Analysis

  • max time kernel
    137s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 17:58

General

  • Target

    1f99b3a5bd8ec4cfdd00d495a049fc53380f84d1f4a8482c196149deb8d57211.exe

  • Size

    675KB

  • MD5

    c940ccb63a9e82b872adf97bb9f00e46

  • SHA1

    9429bd1525eac2a7ebd3083dbf75dfba06e1e7d1

  • SHA256

    1f99b3a5bd8ec4cfdd00d495a049fc53380f84d1f4a8482c196149deb8d57211

  • SHA512

    0d3fcd872b25b5d177d61c4cf991bd74816fbb43c36fc3ab4feaa238c7c32e48fedd3f937fa90069c7ef8575590bb15685ca71cf3250bd747e82e484d1fdf785

  • SSDEEP

    12288:8Mrky90VfWt9ofEZ0Yk8izrY/63EIUQcKt2Z/rGwOEJUKkZlQDYcyZ:Iy6f64EZ0x8ivYCiQXurG/nlQDWZ

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f99b3a5bd8ec4cfdd00d495a049fc53380f84d1f4a8482c196149deb8d57211.exe
    "C:\Users\Admin\AppData\Local\Temp\1f99b3a5bd8ec4cfdd00d495a049fc53380f84d1f4a8482c196149deb8d57211.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4280
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un083147.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un083147.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1232
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1114.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1114.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3008
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3008 -s 1080
          4⤵
          • Program crash
          PID:2404
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9432.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9432.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4660
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4660 -s 1572
          4⤵
          • Program crash
          PID:1440
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si858561.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si858561.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:220
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3008 -ip 3008
    1⤵
      PID:980
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4660 -ip 4660
      1⤵
        PID:4240
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:1872

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si858561.exe

        Filesize

        175KB

        MD5

        cd473d178b52f269135ad496adb0638c

        SHA1

        8779e12d1659fe1f46083bca5844defd239a191a

        SHA256

        ab963f7930849c99048946e5ac4a95ee82825ebd57c608edada6de3731ce9381

        SHA512

        f580f41ee925bc7f0cebb1987e3ec838e3c71ae9820fb1b324d7450e5839a6e2949bcbd275e617fb2673750330b43d44ad0e422a2661d6fdcd8739cb02c6241e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si858561.exe

        Filesize

        175KB

        MD5

        cd473d178b52f269135ad496adb0638c

        SHA1

        8779e12d1659fe1f46083bca5844defd239a191a

        SHA256

        ab963f7930849c99048946e5ac4a95ee82825ebd57c608edada6de3731ce9381

        SHA512

        f580f41ee925bc7f0cebb1987e3ec838e3c71ae9820fb1b324d7450e5839a6e2949bcbd275e617fb2673750330b43d44ad0e422a2661d6fdcd8739cb02c6241e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un083147.exe

        Filesize

        534KB

        MD5

        b48e9e08c04cebd448976ef2254d6199

        SHA1

        363a00d74ec99686455d9b9628bd954676399ee4

        SHA256

        373159b369a2a5ca728dcf3b064b38b34c40a24878519f31fbfcaf54c49b7d0a

        SHA512

        1a510b353ed3ad1a12fa48dc3382d68004af1240c7173e00ab3fa9e18a79120f3bfd5f7f0be3046f538549229ec9456b4913d4dbfc844eba4f6655f6bc25d527

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un083147.exe

        Filesize

        534KB

        MD5

        b48e9e08c04cebd448976ef2254d6199

        SHA1

        363a00d74ec99686455d9b9628bd954676399ee4

        SHA256

        373159b369a2a5ca728dcf3b064b38b34c40a24878519f31fbfcaf54c49b7d0a

        SHA512

        1a510b353ed3ad1a12fa48dc3382d68004af1240c7173e00ab3fa9e18a79120f3bfd5f7f0be3046f538549229ec9456b4913d4dbfc844eba4f6655f6bc25d527

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1114.exe

        Filesize

        272KB

        MD5

        a1f0d4e3d667ede15048192711a59431

        SHA1

        fec9318aef38b94ba172e8474691303596bb4b25

        SHA256

        cf28fecdcfb8cea611abf64529d8dbecfdb0f535e829a091428966a00d793db7

        SHA512

        ce160408045d225f73165d08e4fbe8d29a62dd44d640d3d87875bd725c07ce4b533ebc7d803bae99a61d5e8ee6fa4faaca216061fb6a4204e609b7d968ae32bc

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1114.exe

        Filesize

        272KB

        MD5

        a1f0d4e3d667ede15048192711a59431

        SHA1

        fec9318aef38b94ba172e8474691303596bb4b25

        SHA256

        cf28fecdcfb8cea611abf64529d8dbecfdb0f535e829a091428966a00d793db7

        SHA512

        ce160408045d225f73165d08e4fbe8d29a62dd44d640d3d87875bd725c07ce4b533ebc7d803bae99a61d5e8ee6fa4faaca216061fb6a4204e609b7d968ae32bc

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9432.exe

        Filesize

        331KB

        MD5

        042d564da9f06dfb11d1fa05335d8833

        SHA1

        d780f9d7a05a82707bdceec66b7a74f645913c1b

        SHA256

        cc3b05e872c158664337b56386bed1b0730f8e35aca3a4b1156afb737d211c22

        SHA512

        208081080fe62fa1d5809c69ac5e7c7cfd1a02aeb53ca887c90f90f78066b7bedb4f978c1181eb391b88c0c2e482b88c95e27e8e8b2a7a2d617f287c13725c0e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9432.exe

        Filesize

        331KB

        MD5

        042d564da9f06dfb11d1fa05335d8833

        SHA1

        d780f9d7a05a82707bdceec66b7a74f645913c1b

        SHA256

        cc3b05e872c158664337b56386bed1b0730f8e35aca3a4b1156afb737d211c22

        SHA512

        208081080fe62fa1d5809c69ac5e7c7cfd1a02aeb53ca887c90f90f78066b7bedb4f978c1181eb391b88c0c2e482b88c95e27e8e8b2a7a2d617f287c13725c0e

      • memory/220-1118-0x0000000000880000-0x00000000008B2000-memory.dmp

        Filesize

        200KB

      • memory/220-1119-0x0000000005460000-0x0000000005470000-memory.dmp

        Filesize

        64KB

      • memory/220-1120-0x0000000005460000-0x0000000005470000-memory.dmp

        Filesize

        64KB

      • memory/3008-158-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3008-170-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3008-152-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3008-154-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3008-156-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3008-150-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/3008-160-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3008-162-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3008-164-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3008-166-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3008-168-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3008-151-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3008-172-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3008-174-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3008-176-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3008-178-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3008-179-0x0000000000400000-0x0000000000707000-memory.dmp

        Filesize

        3.0MB

      • memory/3008-180-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/3008-181-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/3008-182-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/3008-184-0x0000000000400000-0x0000000000707000-memory.dmp

        Filesize

        3.0MB

      • memory/3008-149-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/3008-148-0x0000000004F20000-0x00000000054C4000-memory.dmp

        Filesize

        5.6MB

      • memory/4660-192-0x0000000002650000-0x000000000268F000-memory.dmp

        Filesize

        252KB

      • memory/4660-194-0x0000000002650000-0x000000000268F000-memory.dmp

        Filesize

        252KB

      • memory/4660-196-0x0000000002650000-0x000000000268F000-memory.dmp

        Filesize

        252KB

      • memory/4660-198-0x0000000002650000-0x000000000268F000-memory.dmp

        Filesize

        252KB

      • memory/4660-200-0x0000000002650000-0x000000000268F000-memory.dmp

        Filesize

        252KB

      • memory/4660-202-0x0000000002650000-0x000000000268F000-memory.dmp

        Filesize

        252KB

      • memory/4660-204-0x0000000002650000-0x000000000268F000-memory.dmp

        Filesize

        252KB

      • memory/4660-206-0x0000000002650000-0x000000000268F000-memory.dmp

        Filesize

        252KB

      • memory/4660-208-0x0000000002650000-0x000000000268F000-memory.dmp

        Filesize

        252KB

      • memory/4660-210-0x0000000002650000-0x000000000268F000-memory.dmp

        Filesize

        252KB

      • memory/4660-212-0x0000000002650000-0x000000000268F000-memory.dmp

        Filesize

        252KB

      • memory/4660-214-0x0000000002650000-0x000000000268F000-memory.dmp

        Filesize

        252KB

      • memory/4660-216-0x0000000002650000-0x000000000268F000-memory.dmp

        Filesize

        252KB

      • memory/4660-218-0x0000000002650000-0x000000000268F000-memory.dmp

        Filesize

        252KB

      • memory/4660-220-0x0000000002650000-0x000000000268F000-memory.dmp

        Filesize

        252KB

      • memory/4660-222-0x0000000002650000-0x000000000268F000-memory.dmp

        Filesize

        252KB

      • memory/4660-444-0x00000000026F0000-0x0000000002700000-memory.dmp

        Filesize

        64KB

      • memory/4660-442-0x00000000007F0000-0x000000000083B000-memory.dmp

        Filesize

        300KB

      • memory/4660-446-0x00000000026F0000-0x0000000002700000-memory.dmp

        Filesize

        64KB

      • memory/4660-1098-0x0000000005500000-0x0000000005B18000-memory.dmp

        Filesize

        6.1MB

      • memory/4660-1099-0x0000000005B20000-0x0000000005C2A000-memory.dmp

        Filesize

        1.0MB

      • memory/4660-1100-0x00000000027C0000-0x00000000027D2000-memory.dmp

        Filesize

        72KB

      • memory/4660-1101-0x00000000026F0000-0x0000000002700000-memory.dmp

        Filesize

        64KB

      • memory/4660-1102-0x0000000002910000-0x000000000294C000-memory.dmp

        Filesize

        240KB

      • memory/4660-1103-0x0000000005E10000-0x0000000005E76000-memory.dmp

        Filesize

        408KB

      • memory/4660-1104-0x00000000064E0000-0x0000000006572000-memory.dmp

        Filesize

        584KB

      • memory/4660-1106-0x00000000026F0000-0x0000000002700000-memory.dmp

        Filesize

        64KB

      • memory/4660-1107-0x00000000026F0000-0x0000000002700000-memory.dmp

        Filesize

        64KB

      • memory/4660-1108-0x0000000008D90000-0x0000000008E06000-memory.dmp

        Filesize

        472KB

      • memory/4660-190-0x0000000002650000-0x000000000268F000-memory.dmp

        Filesize

        252KB

      • memory/4660-189-0x0000000002650000-0x000000000268F000-memory.dmp

        Filesize

        252KB

      • memory/4660-1109-0x0000000008E20000-0x0000000008E70000-memory.dmp

        Filesize

        320KB

      • memory/4660-1110-0x0000000008E90000-0x0000000009052000-memory.dmp

        Filesize

        1.8MB

      • memory/4660-1111-0x0000000009060000-0x000000000958C000-memory.dmp

        Filesize

        5.2MB