Analysis

  • max time kernel
    61s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 01:40

General

  • Target

    94a21a678cfdda17a8bd7a7bf939ed1b30146b9a3f3495ba6765ff457a05362e.exe

  • Size

    689KB

  • MD5

    fb46d2e4678de42f27ac43e1ff4305bd

  • SHA1

    6679db37ca749b5d1ce62775145df9aa3d397824

  • SHA256

    94a21a678cfdda17a8bd7a7bf939ed1b30146b9a3f3495ba6765ff457a05362e

  • SHA512

    f7eb498dc12d28ef472d61773259c9f5914cb9e9cf58717abcf466b32d8e75c892dde102c147518acc0ac07ae54009a5c5ec42e8e2201b6757e84c675a317aff

  • SSDEEP

    12288:NMruy90D5FCRw+D27wXmzyN65hLuW3LuM8+D228+S6Obzv7FOpfigZqilS4L:PyDw+caAfaeLU+D2z+StzROpag0ilS4L

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\94a21a678cfdda17a8bd7a7bf939ed1b30146b9a3f3495ba6765ff457a05362e.exe
    "C:\Users\Admin\AppData\Local\Temp\94a21a678cfdda17a8bd7a7bf939ed1b30146b9a3f3495ba6765ff457a05362e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4684
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un346581.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un346581.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1524
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9034.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9034.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2156
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2156 -s 1016
          4⤵
          • Program crash
          PID:3708
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4630.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4630.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3832
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 1328
          4⤵
          • Program crash
          PID:4200
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si181997.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si181997.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4836
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2156 -ip 2156
    1⤵
      PID:988
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3832 -ip 3832
      1⤵
        PID:1928

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si181997.exe

        Filesize

        175KB

        MD5

        f3af7457f7ec69f3c69c7f9126b6e163

        SHA1

        d41306cd463fbc5e17999714256844369ea8663a

        SHA256

        30c1b9a6e4fb7befbd480e90848a18c0f2a23e02f22881ed5db97203ed148a27

        SHA512

        020456d197c5b3241fc2ba1875ee90a90c39dc9111f404fa2616d68dc9c353397bed57d4871e957f59e90609543c0a334e25fd88ab5e92427bff146cf3761b56

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si181997.exe

        Filesize

        175KB

        MD5

        f3af7457f7ec69f3c69c7f9126b6e163

        SHA1

        d41306cd463fbc5e17999714256844369ea8663a

        SHA256

        30c1b9a6e4fb7befbd480e90848a18c0f2a23e02f22881ed5db97203ed148a27

        SHA512

        020456d197c5b3241fc2ba1875ee90a90c39dc9111f404fa2616d68dc9c353397bed57d4871e957f59e90609543c0a334e25fd88ab5e92427bff146cf3761b56

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un346581.exe

        Filesize

        547KB

        MD5

        dba977459ce5a5a3550edee6d10b5239

        SHA1

        5049ed00a132e84071f6ebecf3be36d8e27cc63e

        SHA256

        576838bc02731d7516a646f578e8514ade289d0ada3afa0a77b72dbf8dc00ced

        SHA512

        5e50516f4a84998efe1978e374fe53dd32eb2c91c21757c26e66b6f09687b786c3d70b19cb5ae8521c72418750a2cf49bfeb00d15cec48a857f1c79ea8bfe0d7

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un346581.exe

        Filesize

        547KB

        MD5

        dba977459ce5a5a3550edee6d10b5239

        SHA1

        5049ed00a132e84071f6ebecf3be36d8e27cc63e

        SHA256

        576838bc02731d7516a646f578e8514ade289d0ada3afa0a77b72dbf8dc00ced

        SHA512

        5e50516f4a84998efe1978e374fe53dd32eb2c91c21757c26e66b6f09687b786c3d70b19cb5ae8521c72418750a2cf49bfeb00d15cec48a857f1c79ea8bfe0d7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9034.exe

        Filesize

        291KB

        MD5

        c78c6540a4984b65c9ee2ba44f441284

        SHA1

        c8c850ccc2819e00501386c67409bcccb0ac449e

        SHA256

        3dcb33ea08a7b3afa8b96fb5f206cded7b22bf64fb6c9ad5be7f07fb5085f845

        SHA512

        16503672d91ac686be296382bef1b35ac6f19583114ea6ecdf1d609a9434edfd981857eff1cfcd41a180500702d5d023adf129ece087c17ca5514a055f9e92ba

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9034.exe

        Filesize

        291KB

        MD5

        c78c6540a4984b65c9ee2ba44f441284

        SHA1

        c8c850ccc2819e00501386c67409bcccb0ac449e

        SHA256

        3dcb33ea08a7b3afa8b96fb5f206cded7b22bf64fb6c9ad5be7f07fb5085f845

        SHA512

        16503672d91ac686be296382bef1b35ac6f19583114ea6ecdf1d609a9434edfd981857eff1cfcd41a180500702d5d023adf129ece087c17ca5514a055f9e92ba

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4630.exe

        Filesize

        345KB

        MD5

        634eb7798af67569fa87141ea91047df

        SHA1

        82ea7c79e6f3ecb3941062fc55df4bd5dc205c89

        SHA256

        b7c660c4177e7043f045a8ba29caaba442088709a1f268b3ae0fe0bb403fa393

        SHA512

        758a1c832358f6fd390f2cc3d6269ca653e8b8a00e1b8addfeaa29c25c2e63e622b4827247a9f319bb54d8376e46c9c317711126f6365f472ef00b611fdd0263

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4630.exe

        Filesize

        345KB

        MD5

        634eb7798af67569fa87141ea91047df

        SHA1

        82ea7c79e6f3ecb3941062fc55df4bd5dc205c89

        SHA256

        b7c660c4177e7043f045a8ba29caaba442088709a1f268b3ae0fe0bb403fa393

        SHA512

        758a1c832358f6fd390f2cc3d6269ca653e8b8a00e1b8addfeaa29c25c2e63e622b4827247a9f319bb54d8376e46c9c317711126f6365f472ef00b611fdd0263

      • memory/2156-148-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/2156-149-0x0000000004D10000-0x00000000052B4000-memory.dmp

        Filesize

        5.6MB

      • memory/2156-150-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2156-151-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2156-154-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2156-155-0x0000000004D00000-0x0000000004D10000-memory.dmp

        Filesize

        64KB

      • memory/2156-153-0x0000000004D00000-0x0000000004D10000-memory.dmp

        Filesize

        64KB

      • memory/2156-158-0x0000000004D00000-0x0000000004D10000-memory.dmp

        Filesize

        64KB

      • memory/2156-157-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2156-160-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2156-162-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2156-164-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2156-166-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2156-168-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2156-170-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2156-172-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2156-174-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2156-176-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2156-178-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2156-180-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/2156-181-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/2156-182-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/2156-185-0x0000000004D00000-0x0000000004D10000-memory.dmp

        Filesize

        64KB

      • memory/2156-184-0x0000000004D00000-0x0000000004D10000-memory.dmp

        Filesize

        64KB

      • memory/2156-186-0x0000000004D00000-0x0000000004D10000-memory.dmp

        Filesize

        64KB

      • memory/2156-187-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/3832-192-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/3832-193-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/3832-195-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/3832-197-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/3832-201-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/3832-199-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/3832-203-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/3832-205-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/3832-207-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/3832-209-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/3832-211-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/3832-213-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/3832-215-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/3832-217-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/3832-219-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/3832-221-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/3832-223-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/3832-226-0x0000000001B00000-0x0000000001B4B000-memory.dmp

        Filesize

        300KB

      • memory/3832-225-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/3832-229-0x0000000006040000-0x0000000006050000-memory.dmp

        Filesize

        64KB

      • memory/3832-228-0x0000000006040000-0x0000000006050000-memory.dmp

        Filesize

        64KB

      • memory/3832-231-0x0000000006040000-0x0000000006050000-memory.dmp

        Filesize

        64KB

      • memory/3832-1102-0x0000000006770000-0x0000000006D88000-memory.dmp

        Filesize

        6.1MB

      • memory/3832-1103-0x0000000006E10000-0x0000000006F1A000-memory.dmp

        Filesize

        1.0MB

      • memory/3832-1104-0x0000000006F50000-0x0000000006F62000-memory.dmp

        Filesize

        72KB

      • memory/3832-1105-0x0000000006F70000-0x0000000006FAC000-memory.dmp

        Filesize

        240KB

      • memory/3832-1106-0x0000000006040000-0x0000000006050000-memory.dmp

        Filesize

        64KB

      • memory/3832-1107-0x0000000007260000-0x00000000072C6000-memory.dmp

        Filesize

        408KB

      • memory/3832-1108-0x0000000007910000-0x00000000079A2000-memory.dmp

        Filesize

        584KB

      • memory/3832-1110-0x0000000006040000-0x0000000006050000-memory.dmp

        Filesize

        64KB

      • memory/3832-1111-0x0000000006040000-0x0000000006050000-memory.dmp

        Filesize

        64KB

      • memory/3832-1112-0x0000000007C60000-0x0000000007E22000-memory.dmp

        Filesize

        1.8MB

      • memory/3832-1113-0x0000000007E40000-0x000000000836C000-memory.dmp

        Filesize

        5.2MB

      • memory/3832-1114-0x0000000006040000-0x0000000006050000-memory.dmp

        Filesize

        64KB

      • memory/3832-1115-0x00000000084A0000-0x0000000008516000-memory.dmp

        Filesize

        472KB

      • memory/3832-1116-0x0000000008530000-0x0000000008580000-memory.dmp

        Filesize

        320KB

      • memory/4836-1122-0x0000000000300000-0x0000000000332000-memory.dmp

        Filesize

        200KB

      • memory/4836-1123-0x0000000004F20000-0x0000000004F30000-memory.dmp

        Filesize

        64KB