Analysis

  • max time kernel
    87s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 17:45

General

  • Target

    e8b904e93405b4d2b8f3f7b6f282930325b0360add219796ddb280280be4c3e0.exe

  • Size

    695KB

  • MD5

    dc4bd7abfbb9af9c96cfd9a42233974d

  • SHA1

    42ee95e6cd4119a0e58ecfff7c60665e51e9185d

  • SHA256

    e8b904e93405b4d2b8f3f7b6f282930325b0360add219796ddb280280be4c3e0

  • SHA512

    fc814a8be956244e17cf8abdc07a626ffa7d5237beedc4c20aedf2333603a6795627b24101120145b307dd4fd7a4831d48087693a9884b95d146aeeb3f1c2dc6

  • SSDEEP

    12288:hMrTy90iuTAyDiKgFxtS4V7hcn4ucxwjq/82UnnSnhaX1la0qH2dWKLnwT:yylQGKW+4dnmGUIhalladIwT

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8b904e93405b4d2b8f3f7b6f282930325b0360add219796ddb280280be4c3e0.exe
    "C:\Users\Admin\AppData\Local\Temp\e8b904e93405b4d2b8f3f7b6f282930325b0360add219796ddb280280be4c3e0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4112
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un567668.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un567668.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:860
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9952.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9952.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3480
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3480 -s 1088
          4⤵
          • Program crash
          PID:4100
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4907.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4907.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1440
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1440 -s 1888
          4⤵
          • Program crash
          PID:1552
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si039629.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si039629.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3616
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3480 -ip 3480
    1⤵
      PID:1836
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1440 -ip 1440
      1⤵
        PID:4352

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si039629.exe

        Filesize

        175KB

        MD5

        9a682ff7175745ad9c7ec55af175a99b

        SHA1

        6aceea159a66c3acb8c006933a0cb5f5b556c61a

        SHA256

        ec0619f4a0d2e6fdf9af7fb333734a50443ff45bca83eee1f040deb0379fd293

        SHA512

        dbe09a9dfa417a97bee41b19b8ca16b62b36f713fc8f572c526066f43b4dc6d2ebeae595896ba5a026bf4906cb2ea694ab7ad88e67d5d5e79496f31bdf89e5e9

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si039629.exe

        Filesize

        175KB

        MD5

        9a682ff7175745ad9c7ec55af175a99b

        SHA1

        6aceea159a66c3acb8c006933a0cb5f5b556c61a

        SHA256

        ec0619f4a0d2e6fdf9af7fb333734a50443ff45bca83eee1f040deb0379fd293

        SHA512

        dbe09a9dfa417a97bee41b19b8ca16b62b36f713fc8f572c526066f43b4dc6d2ebeae595896ba5a026bf4906cb2ea694ab7ad88e67d5d5e79496f31bdf89e5e9

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un567668.exe

        Filesize

        553KB

        MD5

        0ec25f912557c79c00870bbc53ce81bd

        SHA1

        df9d3086be0b191173815c3dce8a9a7c90b0da2c

        SHA256

        8d9e4139f742d58b4800f1da19ce6a1c9c781e918d0587aa25c6044c14ae2f76

        SHA512

        dc753b90bc506a988a92e26a79754a19ee806c6dd312f68262bbbcff8f82ed14ccc4fafdec3cb33ec6828962dce1f82e505333ab8e4f36b05ed7ef2fddf3812b

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un567668.exe

        Filesize

        553KB

        MD5

        0ec25f912557c79c00870bbc53ce81bd

        SHA1

        df9d3086be0b191173815c3dce8a9a7c90b0da2c

        SHA256

        8d9e4139f742d58b4800f1da19ce6a1c9c781e918d0587aa25c6044c14ae2f76

        SHA512

        dc753b90bc506a988a92e26a79754a19ee806c6dd312f68262bbbcff8f82ed14ccc4fafdec3cb33ec6828962dce1f82e505333ab8e4f36b05ed7ef2fddf3812b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9952.exe

        Filesize

        308KB

        MD5

        3f998527df8bf794c9e192f660d3c9a5

        SHA1

        b0b006120b68bc46b0060ea223548c96dd61c67b

        SHA256

        cf01bec72249fabc432790c317b55ef6ca031586a4e362b671e834cd2894e29c

        SHA512

        65368b5fada54a9b18486086a6259e5dfe61c9a24c15b72120b1f356e811a38aaca1019353e8e883f40ad79dce7e3ae8e30040990a05859beaad8339fb184654

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9952.exe

        Filesize

        308KB

        MD5

        3f998527df8bf794c9e192f660d3c9a5

        SHA1

        b0b006120b68bc46b0060ea223548c96dd61c67b

        SHA256

        cf01bec72249fabc432790c317b55ef6ca031586a4e362b671e834cd2894e29c

        SHA512

        65368b5fada54a9b18486086a6259e5dfe61c9a24c15b72120b1f356e811a38aaca1019353e8e883f40ad79dce7e3ae8e30040990a05859beaad8339fb184654

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4907.exe

        Filesize

        366KB

        MD5

        d1f0ace9b63cda31f8b55b891d02e4a7

        SHA1

        6dbef299bda27ac1f6923674ed648faa341b1543

        SHA256

        26af0b03f4d2f8c92a035db48e40e037a9f6e36458bbe28d63d84ea143164c35

        SHA512

        46df1521448cfd430e407f960ede089d4cedd5b15fa6604f7eaa55cfd3b344439730c2729162510b2d28bc0a88f7bef05b36a7fede265b712fea86b72aa7ea89

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4907.exe

        Filesize

        366KB

        MD5

        d1f0ace9b63cda31f8b55b891d02e4a7

        SHA1

        6dbef299bda27ac1f6923674ed648faa341b1543

        SHA256

        26af0b03f4d2f8c92a035db48e40e037a9f6e36458bbe28d63d84ea143164c35

        SHA512

        46df1521448cfd430e407f960ede089d4cedd5b15fa6604f7eaa55cfd3b344439730c2729162510b2d28bc0a88f7bef05b36a7fede265b712fea86b72aa7ea89

      • memory/1440-346-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/1440-1102-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/1440-1114-0x0000000006E40000-0x000000000736C000-memory.dmp

        Filesize

        5.2MB

      • memory/1440-1113-0x0000000006C70000-0x0000000006E32000-memory.dmp

        Filesize

        1.8MB

      • memory/1440-1112-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/1440-1111-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/1440-1110-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/1440-1108-0x0000000006880000-0x00000000068D0000-memory.dmp

        Filesize

        320KB

      • memory/1440-1107-0x00000000067F0000-0x0000000006866000-memory.dmp

        Filesize

        472KB

      • memory/1440-1106-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/1440-1105-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/1440-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/1440-1103-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/1440-1101-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/1440-1100-0x00000000054D0000-0x0000000005AE8000-memory.dmp

        Filesize

        6.1MB

      • memory/1440-348-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/1440-344-0x0000000000720000-0x000000000076B000-memory.dmp

        Filesize

        300KB

      • memory/1440-224-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/1440-222-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/1440-220-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/1440-218-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/1440-216-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/1440-214-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/1440-191-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/1440-192-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/1440-194-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/1440-196-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/1440-198-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/1440-200-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/1440-202-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/1440-204-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/1440-206-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/1440-208-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/1440-210-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/1440-212-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/3480-174-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3480-160-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3480-152-0x0000000004E20000-0x0000000004E30000-memory.dmp

        Filesize

        64KB

      • memory/3480-184-0x0000000004E20000-0x0000000004E30000-memory.dmp

        Filesize

        64KB

      • memory/3480-183-0x0000000004E20000-0x0000000004E30000-memory.dmp

        Filesize

        64KB

      • memory/3480-182-0x0000000004E20000-0x0000000004E30000-memory.dmp

        Filesize

        64KB

      • memory/3480-181-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/3480-180-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3480-150-0x0000000004E20000-0x0000000004E30000-memory.dmp

        Filesize

        64KB

      • memory/3480-178-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3480-176-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3480-153-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3480-186-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/3480-172-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3480-156-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3480-168-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3480-166-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3480-164-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3480-162-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3480-151-0x0000000004E20000-0x0000000004E30000-memory.dmp

        Filesize

        64KB

      • memory/3480-158-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3480-170-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3480-154-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3480-149-0x0000000000820000-0x000000000084D000-memory.dmp

        Filesize

        180KB

      • memory/3480-148-0x0000000004E30000-0x00000000053D4000-memory.dmp

        Filesize

        5.6MB

      • memory/3616-1120-0x0000000000040000-0x0000000000072000-memory.dmp

        Filesize

        200KB

      • memory/3616-1121-0x0000000004C00000-0x0000000004C10000-memory.dmp

        Filesize

        64KB