Analysis

  • max time kernel
    55s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 17:32

General

  • Target

    42cc0f132239675894405dc23aa6619a07452a629075f8ecce98742588bfe4ba.exe

  • Size

    694KB

  • MD5

    2409e1562f4b77ab52d20b4c0da0c93d

  • SHA1

    2a37f390673b92e9089b9ab02f35cfdd04a7275d

  • SHA256

    42cc0f132239675894405dc23aa6619a07452a629075f8ecce98742588bfe4ba

  • SHA512

    160a275a9873cf38030e867ec96b51068a9f41e8bd573f15c10d9c1dbb865de784292816fb0fd49e7950f7cec3bef98e1334ccf87c88461d5a2ea9c582021a24

  • SSDEEP

    12288:3MrPy90fmhJiGamnZzH9Afqg5yUGuqOtHnhOkQs6EIGISTTRun:QyIGaSZL9OH5yChOkQs1DTs

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\42cc0f132239675894405dc23aa6619a07452a629075f8ecce98742588bfe4ba.exe
    "C:\Users\Admin\AppData\Local\Temp\42cc0f132239675894405dc23aa6619a07452a629075f8ecce98742588bfe4ba.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un603119.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un603119.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:724
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0527.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0527.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1108
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1108 -s 1040
          4⤵
          • Program crash
          PID:4876
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7911.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7911.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4872
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4872 -s 1976
          4⤵
          • Program crash
          PID:1888
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si874896.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si874896.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:732
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1108 -ip 1108
    1⤵
      PID:1960
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4872 -ip 4872
      1⤵
        PID:4796

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si874896.exe

        Filesize

        175KB

        MD5

        e55cc559e36bceb95ec1608bd63246f4

        SHA1

        1d940cd56f2bfa72ad6f69c0b727374ac586817e

        SHA256

        d81cc6d48eafdb3494d4700281626fd750d491dcae92209ce7522100b6fa6be6

        SHA512

        60a3df4271fbdded65bf3032fc3997931ab5dc8ea11cf1f14bbf8cbc7d0dd4e0af16b15a7395422cf487da6503082f24a077c31a317946476be41cab04ba5770

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si874896.exe

        Filesize

        175KB

        MD5

        e55cc559e36bceb95ec1608bd63246f4

        SHA1

        1d940cd56f2bfa72ad6f69c0b727374ac586817e

        SHA256

        d81cc6d48eafdb3494d4700281626fd750d491dcae92209ce7522100b6fa6be6

        SHA512

        60a3df4271fbdded65bf3032fc3997931ab5dc8ea11cf1f14bbf8cbc7d0dd4e0af16b15a7395422cf487da6503082f24a077c31a317946476be41cab04ba5770

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un603119.exe

        Filesize

        553KB

        MD5

        e7ca07748d3b21a793fbb7a3a4e51d6c

        SHA1

        c330ef5f49ee2931b6563704b29d2b48971e931e

        SHA256

        32f4e5841de10c00377d31398cc753dce6beba99c1a7c5107c2d0c8e7ed98ee8

        SHA512

        9b7f0cb38b8cbfed02e960d472cee169856f1d58fab62ee493e2f244969f6686af265905764b4b714ccef12855e53c34a997868d81b6459141728ee062b7ec45

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un603119.exe

        Filesize

        553KB

        MD5

        e7ca07748d3b21a793fbb7a3a4e51d6c

        SHA1

        c330ef5f49ee2931b6563704b29d2b48971e931e

        SHA256

        32f4e5841de10c00377d31398cc753dce6beba99c1a7c5107c2d0c8e7ed98ee8

        SHA512

        9b7f0cb38b8cbfed02e960d472cee169856f1d58fab62ee493e2f244969f6686af265905764b4b714ccef12855e53c34a997868d81b6459141728ee062b7ec45

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0527.exe

        Filesize

        308KB

        MD5

        305f3792ccac7df2f688dc06539d16d7

        SHA1

        a3f09f146f92296fce74289ca9f6975be3e9e277

        SHA256

        672564685957f52bab62b17aba69a5fe9f2559b4d571833644670649c6392aaf

        SHA512

        88c214b4579e5251e20a32092b0843c9f12dc89e019bbf57454844063b385722ecddba555f5807b2cc01973001b9be771cb70e7970c5353cb879a72205fcbf0f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0527.exe

        Filesize

        308KB

        MD5

        305f3792ccac7df2f688dc06539d16d7

        SHA1

        a3f09f146f92296fce74289ca9f6975be3e9e277

        SHA256

        672564685957f52bab62b17aba69a5fe9f2559b4d571833644670649c6392aaf

        SHA512

        88c214b4579e5251e20a32092b0843c9f12dc89e019bbf57454844063b385722ecddba555f5807b2cc01973001b9be771cb70e7970c5353cb879a72205fcbf0f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7911.exe

        Filesize

        366KB

        MD5

        a3d45d34136e590600b68b8cfdb10a0f

        SHA1

        41fb6a6e2877678a82e67faa167b9d5442d33533

        SHA256

        00ad61f71c7155f41760d3f3862c34d8e5b03681ca090707185167ff5ae9eb41

        SHA512

        3b12bef2d03160105f19bc829e0c4e2d2feb51ad5ee8d8dc5df56596a635811e0439d9784563527486a60f9f3f3136a5036155db9cd573535e39e3f69c0430b0

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7911.exe

        Filesize

        366KB

        MD5

        a3d45d34136e590600b68b8cfdb10a0f

        SHA1

        41fb6a6e2877678a82e67faa167b9d5442d33533

        SHA256

        00ad61f71c7155f41760d3f3862c34d8e5b03681ca090707185167ff5ae9eb41

        SHA512

        3b12bef2d03160105f19bc829e0c4e2d2feb51ad5ee8d8dc5df56596a635811e0439d9784563527486a60f9f3f3136a5036155db9cd573535e39e3f69c0430b0

      • memory/732-1121-0x0000000000A10000-0x0000000000A42000-memory.dmp

        Filesize

        200KB

      • memory/732-1122-0x00000000052D0000-0x00000000052E0000-memory.dmp

        Filesize

        64KB

      • memory/732-1123-0x00000000052D0000-0x00000000052E0000-memory.dmp

        Filesize

        64KB

      • memory/1108-160-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/1108-172-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/1108-152-0x0000000005030000-0x0000000005040000-memory.dmp

        Filesize

        64KB

      • memory/1108-153-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/1108-154-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/1108-156-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/1108-158-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/1108-151-0x0000000005030000-0x0000000005040000-memory.dmp

        Filesize

        64KB

      • memory/1108-162-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/1108-164-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/1108-166-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/1108-168-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/1108-170-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/1108-150-0x0000000005030000-0x0000000005040000-memory.dmp

        Filesize

        64KB

      • memory/1108-174-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/1108-176-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/1108-178-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/1108-180-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/1108-181-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/1108-182-0x0000000005030000-0x0000000005040000-memory.dmp

        Filesize

        64KB

      • memory/1108-183-0x0000000005030000-0x0000000005040000-memory.dmp

        Filesize

        64KB

      • memory/1108-184-0x0000000005030000-0x0000000005040000-memory.dmp

        Filesize

        64KB

      • memory/1108-186-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/1108-149-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/1108-148-0x0000000005040000-0x00000000055E4000-memory.dmp

        Filesize

        5.6MB

      • memory/4872-194-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4872-196-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4872-198-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4872-200-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4872-202-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4872-204-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4872-206-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4872-208-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4872-210-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4872-212-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4872-214-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4872-216-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4872-218-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4872-220-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4872-222-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4872-224-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4872-423-0x0000000000930000-0x000000000097B000-memory.dmp

        Filesize

        300KB

      • memory/4872-424-0x0000000002720000-0x0000000002730000-memory.dmp

        Filesize

        64KB

      • memory/4872-426-0x0000000002720000-0x0000000002730000-memory.dmp

        Filesize

        64KB

      • memory/4872-1100-0x0000000005320000-0x0000000005938000-memory.dmp

        Filesize

        6.1MB

      • memory/4872-1101-0x00000000059C0000-0x0000000005ACA000-memory.dmp

        Filesize

        1.0MB

      • memory/4872-1102-0x0000000005B00000-0x0000000005B12000-memory.dmp

        Filesize

        72KB

      • memory/4872-1103-0x0000000005B20000-0x0000000005B5C000-memory.dmp

        Filesize

        240KB

      • memory/4872-1104-0x0000000002720000-0x0000000002730000-memory.dmp

        Filesize

        64KB

      • memory/4872-1106-0x0000000002720000-0x0000000002730000-memory.dmp

        Filesize

        64KB

      • memory/4872-1107-0x0000000002720000-0x0000000002730000-memory.dmp

        Filesize

        64KB

      • memory/4872-1108-0x0000000002720000-0x0000000002730000-memory.dmp

        Filesize

        64KB

      • memory/4872-1109-0x0000000005E10000-0x0000000005E76000-memory.dmp

        Filesize

        408KB

      • memory/4872-1110-0x00000000065E0000-0x0000000006672000-memory.dmp

        Filesize

        584KB

      • memory/4872-1111-0x0000000002720000-0x0000000002730000-memory.dmp

        Filesize

        64KB

      • memory/4872-1112-0x0000000006820000-0x0000000006896000-memory.dmp

        Filesize

        472KB

      • memory/4872-192-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4872-191-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/4872-1113-0x00000000068A0000-0x00000000068F0000-memory.dmp

        Filesize

        320KB

      • memory/4872-1114-0x0000000006900000-0x0000000006AC2000-memory.dmp

        Filesize

        1.8MB

      • memory/4872-1115-0x0000000006AE0000-0x000000000700C000-memory.dmp

        Filesize

        5.2MB