Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 18:34

General

  • Target

    81108f24fb5764f8fd0f7b6c71d0973ac890bec038e886a044fa89b12955a69b.exe

  • Size

    700KB

  • MD5

    e595357fb86bf809cc193820884d2a0d

  • SHA1

    d17960b0df1c7b963786610f18f42cb53cbc2442

  • SHA256

    81108f24fb5764f8fd0f7b6c71d0973ac890bec038e886a044fa89b12955a69b

  • SHA512

    02d9734426b5807418ba7dfbd78bc4cf39372419853d56fcd272189ea3f65f4ecd50eaf937dd44690bac1d3251ca39f97f48d399ebdf81eb570458e8ef6c5699

  • SSDEEP

    12288:hMrVy90oc0WrgH/kUqIdDbnE6jdMkUTrpkD2uNdrMRNwPfFLKbn+COF8UZvyR:kyZO0k6pEcakUXpkDv7rMRNAfNKT/OSp

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\81108f24fb5764f8fd0f7b6c71d0973ac890bec038e886a044fa89b12955a69b.exe
    "C:\Users\Admin\AppData\Local\Temp\81108f24fb5764f8fd0f7b6c71d0973ac890bec038e886a044fa89b12955a69b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4668
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un298671.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un298671.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2404.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2404.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2764
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 1084
          4⤵
          • Program crash
          PID:4060
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4193.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4193.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3464
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 1332
          4⤵
          • Program crash
          PID:2076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si532242.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si532242.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4000
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2764 -ip 2764
    1⤵
      PID:4332
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 3464 -ip 3464
      1⤵
        PID:1716
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:3876

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si532242.exe

        Filesize

        175KB

        MD5

        55b37de5aa5ce687dff36f374bc90d00

        SHA1

        a21b79c610213596feb08153a98fed8855db1be9

        SHA256

        d427b98db7b2fa7c69e9a0fc276c69524158f7d7a4d49f5c2d642eeab23dce13

        SHA512

        71178fb7f4b5643e2c018110f358c299e813bb8f9cb8b05c5ff5ab41406ee58f683d7f3ed8d12b2f8984d35c1c676c083a3837b17959734acc90a34ab51a5908

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si532242.exe

        Filesize

        175KB

        MD5

        55b37de5aa5ce687dff36f374bc90d00

        SHA1

        a21b79c610213596feb08153a98fed8855db1be9

        SHA256

        d427b98db7b2fa7c69e9a0fc276c69524158f7d7a4d49f5c2d642eeab23dce13

        SHA512

        71178fb7f4b5643e2c018110f358c299e813bb8f9cb8b05c5ff5ab41406ee58f683d7f3ed8d12b2f8984d35c1c676c083a3837b17959734acc90a34ab51a5908

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un298671.exe

        Filesize

        557KB

        MD5

        66859ce5904629bd6c8d04962e3a234c

        SHA1

        6ba3b02ee92614085e59087b231a0d5f992f8373

        SHA256

        f5469aec08214fbcefb2b1cfea09788e3382f45f3cb1ffbe8694e0244e34d7ea

        SHA512

        2e0f9766ce5f5b086c93f6669f8f1a4a0445b3d6efa0489b8e2adcaca8df42ae9b4e4e4c354a76f436588e6a6f0889dee1f641985b77e36883a03455aefa46a0

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un298671.exe

        Filesize

        557KB

        MD5

        66859ce5904629bd6c8d04962e3a234c

        SHA1

        6ba3b02ee92614085e59087b231a0d5f992f8373

        SHA256

        f5469aec08214fbcefb2b1cfea09788e3382f45f3cb1ffbe8694e0244e34d7ea

        SHA512

        2e0f9766ce5f5b086c93f6669f8f1a4a0445b3d6efa0489b8e2adcaca8df42ae9b4e4e4c354a76f436588e6a6f0889dee1f641985b77e36883a03455aefa46a0

