Analysis

  • max time kernel
    68s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 00:03

General

  • Target

    0fcaca70dca5354956128cc04e43ec4ea339460744be1aa794eca3efac58c0d8.exe

  • Size

    700KB

  • MD5

    1d201aaaef60b4ebdbfc052fec54c734

  • SHA1

    1c4b1e2c8932cc9e12a09089a44c78b997f210ef

  • SHA256

    0fcaca70dca5354956128cc04e43ec4ea339460744be1aa794eca3efac58c0d8

  • SHA512

    c929e687cdbbe4a3e6887ae38e749c6bcf1f53b315a73e4e4756d349abcfb54f49f273a5adc93a21384547703bd5cff3291eb120924b8c1b9f20ef71c1d34867

  • SSDEEP

    12288:WMrJy90+kVSsMDeRFdwCNoMgzdZzT6NeECj545urYj7k++mXNf9N:Xy9FDedNXKdZfQCj5ZrYHkLINfb

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0fcaca70dca5354956128cc04e43ec4ea339460744be1aa794eca3efac58c0d8.exe
    "C:\Users\Admin\AppData\Local\Temp\0fcaca70dca5354956128cc04e43ec4ea339460744be1aa794eca3efac58c0d8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3224
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un889728.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un889728.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5032
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7861.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7861.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4948
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 1028
          4⤵
          • Program crash
          PID:228
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4709.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4709.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:956
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 956 -s 1364
          4⤵
          • Program crash
          PID:2844
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si754616.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si754616.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1808
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4948 -ip 4948
    1⤵
      PID:1600
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 956 -ip 956
      1⤵
        PID:676

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si754616.exe

        Filesize

        175KB

        MD5

        64cee401efcf7726f262eb8611494bad

        SHA1

        db1c14677e9d780fe51dc0feb5e0f40cf0a9344b

        SHA256

        94451119297e0d11390a36d1b7dc9d176b5b560280e1b88132b58298c31b1e84

        SHA512

        519a4b0fb73cce094d39231de9d994d5ee15d7fe4e27399f7f3079e512a0e8d1d847956fcda052ec1ee3bc1eca47aaa71dc7c4a3216708e104e670115d9471e9

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si754616.exe

        Filesize

        175KB

        MD5

        64cee401efcf7726f262eb8611494bad

        SHA1

        db1c14677e9d780fe51dc0feb5e0f40cf0a9344b

        SHA256

        94451119297e0d11390a36d1b7dc9d176b5b560280e1b88132b58298c31b1e84

        SHA512

        519a4b0fb73cce094d39231de9d994d5ee15d7fe4e27399f7f3079e512a0e8d1d847956fcda052ec1ee3bc1eca47aaa71dc7c4a3216708e104e670115d9471e9

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un889728.exe

        Filesize

        557KB

        MD5

        48d7453dfaaaa58c0a75123c61096e38

        SHA1

        298dcc42c705ca808dd00fc1f645c5edc2d07e8b

        SHA256

        adc62141c2f8e48d9a06affdc50f6470917b81f03a44774c1e963518e3e02079

        SHA512

        5233bca75a8d19c36f671814573607c38eb859f76d901a7856a23155bc7a5add33d0b4a3179ad6b7b3fca222267e961c713e41fe737d855d995c70b0bf42605c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un889728.exe

        Filesize

        557KB

        MD5

        48d7453dfaaaa58c0a75123c61096e38

        SHA1

        298dcc42c705ca808dd00fc1f645c5edc2d07e8b

        SHA256

        adc62141c2f8e48d9a06affdc50f6470917b81f03a44774c1e963518e3e02079

        SHA512

        5233bca75a8d19c36f671814573607c38eb859f76d901a7856a23155bc7a5add33d0b4a3179ad6b7b3fca222267e961c713e41fe737d855d995c70b0bf42605c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7861.exe

        Filesize

        307KB

        MD5

        97590e037c1bbc78c6c77d65d1c4eafa

        SHA1

        b59dda8a070324948b4b0f7a1bb3af97cb1eaf22

        SHA256

        8b0dce6337d895b8ab52e871213bdd049c71a4e1a2a1dbb7a535c725e6d7379a

        SHA512

        494cd0cdbdfff99dd900d40c8ed256d8aef1510803c1c0ccb3e196b9cabfd67537363442612d4579b679b28873a164bec7d01b55f3221e635c93f1439834f57f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7861.exe

        Filesize

        307KB

        MD5

        97590e037c1bbc78c6c77d65d1c4eafa

        SHA1

        b59dda8a070324948b4b0f7a1bb3af97cb1eaf22

        SHA256

        8b0dce6337d895b8ab52e871213bdd049c71a4e1a2a1dbb7a535c725e6d7379a

        SHA512

        494cd0cdbdfff99dd900d40c8ed256d8aef1510803c1c0ccb3e196b9cabfd67537363442612d4579b679b28873a164bec7d01b55f3221e635c93f1439834f57f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4709.exe

