Analysis

  • max time kernel
    129s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 01:50

General

  • Target

    12f3117f844d4837e5dd00abe0b1d07bfd3ba9288ca5bfcb014716948df839bc.exe

  • Size

    689KB

  • MD5

    392df10a262d849d35c36f95c8c70f72

  • SHA1

    ede5b3deda6ff77671ba7ff96db31e6e6d32bf3b

  • SHA256

    12f3117f844d4837e5dd00abe0b1d07bfd3ba9288ca5bfcb014716948df839bc

  • SHA512

    12bda56abfdf35e85505f6c648d541778037e2522b1716a19440bdb1acbeb0bd296d91b543954e182e4fe6965a3059466ab740aa55f9c02dd1cfb1f6ed3f37ae

  • SSDEEP

    12288:5Mruy908KKyFM1ctruyG65hLuAV9ahyVdRmJovRF8yfigK/P1IWsY55:nyT4NhNfaWaIdmJoD8yag8Is5

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12f3117f844d4837e5dd00abe0b1d07bfd3ba9288ca5bfcb014716948df839bc.exe
    "C:\Users\Admin\AppData\Local\Temp\12f3117f844d4837e5dd00abe0b1d07bfd3ba9288ca5bfcb014716948df839bc.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4908
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un023443.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un023443.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1060
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1582.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1582.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3744
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 1080
          4⤵
          • Program crash
          PID:2168
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7530.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7530.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4864
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4864 -s 1348
          4⤵
          • Program crash
          PID:668
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si155959.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si155959.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3464
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3744 -ip 3744
    1⤵
      PID:4912
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4864 -ip 4864
      1⤵
        PID:1168
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:4224

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si155959.exe

        Filesize

        175KB

        MD5

        144b29c437f153084628a551f9eca79e

        SHA1

        3575ccc63375dda5bf7e4d1a4ea11e2c20924400

        SHA256

        03c8f1b974eac0097cbe6c4f49457db725dc4d2e0a2c8c3889f8d039d0c62ba0

        SHA512

        297b4f0467480d059d018f198b897323ffa0391b1095deac1097286b06158954aba9830b4fa7a9b7d5751499d82164f175a9134715d46ee90f9bb6334d5a390d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si155959.exe

        Filesize

        175KB

        MD5

        144b29c437f153084628a551f9eca79e

        SHA1

        3575ccc63375dda5bf7e4d1a4ea11e2c20924400

        SHA256

        03c8f1b974eac0097cbe6c4f49457db725dc4d2e0a2c8c3889f8d039d0c62ba0

        SHA512

        297b4f0467480d059d018f198b897323ffa0391b1095deac1097286b06158954aba9830b4fa7a9b7d5751499d82164f175a9134715d46ee90f9bb6334d5a390d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un023443.exe

        Filesize

        547KB

        MD5

        3cd38f7e3402207bdff420087abd518f

        SHA1

        33a9042273592b65682039c55d73577156fdc82a

        SHA256

        136c012fb834d428d0f5a65efcd5ca4f641496d9787d3bc7953ab833a14cedbc

        SHA512

        1f9742bc26456d726be8156518401fea3167ab3c5464c64e21c9e48a9c8761a5b982ac4cfec2a6c7457e99baeed217a18da835f7a1acb9be55b52f05e81cc1d4

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un023443.exe

        Filesize

        547KB

        MD5

        3cd38f7e3402207bdff420087abd518f

        SHA1

        33a9042273592b65682039c55d73577156fdc82a

        SHA256

        136c012fb834d428d0f5a65efcd5ca4f641496d9787d3bc7953ab833a14cedbc

        SHA512

        1f9742bc26456d726be8156518401fea3167ab3c5464c64e21c9e48a9c8761a5b982ac4cfec2a6c7457e99baeed217a18da835f7a1acb9be55b52f05e81cc1d4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1582.exe

        Filesize

        291KB

        MD5

        a5a13e1be3a4fa5bdc9fe32362393aaa

        SHA1

        2d6547943fb350a97ccd5d79c3cc2c7cdba3d6fc

        SHA256

        4c59e82b07a12bb495912fa54f4e1f41a205f5bb9e275f0febcadca887230232

        SHA512

        5d9ee70dcd6c55f36a2c6e77f0f71f5f9bdfb1830f04b7651fe1d5c4a8259b4058a48b07c9df826b8a48826762571b7c66e921cb1a4ab3cfd4106d006677ef09

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1582.exe

        Filesize

        291KB

        MD5

        a5a13e1be3a4fa5bdc9fe32362393aaa

        SHA1

        2d6547943fb350a97ccd5d79c3cc2c7cdba3d6fc

        SHA256

        4c59e82b07a12bb495912fa54f4e1f41a205f5bb9e275f0febcadca887230232

        SHA512

        5d9ee70dcd6c55f36a2c6e77f0f71f5f9bdfb1830f04b7651fe1d5c4a8259b4058a48b07c9df826b8a48826762571b7c66e921cb1a4ab3cfd4106d006677ef09

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7530.exe

        Filesize

        345KB

        MD5

        d9cdecc926dde40baedc9fd7f277fdf5

        SHA1

        a1518b811b1ed492dd11d3450cb00c78b1f1ae26

        SHA256

        a441cc02a0bf5f4dc3db240482e31a5ab449fcabce0da3e89254878954207093

        SHA512

        b474b00c84488207d0cb41a126cdba3a761f3313f7b3efc1841254bf2bbc263580eeeee22fde8e8cdc1366a70f4a793b853d7b03bcaa68e498bee383fae49b21

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7530.exe

        Filesize

        345KB

        MD5

        d9cdecc926dde40baedc9fd7f277fdf5

        SHA1

        a1518b811b1ed492dd11d3450cb00c78b1f1ae26

        SHA256

        a441cc02a0bf5f4dc3db240482e31a5ab449fcabce0da3e89254878954207093

        SHA512

        b474b00c84488207d0cb41a126cdba3a761f3313f7b3efc1841254bf2bbc263580eeeee22fde8e8cdc1366a70f4a793b853d7b03bcaa68e498bee383fae49b21

      • memory/3464-1120-0x0000000000F00000-0x0000000000F32000-memory.dmp

        Filesize

        200KB

      • memory/3464-1121-0x0000000005AC0000-0x0000000005AD0000-memory.dmp

        Filesize

        64KB

      • memory/3744-163-0x0000000004C90000-0x0000000004CA0000-memory.dmp

        Filesize

        64KB

      • memory/3744-167-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/3744-152-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/3744-154-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/3744-156-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/3744-161-0x0000000004C90000-0x0000000004CA0000-memory.dmp

        Filesize

        64KB

      • memory/3744-149-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/3744-159-0x00000000008E0000-0x000000000090D000-memory.dmp

        Filesize

        180KB

      • memory/3744-158-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/3744-162-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/3744-165-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/3744-150-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/3744-169-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/3744-171-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/3744-173-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/3744-175-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/3744-177-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/3744-179-0x0000000002740000-0x0000000002752000-memory.dmp

        Filesize

        72KB

      • memory/3744-180-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/3744-181-0x0000000004C90000-0x0000000004CA0000-memory.dmp

        Filesize

        64KB

      • memory/3744-182-0x0000000004C90000-0x0000000004CA0000-memory.dmp

        Filesize

        64KB

      • memory/3744-183-0x0000000004C90000-0x0000000004CA0000-memory.dmp

        Filesize

        64KB

      • memory/3744-185-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/3744-148-0x0000000004CA0000-0x0000000005244000-memory.dmp

        Filesize

        5.6MB

      • memory/4864-191-0x0000000003BB0000-0x0000000003BEF000-memory.dmp

        Filesize

        252KB

      • memory/4864-276-0x0000000001A30000-0x0000000001A7B000-memory.dmp

        Filesize

        300KB

      • memory/4864-195-0x0000000003BB0000-0x0000000003BEF000-memory.dmp

        Filesize

        252KB

      • memory/4864-197-0x0000000003BB0000-0x0000000003BEF000-memory.dmp

        Filesize

        252KB

      • memory/4864-199-0x0000000003BB0000-0x0000000003BEF000-memory.dmp

        Filesize

        252KB

      • memory/4864-201-0x0000000003BB0000-0x0000000003BEF000-memory.dmp

        Filesize

        252KB

      • memory/4864-203-0x0000000003BB0000-0x0000000003BEF000-memory.dmp

        Filesize

        252KB

      • memory/4864-205-0x0000000003BB0000-0x0000000003BEF000-memory.dmp

        Filesize

        252KB

      • memory/4864-207-0x0000000003BB0000-0x0000000003BEF000-memory.dmp

        Filesize

        252KB

      • memory/4864-209-0x0000000003BB0000-0x0000000003BEF000-memory.dmp

        Filesize

        252KB

      • memory/4864-211-0x0000000003BB0000-0x0000000003BEF000-memory.dmp

        Filesize

        252KB

      • memory/4864-213-0x0000000003BB0000-0x0000000003BEF000-memory.dmp

        Filesize

        252KB

      • memory/4864-215-0x0000000003BB0000-0x0000000003BEF000-memory.dmp

        Filesize

        252KB

      • memory/4864-219-0x0000000003BB0000-0x0000000003BEF000-memory.dmp

        Filesize

        252KB

      • memory/4864-221-0x0000000003BB0000-0x0000000003BEF000-memory.dmp

        Filesize

        252KB

      • memory/4864-217-0x0000000003BB0000-0x0000000003BEF000-memory.dmp

        Filesize

        252KB

      • memory/4864-223-0x0000000003BB0000-0x0000000003BEF000-memory.dmp

        Filesize

        252KB

      • memory/4864-193-0x0000000003BB0000-0x0000000003BEF000-memory.dmp

        Filesize

        252KB

      • memory/4864-278-0x0000000006210000-0x0000000006220000-memory.dmp

        Filesize

        64KB

      • memory/4864-280-0x0000000006210000-0x0000000006220000-memory.dmp

        Filesize

        64KB

      • memory/4864-1099-0x00000000067D0000-0x0000000006DE8000-memory.dmp

        Filesize

        6.1MB

      • memory/4864-1100-0x00000000060F0000-0x00000000061FA000-memory.dmp

        Filesize

        1.0MB

      • memory/4864-1102-0x0000000006E10000-0x0000000006E22000-memory.dmp

        Filesize

        72KB

      • memory/4864-1101-0x0000000006210000-0x0000000006220000-memory.dmp

        Filesize

        64KB

      • memory/4864-1103-0x0000000006E30000-0x0000000006E6C000-memory.dmp

        Filesize

        240KB

      • memory/4864-1104-0x0000000007120000-0x00000000071B2000-memory.dmp

        Filesize

        584KB

      • memory/4864-1105-0x00000000071C0000-0x0000000007226000-memory.dmp

        Filesize

        408KB

      • memory/4864-1107-0x0000000006210000-0x0000000006220000-memory.dmp

        Filesize

        64KB

      • memory/4864-1108-0x0000000006210000-0x0000000006220000-memory.dmp

        Filesize

        64KB

      • memory/4864-1109-0x0000000006210000-0x0000000006220000-memory.dmp

        Filesize

        64KB

      • memory/4864-1110-0x0000000007B10000-0x0000000007B86000-memory.dmp

        Filesize

        472KB

      • memory/4864-1111-0x0000000007B90000-0x0000000007BE0000-memory.dmp

        Filesize

        320KB

      • memory/4864-190-0x0000000003BB0000-0x0000000003BEF000-memory.dmp

        Filesize

        252KB

      • memory/4864-1112-0x0000000006210000-0x0000000006220000-memory.dmp

        Filesize

        64KB

      • memory/4864-1113-0x0000000007C40000-0x0000000007E02000-memory.dmp

        Filesize

        1.8MB

      • memory/4864-1114-0x0000000008010000-0x000000000853C000-memory.dmp

        Filesize

        5.2MB