x0000000004D50000-0x0000000004D60000-memory.dmp

        Filesize

        64KB

      • memory/1208-1113-0x00000000067A0000-0x00000000067F0000-memory.dmp

        Filesize

        320KB

      • memory/1208-1112-0x0000000006710000-0x0000000006786000-memory.dmp

        Filesize

        472KB

      • memory/1208-1111-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/1208-1110-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/1208-204-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/1208-1109-0x0000000004D50000-0x0000000004D60000-memory.dmp

        Filesize

        64KB

      • memory/1208-1107-0x0000000004D50000-0x0000000004D60000-memory.dmp

        Filesize

        64KB

      • memory/1208-1108-0x0000000004D50000-0x0000000004D60000-memory.dmp

        Filesize

        64KB

      • memory/1208-1105-0x0000000004D50000-0x0000000004D60000-memory.dmp

        Filesize

        64KB

      • memory/1208-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/1208-1103-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/1208-1101-0x0000000005460000-0x0000000005A78000-memory.dmp

        Filesize

        6.1MB

      • memory/1208-228-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/1208-214-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/1208-224-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/1208-222-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/1208-220-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/1208-191-0x00000000007F0000-0x000000000083B000-memory.dmp

        Filesize

        300KB

      • memory/1208-193-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/1208-195-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/1208-196-0x0000000004D50000-0x0000000004D60000-memory.dmp

        Filesize

        64KB

      • memory/1208-198-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/1208-194-0x0000000004D50000-0x0000000004D60000-memory.dmp

        Filesize

        64KB

      • memory/1208-192-0x0000000004D50000-0x0000000004D60000-memory.dmp

        Filesize

        64KB

      • memory/1208-218-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/1208-1116-0x0000000006B00000-0x000000000702C000-memory.dmp

        Filesize

        5.2MB

      • memory/1208-216-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/1208-206-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/1208-208-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/1208-210-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/1208-212-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/2844-181-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/2844-170-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2844-148-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/2844-151-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB

      • memory/2844-152-0x0000000004D90000-0x0000000005334000-memory.dmp

        Filesize

        5.6MB

      • memory/2844-186-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/2844-184-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB

      • memory/2844-183-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB

      • memory/2844-182-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB

      • memory/2844-150-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB

      • memory/2844-153-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2844-180-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2844-178-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2844-176-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2844-174-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2844-172-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2844-168-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2844-166-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2844-164-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2844-162-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2844-160-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2844-158-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2844-156-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2844-149-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB

      • memory/2844-154-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/5088-1122-0x0000000000620000-0x0000000000652000-memory.dmp

        Filesize

        200KB

      • memory/5088-1123-0x0000000005240000-0x0000000005250000-memory.dmp

        Filesize

        64KB