Analysis

  • max time kernel
    90s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 17:40

General

  • Target

    316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb.exe

  • Size

    695KB

  • MD5

    dcfc28fb6f8f3e8d0fd6b60545dd604e

  • SHA1

    3985172c5d4aa1c144ffa99368e8bd094288e7bf

  • SHA256

    316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb

  • SHA512

    f25deace2208265e6c217bb9a314ce280843adba7e83cf95e98799a877e6d8d1cad9c5226e8a1a80e1e05315cdc595ad3bb22d3a7bc82bd980657042ee0bc3f4

  • SSDEEP

    12288:aMrLy90CFi3I0YtKI4/iurTP0tg2OD0ojQ6uNvT59nh7jQs6XIhZ70H:RyHFiDtP0itwojVuNvbh7jQsaG70H

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb.exe
    "C:\Users\Admin\AppData\Local\Temp\316404694507f14dd03c3eadfc1493f40ff7ded04514ac67ad2620a364bfa1cb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un355045.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un355045.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4672
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0231.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0231.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4504
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 1084
          4⤵
          • Program crash
          PID:3312
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5626.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5626.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1056
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 1732
          4⤵
          • Program crash
          PID:2492
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si027186.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si027186.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4236
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4504 -ip 4504
    1⤵
      PID:4732
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1056 -ip 1056
      1⤵
        PID:4248

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si027186.exe

        Filesize

        175KB

        MD5

        df59d66538c7da43c0a82b3c38fcb7f7

        SHA1

        f48a5982fe14e5ae8dd3f1b3a10179a8ff5297e6

        SHA256

        77b77311368a369dd41cf27a668cd3737ff22dc58c8d8bf20b41c15677b2a534

        SHA512

        d34d90a4ca6e79443ecee44df72f6172fbc9c57f05f5af71605454bdee1d8af1a9820b73e865c5de0f69e2cd2573979f4285a8d250c6bac1cbd078760bf93a33

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si027186.exe

        Filesize

        175KB

        MD5

        df59d66538c7da43c0a82b3c38fcb7f7

        SHA1

        f48a5982fe14e5ae8dd3f1b3a10179a8ff5297e6

        SHA256

        77b77311368a369dd41cf27a668cd3737ff22dc58c8d8bf20b41c15677b2a534

        SHA512

        d34d90a4ca6e79443ecee44df72f6172fbc9c57f05f5af71605454bdee1d8af1a9820b73e865c5de0f69e2cd2573979f4285a8d250c6bac1cbd078760bf93a33

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un355045.exe

        Filesize

        553KB

        MD5

        c7e284580d93e8707b6cd78a4bab78ca

        SHA1

        bc3dc3551c1254fb72052460e9666dd19158dc2e

        SHA256

        53d642370160d6b211b81049b519350ab34b4cb6787c775f234c8b8766dd9393

        SHA512

        30bf1b4a352c7670f9e1b2c42d60ee11b886ce2dafedee917e7e3b24eea59adb55686e5d5d448f4efd6d46cf7db860262db6b12bfc74700939a981549bef474a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un355045.exe

        Filesize

        553KB

        MD5

        c7e284580d93e8707b6cd78a4bab78ca

        SHA1

        bc3dc3551c1254fb72052460e9666dd19158dc2e

        SHA256

        53d642370160d6b211b81049b519350ab34b4cb6787c775f234c8b8766dd9393

        SHA512

        30bf1b4a352c7670f9e1b2c42d60ee11b886ce2dafedee917e7e3b24eea59adb55686e5d5d448f4efd6d46cf7db860262db6b12bfc74700939a981549bef474a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0231.exe

        Filesize

        308KB

        MD5

        d78dc186cf592a55403a2c34647fc445

        SHA1

        8f6868a8073e6f6e8c231cd39e63f584c4504e81

        SHA256

        09b4a21d682364d837e3ad3f0daba03b7c1ca1f291b4fcec815cf075551f6634

        SHA512

        585a2ea86aa72f86bf7b4d89538456c9ce882db3715a17408adc47b2cdcf68a47f8e39f483b88fa82df45678519bd7dfa92ce857f182fd9b2f2c6c7dcdff261e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0231.exe

        Filesize

        308KB

        MD5

        d78dc186cf592a55403a2c34647fc445

        SHA1

        8f6868a8073e6f6e8c231cd39e63f584c4504e81

        SHA256

        09b4a21d682364d837e3ad3f0daba03b7c1ca1f291b4fcec815cf075551f6634

        SHA512

        585a2ea86aa72f86bf7b4d89538456c9ce882db3715a17408adc47b2cdcf68a47f8e39f483b88fa82df45678519bd7dfa92ce857f182fd9b2f2c6c7dcdff261e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5626.exe

        Filesize

        366KB

        MD5

        4e705d1b17525c67f3680e6e87d9905b

        SHA1

        0f0eb73a5d93a15b9762f78c54da3abcf580ca0b

        SHA256

        b9d1ab0b4c48a07717e87b7bce1d00f557575c145ea0d525eca3773f746d7876

        SHA512

        b43dad5e1b4944c9a211b9eb9a7d5dc1de269c28a00062b942b6b7b0d9fd0838184c47692ad267db499b22c8bca85d1134e899c64a341f643dbbbbc13f5f7fa9

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5626.exe

        Filesize

        366KB

        MD5

        4e705d1b17525c67f3680e6e87d9905b

        SHA1

        0f0eb73a5d93a15b9762f78c54da3abcf580ca0b

        SHA256

        b9d1ab0b4c48a07717e87b7bce1d00f557575c145ea0d525eca3773f746d7876

        SHA512

        b43dad5e1b4944c9a211b9eb9a7d5dc1de269c28a00062b942b6b7b0d9fd0838184c47692ad267db499b22c8bca85d1134e899c64a341f643dbbbbc13f5f7fa9

      • memory/1056-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/1056-1101-0x0000000005460000-0x0000000005A78000-memory.dmp

        Filesize

        6.1MB

      • memory/1056-219-0x0000000004C10000-0x0000000004C4F000-memory.dmp

        Filesize

        252KB

      • memory/1056-218-0x0000000004C60000-0x0000000004C70000-memory.dmp

        Filesize

        64KB

      • memory/1056-204-0x0000000004C10000-0x0000000004C4F000-memory.dmp

        Filesize

        252KB

      • memory/1056-206-0x0000000004C10000-0x0000000004C4F000-memory.dmp

        Filesize

        252KB

      • memory/1056-1115-0x0000000007190000-0x0000000007206000-memory.dmp

        Filesize

        472KB

      • memory/1056-1114-0x0000000004C60000-0x0000000004C70000-memory.dmp

        Filesize

        64KB

      • memory/1056-1113-0x0000000006A30000-0x0000000006F5C000-memory.dmp

        Filesize

        5.2MB

      • memory/1056-1112-0x0000000006850000-0x0000000006A12000-memory.dmp

        Filesize

        1.8MB

      • memory/1056-208-0x0000000004C10000-0x0000000004C4F000-memory.dmp

        Filesize

        252KB

      • memory/1056-1111-0x0000000004C60000-0x0000000004C70000-memory.dmp

        Filesize

        64KB

      • memory/1056-1110-0x0000000004C60000-0x0000000004C70000-memory.dmp

        Filesize

        64KB

      • memory/1056-1109-0x0000000004C60000-0x0000000004C70000-memory.dmp

        Filesize

        64KB

      • memory/1056-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/1056-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/1056-1105-0x0000000004C60000-0x0000000004C70000-memory.dmp

        Filesize

        64KB

      • memory/1056-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/1056-1103-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/1056-217-0x0000000004C60000-0x0000000004C70000-memory.dmp

        Filesize

        64KB

      • memory/1056-228-0x0000000004C10000-0x0000000004C4F000-memory.dmp

        Filesize

        252KB

      • memory/1056-226-0x0000000004C10000-0x0000000004C4F000-memory.dmp

        Filesize

        252KB

      • memory/1056-224-0x0000000004C10000-0x0000000004C4F000-memory.dmp

        Filesize

        252KB

      • memory/1056-191-0x0000000004C10000-0x0000000004C4F000-memory.dmp

        Filesize

        252KB

      • memory/1056-192-0x0000000004C10000-0x0000000004C4F000-memory.dmp

        Filesize

        252KB

      • memory/1056-196-0x0000000004C10000-0x0000000004C4F000-memory.dmp

        Filesize

        252KB

      • memory/1056-198-0x0000000004C10000-0x0000000004C4F000-memory.dmp

        Filesize

        252KB

      • memory/1056-194-0x0000000004C10000-0x0000000004C4F000-memory.dmp

        Filesize

        252KB

      • memory/1056-200-0x0000000004C10000-0x0000000004C4F000-memory.dmp

        Filesize

        252KB

      • memory/1056-202-0x0000000004C10000-0x0000000004C4F000-memory.dmp

        Filesize

        252KB

      • memory/1056-222-0x0000000004C10000-0x0000000004C4F000-memory.dmp

        Filesize

        252KB

      • memory/1056-1116-0x0000000007220000-0x0000000007270000-memory.dmp

        Filesize

        320KB

      • memory/1056-220-0x0000000004C60000-0x0000000004C70000-memory.dmp

        Filesize

        64KB

      • memory/1056-210-0x0000000004C10000-0x0000000004C4F000-memory.dmp

        Filesize

        252KB

      • memory/1056-212-0x0000000004C10000-0x0000000004C4F000-memory.dmp

        Filesize

        252KB

      • memory/1056-215-0x0000000000850000-0x000000000089B000-memory.dmp

        Filesize

        300KB

      • memory/1056-214-0x0000000004C10000-0x0000000004C4F000-memory.dmp

        Filesize

        252KB

      • memory/4236-1122-0x00000000003E0000-0x0000000000412000-memory.dmp

        Filesize

        200KB

      • memory/4236-1123-0x0000000005020000-0x0000000005030000-memory.dmp

        Filesize

        64KB

      • memory/4504-181-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/4504-170-0x0000000002500000-0x0000000002512000-memory.dmp

        Filesize

        72KB

      • memory/4504-148-0x0000000004F80000-0x0000000005524000-memory.dmp

        Filesize

        5.6MB

      • memory/4504-152-0x0000000004F70000-0x0000000004F80000-memory.dmp

        Filesize

        64KB

      • memory/4504-150-0x0000000004F70000-0x0000000004F80000-memory.dmp

        Filesize

        64KB

      • memory/4504-186-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/4504-184-0x0000000004F70000-0x0000000004F80000-memory.dmp

        Filesize

        64KB

      • memory/4504-151-0x0000000004F70000-0x0000000004F80000-memory.dmp

        Filesize

        64KB

      • memory/4504-183-0x0000000004F70000-0x0000000004F80000-memory.dmp

        Filesize

        64KB

      • memory/4504-182-0x0000000004F70000-0x0000000004F80000-memory.dmp

        Filesize

        64KB

      • memory/4504-153-0x0000000002500000-0x0000000002512000-memory.dmp

        Filesize

        72KB

      • memory/4504-180-0x0000000002500000-0x0000000002512000-memory.dmp

        Filesize

        72KB

      • memory/4504-178-0x0000000002500000-0x0000000002512000-memory.dmp

        Filesize

        72KB

      • memory/4504-174-0x0000000002500000-0x0000000002512000-memory.dmp

        Filesize

        72KB

      • memory/4504-176-0x0000000002500000-0x0000000002512000-memory.dmp

        Filesize

        72KB

      • memory/4504-172-0x0000000002500000-0x0000000002512000-memory.dmp

        Filesize

        72KB

      • memory/4504-168-0x0000000002500000-0x0000000002512000-memory.dmp

        Filesize

        72KB

      • memory/4504-166-0x0000000002500000-0x0000000002512000-memory.dmp

        Filesize

        72KB

      • memory/4504-164-0x0000000002500000-0x0000000002512000-memory.dmp

        Filesize

        72KB

      • memory/4504-162-0x0000000002500000-0x0000000002512000-memory.dmp

        Filesize

        72KB

      • memory/4504-160-0x0000000002500000-0x0000000002512000-memory.dmp

        Filesize

        72KB

      • memory/4504-149-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/4504-158-0x0000000002500000-0x0000000002512000-memory.dmp

        Filesize

        72KB

      • memory/4504-154-0x0000000002500000-0x0000000002512000-memory.dmp

        Filesize

        72KB

      • memory/4504-156-0x0000000002500000-0x0000000002512000-memory.dmp

        Filesize

        72KB