Analysis

  • max time kernel
    91s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 23:25

General

  • Target

    b8663013165e051b557d716c82e9584e60b855b5349967c724deef53af9372f9.exe

  • Size

    696KB

  • MD5

    53958239dd3eb50e0ef0e365243e559e

  • SHA1

    2a0fc4dfd00fa043547f4efcd85c3001545bc115

  • SHA256

    b8663013165e051b557d716c82e9584e60b855b5349967c724deef53af9372f9

  • SHA512

    d3c35508e11819c3ac236e030bd27b3da82045cf3b4075b3ab566c960b2f7040b41837ed057d415d7acf1562af61da3e51f17a5f22c149695b47d7cc453f256d

  • SSDEEP

    12288:4Mrayy904fvu4sL5+GOFMs3NBB9aEfdl69/Vm2Xdu3WTmk0/o4c0fQ:dyJ34IxR9BB9pdl6y2j0w4c0Y

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

zaza

C2

176.113.115.145:4125

Attributes
  • auth_value

    48bf44c663fe3c1035fb4dd0b91fde5d

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8663013165e051b557d716c82e9584e60b855b5349967c724deef53af9372f9.exe
    "C:\Users\Admin\AppData\Local\Temp\b8663013165e051b557d716c82e9584e60b855b5349967c724deef53af9372f9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un033066.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un033066.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2568
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5976.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5976.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4732
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4732 -s 1080
          4⤵
          • Program crash
          PID:3052
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9012.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9012.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4488
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 1588
          4⤵
          • Program crash
          PID:3880
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si563055.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si563055.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2816
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4732 -ip 4732
    1⤵
      PID:2128
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4488 -ip 4488
      1⤵
        PID:2424

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si563055.exe

        Filesize

        175KB

        MD5

        08c34fe2f2ce876701b5c40edc8bb192

        SHA1

        f25f7ba3bc0fc0a1056bce572227212d05b027b8

        SHA256

        48315b5b74a80922d9fcfa014ccf2c4b67ace4b847f8cb5ac345aa31e469882c

        SHA512

        085845890a00976a030eea4da4f9dc88d8bd487c202050291baa859d9d5e4e2334f6ff31e0f700b8b511245ba460a74e05db1201e1b427910717cb5ece3078d9

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si563055.exe

        Filesize

        175KB

        MD5

        08c34fe2f2ce876701b5c40edc8bb192

        SHA1

        f25f7ba3bc0fc0a1056bce572227212d05b027b8

        SHA256

        48315b5b74a80922d9fcfa014ccf2c4b67ace4b847f8cb5ac345aa31e469882c

        SHA512

        085845890a00976a030eea4da4f9dc88d8bd487c202050291baa859d9d5e4e2334f6ff31e0f700b8b511245ba460a74e05db1201e1b427910717cb5ece3078d9

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un033066.exe

        Filesize

        554KB

        MD5

        51380f0febd7a379c718c7b6bf38c62b

        SHA1

        0e8a67633040059490d29481ee7c195ca54b0d3a

        SHA256

        b2b1039e3638c8a90ef67d5b1e2eb4fe758c47bb6d980c41f1cbb3aef77ad2eb

        SHA512

        d417cf1d13e84c47148fca0cdbdafdcadb09612f7c063a3108d173d7f77f9fe2acb5adefbc09fed77a5337daa52af3770bd2dc139ed86dbd936186fcbe25a3e4

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un033066.exe

        Filesize

        554KB

        MD5

        51380f0febd7a379c718c7b6bf38c62b

        SHA1

        0e8a67633040059490d29481ee7c195ca54b0d3a

        SHA256

        b2b1039e3638c8a90ef67d5b1e2eb4fe758c47bb6d980c41f1cbb3aef77ad2eb

        SHA512

        d417cf1d13e84c47148fca0cdbdafdcadb09612f7c063a3108d173d7f77f9fe2acb5adefbc09fed77a5337daa52af3770bd2dc139ed86dbd936186fcbe25a3e4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5976.exe

        Filesize

        345KB

        MD5

        1ca92b5aa008b9dfe64154f199fa2504

        SHA1

        9e9761d0455512d0a8b3c27e6d60b29e8cd43ee7

        SHA256

        52dfe0fe9fb674b5b79814162489cd384d8d60ae840ad3f5cb56c963a4cabb79

        SHA512

        cf7a7f15fea183d27c3dc54ecd1b4344a75dcd82283621519ccbcbef1d94dd5571bea81151a38d7ac06fe0f48166c71a7bfb16b1b8eca93137bfd891c8ec21e9

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5976.exe

        Filesize

        345KB

        MD5

        1ca92b5aa008b9dfe64154f199fa2504

        SHA1

        9e9761d0455512d0a8b3c27e6d60b29e8cd43ee7

        SHA256

        52dfe0fe9fb674b5b79814162489cd384d8d60ae840ad3f5cb56c963a4cabb79

        SHA512

        cf7a7f15fea183d27c3dc54ecd1b4344a75dcd82283621519ccbcbef1d94dd5571bea81151a38d7ac06fe0f48166c71a7bfb16b1b8eca93137bfd891c8ec21e9

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9012.exe

        Filesize

        403KB

        MD5

        2e6a29edd42591d60f1a3f0fac1f79b8

        SHA1

        1027f710fc740461eb0eb64b3c0982f61153d113

        SHA256

        c404637c08417f1ab326e5b20893f6d46c2bbc96991bdebd250d4c11ed0b39d5

        SHA512

        0f11a9f80c3a8773d9d2231b62440d7051eb5dce64edac2e7b574d04ddbd3c17c4a773fd120903238ef7a647b32a0384e54046a6a5f49fea54582682d555ec5c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9012.exe

        Filesize

        403KB

        MD5

        2e6a29edd42591d60f1a3f0fac1f79b8

        SHA1

        1027f710fc740461eb0eb64b3c0982f61153d113

        SHA256

        c404637c08417f1ab326e5b20893f6d46c2bbc96991bdebd250d4c11ed0b39d5

        SHA512

        0f11a9f80c3a8773d9d2231b62440d7051eb5dce64edac2e7b574d04ddbd3c17c4a773fd120903238ef7a647b32a0384e54046a6a5f49fea54582682d555ec5c

      • memory/2816-1122-0x00000000055A0000-0x00000000055B0000-memory.dmp

        Filesize

        64KB

      • memory/2816-1121-0x0000000000C50000-0x0000000000C82000-memory.dmp

        Filesize

        200KB

      • memory/4488-227-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4488-1104-0x00000000080E0000-0x000000000811C000-memory.dmp

        Filesize

        240KB

      • memory/4488-1115-0x000000000A8B0000-0x000000000A900000-memory.dmp

        Filesize

        320KB

      • memory/4488-1114-0x0000000006C60000-0x0000000006CD6000-memory.dmp

        Filesize

        472KB

      • memory/4488-1113-0x00000000072A0000-0x00000000072B0000-memory.dmp

        Filesize

        64KB

      • memory/4488-1112-0x000000000A260000-0x000000000A78C000-memory.dmp

        Filesize

        5.2MB

      • memory/4488-1111-0x000000000A090000-0x000000000A252000-memory.dmp

        Filesize

        1.8MB

      • memory/4488-1110-0x00000000072A0000-0x00000000072B0000-memory.dmp

        Filesize

        64KB

      • memory/4488-1109-0x00000000072A0000-0x00000000072B0000-memory.dmp

        Filesize

        64KB

      • memory/4488-1108-0x00000000072A0000-0x00000000072B0000-memory.dmp

        Filesize

        64KB

      • memory/4488-1107-0x0000000008470000-0x00000000084D6000-memory.dmp

        Filesize

        408KB

      • memory/4488-1106-0x00000000083D0000-0x0000000008462000-memory.dmp

        Filesize

        584KB

      • memory/4488-1103-0x00000000072A0000-0x00000000072B0000-memory.dmp

        Filesize

        64KB

      • memory/4488-1102-0x00000000080C0000-0x00000000080D2000-memory.dmp

        Filesize

        72KB

      • memory/4488-1101-0x0000000007F80000-0x000000000808A000-memory.dmp

        Filesize

        1.0MB

      • memory/4488-1100-0x0000000007960000-0x0000000007F78000-memory.dmp

        Filesize

        6.1MB

      • memory/4488-226-0x00000000072A0000-0x00000000072B0000-memory.dmp

        Filesize

        64KB

      • memory/4488-223-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4488-224-0x00000000072A0000-0x00000000072B0000-memory.dmp

        Filesize

        64KB

      • memory/4488-219-0x0000000002BA0000-0x0000000002BEB000-memory.dmp

        Filesize

        300KB

      • memory/4488-190-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4488-193-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4488-191-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4488-195-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4488-197-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4488-199-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4488-201-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4488-203-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4488-205-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4488-207-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4488-209-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4488-211-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4488-213-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4488-215-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4488-217-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4488-220-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4488-221-0x00000000072A0000-0x00000000072B0000-memory.dmp

        Filesize

        64KB

      • memory/4732-172-0x0000000004C00000-0x0000000004C12000-memory.dmp

        Filesize

        72KB

      • memory/4732-150-0x0000000004BF0000-0x0000000004C00000-memory.dmp

        Filesize

        64KB

      • memory/4732-185-0x0000000000400000-0x0000000002B83000-memory.dmp

        Filesize

        39.5MB

      • memory/4732-183-0x0000000004BF0000-0x0000000004C00000-memory.dmp

        Filesize

        64KB

      • memory/4732-152-0x0000000004BF0000-0x0000000004C00000-memory.dmp

        Filesize

        64KB

      • memory/4732-182-0x0000000004BF0000-0x0000000004C00000-memory.dmp

        Filesize

        64KB

      • memory/4732-181-0x0000000000400000-0x0000000002B83000-memory.dmp

        Filesize

        39.5MB

      • memory/4732-180-0x0000000004C00000-0x0000000004C12000-memory.dmp

        Filesize

        72KB

      • memory/4732-178-0x0000000004C00000-0x0000000004C12000-memory.dmp

        Filesize

        72KB

      • memory/4732-156-0x0000000004C00000-0x0000000004C12000-memory.dmp

        Filesize

        72KB

      • memory/4732-148-0x0000000007270000-0x0000000007814000-memory.dmp

        Filesize

        5.6MB

      • memory/4732-153-0x0000000004C00000-0x0000000004C12000-memory.dmp

        Filesize

        72KB

      • memory/4732-168-0x0000000004C00000-0x0000000004C12000-memory.dmp

        Filesize

        72KB

      • memory/4732-170-0x0000000004C00000-0x0000000004C12000-memory.dmp

        Filesize

        72KB

      • memory/4732-154-0x0000000004C00000-0x0000000004C12000-memory.dmp

        Filesize

        72KB

      • memory/4732-166-0x0000000004C00000-0x0000000004C12000-memory.dmp

        Filesize

        72KB

      • memory/4732-164-0x0000000004C00000-0x0000000004C12000-memory.dmp

        Filesize

        72KB

      • memory/4732-162-0x0000000004C00000-0x0000000004C12000-memory.dmp

        Filesize

        72KB

      • memory/4732-160-0x0000000004C00000-0x0000000004C12000-memory.dmp

        Filesize

        72KB

      • memory/4732-158-0x0000000004C00000-0x0000000004C12000-memory.dmp

        Filesize

        72KB

      • memory/4732-151-0x0000000004BF0000-0x0000000004C00000-memory.dmp

        Filesize

        64KB

      • memory/4732-174-0x0000000004C00000-0x0000000004C12000-memory.dmp

        Filesize

        72KB

      • memory/4732-149-0x0000000002B90000-0x0000000002BBD000-memory.dmp

        Filesize

        180KB

      • memory/4732-176-0x0000000004C00000-0x0000000004C12000-memory.dmp

        Filesize

        72KB