Analysis

  • max time kernel
    132s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 23:20

General

  • Target

    180b863bed463f6ded8005b62cf5ac47160900a459d5f17f8679ab4420f20a94.exe

  • Size

    699KB

  • MD5

    921e0f499baf342f949d560cd110ed14

  • SHA1

    b888f33368eec030d50d79054410874706bbdb77

  • SHA256

    180b863bed463f6ded8005b62cf5ac47160900a459d5f17f8679ab4420f20a94

  • SHA512

    63df60d01b114ce52c297e8ccdc8498b9e1dded0a28619b8ed64919dbcf3599572a30f2c3f5f6ecbb8de959250b5c02da2c35274c65d6cf6b6ad8f3d4c1f2846

  • SSDEEP

    12288:SMrfy908V3OYY429D/JcAEMNZJrGSpg1Icj73YN7qEupAH:Ny3dbY1b1a1IcH3YlJXH

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\180b863bed463f6ded8005b62cf5ac47160900a459d5f17f8679ab4420f20a94.exe
    "C:\Users\Admin\AppData\Local\Temp\180b863bed463f6ded8005b62cf5ac47160900a459d5f17f8679ab4420f20a94.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4656
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un615505.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un615505.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0097.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0097.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4300
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4300 -s 1084
          4⤵
          • Program crash
          PID:4004
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0295.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0295.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4632
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4632 -s 1328
          4⤵
          • Program crash
          PID:2148
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si361521.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si361521.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4196
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4300 -ip 4300
    1⤵
      PID:1976
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4632 -ip 4632
      1⤵
        PID:1540
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:532

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si361521.exe
        Filesize

        175KB

        MD5

        ed8242478f326ca3525053edd25d8164

        SHA1

        c42902aa07ac73c6fdbfcd3b5e7861e16ae641d4

        SHA256

        6dcfc6a27fd7de7dccc64c125cd5d520ebed39832f4ebe5bf2b3c2acc4a6d4f7

        SHA512

        a69a900668458f231d59ac84ee13117bd32c022d0d5561bc47908e8294b0f6464556dbf40aed1d1f820de19703e41f871fdcdb276d66bba8928c699bf1c6c9ee

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si361521.exe
        Filesize

        175KB

        MD5

        ed8242478f326ca3525053edd25d8164

        SHA1

        c42902aa07ac73c6fdbfcd3b5e7861e16ae641d4

        SHA256

        6dcfc6a27fd7de7dccc64c125cd5d520ebed39832f4ebe5bf2b3c2acc4a6d4f7

        SHA512

        a69a900668458f231d59ac84ee13117bd32c022d0d5561bc47908e8294b0f6464556dbf40aed1d1f820de19703e41f871fdcdb276d66bba8928c699bf1c6c9ee

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un615505.exe
        Filesize

        557KB

        MD5

        05c32cb87ca72518f6a391dc17d13da9

        SHA1

        5858f91d185ea806bc7ef126e3abc5a9d408046e

        SHA256

        f44d3f502345ce2a69f6e3d714bd507309354f72cdf7427394c79e964a581607

        SHA512

        a45be4d4cf8f9f92b8101aae0211caf59933ecc7499f845db5ec4b6a5464dc377f3d3ff52cf8260eb52bc07195a2294d041c03f7144ae16b49fb78c940f86fe7

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un615505.exe
        Filesize

        557KB

        MD5

        05c32cb87ca72518f6a391dc17d13da9

        SHA1

        5858f91d185ea806bc7ef126e3abc5a9d408046e

        SHA256

        f44d3f502345ce2a69f6e3d714bd507309354f72cdf7427394c79e964a581607

        SHA512

        a45be4d4cf8f9f92b8101aae0211caf59933ecc7499f845db5ec4b6a5464dc377f3d3ff52cf8260eb52bc07195a2294d041c03f7144ae16b49fb78c940f86fe7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0097.exe
        Filesize

