Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 23:58

General

  • Target

    f007fee9e103ef2c83b63baf9b715740ca374f0c583a981337ba260fd7bbc306.exe

  • Size

    699KB

  • MD5

    cb6a503a0a6de571ef7667065e34396e

  • SHA1

    73da3a7cf1114ceb40a3cb087e9fccbe815aabf1

  • SHA256

    f007fee9e103ef2c83b63baf9b715740ca374f0c583a981337ba260fd7bbc306

  • SHA512

    08e1b617d9f02cda38e5f5eb20f602af266f32ae79eec80479c24d241f785a7eda0248ee420676566464be7f145c44bba35ff0352a6ed6a267fa1ca44723be05

  • SSDEEP

    12288:7Mr5y90djFA1qkl3Uwe9GeJ8aftpJa375O9nj7K6e7zDghWqwM:SyIHlwVeJ8CK3F2HK6efDgh1l

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f007fee9e103ef2c83b63baf9b715740ca374f0c583a981337ba260fd7bbc306.exe
    "C:\Users\Admin\AppData\Local\Temp\f007fee9e103ef2c83b63baf9b715740ca374f0c583a981337ba260fd7bbc306.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4508
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un875426.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un875426.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4440
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4632.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4632.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3276
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3276 -s 1080
          4⤵
          • Program crash
          PID:208
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1668.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1668.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4148
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4148 -s 1472
          4⤵
          • Program crash
          PID:1004
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si011438.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si011438.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1136
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3276 -ip 3276
    1⤵
      PID:2964
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4148 -ip 4148
      1⤵
        PID:4548

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si011438.exe

        Filesize

        175KB

        MD5

        dcf5dc97180bd166926e9a6a23735431

        SHA1

        9f4e9cd6afd8ff213b680f8c36eec663a5d57655

        SHA256

        3513058b1ea5b740d1932fa6b65a483ce0ae4c09f6be136694d083d14d54cc68

        SHA512

        cd263301de5c68536b8b0e8f2fc8e06e07811b4a81f8893177257045dd9500374a9ad8bd47a6160b71d5992517cfefe192935260f6ddd4fec7ea77ddba734552

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si011438.exe

        Filesize

        175KB

        MD5

        dcf5dc97180bd166926e9a6a23735431

        SHA1

        9f4e9cd6afd8ff213b680f8c36eec663a5d57655

        SHA256

        3513058b1ea5b740d1932fa6b65a483ce0ae4c09f6be136694d083d14d54cc68

        SHA512

        cd263301de5c68536b8b0e8f2fc8e06e07811b4a81f8893177257045dd9500374a9ad8bd47a6160b71d5992517cfefe192935260f6ddd4fec7ea77ddba734552

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un875426.exe

        Filesize

        557KB

        MD5

        b15b0ce90a3e3110c7ed2fff2608e6e6

        SHA1

        abf50a2085af5595a6c3fbb7309e07d55c0bbe67

        SHA256

        15046ff8f094095aa5ca8d5a7e1b5e20dcd5b87e5c72d46788e13a73e0158ea1

        SHA512

        44ff7d5af0504953c5ced37ef1b765f9f0c0834f8565d411f2685e1788f46dae154859e8ba29cc53da8c993f90a8fa8244e0efe8074171e0a86e2d242af061fa

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un875426.exe

        Filesize

        557KB

        MD5

        b15b0ce90a3e3110c7ed2fff2608e6e6

        SHA1

        abf50a2085af5595a6c3fbb7309e07d55c0bbe67

        SHA256

        15046ff8f094095aa5ca8d5a7e1b5e20dcd5b87e5c72d46788e13a73e0158ea1

        SHA512

        44ff7d5af0504953c5ced37ef1b765f9f0c0834f8565d411f2685e1788f46dae154859e8ba29cc53da8c993f90a8fa8244e0efe8074171e0a86e2d242af061fa

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4632.exe

        Filesize

        307KB

        MD5

        a16c30086f65033eeaf9e83b9d901d6c

        SHA1

        cee064fea24f75eaa065b52182b6bf1afc0fa3e1

        SHA256

        ba6b32d6107f4e683becdc89ac3f1138c07e7efa48377b215c42026b88f54b78

        SHA512

        49ad79b2d2da81bf51e7c0765b532cdc185540f1d32065e57d0bffaa2a628778313120af093b453194a88aaea5ea002b3934ef3fd2a3426c144db37ab11eb96b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4632.exe

        Filesize

        307KB

        MD5

        a16c30086f65033eeaf9e83b9d901d6c

        SHA1

        cee064fea24f75eaa065b52182b6bf1afc0fa3e1

        SHA256

        ba6b32d6107f4e683becdc89ac3f1138c07e7efa48377b215c42026b88f54b78

        SHA512

        49ad79b2d2da81bf51e7c0765b532cdc185540f1d32065e57d0bffaa2a628778313120af093b453194a88aaea5ea002b3934ef3fd2a3426c144db37ab11eb96b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1668.exe

        Filesize

        365KB

        MD5

        a6e5cbfd54f04bc73be412ea608e9a04

        SHA1

        b39cf6b122469eeef5b8470b9ece84f8651e05c9

        SHA256

        9bd4f2bc71b5d9101db5a60594defbc92bbd0897a469b5314199bc8481a00c2f

        SHA512

        bc57f578d480b3faaee6bf29439aa64d79f7ab8a311b20db201c9fe56f0b224f0356c24a704f161f146458e234a0056efddebaf7dfee8aa70a1adadf1de7e38b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1668.exe

        Filesize

        365KB

        MD5

        a6e5cbfd54f04bc73be412ea608e9a04

        SHA1

        b39cf6b122469eeef5b8470b9ece84f8651e05c9

        SHA256

        9bd4f2bc71b5d9101db5a60594defbc92bbd0897a469b5314199bc8481a00c2f

        SHA512

        bc57f578d480b3faaee6bf29439aa64d79f7ab8a311b20db201c9fe56f0b224f0356c24a704f161f146458e234a0056efddebaf7dfee8aa70a1adadf1de7e38b

      • memory/1136-1122-0x0000000000B90000-0x0000000000BC2000-memory.dmp

        Filesize

        200KB

      • memory/1136-1123-0x00000000055C0000-0x00000000055D0000-memory.dmp

        Filesize

        64KB

      • memory/1136-1124-0x00000000055C0000-0x00000000055D0000-memory.dmp

        Filesize

        64KB

      • memory/3276-162-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/3276-172-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/3276-151-0x0000000004F00000-0x0000000004F10000-memory.dmp

        Filesize

        64KB

      • memory/3276-154-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/3276-153-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/3276-156-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/3276-158-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/3276-150-0x0000000004F00000-0x0000000004F10000-memory.dmp

        Filesize

        64KB

      • memory/3276-160-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/3276-164-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/3276-166-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/3276-168-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/3276-170-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/3276-152-0x0000000004F00000-0x0000000004F10000-memory.dmp

        Filesize

        64KB

      • memory/3276-174-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/3276-176-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/3276-178-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/3276-180-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/3276-181-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/3276-182-0x0000000004F00000-0x0000000004F10000-memory.dmp

        Filesize

        64KB

      • memory/3276-183-0x0000000004F00000-0x0000000004F10000-memory.dmp

        Filesize

        64KB

      • memory/3276-184-0x0000000004F00000-0x0000000004F10000-memory.dmp

        Filesize

        64KB

      • memory/3276-186-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/3276-149-0x0000000000730000-0x000000000075D000-memory.dmp

        Filesize

        180KB

      • memory/3276-148-0x0000000004F10000-0x00000000054B4000-memory.dmp

        Filesize

        5.6MB

      • memory/4148-194-0x0000000002970000-0x00000000029AF000-memory.dmp

        Filesize

        252KB

      • memory/4148-333-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/4148-198-0x0000000002970000-0x00000000029AF000-memory.dmp

        Filesize

        252KB

      • memory/4148-200-0x0000000002970000-0x00000000029AF000-memory.dmp

        Filesize

        252KB

      • memory/4148-202-0x0000000002970000-0x00000000029AF000-memory.dmp

        Filesize

        252KB

      • memory/4148-204-0x0000000002970000-0x00000000029AF000-memory.dmp

        Filesize

        252KB

      • memory/4148-206-0x0000000002970000-0x00000000029AF000-memory.dmp

        Filesize

        252KB

      • memory/4148-208-0x0000000002970000-0x00000000029AF000-memory.dmp

        Filesize

        252KB

      • memory/4148-210-0x0000000002970000-0x00000000029AF000-memory.dmp

        Filesize

        252KB

      • memory/4148-212-0x0000000002970000-0x00000000029AF000-memory.dmp

        Filesize

        252KB

      • memory/4148-214-0x0000000002970000-0x00000000029AF000-memory.dmp

        Filesize

        252KB

      • memory/4148-216-0x0000000002970000-0x00000000029AF000-memory.dmp

        Filesize

        252KB

      • memory/4148-218-0x0000000002970000-0x00000000029AF000-memory.dmp

        Filesize

        252KB

      • memory/4148-220-0x0000000002970000-0x00000000029AF000-memory.dmp

        Filesize

        252KB

      • memory/4148-222-0x0000000002970000-0x00000000029AF000-memory.dmp

        Filesize

        252KB

      • memory/4148-224-0x0000000002970000-0x00000000029AF000-memory.dmp

        Filesize

        252KB

      • memory/4148-329-0x00000000007F0000-0x000000000083B000-memory.dmp

        Filesize

        300KB

      • memory/4148-331-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/4148-335-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/4148-196-0x0000000002970000-0x00000000029AF000-memory.dmp

        Filesize

        252KB

      • memory/4148-1101-0x0000000005530000-0x0000000005B48000-memory.dmp

        Filesize

        6.1MB

      • memory/4148-1102-0x0000000005B50000-0x0000000005C5A000-memory.dmp

        Filesize

        1.0MB

      • memory/4148-1103-0x0000000004E50000-0x0000000004E62000-memory.dmp

        Filesize

        72KB

      • memory/4148-1104-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/4148-1105-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/4148-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/4148-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/4148-1109-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/4148-1110-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/4148-1111-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/4148-1112-0x00000000079C0000-0x0000000007B82000-memory.dmp

        Filesize

        1.8MB

      • memory/4148-1113-0x0000000007BA0000-0x00000000080CC000-memory.dmp

        Filesize

        5.2MB

      • memory/4148-192-0x0000000002970000-0x00000000029AF000-memory.dmp

        Filesize

        252KB

      • memory/4148-191-0x0000000002970000-0x00000000029AF000-memory.dmp

        Filesize

        252KB

      • memory/4148-1114-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/4148-1115-0x00000000083F0000-0x0000000008466000-memory.dmp

        Filesize

        472KB

      • memory/4148-1116-0x0000000008470000-0x00000000084C0000-memory.dmp

        Filesize

        320KB