Analysis

  • max time kernel
    109s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 17:39

General

  • Target

    ed3451f5a4f0459d4929bdf42a0ed6c47eff407b0c2203ed09c80e470982c073.exe

  • Size

    695KB

  • MD5

    ae2e9427fc2dde498d3e81b413688720

  • SHA1

    fcd15b203880b31e1306686c399a2c7253233c46

  • SHA256

    ed3451f5a4f0459d4929bdf42a0ed6c47eff407b0c2203ed09c80e470982c073

  • SHA512

    8e50d88bfaf82e1734eaa7f523a43004cb8eef462cac2c9416306d15c8f38d4ec04e3009cc2a617dc27e18d6d34e5876c924150276ec81326ad1a3100d58cf77

  • SSDEEP

    12288:pMrKy90gajVL2AqqEZDrFjABSrGb+nhslQs6sIizrpXS:nyJq2zpXFjHG4hslQsZTrpXS

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ed3451f5a4f0459d4929bdf42a0ed6c47eff407b0c2203ed09c80e470982c073.exe
    "C:\Users\Admin\AppData\Local\Temp\ed3451f5a4f0459d4929bdf42a0ed6c47eff407b0c2203ed09c80e470982c073.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4668
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un238649.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un238649.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3008
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2993.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2993.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4012
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4012 -s 1084
          4⤵
          • Program crash
          PID:1872
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1279.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1279.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4928
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 1816
          4⤵
          • Program crash
          PID:768
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si514360.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si514360.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3232
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4012 -ip 4012
    1⤵
      PID:836
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 4928 -ip 4928
      1⤵
        PID:1432

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si514360.exe

        Filesize

        175KB

        MD5

        ff10004be57ec3a0484f7eb1a0c40e45

        SHA1

        645bee66b95783ac7db99ce9f34ab7dfb6e4c03f

        SHA256

        cd502ec934781354dfbad45fa9b957f30c361defe8eda6b2e3175a1b1d9caedd

        SHA512

        81ac62cd05fde0a6c8f1111bba6c28a2f5dfbbe2919a51360cf1adb5e072d63474a2f0a68853baf0cdd1b932c3f25623302ccf1000ae8cc1700058d504caadc6

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si514360.exe

        Filesize

        175KB

        MD5

        ff10004be57ec3a0484f7eb1a0c40e45

        SHA1

        645bee66b95783ac7db99ce9f34ab7dfb6e4c03f

        SHA256

        cd502ec934781354dfbad45fa9b957f30c361defe8eda6b2e3175a1b1d9caedd

        SHA512

        81ac62cd05fde0a6c8f1111bba6c28a2f5dfbbe2919a51360cf1adb5e072d63474a2f0a68853baf0cdd1b932c3f25623302ccf1000ae8cc1700058d504caadc6

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un238649.exe

        Filesize

        553KB

        MD5

        bf31c0ec87b25c010c7f5089eb807716

        SHA1

        76022e0718ceb29898a977b76987448cce03344a

        SHA256

        c5b8829557491bbf331811a45e4eeb3205df9dec2cfd7b0bee0ada1d6fafd5f3

        SHA512

        ab749cd48f17f80c7c298b3122bdc1425046cffc9a4aa1ee661b2b24d09d4782dee1edb81df480988b52b9f0d856b9440d995bdbd42726238c82f0d63727ec9c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un238649.exe

        Filesize

        553KB

        MD5

        bf31c0ec87b25c010c7f5089eb807716

        SHA1

        76022e0718ceb29898a977b76987448cce03344a

        SHA256

        c5b8829557491bbf331811a45e4eeb3205df9dec2cfd7b0bee0ada1d6fafd5f3

        SHA512

        ab749cd48f17f80c7c298b3122bdc1425046cffc9a4aa1ee661b2b24d09d4782dee1edb81df480988b52b9f0d856b9440d995bdbd42726238c82f0d63727ec9c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2993.exe

        Filesize

        308KB

        MD5

        a62c4f62e791d28012c6bd4bd2c75b12

        SHA1

        0739fbf35da9816ba1d1fa296f4039df3cdf21fb

        SHA256

        f1d66edee459cd86299d77f35a49f41571224220b7d1de9fadbee14eb48c3216

        SHA512

        7c59078629832f5376131ab8dd0e2ed253e473465064ea86064469831e0fc900fb24352164146493296efca9747f85c77bad97e72767e86497fa1c895e89dd97

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2993.exe

        Filesize

        308KB

        MD5

        a62c4f62e791d28012c6bd4bd2c75b12

        SHA1

        0739fbf35da9816ba1d1fa296f4039df3cdf21fb

        SHA256

        f1d66edee459cd86299d77f35a49f41571224220b7d1de9fadbee14eb48c3216

        SHA512

        7c59078629832f5376131ab8dd0e2ed253e473465064ea86064469831e0fc900fb24352164146493296efca9747f85c77bad97e72767e86497fa1c895e89dd97

