Analysis

  • max time kernel
    97s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 18:31

General

  • Target

    c791f6cc38553eccafcd5e6fb00aa64bb46225affcc4d9221d6841943271460f.exe

  • Size

    700KB

  • MD5

    71e6baafabcca6cb031ceb3a32101457

  • SHA1

    b1912c8daabe9b59481ea26fe415002ab86a7a8c

  • SHA256

    c791f6cc38553eccafcd5e6fb00aa64bb46225affcc4d9221d6841943271460f

  • SHA512

    e58ebabe335ed8b3f7ed4b0f5e78a2811bcd390513cdf262733fff880c1861e708ffed2d1e1f9a23138db612e99eaa9ca478c2efffb57b1c08f9e38b0427ea7e

  • SSDEEP

    12288:BMrsy90TyRVjvzf2YMBjef1+LU0muHmbZQoRIisiFNwPViLRiXdddscr:dygUjvZM0+LNmBZQcNAVYORr

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c791f6cc38553eccafcd5e6fb00aa64bb46225affcc4d9221d6841943271460f.exe
    "C:\Users\Admin\AppData\Local\Temp\c791f6cc38553eccafcd5e6fb00aa64bb46225affcc4d9221d6841943271460f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un598958.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un598958.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3208
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0190.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0190.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1236
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1236 -s 1084
          4⤵
          • Program crash
          PID:3612
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0590.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0590.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5084
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5084 -s 1340
          4⤵
          • Program crash
          PID:1312
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si684552.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si684552.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:640
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1236 -ip 1236
    1⤵
      PID:5028
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 5084 -ip 5084
      1⤵
        PID:4632

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si684552.exe

        Filesize

        175KB

        MD5

        4d5f0227cd19b70d90526b0640447093

        SHA1

        c73e52cd3641e699b96ee3f204c5470663b9b604

        SHA256

        aee2f6a64a3e266a7ce8f6e67d180e70d9e1e1f21af8be325e70d3a6b525c711

        SHA512

        fa08601829fbaac8345b5c5a31d0c995467a2423fbf031702442abbf9707540a2f0d2ac950c414393ec720274d282b7aaf1e49e8c8bcade6e7ceee4cab17ba01

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si684552.exe

        Filesize

        175KB

        MD5

        4d5f0227cd19b70d90526b0640447093

        SHA1

        c73e52cd3641e699b96ee3f204c5470663b9b604

        SHA256

        aee2f6a64a3e266a7ce8f6e67d180e70d9e1e1f21af8be325e70d3a6b525c711

        SHA512

        fa08601829fbaac8345b5c5a31d0c995467a2423fbf031702442abbf9707540a2f0d2ac950c414393ec720274d282b7aaf1e49e8c8bcade6e7ceee4cab17ba01

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un598958.exe

        Filesize

        558KB

        MD5

        d5e05c617e11ad77e5d6648a992367dd

        SHA1

        e742e89aa6dcef2c531c89050ce10e740d9320eb

        SHA256

        01cb8dc9cc0d187bdebf649ad32eb74f580a8ff86520ac9ed5fe11b680eabdee

        SHA512

        c0c89a83f897a4b1ab3ccf0f31c657c024b6166a74fdfb620ad3fef7b57b4552b8950a0a469f9a84648735b88da438327474defc05625d439388fb841bcf4d8a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un598958.exe

        Filesize

        558KB

        MD5

        d5e05c617e11ad77e5d6648a992367dd

        SHA1

        e742e89aa6dcef2c531c89050ce10e740d9320eb

        SHA256

        01cb8dc9cc0d187bdebf649ad32eb74f580a8ff86520ac9ed5fe11b680eabdee

        SHA512

        c0c89a83f897a4b1ab3ccf0f31c657c024b6166a74fdfb620ad3fef7b57b4552b8950a0a469f9a84648735b88da438327474defc05625d439388fb841bcf4d8a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0190.exe

        Filesize

        307KB

        MD5

        17457efbbff46ae20e6315f43df21927

        SHA1

        4cf9b4dbcf74bc1938906cc5843269e36fe4872a

        SHA256

        4f146daa05d9d1ce9a0551eaa4e5c51bace9d8fabe23d8af57bdd528ee1e3a6a

        SHA512

        8c818d173b381425337a9dc568ff4781a70c04c2ff83583f50ab5cab582ba6479a657a1387e6b4ec2cd9f6e2fe804055113ca4410912c1829551f8c45b67b0b2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0190.exe

        Filesize

        307KB

        MD5

        17457efbbff46ae20e6315f43df21927

        SHA1

        4cf9b4dbcf74bc1938906cc5843269e36fe4872a

        SHA256

        4f146daa05d9d1ce9a0551eaa4e5c51bace9d8fabe23d8af57bdd528ee1e3a6a

        SHA512

        8c818d173b381425337a9dc568ff4781a70c04c2ff83583f50ab5cab582ba6479a657a1387e6b4ec2cd9f6e2fe804055113ca4410912c1829551f8c45b67b0b2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0590.exe

        Filesize

        366KB

        MD5

        f8d2aa72089a6ffff8956143e5c8805e

        SHA1

        9fe09063583bc9696347a024d3384ec44ec4b796

        SHA256

        9a48c04223ddac9f1b29434df1e0f4878eb94708abb4de8ed1a4708996ccbae0

        SHA512

        a65c13065622be23df2798905fb8ee1998a6cda3fde7f7c0b1daffd30007cc2068fd0a3e7fb6e00297c31b1d8b96b3aaac57bb4992f3d7ca51a666adc2a28c8e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0590.exe

