Analysis

  • max time kernel
    80s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 17:16

General

  • Target

    cfa5aaf9cd6b49f3de97bd3f5a97a21d33b1fd0c89f06a3c63c62112d626de6f.exe

  • Size

    696KB

  • MD5

    e288231352766ba55eb8e2517a0a773b

  • SHA1

    6f0346fdd7cb930992b2531d7f33d7de54fc5813

  • SHA256

    cfa5aaf9cd6b49f3de97bd3f5a97a21d33b1fd0c89f06a3c63c62112d626de6f

  • SHA512

    7dffa0d7756e86bc4a8c6bb106306df2c29d3702f7a0de99794bec18fefdc22451993d5d80d1e3336cc1eb9bc431eb94a79d944608e1e98c83fb7dc0071d7428

  • SSDEEP

    12288:AMrry90VOSFgR63R9Ei+pGTVXhXuuleu/vtKLz3sWtnhATQs6cIjn0NUo:7yXW/Ei+peXhXuulR/vtyT1hATQshi0t

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cfa5aaf9cd6b49f3de97bd3f5a97a21d33b1fd0c89f06a3c63c62112d626de6f.exe
    "C:\Users\Admin\AppData\Local\Temp\cfa5aaf9cd6b49f3de97bd3f5a97a21d33b1fd0c89f06a3c63c62112d626de6f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un436562.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un436562.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3004
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6972.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6972.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:496
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 496 -s 1084
          4⤵
          • Program crash
          PID:3156
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5749.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5749.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:752
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 752 -s 1840
          4⤵
          • Program crash
          PID:4708
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si280730.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si280730.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4844
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 496 -ip 496
    1⤵
      PID:1368
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 752 -ip 752
      1⤵
        PID:460

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si280730.exe

        Filesize

        175KB

        MD5

        6039dbb96837529f412a1eacc9a26ce3

        SHA1

        5028798c33f3b42372c34c689eb36e98cac146f8

        SHA256

        d18bb71d4adac8bd5a539dff69629be576f916fba3ab0a3dc5edf9fc1fee2108

        SHA512

        f6a70279aafb2f81b97cd31b2df9f6644c604c837a6c712a85b3a46b43bcc4d4a82abf2d162f6ee1bf6e92084082fa09e93cccaba6c28de6de631301ec6fb52a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si280730.exe

        Filesize

        175KB

        MD5

        6039dbb96837529f412a1eacc9a26ce3

        SHA1

        5028798c33f3b42372c34c689eb36e98cac146f8

        SHA256

        d18bb71d4adac8bd5a539dff69629be576f916fba3ab0a3dc5edf9fc1fee2108

        SHA512

        f6a70279aafb2f81b97cd31b2df9f6644c604c837a6c712a85b3a46b43bcc4d4a82abf2d162f6ee1bf6e92084082fa09e93cccaba6c28de6de631301ec6fb52a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un436562.exe

        Filesize

        553KB

        MD5

        d5488f997fbbb57cd0ed87ec7dc748ed

        SHA1

        4b2e17e49202a7298d1d2a56ddcfe8775ece6f64

        SHA256

        b976e94b4d396d9d7def1f88ec9f70238b0e3a838789e279886d0a6731b40a2d

        SHA512

        b9bdd584a99357d15e8883929d509c39ed0a958c1a7d0bf5989bcb32d5daeca92c683e363cc26e2da1b4c534bf9b6bc97866f5a87ab20d2c535c7bbf87f51215

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un436562.exe

        Filesize

        553KB

        MD5

        d5488f997fbbb57cd0ed87ec7dc748ed

        SHA1

        4b2e17e49202a7298d1d2a56ddcfe8775ece6f64

        SHA256

        b976e94b4d396d9d7def1f88ec9f70238b0e3a838789e279886d0a6731b40a2d

        SHA512

        b9bdd584a99357d15e8883929d509c39ed0a958c1a7d0bf5989bcb32d5daeca92c683e363cc26e2da1b4c534bf9b6bc97866f5a87ab20d2c535c7bbf87f51215

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6972.exe

        Filesize

        308KB

        MD5

        dc1bfe7e1f20b4f23a4ce1561838e703

        SHA1

        4d924b085df716509d66af328d5e350d992704a3

        SHA256

        44d3e344fb5b8ffbf9d1e8a9b2caced8263434e4a8d1c86a76709f97a4a5a4dc

        SHA512

        3aaf17d0b80dc608ceffccb55a12dca60106375845ebb3878349bf0f9edd3aa2c86363501478cbad18a8537847c073d51cb2cac01cabec555dbd092671b8a885

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6972.exe

        Filesize

        308KB

        MD5

        dc1bfe7e1f20b4f23a4ce1561838e703

        SHA1

        4d924b085df716509d66af328d5e350d992704a3

        SHA256

        44d3e344fb5b8ffbf9d1e8a9b2caced8263434e4a8d1c86a76709f97a4a5a4dc

        SHA512

        3aaf17d0b80dc608ceffccb55a12dca60106375845ebb3878349bf0f9edd3aa2c86363501478cbad18a8537847c073d51cb2cac01cabec555dbd092671b8a885

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5749.exe

        Filesize

        366KB

        MD5

        b145f03e41178d2cd2e0f553387fdf6c

        SHA1

        90eaee62904a8009935b3b66921edde862333e54

        SHA256

        5f00901d1ad7e47b899ea8a302faca8319744fc80d1fdd706488375598ff0e74

        SHA512

        0b93740f475cd7f0b6f123fbf5568aa4b79e70756b0e123c90f6418d7d0562aa27c45903e41bc912a4906d418b4ea7b2e656e09e03c9e11ae9daa76ff8d7ff89

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5749.exe

        Filesize

        366KB

        MD5

        b145f03e41178d2cd2e0f553387fdf6c

        SHA1

        90eaee62904a8009935b3b66921edde862333e54

        SHA256

        5f00901d1ad7e47b899ea8a302faca8319744fc80d1fdd706488375598ff0e74

        SHA512

        0b93740f475cd7f0b6f123fbf5568aa4b79e70756b0e123c90f6418d7d0562aa27c45903e41bc912a4906d418b4ea7b2e656e09e03c9e11ae9daa76ff8d7ff89

      • memory/496-148-0x0000000004D20000-0x00000000052C4000-memory.dmp

        Filesize

        5.6MB

      • memory/496-150-0x0000000002820000-0x0000000002832000-memory.dmp

        Filesize

        72KB

      • memory/496-152-0x0000000002820000-0x0000000002832000-memory.dmp

        Filesize

        72KB

      • memory/496-153-0x0000000002890000-0x00000000028A0000-memory.dmp

        Filesize

        64KB

      • memory/496-155-0x0000000002890000-0x00000000028A0000-memory.dmp

        Filesize

        64KB

      • memory/496-151-0x0000000002890000-0x00000000028A0000-memory.dmp

        Filesize

        64KB

      • memory/496-149-0x0000000000720000-0x000000000074D000-memory.dmp

        Filesize

        180KB

      • memory/496-158-0x0000000002820000-0x0000000002832000-memory.dmp

        Filesize

        72KB

      • memory/496-156-0x0000000002820000-0x0000000002832000-memory.dmp

        Filesize

        72KB

      • memory/496-160-0x0000000002820000-0x0000000002832000-memory.dmp

        Filesize

        72KB

      • memory/496-162-0x0000000002820000-0x0000000002832000-memory.dmp

        Filesize

        72KB

      • memory/496-166-0x0000000002820000-0x0000000002832000-memory.dmp

        Filesize

        72KB

      • memory/496-164-0x0000000002820000-0x0000000002832000-memory.dmp

        Filesize

        72KB

      • memory/496-168-0x0000000002820000-0x0000000002832000-memory.dmp

        Filesize

        72KB

      • memory/496-172-0x0000000002820000-0x0000000002832000-memory.dmp

        Filesize

        72KB

      • memory/496-170-0x0000000002820000-0x0000000002832000-memory.dmp

        Filesize

        72KB

      • memory/496-174-0x0000000002820000-0x0000000002832000-memory.dmp

        Filesize

        72KB

      • memory/496-180-0x0000000002820000-0x0000000002832000-memory.dmp

        Filesize

        72KB

      • memory/496-178-0x0000000002820000-0x0000000002832000-memory.dmp

        Filesize

        72KB

      • memory/496-176-0x0000000002820000-0x0000000002832000-memory.dmp

        Filesize

        72KB

      • memory/496-181-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/496-182-0x0000000002890000-0x00000000028A0000-memory.dmp

        Filesize

        64KB

      • memory/496-183-0x0000000002890000-0x00000000028A0000-memory.dmp

        Filesize

        64KB

      • memory/496-184-0x0000000002890000-0x00000000028A0000-memory.dmp

        Filesize

        64KB

      • memory/496-186-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/752-191-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/752-192-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/752-194-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/752-196-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/752-198-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/752-200-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/752-202-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/752-204-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/752-206-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/752-208-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/752-210-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/752-212-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/752-214-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/752-216-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/752-218-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/752-220-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/752-222-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/752-224-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/752-286-0x00000000007F0000-0x000000000083B000-memory.dmp

        Filesize

        300KB

      • memory/752-287-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

        Filesize

        64KB

      • memory/752-291-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

        Filesize

        64KB

      • memory/752-289-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

        Filesize

        64KB

      • memory/752-1101-0x0000000005460000-0x0000000005A78000-memory.dmp

        Filesize

        6.1MB

      • memory/752-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/752-1103-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/752-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/752-1105-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

        Filesize

        64KB

      • memory/752-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/752-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/752-1109-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

        Filesize

        64KB

      • memory/752-1110-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

        Filesize

        64KB

      • memory/752-1111-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

        Filesize

        64KB

      • memory/752-1112-0x0000000006960000-0x0000000006B22000-memory.dmp

        Filesize

        1.8MB

      • memory/752-1113-0x0000000006B30000-0x000000000705C000-memory.dmp

        Filesize

        5.2MB

      • memory/752-1114-0x0000000007190000-0x0000000007206000-memory.dmp

        Filesize

        472KB

      • memory/752-1115-0x0000000007220000-0x0000000007270000-memory.dmp

        Filesize

        320KB

      • memory/752-1116-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

        Filesize

        64KB

      • memory/4844-1122-0x0000000000540000-0x0000000000572000-memory.dmp

        Filesize

        200KB

      • memory/4844-1123-0x0000000005160000-0x0000000005170000-memory.dmp

        Filesize

        64KB

      • memory/4844-1125-0x0000000005160000-0x0000000005170000-memory.dmp

        Filesize

        64KB