Analysis

  • max time kernel
    97s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 00:46

General

  • Target

    setup.exe

  • Size

    700KB

  • MD5

    390353878989c08b4e68406572f0914f

  • SHA1

    81bb75c476a38bc191ed62b86b015d8bec10142e

  • SHA256

    3678c2431759493f25d1aa32afc11dc95173ac4ce1bb5092c365b670a2c61209

  • SHA512

    5d51c5f8830e0a497f1a77d862af183fa9b0fec4c2c5609e176f5c739152c4d6cb414f692aad7e34093d6122fdc12ac64b8d258fd147f13ace39e9126ebc0796

  • SSDEEP

    12288:KMrNy909uoPmynsWYKHjfajnDcvYRW3XpjJappxyGWt7lik8xgK:/ywPlnVYKzajnAYRIX9J2WbikTK

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5040
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un370785.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un370785.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2880
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9315.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9315.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1304
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1304 -s 1084
          4⤵
          • Program crash
          PID:3316
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1034.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1034.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4424
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 1592
          4⤵
          • Program crash
          PID:808
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si956069.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si956069.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4644
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1304 -ip 1304
    1⤵
      PID:3332
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4424 -ip 4424
      1⤵
        PID:3416

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si956069.exe
        Filesize

        175KB

        MD5

        ee65757289bd7d2d1000ed01503a2fec

        SHA1

        bf5e7c4f24d51b8acc1def0398c2f6ec5d5fe279

        SHA256

        e7574d230e8f64ec619b59b1ce76692ffb28d570c67f9bb2ec7a9696394838bb

        SHA512

        ee799aab795d08f8f9d89265e914e6248df6f8558936e86e6e4f8c425daf55e23395e602bbfc02ceb5eecfeff69b529bcce8bbd6035b51604bfc256a922f9d80

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si956069.exe
        Filesize

        175KB

        MD5

        ee65757289bd7d2d1000ed01503a2fec

        SHA1

        bf5e7c4f24d51b8acc1def0398c2f6ec5d5fe279

        SHA256

        e7574d230e8f64ec619b59b1ce76692ffb28d570c67f9bb2ec7a9696394838bb

        SHA512

        ee799aab795d08f8f9d89265e914e6248df6f8558936e86e6e4f8c425daf55e23395e602bbfc02ceb5eecfeff69b529bcce8bbd6035b51604bfc256a922f9d80

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un370785.exe
        Filesize

        558KB

        MD5

        efb83e5ddb6d897eeacdba07bb102103

        SHA1

        a8502b9a4b890c99e0110afd4cb75d43bad474e5

        SHA256

        ecccdb601c6b2e1fa6fd853528fe1fb8783e5c8b87b91a95c67246f8c66dc327

        SHA512

        e91e488e659abfe2fa92b8dcb8b7d8a9967386f11e8bffa5dee7c3a0888a28b2538c5d9edfd0fcc01d82d36b1782099fe291245578053b234732aad7aac9921e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un370785.exe
        Filesize

        558KB

        MD5

        efb83e5ddb6d897eeacdba07bb102103

        SHA1

        a8502b9a4b890c99e0110afd4cb75d43bad474e5

        SHA256

        ecccdb601c6b2e1fa6fd853528fe1fb8783e5c8b87b91a95c67246f8c66dc327

        SHA512

        e91e488e659abfe2fa92b8dcb8b7d8a9967386f11e8bffa5dee7c3a0888a28b2538c5d9edfd0fcc01d82d36b1782099fe291245578053b234732aad7aac9921e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9315.exe
        Filesize

        307KB

        MD5

        464a0acd4058920dcc9e052838fa0ccd

        SHA1

        ca1418fd02965b6e50dfdd4d61b734a3e92afe25

        SHA256

        659083cdcd275e8136eb03769c71c6d823cde3ffb56623ef75e7d561fbf6b2ce

        SHA512

        31fbb97d75d11626fc281b3d2278ca920883502dd49218b7db00b6d4b136adb224d0c24436471861635b37014fdb6cc54a309e3ba43a0d9f58849abb409453dc

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9315.exe
        Filesize

        307KB

        MD5

        464a0acd4058920dcc9e052838fa0ccd

        SHA1

        ca1418fd02965b6e50dfdd4d61b734a3e92afe25

        SHA256

        659083cdcd275e8136eb03769c71c6d823cde3ffb56623ef75e7d561fbf6b2ce

        SHA512

        31fbb97d75d11626fc281b3d2278ca920883502dd49218b7db00b6d4b136adb224d0c24436471861635b37014fdb6cc54a309e3ba43a0d9f58849abb409453dc

