Analysis

  • max time kernel
    128s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 21:45

General

  • Target

    82c95b0fc70d45917aa05cc1f0ab0a97ba0238da932ddc87456b984647f05eff.exe

  • Size

    696KB

  • MD5

    9018962466f785938a67614867cddc6d

  • SHA1

    eaeb6288c4120b493bc604bc396d7642076ca690

  • SHA256

    82c95b0fc70d45917aa05cc1f0ab0a97ba0238da932ddc87456b984647f05eff

  • SHA512

    cd751612f5bb8b72ad04f80fa360f497aa0a77b84093f8f7e76d14a129e67b84c04fb7c157a96d7304ea637da36fd7d54a52b0f3d71d39d8bb3587fb18666312

  • SSDEEP

    12288:OMrFy90xpDlW0ZF77aI3NBj9XlAcFDqO69/6+ggwefUTxY/9/LHF/oeec0:Tymxx77Z9Bj9jFDqO6Y+SefUu/pd390

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

muse

C2

176.113.115.145:4125

Attributes
  • auth_value

    b91988a63a24940038d9262827a5320c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\82c95b0fc70d45917aa05cc1f0ab0a97ba0238da932ddc87456b984647f05eff.exe
    "C:\Users\Admin\AppData\Local\Temp\82c95b0fc70d45917aa05cc1f0ab0a97ba0238da932ddc87456b984647f05eff.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1540
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un160922.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un160922.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4324
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9836.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9836.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2748
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2748 -s 1080
          4⤵
          • Program crash
          PID:4344
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7294.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7294.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3940
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3940 -s 1324
          4⤵
          • Program crash
          PID:908
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si289739.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si289739.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4592
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2748 -ip 2748
    1⤵
      PID:3068
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3940 -ip 3940
      1⤵
        PID:3520

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si289739.exe
        Filesize

        175KB

        MD5

        ea647cd4daf6cb01c587bfec88c94855

        SHA1

        a2283b3542607262b439273caf42d91e74102eed

        SHA256

        c90c5693281c604e9a0e60b33164744675043a147648f90f6597e1eaea87cb56

        SHA512

        0f12acc7bc9a767fc7208ed10289308700e3548fb34575aa84d932ba47b4dc47e90f3e1a758bf7e9a7cb807968713299db03cdb8240559e3613d2b376755a353

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si289739.exe
        Filesize

        175KB

        MD5

        ea647cd4daf6cb01c587bfec88c94855

        SHA1

        a2283b3542607262b439273caf42d91e74102eed

        SHA256

        c90c5693281c604e9a0e60b33164744675043a147648f90f6597e1eaea87cb56

        SHA512

        0f12acc7bc9a767fc7208ed10289308700e3548fb34575aa84d932ba47b4dc47e90f3e1a758bf7e9a7cb807968713299db03cdb8240559e3613d2b376755a353

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un160922.exe
        Filesize

        554KB

        MD5

        f3792a20fc32367ad4d611206a90c285

        SHA1

        1d4505e71c3d9983301129123048902fffc6ad5e

        SHA256

        4b084893a9466d1029cfc5afacb406bfec52b41ee2068b703833179054594940

        SHA512

        d049e84568d1c56461123ee235c03e4d9635691818a7b3efd5bbfb57ed88e26ffb1ef2c58f934084ece8c5cf01d8653e782e7750bddbe878f656f45037dee5b9

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un160922.exe
        Filesize

        554KB

        MD5

        f3792a20fc32367ad4d611206a90c285

        SHA1

        1d4505e71c3d9983301129123048902fffc6ad5e

        SHA256

        4b084893a9466d1029cfc5afacb406bfec52b41ee2068b703833179054594940

        SHA512

        d049e84568d1c56461123ee235c03e4d9635691818a7b3efd5bbfb57ed88e26ffb1ef2c58f934084ece8c5cf01d8653e782e7750bddbe878f656f45037dee5b9

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9836.exe
        Filesize

        345KB

        MD5

        294f087374895cd8d05ed218285f0ebc

        SHA1

        695fdf8addd6109b9ecbb27ba44052d2440c8f94

        SHA256

        c3a2699e46ab27983fb729ec8c5d241d2a86c90fb7a84f8253333203b2ee5156

        SHA512

        d07589a9b769f06026da2036ee332075a24c61f3f7ed6c89350b1c8909ddea15c3d0fd5ef5d0d04ea1a5a2c50b5c8622c96f9519dca7c77ddd1b1d8ebba2b10e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9836.exe
        Filesize

        345KB

        MD5

        294f087374895cd8d05ed218285f0ebc

        SHA1

        695fdf8addd6109b9ecbb27ba44052d2440c8f94

        SHA256

        c3a2699e46ab27983fb729ec8c5d241d2a86c90fb7a84f8253333203b2ee5156

        SHA512

        d07589a9b769f06026da2036ee332075a24c61f3f7ed6c89350b1c8909ddea15c3d0fd5ef5d0d04ea1a5a2c50b5c8622c96f9519dca7c77ddd1b1d8ebba2b10e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7294.exe
        Filesize

        403KB

        MD5

        ecc1d4ac165e8bc6b906ef6996a8a05a

        SHA1

        c4876381672a975f17d11745eb7013b5f2213259

        SHA256

        c10aa692148c52c7eaf83f508d968138a620783b7cdc12d0ceea0b14924891aa

        SHA512

        fd3c2e559c2fb6aaa505cbbcefdab7015e99ed0402a4609abca5908c0d79ad44f275d1a420fb1380f4d279c58ec5150f2b02624dc298b81dfc706bd05764648e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7294.exe
        Filesize

        403KB

        MD5

        ecc1d4ac165e8bc6b906ef6996a8a05a

        SHA1

        c4876381672a975f17d11745eb7013b5f2213259

        SHA256

        c10aa692148c52c7eaf83f508d968138a620783b7cdc12d0ceea0b14924891aa

        SHA512

        fd3c2e559c2fb6aaa505cbbcefdab7015e99ed0402a4609abca5908c0d79ad44f275d1a420fb1380f4d279c58ec5150f2b02624dc298b81dfc706bd05764648e

      • memory/2748-148-0x0000000002C80000-0x0000000002CAD000-memory.dmp
        Filesize

        180KB

      • memory/2748-149-0x0000000007280000-0x0000000007824000-memory.dmp
        Filesize

        5.6MB

      • memory/2748-150-0x0000000004D90000-0x0000000004DA0000-memory.dmp
        Filesize

        64KB

      • memory/2748-151-0x0000000004D90000-0x0000000004DA0000-memory.dmp
        Filesize

        64KB

      • memory/2748-152-0x0000000004DF0000-0x0000000004E02000-memory.dmp
        Filesize

        72KB

      • memory/2748-153-0x0000000004DF0000-0x0000000004E02000-memory.dmp
        Filesize

        72KB

      • memory/2748-155-0x0000000004DF0000-0x0000000004E02000-memory.dmp
        Filesize

        72KB

      • memory/2748-157-0x0000000004DF0000-0x0000000004E02000-memory.dmp
        Filesize

        72KB

      • memory/2748-159-0x0000000004DF0000-0x0000000004E02000-memory.dmp
        Filesize

        72KB

      • memory/2748-161-0x0000000004DF0000-0x0000000004E02000-memory.dmp
        Filesize

        72KB

      • memory/2748-163-0x0000000004DF0000-0x0000000004E02000-memory.dmp
        Filesize

        72KB

      • memory/2748-167-0x0000000004DF0000-0x0000000004E02000-memory.dmp
        Filesize

        72KB

      • memory/2748-165-0x0000000004DF0000-0x0000000004E02000-memory.dmp
        Filesize

        72KB

      • memory/2748-169-0x0000000004DF0000-0x0000000004E02000-memory.dmp
        Filesize

        72KB

      • memory/2748-171-0x0000000004DF0000-0x0000000004E02000-memory.dmp
        Filesize

        72KB

      • memory/2748-173-0x0000000004DF0000-0x0000000004E02000-memory.dmp
        Filesize

        72KB

      • memory/2748-175-0x0000000004DF0000-0x0000000004E02000-memory.dmp
        Filesize

        72KB

      • memory/2748-177-0x0000000004DF0000-0x0000000004E02000-memory.dmp
        Filesize

        72KB

      • memory/2748-179-0x0000000004DF0000-0x0000000004E02000-memory.dmp
        Filesize

        72KB

      • memory/2748-180-0x0000000000400000-0x0000000002B83000-memory.dmp
        Filesize

        39.5MB

      • memory/2748-181-0x0000000002C80000-0x0000000002CAD000-memory.dmp
        Filesize

        180KB

      • memory/2748-183-0x0000000004D90000-0x0000000004DA0000-memory.dmp
        Filesize

        64KB

      • memory/2748-184-0x0000000004D90000-0x0000000004DA0000-memory.dmp
        Filesize

        64KB

      • memory/2748-185-0x0000000000400000-0x0000000002B83000-memory.dmp
        Filesize

        39.5MB

      • memory/3940-190-0x0000000002BA0000-0x0000000002BEB000-memory.dmp
        Filesize

        300KB

      • memory/3940-191-0x0000000004990000-0x00000000049A0000-memory.dmp
        Filesize

        64KB

      • memory/3940-192-0x0000000004990000-0x00000000049A0000-memory.dmp
        Filesize

        64KB

      • memory/3940-193-0x0000000004990000-0x00000000049A0000-memory.dmp
        Filesize

        64KB

      • memory/3940-194-0x0000000004D60000-0x0000000004D9F000-memory.dmp
        Filesize

        252KB

      • memory/3940-195-0x0000000004D60000-0x0000000004D9F000-memory.dmp
        Filesize

        252KB

      • memory/3940-197-0x0000000004D60000-0x0000000004D9F000-memory.dmp
        Filesize

        252KB

      • memory/3940-199-0x0000000004D60000-0x0000000004D9F000-memory.dmp
        Filesize

        252KB

      • memory/3940-201-0x0000000004D60000-0x0000000004D9F000-memory.dmp
        Filesize

        252KB

      • memory/3940-203-0x0000000004D60000-0x0000000004D9F000-memory.dmp
        Filesize

        252KB

      • memory/3940-205-0x0000000004D60000-0x0000000004D9F000-memory.dmp
        Filesize

        252KB

      • memory/3940-207-0x0000000004D60000-0x0000000004D9F000-memory.dmp
        Filesize

        252KB

      • memory/3940-209-0x0000000004D60000-0x0000000004D9F000-memory.dmp
        Filesize

        252KB

      • memory/3940-211-0x0000000004D60000-0x0000000004D9F000-memory.dmp
        Filesize

        252KB

      • memory/3940-213-0x0000000004D60000-0x0000000004D9F000-memory.dmp
        Filesize

        252KB

      • memory/3940-215-0x0000000004D60000-0x0000000004D9F000-memory.dmp
        Filesize

        252KB

      • memory/3940-217-0x0000000004D60000-0x0000000004D9F000-memory.dmp
        Filesize

        252KB

      • memory/3940-219-0x0000000004D60000-0x0000000004D9F000-memory.dmp
        Filesize

        252KB

      • memory/3940-221-0x0000000004D60000-0x0000000004D9F000-memory.dmp
        Filesize

        252KB

      • memory/3940-223-0x0000000004D60000-0x0000000004D9F000-memory.dmp
        Filesize

        252KB

      • memory/3940-225-0x0000000004D60000-0x0000000004D9F000-memory.dmp
        Filesize

        252KB

      • memory/3940-227-0x0000000004D60000-0x0000000004D9F000-memory.dmp
        Filesize

        252KB

      • memory/3940-1100-0x00000000077F0000-0x0000000007E08000-memory.dmp
        Filesize

        6.1MB

      • memory/3940-1101-0x0000000007E40000-0x0000000007F4A000-memory.dmp
        Filesize

        1.0MB

      • memory/3940-1102-0x0000000007F80000-0x0000000007F92000-memory.dmp
        Filesize

        72KB

      • memory/3940-1103-0x0000000007FA0000-0x0000000007FDC000-memory.dmp
        Filesize

        240KB

      • memory/3940-1104-0x0000000004990000-0x00000000049A0000-memory.dmp
        Filesize

        64KB

      • memory/3940-1106-0x0000000008290000-0x00000000082F6000-memory.dmp
        Filesize

        408KB

      • memory/3940-1107-0x0000000008950000-0x00000000089E2000-memory.dmp
        Filesize

        584KB

      • memory/3940-1108-0x0000000004990000-0x00000000049A0000-memory.dmp
        Filesize

        64KB

      • memory/3940-1109-0x0000000008B50000-0x0000000008D12000-memory.dmp
        Filesize

        1.8MB

      • memory/3940-1110-0x0000000008D30000-0x000000000925C000-memory.dmp
        Filesize

        5.2MB

      • memory/3940-1111-0x00000000093B0000-0x0000000009426000-memory.dmp
        Filesize

        472KB

      • memory/3940-1112-0x0000000009430000-0x0000000009480000-memory.dmp
        Filesize

        320KB

      • memory/3940-1114-0x0000000004990000-0x00000000049A0000-memory.dmp
        Filesize

        64KB

      • memory/4592-1119-0x00000000007B0000-0x00000000007E2000-memory.dmp
        Filesize

        200KB

      • memory/4592-1120-0x00000000050B0000-0x00000000050C0000-memory.dmp
        Filesize

        64KB