Analysis

  • max time kernel
    99s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 23:36

General

  • Target

    772d46da85f59622bae1b1f5fc497d72da07f0148ae0df6379d1ee3831351ad4.exe

  • Size

    700KB

  • MD5

    fd32f6fcd25df2b717cf029c3a46c75f

  • SHA1

    1d2fe4ee702827b4635749e1ea42553328e5c5ef

  • SHA256

    772d46da85f59622bae1b1f5fc497d72da07f0148ae0df6379d1ee3831351ad4

  • SHA512

    06b795858ac3120f95d7f872cd009bb59d641ee75e42b12c8a3b6eb034eecfa0860bf2c7ab82629ec1df963abca77ecafe7d6ecb2b37c83b82c209e6220c18e7

  • SSDEEP

    12288:rMrVy90P+WusIRTXuyFLkXpseGu+4tGFrmFpUfBr5R1nzyxXdKY:Oy05MLAGGYFrmrU5VQXdr

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\772d46da85f59622bae1b1f5fc497d72da07f0148ae0df6379d1ee3831351ad4.exe
    "C:\Users\Admin\AppData\Local\Temp\772d46da85f59622bae1b1f5fc497d72da07f0148ae0df6379d1ee3831351ad4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4552
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un484079.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un484079.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:840
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6001.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6001.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2556
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2556 -s 1084
          4⤵
          • Program crash
          PID:4604
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0176.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0176.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2264
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 1352
          4⤵
          • Program crash
          PID:4856
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si881964.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si881964.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4440
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 2556 -ip 2556
    1⤵
      PID:1956
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2264 -ip 2264
      1⤵
        PID:1816

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si881964.exe

        Filesize

        175KB

        MD5

        81b921aa13f5a6645ed72a28a66f3ed6

        SHA1

        ec70cad459e9e70c9531385131128f903241d30a

        SHA256

        892a3bc18bd1a0f97ae91c8ba2bc847e856a59c45761fb76040fe751dc86966d

        SHA512

        4207ca1495f81820b392af4f3fd9a805b3b746be4991fa3f9701a08939665c4cb03db1e55b8802d35f703d273fca68c70a235b5e84461e10cb357790abc5afeb

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si881964.exe

        Filesize

        175KB

        MD5

        81b921aa13f5a6645ed72a28a66f3ed6

        SHA1

        ec70cad459e9e70c9531385131128f903241d30a

        SHA256

        892a3bc18bd1a0f97ae91c8ba2bc847e856a59c45761fb76040fe751dc86966d

        SHA512

        4207ca1495f81820b392af4f3fd9a805b3b746be4991fa3f9701a08939665c4cb03db1e55b8802d35f703d273fca68c70a235b5e84461e10cb357790abc5afeb

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un484079.exe

        Filesize

        558KB

        MD5

        3eea37d654331d7cc63322994c7dca4b

        SHA1

        e06988245c43e181489bcc0d7f6bdb415c7ae222

        SHA256

        ab82fff063d51ad055e05a852c3d1b463153a4193de4a46b19b5fd451e087715

        SHA512

        3852fa010112d4f8b515c070799c6824cc71100583718cadbf7b2509844e34c835f8a31827f93428388c19f6b4d0a0b764948b09effa937b1186ccffbdb8a769

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un484079.exe

        Filesize

        558KB

        MD5

        3eea37d654331d7cc63322994c7dca4b

        SHA1

        e06988245c43e181489bcc0d7f6bdb415c7ae222

        SHA256

        ab82fff063d51ad055e05a852c3d1b463153a4193de4a46b19b5fd451e087715

        SHA512

        3852fa010112d4f8b515c070799c6824cc71100583718cadbf7b2509844e34c835f8a31827f93428388c19f6b4d0a0b764948b09effa937b1186ccffbdb8a769

