Analysis

  • max time kernel
    95s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 23:29

General

  • Target

    9ff266bfa29709aafe7e2496f20ba15a6e8fc6132db0c480a6ae5210eb08aa8e.exe

  • Size

    700KB

  • MD5

    29bb58d97963d6019d177e68632f1443

  • SHA1

    1b2abf6df20f270d0d14b3b2269ca6e1de4079fd

  • SHA256

    9ff266bfa29709aafe7e2496f20ba15a6e8fc6132db0c480a6ae5210eb08aa8e

  • SHA512

    08946f0aefb19cc52c37afd8269ffa9edec372e790d6333723e0c7bb97bef4096e332fb9cfce88392b355fcd0a98cbff6828b238261cdb5b778ae75740a11f28

  • SSDEEP

    12288:UMrBy90J1vl1S41Y3O9DNYcAy8F/FoErq6UuoAPAo5Ex5FAlyekCFB:NyU1Fyy8hFoEW6Uuao5ExvAAek6

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ff266bfa29709aafe7e2496f20ba15a6e8fc6132db0c480a6ae5210eb08aa8e.exe
    "C:\Users\Admin\AppData\Local\Temp\9ff266bfa29709aafe7e2496f20ba15a6e8fc6132db0c480a6ae5210eb08aa8e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4400
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un045724.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un045724.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3812
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1154.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1154.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1536
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1536 -s 1080
          4⤵
          • Program crash
          PID:2116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6753.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6753.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1096
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1096 -s 1344
          4⤵
          • Program crash
          PID:4020
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si773192.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si773192.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:388
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1536 -ip 1536
    1⤵
      PID:5108
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 1096 -ip 1096
      1⤵
        PID:3844

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si773192.exe

        Filesize

        175KB

        MD5

        010f8c63ec763b022dfb64f20ef41768

        SHA1

        6fd2248ad2aa286de68e22f6cf74421c88885e1b

        SHA256

        289589f89e4fae2fc414589f2769d83a3a561f777daedb30b5ece8f58df4e849

        SHA512

        e64ef8a017a817ed305380314d37ceb31f799f32e0028842abc7cac3ab1cbed3634dad69b67959319ac903fa4513974e331b3ca6ca33c2277733d086099b8b5e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si773192.exe

        Filesize

        175KB

        MD5

        010f8c63ec763b022dfb64f20ef41768

        SHA1

        6fd2248ad2aa286de68e22f6cf74421c88885e1b

        SHA256

        289589f89e4fae2fc414589f2769d83a3a561f777daedb30b5ece8f58df4e849

        SHA512

        e64ef8a017a817ed305380314d37ceb31f799f32e0028842abc7cac3ab1cbed3634dad69b67959319ac903fa4513974e331b3ca6ca33c2277733d086099b8b5e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un045724.exe

        Filesize

        558KB

        MD5

        51e7849c3c96025a8894bfcd0182576e

        SHA1

        e3c4bf4101da4892607ebc2e985ac9b6a282c0ec

        SHA256

        f055c483c34194c6fc94f778bbd4d694f78cc436ac49c310df87582849eae54e

        SHA512

        6a249a74af414e7e86b7231508d21273eca1a9998da58c8caff2e1279876a73bb76e14ab1a6bc962881f592de00eea5ae0a5fdb114dffb37c275144a2adf8f0d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un045724.exe

        Filesize

        558KB

        MD5

        51e7849c3c96025a8894bfcd0182576e

        SHA1

        e3c4bf4101da4892607ebc2e985ac9b6a282c0ec

        SHA256

        f055c483c34194c6fc94f778bbd4d694f78cc436ac49c310df87582849eae54e

        SHA512

        6a249a74af414e7e86b7231508d21273eca1a9998da58c8caff2e1279876a73bb76e14ab1a6bc962881f592de00eea5ae0a5fdb114dffb37c275144a2adf8f0d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1154.exe

        Filesize

        307KB

        MD5

        bb21cb211e5f8cb83a135952cce5a6d1

        SHA1

        675ba50e932dad16ba014f22fea5e09be487dad4

        SHA256

        f3126f10b73463c848b42ceab1c4b854249b1029d172eb6f2a6f530e9a85d4f1

        SHA512

        abd4c308a8bcf1fc34e9e8bd729b2d2ef75cdd2d230949ff3042dda9999f89c40b2454ff34fd07f0b27064b4662583c231ae65be27b45778c35bab643f879460

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1154.exe

        Filesize

        307KB

        MD5

        bb21cb211e5f8cb83a135952cce5a6d1

        SHA1

        675ba50e932dad16ba014f22fea5e09be487dad4

        SHA256

        f3126f10b73463c848b42ceab1c4b854249b1029d172eb6f2a6f530e9a85d4f1

        SHA512

        abd4c308a8bcf1fc34e9e8bd729b2d2ef75cdd2d230949ff3042dda9999f89c40b2454ff34fd07f0b27064b4662583c231ae65be27b45778c35bab643f879460

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6753.exe

        Filesize

        365KB

        MD5

        6942fb0a76abcdb3388f3a55a7d20e39

        SHA1

        c4b2fd23277af578b2e31686b7016f95f428626c

        SHA256

        54e0806fe81dc350dc81ca595e1744d5c5c4b01803f4e40506e541c3b795e90b

        SHA512

        61024f1f8f1fde45f26e82e38d18936a872947fa6ca427a87837eb3301bcf012b8ee259ea270b8e9d302b6f97099a5168bdf9bbf8afe6d51da13a41c2300a021

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6753.exe

        Filesize

        365KB

        MD5

        6942fb0a76abcdb3388f3a55a7d20e39

        SHA1

        c4b2fd23277af578b2e31686b7016f95f428626c

        SHA256

        54e0806fe81dc350dc81ca595e1744d5c5c4b01803f4e40506e541c3b795e90b

        SHA512

        61024f1f8f1fde45f26e82e38d18936a872947fa6ca427a87837eb3301bcf012b8ee259ea270b8e9d302b6f97099a5168bdf9bbf8afe6d51da13a41c2300a021

      • memory/388-1121-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

        Filesize

        64KB

      • memory/388-1120-0x0000000000540000-0x0000000000572000-memory.dmp

        Filesize

        200KB

      • memory/1096-1099-0x0000000005480000-0x0000000005A98000-memory.dmp

        Filesize

        6.1MB

      • memory/1096-1101-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/1096-1114-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB

      • memory/1096-1113-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB

      • memory/1096-1112-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB

      • memory/1096-1111-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB

      • memory/1096-1110-0x0000000006B00000-0x000000000702C000-memory.dmp

        Filesize

        5.2MB

      • memory/1096-1109-0x0000000006930000-0x0000000006AF2000-memory.dmp

        Filesize

        1.8MB

      • memory/1096-1107-0x00000000068C0000-0x0000000006910000-memory.dmp

        Filesize

        320KB

      • memory/1096-1106-0x0000000006830000-0x00000000068A6000-memory.dmp

        Filesize

        472KB

      • memory/1096-1105-0x0000000006750000-0x00000000067E2000-memory.dmp

        Filesize

        584KB

      • memory/1096-1104-0x0000000005F50000-0x0000000005FB6000-memory.dmp

        Filesize

        408KB

      • memory/1096-1103-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB

      • memory/1096-1102-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/1096-1100-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/1096-467-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB

      • memory/1096-464-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB

      • memory/1096-463-0x00000000007F0000-0x000000000083B000-memory.dmp

        Filesize

        300KB

      • memory/1096-223-0x0000000004D40000-0x0000000004D7F000-memory.dmp

        Filesize

        252KB

      • memory/1096-221-0x0000000004D40000-0x0000000004D7F000-memory.dmp

        Filesize

        252KB

      • memory/1096-190-0x0000000004D40000-0x0000000004D7F000-memory.dmp

        Filesize

        252KB

      • memory/1096-191-0x0000000004D40000-0x0000000004D7F000-memory.dmp

        Filesize

        252KB

      • memory/1096-193-0x0000000004D40000-0x0000000004D7F000-memory.dmp

        Filesize

        252KB

      • memory/1096-195-0x0000000004D40000-0x0000000004D7F000-memory.dmp

        Filesize

        252KB

      • memory/1096-197-0x0000000004D40000-0x0000000004D7F000-memory.dmp

        Filesize

        252KB

      • memory/1096-199-0x0000000004D40000-0x0000000004D7F000-memory.dmp

        Filesize

        252KB

      • memory/1096-201-0x0000000004D40000-0x0000000004D7F000-memory.dmp

        Filesize

        252KB

      • memory/1096-203-0x0000000004D40000-0x0000000004D7F000-memory.dmp

        Filesize

        252KB

      • memory/1096-205-0x0000000004D40000-0x0000000004D7F000-memory.dmp

        Filesize

        252KB

      • memory/1096-207-0x0000000004D40000-0x0000000004D7F000-memory.dmp

        Filesize

        252KB

      • memory/1096-209-0x0000000004D40000-0x0000000004D7F000-memory.dmp

        Filesize

        252KB

      • memory/1096-211-0x0000000004D40000-0x0000000004D7F000-memory.dmp

        Filesize

        252KB

      • memory/1096-213-0x0000000004D40000-0x0000000004D7F000-memory.dmp

        Filesize

        252KB

      • memory/1096-215-0x0000000004D40000-0x0000000004D7F000-memory.dmp

        Filesize

        252KB

      • memory/1096-217-0x0000000004D40000-0x0000000004D7F000-memory.dmp

        Filesize

        252KB

      • memory/1096-219-0x0000000004D40000-0x0000000004D7F000-memory.dmp

        Filesize

        252KB

      • memory/1536-172-0x00000000024A0000-0x00000000024B2000-memory.dmp

        Filesize

        72KB

      • memory/1536-151-0x0000000004D20000-0x00000000052C4000-memory.dmp

        Filesize

        5.6MB

      • memory/1536-185-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/1536-183-0x0000000002820000-0x0000000002830000-memory.dmp

        Filesize

        64KB

      • memory/1536-182-0x0000000002820000-0x0000000002830000-memory.dmp

        Filesize

        64KB

      • memory/1536-150-0x0000000002820000-0x0000000002830000-memory.dmp

        Filesize

        64KB

      • memory/1536-181-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/1536-156-0x00000000024A0000-0x00000000024B2000-memory.dmp

        Filesize

        72KB

      • memory/1536-180-0x00000000024A0000-0x00000000024B2000-memory.dmp

        Filesize

        72KB

      • memory/1536-178-0x00000000024A0000-0x00000000024B2000-memory.dmp

        Filesize

        72KB

      • memory/1536-149-0x0000000002820000-0x0000000002830000-memory.dmp

        Filesize

        64KB

      • memory/1536-154-0x00000000024A0000-0x00000000024B2000-memory.dmp

        Filesize

        72KB

      • memory/1536-168-0x00000000024A0000-0x00000000024B2000-memory.dmp

        Filesize

        72KB

      • memory/1536-170-0x00000000024A0000-0x00000000024B2000-memory.dmp

        Filesize

        72KB

      • memory/1536-153-0x00000000024A0000-0x00000000024B2000-memory.dmp

        Filesize

        72KB

      • memory/1536-166-0x00000000024A0000-0x00000000024B2000-memory.dmp

        Filesize

        72KB

      • memory/1536-164-0x00000000024A0000-0x00000000024B2000-memory.dmp

        Filesize

        72KB

      • memory/1536-162-0x00000000024A0000-0x00000000024B2000-memory.dmp

        Filesize

        72KB

      • memory/1536-160-0x00000000024A0000-0x00000000024B2000-memory.dmp

        Filesize

        72KB

      • memory/1536-158-0x00000000024A0000-0x00000000024B2000-memory.dmp

        Filesize

        72KB

      • memory/1536-152-0x0000000002820000-0x0000000002830000-memory.dmp

        Filesize

        64KB

      • memory/1536-174-0x00000000024A0000-0x00000000024B2000-memory.dmp

        Filesize

        72KB

      • memory/1536-148-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/1536-176-0x00000000024A0000-0x00000000024B2000-memory.dmp

        Filesize

        72KB