Analysis

  • max time kernel
    100s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 00:48

General

  • Target

    setup.exe

  • Size

    700KB

  • MD5

    e18b0ecb25568db2735985ae4c47721f

  • SHA1

    4a2fe08c76c297549f410509e70032c53ed12fe4

  • SHA256

    5b00653edb699fbb7026653ee054c9654fa9046e266bdd645ea00c6b8200677d

  • SHA512

    5bc7eae30df3a67e8b24ac66f7516713920de9290d709293caadc0fbe570b26270e2890ad8ae829cbc5e360f6a9a16976e54023a8599d67cddda03a4a0b231aa

  • SSDEEP

    12288:+Mrdy90kSd9kvxDTNqY0Wx9D5ucAO78F30IE4qwm2Wr0vYS:7y6d9kvxDvAO78Vg4qwmBrs

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2880
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un545606.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un545606.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3618.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3618.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5116
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5116 -s 1084
          4⤵
          • Program crash
          PID:1840
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6477.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6477.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2504
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 1344
          4⤵
          • Program crash
          PID:2104
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si797101.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si797101.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4128
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 5116 -ip 5116
    1⤵
      PID:1164
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 2504 -ip 2504
      1⤵
        PID:4964

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si797101.exe
        Filesize

        175KB

        MD5

        d36127ea4e8847374c229a54906369a6

        SHA1

        66bcdce55dec2e2466d06d34398094f6eba60d32

        SHA256

        b39d7a0b636e6809664f69a203a3961feacd7005c1c468512c0daa318070630c

        SHA512

        b4dc77a2b557d2f933062d757d386e31a2ba85d257b3442514fd6d141c972b7ed796fcacaaaea1a9cdd005f7a697c5627f5049e319a8ee9e0ef36f6511762ab6

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si797101.exe
        Filesize

        175KB

        MD5

        d36127ea4e8847374c229a54906369a6

        SHA1

        66bcdce55dec2e2466d06d34398094f6eba60d32

        SHA256

        b39d7a0b636e6809664f69a203a3961feacd7005c1c468512c0daa318070630c

        SHA512

        b4dc77a2b557d2f933062d757d386e31a2ba85d257b3442514fd6d141c972b7ed796fcacaaaea1a9cdd005f7a697c5627f5049e319a8ee9e0ef36f6511762ab6

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un545606.exe
        Filesize

        558KB

        MD5

        137f1e20525d143d9e5004e733755f39

        SHA1

        9149e537078247a3d56536addcaac5ba3d2849ac

        SHA256

        67064aeea9abc680e2bc86362b7ca905ac4ec689b7c4de101a6cd47d34c22435

        SHA512

        7e75bed3619e3b1c459c331fed25a2e75aaf0539a807e0af5bda373de91721ae2403baa828f719ef5f22f0a64c2af6eaa5a1e6117dbf1f9399e0b9bfc06038d9

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un545606.exe
        Filesize

        558KB

        MD5

        137f1e20525d143d9e5004e733755f39

        SHA1

        9149e537078247a3d56536addcaac5ba3d2849ac

        SHA256

        67064aeea9abc680e2bc86362b7ca905ac4ec689b7c4de101a6cd47d34c22435

        SHA512

        7e75bed3619e3b1c459c331fed25a2e75aaf0539a807e0af5bda373de91721ae2403baa828f719ef5f22f0a64c2af6eaa5a1e6117dbf1f9399e0b9bfc06038d9

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3618.exe
        Filesize

        307KB

        MD5

        85bf386b31300bb9a141127aca863575

        SHA1

        f4ed8d8c99b11ec6f846555340fc0cc3156601ec

        SHA256

        ff3862c5b34b04e2efe2208109636e9b2db6a030c11e8c9bdc60ed6ff2663e30

        SHA512

        d4ddbdbf28f847ff31d3ce0711c46da11c5dece020dbafa2dbc99128c49fcb9fddcd7462a2f49d2df6662edf93884ee9c64c40595a1edbc696227d1daa3be189

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3618.exe
        Filesize

        307KB

        MD5

        85bf386b31300bb9a141127aca863575

        SHA1

        f4ed8d8c99b11ec6f846555340fc0cc3156601ec

        SHA256

        ff3862c5b34b04e2efe2208109636e9b2db6a030c11e8c9bdc60ed6ff2663e30

        SHA512

        d4ddbdbf28f847ff31d3ce0711c46da11c5dece020dbafa2dbc99128c49fcb9fddcd7462a2f49d2df6662edf93884ee9c64c40595a1edbc696227d1daa3be189

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6477.exe
        Filesize

        365KB

        MD5

        588eb11a9b46a2ede781e24a8cc443aa

        SHA1

        6d3d9a64f1e1bf103d68017e4a5c57ed28c2a263

        SHA256

        33a235b824f85869f7d6f384e1e5ebc0d8355243fbe3ef7136da252be4ccdd10

        SHA512

        95f79d1c18ab68c63b47447e0611eecb9567eca4400f2438c29ecc0f2fb2bee022e85713a01e6b4ba2b865a457f736af6b4543678436d8b7b2ecc86a176f9c0c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6477.exe
        Filesize

        365KB

        MD5

        588eb11a9b46a2ede781e24a8cc443aa

        SHA1

        6d3d9a64f1e1bf103d68017e4a5c57ed28c2a263

        SHA256

        33a235b824f85869f7d6f384e1e5ebc0d8355243fbe3ef7136da252be4ccdd10

        SHA512

        95f79d1c18ab68c63b47447e0611eecb9567eca4400f2438c29ecc0f2fb2bee022e85713a01e6b4ba2b865a457f736af6b4543678436d8b7b2ecc86a176f9c0c

      • memory/2504-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp
        Filesize

        1.0MB

      • memory/2504-1103-0x0000000004C50000-0x0000000004C60000-memory.dmp
        Filesize

        64KB

      • memory/2504-218-0x0000000004BC0000-0x0000000004BFF000-memory.dmp
        Filesize

        252KB

      • memory/2504-216-0x0000000004BC0000-0x0000000004BFF000-memory.dmp
        Filesize

        252KB

      • memory/2504-214-0x0000000004BC0000-0x0000000004BFF000-memory.dmp
        Filesize

        252KB

      • memory/2504-204-0x0000000004BC0000-0x0000000004BFF000-memory.dmp
        Filesize

        252KB

      • memory/2504-1116-0x0000000004C50000-0x0000000004C60000-memory.dmp
        Filesize

        64KB

      • memory/2504-1115-0x00000000070E0000-0x0000000007130000-memory.dmp
        Filesize

        320KB

      • memory/2504-1114-0x0000000007060000-0x00000000070D6000-memory.dmp
        Filesize

        472KB

      • memory/2504-1113-0x00000000068F0000-0x0000000006E1C000-memory.dmp
        Filesize

        5.2MB

      • memory/2504-1112-0x0000000006710000-0x00000000068D2000-memory.dmp
        Filesize

        1.8MB

      • memory/2504-1111-0x0000000004C50000-0x0000000004C60000-memory.dmp
        Filesize

        64KB

      • memory/2504-1109-0x0000000004C50000-0x0000000004C60000-memory.dmp
        Filesize

        64KB

      • memory/2504-206-0x0000000004BC0000-0x0000000004BFF000-memory.dmp
        Filesize

        252KB

      • memory/2504-1110-0x0000000004C50000-0x0000000004C60000-memory.dmp
        Filesize

        64KB

      • memory/2504-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp
        Filesize

        408KB

      • memory/2504-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp
        Filesize

        584KB

      • memory/2504-1105-0x0000000005C60000-0x0000000005C9C000-memory.dmp
        Filesize

        240KB

      • memory/2504-1104-0x0000000005C40000-0x0000000005C52000-memory.dmp
        Filesize

        72KB

      • memory/2504-220-0x0000000004BC0000-0x0000000004BFF000-memory.dmp
        Filesize

        252KB

      • memory/2504-1101-0x0000000005460000-0x0000000005A78000-memory.dmp
        Filesize

        6.1MB

      • memory/2504-228-0x0000000004BC0000-0x0000000004BFF000-memory.dmp
        Filesize

        252KB

      • memory/2504-226-0x0000000004BC0000-0x0000000004BFF000-memory.dmp
        Filesize

        252KB

      • memory/2504-191-0x00000000007F0000-0x000000000083B000-memory.dmp
        Filesize

        300KB

      • memory/2504-193-0x0000000004C50000-0x0000000004C60000-memory.dmp
        Filesize

        64KB

      • memory/2504-208-0x0000000004BC0000-0x0000000004BFF000-memory.dmp
        Filesize

        252KB

      • memory/2504-194-0x0000000004C50000-0x0000000004C60000-memory.dmp
        Filesize

        64KB

      • memory/2504-195-0x0000000004BC0000-0x0000000004BFF000-memory.dmp
        Filesize

        252KB

      • memory/2504-196-0x0000000004BC0000-0x0000000004BFF000-memory.dmp
        Filesize

        252KB

      • memory/2504-198-0x0000000004BC0000-0x0000000004BFF000-memory.dmp
        Filesize

        252KB

      • memory/2504-200-0x0000000004BC0000-0x0000000004BFF000-memory.dmp
        Filesize

        252KB

      • memory/2504-202-0x0000000004BC0000-0x0000000004BFF000-memory.dmp
        Filesize

        252KB

      • memory/2504-224-0x0000000004BC0000-0x0000000004BFF000-memory.dmp
        Filesize

        252KB

      • memory/2504-222-0x0000000004BC0000-0x0000000004BFF000-memory.dmp
        Filesize

        252KB

      • memory/2504-192-0x0000000004C50000-0x0000000004C60000-memory.dmp
        Filesize

        64KB

      • memory/2504-210-0x0000000004BC0000-0x0000000004BFF000-memory.dmp
        Filesize

        252KB

      • memory/2504-212-0x0000000004BC0000-0x0000000004BFF000-memory.dmp
        Filesize

        252KB

      • memory/4128-1122-0x0000000000740000-0x0000000000772000-memory.dmp
        Filesize

        200KB

      • memory/4128-1123-0x0000000005000000-0x0000000005010000-memory.dmp
        Filesize

        64KB

      • memory/4128-1124-0x0000000005000000-0x0000000005010000-memory.dmp
        Filesize

        64KB

      • memory/5116-183-0x0000000005080000-0x0000000005090000-memory.dmp
        Filesize

        64KB

      • memory/5116-176-0x0000000002650000-0x0000000002662000-memory.dmp
        Filesize

        72KB

      • memory/5116-160-0x0000000002650000-0x0000000002662000-memory.dmp
        Filesize

        72KB

      • memory/5116-151-0x0000000005080000-0x0000000005090000-memory.dmp
        Filesize

        64KB

      • memory/5116-152-0x0000000005080000-0x0000000005090000-memory.dmp
        Filesize

        64KB

      • memory/5116-186-0x0000000000400000-0x000000000070F000-memory.dmp
        Filesize

        3.1MB

      • memory/5116-148-0x0000000000710000-0x000000000073D000-memory.dmp
        Filesize

        180KB

      • memory/5116-184-0x0000000005080000-0x0000000005090000-memory.dmp
        Filesize

        64KB

      • memory/5116-182-0x0000000005080000-0x0000000005090000-memory.dmp
        Filesize

        64KB

      • memory/5116-153-0x0000000002650000-0x0000000002662000-memory.dmp
        Filesize

        72KB

      • memory/5116-181-0x0000000000400000-0x000000000070F000-memory.dmp
        Filesize

        3.1MB

      • memory/5116-180-0x0000000002650000-0x0000000002662000-memory.dmp
        Filesize

        72KB

      • memory/5116-178-0x0000000002650000-0x0000000002662000-memory.dmp
        Filesize

        72KB

      • memory/5116-174-0x0000000002650000-0x0000000002662000-memory.dmp
        Filesize

        72KB

      • memory/5116-170-0x0000000002650000-0x0000000002662000-memory.dmp
        Filesize

        72KB

      • memory/5116-172-0x0000000002650000-0x0000000002662000-memory.dmp
        Filesize

        72KB

      • memory/5116-168-0x0000000002650000-0x0000000002662000-memory.dmp
        Filesize

        72KB

      • memory/5116-166-0x0000000002650000-0x0000000002662000-memory.dmp
        Filesize

        72KB

      • memory/5116-164-0x0000000002650000-0x0000000002662000-memory.dmp
        Filesize

        72KB

      • memory/5116-162-0x0000000002650000-0x0000000002662000-memory.dmp
        Filesize

        72KB

      • memory/5116-150-0x0000000005080000-0x0000000005090000-memory.dmp
        Filesize

        64KB

      • memory/5116-149-0x0000000005090000-0x0000000005634000-memory.dmp
        Filesize

        5.6MB

      • memory/5116-158-0x0000000002650000-0x0000000002662000-memory.dmp
        Filesize

        72KB

      • memory/5116-156-0x0000000002650000-0x0000000002662000-memory.dmp
        Filesize

        72KB

      • memory/5116-154-0x0000000002650000-0x0000000002662000-memory.dmp
        Filesize

        72KB