Analysis

  • max time kernel
    61s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 18:21

General

  • Target

    7ad320c35fbb7f64c79da8ad44e57b06991332fc5023785c62145250218177d6.exe

  • Size

    699KB

  • MD5

    09f2bcab74d3ffe65af70aaf638d554e

  • SHA1

    b59681e27bcb250b1f09cefa206f669813ac2ef9

  • SHA256

    7ad320c35fbb7f64c79da8ad44e57b06991332fc5023785c62145250218177d6

  • SHA512

    77778eb4ad1000799e9283fd4860172c03e0e147d843bf1c999f9e852f594bcd89d6dc435ea5ca921dacef1b537a93ad9c1e1d1926945f7692b4f099f27d64d2

  • SSDEEP

    12288:oMrZy90KnooVww0aZi6DMNL3YkIIYUhc8rMZNwPP2LHRHA:Ry/9ca46DMNzYPIpc8rMZNAPEHRg

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7ad320c35fbb7f64c79da8ad44e57b06991332fc5023785c62145250218177d6.exe
    "C:\Users\Admin\AppData\Local\Temp\7ad320c35fbb7f64c79da8ad44e57b06991332fc5023785c62145250218177d6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3192
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un384338.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un384338.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4612
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5442.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5442.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4216
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4216 -s 1076
          4⤵
          • Program crash
          PID:5020
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2671.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2671.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3884
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3884 -s 1356
          4⤵
          • Program crash
          PID:804
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si766819.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si766819.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3888
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4216 -ip 4216
    1⤵
      PID:1844
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 3884 -ip 3884
      1⤵
        PID:1020

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si766819.exe

        Filesize

        175KB

        MD5

        caf1d259321816859a5363e17cdb87c5

        SHA1

        9c9a636c5832f261f812c5c0889bf492b048559b

        SHA256

        d399d4a5f165b12b9a1fecbb379e3ec05a5feea23829e00cef700be24434f92e

        SHA512

        648e9ffbcae004d69bfa87f66bb3d24e1967a0d44d3eb6545f78939f496ef9a6e2d1f8463e999b0f002b352ff4c74395c809894b07a49e1de0aacb61f8794ae1

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si766819.exe

        Filesize

        175KB

        MD5

        caf1d259321816859a5363e17cdb87c5

        SHA1

        9c9a636c5832f261f812c5c0889bf492b048559b

        SHA256

        d399d4a5f165b12b9a1fecbb379e3ec05a5feea23829e00cef700be24434f92e

        SHA512

        648e9ffbcae004d69bfa87f66bb3d24e1967a0d44d3eb6545f78939f496ef9a6e2d1f8463e999b0f002b352ff4c74395c809894b07a49e1de0aacb61f8794ae1

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un384338.exe

        Filesize

        558KB

        MD5

        f882f7c4dc2856f8099ed7f0230f92b0

        SHA1

        a52661261f62c62e6bb6b7b19faef14e3866bbfe

        SHA256

        2aca10efec488fe81d906c0346d44259855fd3b9f462d20038b28567ec3e6362

        SHA512

        dcb34d0b424764abf4df5c298176f9aa4a053382caeef50f74665834b7958d2edd0a80856f304fb9aa8901831fd7254bb8229b46d7cadc098f284af8703c28ab

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un384338.exe

        Filesize

        558KB

        MD5

        f882f7c4dc2856f8099ed7f0230f92b0

        SHA1

        a52661261f62c62e6bb6b7b19faef14e3866bbfe

        SHA256

        2aca10efec488fe81d906c0346d44259855fd3b9f462d20038b28567ec3e6362

        SHA512

        dcb34d0b424764abf4df5c298176f9aa4a053382caeef50f74665834b7958d2edd0a80856f304fb9aa8901831fd7254bb8229b46d7cadc098f284af8703c28ab

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5442.exe

        Filesize

        307KB

        MD5

        086114b300580b02c1ed89801a12cf30

        SHA1

        f193cf825f37f1b863e47af2eacfbfa7d8e69345

        SHA256

        6afc853e9bed339b5527336060ee168080ba3921f2bdfaad5d4350b8bc0f564c

        SHA512

        ee501e1e4ba890becc22fa832c5a450703c7f1892302ace73e69cc3426ab4927e8333a44a7b3757a8ff70e4bc842d9d535be42853d2d28cf479ffb963cf779a6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5442.exe

        Filesize

        307KB

        MD5

        086114b300580b02c1ed89801a12cf30

        SHA1

        f193cf825f37f1b863e47af2eacfbfa7d8e69345

        SHA256

        6afc853e9bed339b5527336060ee168080ba3921f2bdfaad5d4350b8bc0f564c

        SHA512

        ee501e1e4ba890becc22fa832c5a450703c7f1892302ace73e69cc3426ab4927e8333a44a7b3757a8ff70e4bc842d9d535be42853d2d28cf479ffb963cf779a6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2671.exe

        Filesize

        366KB

        MD5

        910eebc61b28c673478340d189b4c6ea

        SHA1

        0dd963a1c06fc876ae5e1569957ee6f2e26287e0

        SHA256

        fb40027f5cd557e14db8b6958920815ecb64f04658322cefddcdae20b075cea1

        SHA512

        0e410e4ae38dbcbc11043fee1b80dd11324e2274e6b110466913656ba966c8703d0be576ec36cc0d1a8c318839f8c7d1a8d85e223fd95cd82312029dde88ddf1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2671.exe

        Filesize

        366KB

        MD5

        910eebc61b28c673478340d189b4c6ea

        SHA1

        0dd963a1c06fc876ae5e1569957ee6f2e26287e0

        SHA256

        fb40027f5cd557e14db8b6958920815ecb64f04658322cefddcdae20b075cea1

        SHA512

        0e410e4ae38dbcbc11043fee1b80dd11324e2274e6b110466913656ba966c8703d0be576ec36cc0d1a8c318839f8c7d1a8d85e223fd95cd82312029dde88ddf1

      • memory/3884-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/3884-1101-0x0000000005490000-0x0000000005AA8000-memory.dmp

        Filesize

        6.1MB

      • memory/3884-216-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/3884-214-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/3884-203-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

        Filesize

        64KB

      • memory/3884-205-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

        Filesize

        64KB

      • memory/3884-1115-0x0000000006900000-0x0000000006AC2000-memory.dmp

        Filesize

        1.8MB

      • memory/3884-1114-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

        Filesize

        64KB

      • memory/3884-1112-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

        Filesize

        64KB

      • memory/3884-1113-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

        Filesize

        64KB

      • memory/3884-206-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

        Filesize

        64KB

      • memory/3884-1111-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

        Filesize

        64KB

      • memory/3884-1109-0x0000000006780000-0x00000000067D0000-memory.dmp

        Filesize

        320KB

      • memory/3884-1108-0x00000000066F0000-0x0000000006766000-memory.dmp

        Filesize

        472KB

      • memory/3884-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/3884-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/3884-1105-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

        Filesize

        64KB

      • memory/3884-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/3884-1103-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/3884-218-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/3884-228-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/3884-226-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/3884-224-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/3884-191-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/3884-192-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/3884-194-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/3884-196-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/3884-198-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/3884-201-0x0000000002130000-0x000000000217B000-memory.dmp

        Filesize

        300KB

      • memory/3884-200-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/3884-222-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/3884-1116-0x0000000006AE0000-0x000000000700C000-memory.dmp

        Filesize

        5.2MB

      • memory/3884-220-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/3884-204-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/3884-208-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/3884-210-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/3884-212-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

        Filesize

        252KB

      • memory/3888-1122-0x00000000007C0000-0x00000000007F2000-memory.dmp

        Filesize

        200KB

      • memory/3888-1123-0x0000000005360000-0x0000000005370000-memory.dmp

        Filesize

        64KB

      • memory/4216-181-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/4216-170-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/4216-148-0x0000000004F00000-0x00000000054A4000-memory.dmp

        Filesize

        5.6MB

      • memory/4216-152-0x0000000004EF0000-0x0000000004F00000-memory.dmp

        Filesize

        64KB

      • memory/4216-151-0x0000000004EF0000-0x0000000004F00000-memory.dmp

        Filesize

        64KB

      • memory/4216-186-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/4216-184-0x0000000004EF0000-0x0000000004F00000-memory.dmp

        Filesize

        64KB

      • memory/4216-150-0x0000000004EF0000-0x0000000004F00000-memory.dmp

        Filesize

        64KB

      • memory/4216-183-0x0000000004EF0000-0x0000000004F00000-memory.dmp

        Filesize

        64KB

      • memory/4216-182-0x0000000004EF0000-0x0000000004F00000-memory.dmp

        Filesize

        64KB

      • memory/4216-154-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/4216-180-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/4216-178-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/4216-176-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/4216-174-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/4216-172-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/4216-168-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/4216-166-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/4216-164-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/4216-162-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/4216-160-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/4216-149-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/4216-158-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/4216-156-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/4216-153-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB