Analysis

  • max time kernel
    68s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 18:09

General

  • Target

    0ec4a19495ecbb1ade5b29dddc4c1fa34bd885abe3a635c7e876ce81ca68789f.exe

  • Size

    700KB

  • MD5

    18e016572ad335c949db52af6fc373f9

  • SHA1

    95f60fec3a995514bdc5aeef53db591891beb652

  • SHA256

    0ec4a19495ecbb1ade5b29dddc4c1fa34bd885abe3a635c7e876ce81ca68789f

  • SHA512

    86c26042c12ddf3f91db0f2e011441df1447b1e7480ce3b85dcd7182ab1693a47dd5c8611db4722563cf273e5976c7d3423d19e4c3cb479b72467a26b20224ed

  • SSDEEP

    12288:bMrly90qLGvnPF0OyreXsI+jyRkgrMcNwPY2LqkLIMtaf2:6yTCnPyO1cI+jyRhrMcNAYEqeW2

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ec4a19495ecbb1ade5b29dddc4c1fa34bd885abe3a635c7e876ce81ca68789f.exe
    "C:\Users\Admin\AppData\Local\Temp\0ec4a19495ecbb1ade5b29dddc4c1fa34bd885abe3a635c7e876ce81ca68789f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4456
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un979848.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un979848.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3728
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7162.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7162.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:380
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 1084
          4⤵
          • Program crash
          PID:224
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9750.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9750.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4916
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4916 -s 1472
          4⤵
          • Program crash
          PID:4708
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si544616.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si544616.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2500
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 380 -ip 380
    1⤵
      PID:3296
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4916 -ip 4916
      1⤵
        PID:1100

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si544616.exe

        Filesize

        175KB

        MD5

        39d0d5b8b112c8d1c8aeca058015cad5

        SHA1

        073596bcb73297eae510faf86040e7c76a52b595

        SHA256

        8b7cd6465a9f8e99d47b7b7783aa768bf1c03ad910c3899c55630485235652d0

        SHA512

        a676b8297a44824c2baf8c0e4e9b64f561ad35587cdac18e9c060a725d8c1f077a9c7f2271b376372b80e3c4ddb51676d8fb3ad967505ad5907ce0e178d35411

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si544616.exe

        Filesize

        175KB

        MD5

        39d0d5b8b112c8d1c8aeca058015cad5

        SHA1

        073596bcb73297eae510faf86040e7c76a52b595

        SHA256

        8b7cd6465a9f8e99d47b7b7783aa768bf1c03ad910c3899c55630485235652d0

        SHA512

        a676b8297a44824c2baf8c0e4e9b64f561ad35587cdac18e9c060a725d8c1f077a9c7f2271b376372b80e3c4ddb51676d8fb3ad967505ad5907ce0e178d35411

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un979848.exe

        Filesize

        557KB

        MD5

        4eef7c2859c5e01b220bbe53c004868b

        SHA1

        827b455d1822842031ba078f16f5c2e0c0f8f480

        SHA256

        292838c9277e6cd2589968ef783b53077d7858f049c2cffbcb135aef27a7f4c8

        SHA512

        51ee4110da200c9fd6d3bb785a0d10bc06c001cdcce962573064ca052d51d7fb27eb748137f0e14ab3e3cfb3d9326a75824bfcf6b1d8269d49721c0b36126411

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un979848.exe

        Filesize

        557KB

        MD5

        4eef7c2859c5e01b220bbe53c004868b

        SHA1

        827b455d1822842031ba078f16f5c2e0c0f8f480

        SHA256

        292838c9277e6cd2589968ef783b53077d7858f049c2cffbcb135aef27a7f4c8

        SHA512

        51ee4110da200c9fd6d3bb785a0d10bc06c001cdcce962573064ca052d51d7fb27eb748137f0e14ab3e3cfb3d9326a75824bfcf6b1d8269d49721c0b36126411

