Analysis

  • max time kernel
    135s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 17:17

General

  • Target

    f549dbb0025260b4218e86d1c1d87f43dd8429054c2b1a2c0a9c83e4b9be659c.exe

  • Size

    695KB

  • MD5

    a3bab21af08b92e93ed79c75b3779a85

  • SHA1

    94075ee802d2a3b180b34724117a5dd3702a1e2f

  • SHA256

    f549dbb0025260b4218e86d1c1d87f43dd8429054c2b1a2c0a9c83e4b9be659c

  • SHA512

    7e27dc26e1193ab1e9b83c44fb2c95379a2c4fc412ed3dfce79f5273f5e2585a8621fbcb0858895e90e38d1c511514bbedb217cc9043b4fe0a92343c97dc4166

  • SSDEEP

    12288:BMrry90bP47oBYo8iHgCpAEq8XOK/Xjdsqb3/+IaqnhznQs6vIdlAUwiex:WyIP4MZLpR7XOKPjCqbmIawhznQsa/7d

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f549dbb0025260b4218e86d1c1d87f43dd8429054c2b1a2c0a9c83e4b9be659c.exe
    "C:\Users\Admin\AppData\Local\Temp\f549dbb0025260b4218e86d1c1d87f43dd8429054c2b1a2c0a9c83e4b9be659c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1904
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un609005.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un609005.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2516
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1875.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1875.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2096
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 1084
          4⤵
          • Program crash
          PID:1376
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1231.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1231.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1092
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 1196
          4⤵
          • Program crash
          PID:1652
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si674802.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si674802.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3556
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2096 -ip 2096
    1⤵
      PID:3732
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1092 -ip 1092
      1⤵
        PID:3456

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si674802.exe

        Filesize

        175KB

        MD5

        ae6ee520283cd741fd7b7b2e65373b54

        SHA1

        3fd9e9e71db76ac8aedff7bb9d47d3e52b018876

        SHA256

        d3aa2d8a1e406533e951beda7fd7d4060f8a14c0d4f77c12fe7c625ddfc1a9d1

        SHA512

        9ed3070981ad0a104a542d4a41991b78300ebb341e2b6d304174c2f4ba41004189a67fc4679b9916922accab383a416ef965f740f27d3377cd2d46ebe393c713

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si674802.exe

        Filesize

        175KB

        MD5

        ae6ee520283cd741fd7b7b2e65373b54

        SHA1

        3fd9e9e71db76ac8aedff7bb9d47d3e52b018876

        SHA256

        d3aa2d8a1e406533e951beda7fd7d4060f8a14c0d4f77c12fe7c625ddfc1a9d1

        SHA512

        9ed3070981ad0a104a542d4a41991b78300ebb341e2b6d304174c2f4ba41004189a67fc4679b9916922accab383a416ef965f740f27d3377cd2d46ebe393c713

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un609005.exe

        Filesize

        553KB

        MD5

        25e578a2311bcd8fdc45f193750b90b3

        SHA1

        0d2166a6586408ae14a91315d3f3b23b8804ab49

        SHA256

        be29d2fea93ec44d15492ada527717143a6044f6504c470c1f6cb2500b58763f

        SHA512

        e975a1174417864d3a1fc4fde68045c7984d86a87805543737dddc437517daf7b586b0095eb7faed69c692aef4e426be1cfbca32c2178069451413f404c0d393

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un609005.exe

        Filesize

        553KB

        MD5

        25e578a2311bcd8fdc45f193750b90b3

        SHA1

        0d2166a6586408ae14a91315d3f3b23b8804ab49

        SHA256

        be29d2fea93ec44d15492ada527717143a6044f6504c470c1f6cb2500b58763f

        SHA512

        e975a1174417864d3a1fc4fde68045c7984d86a87805543737dddc437517daf7b586b0095eb7faed69c692aef4e426be1cfbca32c2178069451413f404c0d393

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1875.exe

        Filesize

        308KB

        MD5

        e1aa0a2ebdc7779c4f727fa32490be76

        SHA1

        b58ff46eacb63b320f9c39e730680baa1e19cdbb

        SHA256

        92b046a3a0adbbedc1e16c8f422d12f88017e782ac04be826439d37acc90842a

        SHA512

        bf14866dad3ef93f9d0f148e5002cd93ffbd5d26fa3b9343e65453454f52edaa5ecedfc40e70fd1eba6c3d233fc18a1d04805177e4442b4edba9dc24dcc79b73

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1875.exe

        Filesize

        308KB

        MD5

        e1aa0a2ebdc7779c4f727fa32490be76

        SHA1

        b58ff46eacb63b320f9c39e730680baa1e19cdbb

        SHA256

        92b046a3a0adbbedc1e16c8f422d12f88017e782ac04be826439d37acc90842a

        SHA512

        bf14866dad3ef93f9d0f148e5002cd93ffbd5d26fa3b9343e65453454f52edaa5ecedfc40e70fd1eba6c3d233fc18a1d04805177e4442b4edba9dc24dcc79b73

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1231.exe

        Filesize

        366KB

        MD5

        101c7c6711fb079bd8817ef097acdbdd

        SHA1

        de2d23ea7a3b9657b5bd6894c2928bc638933965

        SHA256

        dd63094f9768454d631a3d9645b2d72f8e95c65b4ef7091a68b47ca32895cb94

        SHA512

        a4f07740a861e6e4bd9982f8758933e954ed524614a0ab1703468bfa805a628898278ce6fbf8c8ce175bb1e8322250ee8de96e6ef4cbebfd720f1d835e0ad127

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1231.exe

        Filesize

        366KB

        MD5

        101c7c6711fb079bd8817ef097acdbdd

        SHA1

        de2d23ea7a3b9657b5bd6894c2928bc638933965

        SHA256

        dd63094f9768454d631a3d9645b2d72f8e95c65b4ef7091a68b47ca32895cb94

        SHA512

        a4f07740a861e6e4bd9982f8758933e954ed524614a0ab1703468bfa805a628898278ce6fbf8c8ce175bb1e8322250ee8de96e6ef4cbebfd720f1d835e0ad127

      • memory/1092-1099-0x0000000005490000-0x0000000005AA8000-memory.dmp

        Filesize

        6.1MB

      • memory/1092-1102-0x0000000004E30000-0x0000000004E6C000-memory.dmp

        Filesize

        240KB

      • memory/1092-1114-0x00000000076D0000-0x0000000007BFC000-memory.dmp

        Filesize

        5.2MB

      • memory/1092-1113-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/1092-1112-0x0000000007500000-0x00000000076C2000-memory.dmp

        Filesize

        1.8MB

      • memory/1092-1111-0x0000000007360000-0x00000000073B0000-memory.dmp

        Filesize

        320KB

      • memory/1092-1110-0x0000000006710000-0x0000000006786000-memory.dmp

        Filesize

        472KB

      • memory/1092-1109-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/1092-1108-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/1092-1107-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/1092-1105-0x0000000005EB0000-0x0000000005F16000-memory.dmp

        Filesize

        408KB

      • memory/1092-1104-0x0000000005E10000-0x0000000005EA2000-memory.dmp

        Filesize

        584KB

      • memory/1092-1103-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/1092-1101-0x0000000004E10000-0x0000000004E22000-memory.dmp

        Filesize

        72KB

      • memory/1092-1100-0x0000000005AB0000-0x0000000005BBA000-memory.dmp

        Filesize

        1.0MB

      • memory/1092-226-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/1092-224-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/1092-222-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/1092-220-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/1092-218-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/1092-216-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/1092-190-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/1092-189-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/1092-192-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/1092-194-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/1092-196-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/1092-198-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/1092-200-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/1092-202-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/1092-204-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/1092-206-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/1092-207-0x0000000002130000-0x000000000217B000-memory.dmp

        Filesize

        300KB

      • memory/1092-209-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/1092-210-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/1092-212-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/1092-214-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/1092-213-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/2096-171-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/2096-184-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/2096-169-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/2096-167-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/2096-181-0x0000000002770000-0x0000000002780000-memory.dmp

        Filesize

        64KB

      • memory/2096-180-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/2096-150-0x0000000002770000-0x0000000002780000-memory.dmp

        Filesize

        64KB

      • memory/2096-179-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/2096-177-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/2096-153-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/2096-175-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/2096-173-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/2096-151-0x0000000002770000-0x0000000002780000-memory.dmp

        Filesize

        64KB

      • memory/2096-152-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/2096-182-0x0000000002770000-0x0000000002780000-memory.dmp

        Filesize

        64KB

      • memory/2096-165-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/2096-163-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/2096-161-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/2096-159-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/2096-157-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/2096-155-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/2096-149-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/2096-148-0x0000000004DD0000-0x0000000005374000-memory.dmp

        Filesize

        5.6MB

      • memory/3556-1120-0x0000000000F30000-0x0000000000F62000-memory.dmp

        Filesize

        200KB

      • memory/3556-1121-0x0000000005B20000-0x0000000005B30000-memory.dmp

        Filesize

        64KB

      • memory/3556-1122-0x0000000005B20000-0x0000000005B30000-memory.dmp

        Filesize

        64KB