Analysis

  • max time kernel
    97s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 23:52

General

  • Target

    95d69bd4060f152d8f73e81419f868d203c2561f900a62ec5abe158f43c49efc.exe

  • Size

    700KB

  • MD5

    fedfd81e5b8bba4b330f5746747c194d

  • SHA1

    b66954d5fd3e10d634a2b0eaf66d51e0a3b6ffe2

  • SHA256

    95d69bd4060f152d8f73e81419f868d203c2561f900a62ec5abe158f43c49efc

  • SHA512

    50bcae607fe8f7db5fcf89c4272bae09e8794e4e5e98392aff5f6e798de44fd56209d190124b50c434cec4a8bdb911e6c9ee473a67bc3d5c1ac799c008f7bda3

  • SSDEEP

    12288:TMrZy90bwi++S1nUcP33ZC9DMJcA6GNTqlNTQ4pD1tu606OQ3X:qyR1nU03p6Eq/lD1U83X

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\95d69bd4060f152d8f73e81419f868d203c2561f900a62ec5abe158f43c49efc.exe
    "C:\Users\Admin\AppData\Local\Temp\95d69bd4060f152d8f73e81419f868d203c2561f900a62ec5abe158f43c49efc.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5036
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un660355.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un660355.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:892
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5437.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5437.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1304
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1304 -s 1084
          4⤵
          • Program crash
          PID:212
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5886.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5886.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1860
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 1196
          4⤵
          • Program crash
          PID:4632
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si707290.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si707290.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2152
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1304 -ip 1304
    1⤵
      PID:1480
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1860 -ip 1860
      1⤵
        PID:3032

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si707290.exe
        Filesize

        175KB

        MD5

        e96ce6a1befabd2556a21db4df61be57

        SHA1

        108fee5b86678188e893557a02653d08be3f24e6

        SHA256

        0f66fa12c7aaaa6cb0a6640a07fb3454a253141a0dfa719e47b5176af172a011

        SHA512

        63663d18ef23c22872923a399101d6598e5779e88f31861bd02ff9cb02cce0c42eb05109f1ae11466292caabf84a6eb78400d92aa164f2581679d79fa4ea018e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si707290.exe
        Filesize

        175KB

        MD5

        e96ce6a1befabd2556a21db4df61be57

        SHA1

        108fee5b86678188e893557a02653d08be3f24e6

        SHA256

        0f66fa12c7aaaa6cb0a6640a07fb3454a253141a0dfa719e47b5176af172a011

        SHA512

        63663d18ef23c22872923a399101d6598e5779e88f31861bd02ff9cb02cce0c42eb05109f1ae11466292caabf84a6eb78400d92aa164f2581679d79fa4ea018e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un660355.exe
        Filesize

        558KB

        MD5

        03bf700d7d6d00907d1f4ced2c946041

        SHA1

        af368e1b9dbbe76cda3bae0841a75885470375ab

        SHA256

        00e9e38caaf02e2c40c55f13de7235d6e80be34583fafae016eff03721b1959b

        SHA512

        b857cac06e680375b87820b95503d99e6af0d91b1766ca984abca80c525060124676fc2d6735b7bea7df9ee0494dbfd2313dfdc0a4d1362858929d383699fb34

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un660355.exe
        Filesize

        558KB

        MD5

        03bf700d7d6d00907d1f4ced2c946041

        SHA1

        af368e1b9dbbe76cda3bae0841a75885470375ab

        SHA256

        00e9e38caaf02e2c40c55f13de7235d6e80be34583fafae016eff03721b1959b

        SHA512

        b857cac06e680375b87820b95503d99e6af0d91b1766ca984abca80c525060124676fc2d6735b7bea7df9ee0494dbfd2313dfdc0a4d1362858929d383699fb34

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5437.exe
        Filesize

        307KB

        MD5

        47ccbbcd85f9fd75930305b4180b4c78

        SHA1

        07c51a48397a14e9a0ca86a7425f579d2356e6af

        SHA256

        f13cddb8bb036d8eb9b8e0183d54577b9d026abf3f37aa7e33309109637e9634

        SHA512

        2e5763680046cdcad8ac8dd9e744d2ffeb37a5be66365bb3709d2410688103236866a8253db5997f11d24b538b870371934fb3eb9f3f8612f6c426d3b1c37ace

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5437.exe
        Filesize

        307KB

        MD5

        47ccbbcd85f9fd75930305b4180b4c78

        SHA1

        07c51a48397a14e9a0ca86a7425f579d2356e6af

        SHA256

        f13cddb8bb036d8eb9b8e0183d54577b9d026abf3f37aa7e33309109637e9634

        SHA512

        2e5763680046cdcad8ac8dd9e744d2ffeb37a5be66365bb3709d2410688103236866a8253db5997f11d24b538b870371934fb3eb9f3f8612f6c426d3b1c37ace

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5886.exe
        Filesize

        365KB

        MD5

        ac36d52f4b1c397efbda5f64d2fd5a90

        SHA1

        754c5ca6f4d3e0f47c480e9272a9c772d63b302f

        SHA256

        e35c12d7ba2dea8a8834223791be8336ce6d9b08f000594a59e08cca682add52

        SHA512

        68f5ce3cd7fb2af80c8d528ad86f0ded094c8dd6ebae92cece04cd8cf676cf93a7b44f4d060e22498757a84c717efd7fba61cf4e31c9bb006280992c69e6ed31

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5886.exe
        Filesize

        365KB

        MD5

        ac36d52f4b1c397efbda5f64d2fd5a90

        SHA1

        754c5ca6f4d3e0f47c480e9272a9c772d63b302f

        SHA256

        e35c12d7ba2dea8a8834223791be8336ce6d9b08f000594a59e08cca682add52

        SHA512

        68f5ce3cd7fb2af80c8d528ad86f0ded094c8dd6ebae92cece04cd8cf676cf93a7b44f4d060e22498757a84c717efd7fba61cf4e31c9bb006280992c69e6ed31

      • memory/1304-148-0x0000000000810000-0x000000000083D000-memory.dmp
        Filesize

        180KB

      • memory/1304-149-0x0000000004E00000-0x00000000053A4000-memory.dmp
        Filesize

        5.6MB

      • memory/1304-150-0x0000000002590000-0x00000000025A2000-memory.dmp
        Filesize

        72KB

      • memory/1304-151-0x0000000002590000-0x00000000025A2000-memory.dmp
        Filesize

        72KB

      • memory/1304-153-0x0000000002590000-0x00000000025A2000-memory.dmp
        Filesize

        72KB

      • memory/1304-155-0x0000000002590000-0x00000000025A2000-memory.dmp
        Filesize

        72KB

      • memory/1304-157-0x0000000002590000-0x00000000025A2000-memory.dmp
        Filesize

        72KB

      • memory/1304-159-0x0000000002590000-0x00000000025A2000-memory.dmp
        Filesize

        72KB

      • memory/1304-161-0x0000000002590000-0x00000000025A2000-memory.dmp
        Filesize

        72KB

      • memory/1304-167-0x0000000002590000-0x00000000025A2000-memory.dmp
        Filesize

        72KB

      • memory/1304-165-0x0000000002590000-0x00000000025A2000-memory.dmp
        Filesize

        72KB

      • memory/1304-163-0x0000000002590000-0x00000000025A2000-memory.dmp
        Filesize

        72KB

      • memory/1304-169-0x0000000002590000-0x00000000025A2000-memory.dmp
        Filesize

        72KB

      • memory/1304-171-0x0000000002590000-0x00000000025A2000-memory.dmp
        Filesize

        72KB

      • memory/1304-173-0x0000000002590000-0x00000000025A2000-memory.dmp
        Filesize

        72KB

      • memory/1304-175-0x0000000002590000-0x00000000025A2000-memory.dmp
        Filesize

        72KB

      • memory/1304-177-0x0000000002590000-0x00000000025A2000-memory.dmp
        Filesize

        72KB

      • memory/1304-178-0x0000000004DF0000-0x0000000004E00000-memory.dmp
        Filesize

        64KB

      • memory/1304-179-0x0000000004DF0000-0x0000000004E00000-memory.dmp
        Filesize

        64KB

      • memory/1304-180-0x0000000004DF0000-0x0000000004E00000-memory.dmp
        Filesize

        64KB

      • memory/1304-181-0x0000000000400000-0x000000000070F000-memory.dmp
        Filesize

        3.1MB

      • memory/1304-183-0x0000000004DF0000-0x0000000004E00000-memory.dmp
        Filesize

        64KB

      • memory/1304-184-0x0000000004DF0000-0x0000000004E00000-memory.dmp
        Filesize

        64KB

      • memory/1304-185-0x0000000004DF0000-0x0000000004E00000-memory.dmp
        Filesize

        64KB

      • memory/1304-186-0x0000000000400000-0x000000000070F000-memory.dmp
        Filesize

        3.1MB

      • memory/1860-191-0x0000000002490000-0x00000000024CF000-memory.dmp
        Filesize

        252KB

      • memory/1860-192-0x0000000002490000-0x00000000024CF000-memory.dmp
        Filesize

        252KB

      • memory/1860-194-0x0000000002490000-0x00000000024CF000-memory.dmp
        Filesize

        252KB

      • memory/1860-196-0x0000000002490000-0x00000000024CF000-memory.dmp
        Filesize

        252KB

      • memory/1860-198-0x0000000002490000-0x00000000024CF000-memory.dmp
        Filesize

        252KB

      • memory/1860-200-0x0000000002490000-0x00000000024CF000-memory.dmp
        Filesize

        252KB

      • memory/1860-202-0x0000000002490000-0x00000000024CF000-memory.dmp
        Filesize

        252KB

      • memory/1860-204-0x0000000002490000-0x00000000024CF000-memory.dmp
        Filesize

        252KB

      • memory/1860-206-0x0000000002490000-0x00000000024CF000-memory.dmp
        Filesize

        252KB

      • memory/1860-208-0x0000000002490000-0x00000000024CF000-memory.dmp
        Filesize

        252KB

      • memory/1860-210-0x0000000002490000-0x00000000024CF000-memory.dmp
        Filesize

        252KB

      • memory/1860-212-0x0000000002490000-0x00000000024CF000-memory.dmp
        Filesize

        252KB

      • memory/1860-213-0x0000000000720000-0x000000000076B000-memory.dmp
        Filesize

        300KB

      • memory/1860-214-0x0000000005010000-0x0000000005020000-memory.dmp
        Filesize

        64KB

      • memory/1860-217-0x0000000005010000-0x0000000005020000-memory.dmp
        Filesize

        64KB

      • memory/1860-219-0x0000000005010000-0x0000000005020000-memory.dmp
        Filesize

        64KB

      • memory/1860-216-0x0000000002490000-0x00000000024CF000-memory.dmp
        Filesize

        252KB

      • memory/1860-220-0x0000000002490000-0x00000000024CF000-memory.dmp
        Filesize

        252KB

      • memory/1860-222-0x0000000002490000-0x00000000024CF000-memory.dmp
        Filesize

        252KB

      • memory/1860-224-0x0000000002490000-0x00000000024CF000-memory.dmp
        Filesize

        252KB

      • memory/1860-226-0x0000000002490000-0x00000000024CF000-memory.dmp
        Filesize

        252KB

      • memory/1860-228-0x0000000002490000-0x00000000024CF000-memory.dmp
        Filesize

        252KB

      • memory/1860-1101-0x00000000055D0000-0x0000000005BE8000-memory.dmp
        Filesize

        6.1MB

      • memory/1860-1102-0x0000000005BF0000-0x0000000005CFA000-memory.dmp
        Filesize

        1.0MB

      • memory/1860-1104-0x0000000005010000-0x0000000005020000-memory.dmp
        Filesize

        64KB

      • memory/1860-1103-0x0000000002900000-0x0000000002912000-memory.dmp
        Filesize

        72KB

      • memory/1860-1105-0x0000000002920000-0x000000000295C000-memory.dmp
        Filesize

        240KB

      • memory/1860-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp
        Filesize

        584KB

      • memory/1860-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp
        Filesize

        408KB

      • memory/1860-1109-0x00000000066F0000-0x0000000006766000-memory.dmp
        Filesize

        472KB

      • memory/1860-1110-0x0000000006780000-0x00000000067D0000-memory.dmp
        Filesize

        320KB

      • memory/1860-1111-0x0000000005010000-0x0000000005020000-memory.dmp
        Filesize

        64KB

      • memory/1860-1112-0x0000000005010000-0x0000000005020000-memory.dmp
        Filesize

        64KB

      • memory/1860-1113-0x0000000006A40000-0x0000000006C02000-memory.dmp
        Filesize

        1.8MB

      • memory/1860-1114-0x0000000006C10000-0x000000000713C000-memory.dmp
        Filesize

        5.2MB

      • memory/1860-1115-0x0000000005010000-0x0000000005020000-memory.dmp
        Filesize

        64KB

      • memory/2152-1121-0x00000000005A0000-0x00000000005D2000-memory.dmp
        Filesize

        200KB

      • memory/2152-1122-0x00000000051F0000-0x0000000005200000-memory.dmp
        Filesize

        64KB