Analysis

  • max time kernel
    93s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 00:43

General

  • Target

    setup.exe

  • Size

    700KB

  • MD5

    ab22ac232858a19b89005c5909d7507a

  • SHA1

    29dc83c0557877a96778a61896896b38b53a0b2f

  • SHA256

    09c04abb7450f701110e6f6b394e9317bc3b5c5c0ddf8a1000ba4cc71c5f563e

  • SHA512

    256a02c89994b4210e32fd6693de7dce7e3b02b9ec3bfbb8559968eaf39a920b41b023d0fe922f633aec42148f4cc3b5c9230f603248018905c40735de1e93df

  • SSDEEP

    12288:eMrXy90SkGqUWwJOEvM9XwH9DGzcAAO3dWDdNbIffdyO691Oq/8SV:Jy0nwJZExtAOtqpIf1/6zOq/8SV

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4108
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un742226.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un742226.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1708
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5697.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5697.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4040
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 1040
          4⤵
          • Program crash
          PID:5088
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2855.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2855.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5016
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 1348
          4⤵
          • Program crash
          PID:4912
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si243947.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si243947.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:988
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4040 -ip 4040
    1⤵
      PID:560
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 5016 -ip 5016
      1⤵
        PID:5040

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si243947.exe

        Filesize

        175KB

        MD5

        62e7346ed6ae7136a09a7277b0f36f9f

        SHA1

        779768d96a1c621831ca4e9ebb379f5d93da4b84

        SHA256

        71f1b0380f9b2e3da05ca2bf398e28b149582d1882b1d3b9cee6f82c29d18960

        SHA512

        0f1806dacf2819413ac7fba60c7efc40062d1b2339c21efd442f14f30b751246e8e38d2baca49e36cbc58ee6756ca9932a06ced178ec4359525e286cc1eea3a0

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si243947.exe

        Filesize

        175KB

        MD5

        62e7346ed6ae7136a09a7277b0f36f9f

        SHA1

        779768d96a1c621831ca4e9ebb379f5d93da4b84

        SHA256

        71f1b0380f9b2e3da05ca2bf398e28b149582d1882b1d3b9cee6f82c29d18960

        SHA512

        0f1806dacf2819413ac7fba60c7efc40062d1b2339c21efd442f14f30b751246e8e38d2baca49e36cbc58ee6756ca9932a06ced178ec4359525e286cc1eea3a0

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un742226.exe

        Filesize

        558KB

        MD5

        5070e953ea5b41b59e902ee8dcedb254

        SHA1

        3655ec37372ac664049f51fdb8be3f7ed28e4db5

        SHA256

        85e4a1a1e0224fa10b081bc7b2fcc0da8a2be3cd22fb76388f32ce89d09d04a8

        SHA512

        b571bde818b297af4f805762bd6179415c5539d7288dfab576869d0be816789ce2609fca27aae282878143fd1464dce108dea80fd5a67403d6aaf34b1bab89a1

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un742226.exe

        Filesize

        558KB

        MD5

        5070e953ea5b41b59e902ee8dcedb254

        SHA1

        3655ec37372ac664049f51fdb8be3f7ed28e4db5

        SHA256

        85e4a1a1e0224fa10b081bc7b2fcc0da8a2be3cd22fb76388f32ce89d09d04a8

        SHA512

        b571bde818b297af4f805762bd6179415c5539d7288dfab576869d0be816789ce2609fca27aae282878143fd1464dce108dea80fd5a67403d6aaf34b1bab89a1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5697.exe

        Filesize

        307KB

        MD5

        d4c4c6c7dc7caca3e74b0fb4c6e054d3

        SHA1

        c76cf4b3278a1282768a6cc4c75338add1051203

        SHA256

        012d20832cb557ea03414704f933940b48a6445544f4917fdfb147bba45cfc2b

        SHA512

        6a883ab736cdd2a4ee6111ec1454f5fe7ca49c5319223ef0e04e5dee56069fcd27ddbcf942d57ede4155b7a4e8451b010f07e67542162b82b2c336b149f74f28

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5697.exe

        Filesize

        307KB

        MD5

        d4c4c6c7dc7caca3e74b0fb4c6e054d3

        SHA1

        c76cf4b3278a1282768a6cc4c75338add1051203

        SHA256

        012d20832cb557ea03414704f933940b48a6445544f4917fdfb147bba45cfc2b

        SHA512

        6a883ab736cdd2a4ee6111ec1454f5fe7ca49c5319223ef0e04e5dee56069fcd27ddbcf942d57ede4155b7a4e8451b010f07e67542162b82b2c336b149f74f28

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2855.exe

        Filesize

        365KB

        MD5

        8f237ababdc57bfc759b82dcefa431b7

        SHA1

        2bb7a42c0e36731be9e944598a92605f12f1b983

        SHA256

        ef10a4d64f7e7d120bb1b8a9c7896b78c5944bebfe41cb750d48c032c3af15f4

        SHA512

        0f9add8bd7867803925c3f052c67cef39818c820ae2dbd1d8b73f8ec1c3bca0bf9ea79a073465dd35d361aa04311c580e134ce4cbc9e73dd2d0271b4d74b9357

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2855.exe

        Filesize

        365KB

        MD5

        8f237ababdc57bfc759b82dcefa431b7

        SHA1

        2bb7a42c0e36731be9e944598a92605f12f1b983

        SHA256

        ef10a4d64f7e7d120bb1b8a9c7896b78c5944bebfe41cb750d48c032c3af15f4

        SHA512

        0f9add8bd7867803925c3f052c67cef39818c820ae2dbd1d8b73f8ec1c3bca0bf9ea79a073465dd35d361aa04311c580e134ce4cbc9e73dd2d0271b4d74b9357

      • memory/988-1122-0x0000000000B00000-0x0000000000B32000-memory.dmp

        Filesize

        200KB

      • memory/988-1123-0x0000000005730000-0x0000000005740000-memory.dmp

        Filesize

        64KB

      • memory/988-1124-0x0000000005730000-0x0000000005740000-memory.dmp

        Filesize

        64KB

      • memory/4040-162-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4040-174-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4040-152-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4040-154-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4040-156-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4040-158-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4040-160-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4040-150-0x0000000004D20000-0x00000000052C4000-memory.dmp

        Filesize

        5.6MB

      • memory/4040-164-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4040-166-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4040-170-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4040-168-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4040-172-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4040-151-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4040-176-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4040-178-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4040-179-0x0000000004D10000-0x0000000004D20000-memory.dmp

        Filesize

        64KB

      • memory/4040-180-0x0000000004D10000-0x0000000004D20000-memory.dmp

        Filesize

        64KB

      • memory/4040-181-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/4040-182-0x0000000004D10000-0x0000000004D20000-memory.dmp

        Filesize

        64KB

      • memory/4040-184-0x0000000004D10000-0x0000000004D20000-memory.dmp

        Filesize

        64KB

      • memory/4040-185-0x0000000004D10000-0x0000000004D20000-memory.dmp

        Filesize

        64KB

      • memory/4040-186-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/4040-149-0x0000000004D10000-0x0000000004D20000-memory.dmp

        Filesize

        64KB

      • memory/4040-148-0x0000000000840000-0x000000000086D000-memory.dmp

        Filesize

        180KB

      • memory/5016-194-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/5016-341-0x0000000004F20000-0x0000000004F30000-memory.dmp

        Filesize

        64KB

      • memory/5016-198-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/5016-200-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/5016-202-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/5016-204-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/5016-206-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/5016-208-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/5016-210-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/5016-212-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/5016-214-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/5016-216-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/5016-218-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/5016-220-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/5016-222-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/5016-224-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/5016-338-0x0000000004F20000-0x0000000004F30000-memory.dmp

        Filesize

        64KB

      • memory/5016-336-0x00000000007F0000-0x000000000083B000-memory.dmp

        Filesize

        300KB

      • memory/5016-339-0x0000000004F20000-0x0000000004F30000-memory.dmp

        Filesize

        64KB

      • memory/5016-196-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/5016-1101-0x00000000054E0000-0x0000000005AF8000-memory.dmp

        Filesize

        6.1MB

      • memory/5016-1102-0x0000000004DE0000-0x0000000004EEA000-memory.dmp

        Filesize

        1.0MB

      • memory/5016-1103-0x0000000005B00000-0x0000000005B12000-memory.dmp

        Filesize

        72KB

      • memory/5016-1104-0x0000000004F20000-0x0000000004F30000-memory.dmp

        Filesize

        64KB

      • memory/5016-1105-0x0000000005B20000-0x0000000005B5C000-memory.dmp

        Filesize

        240KB

      • memory/5016-1106-0x0000000005E10000-0x0000000005EA2000-memory.dmp

        Filesize

        584KB

      • memory/5016-1107-0x0000000005EB0000-0x0000000005F16000-memory.dmp

        Filesize

        408KB

      • memory/5016-1109-0x0000000004F20000-0x0000000004F30000-memory.dmp

        Filesize

        64KB

      • memory/5016-1110-0x0000000004F20000-0x0000000004F30000-memory.dmp

        Filesize

        64KB

      • memory/5016-1111-0x0000000004F20000-0x0000000004F30000-memory.dmp

        Filesize

        64KB

      • memory/5016-1112-0x0000000007AD0000-0x0000000007C92000-memory.dmp

        Filesize

        1.8MB

      • memory/5016-1113-0x0000000007CA0000-0x00000000081CC000-memory.dmp

        Filesize

        5.2MB

      • memory/5016-191-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/5016-192-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/5016-1114-0x0000000004F20000-0x0000000004F30000-memory.dmp

        Filesize

        64KB

      • memory/5016-1115-0x00000000082E0000-0x0000000008356000-memory.dmp

        Filesize

        472KB

      • memory/5016-1116-0x0000000000D50000-0x0000000000DA0000-memory.dmp

        Filesize

        320KB