Analysis

  • max time kernel
    102s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 00:51

General

  • Target

    setup.exe

  • Size

    700KB

  • MD5

    560438562e86acf69f02aeda2086968b

  • SHA1

    96d0dc3fd4d18e54f933109d75ac5807caa1cc77

  • SHA256

    8b539d02f4658dc80f89a69e2b355796f48d8d68b6174dff551b4ff29277523c

  • SHA512

    0e9047c7ca34da83dde4394846a060988af4c412e3025177775ad3deb5d95cae38a25d3cdbdadc3cc58c083855b87d427670edea6441ffb3bc75c70a6369674a

  • SSDEEP

    12288:WMrTy900GpXQD7JDgatv9DGIcA6GNPqO+0/XOAnDOju60hO0xfg:1yBHDVzX6wqE/XO4DOCzg

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:968
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un253705.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un253705.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5627.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5627.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:224
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 224 -s 1084
          4⤵
          • Program crash
          PID:1980
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8658.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8658.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1144
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1144 -s 1536
          4⤵
          • Program crash
          PID:1040
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si931348.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si931348.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:232
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 224 -ip 224
    1⤵
      PID:3800
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1144 -ip 1144
      1⤵
        PID:4908

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si931348.exe
        Filesize

        175KB

        MD5

        fa52d4790dd6c0b52d36161f70fe2152

        SHA1

        c723449883ff847e69b9e00e90d1dd1994c439a8

        SHA256

        4ce830cc27fba5272cbc66d90bb3018f6cbd911cf67edd9265861ff350cb09a2

        SHA512

        fc1636686c34f281b2ab7842cad8ec72519f464657084db6984c7542c26392c6919c6e36afca1c75baf3bad198583c7c9498012183cb026c6b4ac2119f0d044f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si931348.exe
        Filesize

        175KB

        MD5

        fa52d4790dd6c0b52d36161f70fe2152

        SHA1

        c723449883ff847e69b9e00e90d1dd1994c439a8

        SHA256

        4ce830cc27fba5272cbc66d90bb3018f6cbd911cf67edd9265861ff350cb09a2

        SHA512

        fc1636686c34f281b2ab7842cad8ec72519f464657084db6984c7542c26392c6919c6e36afca1c75baf3bad198583c7c9498012183cb026c6b4ac2119f0d044f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un253705.exe
        Filesize

        558KB

        MD5

        f714a682a4e5f9c53e6c2b3d7a3b978e

        SHA1

        1e5932682cd957a590b9316796f51745a077e8f9

        SHA256

        3d645c61609658bf1532f4c11e6a0448b30248ca542834971c30ee086ceb918d

        SHA512

        960ea3325cf75abc2b2847de22d347a500912b73d2dd112b7a382fb9c56e4ec4c5bd39340c0352002d95bb7149da4246b46926265ad768613fec4e6fe459581d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un253705.exe
        Filesize

        558KB

        MD5

        f714a682a4e5f9c53e6c2b3d7a3b978e

        SHA1

        1e5932682cd957a590b9316796f51745a077e8f9

        SHA256

        3d645c61609658bf1532f4c11e6a0448b30248ca542834971c30ee086ceb918d

        SHA512

        960ea3325cf75abc2b2847de22d347a500912b73d2dd112b7a382fb9c56e4ec4c5bd39340c0352002d95bb7149da4246b46926265ad768613fec4e6fe459581d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5627.exe
        Filesize

        307KB

        MD5

        f18c6b8db70568744924d51ae2849a71

        SHA1

        df11b10e0c96fe98703d78b607b8019fbb06a8af

        SHA256

        7022bc7431c6a6eab8f3ddfba314f0a796806f19deeda1b1c4b690e6bd750b3d

        SHA512

        0679bbab7a1104d75f0fa9685a8f9f66425858879955486dbf48cee76e14898ce2870099f1fa077df4d734cf07a4a859e5120805615c005693d7ccfb939df7d9

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5627.exe
        Filesize

        307KB

        MD5

        f18c6b8db70568744924d51ae2849a71

        SHA1

        df11b10e0c96fe98703d78b607b8019fbb06a8af

        SHA256

        7022bc7431c6a6eab8f3ddfba314f0a796806f19deeda1b1c4b690e6bd750b3d

        SHA512

        0679bbab7a1104d75f0fa9685a8f9f66425858879955486dbf48cee76e14898ce2870099f1fa077df4d734cf07a4a859e5120805615c005693d7ccfb939df7d9

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8658.exe
        Filesize

        365KB

        MD5

        3d9d6a5b41346391155be7d69dccb5a5

        SHA1

        c4a888e11cca99e4877b9579a295a9476a7be4db

        SHA256

        713bbe23141f6d05c44ad3c41d5586c5e8ae2d112386e687bef5cd277019fa65

        SHA512

        a184b5404c1b5e949005379f66ed074eb446ab671bc59191e548c0821080a7fc1c8b90573fea99d1f93fb86cb803a1cf6d4756fbcc66bc66a3785c9e322ddc99

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8658.exe
        Filesize

        365KB

        MD5

        3d9d6a5b41346391155be7d69dccb5a5

        SHA1

        c4a888e11cca99e4877b9579a295a9476a7be4db

        SHA256

        713bbe23141f6d05c44ad3c41d5586c5e8ae2d112386e687bef5cd277019fa65

        SHA512

        a184b5404c1b5e949005379f66ed074eb446ab671bc59191e548c0821080a7fc1c8b90573fea99d1f93fb86cb803a1cf6d4756fbcc66bc66a3785c9e322ddc99

      • memory/224-148-0x0000000000710000-0x000000000073D000-memory.dmp
        Filesize

        180KB

      • memory/224-149-0x0000000004D20000-0x00000000052C4000-memory.dmp
        Filesize

        5.6MB

      • memory/224-150-0x00000000024F0000-0x0000000002502000-memory.dmp
        Filesize

        72KB

      • memory/224-151-0x00000000024F0000-0x0000000002502000-memory.dmp
        Filesize

        72KB

      • memory/224-153-0x00000000024F0000-0x0000000002502000-memory.dmp
        Filesize

        72KB

      • memory/224-155-0x00000000024F0000-0x0000000002502000-memory.dmp
        Filesize

        72KB

      • memory/224-157-0x00000000024F0000-0x0000000002502000-memory.dmp
        Filesize

        72KB

      • memory/224-159-0x00000000024F0000-0x0000000002502000-memory.dmp
        Filesize

        72KB

      • memory/224-161-0x00000000024F0000-0x0000000002502000-memory.dmp
        Filesize

        72KB

      • memory/224-163-0x00000000024F0000-0x0000000002502000-memory.dmp
        Filesize

        72KB

      • memory/224-165-0x00000000024F0000-0x0000000002502000-memory.dmp
        Filesize

        72KB

      • memory/224-167-0x00000000024F0000-0x0000000002502000-memory.dmp
        Filesize

        72KB

      • memory/224-169-0x00000000024F0000-0x0000000002502000-memory.dmp
        Filesize

        72KB

      • memory/224-170-0x0000000004D10000-0x0000000004D20000-memory.dmp
        Filesize

        64KB

      • memory/224-173-0x00000000024F0000-0x0000000002502000-memory.dmp
        Filesize

        72KB

      • memory/224-174-0x0000000004D10000-0x0000000004D20000-memory.dmp
        Filesize

        64KB

      • memory/224-171-0x0000000004D10000-0x0000000004D20000-memory.dmp
        Filesize

        64KB

      • memory/224-176-0x00000000024F0000-0x0000000002502000-memory.dmp
        Filesize

        72KB

      • memory/224-178-0x00000000024F0000-0x0000000002502000-memory.dmp
        Filesize

        72KB

      • memory/224-180-0x00000000024F0000-0x0000000002502000-memory.dmp
        Filesize

        72KB

      • memory/224-181-0x0000000000400000-0x000000000070F000-memory.dmp
        Filesize

        3.1MB

      • memory/224-183-0x0000000004D10000-0x0000000004D20000-memory.dmp
        Filesize

        64KB

      • memory/224-184-0x0000000004D10000-0x0000000004D20000-memory.dmp
        Filesize

        64KB

      • memory/224-185-0x0000000004D10000-0x0000000004D20000-memory.dmp
        Filesize

        64KB

      • memory/224-186-0x0000000000400000-0x000000000070F000-memory.dmp
        Filesize

        3.1MB

      • memory/232-1122-0x0000000000800000-0x0000000000832000-memory.dmp
        Filesize

        200KB

      • memory/232-1123-0x0000000005420000-0x0000000005430000-memory.dmp
        Filesize

        64KB

      • memory/1144-192-0x0000000002770000-0x00000000027AF000-memory.dmp
        Filesize

        252KB

      • memory/1144-261-0x0000000004EB0000-0x0000000004EC0000-memory.dmp
        Filesize

        64KB

      • memory/1144-196-0x0000000002770000-0x00000000027AF000-memory.dmp
        Filesize

        252KB

      • memory/1144-198-0x0000000002770000-0x00000000027AF000-memory.dmp
        Filesize

        252KB

      • memory/1144-200-0x0000000002770000-0x00000000027AF000-memory.dmp
        Filesize

        252KB

      • memory/1144-202-0x0000000002770000-0x00000000027AF000-memory.dmp
        Filesize

        252KB

      • memory/1144-204-0x0000000002770000-0x00000000027AF000-memory.dmp
        Filesize

        252KB

      • memory/1144-206-0x0000000002770000-0x00000000027AF000-memory.dmp
        Filesize

        252KB

      • memory/1144-208-0x0000000002770000-0x00000000027AF000-memory.dmp
        Filesize

        252KB

      • memory/1144-210-0x0000000002770000-0x00000000027AF000-memory.dmp
        Filesize

        252KB

      • memory/1144-212-0x0000000002770000-0x00000000027AF000-memory.dmp
        Filesize

        252KB

      • memory/1144-214-0x0000000002770000-0x00000000027AF000-memory.dmp
        Filesize

        252KB

      • memory/1144-216-0x0000000002770000-0x00000000027AF000-memory.dmp
        Filesize

        252KB

      • memory/1144-218-0x0000000002770000-0x00000000027AF000-memory.dmp
        Filesize

        252KB

      • memory/1144-220-0x0000000002770000-0x00000000027AF000-memory.dmp
        Filesize

        252KB

      • memory/1144-222-0x0000000002770000-0x00000000027AF000-memory.dmp
        Filesize

        252KB

      • memory/1144-224-0x0000000002770000-0x00000000027AF000-memory.dmp
        Filesize

        252KB

      • memory/1144-257-0x00000000007F0000-0x000000000083B000-memory.dmp
        Filesize

        300KB

      • memory/1144-258-0x0000000004EB0000-0x0000000004EC0000-memory.dmp
        Filesize

        64KB

      • memory/1144-194-0x0000000002770000-0x00000000027AF000-memory.dmp
        Filesize

        252KB

      • memory/1144-263-0x0000000004EB0000-0x0000000004EC0000-memory.dmp
        Filesize

        64KB

      • memory/1144-1101-0x0000000005470000-0x0000000005A88000-memory.dmp
        Filesize

        6.1MB

      • memory/1144-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp
        Filesize

        1.0MB

      • memory/1144-1103-0x0000000004EB0000-0x0000000004EC0000-memory.dmp
        Filesize

        64KB

      • memory/1144-1104-0x0000000005C40000-0x0000000005C52000-memory.dmp
        Filesize

        72KB

      • memory/1144-1105-0x0000000005C60000-0x0000000005C9C000-memory.dmp
        Filesize

        240KB

      • memory/1144-1106-0x0000000005F50000-0x0000000005FB6000-memory.dmp
        Filesize

        408KB

      • memory/1144-1107-0x0000000006610000-0x00000000066A2000-memory.dmp
        Filesize

        584KB

      • memory/1144-1109-0x0000000006710000-0x00000000068D2000-memory.dmp
        Filesize

        1.8MB

      • memory/1144-1110-0x00000000068E0000-0x0000000006E0C000-memory.dmp
        Filesize

        5.2MB

      • memory/1144-1111-0x0000000004EB0000-0x0000000004EC0000-memory.dmp
        Filesize

        64KB

      • memory/1144-1112-0x0000000004EB0000-0x0000000004EC0000-memory.dmp
        Filesize

        64KB

      • memory/1144-1113-0x0000000004EB0000-0x0000000004EC0000-memory.dmp
        Filesize

        64KB

      • memory/1144-191-0x0000000002770000-0x00000000027AF000-memory.dmp
        Filesize

        252KB

      • memory/1144-1114-0x0000000004EB0000-0x0000000004EC0000-memory.dmp
        Filesize

        64KB

      • memory/1144-1115-0x00000000071A0000-0x0000000007216000-memory.dmp
        Filesize

        472KB

      • memory/1144-1116-0x0000000007220000-0x0000000007270000-memory.dmp
        Filesize

        320KB