Analysis

  • max time kernel
    90s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 00:44

General

  • Target

    setup.exe

  • Size

    699KB

  • MD5

    2e0e67b8108122f6c5b00782834344b0

  • SHA1

    435299663a47865a5bc01689fe2d825e9c9fed59

  • SHA256

    6744c366c926fa0f2986ca76c97fb92118be732df58f7f357c21755d7420590e

  • SHA512

    cfb17cfd93304b553c98fd1c9149c511623cec6f3f39ae9ca958ee2db7016b939e4739b6db0a7f446060a8b6f4bcd65daaa863050fc4289b7277169ff20d8527

  • SSDEEP

    12288:yMrEy90Mm74mI2VC6jmmUhapVDGuNbhuyPKwN6I/fj79b8n8JT:Gy+8mzVxqdhapXuyPRt/fH9b8n8N

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:880
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un241922.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un241922.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4016
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8229.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8229.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1568
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1568 -s 1084
          4⤵
          • Program crash
          PID:4904
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9637.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9637.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1384
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1384 -s 1336
          4⤵
          • Program crash
          PID:3564
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si083305.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si083305.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1500
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1568 -ip 1568
    1⤵
      PID:4408
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 1384 -ip 1384
      1⤵
        PID:1348

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si083305.exe

        Filesize

        175KB

        MD5

        be0af2a7a8d178d67fd0db5b74a4b3c0

        SHA1

        931fbb418f73811022c0a5c906e15fecebf685da

        SHA256

        de1684ec0a1f661fd47c4b9c6b9dff869a45a22f8a1fd9802fc142360231aabf

        SHA512

        3039cdb9cf6ca4cfabf6a7f2f74e8bc2812fb043a6c31a5ef6dabbcbdb7409b13cb8b10dd09334d0129ec0d55671d57048ad6c72c5d38dfbe2e3ddb1329784dd

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si083305.exe

        Filesize

        175KB

        MD5

        be0af2a7a8d178d67fd0db5b74a4b3c0

        SHA1

        931fbb418f73811022c0a5c906e15fecebf685da

        SHA256

        de1684ec0a1f661fd47c4b9c6b9dff869a45a22f8a1fd9802fc142360231aabf

        SHA512

        3039cdb9cf6ca4cfabf6a7f2f74e8bc2812fb043a6c31a5ef6dabbcbdb7409b13cb8b10dd09334d0129ec0d55671d57048ad6c72c5d38dfbe2e3ddb1329784dd

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un241922.exe

        Filesize

        557KB

        MD5

        b898e5ece1e6b425b843554a16cbbff5

        SHA1

        7c58cee83c757ffed40bcc568618799eaa3dc4a7

        SHA256

        885ed1b15f850cca6f0dc4d1f91392f1ab684d9f6665a12acc0af94e4948bb08

        SHA512

        cd374164fa3d4eadad199b0a32d9a9446e211c9c10d7f72c401f0c99865ae0335fe4dd7529fcc767d66aa46404604de0bf8b78e8f2bf45f4163ae3e017880503

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un241922.exe

        Filesize

        557KB

        MD5

        b898e5ece1e6b425b843554a16cbbff5

        SHA1

        7c58cee83c757ffed40bcc568618799eaa3dc4a7

        SHA256

        885ed1b15f850cca6f0dc4d1f91392f1ab684d9f6665a12acc0af94e4948bb08

        SHA512

        cd374164fa3d4eadad199b0a32d9a9446e211c9c10d7f72c401f0c99865ae0335fe4dd7529fcc767d66aa46404604de0bf8b78e8f2bf45f4163ae3e017880503

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8229.exe

        Filesize

        307KB

        MD5

        f0dbbfc52f25179dfa9e04de0f485603

        SHA1

        e1aa7209f17112d35453752264742ac54222ede6

        SHA256

        11ceab1fe88d126c09efb7c18ac1cb6eab1a543043db5ba477815b80eeb9a72b

        SHA512

        ebf151d38f011a3719d613cde788b57a0711a1f3ae7be1efcb968fd152262b5c658ea4d9a0e0b4fdeb8fdaefe02b3e2c2009ad73f7ae50f9c347efcff2d38626

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8229.exe

        Filesize

        307KB

        MD5

        f0dbbfc52f25179dfa9e04de0f485603

        SHA1

        e1aa7209f17112d35453752264742ac54222ede6

        SHA256

        11ceab1fe88d126c09efb7c18ac1cb6eab1a543043db5ba477815b80eeb9a72b

        SHA512

        ebf151d38f011a3719d613cde788b57a0711a1f3ae7be1efcb968fd152262b5c658ea4d9a0e0b4fdeb8fdaefe02b3e2c2009ad73f7ae50f9c347efcff2d38626

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9637.exe

        Filesize

        365KB

        MD5

        9c857b1bebfe5df4ea6bbf11d3b1ab19

        SHA1

        920952a370636bbb930f927df61ecaa7dc8638ab

        SHA256

        30b66c9c440eb76ffac17e4b8de9bd814393889ccc0d576466a9050373d7f4ba

        SHA512

        e82585eb610095043f0feb178e58afa02f0e7edaad1f5c23d54026eac10f84daede7060d014cd6ccc7bec3ec17635fe1a5d973c80cb950ebab529d7eda45fe51

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9637.exe

        Filesize

        365KB

        MD5

        9c857b1bebfe5df4ea6bbf11d3b1ab19

        SHA1

        920952a370636bbb930f927df61ecaa7dc8638ab

        SHA256

        30b66c9c440eb76ffac17e4b8de9bd814393889ccc0d576466a9050373d7f4ba

        SHA512

        e82585eb610095043f0feb178e58afa02f0e7edaad1f5c23d54026eac10f84daede7060d014cd6ccc7bec3ec17635fe1a5d973c80cb950ebab529d7eda45fe51

      • memory/1384-1103-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/1384-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/1384-226-0x0000000004DF0000-0x0000000004E00000-memory.dmp

        Filesize

        64KB

      • memory/1384-222-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1384-206-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1384-208-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1384-1116-0x0000000004DF0000-0x0000000004E00000-memory.dmp

        Filesize

        64KB

      • memory/1384-1115-0x0000000006AD0000-0x0000000006FFC000-memory.dmp

        Filesize

        5.2MB

      • memory/1384-1114-0x0000000006900000-0x0000000006AC2000-memory.dmp

        Filesize

        1.8MB

      • memory/1384-1113-0x0000000006880000-0x00000000068D0000-memory.dmp

        Filesize

        320KB

      • memory/1384-210-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1384-1112-0x00000000067F0000-0x0000000006866000-memory.dmp

        Filesize

        472KB

      • memory/1384-1111-0x0000000004DF0000-0x0000000004E00000-memory.dmp

        Filesize

        64KB

      • memory/1384-1110-0x0000000004DF0000-0x0000000004E00000-memory.dmp

        Filesize

        64KB

      • memory/1384-1109-0x0000000004DF0000-0x0000000004E00000-memory.dmp

        Filesize

        64KB

      • memory/1384-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/1384-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/1384-1105-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/1384-1104-0x0000000004DF0000-0x0000000004E00000-memory.dmp

        Filesize

        64KB

      • memory/1384-224-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1384-1101-0x00000000054B0000-0x0000000005AC8000-memory.dmp

        Filesize

        6.1MB

      • memory/1384-231-0x0000000004DF0000-0x0000000004E00000-memory.dmp

        Filesize

        64KB

      • memory/1384-191-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1384-192-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1384-194-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1384-196-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1384-198-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1384-200-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1384-202-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1384-204-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1384-220-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1384-225-0x0000000000890000-0x00000000008DB000-memory.dmp

        Filesize

        300KB

      • memory/1384-229-0x0000000004DF0000-0x0000000004E00000-memory.dmp

        Filesize

        64KB

      • memory/1384-212-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1384-214-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1384-216-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1384-218-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

        Filesize

        252KB

      • memory/1500-1122-0x0000000000C50000-0x0000000000C82000-memory.dmp

        Filesize

        200KB

      • memory/1500-1123-0x0000000005570000-0x0000000005580000-memory.dmp

        Filesize

        64KB

      • memory/1500-1124-0x0000000005570000-0x0000000005580000-memory.dmp

        Filesize

        64KB

      • memory/1568-182-0x0000000004E60000-0x0000000004E70000-memory.dmp

        Filesize

        64KB

      • memory/1568-172-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1568-151-0x0000000004E60000-0x0000000004E70000-memory.dmp

        Filesize

        64KB

      • memory/1568-152-0x0000000004E60000-0x0000000004E70000-memory.dmp

        Filesize

        64KB

      • memory/1568-153-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1568-186-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/1568-150-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/1568-184-0x0000000004E60000-0x0000000004E70000-memory.dmp

        Filesize

        64KB

      • memory/1568-183-0x0000000004E60000-0x0000000004E70000-memory.dmp

        Filesize

        64KB

      • memory/1568-154-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1568-181-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/1568-180-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1568-178-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1568-176-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1568-174-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1568-170-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1568-168-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1568-166-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1568-164-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1568-162-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1568-149-0x0000000004E70000-0x0000000005414000-memory.dmp

        Filesize

        5.6MB

      • memory/1568-160-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1568-158-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1568-156-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB