Analysis

  • max time kernel
    135s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 23:31

General

  • Target

    e395dac4da26fb29d4bb312804b8a4a3eed5c6b5d0085f5daed9dba73bf020d7.exe

  • Size

    700KB

  • MD5

    6f3585da4a9543b64f9eb579d58f6870

  • SHA1

    b7def1e4c6d2ebeea5a48bc541ed45cdb8cb12cb

  • SHA256

    e395dac4da26fb29d4bb312804b8a4a3eed5c6b5d0085f5daed9dba73bf020d7

  • SHA512

    91914f6c12d4625c601f7469ff8d13d514a868ef4f540213e7a84e7eee0ae35a385023c292da4d31312fcc6eb809c154d343ad8e31f98d3be1a2d7f9838ce2f5

  • SSDEEP

    12288:QMr5y90eEWEB17CYU9DAMcACNIfNTQ3C2qX4JFywP7azru0y:5yGEffZLspGby

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e395dac4da26fb29d4bb312804b8a4a3eed5c6b5d0085f5daed9dba73bf020d7.exe
    "C:\Users\Admin\AppData\Local\Temp\e395dac4da26fb29d4bb312804b8a4a3eed5c6b5d0085f5daed9dba73bf020d7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4432
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un635418.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un635418.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4508
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9499.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9499.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1172
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 1080
          4⤵
          • Program crash
          PID:3972
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6032.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6032.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2472
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 1340
          4⤵
          • Program crash
          PID:4660
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si164989.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si164989.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:960
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1172 -ip 1172
    1⤵
      PID:440
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 2472 -ip 2472
      1⤵
        PID:2300

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si164989.exe

        Filesize

        175KB

        MD5

        bc2d256df11611f9a2e0cf5b2c887054

        SHA1

        1d092c62f9081f027d67cfede541aaf50a5321b7

        SHA256

        3d6c115385d8aa278aea509f6ea79c71dfacde2d8a638be2b6593ed653ef918e

        SHA512

        32ca63c6a49aeec3300d2e54677404d5e2173f6c2d0ac55b259925eb5e7f75cb76e3d16af3f831254fefa96aaddca457f11c56cae635857177b77afd44bfe3b6

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si164989.exe

        Filesize

        175KB

        MD5

        bc2d256df11611f9a2e0cf5b2c887054

        SHA1

        1d092c62f9081f027d67cfede541aaf50a5321b7

        SHA256

        3d6c115385d8aa278aea509f6ea79c71dfacde2d8a638be2b6593ed653ef918e

        SHA512

        32ca63c6a49aeec3300d2e54677404d5e2173f6c2d0ac55b259925eb5e7f75cb76e3d16af3f831254fefa96aaddca457f11c56cae635857177b77afd44bfe3b6

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un635418.exe

        Filesize

        558KB

        MD5

        12b36088ad9944ed2f417bfbdbd5c3f2

        SHA1

        5f3b5b57dd0c9e38eb39127d29369f50ddf8c0fa

        SHA256

        6350006c6636ef32040b9725db7cc54b703ce36a560b2667707fb9210e8bb1a3

        SHA512

        87d2225b92064d48942050f3c550900a126faa1cbba212565ed6196f3956d8c60359e0db6f34457e7382d3e7030da8c4fc326a3e5c96d73e6084ca211669793f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un635418.exe

        Filesize

        558KB

        MD5

        12b36088ad9944ed2f417bfbdbd5c3f2

        SHA1

        5f3b5b57dd0c9e38eb39127d29369f50ddf8c0fa

        SHA256

        6350006c6636ef32040b9725db7cc54b703ce36a560b2667707fb9210e8bb1a3

        SHA512

        87d2225b92064d48942050f3c550900a126faa1cbba212565ed6196f3956d8c60359e0db6f34457e7382d3e7030da8c4fc326a3e5c96d73e6084ca211669793f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9499.exe

        Filesize

        307KB

        MD5

        4535cf1aa8c0de1059ec19be8ee51991

        SHA1

        3720c0e575835c3fd287cf0e3348e4f70708fc21

        SHA256

        1c6b16e423b2a65b870aaac290270093ac015996d6d7d35186aeaf99bfcbd0b1

        SHA512

        bad1a543f825306841e3245d9768d11cde8c5fc22af4d7fce7d038cb3d889fc397c7a112c21231cbeab4e6466428a746b31c6578abd8d3bd8b269b014d2e4035

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9499.exe

        Filesize

        307KB

        MD5

        4535cf1aa8c0de1059ec19be8ee51991

        SHA1

        3720c0e575835c3fd287cf0e3348e4f70708fc21

        SHA256

        1c6b16e423b2a65b870aaac290270093ac015996d6d7d35186aeaf99bfcbd0b1

        SHA512

        bad1a543f825306841e3245d9768d11cde8c5fc22af4d7fce7d038cb3d889fc397c7a112c21231cbeab4e6466428a746b31c6578abd8d3bd8b269b014d2e4035

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6032.exe

        Filesize

        365KB

        MD5

        036386b82b1b04c81cba2d2b8cb99755

        SHA1

        d1a02dc7d31b13af42448545808dc0857b28243d

        SHA256

        6239fbf4ce19a96f4a9c2c2ec11eba8e837e4e7316a177e1d2b634c4f20d968a

        SHA512

        3d1a72053c2a6a93a48684dd4e551796d1db92692ef569d3db7fc2a9dd343dcf454a85839a9f50d21d168e0d479061eb0b3cfc0f6bdf5d02517cbac954ee60d8

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6032.exe

        Filesize

        365KB

        MD5

        036386b82b1b04c81cba2d2b8cb99755

        SHA1

        d1a02dc7d31b13af42448545808dc0857b28243d

        SHA256

        6239fbf4ce19a96f4a9c2c2ec11eba8e837e4e7316a177e1d2b634c4f20d968a

        SHA512

        3d1a72053c2a6a93a48684dd4e551796d1db92692ef569d3db7fc2a9dd343dcf454a85839a9f50d21d168e0d479061eb0b3cfc0f6bdf5d02517cbac954ee60d8

      • memory/960-1121-0x00000000006D0000-0x0000000000702000-memory.dmp

        Filesize

        200KB

      • memory/960-1122-0x0000000005400000-0x0000000005410000-memory.dmp

        Filesize

        64KB

      • memory/1172-152-0x0000000002950000-0x0000000002960000-memory.dmp

        Filesize

        64KB

      • memory/1172-167-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/1172-151-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/1172-153-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/1172-155-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/1172-157-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/1172-150-0x0000000002950000-0x0000000002960000-memory.dmp

        Filesize

        64KB

      • memory/1172-159-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/1172-161-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/1172-163-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/1172-165-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/1172-149-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/1172-169-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/1172-171-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/1172-173-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/1172-175-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/1172-177-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/1172-179-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/1172-180-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/1172-181-0x0000000002950000-0x0000000002960000-memory.dmp

        Filesize

        64KB

      • memory/1172-182-0x0000000002950000-0x0000000002960000-memory.dmp

        Filesize

        64KB

      • memory/1172-183-0x0000000002950000-0x0000000002960000-memory.dmp

        Filesize

        64KB

      • memory/1172-185-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/1172-148-0x0000000004DE0000-0x0000000005384000-memory.dmp

        Filesize

        5.6MB

      • memory/2472-191-0x0000000002540000-0x000000000257F000-memory.dmp

        Filesize

        252KB

      • memory/2472-234-0x0000000005110000-0x0000000005120000-memory.dmp

        Filesize

        64KB

      • memory/2472-195-0x0000000002540000-0x000000000257F000-memory.dmp

        Filesize

        252KB

      • memory/2472-197-0x0000000002540000-0x000000000257F000-memory.dmp

        Filesize

        252KB

      • memory/2472-199-0x0000000002540000-0x000000000257F000-memory.dmp

        Filesize

        252KB

      • memory/2472-201-0x0000000002540000-0x000000000257F000-memory.dmp

        Filesize

        252KB

      • memory/2472-203-0x0000000002540000-0x000000000257F000-memory.dmp

        Filesize

        252KB

      • memory/2472-205-0x0000000002540000-0x000000000257F000-memory.dmp

        Filesize

        252KB

      • memory/2472-207-0x0000000002540000-0x000000000257F000-memory.dmp

        Filesize

        252KB

      • memory/2472-209-0x0000000002540000-0x000000000257F000-memory.dmp

        Filesize

        252KB

      • memory/2472-211-0x0000000002540000-0x000000000257F000-memory.dmp

        Filesize

        252KB

      • memory/2472-213-0x0000000002540000-0x000000000257F000-memory.dmp

        Filesize

        252KB

      • memory/2472-215-0x0000000002540000-0x000000000257F000-memory.dmp

        Filesize

        252KB

      • memory/2472-217-0x0000000002540000-0x000000000257F000-memory.dmp

        Filesize

        252KB

      • memory/2472-219-0x0000000002540000-0x000000000257F000-memory.dmp

        Filesize

        252KB

      • memory/2472-221-0x0000000002540000-0x000000000257F000-memory.dmp

        Filesize

        252KB

      • memory/2472-223-0x0000000002540000-0x000000000257F000-memory.dmp

        Filesize

        252KB

      • memory/2472-231-0x0000000000720000-0x000000000076B000-memory.dmp

        Filesize

        300KB

      • memory/2472-232-0x0000000005110000-0x0000000005120000-memory.dmp

        Filesize

        64KB

      • memory/2472-193-0x0000000002540000-0x000000000257F000-memory.dmp

        Filesize

        252KB

      • memory/2472-236-0x0000000005110000-0x0000000005120000-memory.dmp

        Filesize

        64KB

      • memory/2472-1100-0x00000000056D0000-0x0000000005CE8000-memory.dmp

        Filesize

        6.1MB

      • memory/2472-1101-0x0000000004F60000-0x000000000506A000-memory.dmp

        Filesize

        1.0MB

      • memory/2472-1102-0x00000000028B0000-0x00000000028C2000-memory.dmp

        Filesize

        72KB

      • memory/2472-1103-0x00000000028D0000-0x000000000290C000-memory.dmp

        Filesize

        240KB

      • memory/2472-1104-0x0000000005110000-0x0000000005120000-memory.dmp

        Filesize

        64KB

      • memory/2472-1105-0x0000000005E10000-0x0000000005EA2000-memory.dmp

        Filesize

        584KB

      • memory/2472-1106-0x0000000005EB0000-0x0000000005F16000-memory.dmp

        Filesize

        408KB

      • memory/2472-1108-0x00000000066B0000-0x0000000006726000-memory.dmp

        Filesize

        472KB

      • memory/2472-1109-0x0000000006750000-0x00000000067A0000-memory.dmp

        Filesize

        320KB

      • memory/2472-1110-0x0000000005110000-0x0000000005120000-memory.dmp

        Filesize

        64KB

      • memory/2472-1111-0x0000000005110000-0x0000000005120000-memory.dmp

        Filesize

        64KB

      • memory/2472-1112-0x0000000005110000-0x0000000005120000-memory.dmp

        Filesize

        64KB

      • memory/2472-190-0x0000000002540000-0x000000000257F000-memory.dmp

        Filesize

        252KB

      • memory/2472-1113-0x0000000006A50000-0x0000000006C12000-memory.dmp

        Filesize

        1.8MB

      • memory/2472-1114-0x0000000006C20000-0x000000000714C000-memory.dmp

        Filesize

        5.2MB

      • memory/2472-1115-0x0000000005110000-0x0000000005120000-memory.dmp

        Filesize

        64KB