Analysis

  • max time kernel
    88s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 00:57

General

  • Target

    setup.exe

  • Size

    699KB

  • MD5

    428b136f6c2f7cac893d1b08e36651a2

  • SHA1

    681461648d6ebd29b6ad0fa2c8fb18148b304a23

  • SHA256

    20fed0270b728e9f1e59f3a13ae2341087f089ac274618739c1f2de4d3978512

  • SHA512

    11a8d1fb8f9d5b58c8354b750be59de30e619d724e727c12104dc00d90da762174c25468edfaf23918bccc0df30678c926e2bfa590b5d83e09fd467cba535929

  • SSDEEP

    12288:EMrDy90JW7/U4FK7/irdxgXuh4CjSrGMFqfej7cxor7ic:fykAr+iTMtBrlCeHcxor7P

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un901488.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un901488.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2464
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2072.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2072.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2248
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 1084
          4⤵
          • Program crash
          PID:5076
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7650.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7650.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4948
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 1696
          4⤵
          • Program crash
          PID:4352
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si658509.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si658509.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1408
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2248 -ip 2248
    1⤵
      PID:4108
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4948 -ip 4948
      1⤵
        PID:1812

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si658509.exe
        Filesize

        175KB

        MD5

        d290a8179e666e9c40fafb2d9e632281

        SHA1

        8c5a8c429ca56f90f674d5309455115e2f012ad5

        SHA256

        d420a728a63a6369037d46fbff2a40fa52b2045e4a8ddf4a75257756038890f2

        SHA512

        76a6f4abd1b7ea626a33eb39bbe2047d6b29c78f19c93eee9bfe5ad4ca4d269dbf7055e07888f32317dc69e29ffe5f23af82b8f0b9b6e5990f385160d568db7c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si658509.exe
        Filesize

        175KB

        MD5

        d290a8179e666e9c40fafb2d9e632281

        SHA1

        8c5a8c429ca56f90f674d5309455115e2f012ad5

        SHA256

        d420a728a63a6369037d46fbff2a40fa52b2045e4a8ddf4a75257756038890f2

        SHA512

        76a6f4abd1b7ea626a33eb39bbe2047d6b29c78f19c93eee9bfe5ad4ca4d269dbf7055e07888f32317dc69e29ffe5f23af82b8f0b9b6e5990f385160d568db7c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un901488.exe
        Filesize

        557KB

        MD5

        255de320d6cad4722e0eabb2f92047b8

        SHA1

        8a277f54ba36dd907e81d513f2033090a42edf88

        SHA256

        cc0f1f8c28cdaa2cc982655cf858d8b19b843f176c2fdac8d5fd1ee820c5285e

        SHA512

        a6aa3431daa13ff3a092cdb6614b304f884289ecff50d8927413bef141bfb0b02da63970e702d2f2f221911d0de038cb4b62b4bd840763657539302287ac7581

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un901488.exe
        Filesize

        557KB

        MD5

        255de320d6cad4722e0eabb2f92047b8

        SHA1

        8a277f54ba36dd907e81d513f2033090a42edf88

        SHA256

        cc0f1f8c28cdaa2cc982655cf858d8b19b843f176c2fdac8d5fd1ee820c5285e

        SHA512

        a6aa3431daa13ff3a092cdb6614b304f884289ecff50d8927413bef141bfb0b02da63970e702d2f2f221911d0de038cb4b62b4bd840763657539302287ac7581

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2072.exe
        Filesize

        307KB

        MD5

        d7540529573170feb26fe106cc723e12

        SHA1

        0ef542a6c05aa4f49034b21b172f787383a610fe

        SHA256

        7803d47bab1a5f582f6c0b07cb2d41e049475d878e15006b02bfa90d10f57887

        SHA512

        035b73de7ae35bfe5018a626f795d79737d63217b7abdd3582b6b4014a143f08ffc621b8e4bbbef58170e48419d5cde49eff3bc99a964568be2022d8e33d607d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2072.exe
        Filesize

        307KB

        MD5

        d7540529573170feb26fe106cc723e12

        SHA1

        0ef542a6c05aa4f49034b21b172f787383a610fe

        SHA256

        7803d47bab1a5f582f6c0b07cb2d41e049475d878e15006b02bfa90d10f57887

        SHA512

        035b73de7ae35bfe5018a626f795d79737d63217b7abdd3582b6b4014a143f08ffc621b8e4bbbef58170e48419d5cde49eff3bc99a964568be2022d8e33d607d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7650.exe
        Filesize

        365KB

        MD5

        12415a60c751a10ec84b1d3c256eecdb

        SHA1

        120ea9985ca8c9c844254c37e014836263ea8f79

        SHA256

        6788ef9cc90c54d2549d8e552b23c11f9ec8094ce5aa2ec97c6e139d66236010

        SHA512

        97d448028faf480cd24ee44b97c1485f1502f200ea8c9f5544bcb55007bc6c17968f195d8c93327c1d7ed9edd505cd6597c9f4129ec10e956736b895c51adcae

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7650.exe
        Filesize

        365KB

        MD5

        12415a60c751a10ec84b1d3c256eecdb

        SHA1

        120ea9985ca8c9c844254c37e014836263ea8f79

        SHA256

        6788ef9cc90c54d2549d8e552b23c11f9ec8094ce5aa2ec97c6e139d66236010

        SHA512

        97d448028faf480cd24ee44b97c1485f1502f200ea8c9f5544bcb55007bc6c17968f195d8c93327c1d7ed9edd505cd6597c9f4129ec10e956736b895c51adcae

      • memory/1408-1122-0x0000000000440000-0x0000000000472000-memory.dmp
        Filesize

        200KB

      • memory/1408-1123-0x0000000004D90000-0x0000000004DA0000-memory.dmp
        Filesize

        64KB

      • memory/2248-159-0x0000000002720000-0x0000000002732000-memory.dmp
        Filesize

        72KB

      • memory/2248-173-0x0000000002720000-0x0000000002732000-memory.dmp
        Filesize

        72KB

      • memory/2248-151-0x0000000002720000-0x0000000002732000-memory.dmp
        Filesize

        72KB

      • memory/2248-153-0x0000000002720000-0x0000000002732000-memory.dmp
        Filesize

        72KB

      • memory/2248-155-0x0000000002720000-0x0000000002732000-memory.dmp
        Filesize

        72KB

      • memory/2248-157-0x0000000002720000-0x0000000002732000-memory.dmp
        Filesize

        72KB

      • memory/2248-149-0x0000000004E30000-0x00000000053D4000-memory.dmp
        Filesize

        5.6MB

      • memory/2248-161-0x0000000002720000-0x0000000002732000-memory.dmp
        Filesize

        72KB

      • memory/2248-163-0x0000000002720000-0x0000000002732000-memory.dmp
        Filesize

        72KB

      • memory/2248-165-0x0000000002720000-0x0000000002732000-memory.dmp
        Filesize

        72KB

      • memory/2248-167-0x0000000002720000-0x0000000002732000-memory.dmp
        Filesize

        72KB

      • memory/2248-169-0x0000000002720000-0x0000000002732000-memory.dmp
        Filesize

        72KB

      • memory/2248-171-0x0000000002720000-0x0000000002732000-memory.dmp
        Filesize

        72KB

      • memory/2248-150-0x0000000002720000-0x0000000002732000-memory.dmp
        Filesize

        72KB

      • memory/2248-175-0x0000000002720000-0x0000000002732000-memory.dmp
        Filesize

        72KB

      • memory/2248-177-0x0000000002720000-0x0000000002732000-memory.dmp
        Filesize

        72KB

      • memory/2248-178-0x00000000027C0000-0x00000000027D0000-memory.dmp
        Filesize

        64KB

      • memory/2248-179-0x00000000027C0000-0x00000000027D0000-memory.dmp
        Filesize

        64KB

      • memory/2248-180-0x00000000027C0000-0x00000000027D0000-memory.dmp
        Filesize

        64KB

      • memory/2248-181-0x0000000000400000-0x000000000070F000-memory.dmp
        Filesize

        3.1MB

      • memory/2248-184-0x00000000027C0000-0x00000000027D0000-memory.dmp
        Filesize

        64KB

      • memory/2248-183-0x00000000027C0000-0x00000000027D0000-memory.dmp
        Filesize

        64KB

      • memory/2248-185-0x00000000027C0000-0x00000000027D0000-memory.dmp
        Filesize

        64KB

      • memory/2248-186-0x0000000000400000-0x000000000070F000-memory.dmp
        Filesize

        3.1MB

      • memory/2248-148-0x0000000000830000-0x000000000085D000-memory.dmp
        Filesize

        180KB

      • memory/4948-194-0x0000000004D20000-0x0000000004D5F000-memory.dmp
        Filesize

        252KB

      • memory/4948-344-0x0000000004E80000-0x0000000004E90000-memory.dmp
        Filesize

        64KB

      • memory/4948-196-0x0000000004D20000-0x0000000004D5F000-memory.dmp
        Filesize

        252KB

      • memory/4948-198-0x0000000004D20000-0x0000000004D5F000-memory.dmp
        Filesize

        252KB

      • memory/4948-200-0x0000000004D20000-0x0000000004D5F000-memory.dmp
        Filesize

        252KB

      • memory/4948-202-0x0000000004D20000-0x0000000004D5F000-memory.dmp
        Filesize

        252KB

      • memory/4948-204-0x0000000004D20000-0x0000000004D5F000-memory.dmp
        Filesize

        252KB

      • memory/4948-206-0x0000000004D20000-0x0000000004D5F000-memory.dmp
        Filesize

        252KB

      • memory/4948-208-0x0000000004D20000-0x0000000004D5F000-memory.dmp
        Filesize

        252KB

      • memory/4948-210-0x0000000004D20000-0x0000000004D5F000-memory.dmp
        Filesize

        252KB

      • memory/4948-212-0x0000000004D20000-0x0000000004D5F000-memory.dmp
        Filesize

        252KB

      • memory/4948-214-0x0000000004D20000-0x0000000004D5F000-memory.dmp
        Filesize

        252KB

      • memory/4948-216-0x0000000004D20000-0x0000000004D5F000-memory.dmp
        Filesize

        252KB

      • memory/4948-218-0x0000000004D20000-0x0000000004D5F000-memory.dmp
        Filesize

        252KB

      • memory/4948-220-0x0000000004D20000-0x0000000004D5F000-memory.dmp
        Filesize

        252KB

      • memory/4948-222-0x0000000004D20000-0x0000000004D5F000-memory.dmp
        Filesize

        252KB

      • memory/4948-224-0x0000000004D20000-0x0000000004D5F000-memory.dmp
        Filesize

        252KB

      • memory/4948-342-0x0000000004E80000-0x0000000004E90000-memory.dmp
        Filesize

        64KB

      • memory/4948-340-0x0000000000720000-0x000000000076B000-memory.dmp
        Filesize

        300KB

      • memory/4948-192-0x0000000004D20000-0x0000000004D5F000-memory.dmp
        Filesize

        252KB

      • memory/4948-347-0x0000000004E80000-0x0000000004E90000-memory.dmp
        Filesize

        64KB

      • memory/4948-1101-0x0000000005440000-0x0000000005A58000-memory.dmp
        Filesize

        6.1MB

      • memory/4948-1102-0x0000000005A60000-0x0000000005B6A000-memory.dmp
        Filesize

        1.0MB

      • memory/4948-1103-0x0000000004E10000-0x0000000004E22000-memory.dmp
        Filesize

        72KB

      • memory/4948-1104-0x0000000004E30000-0x0000000004E6C000-memory.dmp
        Filesize

        240KB

      • memory/4948-1105-0x0000000004E80000-0x0000000004E90000-memory.dmp
        Filesize

        64KB

      • memory/4948-1107-0x0000000005E10000-0x0000000005E76000-memory.dmp
        Filesize

        408KB

      • memory/4948-1108-0x00000000064E0000-0x0000000006572000-memory.dmp
        Filesize

        584KB

      • memory/4948-1109-0x0000000004E80000-0x0000000004E90000-memory.dmp
        Filesize

        64KB

      • memory/4948-1110-0x0000000004E80000-0x0000000004E90000-memory.dmp
        Filesize

        64KB

      • memory/4948-1111-0x0000000004E80000-0x0000000004E90000-memory.dmp
        Filesize

        64KB

      • memory/4948-1112-0x00000000067F0000-0x0000000006866000-memory.dmp
        Filesize

        472KB

      • memory/4948-1113-0x0000000006880000-0x00000000068D0000-memory.dmp
        Filesize

        320KB

      • memory/4948-191-0x0000000004D20000-0x0000000004D5F000-memory.dmp
        Filesize

        252KB

      • memory/4948-1114-0x0000000004E80000-0x0000000004E90000-memory.dmp
        Filesize

        64KB

      • memory/4948-1115-0x0000000006A70000-0x0000000006C32000-memory.dmp
        Filesize

        1.8MB

      • memory/4948-1116-0x0000000006C40000-0x000000000716C000-memory.dmp
        Filesize

        5.2MB