Analysis

  • max time kernel
    61s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 17:46

General

  • Target

    35ec3b1a14473120f43dae5d721ceef9a3d3d933b735068b557fc8c1df944ac3.exe

  • Size

    695KB

  • MD5

    dd5135979d4c43ab8631e4d356baabd6

  • SHA1

    0d1898e4073d383fbfb9126283415b7d7e5f0a98

  • SHA256

    35ec3b1a14473120f43dae5d721ceef9a3d3d933b735068b557fc8c1df944ac3

  • SHA512

    c79b69cfc17a57f66430e97dec90ade486d97d7e0e93c424d65eee8f41e31f4c5877ee456d68a9a533d09619d6b71c6bd4058fb9fd8a76460e23bbd0a7515280

  • SSDEEP

    12288:kMrey90r8txlEyUo+/+agWcPinSRJGxvuBxzhQkqnh5IVTojJ8jbB:Cy40lEiq1gWcqSRJGcxIh5Koj2l

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35ec3b1a14473120f43dae5d721ceef9a3d3d933b735068b557fc8c1df944ac3.exe
    "C:\Users\Admin\AppData\Local\Temp\35ec3b1a14473120f43dae5d721ceef9a3d3d933b735068b557fc8c1df944ac3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4376
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un506684.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un506684.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3684
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0764.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0764.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4676
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4676 -s 1096
          4⤵
          • Program crash
          PID:436
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1962.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1962.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2492
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 1784
          4⤵
          • Program crash
          PID:3364
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si917288.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si917288.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2520
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4676 -ip 4676
    1⤵
      PID:4660
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2492 -ip 2492
      1⤵
        PID:1360

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si917288.exe

        Filesize

        175KB

        MD5

        8f601a076280777af5f75683e3f96f79

        SHA1

        49d8b8a8b35638c1118143928fd7fdd192f2c696

        SHA256

        4e9528d095d43d398f93391caf7ae2b0ced5d9bb757453629b578f8fc33b1754

        SHA512

        df03a805532624bc1d4a9d7ef233b4e4793c7dd330f039552a55b83039e5736b55c09bd9e3e16834be90457b075793421f410397a852c0839ca1914d00e7134c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si917288.exe

        Filesize

        175KB

        MD5

        8f601a076280777af5f75683e3f96f79

        SHA1

        49d8b8a8b35638c1118143928fd7fdd192f2c696

        SHA256

        4e9528d095d43d398f93391caf7ae2b0ced5d9bb757453629b578f8fc33b1754

        SHA512

        df03a805532624bc1d4a9d7ef233b4e4793c7dd330f039552a55b83039e5736b55c09bd9e3e16834be90457b075793421f410397a852c0839ca1914d00e7134c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un506684.exe

        Filesize

        553KB

        MD5

        6341fa13cd442b26590a636886c35815

        SHA1

        70a645d4af206a5f8fbdb57b3f45cc1976d00cd1

        SHA256

        5aae6a263b432e08f7c0c00e871aa6d11cae8a9959118bdd80c7c63a8da2f5ce

        SHA512

        97a002cce88e311e6ddac50f55fe31cf0dca447651215b7a12f67e3e854398f8e6413ac07aa341336d4eb1534dc8fae6f14679c928cfa3e9e29187143d48c7a1

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un506684.exe

        Filesize

        553KB

        MD5

        6341fa13cd442b26590a636886c35815

        SHA1

        70a645d4af206a5f8fbdb57b3f45cc1976d00cd1

        SHA256

        5aae6a263b432e08f7c0c00e871aa6d11cae8a9959118bdd80c7c63a8da2f5ce

        SHA512

        97a002cce88e311e6ddac50f55fe31cf0dca447651215b7a12f67e3e854398f8e6413ac07aa341336d4eb1534dc8fae6f14679c928cfa3e9e29187143d48c7a1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0764.exe

        Filesize

        308KB

        MD5

        d498b5a5f6b26ec68881cde52501876c

        SHA1

        d0d7a661417d10157c3dc44cff629f5861fe5d46

        SHA256

        583a29cbf8acff95fe3b21294d733245913856f3faaf8cf63731a082cfcedb7c

        SHA512

        08ca0db9e1f4f548118617de2a3b4f5580a03380abeef54edd358733d49ca942c9288126595425c84337bc998af6e89ae93b7af7e382e7f04f78fb40059d43fc

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0764.exe

        Filesize

        308KB

        MD5

        d498b5a5f6b26ec68881cde52501876c

        SHA1

        d0d7a661417d10157c3dc44cff629f5861fe5d46

        SHA256

        583a29cbf8acff95fe3b21294d733245913856f3faaf8cf63731a082cfcedb7c

        SHA512

        08ca0db9e1f4f548118617de2a3b4f5580a03380abeef54edd358733d49ca942c9288126595425c84337bc998af6e89ae93b7af7e382e7f04f78fb40059d43fc

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1962.exe

        Filesize

        366KB

        MD5

        2082950a97466a7889fd5c0b1d5e732e

        SHA1

        0883d599d8bb779d6a42055a756673689a6c6b31

        SHA256

        756d8d4d3bf3d81a1530d907cefea44aa2e27447d688795daee101a80e51609f

        SHA512

        f856e19f3a8fa099d4e5f719fbbe71e2e1bf30ba6e27d06a9253e25b64dab8757e521688b56df93ef37163b5d4d981397d072f65bf3b514e4fc182f679a191e7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1962.exe

        Filesize

        366KB

        MD5

        2082950a97466a7889fd5c0b1d5e732e

        SHA1

        0883d599d8bb779d6a42055a756673689a6c6b31

        SHA256

        756d8d4d3bf3d81a1530d907cefea44aa2e27447d688795daee101a80e51609f

        SHA512

        f856e19f3a8fa099d4e5f719fbbe71e2e1bf30ba6e27d06a9253e25b64dab8757e521688b56df93ef37163b5d4d981397d072f65bf3b514e4fc182f679a191e7

      • memory/2492-1102-0x0000000005A20000-0x0000000005B2A000-memory.dmp

        Filesize

        1.0MB

      • memory/2492-1103-0x0000000002AD0000-0x0000000002AE2000-memory.dmp

        Filesize

        72KB

      • memory/2492-222-0x0000000002890000-0x00000000028CF000-memory.dmp

        Filesize

        252KB

      • memory/2492-220-0x0000000002890000-0x00000000028CF000-memory.dmp

        Filesize

        252KB

      • memory/2492-218-0x0000000002890000-0x00000000028CF000-memory.dmp

        Filesize

        252KB

      • memory/2492-208-0x0000000002890000-0x00000000028CF000-memory.dmp

        Filesize

        252KB

      • memory/2492-1116-0x0000000008260000-0x00000000082B0000-memory.dmp

        Filesize

        320KB

      • memory/2492-1115-0x00000000081E0000-0x0000000008256000-memory.dmp

        Filesize

        472KB

      • memory/2492-1114-0x0000000002760000-0x0000000002770000-memory.dmp

        Filesize

        64KB

      • memory/2492-1113-0x0000000002760000-0x0000000002770000-memory.dmp

        Filesize

        64KB

      • memory/2492-1112-0x0000000002760000-0x0000000002770000-memory.dmp

        Filesize

        64KB

      • memory/2492-1111-0x0000000002760000-0x0000000002770000-memory.dmp

        Filesize

        64KB

      • memory/2492-1110-0x00000000068B0000-0x0000000006DDC000-memory.dmp

        Filesize

        5.2MB

      • memory/2492-210-0x0000000002890000-0x00000000028CF000-memory.dmp

        Filesize

        252KB

      • memory/2492-1108-0x00000000066D0000-0x0000000006892000-memory.dmp

        Filesize

        1.8MB

      • memory/2492-1107-0x0000000005EB0000-0x0000000005F16000-memory.dmp

        Filesize

        408KB

      • memory/2492-1106-0x0000000005E10000-0x0000000005EA2000-memory.dmp

        Filesize

        584KB

      • memory/2492-1105-0x0000000005B30000-0x0000000005B6C000-memory.dmp

        Filesize

        240KB

      • memory/2492-1104-0x0000000002760000-0x0000000002770000-memory.dmp

        Filesize

        64KB

      • memory/2492-225-0x00000000007F0000-0x000000000083B000-memory.dmp

        Filesize

        300KB

      • memory/2492-1101-0x0000000005400000-0x0000000005A18000-memory.dmp

        Filesize

        6.1MB

      • memory/2492-231-0x0000000002760000-0x0000000002770000-memory.dmp

        Filesize

        64KB

      • memory/2492-226-0x0000000002760000-0x0000000002770000-memory.dmp

        Filesize

        64KB

      • memory/2492-191-0x0000000002890000-0x00000000028CF000-memory.dmp

        Filesize

        252KB

      • memory/2492-192-0x0000000002890000-0x00000000028CF000-memory.dmp

        Filesize

        252KB

      • memory/2492-212-0x0000000002890000-0x00000000028CF000-memory.dmp

        Filesize

        252KB

      • memory/2492-196-0x0000000002890000-0x00000000028CF000-memory.dmp

        Filesize

        252KB

      • memory/2492-198-0x0000000002890000-0x00000000028CF000-memory.dmp

        Filesize

        252KB

      • memory/2492-200-0x0000000002890000-0x00000000028CF000-memory.dmp

        Filesize

        252KB

      • memory/2492-202-0x0000000002890000-0x00000000028CF000-memory.dmp

        Filesize

        252KB

      • memory/2492-204-0x0000000002890000-0x00000000028CF000-memory.dmp

        Filesize

        252KB

      • memory/2492-206-0x0000000002890000-0x00000000028CF000-memory.dmp

        Filesize

        252KB

      • memory/2492-229-0x0000000002760000-0x0000000002770000-memory.dmp

        Filesize

        64KB

      • memory/2492-224-0x0000000002890000-0x00000000028CF000-memory.dmp

        Filesize

        252KB

      • memory/2492-194-0x0000000002890000-0x00000000028CF000-memory.dmp

        Filesize

        252KB

      • memory/2492-214-0x0000000002890000-0x00000000028CF000-memory.dmp

        Filesize

        252KB

      • memory/2492-216-0x0000000002890000-0x00000000028CF000-memory.dmp

        Filesize

        252KB

      • memory/2520-1122-0x0000000000C70000-0x0000000000CA2000-memory.dmp

        Filesize

        200KB

      • memory/2520-1123-0x0000000005550000-0x0000000005560000-memory.dmp

        Filesize

        64KB

      • memory/2520-1124-0x0000000005550000-0x0000000005560000-memory.dmp

        Filesize

        64KB

      • memory/4676-182-0x0000000004D40000-0x0000000004D50000-memory.dmp

        Filesize

        64KB

      • memory/4676-176-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/4676-160-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/4676-151-0x0000000004D40000-0x0000000004D50000-memory.dmp

        Filesize

        64KB

      • memory/4676-152-0x0000000004D40000-0x0000000004D50000-memory.dmp

        Filesize

        64KB

      • memory/4676-186-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/4676-150-0x0000000004D40000-0x0000000004D50000-memory.dmp

        Filesize

        64KB

      • memory/4676-184-0x0000000004D40000-0x0000000004D50000-memory.dmp

        Filesize

        64KB

      • memory/4676-183-0x0000000004D40000-0x0000000004D50000-memory.dmp

        Filesize

        64KB

      • memory/4676-153-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/4676-181-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/4676-180-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/4676-178-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/4676-174-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/4676-172-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/4676-168-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/4676-170-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/4676-166-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/4676-164-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/4676-162-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/4676-149-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/4676-148-0x0000000004D50000-0x00000000052F4000-memory.dmp

        Filesize

        5.6MB

      • memory/4676-158-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/4676-156-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB

      • memory/4676-154-0x0000000004C90000-0x0000000004CA2000-memory.dmp

        Filesize

        72KB