Analysis

  • max time kernel
    72s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 16:54

General

  • Target

    25b6043ecbed37a823e60b0840664788e89112c520671cf5fe6d15a1fb167008.exe

  • Size

    695KB

  • MD5

    80c3210269669c09bfd092ecff6deef3

  • SHA1

    d4948b57b53487e10c827d1c0a4d06bbc37b5ff9

  • SHA256

    25b6043ecbed37a823e60b0840664788e89112c520671cf5fe6d15a1fb167008

  • SHA512

    bff39855f734138c88dcaf0faaa53bacd09b7feacf034ecddb023670b92778afda65c36b9b673a565020d1149628630f9bd2531142169b77e3e2749472991fac

  • SSDEEP

    12288:1Mrjy90Py8FLRTpdwrlFBpbaCVYjpqxv8obnh9MQs6+I4:Oy+TpWrdpbhGjmv8yh9MQsfn

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25b6043ecbed37a823e60b0840664788e89112c520671cf5fe6d15a1fb167008.exe
    "C:\Users\Admin\AppData\Local\Temp\25b6043ecbed37a823e60b0840664788e89112c520671cf5fe6d15a1fb167008.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4804
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un329990.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un329990.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:460
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8191.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8191.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3520
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3520 -s 1084
          4⤵
          • Program crash
          PID:3652
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1799.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1799.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4832
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4832 -s 2020
          4⤵
          • Program crash
          PID:4448
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si817086.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si817086.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3312
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3520 -ip 3520
    1⤵
      PID:3668
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4832 -ip 4832
      1⤵
        PID:1224

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si817086.exe

        Filesize

        175KB

        MD5

        999652b8feb8fdc2a0316fea1e345b26

        SHA1

        d1461532bba594937c7820022adc6b91687ee819

        SHA256

        67ab3164902088667773aebd18e6c1043a9a0ebc7f0bdcd71e5ec60b2243361d

        SHA512

        d1ae253bcc7df77a09e037dce5d1b3e7f77729e0152eb947e1c69abf4aa4e8821a70fc7cba2d9aec2b41083b775ab40241186383ff5c0a45de05616ff57f93f9

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si817086.exe

        Filesize

        175KB

        MD5

        999652b8feb8fdc2a0316fea1e345b26

        SHA1

        d1461532bba594937c7820022adc6b91687ee819

        SHA256

        67ab3164902088667773aebd18e6c1043a9a0ebc7f0bdcd71e5ec60b2243361d

        SHA512

        d1ae253bcc7df77a09e037dce5d1b3e7f77729e0152eb947e1c69abf4aa4e8821a70fc7cba2d9aec2b41083b775ab40241186383ff5c0a45de05616ff57f93f9

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un329990.exe

        Filesize

        553KB

        MD5

        e09da21709c7651cc7d0764b8d697070

        SHA1

        4ee8266183e60d4d5a10b12125857ab0787d665d

        SHA256

        911bf33c88a9c0c6ac1df2ed2763f336b56fcb4905e3c3c508ca7e11888c4adc

        SHA512

        8277cf99eea9064083abd9b77cba8504be120dcbabd57fc1400fb53bc1172027fcbadc6371368953bbdfbb7c2dc1ac6e15e32ed0a1c2fdbeb0a5e85e50a9cd83

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un329990.exe

        Filesize

        553KB

        MD5

        e09da21709c7651cc7d0764b8d697070

        SHA1

        4ee8266183e60d4d5a10b12125857ab0787d665d

        SHA256

        911bf33c88a9c0c6ac1df2ed2763f336b56fcb4905e3c3c508ca7e11888c4adc

        SHA512

        8277cf99eea9064083abd9b77cba8504be120dcbabd57fc1400fb53bc1172027fcbadc6371368953bbdfbb7c2dc1ac6e15e32ed0a1c2fdbeb0a5e85e50a9cd83

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8191.exe

        Filesize

        308KB

        MD5

        25786bf5cb5b7398db51b6d5a09160f7

        SHA1

        d89a5055aa701b99ebeaec995e26e04c34a086e7

        SHA256

        3d98faa2096a244004d1c8881d7ab03362325a107b14f55f14617ac372fb14dd

        SHA512

        9c94a41f38853d52d6a74f6feaadb4521c5ce8e63e94eb553d1e560f154c05f0b260391bd8f37b9163ac240ca295ee61f4957d89fe09f8c566bf3733d3410986

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8191.exe

        Filesize

        308KB

        MD5

        25786bf5cb5b7398db51b6d5a09160f7

        SHA1

        d89a5055aa701b99ebeaec995e26e04c34a086e7

        SHA256

        3d98faa2096a244004d1c8881d7ab03362325a107b14f55f14617ac372fb14dd

        SHA512

        9c94a41f38853d52d6a74f6feaadb4521c5ce8e63e94eb553d1e560f154c05f0b260391bd8f37b9163ac240ca295ee61f4957d89fe09f8c566bf3733d3410986

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1799.exe

        Filesize

        366KB

        MD5

        5b7695bd2cdc687f9764f518d9cec162

        SHA1

        18b26ce73c5806cd858934f5c9dd06345ab82bae

        SHA256

        4adf0a5f4a3916a1bea47c903b0181f7b95571aecc059e8b7348df6467c5d6d3

        SHA512

        f5d0b8c7e12af5b5dec31a2a62a9a52fe7992aedc5bbb1dbf2447406fa7eea4a69593b6a6388535580ebbdaa524fd80e7368c07d6290543ebf83ac7cf7904f0a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1799.exe

        Filesize

        366KB

        MD5

        5b7695bd2cdc687f9764f518d9cec162

        SHA1

        18b26ce73c5806cd858934f5c9dd06345ab82bae

        SHA256

        4adf0a5f4a3916a1bea47c903b0181f7b95571aecc059e8b7348df6467c5d6d3

        SHA512

        f5d0b8c7e12af5b5dec31a2a62a9a52fe7992aedc5bbb1dbf2447406fa7eea4a69593b6a6388535580ebbdaa524fd80e7368c07d6290543ebf83ac7cf7904f0a

      • memory/3312-1122-0x0000000005C00000-0x0000000005C10000-memory.dmp

        Filesize

        64KB

      • memory/3312-1121-0x0000000000F90000-0x0000000000FC2000-memory.dmp

        Filesize

        200KB

      • memory/3520-156-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3520-170-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3520-150-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/3520-152-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/3520-153-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3520-154-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3520-149-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/3520-158-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3520-160-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3520-162-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3520-164-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3520-166-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3520-168-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3520-151-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/3520-172-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3520-174-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3520-176-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3520-178-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3520-180-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3520-181-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/3520-182-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/3520-183-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/3520-184-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/3520-186-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/3520-148-0x0000000004EE0000-0x0000000005484000-memory.dmp

        Filesize

        5.6MB

      • memory/4832-191-0x0000000002910000-0x000000000294F000-memory.dmp

        Filesize

        252KB

      • memory/4832-225-0x0000000002910000-0x000000000294F000-memory.dmp

        Filesize

        252KB

      • memory/4832-196-0x00000000007F0000-0x000000000083B000-memory.dmp

        Filesize

        300KB

      • memory/4832-200-0x00000000025C0000-0x00000000025D0000-memory.dmp

        Filesize

        64KB

      • memory/4832-201-0x0000000002910000-0x000000000294F000-memory.dmp

        Filesize

        252KB

      • memory/4832-198-0x0000000002910000-0x000000000294F000-memory.dmp

        Filesize

        252KB

      • memory/4832-197-0x00000000025C0000-0x00000000025D0000-memory.dmp

        Filesize

        64KB

      • memory/4832-203-0x0000000002910000-0x000000000294F000-memory.dmp

        Filesize

        252KB

      • memory/4832-205-0x0000000002910000-0x000000000294F000-memory.dmp

        Filesize

        252KB

      • memory/4832-207-0x0000000002910000-0x000000000294F000-memory.dmp

        Filesize

        252KB

      • memory/4832-209-0x0000000002910000-0x000000000294F000-memory.dmp

        Filesize

        252KB

      • memory/4832-211-0x0000000002910000-0x000000000294F000-memory.dmp

        Filesize

        252KB

      • memory/4832-213-0x0000000002910000-0x000000000294F000-memory.dmp

        Filesize

        252KB

      • memory/4832-215-0x0000000002910000-0x000000000294F000-memory.dmp

        Filesize

        252KB

      • memory/4832-217-0x0000000002910000-0x000000000294F000-memory.dmp

        Filesize

        252KB

      • memory/4832-219-0x0000000002910000-0x000000000294F000-memory.dmp

        Filesize

        252KB

      • memory/4832-221-0x0000000002910000-0x000000000294F000-memory.dmp

        Filesize

        252KB

      • memory/4832-194-0x0000000002910000-0x000000000294F000-memory.dmp

        Filesize

        252KB

      • memory/4832-223-0x0000000002910000-0x000000000294F000-memory.dmp

        Filesize

        252KB

      • memory/4832-227-0x0000000002910000-0x000000000294F000-memory.dmp

        Filesize

        252KB

      • memory/4832-1100-0x0000000005490000-0x0000000005AA8000-memory.dmp

        Filesize

        6.1MB

      • memory/4832-1101-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/4832-1102-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/4832-1103-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/4832-1104-0x00000000025C0000-0x00000000025D0000-memory.dmp

        Filesize

        64KB

      • memory/4832-1105-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/4832-1106-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/4832-1108-0x00000000025C0000-0x00000000025D0000-memory.dmp

        Filesize

        64KB

      • memory/4832-1109-0x00000000025C0000-0x00000000025D0000-memory.dmp

        Filesize

        64KB

      • memory/4832-1110-0x00000000025C0000-0x00000000025D0000-memory.dmp

        Filesize

        64KB

      • memory/4832-1111-0x0000000007550000-0x00000000075C6000-memory.dmp

        Filesize

        472KB

      • memory/4832-1112-0x00000000075E0000-0x0000000007630000-memory.dmp

        Filesize

        320KB

      • memory/4832-192-0x0000000002910000-0x000000000294F000-memory.dmp

        Filesize

        252KB

      • memory/4832-1113-0x0000000007640000-0x0000000007802000-memory.dmp

        Filesize

        1.8MB

      • memory/4832-1115-0x0000000007810000-0x0000000007D3C000-memory.dmp

        Filesize

        5.2MB

      • memory/4832-1114-0x00000000025C0000-0x00000000025D0000-memory.dmp

        Filesize

        64KB