        Filesize

        366KB

        MD5

        f8d2aa72089a6ffff8956143e5c8805e

        SHA1

        9fe09063583bc9696347a024d3384ec44ec4b796

        SHA256

        9a48c04223ddac9f1b29434df1e0f4878eb94708abb4de8ed1a4708996ccbae0

        SHA512

        a65c13065622be23df2798905fb8ee1998a6cda3fde7f7c0b1daffd30007cc2068fd0a3e7fb6e00297c31b1d8b96b3aaac57bb4992f3d7ca51a666adc2a28c8e

      • memory/640-1118-0x00000000007A0000-0x00000000007D2000-memory.dmp

        Filesize

        200KB

      • memory/640-1119-0x00000000050E0000-0x00000000050F0000-memory.dmp

        Filesize

        64KB

      • memory/1236-157-0x00000000024B0000-0x00000000024C2000-memory.dmp

        Filesize

        72KB

      • memory/1236-167-0x00000000024B0000-0x00000000024C2000-memory.dmp

        Filesize

        72KB

      • memory/1236-149-0x0000000005130000-0x0000000005140000-memory.dmp

        Filesize

        64KB

      • memory/1236-152-0x00000000024B0000-0x00000000024C2000-memory.dmp

        Filesize

        72KB

      • memory/1236-153-0x00000000024B0000-0x00000000024C2000-memory.dmp

        Filesize

        72KB

      • memory/1236-155-0x00000000024B0000-0x00000000024C2000-memory.dmp

        Filesize

        72KB

      • memory/1236-150-0x0000000005130000-0x0000000005140000-memory.dmp

        Filesize

        64KB

      • memory/1236-159-0x00000000024B0000-0x00000000024C2000-memory.dmp

        Filesize

        72KB

      • memory/1236-161-0x00000000024B0000-0x00000000024C2000-memory.dmp

        Filesize

        72KB

      • memory/1236-163-0x00000000024B0000-0x00000000024C2000-memory.dmp

        Filesize

        72KB

      • memory/1236-165-0x00000000024B0000-0x00000000024C2000-memory.dmp

        Filesize

        72KB

      • memory/1236-151-0x0000000005140000-0x00000000056E4000-memory.dmp

        Filesize

        5.6MB

      • memory/1236-169-0x00000000024B0000-0x00000000024C2000-memory.dmp

        Filesize

        72KB

      • memory/1236-171-0x00000000024B0000-0x00000000024C2000-memory.dmp

        Filesize

        72KB

      • memory/1236-173-0x00000000024B0000-0x00000000024C2000-memory.dmp

        Filesize

        72KB

      • memory/1236-175-0x00000000024B0000-0x00000000024C2000-memory.dmp

        Filesize

        72KB

      • memory/1236-177-0x00000000024B0000-0x00000000024C2000-memory.dmp

        Filesize

        72KB

      • memory/1236-179-0x00000000024B0000-0x00000000024C2000-memory.dmp

        Filesize

        72KB

      • memory/1236-180-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/1236-181-0x0000000005130000-0x0000000005140000-memory.dmp

        Filesize

        64KB

      • memory/1236-182-0x0000000005130000-0x0000000005140000-memory.dmp

        Filesize

        64KB

      • memory/1236-184-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/1236-148-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/5084-192-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/5084-392-0x00000000007F0000-0x000000000083B000-memory.dmp

        Filesize

        300KB

      • memory/5084-194-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/5084-196-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/5084-200-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/5084-198-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/5084-202-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/5084-204-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/5084-206-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/5084-208-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/5084-210-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/5084-212-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/5084-214-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/5084-216-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/5084-218-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/5084-220-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/5084-222-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/5084-190-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/5084-396-0x00000000009E0000-0x00000000009F0000-memory.dmp

        Filesize

        64KB

      • memory/5084-393-0x00000000009E0000-0x00000000009F0000-memory.dmp

        Filesize

        64KB

      • memory/5084-398-0x00000000009E0000-0x00000000009F0000-memory.dmp

        Filesize

        64KB

      • memory/5084-1099-0x0000000005510000-0x0000000005B28000-memory.dmp

        Filesize

        6.1MB

      • memory/5084-1100-0x0000000005B30000-0x0000000005C3A000-memory.dmp

        Filesize

        1.0MB

      • memory/5084-1101-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/5084-1102-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/5084-1103-0x00000000009E0000-0x00000000009F0000-memory.dmp

        Filesize

        64KB

      • memory/5084-1104-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/5084-1105-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/5084-1106-0x00000000066F0000-0x0000000006766000-memory.dmp

        Filesize

        472KB

      • memory/5084-1107-0x0000000006780000-0x00000000067D0000-memory.dmp

        Filesize

        320KB

      • memory/5084-1109-0x00000000009E0000-0x00000000009F0000-memory.dmp

        Filesize

        64KB

      • memory/5084-189-0x0000000002670000-0x00000000026AF000-memory.dmp

        Filesize

        252KB

      • memory/5084-1110-0x0000000006940000-0x0000000006B02000-memory.dmp

        Filesize

        1.8MB

      • memory/5084-1111-0x0000000006B10000-0x000000000703C000-memory.dmp

        Filesize

        5.2MB

      • memory/5084-1112-0x00000000009E0000-0x00000000009F0000-memory.dmp

        Filesize

        64KB