        Filesize

        365KB

        MD5

        ef8da62acf9a1440425d043e41d076fe

        SHA1

        06fdd4fba09e25a0e1e7d8373899257b94fb253c

        SHA256

        ff0f3cfafc48d9fb15877c42e17ac00431aa15d32a61fc44ff4e10135b55668d

        SHA512

        aaa1dcf1e89b9525f37dba57ef93c13b59f92d1b1a876cda323dd74217a52523fa65390552f35acc0aedfd62f409db96e93b84df2319a85490f47dac8f5caa52

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4709.exe

        Filesize

        365KB

        MD5

        ef8da62acf9a1440425d043e41d076fe

        SHA1

        06fdd4fba09e25a0e1e7d8373899257b94fb253c

        SHA256

        ff0f3cfafc48d9fb15877c42e17ac00431aa15d32a61fc44ff4e10135b55668d

        SHA512

        aaa1dcf1e89b9525f37dba57ef93c13b59f92d1b1a876cda323dd74217a52523fa65390552f35acc0aedfd62f409db96e93b84df2319a85490f47dac8f5caa52

      • memory/956-389-0x0000000004C10000-0x0000000004C20000-memory.dmp

        Filesize

        64KB

      • memory/956-1102-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/956-1114-0x0000000007220000-0x0000000007270000-memory.dmp

        Filesize

        320KB

      • memory/956-1113-0x00000000071A0000-0x0000000007216000-memory.dmp

        Filesize

        472KB

      • memory/956-1112-0x0000000004C10000-0x0000000004C20000-memory.dmp

        Filesize

        64KB

      • memory/956-1111-0x0000000006B30000-0x000000000705C000-memory.dmp

        Filesize

        5.2MB

      • memory/956-1110-0x0000000006950000-0x0000000006B12000-memory.dmp

        Filesize

        1.8MB

      • memory/956-1109-0x0000000004C10000-0x0000000004C20000-memory.dmp

        Filesize

        64KB

      • memory/956-1108-0x0000000004C10000-0x0000000004C20000-memory.dmp

        Filesize

        64KB

      • memory/956-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/956-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/956-1104-0x0000000004C10000-0x0000000004C20000-memory.dmp

        Filesize

        64KB

      • memory/956-1103-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/956-1101-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/956-1100-0x0000000005460000-0x0000000005A78000-memory.dmp

        Filesize

        6.1MB

      • memory/956-391-0x0000000004C10000-0x0000000004C20000-memory.dmp

        Filesize

        64KB

      • memory/956-387-0x00000000020E0000-0x000000000212B000-memory.dmp

        Filesize

        300KB

      • memory/956-224-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

        Filesize

        252KB

      • memory/956-222-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

        Filesize

        252KB

      • memory/956-220-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

        Filesize

        252KB

      • memory/956-218-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

        Filesize

        252KB

      • memory/956-216-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

        Filesize

        252KB

      • memory/956-214-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

        Filesize

        252KB

      • memory/956-191-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

        Filesize

        252KB

      • memory/956-192-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

        Filesize

        252KB

      • memory/956-194-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

        Filesize

        252KB

      • memory/956-196-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

        Filesize

        252KB

      • memory/956-200-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

        Filesize

        252KB

      • memory/956-198-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

        Filesize

        252KB

      • memory/956-202-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

        Filesize

        252KB

      • memory/956-204-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

        Filesize

        252KB

      • memory/956-206-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

        Filesize

        252KB

      • memory/956-208-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

        Filesize

        252KB

      • memory/956-210-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

        Filesize

        252KB

      • memory/956-212-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

        Filesize

        252KB

      • memory/1808-1120-0x0000000000030000-0x0000000000062000-memory.dmp

        Filesize

        200KB

      • memory/1808-1121-0x0000000004900000-0x0000000004910000-memory.dmp

        Filesize

        64KB

      • memory/4948-174-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/4948-181-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/4948-170-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/4948-183-0x0000000002710000-0x0000000002720000-memory.dmp

        Filesize

        64KB

      • memory/4948-168-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/4948-180-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/4948-150-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/4948-164-0x0000000002710000-0x0000000002720000-memory.dmp

        Filesize

        64KB

      • memory/4948-176-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/4948-156-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/4948-152-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/4948-172-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/4948-185-0x0000000002710000-0x0000000002720000-memory.dmp

        Filesize

        64KB

      • memory/4948-184-0x0000000002710000-0x0000000002720000-memory.dmp

        Filesize

        64KB

      • memory/4948-178-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/4948-162-0x0000000002710000-0x0000000002720000-memory.dmp

        Filesize

        64KB

      • memory/4948-166-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/4948-163-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/4948-159-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/4948-161-0x0000000002710000-0x0000000002720000-memory.dmp

        Filesize

        64KB

      • memory/4948-158-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/4948-149-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/4948-148-0x0000000004C70000-0x0000000005214000-memory.dmp

        Filesize

        5.6MB

      • memory/4948-186-0x0000000000400000-0x000000000070F000-memory.dmp

        Filesize

        3.1MB

      • memory/4948-154-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB