Analysis

  • max time kernel
    98s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 23:40

General

  • Target

    7d4e79a38c2299121cc5d2e0f0188f737b3bff254d92ac2537b67e3fedc23dab.exe

  • Size

    700KB

  • MD5

    ab7f5435838496f6b4eb82ab1035054d

  • SHA1

    df8898604351d3584ca692ed185bc18d64c0f1bb

  • SHA256

    7d4e79a38c2299121cc5d2e0f0188f737b3bff254d92ac2537b67e3fedc23dab

  • SHA512

    b507708494deff72ab3e5f58e374eca2bd81563a926cfa5072e5f5370c6cc3a1f11766a3cafa315521b0060f5aff5bffc5a58ab3c51f06cb8ce457de612d997a

  • SSDEEP

    12288:fMrry90NhpB3Tyz9DzPcA/mN7fYO/lFVvvhTmrx54T:QyclI/QfYOHVXIre

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d4e79a38c2299121cc5d2e0f0188f737b3bff254d92ac2537b67e3fedc23dab.exe
    "C:\Users\Admin\AppData\Local\Temp\7d4e79a38c2299121cc5d2e0f0188f737b3bff254d92ac2537b67e3fedc23dab.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4256
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un301800.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un301800.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4276
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4981.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4981.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2520
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2520 -s 1080
          4⤵
          • Program crash
          PID:2584
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4884.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4884.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2136
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 1720
          4⤵
          • Program crash
          PID:4932
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si515407.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si515407.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2128
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2520 -ip 2520
    1⤵
      PID:752
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2136 -ip 2136
      1⤵
        PID:3284

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si515407.exe
        Filesize

        175KB

        MD5

        768155808f7a913f7b5c4464f5932ddf

        SHA1

        d9e39d8b2b9f921a552716f99ca82d35815b71ed

        SHA256

        15a2819f1044f460f93500269ff87e9e2bad99aaed7b4a76a7e174ef35cdbad9

        SHA512

        568754dd767ee7245d51b7bf1499dae6eea17232c88510e2e60be27115d79386543a15b96f379617b8f7ff3dc97716b54d4a19a52684fe48a82c3e441cb82249

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si515407.exe
        Filesize

        175KB

        MD5

        768155808f7a913f7b5c4464f5932ddf

        SHA1

        d9e39d8b2b9f921a552716f99ca82d35815b71ed

        SHA256

        15a2819f1044f460f93500269ff87e9e2bad99aaed7b4a76a7e174ef35cdbad9

        SHA512

        568754dd767ee7245d51b7bf1499dae6eea17232c88510e2e60be27115d79386543a15b96f379617b8f7ff3dc97716b54d4a19a52684fe48a82c3e441cb82249

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un301800.exe
        Filesize

        558KB

        MD5

        749ce5c2236df71b4b00d9e50fd70a85

        SHA1

        8f0ff0a49151ecfb6a578695da27eebfb036a147

        SHA256

        681f59538bc1f1f7aaa59d117a7cc2b62e9d8f8d85aab6757e378ebed558c6ec

        SHA512

        78494049ad0846a73877860d4c614bbb68c2e0ab8c4ffc77294150701db6ea73d77dbdfdfbb8c45a3623eeb851e6df3e73b8c2409a9c3a5dc0ae8c8b4bea35c6

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un301800.exe
        Filesize

        558KB

        MD5

        749ce5c2236df71b4b00d9e50fd70a85

        SHA1

        8f0ff0a49151ecfb6a578695da27eebfb036a147

        SHA256

        681f59538bc1f1f7aaa59d117a7cc2b62e9d8f8d85aab6757e378ebed558c6ec

        SHA512

        78494049ad0846a73877860d4c614bbb68c2e0ab8c4ffc77294150701db6ea73d77dbdfdfbb8c45a3623eeb851e6df3e73b8c2409a9c3a5dc0ae8c8b4bea35c6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4981.exe
        Filesize

        307KB

        MD5

        ba1858118ef899bd7b54477f39d555d2

        SHA1

        8e8c3dbf602d3759132f1693a74561b417d59f54

        SHA256

        e9c9caf23b25488ab8e8a2382fa18e001b10ade0db53a245b4185560e2dca5b4

        SHA512

        7b849377b2addc3cd4816105b0da99a4453f5b57d4ee6c98cdfedb8685c099d741c50caa455ac32abcaf60dad51d4514c19efa196afe327b8377751adcfca7ba

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4981.exe
        Filesize

        307KB

        MD5

        ba1858118ef899bd7b54477f39d555d2

        SHA1

        8e8c3dbf602d3759132f1693a74561b417d59f54

        SHA256

        e9c9caf23b25488ab8e8a2382fa18e001b10ade0db53a245b4185560e2dca5b4

        SHA512

        7b849377b2addc3cd4816105b0da99a4453f5b57d4ee6c98cdfedb8685c099d741c50caa455ac32abcaf60dad51d4514c19efa196afe327b8377751adcfca7ba

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4884.exe
        Filesize

        365KB

        MD5

        d326eaa9e14c4d324419d6bf82897614

        SHA1

        daed4c5b520afa0404e34d0398afc0421c9b4d2e

        SHA256

        1a715dcadb85592503a3a7a27087cea23161f7bfcc7f05f377626b5086e0cbd1

        SHA512

        a10fd3261c00f60c95e20c3581b2f660d9d281ad3086b363b9e2b8054e077ff98787781bff57e2fc03167983702e6d33a31996cf095443611b4d876cbd3b665e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4884.exe
        Filesize

        365KB

        MD5

        d326eaa9e14c4d324419d6bf82897614

        SHA1

        daed4c5b520afa0404e34d0398afc0421c9b4d2e

        SHA256

        1a715dcadb85592503a3a7a27087cea23161f7bfcc7f05f377626b5086e0cbd1

        SHA512

        a10fd3261c00f60c95e20c3581b2f660d9d281ad3086b363b9e2b8054e077ff98787781bff57e2fc03167983702e6d33a31996cf095443611b4d876cbd3b665e

      • memory/2128-1123-0x0000000004F40000-0x0000000004F50000-memory.dmp
        Filesize

        64KB

      • memory/2128-1122-0x00000000005E0000-0x0000000000612000-memory.dmp
        Filesize

        200KB

      • memory/2136-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp
        Filesize

        1.0MB

      • memory/2136-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp
        Filesize

        240KB

      • memory/2136-1116-0x0000000007430000-0x0000000007480000-memory.dmp
        Filesize

        320KB

      • memory/2136-1115-0x00000000073B0000-0x0000000007426000-memory.dmp
        Filesize

        472KB

      • memory/2136-1114-0x0000000004D40000-0x0000000004D50000-memory.dmp
        Filesize

        64KB

      • memory/2136-1113-0x0000000006B30000-0x000000000705C000-memory.dmp
        Filesize

        5.2MB

      • memory/2136-1112-0x0000000006950000-0x0000000006B12000-memory.dmp
        Filesize

        1.8MB

      • memory/2136-1111-0x0000000004D40000-0x0000000004D50000-memory.dmp
        Filesize

        64KB

      • memory/2136-1110-0x0000000004D40000-0x0000000004D50000-memory.dmp
        Filesize

        64KB

      • memory/2136-1109-0x0000000004D40000-0x0000000004D50000-memory.dmp
        Filesize

        64KB

      • memory/2136-1107-0x0000000006720000-0x00000000067B2000-memory.dmp
        Filesize

        584KB

      • memory/2136-1106-0x0000000005F50000-0x0000000005FB6000-memory.dmp
        Filesize

        408KB

      • memory/2136-1105-0x0000000004D40000-0x0000000004D50000-memory.dmp
        Filesize

        64KB

      • memory/2136-1103-0x0000000005C40000-0x0000000005C52000-memory.dmp
        Filesize

        72KB

      • memory/2136-1101-0x0000000005480000-0x0000000005A98000-memory.dmp
        Filesize

        6.1MB

      • memory/2136-228-0x0000000005300000-0x000000000533F000-memory.dmp
        Filesize

        252KB

      • memory/2136-226-0x0000000005300000-0x000000000533F000-memory.dmp
        Filesize

        252KB

      • memory/2136-224-0x0000000005300000-0x000000000533F000-memory.dmp
        Filesize

        252KB

      • memory/2136-222-0x0000000005300000-0x000000000533F000-memory.dmp
        Filesize

        252KB

      • memory/2136-220-0x0000000005300000-0x000000000533F000-memory.dmp
        Filesize

        252KB

      • memory/2136-218-0x0000000005300000-0x000000000533F000-memory.dmp
        Filesize

        252KB

      • memory/2136-192-0x0000000004D40000-0x0000000004D50000-memory.dmp
        Filesize

        64KB

      • memory/2136-193-0x0000000005300000-0x000000000533F000-memory.dmp
        Filesize

        252KB

      • memory/2136-195-0x0000000005300000-0x000000000533F000-memory.dmp
        Filesize

        252KB

      • memory/2136-196-0x0000000004D40000-0x0000000004D50000-memory.dmp
        Filesize

        64KB

      • memory/2136-194-0x0000000004D40000-0x0000000004D50000-memory.dmp
        Filesize

        64KB

      • memory/2136-191-0x0000000000720000-0x000000000076B000-memory.dmp
        Filesize

        300KB

      • memory/2136-198-0x0000000005300000-0x000000000533F000-memory.dmp
        Filesize

        252KB

      • memory/2136-200-0x0000000005300000-0x000000000533F000-memory.dmp
        Filesize

        252KB

      • memory/2136-202-0x0000000005300000-0x000000000533F000-memory.dmp
        Filesize

        252KB

      • memory/2136-204-0x0000000005300000-0x000000000533F000-memory.dmp
        Filesize

        252KB

      • memory/2136-206-0x0000000005300000-0x000000000533F000-memory.dmp
        Filesize

        252KB

      • memory/2136-208-0x0000000005300000-0x000000000533F000-memory.dmp
        Filesize

        252KB

      • memory/2136-210-0x0000000005300000-0x000000000533F000-memory.dmp
        Filesize

        252KB

      • memory/2136-212-0x0000000005300000-0x000000000533F000-memory.dmp
        Filesize

        252KB

      • memory/2136-214-0x0000000005300000-0x000000000533F000-memory.dmp
        Filesize

        252KB

      • memory/2136-216-0x0000000005300000-0x000000000533F000-memory.dmp
        Filesize

        252KB

      • memory/2520-174-0x0000000002930000-0x0000000002942000-memory.dmp
        Filesize

        72KB

      • memory/2520-183-0x0000000002400000-0x0000000002410000-memory.dmp
        Filesize

        64KB

      • memory/2520-153-0x0000000002930000-0x0000000002942000-memory.dmp
        Filesize

        72KB

      • memory/2520-184-0x0000000002400000-0x0000000002410000-memory.dmp
        Filesize

        64KB

      • memory/2520-172-0x0000000002930000-0x0000000002942000-memory.dmp
        Filesize

        72KB

      • memory/2520-182-0x0000000002400000-0x0000000002410000-memory.dmp
        Filesize

        64KB

      • memory/2520-181-0x0000000000400000-0x000000000070F000-memory.dmp
        Filesize

        3.1MB

      • memory/2520-170-0x0000000002930000-0x0000000002942000-memory.dmp
        Filesize

        72KB

      • memory/2520-180-0x0000000002930000-0x0000000002942000-memory.dmp
        Filesize

        72KB

      • memory/2520-156-0x0000000002930000-0x0000000002942000-memory.dmp
        Filesize

        72KB

      • memory/2520-178-0x0000000002930000-0x0000000002942000-memory.dmp
        Filesize

        72KB

      • memory/2520-176-0x0000000002930000-0x0000000002942000-memory.dmp
        Filesize

        72KB

      • memory/2520-186-0x0000000000400000-0x000000000070F000-memory.dmp
        Filesize

        3.1MB

      • memory/2520-154-0x0000000002930000-0x0000000002942000-memory.dmp
        Filesize

        72KB

      • memory/2520-152-0x0000000002400000-0x0000000002410000-memory.dmp
        Filesize

        64KB

      • memory/2520-168-0x0000000002930000-0x0000000002942000-memory.dmp
        Filesize

        72KB

      • memory/2520-166-0x0000000002930000-0x0000000002942000-memory.dmp
        Filesize

        72KB

      • memory/2520-164-0x0000000002930000-0x0000000002942000-memory.dmp
        Filesize

        72KB

      • memory/2520-162-0x0000000002930000-0x0000000002942000-memory.dmp
        Filesize

        72KB

      • memory/2520-160-0x0000000002930000-0x0000000002942000-memory.dmp
        Filesize

        72KB

      • memory/2520-158-0x0000000002930000-0x0000000002942000-memory.dmp
        Filesize

        72KB

      • memory/2520-151-0x0000000002400000-0x0000000002410000-memory.dmp
        Filesize

        64KB

      • memory/2520-150-0x0000000002400000-0x0000000002410000-memory.dmp
        Filesize

        64KB

      • memory/2520-149-0x0000000004CF0000-0x0000000005294000-memory.dmp
        Filesize

        5.6MB

      • memory/2520-148-0x0000000000710000-0x000000000073D000-memory.dmp
        Filesize

        180KB