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2404.exe

        Filesize

        307KB

        MD5

        e43c33e9b2c6c079a912f8c0305f7ebd

        SHA1

        1a9dc5a2290385c62b17bae7846934822dc49b78

        SHA256

        4088171f2b717c52b0d7cab34eb0829426edf57c6fba1180d59b552886ca3226

        SHA512

        fbb5c73bb6367ecd052c10dc4bff761f65047921eb134857942a76f3b6e68f55baaab2b8eec07287be30fe77dc3b1f13b369abd47e76ba3981146397a7d18296

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2404.exe

        Filesize

        307KB

        MD5

        e43c33e9b2c6c079a912f8c0305f7ebd

        SHA1

        1a9dc5a2290385c62b17bae7846934822dc49b78

        SHA256

        4088171f2b717c52b0d7cab34eb0829426edf57c6fba1180d59b552886ca3226

        SHA512

        fbb5c73bb6367ecd052c10dc4bff761f65047921eb134857942a76f3b6e68f55baaab2b8eec07287be30fe77dc3b1f13b369abd47e76ba3981146397a7d18296

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4193.exe

        Filesize

        366KB

        MD5

        ba6c454fee84bd5570296b0d139283a7

        SHA1

        2435ff2a03286066d0b57550f69490bc163d4de7

        SHA256

        2d1890e4b728cd6b83c8e4b809f70f3060cdf53c8b5165ed61da476f6281555a

        SHA512

        eb32c599018667656d3a6ed52fe06b7bd5e4813b3e9cb3f61afd49de75fdd9b55cad441f626bd4cea488612bd764be396cfa2ded2becc0c34a00ec3259253fdb

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4193.exe

        Filesize

        366KB

        MD5

        ba6c454fee84bd5570296b0d139283a7

        SHA1

        2435ff2a03286066d0b57550f69490bc163d4de7

        SHA256

        2d1890e4b728cd6b83c8e4b809f70f3060cdf53c8b5165ed61da476f6281555a

        SHA512

        eb32c599018667656d3a6ed52fe06b7bd5e4813b3e9cb3f61afd49de75fdd9b55cad441f626bd4cea488612bd764be396cfa2ded2becc0c34a00ec3259253fdb

      • memory/2764-148-0x0000000005080000-0x0000000005624000-memory.dmp

        Filesize

        5.6MB

      • memory/2764-149-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/2764-150-0x0000000005070000-0x0000000005080000-memory.dmp