        307KB

        MD5

        b0c7e1ab0acb8e144e1934e069160803

        SHA1

        06b602f63a57249bde9f490c53b79e80154383fb

        SHA256

        ad3eba87fd4f63f599ef611b3c8f8dc121c17bcd836562e483aec8c63a9f9703

        SHA512

        b2dfb40fc2b6c1e3d24bfd0baf5a6fdf63f2bf264973d8023b46d3130350b462bf8e386a77b5b32c8c86e3004f0f1a667c345b8cbe08595eb86e2d6be2cd820a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0097.exe
        Filesize

        307KB

        MD5

        b0c7e1ab0acb8e144e1934e069160803

        SHA1

        06b602f63a57249bde9f490c53b79e80154383fb

        SHA256

        ad3eba87fd4f63f599ef611b3c8f8dc121c17bcd836562e483aec8c63a9f9703

        SHA512

        b2dfb40fc2b6c1e3d24bfd0baf5a6fdf63f2bf264973d8023b46d3130350b462bf8e386a77b5b32c8c86e3004f0f1a667c345b8cbe08595eb86e2d6be2cd820a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0295.exe
        Filesize

        365KB

        MD5

        9335bc697d83a91ed625c72e351c9fc5

        SHA1

        a861e35f7bd37fca7c7337e48d7ca261eaf95113

        SHA256

        675464f827bf94cf5cad4d7d6d106462937db47dd5016dab945b130afd1d65fd

        SHA512

        ce6caa2b5607113545295394e80e8af278c671e05074c45415954e2044eeb962a5ba8357c32b4516d542f642274d8131919c28c732b8ebeaae6f88cf9704b57f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0295.exe
        Filesize

        365KB

        MD5

        9335bc697d83a91ed625c72e351c9fc5

        SHA1

        a861e35f7bd37fca7c7337e48d7ca261eaf95113

        SHA256

        675464f827bf94cf5cad4d7d6d106462937db47dd5016dab945b130afd1d65fd

        SHA512

        ce6caa2b5607113545295394e80e8af278c671e05074c45415954e2044eeb962a5ba8357c32b4516d542f642274d8131919c28c732b8ebeaae6f88cf9704b57f

      • memory/4196-1121-0x00000000007A0000-0x00000000007D2000-memory.dmp
        Filesize

        200KB

      • memory/4196-1122-0x00000000053F0000-0x0000000005400000-memory.dmp
        Filesize

        64KB

      • memory/4300-157-0x0000000002460000-0x0000000002472000-memory.dmp
        Filesize

        72KB

      • memory/4300-167-0x0000000002460000-0x0000000002472000-memory.dmp
        Filesize

        72KB

      • memory/4300-150-0x0000000005030000-0x0000000005040000-memory.dmp
        Filesize

        64KB

      • memory/4300-152-0x0000000002460000-0x0000000002472000-memory.dmp
        Filesize

        72KB

      • memory/4300-153-0x0000000002460000-0x0000000002472000-memory.dmp
        Filesize

        72KB

      • memory/4300-155-0x0000000002460000-0x0000000002472000-memory.dmp
        Filesize

        72KB

      • memory/4300-149-0x0000000000710000-0x000000000073D000-memory.dmp
        Filesize

        180KB

      • memory/4300-159-0x0000000002460000-0x0000000002472000-memory.dmp
        Filesize

        72KB

      • memory/4300-161-0x0000000002460000-0x0000000002472000-memory.dmp
        Filesize

        72KB

      • memory/4300-163-0x0000000002460000-0x0000000002472000-memory.dmp
        Filesize

        72KB

      • memory/4300-165-0x0000000002460000-0x0000000002472000-memory.dmp
        Filesize

        72KB

      • memory/4300-151-0x0000000005030000-0x0000000005040000-memory.dmp
        Filesize

        64KB

      • memory/4300-169-0x0000000002460000-0x0000000002472000-memory.dmp
        Filesize

        72KB

      • memory/4300-171-0x0000000002460000-0x0000000002472000-memory.dmp
        Filesize

        72KB

      • memory/4300-173-0x0000000002460000-0x0000000002472000-memory.dmp
        Filesize

        72KB

      • memory/4300-175-0x0000000002460000-0x0000000002472000-memory.dmp
        Filesize

        72KB

      • memory/4300-177-0x0000000002460000-0x0000000002472000-memory.dmp
        Filesize

        72KB

      • memory/4300-179-0x0000000002460000-0x0000000002472000-memory.dmp
        Filesize

        72KB

      • memory/4300-180-0x0000000000400000-0x000000000070F000-memory.dmp
        Filesize

        3.1MB

      • memory/4300-181-0x0000000005030000-0x0000000005040000-memory.dmp
        Filesize

        64KB

      • memory/4300-182-0x0000000005030000-0x0000000005040000-memory.dmp
        Filesize

        64KB

      • memory/4300-183-0x0000000005030000-0x0000000005040000-memory.dmp
        Filesize

        64KB

      • memory/4300-185-0x0000000000400000-0x000000000070F000-memory.dmp
        Filesize

        3.1MB

      • memory/4300-148-0x0000000005040000-0x00000000055E4000-memory.dmp
        Filesize

        5.6MB

      • memory/4632-192-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/4632-225-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/4632-194-0x00000000026D0000-0x00000000026E0000-memory.dmp
        Filesize

        64KB

      • memory/4632-196-0x00000000026D0000-0x00000000026E0000-memory.dmp
        Filesize

        64KB

      • memory/4632-197-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/4632-193-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/4632-199-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/4632-201-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/4632-203-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/4632-205-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/4632-207-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/4632-209-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/4632-211-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/4632-213-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/4632-215-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/4632-217-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/4632-219-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/4632-221-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/4632-223-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/4632-191-0x00000000026D0000-0x00000000026E0000-memory.dmp
        Filesize

        64KB

      • memory/4632-227-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/4632-1100-0x0000000005320000-0x0000000005938000-memory.dmp
        Filesize

        6.1MB

      • memory/4632-1101-0x00000000059C0000-0x0000000005ACA000-memory.dmp
        Filesize

        1.0MB

      • memory/4632-1102-0x0000000005B00000-0x0000000005B12000-memory.dmp
        Filesize

        72KB

      • memory/4632-1103-0x0000000005B20000-0x0000000005B5C000-memory.dmp
        Filesize

        240KB

      • memory/4632-1104-0x00000000026D0000-0x00000000026E0000-memory.dmp
        Filesize

        64KB

      • memory/4632-1105-0x0000000005E10000-0x0000000005E76000-memory.dmp
        Filesize

        408KB

      • memory/4632-1106-0x00000000064D0000-0x0000000006562000-memory.dmp
        Filesize

        584KB

      • memory/4632-1107-0x00000000065B0000-0x0000000006626000-memory.dmp
        Filesize

        472KB

      • memory/4632-1108-0x0000000006640000-0x0000000006690000-memory.dmp
        Filesize

        320KB

      • memory/4632-1110-0x00000000026D0000-0x00000000026E0000-memory.dmp
        Filesize

        64KB

      • memory/4632-1111-0x00000000026D0000-0x00000000026E0000-memory.dmp
        Filesize

        64KB

      • memory/4632-1112-0x00000000026D0000-0x00000000026E0000-memory.dmp
        Filesize

        64KB

      • memory/4632-190-0x0000000000720000-0x000000000076B000-memory.dmp
        Filesize

        300KB

      • memory/4632-1113-0x00000000026D0000-0x00000000026E0000-memory.dmp
        Filesize

        64KB

      • memory/4632-1114-0x0000000006800000-0x00000000069C2000-memory.dmp
        Filesize

        1.8MB

      • memory/4632-1115-0x0000000006A10000-0x0000000006F3C000-memory.dmp
        Filesize

        5.2MB