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1279.exe

        Filesize

        366KB

        MD5

        d5eee3b3bbc77ab422819d055d2a3346

        SHA1

        71942c1774c3693f6593d8199e4afe1ab98d01f0

        SHA256

        b4c31c51f04109444ff23490d5bb04fc6f91fa6910fcf693c297711347675be3

        SHA512

        c22b9952f58cc283f2409a351deb2e9ab5887df32fba581a289ffd7bd7c37ee209cfdb75c8b5d29f92c430b9e240dddb3fdff0506cd68ca29d67c35e34d8b281

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1279.exe

        Filesize

        366KB

        MD5

        d5eee3b3bbc77ab422819d055d2a3346

        SHA1

        71942c1774c3693f6593d8199e4afe1ab98d01f0

        SHA256

        b4c31c51f04109444ff23490d5bb04fc6f91fa6910fcf693c297711347675be3

        SHA512

        c22b9952f58cc283f2409a351deb2e9ab5887df32fba581a289ffd7bd7c37ee209cfdb75c8b5d29f92c430b9e240dddb3fdff0506cd68ca29d67c35e34d8b281

      • memory/3232-1122-0x0000000000150000-0x0000000000182000-memory.dmp

        Filesize

        200KB

      • memory/3232-1123-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB

      • memory/3232-1124-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB

      • memory/4012-162-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/4012-174-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/4012-151-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/4012-154-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/4012-156-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/4012-158-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/4012-160-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/4012-150-0x0000000004E30000-0x00000000053D4000-memory.dmp

        Filesize

        5.6MB

      • memory/4012-164-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/4012-166-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/4012-168-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/4012-170-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/4012-172-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/4012-152-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/4012-176-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/4012-178-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/4012-179-0x0000000004E20000-0x0000000004E30000-memory.dmp

        Filesize

        64KB

      • memory/4012-180-0x0000000004E20000-0x0000000004E30000-memory.dmp

        Filesize

        64KB

      • memory/4012-181-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/4012-182-0x0000000004E20000-0x0000000004E30000-memory.dmp

        Filesize

        64KB

      • memory/4012-185-0x0000000004E20000-0x0000000004E30000-memory.dmp

        Filesize

        64KB

      • memory/4012-184-0x0000000004E20000-0x0000000004E30000-memory.dmp

        Filesize

        64KB

      • memory/4012-186-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/4012-149-0x0000000004E20000-0x0000000004E30000-memory.dmp

        Filesize

        64KB

      • memory/4012-148-0x0000000000800000-0x000000000082D000-memory.dmp

        Filesize

        180KB

      • memory/4928-194-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4928-394-0x0000000000AA0000-0x0000000000AB0000-memory.dmp

        Filesize

        64KB

      • memory/4928-198-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4928-200-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4928-202-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4928-204-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4928-206-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4928-208-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4928-210-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4928-212-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4928-214-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4928-216-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4928-218-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4928-220-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4928-222-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4928-224-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4928-389-0x0000000000720000-0x000000000076B000-memory.dmp

        Filesize

        300KB

      • memory/4928-393-0x0000000000AA0000-0x0000000000AB0000-memory.dmp

        Filesize

        64KB

      • memory/4928-391-0x0000000000AA0000-0x0000000000AB0000-memory.dmp

        Filesize

        64KB

      • memory/4928-196-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4928-1101-0x0000000005460000-0x0000000005A78000-memory.dmp

        Filesize

        6.1MB

      • memory/4928-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/4928-1103-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/4928-1104-0x0000000000AA0000-0x0000000000AB0000-memory.dmp

        Filesize

        64KB

      • memory/4928-1105-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/4928-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/4928-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/4928-1109-0x0000000000AA0000-0x0000000000AB0000-memory.dmp

        Filesize

        64KB

      • memory/4928-1110-0x0000000000AA0000-0x0000000000AB0000-memory.dmp

        Filesize

        64KB

      • memory/4928-1111-0x0000000000AA0000-0x0000000000AB0000-memory.dmp

        Filesize

        64KB

      • memory/4928-1112-0x0000000000AA0000-0x0000000000AB0000-memory.dmp

        Filesize

        64KB

      • memory/4928-1113-0x0000000008ED0000-0x0000000008F46000-memory.dmp

        Filesize

        472KB

      • memory/4928-192-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4928-191-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4928-1114-0x0000000008F60000-0x0000000008FB0000-memory.dmp

        Filesize

        320KB

      • memory/4928-1115-0x0000000008FC0000-0x0000000009182000-memory.dmp

        Filesize

        1.8MB

      • memory/4928-1116-0x0000000009190000-0x00000000096BC000-memory.dmp

        Filesize

        5.2MB