Analysis

  • max time kernel
    58s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 17:13

General

  • Target

    f41ed3cb39a2f7599514987f64e3bef155513975a427550d2945281f27b12e11.exe

  • Size

    695KB

  • MD5

    f0041f0c47fcfcaff1a7a44d37fce285

  • SHA1

    7286caa9e648d7a44ad8928b353117d50ff308a6

  • SHA256

    f41ed3cb39a2f7599514987f64e3bef155513975a427550d2945281f27b12e11

  • SHA512

    a6a80019eca42ab04f6dbd29088da63e1e77244e876a2b29bb416fa38b7997752903a7349fa4c9081e128ee90c01420754e1e28a460078780e1c2182836cc1fe

  • SSDEEP

    12288:+Mr/y90+ZFA/6WN612cDLApKBMcyAvqQcp717O8QwR3jtVW0nhSeQs6XIVKeS7HS:ZyrFN1j/dBMcy21cvO8zpjtVWKhSeQsh

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f41ed3cb39a2f7599514987f64e3bef155513975a427550d2945281f27b12e11.exe
    "C:\Users\Admin\AppData\Local\Temp\f41ed3cb39a2f7599514987f64e3bef155513975a427550d2945281f27b12e11.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2592
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un043613.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un043613.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1576
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9919.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9919.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5000
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 1084
          4⤵
          • Program crash
          PID:3620
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4750.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4750.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3008
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3008 -s 1800
          4⤵
          • Program crash
          PID:3616
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si543409.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si543409.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2404
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5000 -ip 5000
    1⤵
      PID:768
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3008 -ip 3008
      1⤵
        PID:2620

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si543409.exe

        Filesize

        175KB

        MD5

        76c5263de4ba8432d2f64e0bef9f31e0

        SHA1

        a046c31d096fa6e9eab4b08b94e17f28cfbf1f05

        SHA256

        00da893f50644c668e8c6865d2f143e5d82fc7725620e22fba217ddd7005419e

        SHA512

        4c12bc481f5771497f6f0ba679fbe6a4659116c7a376124832acbfbe6d5f84375a296f723f6bd88840aba43435bcb9d0d07c1af1f99674088cec5c304605f5d3

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si543409.exe

        Filesize

        175KB

        MD5

        76c5263de4ba8432d2f64e0bef9f31e0

        SHA1

        a046c31d096fa6e9eab4b08b94e17f28cfbf1f05

        SHA256

        00da893f50644c668e8c6865d2f143e5d82fc7725620e22fba217ddd7005419e

        SHA512

        4c12bc481f5771497f6f0ba679fbe6a4659116c7a376124832acbfbe6d5f84375a296f723f6bd88840aba43435bcb9d0d07c1af1f99674088cec5c304605f5d3

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un043613.exe

        Filesize

        553KB

        MD5

        4796318b40a4440f8599dedcd578f1e1

        SHA1

        15c4baac529339418153fb0e9dc6515c15142355

        SHA256

        8c2b8cd55174b1805b66e66f221040993b2bb91ade72ce5f34015677a3257d71

        SHA512

        9ba793bb667927471ee43860b9782f701f70ff5c5229263a993cfd4b5da05297edee95c205ac4ed832148027b50e80d748fdc4698ef3a9db1bdcd29bf9652a4d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un043613.exe

        Filesize

        553KB

        MD5

        4796318b40a4440f8599dedcd578f1e1

        SHA1

        15c4baac529339418153fb0e9dc6515c15142355

        SHA256

        8c2b8cd55174b1805b66e66f221040993b2bb91ade72ce5f34015677a3257d71

        SHA512

        9ba793bb667927471ee43860b9782f701f70ff5c5229263a993cfd4b5da05297edee95c205ac4ed832148027b50e80d748fdc4698ef3a9db1bdcd29bf9652a4d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9919.exe

        Filesize

        308KB

        MD5

        871d5c122973d7c555748a8656bb2035

        SHA1

        24bdc150e0b5a49842248a9b379f422368428e0b

        SHA256

        5e7547c5ae43ba9dd15b863e6da0d7eb32b6fc542c0c72c2d9d9beebdaa37a00

        SHA512

        becb9ae9502805b1b61f053736ae7384e0732e918dfa10d518d090955dbc54d028d981cf9a8305d864345e5602c1e19ac3966b6fee73bc09489929e4775bca8a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9919.exe

        Filesize

        308KB

        MD5

        871d5c122973d7c555748a8656bb2035

        SHA1

        24bdc150e0b5a49842248a9b379f422368428e0b

        SHA256

        5e7547c5ae43ba9dd15b863e6da0d7eb32b6fc542c0c72c2d9d9beebdaa37a00

        SHA512

        becb9ae9502805b1b61f053736ae7384e0732e918dfa10d518d090955dbc54d028d981cf9a8305d864345e5602c1e19ac3966b6fee73bc09489929e4775bca8a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4750.exe

        Filesize

        366KB

        MD5

        fcd113771c683ed2043ff8fa27057708

        SHA1

        bb5362748aafdfef43709844008ab8937ab74fb6

        SHA256

        fad182a47a794c8ea1f3a74b243e334fa9789057dd7d4da471cb29632ea333ee

        SHA512

        b69e2bfd6b2f5d2051048d4a599ebe68504eb6ee0fba4e9ac73a783b6eccc8efea22b8c7c986f40bdf47305ea166a2a32361e540abda627ba78cace80c7221e7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4750.exe

        Filesize

        366KB

        MD5

        fcd113771c683ed2043ff8fa27057708

        SHA1

        bb5362748aafdfef43709844008ab8937ab74fb6

        SHA256

        fad182a47a794c8ea1f3a74b243e334fa9789057dd7d4da471cb29632ea333ee

        SHA512

        b69e2bfd6b2f5d2051048d4a599ebe68504eb6ee0fba4e9ac73a783b6eccc8efea22b8c7c986f40bdf47305ea166a2a32361e540abda627ba78cace80c7221e7

      • memory/2404-1124-0x0000000005CA0000-0x0000000005CB0000-memory.dmp

        Filesize

        64KB

      • memory/2404-1123-0x0000000005CA0000-0x0000000005CB0000-memory.dmp

        Filesize

        64KB

      • memory/2404-1122-0x0000000000FF0000-0x0000000001022000-memory.dmp

        Filesize

        200KB

      • memory/3008-1102-0x00000000059C0000-0x0000000005ACA000-memory.dmp

        Filesize

        1.0MB

      • memory/3008-1104-0x0000000004D10000-0x0000000004D20000-memory.dmp

        Filesize

        64KB

      • memory/3008-1116-0x0000000008270000-0x00000000082C0000-memory.dmp

        Filesize

        320KB

      • memory/3008-1115-0x00000000081F0000-0x0000000008266000-memory.dmp

        Filesize

        472KB

      • memory/3008-1114-0x0000000004D10000-0x0000000004D20000-memory.dmp

        Filesize

        64KB

      • memory/3008-1113-0x00000000068B0000-0x0000000006DDC000-memory.dmp

        Filesize

        5.2MB

      • memory/3008-1112-0x00000000066D0000-0x0000000006892000-memory.dmp

        Filesize

        1.8MB

      • memory/3008-1111-0x0000000004D10000-0x0000000004D20000-memory.dmp

        Filesize

        64KB

      • memory/3008-1110-0x0000000004D10000-0x0000000004D20000-memory.dmp

        Filesize

        64KB

      • memory/3008-1109-0x0000000004D10000-0x0000000004D20000-memory.dmp

        Filesize

        64KB

      • memory/3008-1107-0x0000000005EB0000-0x0000000005F16000-memory.dmp

        Filesize

        408KB

      • memory/3008-1106-0x0000000005E10000-0x0000000005EA2000-memory.dmp

        Filesize

        584KB

      • memory/3008-1105-0x0000000005B20000-0x0000000005B5C000-memory.dmp

        Filesize

        240KB

      • memory/3008-1103-0x0000000005B00000-0x0000000005B12000-memory.dmp

        Filesize

        72KB

      • memory/3008-1101-0x0000000005320000-0x0000000005938000-memory.dmp

        Filesize

        6.1MB

      • memory/3008-302-0x0000000004D10000-0x0000000004D20000-memory.dmp

        Filesize

        64KB

      • memory/3008-304-0x0000000004D10000-0x0000000004D20000-memory.dmp

        Filesize

        64KB

      • memory/3008-300-0x0000000004D10000-0x0000000004D20000-memory.dmp

        Filesize

        64KB

      • memory/3008-298-0x0000000000930000-0x000000000097B000-memory.dmp

        Filesize

        300KB

      • memory/3008-224-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/3008-192-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/3008-194-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/3008-191-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/3008-196-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/3008-198-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/3008-200-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/3008-202-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/3008-206-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/3008-204-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/3008-208-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/3008-210-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/3008-212-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/3008-214-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/3008-216-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/3008-218-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/3008-220-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/3008-222-0x00000000052D0000-0x000000000530F000-memory.dmp

        Filesize

        252KB

      • memory/5000-173-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/5000-183-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB

      • memory/5000-156-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/5000-184-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB

      • memory/5000-174-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB

      • memory/5000-182-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB

      • memory/5000-154-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/5000-172-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB

      • memory/5000-180-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/5000-158-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/5000-178-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/5000-176-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/5000-186-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/5000-160-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/5000-181-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/5000-170-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/5000-168-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/5000-166-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/5000-164-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/5000-162-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/5000-152-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/5000-151-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/5000-150-0x0000000004D90000-0x0000000005334000-memory.dmp

        Filesize

        5.6MB

      • memory/5000-149-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB

      • memory/5000-148-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB