Analysis

  • max time kernel
    62s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 01:36

General

  • Target

    fb85fda194cb535dbcc120131683f4ab259261ed4e42930213fd46384788237b.exe

  • Size

    689KB

  • MD5

    d2ccd51e1053c16efc79b45e2b498664

  • SHA1

    d4f9e105b76770a3f105b588fd91ad2be49c82c0

  • SHA256

    fb85fda194cb535dbcc120131683f4ab259261ed4e42930213fd46384788237b

  • SHA512

    0280d27384929bfe902cfa04efd2d00e68636f929749c0a348653235501e9ebc83d85c241ab995e00177ac06e4ba0c45f3b7408928e9d04f8d023cdc6e61c413

  • SSDEEP

    12288:BMrWy90jOs+EIyixJoCjaWNlyn65hLutvhQ3pfJ/G6vTF4Cfig1V0g81MAoURR9:TyaHMAMaWq6fajqJ/G6p4CagGrRL

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb85fda194cb535dbcc120131683f4ab259261ed4e42930213fd46384788237b.exe
    "C:\Users\Admin\AppData\Local\Temp\fb85fda194cb535dbcc120131683f4ab259261ed4e42930213fd46384788237b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2864
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un971795.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un971795.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1836
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5750.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5750.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1216
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 1080
          4⤵
          • Program crash
          PID:2428
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0434.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0434.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2576
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 1328
          4⤵
          • Program crash
          PID:3400
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si848793.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si848793.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4252
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1216 -ip 1216
    1⤵
      PID:3336
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2576 -ip 2576
      1⤵
        PID:4336

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si848793.exe

        Filesize

        175KB

        MD5

        1edd2043da1bc3d925c36dacac486f1a

        SHA1

        a29bbfcdc1ba019f4060eed7385368a77822ac15

        SHA256

        8bbe19f458ae79b5494b67b0aaebba895df1e49b3f5bde918b3e5c4b187efd5e

        SHA512

        a5dfaa0b48b2bd27be6d7152981a205fb588e920626d73114e2b5552621a84770ecaea3d42f8fdd6359a4843bec28bcf92305807e97361d9955b67ca5afd5fde

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si848793.exe

        Filesize

        175KB

        MD5

        1edd2043da1bc3d925c36dacac486f1a

        SHA1

        a29bbfcdc1ba019f4060eed7385368a77822ac15

        SHA256

        8bbe19f458ae79b5494b67b0aaebba895df1e49b3f5bde918b3e5c4b187efd5e

        SHA512

        a5dfaa0b48b2bd27be6d7152981a205fb588e920626d73114e2b5552621a84770ecaea3d42f8fdd6359a4843bec28bcf92305807e97361d9955b67ca5afd5fde

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un971795.exe

        Filesize

        547KB

        MD5

        c27d0e88c4343146c5fb8c9cc8d73924

        SHA1

        4ea15d376827274f475f47906a800bbd0230819a

        SHA256

        ddcab9c3eddea3a91277e457d6cf409c88bf1f198e8a4ee935e58157891081be

        SHA512

        53e73516de6093b4125dc103bfa5cb471ea372c0e9ed8eeb28906bb1cc258900a397d6b7b30742af55a53b761b2815ef8e57561f929b6efc63c25932ef2c3688

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un971795.exe

        Filesize

        547KB

        MD5

        c27d0e88c4343146c5fb8c9cc8d73924

        SHA1

        4ea15d376827274f475f47906a800bbd0230819a

        SHA256

        ddcab9c3eddea3a91277e457d6cf409c88bf1f198e8a4ee935e58157891081be

        SHA512

        53e73516de6093b4125dc103bfa5cb471ea372c0e9ed8eeb28906bb1cc258900a397d6b7b30742af55a53b761b2815ef8e57561f929b6efc63c25932ef2c3688

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5750.exe

        Filesize

        291KB

        MD5

        c0d41b9139a7fd3727e724d2f487c3c9

        SHA1

        187792e3dddf548738d91b3abdd586d31235fb03

        SHA256

        56b606c268912ef7618543ad1668b8c360775df0a0ff90e77222690d6ad46a4c

        SHA512

        7516a6c2b12ab3c8f2fc2721ec5b703a32c37d61b12065a7fb9f162d71a6cb72e42dddb44ec6ec35cb9d38d5138e415fd58fddb2622ccdcfc45c0f1305a85fe2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5750.exe

        Filesize

        291KB

        MD5

        c0d41b9139a7fd3727e724d2f487c3c9

        SHA1

        187792e3dddf548738d91b3abdd586d31235fb03

        SHA256

        56b606c268912ef7618543ad1668b8c360775df0a0ff90e77222690d6ad46a4c

        SHA512

        7516a6c2b12ab3c8f2fc2721ec5b703a32c37d61b12065a7fb9f162d71a6cb72e42dddb44ec6ec35cb9d38d5138e415fd58fddb2622ccdcfc45c0f1305a85fe2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0434.exe

        Filesize

        345KB

        MD5

        e30e7c901acddc07059203f5800083da

        SHA1

        cde85f55045258cbad60aed3794e67b06f668a7a

        SHA256

        650f34e815d412a174fee13174c50f8bf71697b92279d4d02b9c5dcd8c9fc92c

        SHA512

        2a51a1f039751545716b4fe5ee5ec895379452f0ae8a7c471aadaba0c95dee81a94c2f5723b063adae8000e97a0a2fac1e8a9e1c0be1d2391062aa34577d4274

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0434.exe

        Filesize

        345KB

        MD5

        e30e7c901acddc07059203f5800083da

        SHA1

        cde85f55045258cbad60aed3794e67b06f668a7a

        SHA256

        650f34e815d412a174fee13174c50f8bf71697b92279d4d02b9c5dcd8c9fc92c

        SHA512

        2a51a1f039751545716b4fe5ee5ec895379452f0ae8a7c471aadaba0c95dee81a94c2f5723b063adae8000e97a0a2fac1e8a9e1c0be1d2391062aa34577d4274

      • memory/1216-148-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/1216-149-0x0000000004F50000-0x00000000054F4000-memory.dmp

        Filesize

        5.6MB

      • memory/1216-150-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/1216-151-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/1216-152-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/1216-153-0x0000000002730000-0x0000000002742000-memory.dmp

        Filesize

        72KB

      • memory/1216-154-0x0000000002730000-0x0000000002742000-memory.dmp

        Filesize

        72KB

      • memory/1216-156-0x0000000002730000-0x0000000002742000-memory.dmp

        Filesize

        72KB

      • memory/1216-158-0x0000000002730000-0x0000000002742000-memory.dmp

        Filesize

        72KB

      • memory/1216-160-0x0000000002730000-0x0000000002742000-memory.dmp

        Filesize

        72KB

      • memory/1216-162-0x0000000002730000-0x0000000002742000-memory.dmp

        Filesize

        72KB

      • memory/1216-164-0x0000000002730000-0x0000000002742000-memory.dmp

        Filesize

        72KB

      • memory/1216-166-0x0000000002730000-0x0000000002742000-memory.dmp

        Filesize

        72KB

      • memory/1216-168-0x0000000002730000-0x0000000002742000-memory.dmp

        Filesize

        72KB

      • memory/1216-170-0x0000000002730000-0x0000000002742000-memory.dmp

        Filesize

        72KB

      • memory/1216-172-0x0000000002730000-0x0000000002742000-memory.dmp

        Filesize

        72KB

      • memory/1216-174-0x0000000002730000-0x0000000002742000-memory.dmp

        Filesize

        72KB

      • memory/1216-176-0x0000000002730000-0x0000000002742000-memory.dmp

        Filesize

        72KB

      • memory/1216-178-0x0000000002730000-0x0000000002742000-memory.dmp

        Filesize

        72KB

      • memory/1216-180-0x0000000002730000-0x0000000002742000-memory.dmp

        Filesize

        72KB

      • memory/1216-181-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/1216-182-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/1216-183-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/1216-184-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/1216-186-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/2576-192-0x0000000003A60000-0x0000000003A9F000-memory.dmp

        Filesize

        252KB

      • memory/2576-191-0x0000000003A60000-0x0000000003A9F000-memory.dmp

        Filesize

        252KB

      • memory/2576-194-0x0000000003A60000-0x0000000003A9F000-memory.dmp

        Filesize

        252KB

      • memory/2576-196-0x0000000003A60000-0x0000000003A9F000-memory.dmp

        Filesize

        252KB

      • memory/2576-198-0x0000000003A60000-0x0000000003A9F000-memory.dmp

        Filesize

        252KB

      • memory/2576-200-0x0000000003A60000-0x0000000003A9F000-memory.dmp

        Filesize

        252KB

      • memory/2576-202-0x0000000003A60000-0x0000000003A9F000-memory.dmp

        Filesize

        252KB

      • memory/2576-204-0x0000000003A60000-0x0000000003A9F000-memory.dmp

        Filesize

        252KB

      • memory/2576-206-0x0000000003A60000-0x0000000003A9F000-memory.dmp

        Filesize

        252KB

      • memory/2576-208-0x0000000003A60000-0x0000000003A9F000-memory.dmp

        Filesize

        252KB

      • memory/2576-210-0x0000000003A60000-0x0000000003A9F000-memory.dmp

        Filesize

        252KB

      • memory/2576-212-0x0000000003A60000-0x0000000003A9F000-memory.dmp

        Filesize

        252KB

      • memory/2576-214-0x0000000003A60000-0x0000000003A9F000-memory.dmp

        Filesize

        252KB

      • memory/2576-216-0x0000000003A60000-0x0000000003A9F000-memory.dmp

        Filesize

        252KB

      • memory/2576-218-0x0000000003A60000-0x0000000003A9F000-memory.dmp

        Filesize

        252KB

      • memory/2576-220-0x0000000003A60000-0x0000000003A9F000-memory.dmp

        Filesize

        252KB

      • memory/2576-222-0x0000000003A60000-0x0000000003A9F000-memory.dmp

        Filesize

        252KB

      • memory/2576-224-0x0000000003A60000-0x0000000003A9F000-memory.dmp

        Filesize

        252KB

      • memory/2576-307-0x0000000001A30000-0x0000000001A7B000-memory.dmp

        Filesize

        300KB

      • memory/2576-308-0x0000000006240000-0x0000000006250000-memory.dmp

        Filesize

        64KB

      • memory/2576-310-0x0000000006240000-0x0000000006250000-memory.dmp

        Filesize

        64KB

      • memory/2576-1100-0x0000000006800000-0x0000000006E18000-memory.dmp

        Filesize

        6.1MB

      • memory/2576-1101-0x0000000006E20000-0x0000000006F2A000-memory.dmp

        Filesize

        1.0MB

      • memory/2576-1102-0x0000000006F50000-0x0000000006F62000-memory.dmp

        Filesize

        72KB

      • memory/2576-1103-0x0000000006F70000-0x0000000006FAC000-memory.dmp

        Filesize

        240KB

      • memory/2576-1104-0x0000000006240000-0x0000000006250000-memory.dmp

        Filesize

        64KB

      • memory/2576-1105-0x0000000007260000-0x00000000072C6000-memory.dmp

        Filesize

        408KB

      • memory/2576-1106-0x0000000007920000-0x00000000079B2000-memory.dmp

        Filesize

        584KB

      • memory/2576-1108-0x0000000007A20000-0x0000000007BE2000-memory.dmp

        Filesize

        1.8MB

      • memory/2576-1109-0x0000000007BF0000-0x000000000811C000-memory.dmp

        Filesize

        5.2MB

      • memory/2576-1110-0x0000000006240000-0x0000000006250000-memory.dmp

        Filesize

        64KB

      • memory/2576-1111-0x0000000006240000-0x0000000006250000-memory.dmp

        Filesize

        64KB

      • memory/2576-1112-0x0000000006240000-0x0000000006250000-memory.dmp

        Filesize

        64KB

      • memory/2576-1113-0x0000000006240000-0x0000000006250000-memory.dmp

        Filesize

        64KB

      • memory/2576-1114-0x00000000084B0000-0x0000000008526000-memory.dmp

        Filesize

        472KB

      • memory/2576-1115-0x0000000008530000-0x0000000008580000-memory.dmp

        Filesize

        320KB

      • memory/4252-1121-0x0000000000A40000-0x0000000000A72000-memory.dmp

        Filesize

        200KB

      • memory/4252-1122-0x00000000052B0000-0x00000000052C0000-memory.dmp

        Filesize

        64KB