Analysis

  • max time kernel
    90s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 00:43

General

  • Target

    setup.exe

  • Size

    700KB

  • MD5

    714253bb012b77ceb9ea902080498760

  • SHA1

    d0464c5c39b42443de81fb1f78317ce794d76282

  • SHA256

    80b7edf8fbf49ed29065f61146327b997a5da88e703421fb6f1c3cf63fdea02e

  • SHA512

    5d0b6792aab9ce81bcd2e2dc06da76663f29662be3975efdb75f1154aaa49b36b32799fd882da06d9d98a247e77f16b90dcded93a43866127a2531b529c2bef2

  • SSDEEP

    12288:2Mr7y904Q6qeczmnoVXANKCp2+9DMpcAbr2fnFfNf1cuudyO6aasQ2:lyHQ/ecVVXAcCGv2fFf9+um/6aa+

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un413570.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un413570.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:552
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5766.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5766.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2320
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2320 -s 1100
          4⤵
          • Program crash
          PID:2528
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7079.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7079.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1656
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1656 -s 1364
          4⤵
          • Program crash
          PID:2136
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si726589.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si726589.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3924
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2320 -ip 2320
    1⤵
      PID:3420
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1656 -ip 1656
      1⤵
        PID:3380

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si726589.exe
        Filesize

        175KB

        MD5

        16dda1c2e35573c53ce6ca6153aebc79

        SHA1

        3919c66e9e865eaf4e1fdd2aca123b28c82038f4

        SHA256

        9f5b1ed15388feeeefa94d0fbee982779e3749fcc4e0f5e31135f10d515a76e8

        SHA512

        79b9ce4fe90226f05dd454a94ccade9598be6d18316587f7514a0efcd6daa846c8dc42197443e3462b291c9e810acdec6a2246857315dac0e7d0fc9c6d972f37

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si726589.exe
        Filesize

        175KB

        MD5

        16dda1c2e35573c53ce6ca6153aebc79

        SHA1

        3919c66e9e865eaf4e1fdd2aca123b28c82038f4

        SHA256

        9f5b1ed15388feeeefa94d0fbee982779e3749fcc4e0f5e31135f10d515a76e8

        SHA512

        79b9ce4fe90226f05dd454a94ccade9598be6d18316587f7514a0efcd6daa846c8dc42197443e3462b291c9e810acdec6a2246857315dac0e7d0fc9c6d972f37

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un413570.exe
        Filesize

        558KB

        MD5

        8a9e068a607086915df7be1c00a2b46b

        SHA1

        9f1b188a3608666898a2084d474129ee1d1f318c

        SHA256

        6573925e79dc0e88ca47e9c2a36d703e3c5eafd739c2f3f2b046240e67ad659b

        SHA512

        6d6fccd92156259144454fd5768c0cb0dc5c6007eba04008382399654ee621fba250631eb323c7a52f4580b2e29e46a25d5c7ab5db3eec7075de5dc14a6875e7

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un413570.exe
        Filesize

        558KB

        MD5

        8a9e068a607086915df7be1c00a2b46b

        SHA1

        9f1b188a3608666898a2084d474129ee1d1f318c

        SHA256

        6573925e79dc0e88ca47e9c2a36d703e3c5eafd739c2f3f2b046240e67ad659b

        SHA512

        6d6fccd92156259144454fd5768c0cb0dc5c6007eba04008382399654ee621fba250631eb323c7a52f4580b2e29e46a25d5c7ab5db3eec7075de5dc14a6875e7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5766.exe
        Filesize

        307KB

        MD5

        be252a8226b0618886d031a2fccb5a7b

        SHA1

        527d39cf08e24f90cf23f6b638a1311d7f7597fa

        SHA256

        658e7fb7cfb139b9aa8c51bbc30c0b1e0931cb403c2c3749070b6e77329cedd5

        SHA512

        c6668c9f5ccf91d524b16699d8cc36e9922661345993a42ba745dc3a21adfbb968912c4441094481b6d897c8d8c13614a2e58c5710a73242365b8cfb316e2b85

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5766.exe
        Filesize

        307KB

        MD5

        be252a8226b0618886d031a2fccb5a7b

        SHA1

        527d39cf08e24f90cf23f6b638a1311d7f7597fa

        SHA256

        658e7fb7cfb139b9aa8c51bbc30c0b1e0931cb403c2c3749070b6e77329cedd5

        SHA512

        c6668c9f5ccf91d524b16699d8cc36e9922661345993a42ba745dc3a21adfbb968912c4441094481b6d897c8d8c13614a2e58c5710a73242365b8cfb316e2b85

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7079.exe
        Filesize

        365KB

        MD5

        dbb4a1f51e12bb36ab7c7749810ad023

        SHA1

        5d93c9f423e1061c21bb08e4dbbc4f87782e697b

        SHA256

        22d469598c4875faf0de7e7be2ee42b798740142622dbda9413c58853435cdf3

        SHA512

        2ff82532451c078cb9a216c9428481e56e93a12e1fcd90bb1990b3d32616d6e42632e7a91e608c0cd7486b3bb186c387a8d1815eb53f9d8f2e18f950784139b6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7079.exe
        Filesize

        365KB

        MD5

        dbb4a1f51e12bb36ab7c7749810ad023

        SHA1

        5d93c9f423e1061c21bb08e4dbbc4f87782e697b

        SHA256

        22d469598c4875faf0de7e7be2ee42b798740142622dbda9413c58853435cdf3

        SHA512

        2ff82532451c078cb9a216c9428481e56e93a12e1fcd90bb1990b3d32616d6e42632e7a91e608c0cd7486b3bb186c387a8d1815eb53f9d8f2e18f950784139b6

      • memory/1656-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp
        Filesize

        1.0MB

      • memory/1656-226-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/1656-1116-0x0000000008320000-0x0000000008370000-memory.dmp
        Filesize

        320KB

      • memory/1656-1115-0x00000000024F0000-0x0000000002566000-memory.dmp
        Filesize

        472KB

      • memory/1656-1114-0x0000000002460000-0x0000000002470000-memory.dmp
        Filesize

        64KB

      • memory/1656-203-0x0000000002460000-0x0000000002470000-memory.dmp
        Filesize

        64KB

      • memory/1656-1113-0x0000000002460000-0x0000000002470000-memory.dmp
        Filesize

        64KB

      • memory/1656-1112-0x0000000002460000-0x0000000002470000-memory.dmp
        Filesize

        64KB

      • memory/1656-1111-0x0000000002460000-0x0000000002470000-memory.dmp
        Filesize

        64KB

      • memory/1656-1109-0x00000000068F0000-0x0000000006E1C000-memory.dmp
        Filesize

        5.2MB

      • memory/1656-1108-0x0000000006710000-0x00000000068D2000-memory.dmp
        Filesize

        1.8MB

      • memory/1656-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp
        Filesize

        408KB

      • memory/1656-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp
        Filesize

        584KB

      • memory/1656-198-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/1656-1105-0x0000000002460000-0x0000000002470000-memory.dmp
        Filesize

        64KB

      • memory/1656-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp
        Filesize

        240KB

      • memory/1656-1103-0x0000000005C40000-0x0000000005C52000-memory.dmp
        Filesize

        72KB

      • memory/1656-1101-0x0000000005460000-0x0000000005A78000-memory.dmp
        Filesize

        6.1MB

      • memory/1656-228-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/1656-214-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/1656-224-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/1656-220-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/1656-222-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/1656-192-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/1656-194-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/1656-208-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/1656-196-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/1656-199-0x00000000007F0000-0x000000000083B000-memory.dmp
        Filesize

        300KB

      • memory/1656-202-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/1656-201-0x0000000002460000-0x0000000002470000-memory.dmp
        Filesize

        64KB

      • memory/1656-205-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/1656-206-0x0000000002460000-0x0000000002470000-memory.dmp
        Filesize

        64KB

      • memory/1656-218-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/1656-216-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/1656-191-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/1656-210-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/1656-212-0x0000000005280000-0x00000000052BF000-memory.dmp
        Filesize

        252KB

      • memory/2320-183-0x0000000002790000-0x00000000027A0000-memory.dmp
        Filesize

        64KB

      • memory/2320-176-0x0000000002770000-0x0000000002782000-memory.dmp
        Filesize

        72KB

      • memory/2320-160-0x0000000002770000-0x0000000002782000-memory.dmp
        Filesize

        72KB

      • memory/2320-151-0x0000000002790000-0x00000000027A0000-memory.dmp
        Filesize

        64KB

      • memory/2320-152-0x0000000002790000-0x00000000027A0000-memory.dmp
        Filesize

        64KB

      • memory/2320-186-0x0000000000400000-0x000000000070F000-memory.dmp
        Filesize

        3.1MB

      • memory/2320-184-0x0000000002790000-0x00000000027A0000-memory.dmp
        Filesize

        64KB

      • memory/2320-182-0x0000000002790000-0x00000000027A0000-memory.dmp
        Filesize

        64KB

      • memory/2320-153-0x0000000002770000-0x0000000002782000-memory.dmp
        Filesize

        72KB

      • memory/2320-150-0x0000000002790000-0x00000000027A0000-memory.dmp
        Filesize

        64KB

      • memory/2320-181-0x0000000000400000-0x000000000070F000-memory.dmp
        Filesize

        3.1MB

      • memory/2320-180-0x0000000002770000-0x0000000002782000-memory.dmp
        Filesize

        72KB

      • memory/2320-178-0x0000000002770000-0x0000000002782000-memory.dmp
        Filesize

        72KB

      • memory/2320-174-0x0000000002770000-0x0000000002782000-memory.dmp
        Filesize

        72KB

      • memory/2320-172-0x0000000002770000-0x0000000002782000-memory.dmp
        Filesize

        72KB

      • memory/2320-170-0x0000000002770000-0x0000000002782000-memory.dmp
        Filesize

        72KB

      • memory/2320-168-0x0000000002770000-0x0000000002782000-memory.dmp
        Filesize

        72KB

      • memory/2320-166-0x0000000002770000-0x0000000002782000-memory.dmp
        Filesize

        72KB

      • memory/2320-164-0x0000000002770000-0x0000000002782000-memory.dmp
        Filesize

        72KB

      • memory/2320-162-0x0000000002770000-0x0000000002782000-memory.dmp
        Filesize

        72KB

      • memory/2320-158-0x0000000002770000-0x0000000002782000-memory.dmp
        Filesize

        72KB

      • memory/2320-156-0x0000000002770000-0x0000000002782000-memory.dmp
        Filesize

        72KB

      • memory/2320-154-0x0000000002770000-0x0000000002782000-memory.dmp
        Filesize

        72KB

      • memory/2320-148-0x00000000007E0000-0x000000000080D000-memory.dmp
        Filesize

        180KB

      • memory/2320-149-0x0000000004DD0000-0x0000000005374000-memory.dmp
        Filesize

        5.6MB

      • memory/3924-1122-0x0000000000CA0000-0x0000000000CD2000-memory.dmp
        Filesize

        200KB

      • memory/3924-1123-0x0000000005580000-0x0000000005590000-memory.dmp
        Filesize

        64KB

      • memory/3924-1124-0x0000000005580000-0x0000000005590000-memory.dmp
        Filesize

        64KB