        Filesize

        64KB

      • memory/2764-151-0x0000000005070000-0x0000000005080000-memory.dmp

        Filesize

        64KB

      • memory/2764-152-0x0000000005070000-0x0000000005080000-memory.dmp

        Filesize

        64KB

      • memory/2764-153-0x0000000002840000-0x0000000002852000-memory.dmp

        Filesize

        72KB

      • memory/2764-154-0x0000000002840000-0x0000000002852000-memory.dmp

        Filesize

        72KB

      • memory/2764-156-0x0000000002840000-0x0000000002852000-memory.dmp

        Filesize

        72KB

      • memory/2764-158-0x0000000002840000-0x0000000002852000-memory.dmp

        Filesize

        72KB

      • memory/2764-160-0x0000000002840000-0x0000000002852000-memory.dmp

        Filesize

        72KB

      • memory/2764-162-0x0000000002840000-0x0000000002852000-memory.dmp

        Filesize

        72KB

      • memory/2764-164-0x0000000002840000-0x0000000002852000-memory.dmp

        Filesize

        72KB

      • memory/2764-166-0x0000000002840000-0x0000000002852000-memory.dmp

        Filesize

        72KB

      • memory/2764-168-0x0000000002840000-0x0000000002852000-memory.dmp

        Filesize

        72KB

      • memory/2764-170-0x0000000002840000-0x0000000002852000-memory.dmp

        Filesize

        72KB

      • memory/2764-172-0x0000000002840000-0x0000000002852000-memory.dmp

        Filesize

        72KB

      • memory/2764-174-0x0000000002840000-0x0000000002852000-memory.dmp

        Filesize

        72KB

      • memory/2764-176-0x0000000002840000-0x0000000002852000-memory.dmp

        Filesize

        72KB

      • memory/2764-178-0x0000000002840000-0x0000000002852000-memory.dmp

        Filesize

        72KB

      • memory/2764-180-0x0000000002840000-0x0000000002852000-memory.dmp

        Filesize

        72KB

      • memory/2764-181-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/2764-182-0x0000000005070000-0x0000000005080000-memory.dmp

        Filesize

        64KB

      • memory/2764-183-0x0000000005070000-0x0000000005080000-memory.dmp

        Filesize

        64KB

      • memory/2764-184-0x0000000005070000-0x0000000005080000-memory.dmp

        Filesize

        64KB

      • memory/2764-186-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/3464-191-0x0000000000840000-0x000000000088B000-memory.dmp

        Filesize

        300KB

      • memory/3464-192-0x0000000004E50000-0x0000000004E60000-memory.dmp

        Filesize

        64KB

      • memory/3464-193-0x0000000004E50000-0x0000000004E60000-memory.dmp

        Filesize

        64KB

      • memory/3464-194-0x0000000004E50000-0x0000000004E60000-memory.dmp

        Filesize

        64KB

      • memory/3464-195-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/3464-196-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/3464-198-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/3464-200-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/3464-202-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/3464-204-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/3464-206-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/3464-208-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/3464-210-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/3464-212-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/3464-214-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/3464-216-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/3464-218-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/3464-220-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/3464-222-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/3464-224-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/3464-226-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/3464-228-0x0000000004D10000-0x0000000004D4F000-memory.dmp

        Filesize

        252KB

      • memory/3464-1101-0x0000000005510000-0x0000000005B28000-memory.dmp

        Filesize

        6.1MB

      • memory/3464-1102-0x0000000005B30000-0x0000000005C3A000-memory.dmp

        Filesize

        1.0MB

      • memory/3464-1103-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/3464-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/3464-1105-0x0000000004E50000-0x0000000004E60000-memory.dmp

        Filesize

        64KB

      • memory/3464-1106-0x0000000005F50000-0x0000000005FB6000-memory.dmp

        Filesize

        408KB

      • memory/3464-1107-0x0000000006600000-0x0000000006692000-memory.dmp

        Filesize

        584KB

      • memory/3464-1108-0x0000000006810000-0x00000000069D2000-memory.dmp

        Filesize

        1.8MB

      • memory/3464-1109-0x00000000069E0000-0x0000000006F0C000-memory.dmp

        Filesize

        5.2MB

      • memory/3464-1112-0x0000000004E50000-0x0000000004E60000-memory.dmp

        Filesize

        64KB

      • memory/3464-1113-0x0000000004E50000-0x0000000004E60000-memory.dmp

        Filesize

        64KB

      • memory/3464-1111-0x0000000004E50000-0x0000000004E60000-memory.dmp

        Filesize

        64KB

      • memory/3464-1114-0x0000000004E50000-0x0000000004E60000-memory.dmp

        Filesize

        64KB

      • memory/3464-1115-0x00000000071A0000-0x0000000007216000-memory.dmp

        Filesize

        472KB

      • memory/3464-1116-0x0000000007220000-0x0000000007270000-memory.dmp

        Filesize

        320KB

      • memory/4000-1122-0x00000000000C0000-0x00000000000F2000-memory.dmp

        Filesize

        200KB

      • memory/4000-1123-0x0000000004930000-0x0000000004940000-memory.dmp

        Filesize

        64KB

      • memory/4000-1124-0x0000000004930000-0x0000000004940000-memory.dmp

        Filesize

        64KB