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1034.exe
        Filesize

        365KB

        MD5

        c6b751e8142ca2963e629efb2ca736ae

        SHA1

        4ca988ddfd8f28c9d154f6361f45cb41e52d9a67

        SHA256

        4f61d8a0dc06b010e5a2d2531a055d9e40eec233b48e8ae82bfda9e62c112d10

        SHA512

        7047bdf2961a4cb11c629f72519be66dcdf72d267b009365ce45bb3581ea2aa1be821400ff2213e6da97035558413fb05e95176c9cab34995356cf1cddff8770

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1034.exe
        Filesize

        365KB

        MD5

        c6b751e8142ca2963e629efb2ca736ae

        SHA1

        4ca988ddfd8f28c9d154f6361f45cb41e52d9a67

        SHA256

        4f61d8a0dc06b010e5a2d2531a055d9e40eec233b48e8ae82bfda9e62c112d10

        SHA512

        7047bdf2961a4cb11c629f72519be66dcdf72d267b009365ce45bb3581ea2aa1be821400ff2213e6da97035558413fb05e95176c9cab34995356cf1cddff8770

      • memory/1304-148-0x0000000004E50000-0x00000000053F4000-memory.dmp
        Filesize

        5.6MB

      • memory/1304-149-0x0000000000740000-0x000000000076D000-memory.dmp
        Filesize

        180KB

      • memory/1304-150-0x0000000004E40000-0x0000000004E50000-memory.dmp
        Filesize

        64KB

      • memory/1304-151-0x0000000004E40000-0x0000000004E50000-memory.dmp
        Filesize

        64KB

      • memory/1304-152-0x0000000004E40000-0x0000000004E50000-memory.dmp
        Filesize

        64KB

      • memory/1304-154-0x0000000002510000-0x0000000002522000-memory.dmp
        Filesize

        72KB

      • memory/1304-153-0x0000000002510000-0x0000000002522000-memory.dmp
        Filesize

        72KB

      • memory/1304-158-0x0000000002510000-0x0000000002522000-memory.dmp
        Filesize

        72KB

      • memory/1304-156-0x0000000002510000-0x0000000002522000-memory.dmp
        Filesize

        72KB

      • memory/1304-160-0x0000000002510000-0x0000000002522000-memory.dmp
        Filesize

        72KB

      • memory/1304-162-0x0000000002510000-0x0000000002522000-memory.dmp
        Filesize

        72KB

      • memory/1304-164-0x0000000002510000-0x0000000002522000-memory.dmp
        Filesize

        72KB

      • memory/1304-166-0x0000000002510000-0x0000000002522000-memory.dmp
        Filesize

        72KB

      • memory/1304-168-0x0000000002510000-0x0000000002522000-memory.dmp
        Filesize

        72KB

      • memory/1304-170-0x0000000002510000-0x0000000002522000-memory.dmp
        Filesize

        72KB

      • memory/1304-172-0x0000000002510000-0x0000000002522000-memory.dmp
        Filesize

        72KB

      • memory/1304-174-0x0000000002510000-0x0000000002522000-memory.dmp
        Filesize

        72KB

      • memory/1304-176-0x0000000002510000-0x0000000002522000-memory.dmp
        Filesize

        72KB

      • memory/1304-178-0x0000000002510000-0x0000000002522000-memory.dmp
        Filesize

        72KB

      • memory/1304-180-0x0000000002510000-0x0000000002522000-memory.dmp
        Filesize

        72KB

      • memory/1304-181-0x0000000000400000-0x000000000070F000-memory.dmp
        Filesize

        3.1MB

      • memory/1304-182-0x0000000004E40000-0x0000000004E50000-memory.dmp
        Filesize

        64KB

      • memory/1304-183-0x0000000004E40000-0x0000000004E50000-memory.dmp
        Filesize

        64KB

      • memory/1304-184-0x0000000004E40000-0x0000000004E50000-memory.dmp
        Filesize

        64KB

      • memory/1304-186-0x0000000000400000-0x000000000070F000-memory.dmp
        Filesize

        3.1MB

      • memory/4424-191-0x00000000028B0000-0x00000000028EF000-memory.dmp
        Filesize

        252KB

      • memory/4424-192-0x00000000028B0000-0x00000000028EF000-memory.dmp
        Filesize

        252KB

      • memory/4424-194-0x00000000028B0000-0x00000000028EF000-memory.dmp
        Filesize

        252KB

      • memory/4424-196-0x00000000028B0000-0x00000000028EF000-memory.dmp
        Filesize

        252KB

      • memory/4424-198-0x00000000028B0000-0x00000000028EF000-memory.dmp
        Filesize

        252KB

      • memory/4424-200-0x00000000028B0000-0x00000000028EF000-memory.dmp
        Filesize

        252KB

      • memory/4424-202-0x00000000028B0000-0x00000000028EF000-memory.dmp
        Filesize

        252KB

      • memory/4424-204-0x00000000028B0000-0x00000000028EF000-memory.dmp
        Filesize

        252KB

      • memory/4424-206-0x00000000028B0000-0x00000000028EF000-memory.dmp
        Filesize

        252KB

      • memory/4424-208-0x00000000028B0000-0x00000000028EF000-memory.dmp
        Filesize

        252KB

      • memory/4424-210-0x00000000028B0000-0x00000000028EF000-memory.dmp
        Filesize

        252KB

      • memory/4424-212-0x00000000028B0000-0x00000000028EF000-memory.dmp
        Filesize

        252KB

      • memory/4424-214-0x00000000028B0000-0x00000000028EF000-memory.dmp
        Filesize

        252KB

      • memory/4424-216-0x00000000028B0000-0x00000000028EF000-memory.dmp
        Filesize

        252KB

      • memory/4424-218-0x00000000028B0000-0x00000000028EF000-memory.dmp
        Filesize

        252KB

      • memory/4424-220-0x00000000028B0000-0x00000000028EF000-memory.dmp
        Filesize

        252KB

      • memory/4424-222-0x00000000028B0000-0x00000000028EF000-memory.dmp
        Filesize

        252KB

      • memory/4424-224-0x00000000028B0000-0x00000000028EF000-memory.dmp
        Filesize

        252KB

      • memory/4424-394-0x0000000000830000-0x000000000087B000-memory.dmp
        Filesize

        300KB

      • memory/4424-395-0x0000000004F40000-0x0000000004F50000-memory.dmp
        Filesize

        64KB

      • memory/4424-400-0x0000000004F40000-0x0000000004F50000-memory.dmp
        Filesize

        64KB

      • memory/4424-397-0x0000000004F40000-0x0000000004F50000-memory.dmp
        Filesize

        64KB

      • memory/4424-1101-0x0000000005500000-0x0000000005B18000-memory.dmp
        Filesize

        6.1MB

      • memory/4424-1102-0x0000000005B20000-0x0000000005C2A000-memory.dmp
        Filesize

        1.0MB

      • memory/4424-1103-0x0000000005C40000-0x0000000005C52000-memory.dmp
        Filesize

        72KB

      • memory/4424-1104-0x0000000004F40000-0x0000000004F50000-memory.dmp
        Filesize

        64KB

      • memory/4424-1105-0x0000000005C60000-0x0000000005C9C000-memory.dmp
        Filesize

        240KB

      • memory/4424-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp
        Filesize

        584KB

      • memory/4424-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp
        Filesize

        408KB

      • memory/4424-1109-0x0000000006810000-0x00000000069D2000-memory.dmp
        Filesize

        1.8MB

      • memory/4424-1110-0x00000000069F0000-0x0000000006F1C000-memory.dmp
        Filesize

        5.2MB

      • memory/4424-1111-0x0000000004F40000-0x0000000004F50000-memory.dmp
        Filesize

        64KB

      • memory/4424-1112-0x0000000004F40000-0x0000000004F50000-memory.dmp
        Filesize

        64KB

      • memory/4424-1113-0x0000000007040000-0x00000000070B6000-memory.dmp
        Filesize

        472KB

      • memory/4424-1114-0x00000000070E0000-0x0000000007130000-memory.dmp
        Filesize

        320KB

      • memory/4424-1115-0x0000000004F40000-0x0000000004F50000-memory.dmp
        Filesize

        64KB

      • memory/4644-1121-0x00000000005B0000-0x00000000005E2000-memory.dmp
        Filesize

        200KB

      • memory/4644-1122-0x0000000004E30000-0x0000000004E40000-memory.dmp
        Filesize

        64KB