Analysis

  • max time kernel
    132s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 23:51

General

  • Target

    965f5e3967ac8167a6895ffa6166d007e864ad2d8078700c2b0adbec37ba588b.exe

  • Size

    700KB

  • MD5

    37bd7a6939f6440a6166e7d5aa619b21

  • SHA1

    d6e5bbc1f3c4e63d36412f181d478d6afd498545

  • SHA256

    965f5e3967ac8167a6895ffa6166d007e864ad2d8078700c2b0adbec37ba588b

  • SHA512

    b6fec711fa7cbfef90c03299b5d42458138630c94ff86ea70e170485bdb37391b92e391c0a55560849db67a42df04a02151328e57d7411ddc67f5d89b45a877e

  • SSDEEP

    12288:sMrEy90MxecGDo7IBiychvOfhL9DMScAAOR8F/NDWDDDhKIlOvyxJV/eYxItV:IyTxeRU0S9ShpAOR8hND/J6xLmYo

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\965f5e3967ac8167a6895ffa6166d007e864ad2d8078700c2b0adbec37ba588b.exe
    "C:\Users\Admin\AppData\Local\Temp\965f5e3967ac8167a6895ffa6166d007e864ad2d8078700c2b0adbec37ba588b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4112
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un814098.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un814098.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1556
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2668.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2668.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4544
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4544 -s 1080
          4⤵
          • Program crash
          PID:4104
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7125.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7125.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4956
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 1352
          4⤵
          • Program crash
          PID:5044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si691525.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si691525.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3712
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4544 -ip 4544
    1⤵
      PID:4832
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4956 -ip 4956
      1⤵
        PID:1428
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:3084

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si691525.exe

        Filesize

        175KB

        MD5

        83bc023d93f855e34ad9cc2148cd4ccc

        SHA1

        428023a5697b93ff268f28a05947271fd1023b15

        SHA256

        b8181443cec804d453814c27d12193dce7f7184af265cd24c7726aa0745810d3

        SHA512

        669e8a0cb13379a51f56d531a01f9ab699f270d5fe390573d72d502e43c7e11c803c6597b6c9f6c76bed12142a59a1311ddf9877cdd83971658d7eb4065803c5

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si691525.exe

        Filesize

        175KB

        MD5

        83bc023d93f855e34ad9cc2148cd4ccc

        SHA1

        428023a5697b93ff268f28a05947271fd1023b15

        SHA256

        b8181443cec804d453814c27d12193dce7f7184af265cd24c7726aa0745810d3

        SHA512

        669e8a0cb13379a51f56d531a01f9ab699f270d5fe390573d72d502e43c7e11c803c6597b6c9f6c76bed12142a59a1311ddf9877cdd83971658d7eb4065803c5

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un814098.exe

        Filesize

        558KB

        MD5

        0506fc052eaaf00282fe9d921811f891

        SHA1

        34009c377455621ca818f95bf2cfc0ce6123c42d

        SHA256

        2eb9c3d0d45cc5618c9b309dc10cfe961f75c01b4fd91c3ef35b3e57f023487e

        SHA512

        76fa4f09e9c2bd182c4c8ad1528bd304b46cb83a7b5ae3c478619836711b7b1f5edbbb829bf4b6739c7e4870d71e3eaa087a3c7d35a1290c39bae5f7b7baf645

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un814098.exe

        Filesize

        558KB

        MD5

        0506fc052eaaf00282fe9d921811f891

        SHA1

        34009c377455621ca818f95bf2cfc0ce6123c42d

        SHA256

        2eb9c3d0d45cc5618c9b309dc10cfe961f75c01b4fd91c3ef35b3e57f023487e

        SHA512

        76fa4f09e9c2bd182c4c8ad1528bd304b46cb83a7b5ae3c478619836711b7b1f5edbbb829bf4b6739c7e4870d71e3eaa087a3c7d35a1290c39bae5f7b7baf645

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2668.exe

        Filesize

        307KB

        MD5

        9b8e58a94aaaf44c416c8e17d253fe2f

        SHA1

        6c9dbb963752de06cef88d15e317ef635847e2fd

        SHA256

        9cf8c41f13bd67c60fe8f17bf7ab87f41b0c1a51df2dd9eb8787c1c086088c0c

        SHA512

        6fa622838b941f79fe536ebd155f9b9effcd1ac9423c312f569cc83f96fe51746804e97f0d67920761287f4ce88eed32da904f2670e348c3e1976556c8202fba

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2668.exe

        Filesize

        307KB

        MD5

        9b8e58a94aaaf44c416c8e17d253fe2f

        SHA1

        6c9dbb963752de06cef88d15e317ef635847e2fd

        SHA256

        9cf8c41f13bd67c60fe8f17bf7ab87f41b0c1a51df2dd9eb8787c1c086088c0c

        SHA512

        6fa622838b941f79fe536ebd155f9b9effcd1ac9423c312f569cc83f96fe51746804e97f0d67920761287f4ce88eed32da904f2670e348c3e1976556c8202fba

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7125.exe

        Filesize

        365KB

        MD5

        3d6a1764cb01e872fce6bd28361ba72a

        SHA1

        034a6fa077a7896c6fa4a6d99893b0b4b284462c

        SHA256

        da2befa31f14de6bbfee81a1ed0a575a653d969c668a43e856c12fc030bdce8b

        SHA512

        ae669d848d2fa2498e04742f6f2090f2de3f50f113cc96644c6fb65505c886582ffdb04cc137b8a8e66ae53393bbe820f9f808c3582ac2401c3a48bb9fa3fd16