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6001.exe

        Filesize

        307KB

        MD5

        c8479db68cbc247b8bf5fb304bee2738

        SHA1

        0f734ee5e98a1054286cd77fb5fdbd6c6ed19b11

        SHA256

        b51e966c1b1e603b139d9f99d9afc523bdf013411d0ebebb7ace7c6db3fb9b7e

        SHA512

        637cd9824fe2bc7bb5870670fd275e4b2ff79dc7c78b199e8bfb505f6797a4c045fded96277eade4c0c638511b918aea28665454e769c15236fdc612cfeca9c7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6001.exe

        Filesize

        307KB

        MD5

        c8479db68cbc247b8bf5fb304bee2738

        SHA1

        0f734ee5e98a1054286cd77fb5fdbd6c6ed19b11

        SHA256

        b51e966c1b1e603b139d9f99d9afc523bdf013411d0ebebb7ace7c6db3fb9b7e

        SHA512

        637cd9824fe2bc7bb5870670fd275e4b2ff79dc7c78b199e8bfb505f6797a4c045fded96277eade4c0c638511b918aea28665454e769c15236fdc612cfeca9c7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0176.exe

        Filesize

        365KB

        MD5

        9a47126eb35aea5ecb86cf1e6aa92cb9

        SHA1

        90b3144a059b976d46885099876af1b55a6e4a24

        SHA256

        94f9b430a35532c8c221d5b499ce57bf98fc43b2d396f3ec4602e7bf319b86c3

        SHA512

        2a64057a503f6d65d87465c4520c5b17f6fd72a9fc7bf407501c4e04cabdc5ce1ab1224e16ae46ebdb2fb3db3a8df72d12f5aa8461406e3ecbd33376ec39f090

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0176.exe

        Filesize

        365KB

        MD5

        9a47126eb35aea5ecb86cf1e6aa92cb9

        SHA1

        90b3144a059b976d46885099876af1b55a6e4a24

        SHA256

        94f9b430a35532c8c221d5b499ce57bf98fc43b2d396f3ec4602e7bf319b86c3

        SHA512

        2a64057a503f6d65d87465c4520c5b17f6fd72a9fc7bf407501c4e04cabdc5ce1ab1224e16ae46ebdb2fb3db3a8df72d12f5aa8461406e3ecbd33376ec39f090

      • memory/2264-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/2264-226-0x0000000004D20000-0x0000000004D5F000-memory.dmp

        Filesize

        252KB

      • memory/2264-200-0x0000000004D20000-0x0000000004D5F000-memory.dmp

        Filesize

        252KB

      • memory/2264-202-0x0000000004D20000-0x0000000004D5F000-memory.dmp

        Filesize

        252KB

      • memory/2264-1115-0x0000000007190000-0x0000000007206000-memory.dmp

        Filesize

        472KB

      • memory/2264-1114-0x0000000006B40000-0x000000000706C000-memory.dmp

        Filesize

        5.2MB

      • memory/2264-1113-0x0000000006950000-0x0000000006B12000-memory.dmp

        Filesize

        1.8MB

      • memory/2264-1112-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

        Filesize

        64KB

      • memory/2264-1111-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

        Filesize

        64KB

      • memory/2264-1110-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

        Filesize

        64KB

      • memory/2264-204-0x0000000004D20000-0x0000000004D5F000-memory.dmp

        Filesize

        252KB

      • memory/2264-1109-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

        Filesize

        64KB

      • memory/2264-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/2264-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/2264-1105-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

        Filesize

        64KB

      • memory/2264-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/2264-1103-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/2264-1101-0x0000000005480000-0x0000000005A98000-memory.dmp

        Filesize

        6.1MB

      • memory/2264-228-0x0000000004D20000-0x0000000004D5F000-memory.dmp

        Filesize

        252KB

      • memory/2264-214-0x0000000004D20000-0x0000000004D5F000-memory.dmp

        Filesize

        252KB

      • memory/2264-222-0x0000000004D20000-0x0000000004D5F000-memory.dmp

        Filesize

        252KB

      • memory/2264-224-0x0000000004D20000-0x0000000004D5F000-memory.dmp

        Filesize

        252KB

      • memory/2264-220-0x0000000004D20000-0x0000000004D5F000-memory.dmp

        Filesize

        252KB

      • memory/2264-191-0x0000000000720000-0x000000000076B000-memory.dmp

        Filesize

        300KB

      • memory/2264-193-0x0000000004D20000-0x0000000004D5F000-memory.dmp

        Filesize

        252KB

      • memory/2264-194-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

        Filesize

        64KB

      • memory/2264-196-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

        Filesize

        64KB

      • memory/2264-195-0x0000000004D20000-0x0000000004D5F000-memory.dmp

        Filesize

        252KB

      • memory/2264-192-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

        Filesize

        64KB

      • memory/2264-198-0x0000000004D20000-0x0000000004D5F000-memory.dmp

        Filesize

        252KB

      • memory/2264-218-0x0000000004D20000-0x0000000004D5F000-memory.dmp

        Filesize

        252KB

      • memory/2264-1116-0x0000000007230000-0x0000000007280000-memory.dmp

        Filesize

        320KB

      • memory/2264-216-0x0000000004D20000-0x0000000004D5F000-memory.dmp

        Filesize

        252KB

      • memory/2264-206-0x0000000004D20000-0x0000000004D5F000-memory.dmp

        Filesize

        252KB

      • memory/2264-208-0x0000000004D20000-0x0000000004D5F000-memory.dmp

        Filesize

        252KB

      • memory/2264-210-0x0000000004D20000-0x0000000004D5F000-memory.dmp

        Filesize

        252KB

      • memory/2264-212-0x0000000004D20000-0x0000000004D5F000-memory.dmp

        Filesize

        252KB

      • memory/2556-181-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/2556-168-0x0000000002450000-0x0000000002462000-memory.dmp

        Filesize

        72KB

      • memory/2556-148-0x0000000004F50000-0x00000000054F4000-memory.dmp

        Filesize

        5.6MB

      • memory/2556-152-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/2556-150-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/2556-186-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/2556-184-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/2556-183-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/2556-182-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/2556-151-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/2556-153-0x0000000002450000-0x0000000002462000-memory.dmp

        Filesize

        72KB

      • memory/2556-180-0x0000000002450000-0x0000000002462000-memory.dmp

        Filesize

        72KB

      • memory/2556-178-0x0000000002450000-0x0000000002462000-memory.dmp

        Filesize

        72KB

      • memory/2556-176-0x0000000002450000-0x0000000002462000-memory.dmp

        Filesize

        72KB

      • memory/2556-174-0x0000000002450000-0x0000000002462000-memory.dmp

        Filesize

        72KB

      • memory/2556-172-0x0000000002450000-0x0000000002462000-memory.dmp

        Filesize

        72KB

      • memory/2556-170-0x0000000002450000-0x0000000002462000-memory.dmp

        Filesize

        72KB

      • memory/2556-166-0x0000000002450000-0x0000000002462000-memory.dmp

        Filesize

        72KB

      • memory/2556-164-0x0000000002450000-0x0000000002462000-memory.dmp

        Filesize

        72KB

      • memory/2556-162-0x0000000002450000-0x0000000002462000-memory.dmp

        Filesize

        72KB

      • memory/2556-160-0x0000000002450000-0x0000000002462000-memory.dmp

        Filesize

        72KB

      • memory/2556-158-0x0000000002450000-0x0000000002462000-memory.dmp

        Filesize

        72KB

      • memory/2556-156-0x0000000002450000-0x0000000002462000-memory.dmp

        Filesize

        72KB

      • memory/2556-149-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/2556-154-0x0000000002450000-0x0000000002462000-memory.dmp

        Filesize

        72KB

      • memory/4440-1122-0x0000000000DA0000-0x0000000000DD2000-memory.dmp

        Filesize

        200KB

      • memory/4440-1123-0x00000000056B0000-0x00000000056C0000-memory.dmp

        Filesize

        64KB