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7162.exe

        Filesize

        307KB

        MD5

        b0b1156aabfd5f099c15ef1ce33a7396

        SHA1

        225e1e49989e0eb7dd99e000f985c9ff6c5cf9bd

        SHA256

        820f147d5410bdadd071bcce7117788b0529e776a913e5c4f50c91b37c3b103c

        SHA512

        d633721eb7ed6cc083cdfe943b6dbb0c64f0ddc6b44bddb4b413025ac3c43db42a5e83fc871a186849ac5ad30518fc405a6028984912f74429bb9a025727b56a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7162.exe

        Filesize

        307KB

        MD5

        b0b1156aabfd5f099c15ef1ce33a7396

        SHA1

        225e1e49989e0eb7dd99e000f985c9ff6c5cf9bd

        SHA256

        820f147d5410bdadd071bcce7117788b0529e776a913e5c4f50c91b37c3b103c

        SHA512

        d633721eb7ed6cc083cdfe943b6dbb0c64f0ddc6b44bddb4b413025ac3c43db42a5e83fc871a186849ac5ad30518fc405a6028984912f74429bb9a025727b56a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9750.exe

        Filesize

        366KB

        MD5

        8478b017e4a600a9f66a5481e3fd6639

        SHA1

        1bf97a528a1f95edfa8cb08a9370d3354babb835

        SHA256

        8966afbe40afc33c5e795bdd2c239aaa1ecd651318c564aca9238fe3ca4c3e6d

        SHA512

        d9d53d10a456530c871e4637fc40b2a6d76d9f177508b8ae23cd2b395e087e09ae2092b1d60e6e99191c5154069c6a9c8687ad24d3019716e8cdf71145ae6c9b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9750.exe

        Filesize

        366KB

        MD5

        8478b017e4a600a9f66a5481e3fd6639

        SHA1

        1bf97a528a1f95edfa8cb08a9370d3354babb835

        SHA256

        8966afbe40afc33c5e795bdd2c239aaa1ecd651318c564aca9238fe3ca4c3e6d

        SHA512

        d9d53d10a456530c871e4637fc40b2a6d76d9f177508b8ae23cd2b395e087e09ae2092b1d60e6e99191c5154069c6a9c8687ad24d3019716e8cdf71145ae6c9b

      • memory/380-158-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/380-170-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/380-149-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/380-151-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/380-152-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/380-153-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/380-154-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/380-156-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/380-148-0x0000000004E10000-0x00000000053B4000-memory.dmp

        Filesize

        5.6MB

      • memory/380-160-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/380-162-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/380-164-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/380-166-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/380-150-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/380-168-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/380-172-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/380-174-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/380-176-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/380-178-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/380-180-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/380-181-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/380-182-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/380-183-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/380-184-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/380-186-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/2500-1122-0x0000000005B40000-0x0000000005B50000-memory.dmp

        Filesize

        64KB

      • memory/2500-1121-0x0000000000ED0000-0x0000000000F02000-memory.dmp

        Filesize

        200KB

      • memory/4916-192-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/4916-225-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/4916-198-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/4916-200-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/4916-202-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/4916-204-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/4916-210-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/4916-212-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/4916-208-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/4916-214-0x0000000000840000-0x000000000088B000-memory.dmp

        Filesize

        300KB

      • memory/4916-215-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/4916-216-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/4916-219-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/4916-218-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/4916-206-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/4916-221-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/4916-223-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/4916-196-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/4916-227-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/4916-1100-0x00000000054C0000-0x0000000005AD8000-memory.dmp

        Filesize

        6.1MB

      • memory/4916-1101-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/4916-1102-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/4916-1103-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/4916-1104-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/4916-1105-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/4916-1106-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/4916-1108-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/4916-1109-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/4916-1110-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/4916-1111-0x0000000006710000-0x00000000068D2000-memory.dmp

        Filesize

        1.8MB

      • memory/4916-1112-0x00000000068F0000-0x0000000006E1C000-memory.dmp

        Filesize

        5.2MB

      • memory/4916-1113-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/4916-194-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/4916-191-0x00000000026C0000-0x00000000026FF000-memory.dmp

        Filesize

        252KB

      • memory/4916-1114-0x00000000071A0000-0x0000000007216000-memory.dmp

        Filesize

        472KB

      • memory/4916-1115-0x0000000007230000-0x0000000007280000-memory.dmp

        Filesize

        320KB