Analysis

  • max time kernel
    101s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 18:27

General

  • Target

    73606285c3d298cde9b10df139265d5ceabd00785ea679087d2e89c84680a1f8.exe

  • Size

    700KB

  • MD5

    ec93561cc0c345861e7797cf1baa6083

  • SHA1

    c242984296f154f775913686614a2c9f7eaa7e77

  • SHA256

    73606285c3d298cde9b10df139265d5ceabd00785ea679087d2e89c84680a1f8

  • SHA512

    086538f8a577ebf7457f7f4cb3a1bf5dc5ff898e521f6b7d7986a3e5d854caa5ca83e3cc059382d735124221dc2eda3558f6d79ba83ead7ae497c1fd3db15a1b

  • SSDEEP

    12288:VMrjy90Q4NUs37OyreDseMbZa9ZPXQ6NwPtNLYoBcphy7pTE:KyLveO1Q9bZavXtNAtljOEq

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73606285c3d298cde9b10df139265d5ceabd00785ea679087d2e89c84680a1f8.exe
    "C:\Users\Admin\AppData\Local\Temp\73606285c3d298cde9b10df139265d5ceabd00785ea679087d2e89c84680a1f8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4904
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un317571.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un317571.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4520
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9733.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9733.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3452
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3452 -s 1088
          4⤵
          • Program crash
          PID:4436
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9996.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9996.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2644
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 1472
          4⤵
          • Program crash
          PID:4208
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si103174.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si103174.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4496
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3452 -ip 3452
    1⤵
      PID:4460
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2644 -ip 2644
      1⤵
        PID:3400

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si103174.exe

        Filesize

        175KB

        MD5

        a33d62efc1c72f7132b5b59c348c96df

        SHA1

        a575ae349549deb2fe57cc479f9fae67bba7428d

        SHA256

        af28c13b5a03e8191baa75b5180b9b227951439ed32dd6f6b9463261fecf3f63

        SHA512

        bf49f777bdefe83d686b9c47da929365a34a814b83602788d59cc556ad0916aed68d6eceab33f1c6887da6bf8e57e05ad054899992131340c87c9ea64b7a14ec

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si103174.exe

        Filesize

        175KB

        MD5

        a33d62efc1c72f7132b5b59c348c96df

        SHA1

        a575ae349549deb2fe57cc479f9fae67bba7428d

        SHA256

        af28c13b5a03e8191baa75b5180b9b227951439ed32dd6f6b9463261fecf3f63

        SHA512

        bf49f777bdefe83d686b9c47da929365a34a814b83602788d59cc556ad0916aed68d6eceab33f1c6887da6bf8e57e05ad054899992131340c87c9ea64b7a14ec

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un317571.exe

        Filesize

        558KB

        MD5

        6c3f2641ef21136223bbc64cc2b6fd68

        SHA1

        e7d3ce6557e3d4be8f31bd9ab49874943c8ef5a2

        SHA256

        ef6ebd011c09b07c2448144fdb2502d07503feafe436ed24c3aacac4173a1856

        SHA512

        91faa8cba442f9c88274737c2888d1c8f43555239b07ab816b57ca157ea6508dcc6024280c812b020ace900d98f1d66ceb487f00abc8d959fc3d4559d52b8abc

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un317571.exe

        Filesize

        558KB

        MD5

        6c3f2641ef21136223bbc64cc2b6fd68

        SHA1

        e7d3ce6557e3d4be8f31bd9ab49874943c8ef5a2

        SHA256

        ef6ebd011c09b07c2448144fdb2502d07503feafe436ed24c3aacac4173a1856

        SHA512

        91faa8cba442f9c88274737c2888d1c8f43555239b07ab816b57ca157ea6508dcc6024280c812b020ace900d98f1d66ceb487f00abc8d959fc3d4559d52b8abc

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9733.exe

        Filesize

        307KB

        MD5

        77720d9d9a59a8acc856e01b6603fb9e

        SHA1

        15253a30313fdd744c11ac88d8b5b596d7563e9c

        SHA256

        c2c303843488ab98410645a8a04cc99b68f3531d834bf2dbe9988e6e1568faa0

        SHA512

        3be91615cd9b5a73ac7aa7ec0d65425d7acab3d85f932e3142aad374630bb7d6c8f586d794e8cad1eeb494bb77ef5afdba84fa02839e040dbee47cae09902bca

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9733.exe

        Filesize

        307KB

        MD5

        77720d9d9a59a8acc856e01b6603fb9e

        SHA1

        15253a30313fdd744c11ac88d8b5b596d7563e9c

        SHA256

        c2c303843488ab98410645a8a04cc99b68f3531d834bf2dbe9988e6e1568faa0

        SHA512

        3be91615cd9b5a73ac7aa7ec0d65425d7acab3d85f932e3142aad374630bb7d6c8f586d794e8cad1eeb494bb77ef5afdba84fa02839e040dbee47cae09902bca

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9996.exe

        Filesize

        366KB

        MD5

        8a8fdc8d099f914a779aea8d00645e9a

        SHA1

        8fb3e9832b1635f0514366de61fa76ed1203d3f4

        SHA256

        fa8f6873c96573e66d8c71976012fd60e872e60b5b50e12ef432c7e587719a76

        SHA512

        d1bdc5be8f5bed73a336ae8d58e779285a7c15d974021562fba54c45fbcd2874a248999f9f64c7ebad192b909aa027378bf576290e2d1991902ab6cf7d61fc6a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9996.exe

        Filesize

        366KB

        MD5

        8a8fdc8d099f914a779aea8d00645e9a

        SHA1

        8fb3e9832b1635f0514366de61fa76ed1203d3f4

        SHA256

        fa8f6873c96573e66d8c71976012fd60e872e60b5b50e12ef432c7e587719a76

        SHA512

        d1bdc5be8f5bed73a336ae8d58e779285a7c15d974021562fba54c45fbcd2874a248999f9f64c7ebad192b909aa027378bf576290e2d1991902ab6cf7d61fc6a

      • memory/2644-1102-0x0000000005A30000-0x0000000005B3A000-memory.dmp

        Filesize

        1.0MB

      • memory/2644-231-0x0000000002630000-0x0000000002640000-memory.dmp

        Filesize

        64KB

      • memory/2644-204-0x0000000002770000-0x00000000027AF000-memory.dmp

        Filesize

        252KB

      • memory/2644-206-0x0000000002770000-0x00000000027AF000-memory.dmp

        Filesize

        252KB

      • memory/2644-1115-0x0000000002630000-0x0000000002640000-memory.dmp

        Filesize

        64KB

      • memory/2644-1114-0x0000000006A50000-0x0000000006C12000-memory.dmp

        Filesize

        1.8MB

      • memory/2644-1113-0x00000000067A0000-0x00000000067F0000-memory.dmp

        Filesize

        320KB

      • memory/2644-1112-0x0000000006710000-0x0000000006786000-memory.dmp

        Filesize

        472KB

      • memory/2644-1111-0x0000000002630000-0x0000000002640000-memory.dmp

        Filesize

        64KB

      • memory/2644-1109-0x0000000002630000-0x0000000002640000-memory.dmp

        Filesize

        64KB

      • memory/2644-208-0x0000000002770000-0x00000000027AF000-memory.dmp

        Filesize

        252KB

      • memory/2644-1110-0x0000000002630000-0x0000000002640000-memory.dmp

        Filesize

        64KB

      • memory/2644-1107-0x0000000005EB0000-0x0000000005F16000-memory.dmp

        Filesize

        408KB

      • memory/2644-1106-0x0000000005E10000-0x0000000005EA2000-memory.dmp

        Filesize

        584KB

      • memory/2644-1105-0x0000000002630000-0x0000000002640000-memory.dmp

        Filesize

        64KB

      • memory/2644-1104-0x0000000005B40000-0x0000000005B7C000-memory.dmp

        Filesize

        240KB

      • memory/2644-1103-0x00000000028D0000-0x00000000028E2000-memory.dmp

        Filesize

        72KB

      • memory/2644-1101-0x0000000005410000-0x0000000005A28000-memory.dmp

        Filesize

        6.1MB

      • memory/2644-233-0x0000000002630000-0x0000000002640000-memory.dmp

        Filesize

        64KB

      • memory/2644-218-0x0000000002770000-0x00000000027AF000-memory.dmp

        Filesize

        252KB

      • memory/2644-228-0x0000000002630000-0x0000000002640000-memory.dmp

        Filesize

        64KB

      • memory/2644-227-0x0000000000720000-0x000000000076B000-memory.dmp

        Filesize

        300KB

      • memory/2644-222-0x0000000002770000-0x00000000027AF000-memory.dmp

        Filesize

        252KB

      • memory/2644-191-0x0000000002770000-0x00000000027AF000-memory.dmp

        Filesize

        252KB

      • memory/2644-192-0x0000000002770000-0x00000000027AF000-memory.dmp

        Filesize

        252KB

      • memory/2644-194-0x0000000002770000-0x00000000027AF000-memory.dmp

        Filesize

        252KB

      • memory/2644-196-0x0000000002770000-0x00000000027AF000-memory.dmp

        Filesize

        252KB

      • memory/2644-198-0x0000000002770000-0x00000000027AF000-memory.dmp

        Filesize

        252KB

      • memory/2644-200-0x0000000002770000-0x00000000027AF000-memory.dmp

        Filesize

        252KB

      • memory/2644-202-0x0000000002770000-0x00000000027AF000-memory.dmp

        Filesize

        252KB

      • memory/2644-224-0x0000000002770000-0x00000000027AF000-memory.dmp

        Filesize

        252KB

      • memory/2644-1116-0x0000000006C20000-0x000000000714C000-memory.dmp

        Filesize

        5.2MB

      • memory/2644-220-0x0000000002770000-0x00000000027AF000-memory.dmp

        Filesize

        252KB

      • memory/2644-210-0x0000000002770000-0x00000000027AF000-memory.dmp

        Filesize

        252KB

      • memory/2644-212-0x0000000002770000-0x00000000027AF000-memory.dmp

        Filesize

        252KB

      • memory/2644-214-0x0000000002770000-0x00000000027AF000-memory.dmp

        Filesize

        252KB

      • memory/2644-216-0x0000000002770000-0x00000000027AF000-memory.dmp

        Filesize

        252KB

      • memory/3452-181-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/3452-170-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3452-148-0x0000000004CA0000-0x0000000005244000-memory.dmp

        Filesize

        5.6MB

      • memory/3452-152-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/3452-153-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3452-186-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/3452-184-0x0000000002210000-0x0000000002220000-memory.dmp

        Filesize

        64KB

      • memory/3452-183-0x0000000002210000-0x0000000002220000-memory.dmp

        Filesize

        64KB

      • memory/3452-182-0x0000000002210000-0x0000000002220000-memory.dmp

        Filesize

        64KB

      • memory/3452-150-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3452-154-0x0000000002210000-0x0000000002220000-memory.dmp

        Filesize

        64KB

      • memory/3452-180-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3452-178-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3452-176-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3452-174-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3452-172-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3452-168-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3452-166-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3452-164-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3452-162-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3452-158-0x0000000002210000-0x0000000002220000-memory.dmp

        Filesize

        64KB

      • memory/3452-160-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3452-157-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3452-149-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3452-156-0x0000000002210000-0x0000000002220000-memory.dmp

        Filesize

        64KB

      • memory/4496-1122-0x0000000000670000-0x00000000006A2000-memory.dmp

        Filesize

        200KB

      • memory/4496-1123-0x0000000004F00000-0x0000000004F10000-memory.dmp

        Filesize

        64KB