Analysis

  • max time kernel
    136s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 23:38

General

  • Target

    0594b521267931f61e1f7d4194285a2658769b0821ccfcd8c45610a315bd52d6.exe

  • Size

    700KB

  • MD5

    21f7595440a2c904d444be1ac3644714

  • SHA1

    e730ac84e9ff61b97f87ced4f697af2897baafb9

  • SHA256

    0594b521267931f61e1f7d4194285a2658769b0821ccfcd8c45610a315bd52d6

  • SHA512

    13f29fadc1fec149a1fe69f313c96092de0425f682319efaefb69b20989e02f8a71d845e84bc85a236a8da9d859b965bb431130006e6eb02756ed28c83fa93d7

  • SSDEEP

    12288:8Mr1y905N2wMwJGsd4TJDozZpIhQsw9DMjcABzE0J22aiZNGJBJxsPuYiVJTp:xyc3M42JDcFsTBzE0J2biZNGJBJxsOJF

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0594b521267931f61e1f7d4194285a2658769b0821ccfcd8c45610a315bd52d6.exe
    "C:\Users\Admin\AppData\Local\Temp\0594b521267931f61e1f7d4194285a2658769b0821ccfcd8c45610a315bd52d6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4936
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un134414.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un134414.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4504
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6517.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6517.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1172
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1172 -s 1088
          4⤵
          • Program crash
          PID:4232
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5941.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5941.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1944
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 1808
          4⤵
          • Program crash
          PID:4012
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si849216.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si849216.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1376
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1172 -ip 1172
    1⤵
      PID:1088
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1944 -ip 1944
      1⤵
        PID:4660
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:3776

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si849216.exe

        Filesize

        175KB

        MD5

        78f8718fe6a1ec87e2e78ab4156fd781

        SHA1

        a8c053fb4a58df290da66d492ef628d3f3f08797

        SHA256

        3d38eb03c50eb281b776c9ed12151c099186b7c8572955fee340e86ff59a03b9

        SHA512

        662304e8d8069002d116a42977e9a5cdb0515aa090df79382f866865e8b15ee6350dc10ec529a4fd59220af71d03fa5e31c421d95f202b93544ca6f7ca8eb57f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si849216.exe

        Filesize

        175KB

        MD5

        78f8718fe6a1ec87e2e78ab4156fd781

        SHA1

        a8c053fb4a58df290da66d492ef628d3f3f08797

        SHA256

        3d38eb03c50eb281b776c9ed12151c099186b7c8572955fee340e86ff59a03b9

        SHA512

        662304e8d8069002d116a42977e9a5cdb0515aa090df79382f866865e8b15ee6350dc10ec529a4fd59220af71d03fa5e31c421d95f202b93544ca6f7ca8eb57f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un134414.exe

        Filesize

        558KB

        MD5

        03f52e02e720cb7cde34a3a653b0e648

        SHA1

        7384ae64fa6337d6f1546ed8a7378a33a9b984ff

        SHA256

        7af1c0e8b8b3aa771ec81f520bb486df1cb600e140ccce647788cf235fc93616

        SHA512

        7182d324a9ad0a7a9c9b61f7ee9f67d155b55527cc6468ef0bf64edd76a252f60e92b3f36ecf2c3948d9abad1108478fc98ad4770ea8269ea99772564eb633b3

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un134414.exe

        Filesize

        558KB

        MD5

        03f52e02e720cb7cde34a3a653b0e648

        SHA1

        7384ae64fa6337d6f1546ed8a7378a33a9b984ff

        SHA256

        7af1c0e8b8b3aa771ec81f520bb486df1cb600e140ccce647788cf235fc93616

        SHA512

        7182d324a9ad0a7a9c9b61f7ee9f67d155b55527cc6468ef0bf64edd76a252f60e92b3f36ecf2c3948d9abad1108478fc98ad4770ea8269ea99772564eb633b3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6517.exe

        Filesize

        307KB

        MD5

        1832d8bb725fbd3aa3858bc51aa8eaab

        SHA1

        a2486ab29d3f1002d9b8b5db7f39e84166114f1f

        SHA256

        ea96d0b64cac8c4777a56c093fcdd7409f741cf7ddb42430f6c009950807cb1d

        SHA512

        4fc57ebee1cb20ca83c986391d6b615ca9970c40ad014c71565fa20fe452d4482103a8bc1860b3234c583e601b919336efcda7ea27069517e2a77d7d6a74f403

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6517.exe

        Filesize

        307KB

        MD5

        1832d8bb725fbd3aa3858bc51aa8eaab

        SHA1

        a2486ab29d3f1002d9b8b5db7f39e84166114f1f

        SHA256

        ea96d0b64cac8c4777a56c093fcdd7409f741cf7ddb42430f6c009950807cb1d

        SHA512

        4fc57ebee1cb20ca83c986391d6b615ca9970c40ad014c71565fa20fe452d4482103a8bc1860b3234c583e601b919336efcda7ea27069517e2a77d7d6a74f403

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5941.exe

        Filesize

        365KB

        MD5

        209597670af5eddf81e4875c2d29c0c2

        SHA1

        7f13881819708e170f3557c8d0c6120304192adb

        SHA256

        cd4837ebc29499d1025c6cfd9e551bbf4fa550739e19c9424ff6985e2f64a883

        SHA512

        e8fcf610c1953374568e8cd9c267c654052bd815670b1ae83f5533675043bbfab79a00c044eb1e5f6db87afbeccbee7313ea0c044eb1fda762fb30a0bb8a7a4d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5941.exe

        Filesize

        365KB

        MD5

        209597670af5eddf81e4875c2d29c0c2

        SHA1

        7f13881819708e170f3557c8d0c6120304192adb

        SHA256

        cd4837ebc29499d1025c6cfd9e551bbf4fa550739e19c9424ff6985e2f64a883

        SHA512

        e8fcf610c1953374568e8cd9c267c654052bd815670b1ae83f5533675043bbfab79a00c044eb1e5f6db87afbeccbee7313ea0c044eb1fda762fb30a0bb8a7a4d

      • memory/1172-148-0x0000000004DF0000-0x0000000005394000-memory.dmp

        Filesize

        5.6MB

      • memory/1172-149-0x00000000008F0000-0x000000000091D000-memory.dmp

        Filesize

        180KB

      • memory/1172-150-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

        Filesize

        64KB

      • memory/1172-152-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

        Filesize

        64KB

      • memory/1172-154-0x00000000026E0000-0x00000000026F2000-memory.dmp

        Filesize

        72KB

      • memory/1172-151-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

        Filesize

        64KB

      • memory/1172-153-0x00000000026E0000-0x00000000026F2000-memory.dmp

        Filesize

        72KB

      • memory/1172-156-0x00000000026E0000-0x00000000026F2000-memory.dmp

        Filesize

        72KB

      • memory/1172-158-0x00000000026E0000-0x00000000026F2000-memory.dmp

        Filesize

        72KB

      • memory/1172-160-0x00000000026E0000-0x00000000026F2000-memory.dmp

        Filesize

        72KB

      • memory/1172-162-0x00000000026E0000-0x00000000026F2000-memory.dmp

        Filesize

        72KB

      • memory/1172-166-0x00000000026E0000-0x00000000026F2000-memory.dmp

        Filesize

        72KB

      • memory/1172-164-0x00000000026E0000-0x00000000026F2000-memory.dmp

        Filesize

        72KB

      • memory/1172-168-0x00000000026E0000-0x00000000026F2000-memory.dmp

        Filesize

        72KB

      • memory/1172-170-0x00000000026E0000-0x00000000026F2000-memory.dmp

        Filesize

        72KB

      • memory/1172-172-0x00000000026E0000-0x00000000026F2000-memory.dmp

        Filesize

        72KB

      • memory/1172-174-0x00000000026E0000-0x00000000026F2000-memory.dmp

        Filesize

        72KB

      • memory/1172-176-0x00000000026E0000-0x00000000026F2000-memory.dmp

        Filesize

        72KB

      • memory/1172-178-0x00000000026E0000-0x00000000026F2000-memory.dmp

        Filesize

        72KB

      • memory/1172-180-0x00000000026E0000-0x00000000026F2000-memory.dmp

        Filesize

        72KB

      • memory/1172-181-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/1172-182-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

        Filesize

        64KB

      • memory/1172-183-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

        Filesize

        64KB

      • memory/1172-184-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

        Filesize

        64KB

      • memory/1172-186-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/1376-1123-0x0000000000040000-0x0000000000072000-memory.dmp

        Filesize

        200KB

      • memory/1376-1124-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

        Filesize

        64KB

      • memory/1944-194-0x00000000028A0000-0x00000000028DF000-memory.dmp

        Filesize

        252KB

      • memory/1944-308-0x0000000002740000-0x0000000002750000-memory.dmp

        Filesize

        64KB

      • memory/1944-196-0x00000000028A0000-0x00000000028DF000-memory.dmp

        Filesize

        252KB

      • memory/1944-198-0x00000000028A0000-0x00000000028DF000-memory.dmp

        Filesize

        252KB

      • memory/1944-200-0x00000000028A0000-0x00000000028DF000-memory.dmp

        Filesize

        252KB

      • memory/1944-202-0x00000000028A0000-0x00000000028DF000-memory.dmp

        Filesize

        252KB

      • memory/1944-204-0x00000000028A0000-0x00000000028DF000-memory.dmp

        Filesize

        252KB

      • memory/1944-206-0x00000000028A0000-0x00000000028DF000-memory.dmp

        Filesize

        252KB

      • memory/1944-208-0x00000000028A0000-0x00000000028DF000-memory.dmp

        Filesize

        252KB

      • memory/1944-210-0x00000000028A0000-0x00000000028DF000-memory.dmp

        Filesize

        252KB

      • memory/1944-212-0x00000000028A0000-0x00000000028DF000-memory.dmp

        Filesize

        252KB

      • memory/1944-214-0x00000000028A0000-0x00000000028DF000-memory.dmp

        Filesize

        252KB

      • memory/1944-216-0x00000000028A0000-0x00000000028DF000-memory.dmp

        Filesize

        252KB

      • memory/1944-218-0x00000000028A0000-0x00000000028DF000-memory.dmp

        Filesize

        252KB

      • memory/1944-220-0x00000000028A0000-0x00000000028DF000-memory.dmp

        Filesize

        252KB

      • memory/1944-222-0x00000000028A0000-0x00000000028DF000-memory.dmp

        Filesize

        252KB

      • memory/1944-224-0x00000000028A0000-0x00000000028DF000-memory.dmp

        Filesize

        252KB

      • memory/1944-305-0x0000000000720000-0x000000000076B000-memory.dmp

        Filesize

        300KB

      • memory/1944-306-0x0000000002740000-0x0000000002750000-memory.dmp

        Filesize

        64KB

      • memory/1944-191-0x00000000028A0000-0x00000000028DF000-memory.dmp

        Filesize

        252KB

      • memory/1944-311-0x0000000002740000-0x0000000002750000-memory.dmp

        Filesize

        64KB

      • memory/1944-1101-0x0000000005320000-0x0000000005938000-memory.dmp

        Filesize

        6.1MB

      • memory/1944-1102-0x00000000059C0000-0x0000000005ACA000-memory.dmp

        Filesize

        1.0MB

      • memory/1944-1103-0x0000000005B00000-0x0000000005B12000-memory.dmp

        Filesize

        72KB

      • memory/1944-1104-0x0000000005B20000-0x0000000005B5C000-memory.dmp

        Filesize

        240KB

      • memory/1944-1105-0x0000000002740000-0x0000000002750000-memory.dmp

        Filesize

        64KB

      • memory/1944-1107-0x0000000002740000-0x0000000002750000-memory.dmp

        Filesize

        64KB

      • memory/1944-1108-0x0000000002740000-0x0000000002750000-memory.dmp

        Filesize

        64KB

      • memory/1944-1109-0x0000000002740000-0x0000000002750000-memory.dmp

        Filesize

        64KB

      • memory/1944-1110-0x0000000002740000-0x0000000002750000-memory.dmp

        Filesize

        64KB

      • memory/1944-1111-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/1944-1112-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/1944-1113-0x0000000006950000-0x00000000069C6000-memory.dmp

        Filesize

        472KB

      • memory/1944-192-0x00000000028A0000-0x00000000028DF000-memory.dmp

        Filesize

        252KB

      • memory/1944-1114-0x00000000069E0000-0x0000000006A30000-memory.dmp

        Filesize

        320KB

      • memory/1944-1116-0x0000000006A50000-0x0000000006C12000-memory.dmp

        Filesize

        1.8MB

      • memory/1944-1117-0x0000000006C20000-0x000000000714C000-memory.dmp

        Filesize

        5.2MB