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7125.exe

        Filesize

        365KB

        MD5

        3d6a1764cb01e872fce6bd28361ba72a

        SHA1

        034a6fa077a7896c6fa4a6d99893b0b4b284462c

        SHA256

        da2befa31f14de6bbfee81a1ed0a575a653d969c668a43e856c12fc030bdce8b

        SHA512

        ae669d848d2fa2498e04742f6f2090f2de3f50f113cc96644c6fb65505c886582ffdb04cc137b8a8e66ae53393bbe820f9f808c3582ac2401c3a48bb9fa3fd16

      • memory/3712-1122-0x0000000004970000-0x0000000004980000-memory.dmp

        Filesize

        64KB

      • memory/3712-1121-0x00000000000B0000-0x00000000000E2000-memory.dmp

        Filesize

        200KB

      • memory/4544-158-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/4544-170-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/4544-151-0x0000000005080000-0x0000000005090000-memory.dmp

        Filesize

        64KB

      • memory/4544-152-0x0000000005080000-0x0000000005090000-memory.dmp

        Filesize

        64KB

      • memory/4544-153-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/4544-154-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/4544-149-0x0000000005090000-0x0000000005634000-memory.dmp

        Filesize

        5.6MB

      • memory/4544-156-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/4544-160-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/4544-162-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/4544-164-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/4544-166-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/4544-168-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/4544-150-0x0000000005080000-0x0000000005090000-memory.dmp

        Filesize

        64KB

      • memory/4544-172-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/4544-174-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/4544-176-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/4544-178-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/4544-180-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/4544-181-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/4544-182-0x0000000005080000-0x0000000005090000-memory.dmp

        Filesize

        64KB

      • memory/4544-183-0x0000000005080000-0x0000000005090000-memory.dmp

        Filesize

        64KB

      • memory/4544-184-0x0000000005080000-0x0000000005090000-memory.dmp

        Filesize

        64KB

      • memory/4544-186-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/4544-148-0x0000000000810000-0x000000000083D000-memory.dmp

        Filesize

        180KB

      • memory/4956-191-0x00000000052C0000-0x00000000052FF000-memory.dmp

        Filesize

        252KB

      • memory/4956-223-0x00000000026A0000-0x00000000026B0000-memory.dmp

        Filesize

        64KB

      • memory/4956-196-0x00000000052C0000-0x00000000052FF000-memory.dmp

        Filesize

        252KB

      • memory/4956-198-0x00000000052C0000-0x00000000052FF000-memory.dmp

        Filesize

        252KB

      • memory/4956-200-0x00000000052C0000-0x00000000052FF000-memory.dmp

        Filesize

        252KB

      • memory/4956-202-0x00000000052C0000-0x00000000052FF000-memory.dmp

        Filesize

        252KB

      • memory/4956-204-0x00000000052C0000-0x00000000052FF000-memory.dmp

        Filesize

        252KB

      • memory/4956-206-0x00000000052C0000-0x00000000052FF000-memory.dmp

        Filesize

        252KB

      • memory/4956-208-0x00000000052C0000-0x00000000052FF000-memory.dmp

        Filesize

        252KB

      • memory/4956-210-0x00000000052C0000-0x00000000052FF000-memory.dmp

        Filesize

        252KB

      • memory/4956-212-0x00000000052C0000-0x00000000052FF000-memory.dmp

        Filesize

        252KB

      • memory/4956-214-0x00000000052C0000-0x00000000052FF000-memory.dmp

        Filesize

        252KB

      • memory/4956-216-0x0000000000800000-0x000000000084B000-memory.dmp

        Filesize

        300KB

      • memory/4956-217-0x00000000052C0000-0x00000000052FF000-memory.dmp

        Filesize

        252KB

      • memory/4956-218-0x00000000026A0000-0x00000000026B0000-memory.dmp

        Filesize

        64KB

      • memory/4956-220-0x00000000026A0000-0x00000000026B0000-memory.dmp

        Filesize

        64KB

      • memory/4956-221-0x00000000052C0000-0x00000000052FF000-memory.dmp

        Filesize

        252KB

      • memory/4956-192-0x00000000052C0000-0x00000000052FF000-memory.dmp

        Filesize

        252KB

      • memory/4956-224-0x00000000052C0000-0x00000000052FF000-memory.dmp

        Filesize

        252KB

      • memory/4956-226-0x00000000052C0000-0x00000000052FF000-memory.dmp

        Filesize

        252KB

      • memory/4956-228-0x00000000052C0000-0x00000000052FF000-memory.dmp

        Filesize

        252KB

      • memory/4956-1101-0x0000000005460000-0x0000000005A78000-memory.dmp

        Filesize

        6.1MB

      • memory/4956-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/4956-1103-0x00000000026A0000-0x00000000026B0000-memory.dmp

        Filesize

        64KB

      • memory/4956-1104-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/4956-1105-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/4956-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/4956-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/4956-1108-0x0000000006950000-0x0000000006B12000-memory.dmp

        Filesize

        1.8MB

      • memory/4956-1109-0x0000000006B30000-0x000000000705C000-memory.dmp

        Filesize

        5.2MB

      • memory/4956-1111-0x00000000026A0000-0x00000000026B0000-memory.dmp

        Filesize

        64KB

      • memory/4956-1112-0x00000000026A0000-0x00000000026B0000-memory.dmp

        Filesize

        64KB

      • memory/4956-194-0x00000000052C0000-0x00000000052FF000-memory.dmp

        Filesize

        252KB

      • memory/4956-1113-0x0000000007180000-0x00000000071F6000-memory.dmp

        Filesize

        472KB

      • memory/4956-1114-0x0000000007220000-0x0000000007270000-memory.dmp

        Filesize

        320KB

      • memory/4956-1115-0x00000000026A0000-0x00000000026B0000-memory.dmp

        Filesize

        64KB