Analysis

  • max time kernel
    146s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 18:26

General

  • Target

    c2402ba2eae527959aad74c8d710a3be7193f2132cad4d7b845f9f31817ae1a3.exe

  • Size

    701KB

  • MD5

    dc804ce13da1e6a5a922eaef2812ce1a

  • SHA1

    9e9ab4847ee3940c3a284adcd118534483e9930c

  • SHA256

    c2402ba2eae527959aad74c8d710a3be7193f2132cad4d7b845f9f31817ae1a3

  • SHA512

    d145de6b0d39d6d57a047c170b5d8ae8a6581c96d7a45038fd6e90dab0aabe2aad3bfbb5b62c2e25ba7af2d8be5f228a9fbafe7950efe8e1f0d3d7004b98f544

  • SSDEEP

    12288:cMr8y90aee35BS8+0/Jy8yPEGRO37X0KPDmNwPDMLdwV5esC+3J:gypTE8+0Ry89z3wMKNAD26MsC+3J

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2402ba2eae527959aad74c8d710a3be7193f2132cad4d7b845f9f31817ae1a3.exe
    "C:\Users\Admin\AppData\Local\Temp\c2402ba2eae527959aad74c8d710a3be7193f2132cad4d7b845f9f31817ae1a3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3620
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un011239.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un011239.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3624
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9530.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9530.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4724
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4724 -s 1080
          4⤵
          • Program crash
          PID:860
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6980.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6980.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4568
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 1340
          4⤵
          • Program crash
          PID:1540
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si037650.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si037650.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4408
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4724 -ip 4724
    1⤵
      PID:1872
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4568 -ip 4568
      1⤵
        PID:1552
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:1204

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si037650.exe

        Filesize

        175KB

        MD5

        f78c458872802f1813096100c5a1ff78

        SHA1

        82efbcdc2eff26d84292d50951da70c98f3784ce

        SHA256

        cef1b94138444dbe0c374bf5b989b37fb8c7ed2dc40222ab5168c6678a76ac64

        SHA512

        599917b19f81fbee6d6887453ed08a9588a197d9cc4724c83913d44f535a6c9cdd4c55af5372e3c84441abd179ffb5bf2e42ff915f88fcc38dc95495ae0c65e6

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si037650.exe

        Filesize

        175KB

        MD5

        f78c458872802f1813096100c5a1ff78

        SHA1

        82efbcdc2eff26d84292d50951da70c98f3784ce

        SHA256

        cef1b94138444dbe0c374bf5b989b37fb8c7ed2dc40222ab5168c6678a76ac64

        SHA512

        599917b19f81fbee6d6887453ed08a9588a197d9cc4724c83913d44f535a6c9cdd4c55af5372e3c84441abd179ffb5bf2e42ff915f88fcc38dc95495ae0c65e6

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un011239.exe

        Filesize

        558KB

        MD5

        497b5ed9655a5558b5d10249a0d6bd08

        SHA1

        4cec68727ffea90d59ca4a6cd29f5a67b12bc8c2

        SHA256

        6921fc773a20129d333030a32f38008c69ba4b7a0da764639a7c6e246f1c6331

        SHA512

        7ed38bb9aa3a2e9df5e62cee60fa8fc0031b27f52b80116971545e42aa355c8b28eeffcaf1546394349d828c39ccc1b7303ec1c7df6ea9dc735210b912bc056c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un011239.exe

        Filesize

        558KB

        MD5

        497b5ed9655a5558b5d10249a0d6bd08

        SHA1

        4cec68727ffea90d59ca4a6cd29f5a67b12bc8c2

        SHA256

        6921fc773a20129d333030a32f38008c69ba4b7a0da764639a7c6e246f1c6331

        SHA512

        7ed38bb9aa3a2e9df5e62cee60fa8fc0031b27f52b80116971545e42aa355c8b28eeffcaf1546394349d828c39ccc1b7303ec1c7df6ea9dc735210b912bc056c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9530.exe

        Filesize

        307KB

        MD5

        8aa8b26bedd6d58312f45cbf4ecb6f41

        SHA1

        21bbf9d935fe97e0a4786290121ee2a1d65b96a2

        SHA256

        29a8ed3adb64b1a25493dce078f45b7d25705c97e950008d4bb3c6162ce5cd5e

        SHA512

        f4de2aa80252c63d1a4f58b16267a144d8739bcbcd232b6690d6d196ec2b9598c030f16af08d5a4fc1cc5af35b0a0338167989caafc903c6ea1ad59ac335f260

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9530.exe

        Filesize

        307KB

        MD5

        8aa8b26bedd6d58312f45cbf4ecb6f41

        SHA1

        21bbf9d935fe97e0a4786290121ee2a1d65b96a2

        SHA256

        29a8ed3adb64b1a25493dce078f45b7d25705c97e950008d4bb3c6162ce5cd5e

        SHA512

        f4de2aa80252c63d1a4f58b16267a144d8739bcbcd232b6690d6d196ec2b9598c030f16af08d5a4fc1cc5af35b0a0338167989caafc903c6ea1ad59ac335f260

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6980.exe

        Filesize

        366KB

        MD5

        a913dd33dfce64bd64da72290334468c

        SHA1

        9be76bbec39baa4e01aed1dd6247a0494ad1b300

        SHA256

        2c04eba15b1f0ebe77b52d3c4dacbec04452f9f700ffcaefac016a837baa4244

        SHA512

        876a5503583f93560ca06446056ed2106f307718f517ab27f1c124320d78bd552325a5e7e2edae09f9a7e98daac57ffdb35a034d74032223d55a8a27dd84951c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6980.exe

        Filesize

        366KB

        MD5

        a913dd33dfce64bd64da72290334468c

        SHA1

        9be76bbec39baa4e01aed1dd6247a0494ad1b300

        SHA256

        2c04eba15b1f0ebe77b52d3c4dacbec04452f9f700ffcaefac016a837baa4244

        SHA512

        876a5503583f93560ca06446056ed2106f307718f517ab27f1c124320d78bd552325a5e7e2edae09f9a7e98daac57ffdb35a034d74032223d55a8a27dd84951c

      • memory/4408-1118-0x0000000005200000-0x0000000005210000-memory.dmp

        Filesize

        64KB

      • memory/4408-1117-0x0000000000670000-0x00000000006A2000-memory.dmp

        Filesize

        200KB

      • memory/4568-534-0x0000000004D40000-0x0000000004D50000-memory.dmp

        Filesize

        64KB

      • memory/4568-1101-0x0000000004D40000-0x0000000004D50000-memory.dmp

        Filesize

        64KB

      • memory/4568-1111-0x0000000004D40000-0x0000000004D50000-memory.dmp

        Filesize

        64KB

      • memory/4568-1110-0x0000000006C10000-0x000000000713C000-memory.dmp

        Filesize

        5.2MB

      • memory/4568-1109-0x0000000006A30000-0x0000000006BF2000-memory.dmp

        Filesize

        1.8MB

      • memory/4568-1108-0x0000000004D40000-0x0000000004D50000-memory.dmp

        Filesize

        64KB

      • memory/4568-1107-0x0000000004D40000-0x0000000004D50000-memory.dmp

        Filesize

        64KB

      • memory/4568-1105-0x0000000006880000-0x00000000068D0000-memory.dmp

        Filesize

        320KB

      • memory/4568-1104-0x00000000067E0000-0x0000000006856000-memory.dmp

        Filesize

        472KB

      • memory/4568-1103-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/4568-1102-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/4568-1100-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/4568-1099-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/4568-1098-0x0000000005B20000-0x0000000005C2A000-memory.dmp

        Filesize

        1.0MB

      • memory/4568-1097-0x00000000054C0000-0x0000000005AD8000-memory.dmp

        Filesize

        6.1MB

      • memory/4568-530-0x0000000000720000-0x000000000076B000-memory.dmp

        Filesize

        300KB

      • memory/4568-532-0x0000000004D40000-0x0000000004D50000-memory.dmp

        Filesize

        64KB

      • memory/4568-221-0x0000000005340000-0x000000000537F000-memory.dmp

        Filesize

        252KB

      • memory/4568-189-0x0000000005340000-0x000000000537F000-memory.dmp

        Filesize

        252KB

      • memory/4568-191-0x0000000005340000-0x000000000537F000-memory.dmp

        Filesize

        252KB

      • memory/4568-188-0x0000000005340000-0x000000000537F000-memory.dmp

        Filesize

        252KB

      • memory/4568-193-0x0000000005340000-0x000000000537F000-memory.dmp

        Filesize

        252KB

      • memory/4568-195-0x0000000005340000-0x000000000537F000-memory.dmp

        Filesize

        252KB

      • memory/4568-197-0x0000000005340000-0x000000000537F000-memory.dmp

        Filesize

        252KB

      • memory/4568-199-0x0000000005340000-0x000000000537F000-memory.dmp

        Filesize

        252KB

      • memory/4568-201-0x0000000005340000-0x000000000537F000-memory.dmp

        Filesize

        252KB

      • memory/4568-203-0x0000000005340000-0x000000000537F000-memory.dmp

        Filesize

        252KB

      • memory/4568-205-0x0000000005340000-0x000000000537F000-memory.dmp

        Filesize

        252KB

      • memory/4568-207-0x0000000005340000-0x000000000537F000-memory.dmp

        Filesize

        252KB

      • memory/4568-209-0x0000000005340000-0x000000000537F000-memory.dmp

        Filesize

        252KB

      • memory/4568-211-0x0000000005340000-0x000000000537F000-memory.dmp

        Filesize

        252KB

      • memory/4568-213-0x0000000005340000-0x000000000537F000-memory.dmp

        Filesize

        252KB

      • memory/4568-215-0x0000000005340000-0x000000000537F000-memory.dmp

        Filesize

        252KB

      • memory/4568-217-0x0000000005340000-0x000000000537F000-memory.dmp

        Filesize

        252KB

      • memory/4568-219-0x0000000005340000-0x000000000537F000-memory.dmp

        Filesize

        252KB

      • memory/4724-173-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4724-183-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/4724-171-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4724-152-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4724-181-0x0000000004DF0000-0x0000000004E00000-memory.dmp

        Filesize

        64KB

      • memory/4724-180-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/4724-179-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4724-177-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4724-169-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4724-175-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4724-148-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/4724-155-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4724-157-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4724-167-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4724-165-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4724-163-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4724-161-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4724-159-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4724-151-0x0000000004E00000-0x00000000053A4000-memory.dmp

        Filesize

        5.6MB

      • memory/4724-149-0x0000000004DF0000-0x0000000004E00000-memory.dmp

        Filesize

        64KB

      • memory/4724-150-0x0000000004DF0000-0x0000000004E00000-memory.dmp

        Filesize

        64KB

      • memory/4724-153-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB