Analysis

  • max time kernel
    135s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 01:49

General

  • Target

    9da3e8ba571a0bc429747d44804ab0c6b1c128dfb01402014cf41d6048eb4c65.exe

  • Size

    689KB

  • MD5

    135b6c192bb576da14e79e6ce6bccbdf

  • SHA1

    46bff8337b828acdcf29d0f905439d8595be54b6

  • SHA256

    9da3e8ba571a0bc429747d44804ab0c6b1c128dfb01402014cf41d6048eb4c65

  • SHA512

    1863bae42e48a878430116008f91939452853fa0dce6f760f5c648db8901fe78c85a9be2f25cfd427d33a1563dca10480d46ff3d16ada9250516603da1d1bbc9

  • SSDEEP

    12288:QMrRy90UpbLPFQjXCvBKct/yA65hLuC2K3auSH45hOesNlOvPF92fig06WKwFS0e:RyXbmjXCvwKa/faC2KKuuOIeqOF92agr

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9da3e8ba571a0bc429747d44804ab0c6b1c128dfb01402014cf41d6048eb4c65.exe
    "C:\Users\Admin\AppData\Local\Temp\9da3e8ba571a0bc429747d44804ab0c6b1c128dfb01402014cf41d6048eb4c65.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3944
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un270031.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un270031.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1844
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5957.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5957.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3912
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3912 -s 1084
          4⤵
          • Program crash
          PID:4968
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0082.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0082.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1704
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 1696
          4⤵
          • Program crash
          PID:1412
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si817121.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si817121.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4856
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3912 -ip 3912
    1⤵
      PID:2396
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 1704 -ip 1704
      1⤵
        PID:4520

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si817121.exe

        Filesize

        175KB

        MD5

        e90fed0e50944b3a7b256d1b356cf8e2

        SHA1

        123ce789090d286137ae11770d32dbb854e601b9

        SHA256

        d67be89cfc50cd4a7930142fb5e78524ce8d9ed2f6616c94a69a1f094df475cc

        SHA512

        5267db8cd211f6f830e5411143bd99291ecfa1131733c472a2505cfe5e0b1b098a516e973813276be828573d3f1b2b5bfe58ad460c7257c9c5c806561aae0b7d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si817121.exe

        Filesize

        175KB

        MD5

        e90fed0e50944b3a7b256d1b356cf8e2

        SHA1

        123ce789090d286137ae11770d32dbb854e601b9

        SHA256

        d67be89cfc50cd4a7930142fb5e78524ce8d9ed2f6616c94a69a1f094df475cc

        SHA512

        5267db8cd211f6f830e5411143bd99291ecfa1131733c472a2505cfe5e0b1b098a516e973813276be828573d3f1b2b5bfe58ad460c7257c9c5c806561aae0b7d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un270031.exe

        Filesize

        548KB

        MD5

        f4436c06de7d7e79126163d46b4ac1fb

        SHA1

        78f2ba2580c7209e3d3469b1c22ceeab04f3d807

        SHA256

        992d7c4591b528ef5c18d4c571ff3c951a24f4c7f177db036a3346d24d5eb852

        SHA512

        3f291fb3e85f7b2a9bfc5285af606599bd4d64aee4b80974487062175a17dcd8682eb859a393197a2f1da5edbe79083173e240780bf8145233bff88d973221a4

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un270031.exe

        Filesize

        548KB

        MD5

        f4436c06de7d7e79126163d46b4ac1fb

        SHA1

        78f2ba2580c7209e3d3469b1c22ceeab04f3d807

        SHA256

        992d7c4591b528ef5c18d4c571ff3c951a24f4c7f177db036a3346d24d5eb852

        SHA512

        3f291fb3e85f7b2a9bfc5285af606599bd4d64aee4b80974487062175a17dcd8682eb859a393197a2f1da5edbe79083173e240780bf8145233bff88d973221a4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5957.exe

        Filesize

        291KB

        MD5

        faf9682a4c3688df1b87d4f9b7df6b79

        SHA1

        9e7eb89efcb827764acb9e257af50c9a582b1d7b

        SHA256

        b751fb805710101b900d2f714c69b562c644cd6afbf776f0edfdd4477f0f2e27

        SHA512

        9939eae542f7077c8e6090cbfdb763ba0021d38cd36191dd3ea30da9b8937fcd0cad329628218c2b0eb081b164a879feb652e3040fff9786917671f988b02880

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5957.exe

        Filesize

        291KB

        MD5

        faf9682a4c3688df1b87d4f9b7df6b79

        SHA1

        9e7eb89efcb827764acb9e257af50c9a582b1d7b

        SHA256

        b751fb805710101b900d2f714c69b562c644cd6afbf776f0edfdd4477f0f2e27

        SHA512

        9939eae542f7077c8e6090cbfdb763ba0021d38cd36191dd3ea30da9b8937fcd0cad329628218c2b0eb081b164a879feb652e3040fff9786917671f988b02880

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0082.exe

        Filesize

        345KB

        MD5

        fe894eb2bff63c51aff6c58ab271fadd

        SHA1

        01a68d18ae6901a86d0c4be7969ddce7ed91a977

        SHA256

        039507d27858e9ab8d089d14d7e111975ca9a558431e2c845f5bea5fb6e8f23e

        SHA512

        5ad2957eb73acca84bd046b09ddff9b940c92b0cb9b0ff3ccaab88bf2ee1ea3cee6f1606440f6aed23b2172fdbbbd0675c8d11ccad5df2c5854fefce8cf55c8f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0082.exe

        Filesize

        345KB

        MD5

        fe894eb2bff63c51aff6c58ab271fadd

        SHA1

        01a68d18ae6901a86d0c4be7969ddce7ed91a977

        SHA256

        039507d27858e9ab8d089d14d7e111975ca9a558431e2c845f5bea5fb6e8f23e

        SHA512

        5ad2957eb73acca84bd046b09ddff9b940c92b0cb9b0ff3ccaab88bf2ee1ea3cee6f1606440f6aed23b2172fdbbbd0675c8d11ccad5df2c5854fefce8cf55c8f

      • memory/1704-1102-0x0000000006CD0000-0x0000000006DDA000-memory.dmp

        Filesize

        1.0MB

      • memory/1704-288-0x0000000005F70000-0x0000000005F80000-memory.dmp

        Filesize

        64KB

      • memory/1704-198-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/1704-206-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/1704-1115-0x00000000082E0000-0x0000000008330000-memory.dmp

        Filesize

        320KB

      • memory/1704-1114-0x0000000008260000-0x00000000082D6000-memory.dmp

        Filesize

        472KB

      • memory/1704-1113-0x0000000005F70000-0x0000000005F80000-memory.dmp

        Filesize

        64KB

      • memory/1704-1110-0x0000000005F70000-0x0000000005F80000-memory.dmp

        Filesize

        64KB

      • memory/1704-1111-0x0000000005F70000-0x0000000005F80000-memory.dmp

        Filesize

        64KB

      • memory/1704-1112-0x0000000007AB0000-0x0000000007FDC000-memory.dmp

        Filesize

        5.2MB

      • memory/1704-208-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/1704-1109-0x00000000078E0000-0x0000000007AA2000-memory.dmp

        Filesize

        1.8MB

      • memory/1704-1108-0x00000000071C0000-0x0000000007226000-memory.dmp

        Filesize

        408KB

      • memory/1704-1107-0x0000000007120000-0x00000000071B2000-memory.dmp

        Filesize

        584KB

      • memory/1704-1105-0x0000000005F70000-0x0000000005F80000-memory.dmp

        Filesize

        64KB

      • memory/1704-1104-0x0000000006E30000-0x0000000006E6C000-memory.dmp

        Filesize

        240KB

      • memory/1704-1103-0x0000000006E10000-0x0000000006E22000-memory.dmp

        Filesize

        72KB

      • memory/1704-1101-0x0000000006630000-0x0000000006C48000-memory.dmp

        Filesize

        6.1MB

      • memory/1704-293-0x0000000005F70000-0x0000000005F80000-memory.dmp

        Filesize

        64KB

      • memory/1704-218-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/1704-290-0x0000000005F70000-0x0000000005F80000-memory.dmp

        Filesize

        64KB

      • memory/1704-286-0x0000000001A30000-0x0000000001A7B000-memory.dmp

        Filesize

        300KB

      • memory/1704-224-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/1704-192-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/1704-191-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/1704-194-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/1704-196-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/1704-202-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/1704-204-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/1704-200-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/1704-222-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/1704-1116-0x0000000005F70000-0x0000000005F80000-memory.dmp

        Filesize

        64KB

      • memory/1704-220-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/1704-210-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/1704-214-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/1704-212-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/1704-216-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/3912-181-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/3912-173-0x00000000027D0000-0x00000000027E2000-memory.dmp

        Filesize

        72KB

      • memory/3912-148-0x00000000007F0000-0x000000000081D000-memory.dmp

        Filesize

        180KB

      • memory/3912-151-0x00000000027D0000-0x00000000027E2000-memory.dmp

        Filesize

        72KB

      • memory/3912-153-0x00000000027D0000-0x00000000027E2000-memory.dmp

        Filesize

        72KB

      • memory/3912-186-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/3912-185-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/3912-184-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/3912-183-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/3912-150-0x00000000027D0000-0x00000000027E2000-memory.dmp

        Filesize

        72KB

      • memory/3912-155-0x00000000027D0000-0x00000000027E2000-memory.dmp

        Filesize

        72KB

      • memory/3912-180-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/3912-179-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/3912-178-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/3912-177-0x00000000027D0000-0x00000000027E2000-memory.dmp

        Filesize

        72KB

      • memory/3912-175-0x00000000027D0000-0x00000000027E2000-memory.dmp

        Filesize

        72KB

      • memory/3912-171-0x00000000027D0000-0x00000000027E2000-memory.dmp

        Filesize

        72KB

      • memory/3912-169-0x00000000027D0000-0x00000000027E2000-memory.dmp

        Filesize

        72KB

      • memory/3912-167-0x00000000027D0000-0x00000000027E2000-memory.dmp

        Filesize

        72KB

      • memory/3912-165-0x00000000027D0000-0x00000000027E2000-memory.dmp

        Filesize

        72KB

      • memory/3912-163-0x00000000027D0000-0x00000000027E2000-memory.dmp

        Filesize

        72KB

      • memory/3912-161-0x00000000027D0000-0x00000000027E2000-memory.dmp

        Filesize

        72KB

      • memory/3912-159-0x00000000027D0000-0x00000000027E2000-memory.dmp

        Filesize

        72KB

      • memory/3912-149-0x0000000004E40000-0x00000000053E4000-memory.dmp

        Filesize

        5.6MB

      • memory/3912-157-0x00000000027D0000-0x00000000027E2000-memory.dmp

        Filesize

        72KB

      • memory/4856-1122-0x00000000008F0000-0x0000000000922000-memory.dmp

        Filesize

        200KB

      • memory/4856-1123-0x0000000005360000-0x0000000005370000-memory.dmp

        Filesize

        64KB