Analysis

  • max time kernel
    59s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2023, 17:43

General

  • Target

    c9d71ae1cfabe0011fddeb4661a797eea6085816a96eab1a2cefc1b9c3dd2de6.exe

  • Size

    695KB

  • MD5

    7f80d5e70bad9d019161fb17b9e8b17d

  • SHA1

    b1db8cf58b5b557b43d2f94266be82809c572d7d

  • SHA256

    c9d71ae1cfabe0011fddeb4661a797eea6085816a96eab1a2cefc1b9c3dd2de6

  • SHA512

    d715db64d3338daa8c44d299ea30ed61c08216f8ea3f32258af715a5c7df16c274a10f7f04b7a9eb912da3a5032427a9f7db8e4d0931de8fd6e039ad8db2633c

  • SSDEEP

    12288:HMrny90eEFAIHjJstEwFsk6aYtIrrasOdiXJuqHs2LKC6BUgqnhhYiKdRG4DDv:oy7EFA0KTCk6aSIrras00M2B6BUgwhhU

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c9d71ae1cfabe0011fddeb4661a797eea6085816a96eab1a2cefc1b9c3dd2de6.exe
    "C:\Users\Admin\AppData\Local\Temp\c9d71ae1cfabe0011fddeb4661a797eea6085816a96eab1a2cefc1b9c3dd2de6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4700
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un042309.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un042309.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3088
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0183.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0183.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4552
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 1088
          4⤵
          • Program crash
          PID:3548
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3259.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3259.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:640
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 1852
          4⤵
          • Program crash
          PID:1924
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si767819.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si767819.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4124
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4552 -ip 4552
    1⤵
      PID:548
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 388 -p 640 -ip 640
      1⤵
        PID:528

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si767819.exe

        Filesize

        175KB

        MD5

        e4abe1f1dca104b3909c4abf3cd57fde

        SHA1

        b3c7b15b465fdbd05b48b212056f95df5e85fa7f

        SHA256

        176aa8fe7639ee3d457299c053c6b13153f0dda563d941f8fa5136e7295b1b91

        SHA512

        ac6b56a5d5e551ed9b014307b9e727c1b0c06fc306e48ecd1c51a1f99ae1d088fc8f36af8c30641a4e3767dcf53130a12ec68d7ca43f75725fc081c34a00bdc7

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si767819.exe

        Filesize

        175KB

        MD5

        e4abe1f1dca104b3909c4abf3cd57fde

        SHA1

        b3c7b15b465fdbd05b48b212056f95df5e85fa7f

        SHA256

        176aa8fe7639ee3d457299c053c6b13153f0dda563d941f8fa5136e7295b1b91

        SHA512

        ac6b56a5d5e551ed9b014307b9e727c1b0c06fc306e48ecd1c51a1f99ae1d088fc8f36af8c30641a4e3767dcf53130a12ec68d7ca43f75725fc081c34a00bdc7

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un042309.exe

        Filesize

        553KB

        MD5

        1684056712227c4264589c8c19df2c46

        SHA1

        d494d1b587dfbdcd93fa9d4ce6c6e84a20c99b68

        SHA256

        eb906be52996a352aebd1f6ff800c660a407568b3e55f751bf9b1bf4ac4aad99

        SHA512

        8808addb2f240e9342cbaa785942c880184b7f05eeba2a89012cb2ba21de9ef84cde30940b2a6a5b90de0f87b500979528bad7be2a834f8eed685e838d843c4b

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un042309.exe

        Filesize

        553KB

        MD5

        1684056712227c4264589c8c19df2c46

        SHA1

        d494d1b587dfbdcd93fa9d4ce6c6e84a20c99b68

        SHA256

        eb906be52996a352aebd1f6ff800c660a407568b3e55f751bf9b1bf4ac4aad99

        SHA512

        8808addb2f240e9342cbaa785942c880184b7f05eeba2a89012cb2ba21de9ef84cde30940b2a6a5b90de0f87b500979528bad7be2a834f8eed685e838d843c4b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0183.exe

        Filesize

        308KB

        MD5

        2443d8d25d0578359e40d820751f747c

        SHA1

        fd1e6464d8edf55a20955959aa08bada8ab00176

        SHA256

        0cd530afd88d06a74526d5d67535ff701288ddf2dc68ea96e494725fed90a741

        SHA512

        7508500841f00cc1006646e5a578943801ea25dcbf095df8fffea9779b72f6ba681af700b52c08f7e9c41c99211dfa8507e05b3d7a71d003b0acc01364c7b310

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0183.exe

        Filesize

        308KB

        MD5

        2443d8d25d0578359e40d820751f747c

        SHA1

        fd1e6464d8edf55a20955959aa08bada8ab00176

        SHA256

        0cd530afd88d06a74526d5d67535ff701288ddf2dc68ea96e494725fed90a741

        SHA512

        7508500841f00cc1006646e5a578943801ea25dcbf095df8fffea9779b72f6ba681af700b52c08f7e9c41c99211dfa8507e05b3d7a71d003b0acc01364c7b310

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3259.exe

        Filesize

        366KB

        MD5

        563e062db16918f2bf829f4bab452547

        SHA1

        d294e3e2206bb8cda3de07426e60e78ea8a7d998

        SHA256

        ca9daf3737be32ad080abc9a40387bc364459ceed730fdd13d8ecc182af305e0

        SHA512

        d4315f86db58a391c1743bcd5a34f252d54f23308369db7b94a522751415f227e84636b67517bdb4dfba4abca92eb7146d565acf69946eee665f73a15d5f2e36

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3259.exe

        Filesize

        366KB

        MD5

        563e062db16918f2bf829f4bab452547

        SHA1

        d294e3e2206bb8cda3de07426e60e78ea8a7d998

        SHA256

        ca9daf3737be32ad080abc9a40387bc364459ceed730fdd13d8ecc182af305e0

        SHA512

        d4315f86db58a391c1743bcd5a34f252d54f23308369db7b94a522751415f227e84636b67517bdb4dfba4abca92eb7146d565acf69946eee665f73a15d5f2e36

      • memory/640-1102-0x00000000059C0000-0x0000000005ACA000-memory.dmp

        Filesize

        1.0MB

      • memory/640-1105-0x0000000004D60000-0x0000000004D70000-memory.dmp

        Filesize

        64KB

      • memory/640-1116-0x0000000004D60000-0x0000000004D70000-memory.dmp

        Filesize

        64KB

      • memory/640-1115-0x0000000006FA0000-0x0000000006FF0000-memory.dmp

        Filesize

        320KB

      • memory/640-1114-0x0000000006F10000-0x0000000006F86000-memory.dmp

        Filesize

        472KB

      • memory/640-1113-0x0000000004D60000-0x0000000004D70000-memory.dmp

        Filesize

        64KB

      • memory/640-1112-0x0000000004D60000-0x0000000004D70000-memory.dmp

        Filesize

        64KB

      • memory/640-1111-0x0000000004D60000-0x0000000004D70000-memory.dmp

        Filesize

        64KB

      • memory/640-1110-0x00000000068B0000-0x0000000006DDC000-memory.dmp

        Filesize

        5.2MB

      • memory/640-1109-0x00000000066D0000-0x0000000006892000-memory.dmp

        Filesize

        1.8MB

      • memory/640-1107-0x0000000005EB0000-0x0000000005F16000-memory.dmp

        Filesize

        408KB

      • memory/640-1106-0x0000000005E10000-0x0000000005EA2000-memory.dmp

        Filesize

        584KB

      • memory/640-212-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/640-1104-0x0000000005B20000-0x0000000005B5C000-memory.dmp

        Filesize

        240KB

      • memory/640-1103-0x0000000005B00000-0x0000000005B12000-memory.dmp

        Filesize

        72KB

      • memory/640-1101-0x0000000005320000-0x0000000005938000-memory.dmp

        Filesize

        6.1MB

      • memory/640-227-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/640-228-0x0000000004D60000-0x0000000004D70000-memory.dmp

        Filesize

        64KB

      • memory/640-220-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/640-223-0x0000000004D60000-0x0000000004D70000-memory.dmp

        Filesize

        64KB

      • memory/640-225-0x0000000004D60000-0x0000000004D70000-memory.dmp

        Filesize

        64KB

      • memory/640-224-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/640-221-0x0000000000880000-0x00000000008CB000-memory.dmp

        Filesize

        300KB

      • memory/640-191-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/640-192-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/640-194-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/640-196-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/640-198-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/640-200-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/640-202-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/640-204-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/640-206-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/640-218-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/640-210-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/640-208-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/640-214-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/640-216-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/4124-1122-0x00000000007F0000-0x0000000000822000-memory.dmp

        Filesize

        200KB

      • memory/4124-1124-0x0000000005100000-0x0000000005110000-memory.dmp

        Filesize

        64KB

      • memory/4124-1123-0x0000000005100000-0x0000000005110000-memory.dmp

        Filesize

        64KB

      • memory/4552-162-0x0000000002650000-0x0000000002662000-memory.dmp

        Filesize

        72KB

      • memory/4552-166-0x0000000002650000-0x0000000002662000-memory.dmp

        Filesize

        72KB

      • memory/4552-183-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/4552-182-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/4552-181-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/4552-180-0x0000000002650000-0x0000000002662000-memory.dmp

        Filesize

        72KB

      • memory/4552-150-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/4552-178-0x0000000002650000-0x0000000002662000-memory.dmp

        Filesize

        72KB

      • memory/4552-176-0x0000000002650000-0x0000000002662000-memory.dmp

        Filesize

        72KB

      • memory/4552-174-0x0000000002650000-0x0000000002662000-memory.dmp

        Filesize

        72KB

      • memory/4552-153-0x0000000002650000-0x0000000002662000-memory.dmp

        Filesize

        72KB

      • memory/4552-168-0x0000000002650000-0x0000000002662000-memory.dmp

        Filesize

        72KB

      • memory/4552-172-0x0000000002650000-0x0000000002662000-memory.dmp

        Filesize

        72KB

      • memory/4552-184-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/4552-164-0x0000000002650000-0x0000000002662000-memory.dmp

        Filesize

        72KB

      • memory/4552-170-0x0000000002650000-0x0000000002662000-memory.dmp

        Filesize

        72KB

      • memory/4552-160-0x0000000002650000-0x0000000002662000-memory.dmp

        Filesize

        72KB

      • memory/4552-158-0x0000000002650000-0x0000000002662000-memory.dmp

        Filesize

        72KB

      • memory/4552-156-0x0000000002650000-0x0000000002662000-memory.dmp

        Filesize

        72KB

      • memory/4552-154-0x0000000002650000-0x0000000002662000-memory.dmp

        Filesize

        72KB

      • memory/4552-149-0x0000000004F50000-0x00000000054F4000-memory.dmp

        Filesize

        5.6MB

      • memory/4552-148-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/4552-186-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/4552-152-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/4552-151-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB