Analysis

  • max time kernel
    138s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 01:38

General

  • Target

    fdc98cd521c4051b32685d81dd2d579b2c99b501bf2476ca9b23fea5f517a85a.exe

  • Size

    690KB

  • MD5

    a3cd2fabe8fddd09d0f16b379590b493

  • SHA1

    ca65c759ba8d490a956910185e09d1c3f8638731

  • SHA256

    fdc98cd521c4051b32685d81dd2d579b2c99b501bf2476ca9b23fea5f517a85a

  • SHA512

    5ff316c3e8744432c7eb7ac6cdacfd141ad3ff4a44029ebb0b7a9e69d67a2bc98ebb41b509f84b8a67f570d6ff5dce82c3b8f3ae1dec664bd4fa1ad284b43869

  • SSDEEP

    12288:/MrMy90l0HFAFyLyy65hLud8cNhvwB/tvxvJF+dfigzMhntoNUS:Hyb6w2hfadrhy/BxL+dagz2S

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fdc98cd521c4051b32685d81dd2d579b2c99b501bf2476ca9b23fea5f517a85a.exe
    "C:\Users\Admin\AppData\Local\Temp\fdc98cd521c4051b32685d81dd2d579b2c99b501bf2476ca9b23fea5f517a85a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4056
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un471827.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un471827.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1404
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1110.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1110.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2988
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2988 -s 1084
          4⤵
          • Program crash
          PID:4760
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2975.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2975.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4548
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 1752
          4⤵
          • Program crash
          PID:4512
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si454518.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si454518.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3976
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2988 -ip 2988
    1⤵
      PID:1644
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4548 -ip 4548
      1⤵
        PID:4012

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si454518.exe

        Filesize

        175KB

        MD5

        0221bd72a6fc6363add5760376b57a5d

        SHA1

        31569b946cbc27f4cebe4a102798723905f0a3ce

        SHA256

        8b3b4f7d906267e1f6cdfecef2f3855103f9626126721cc9db7c6e72ed2c39e4

        SHA512

        fd757fdcc4e7a1b84afc0882b79115c9568a219a328c8e544a33111a97bf084e85af65a31237cd55a3095f61bc863e69bc34084e1853d8199cc82964f5b32a23

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si454518.exe

        Filesize

        175KB

        MD5

        0221bd72a6fc6363add5760376b57a5d

        SHA1

        31569b946cbc27f4cebe4a102798723905f0a3ce

        SHA256

        8b3b4f7d906267e1f6cdfecef2f3855103f9626126721cc9db7c6e72ed2c39e4

        SHA512

        fd757fdcc4e7a1b84afc0882b79115c9568a219a328c8e544a33111a97bf084e85af65a31237cd55a3095f61bc863e69bc34084e1853d8199cc82964f5b32a23

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un471827.exe

        Filesize

        548KB

        MD5

        b7cbeb775eab4b2786b3d75b5522a9b9

        SHA1

        8d3292c26ea7cb9d5fed517a6928de9a26b4324e

        SHA256

        8700599618e0dea0eca80c9325b54ac26ace418faab6d480f1779fa6558a1f83

        SHA512

        f7740e763b2f4b670e606461921ba85b48c5df7e8acfc1a80933d9c76a2dec7fb5ff9a65ac0d29fc80bf4cbb483cfb2306ae287d654282270a8fb4cef2df3e93

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un471827.exe

        Filesize

        548KB

        MD5

        b7cbeb775eab4b2786b3d75b5522a9b9

        SHA1

        8d3292c26ea7cb9d5fed517a6928de9a26b4324e

        SHA256

        8700599618e0dea0eca80c9325b54ac26ace418faab6d480f1779fa6558a1f83

        SHA512

        f7740e763b2f4b670e606461921ba85b48c5df7e8acfc1a80933d9c76a2dec7fb5ff9a65ac0d29fc80bf4cbb483cfb2306ae287d654282270a8fb4cef2df3e93

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1110.exe

        Filesize

        291KB

        MD5

        a575c96ce6c090947fd37cc582b9521e

        SHA1

        60ea46e9769566fb1e0ffbf141e693e6f5ee83aa

        SHA256

        1d1e3c048709a45dd0de6b05ef8735f633cf93af995773897de35a60a15ccd55

        SHA512

        3ee7b10426c81874f64e18b34c5f40a7639aef6be0aeb764bab280244bf16095454eebf6ddc99d4e40aaa227123ae75976877d335c086eca67881b94bb928e44

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1110.exe

        Filesize

        291KB

        MD5

        a575c96ce6c090947fd37cc582b9521e

        SHA1

        60ea46e9769566fb1e0ffbf141e693e6f5ee83aa

        SHA256

        1d1e3c048709a45dd0de6b05ef8735f633cf93af995773897de35a60a15ccd55

        SHA512

        3ee7b10426c81874f64e18b34c5f40a7639aef6be0aeb764bab280244bf16095454eebf6ddc99d4e40aaa227123ae75976877d335c086eca67881b94bb928e44

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2975.exe

        Filesize

        345KB

        MD5

        cb9e6f8f8eec5063bee2faa69ed272f4

        SHA1

        4f2c779d74690fcb1ad3b69f36e0a2b097d67bb1

        SHA256

        4502f92762d46d440cbe3683d79377116b1df920f8e11700b3999fc654e45efb

        SHA512

        89789b98f4bf5ec3bcdf06556c6bc3cd2c074e64a1f58cdfcc656be0e77358c035c276505f803f36ae6d5a37a7047886a6c3c460d085a33f9d8b5e9771345d5d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2975.exe

        Filesize

        345KB

        MD5

        cb9e6f8f8eec5063bee2faa69ed272f4

        SHA1

        4f2c779d74690fcb1ad3b69f36e0a2b097d67bb1

        SHA256

        4502f92762d46d440cbe3683d79377116b1df920f8e11700b3999fc654e45efb

        SHA512

        89789b98f4bf5ec3bcdf06556c6bc3cd2c074e64a1f58cdfcc656be0e77358c035c276505f803f36ae6d5a37a7047886a6c3c460d085a33f9d8b5e9771345d5d

      • memory/2988-148-0x0000000004D00000-0x00000000052A4000-memory.dmp

        Filesize

        5.6MB

      • memory/2988-149-0x00000000008F0000-0x000000000091D000-memory.dmp

        Filesize

        180KB

      • memory/2988-150-0x0000000004CF0000-0x0000000004D00000-memory.dmp

        Filesize

        64KB

      • memory/2988-151-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2988-153-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2988-154-0x0000000004CF0000-0x0000000004D00000-memory.dmp

        Filesize

        64KB

      • memory/2988-156-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2988-160-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2988-158-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2988-162-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2988-152-0x0000000004CF0000-0x0000000004D00000-memory.dmp

        Filesize

        64KB

      • memory/2988-164-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2988-166-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2988-168-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2988-174-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2988-178-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2988-180-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2988-176-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2988-172-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2988-170-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2988-181-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/2988-182-0x0000000004CF0000-0x0000000004D00000-memory.dmp

        Filesize

        64KB

      • memory/2988-183-0x0000000004CF0000-0x0000000004D00000-memory.dmp

        Filesize

        64KB

      • memory/2988-184-0x0000000004CF0000-0x0000000004D00000-memory.dmp

        Filesize

        64KB

      • memory/2988-186-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/3976-1122-0x0000000000650000-0x0000000000682000-memory.dmp

        Filesize

        200KB

      • memory/3976-1123-0x0000000005290000-0x00000000052A0000-memory.dmp

        Filesize

        64KB

      • memory/4548-194-0x0000000003870000-0x00000000038AF000-memory.dmp

        Filesize

        252KB

      • memory/4548-371-0x0000000006280000-0x0000000006290000-memory.dmp

        Filesize

        64KB

      • memory/4548-196-0x0000000003870000-0x00000000038AF000-memory.dmp

        Filesize

        252KB

      • memory/4548-198-0x0000000003870000-0x00000000038AF000-memory.dmp

        Filesize

        252KB

      • memory/4548-200-0x0000000003870000-0x00000000038AF000-memory.dmp

        Filesize

        252KB

      • memory/4548-202-0x0000000003870000-0x00000000038AF000-memory.dmp

        Filesize

        252KB

      • memory/4548-204-0x0000000003870000-0x00000000038AF000-memory.dmp

        Filesize

        252KB

      • memory/4548-206-0x0000000003870000-0x00000000038AF000-memory.dmp

        Filesize

        252KB

      • memory/4548-208-0x0000000003870000-0x00000000038AF000-memory.dmp

        Filesize

        252KB

      • memory/4548-210-0x0000000003870000-0x00000000038AF000-memory.dmp

        Filesize

        252KB

      • memory/4548-212-0x0000000003870000-0x00000000038AF000-memory.dmp

        Filesize

        252KB

      • memory/4548-214-0x0000000003870000-0x00000000038AF000-memory.dmp

        Filesize

        252KB

      • memory/4548-216-0x0000000003870000-0x00000000038AF000-memory.dmp

        Filesize

        252KB

      • memory/4548-218-0x0000000003870000-0x00000000038AF000-memory.dmp

        Filesize

        252KB

      • memory/4548-222-0x0000000003870000-0x00000000038AF000-memory.dmp

        Filesize

        252KB

      • memory/4548-224-0x0000000003870000-0x00000000038AF000-memory.dmp

        Filesize

        252KB

      • memory/4548-220-0x0000000003870000-0x00000000038AF000-memory.dmp

        Filesize

        252KB

      • memory/4548-366-0x0000000001B00000-0x0000000001B4B000-memory.dmp

        Filesize

        300KB

      • memory/4548-367-0x0000000006280000-0x0000000006290000-memory.dmp

        Filesize

        64KB

      • memory/4548-191-0x0000000003870000-0x00000000038AF000-memory.dmp

        Filesize

        252KB

      • memory/4548-370-0x0000000006280000-0x0000000006290000-memory.dmp

        Filesize

        64KB

      • memory/4548-1101-0x0000000006840000-0x0000000006E58000-memory.dmp

        Filesize

        6.1MB

      • memory/4548-1102-0x0000000006100000-0x000000000620A000-memory.dmp

        Filesize

        1.0MB

      • memory/4548-1103-0x0000000006230000-0x0000000006242000-memory.dmp

        Filesize

        72KB

      • memory/4548-1104-0x0000000006E60000-0x0000000006E9C000-memory.dmp

        Filesize

        240KB

      • memory/4548-1105-0x0000000006280000-0x0000000006290000-memory.dmp

        Filesize

        64KB

      • memory/4548-1107-0x0000000007120000-0x00000000071B2000-memory.dmp

        Filesize

        584KB

      • memory/4548-1108-0x00000000071C0000-0x0000000007226000-memory.dmp

        Filesize

        408KB

      • memory/4548-1109-0x00000000079C0000-0x0000000007A36000-memory.dmp

        Filesize

        472KB

      • memory/4548-1110-0x0000000007A50000-0x0000000007AA0000-memory.dmp

        Filesize

        320KB

      • memory/4548-1111-0x0000000006280000-0x0000000006290000-memory.dmp

        Filesize

        64KB

      • memory/4548-1112-0x0000000006280000-0x0000000006290000-memory.dmp

        Filesize

        64KB

      • memory/4548-1113-0x0000000006280000-0x0000000006290000-memory.dmp

        Filesize

        64KB

      • memory/4548-192-0x0000000003870000-0x00000000038AF000-memory.dmp

        Filesize

        252KB

      • memory/4548-1114-0x0000000007AD0000-0x0000000007C92000-memory.dmp

        Filesize

        1.8MB

      • memory/4548-1115-0x0000000007CA0000-0x00000000081CC000-memory.dmp

        Filesize

        5.2MB

      • memory/4548-1116-0x0000000006280000-0x0000000006290000-memory.dmp

        Filesize

        64KB