Analysis

  • max time kernel
    135s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 23:26

General

  • Target

    4629a84738e4d341d29fac4080eb87da926ffb5d078c9466e4c47c92e1839be6.exe

  • Size

    700KB

  • MD5

    7dde5a9f7261047cac1598432342f80e

  • SHA1

    599e8c22e04d6d7d27753f39235575d8b9a99803

  • SHA256

    4629a84738e4d341d29fac4080eb87da926ffb5d078c9466e4c47c92e1839be6

  • SHA512

    c6e4e7ecef75663dba84217c7e3af3e76a9990bac46a9de2f3785f4a8f2d3b8949a8b38b19b14bec1916dd7c8b5d94049bee932b40741547619a6243ded79c19

  • SSDEEP

    12288:1Mrhy90hMWlL/ugP1AZimSKElVK9D5YcANlTFkX5xckUWW/eYVJvwN:AyzsLTtAjeDNlTIU7mYVlu

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4629a84738e4d341d29fac4080eb87da926ffb5d078c9466e4c47c92e1839be6.exe
    "C:\Users\Admin\AppData\Local\Temp\4629a84738e4d341d29fac4080eb87da926ffb5d078c9466e4c47c92e1839be6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3240
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un863497.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un863497.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1036
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6558.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6558.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1524
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1524 -s 1084
          4⤵
          • Program crash
          PID:4144
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0826.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0826.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:460
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 2020
          4⤵
          • Program crash
          PID:1124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si653855.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si653855.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3368
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1524 -ip 1524
    1⤵
      PID:4548
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 460 -ip 460
      1⤵
        PID:2140

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si653855.exe

        Filesize

        175KB

        MD5

        187aa7e264bbe92702088b8a354c0714

        SHA1

        cd2e30c05e1a811a11c64b6a9608ce31be376457

        SHA256

        e21b7634e89750c83e268b30392ebc99048c03d6a189c46e5cad670510b7791f

        SHA512

        005dc635ecc8a05a056594a0898861d388d6499b72be37dabf819a799d1813715803b4299b1896ce276ece960568c97d266b05ce94b1e2542d715db81d845838

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si653855.exe

        Filesize

        175KB

        MD5

        187aa7e264bbe92702088b8a354c0714

        SHA1

        cd2e30c05e1a811a11c64b6a9608ce31be376457

        SHA256

        e21b7634e89750c83e268b30392ebc99048c03d6a189c46e5cad670510b7791f

        SHA512

        005dc635ecc8a05a056594a0898861d388d6499b72be37dabf819a799d1813715803b4299b1896ce276ece960568c97d266b05ce94b1e2542d715db81d845838

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un863497.exe

        Filesize

        558KB

        MD5

        2c40416b24d9265cfc524587ccbb89e0

        SHA1

        c39afe72498a56c5cdee49f7af6390151d3b3a19

        SHA256

        7dc810cab324927f115201d9e45dac47601efb51583c398acdbbc30cdb7f2ca9

        SHA512

        6af193e20caa995c513b694241ec241d9496134a8efe143ba3ad06cda78bb80c6f2983dd1648150ec311854d37fb2bf717dfad819daf1a0ba493270da292428e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un863497.exe

        Filesize

        558KB

        MD5

        2c40416b24d9265cfc524587ccbb89e0

        SHA1

        c39afe72498a56c5cdee49f7af6390151d3b3a19

        SHA256

        7dc810cab324927f115201d9e45dac47601efb51583c398acdbbc30cdb7f2ca9

        SHA512

        6af193e20caa995c513b694241ec241d9496134a8efe143ba3ad06cda78bb80c6f2983dd1648150ec311854d37fb2bf717dfad819daf1a0ba493270da292428e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6558.exe

        Filesize

        307KB

        MD5

        dc3497ab25cd7664ddf868097c07e184

        SHA1

        71a6a3c0b3489be0465a3c0c5f288b299b6a1dd9

        SHA256

        146d4e215da21e4e58f99c4fbf25e41069b291f61474ebb68d04110c73743cf5

        SHA512

        65254093869e021ef985d493e1d605639178cd1be882a8331c835cfbec9c1c0fef5b6ad0a547aeb338235ac9b4d462d66404a03d92ffcb6f843bfdda4d56f072

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6558.exe

        Filesize

        307KB

        MD5

        dc3497ab25cd7664ddf868097c07e184

        SHA1

        71a6a3c0b3489be0465a3c0c5f288b299b6a1dd9

        SHA256

        146d4e215da21e4e58f99c4fbf25e41069b291f61474ebb68d04110c73743cf5

        SHA512

        65254093869e021ef985d493e1d605639178cd1be882a8331c835cfbec9c1c0fef5b6ad0a547aeb338235ac9b4d462d66404a03d92ffcb6f843bfdda4d56f072

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0826.exe

        Filesize

        365KB

        MD5

        8061e297e0f1da0842e3ef7d60a5b4ff

        SHA1

        369a4f28968ee9acc3403bee0b95ce5c35202df7

        SHA256

        68cd47eadddfd24a707d6d18daf3a5611428354a6cc56739b778122c7d7e022a

        SHA512

        f0d75e4656e483edfad3341cbd15107a1d696f9458e3b65f1c7c7e304d874d698caa81229d2f81a96ffdbedbe67abc57834aa6b01cd3090ce0583579da818a9b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0826.exe

        Filesize

        365KB

        MD5

        8061e297e0f1da0842e3ef7d60a5b4ff

        SHA1

        369a4f28968ee9acc3403bee0b95ce5c35202df7

        SHA256

        68cd47eadddfd24a707d6d18daf3a5611428354a6cc56739b778122c7d7e022a

        SHA512

        f0d75e4656e483edfad3341cbd15107a1d696f9458e3b65f1c7c7e304d874d698caa81229d2f81a96ffdbedbe67abc57834aa6b01cd3090ce0583579da818a9b

      • memory/460-512-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

        Filesize

        64KB

      • memory/460-1102-0x0000000004F50000-0x0000000004F62000-memory.dmp

        Filesize

        72KB

      • memory/460-1114-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

        Filesize

        64KB

      • memory/460-1113-0x0000000006C10000-0x000000000713C000-memory.dmp

        Filesize

        5.2MB

      • memory/460-1112-0x0000000006A40000-0x0000000006C02000-memory.dmp

        Filesize

        1.8MB

      • memory/460-1111-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

        Filesize

        64KB

      • memory/460-1110-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

        Filesize

        64KB

      • memory/460-1108-0x0000000006890000-0x00000000068E0000-memory.dmp

        Filesize

        320KB

      • memory/460-1107-0x0000000006810000-0x0000000006886000-memory.dmp

        Filesize

        472KB

      • memory/460-1106-0x0000000006610000-0x00000000066A2000-memory.dmp

        Filesize

        584KB

      • memory/460-1105-0x0000000005F50000-0x0000000005FB6000-memory.dmp

        Filesize

        408KB

      • memory/460-1104-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

        Filesize

        64KB

      • memory/460-1103-0x0000000004F70000-0x0000000004FAC000-memory.dmp

        Filesize

        240KB

      • memory/460-1101-0x0000000005BB0000-0x0000000005CBA000-memory.dmp

        Filesize

        1.0MB

      • memory/460-1100-0x0000000005590000-0x0000000005BA8000-memory.dmp

        Filesize

        6.1MB

      • memory/460-508-0x0000000000840000-0x000000000088B000-memory.dmp

        Filesize

        300KB

      • memory/460-510-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

        Filesize

        64KB

      • memory/460-224-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/460-222-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/460-220-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/460-218-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/460-216-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/460-214-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/460-192-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/460-194-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/460-191-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/460-196-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/460-198-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/460-200-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/460-202-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/460-204-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/460-206-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/460-208-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/460-210-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/460-212-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/1524-176-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/1524-162-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/1524-150-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

        Filesize

        64KB

      • memory/1524-184-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

        Filesize

        64KB

      • memory/1524-183-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

        Filesize

        64KB

      • memory/1524-182-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

        Filesize

        64KB

      • memory/1524-181-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/1524-180-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/1524-151-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/1524-172-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/1524-174-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/1524-154-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

        Filesize

        64KB

      • memory/1524-186-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/1524-178-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/1524-152-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

        Filesize

        64KB

      • memory/1524-168-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/1524-166-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/1524-164-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/1524-160-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/1524-156-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/1524-158-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/1524-170-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/1524-153-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/1524-149-0x0000000000810000-0x000000000083D000-memory.dmp

        Filesize

        180KB

      • memory/1524-148-0x0000000004ED0000-0x0000000005474000-memory.dmp

        Filesize

        5.6MB

      • memory/3368-1120-0x00000000002B0000-0x00000000002E2000-memory.dmp

        Filesize

        200KB

      • memory/3368-1121-0x0000000004E50000-0x0000000004E60000-memory.dmp

        Filesize

        64KB