Analysis

  • max time kernel
    146s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 00:59

General

  • Target

    86aa8f904227f3d6d6255e29341d20656c4edb78553365c6faccdf542b670e39.exe

  • Size

    691KB

  • MD5

    927b65e902f1fb8adf45febb599694b3

  • SHA1

    94d50e3119f01b742d478647cd6e9df49b6558bb

  • SHA256

    86aa8f904227f3d6d6255e29341d20656c4edb78553365c6faccdf542b670e39

  • SHA512

    753013fe81933f249c783d48fb160c386cd85381b26fd30795c5c5a404ea26b5c848f1fadc77755d574ce465a0699a49317c364010253265ab5280da3027f554

  • SSDEEP

    12288:jMrcy902oigTatj558rGHOJJsyO65hLuVs0MSKI3VHvS0oT0WVzVRCGul:HyfgWT8rDtVfaVs0LZ3VHa0oTNVRCGul

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\86aa8f904227f3d6d6255e29341d20656c4edb78553365c6faccdf542b670e39.exe
    "C:\Users\Admin\AppData\Local\Temp\86aa8f904227f3d6d6255e29341d20656c4edb78553365c6faccdf542b670e39.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4420
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un769817.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un769817.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1604
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8980.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8980.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:648
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 648 -s 1080
          4⤵
          • Program crash
          PID:4240
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7237.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7237.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1992
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 648 -ip 648
    1⤵
      PID:3744

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un769817.exe

      Filesize

      549KB

      MD5

      497a87b3f80f0c466013d84981583e32

      SHA1

      1f9cdb2396edc156fd432ce152cc67df594ef527

      SHA256

      e3edc30945d8f5b9f123b091f2e4d2cb19a9643048a92f7b7558b4be15936c82

      SHA512

      67ac6dfcb30cb9a5d938d70a8778451d08dfe262442df039ac54f41b8da87febc776e0c92844e0c8f84c438f59a1b8a29973ec47b5efd1475b9ba25c7b95f9e4

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un769817.exe

      Filesize

      549KB

      MD5

      497a87b3f80f0c466013d84981583e32

      SHA1

      1f9cdb2396edc156fd432ce152cc67df594ef527

      SHA256

      e3edc30945d8f5b9f123b091f2e4d2cb19a9643048a92f7b7558b4be15936c82

      SHA512

      67ac6dfcb30cb9a5d938d70a8778451d08dfe262442df039ac54f41b8da87febc776e0c92844e0c8f84c438f59a1b8a29973ec47b5efd1475b9ba25c7b95f9e4

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8980.exe

      Filesize

      291KB

      MD5

      0c5be6b8c768893b7055f093323b5a3f

      SHA1

      0583dbd8c0ad5711f2b93cd8d07578d46b3b4561

      SHA256

      eca4cf5a08398a6b64fefc119af18acf5c3632b51ecfef7e0de9a4461d1ba679

      SHA512

      6f82ffb92f39d39e9879ae2f50feed555876a3cda1086ffba19e8298fc25daccb12aec42c93a6ab56a2906fdae3cb9aaf519d7dd1253bc2db0a59723faac684b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8980.exe

      Filesize

      291KB

      MD5

      0c5be6b8c768893b7055f093323b5a3f

      SHA1

      0583dbd8c0ad5711f2b93cd8d07578d46b3b4561

      SHA256

      eca4cf5a08398a6b64fefc119af18acf5c3632b51ecfef7e0de9a4461d1ba679

      SHA512

      6f82ffb92f39d39e9879ae2f50feed555876a3cda1086ffba19e8298fc25daccb12aec42c93a6ab56a2906fdae3cb9aaf519d7dd1253bc2db0a59723faac684b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7237.exe

      Filesize

      350KB

      MD5

      b0071dc638803a59057aec4c300168da

      SHA1

      d33ef38ea6a85bd9bca818f1f57f165792f67849

      SHA256

      916327d0f2a525bcc3045200d12731c27939a3dd37ef54ccc2aec6b02db3377d

      SHA512

      6fd435a3bc38314cfe26ccbc95446b2ece1412cc865d128c96d618cbe1d313d07bf7b81b160c9d5350083d1a789475cbee83814c17c2ed37a9ad50dbb5f14dab

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7237.exe

      Filesize

      350KB

      MD5

      b0071dc638803a59057aec4c300168da

      SHA1

      d33ef38ea6a85bd9bca818f1f57f165792f67849

      SHA256

      916327d0f2a525bcc3045200d12731c27939a3dd37ef54ccc2aec6b02db3377d

      SHA512

      6fd435a3bc38314cfe26ccbc95446b2ece1412cc865d128c96d618cbe1d313d07bf7b81b160c9d5350083d1a789475cbee83814c17c2ed37a9ad50dbb5f14dab

    • memory/648-148-0x0000000000710000-0x000000000073D000-memory.dmp

      Filesize

      180KB

    • memory/648-149-0x0000000004F90000-0x0000000005534000-memory.dmp

      Filesize

      5.6MB

    • memory/648-151-0x0000000002860000-0x0000000002872000-memory.dmp

      Filesize

      72KB

    • memory/648-153-0x0000000002860000-0x0000000002872000-memory.dmp

      Filesize

      72KB

    • memory/648-150-0x0000000002860000-0x0000000002872000-memory.dmp

      Filesize

      72KB

    • memory/648-155-0x0000000002860000-0x0000000002872000-memory.dmp

      Filesize

      72KB

    • memory/648-157-0x0000000002860000-0x0000000002872000-memory.dmp

      Filesize

      72KB

    • memory/648-159-0x0000000002860000-0x0000000002872000-memory.dmp

      Filesize

      72KB

    • memory/648-161-0x0000000002860000-0x0000000002872000-memory.dmp

      Filesize

      72KB

    • memory/648-163-0x0000000002860000-0x0000000002872000-memory.dmp

      Filesize

      72KB

    • memory/648-165-0x0000000002860000-0x0000000002872000-memory.dmp

      Filesize

      72KB

    • memory/648-167-0x0000000002860000-0x0000000002872000-memory.dmp

      Filesize

      72KB

    • memory/648-172-0x0000000004F80000-0x0000000004F90000-memory.dmp

      Filesize

      64KB

    • memory/648-170-0x0000000004F80000-0x0000000004F90000-memory.dmp

      Filesize

      64KB

    • memory/648-174-0x0000000004F80000-0x0000000004F90000-memory.dmp

      Filesize

      64KB

    • memory/648-173-0x0000000002860000-0x0000000002872000-memory.dmp

      Filesize

      72KB

    • memory/648-176-0x0000000002860000-0x0000000002872000-memory.dmp

      Filesize

      72KB

    • memory/648-169-0x0000000002860000-0x0000000002872000-memory.dmp

      Filesize

      72KB

    • memory/648-178-0x0000000002860000-0x0000000002872000-memory.dmp

      Filesize

      72KB

    • memory/648-180-0x0000000002860000-0x0000000002872000-memory.dmp

      Filesize

      72KB

    • memory/648-181-0x0000000000400000-0x000000000070B000-memory.dmp

      Filesize

      3.0MB

    • memory/648-183-0x0000000004F80000-0x0000000004F90000-memory.dmp

      Filesize

      64KB

    • memory/648-184-0x0000000004F80000-0x0000000004F90000-memory.dmp

      Filesize

      64KB

    • memory/648-185-0x0000000004F80000-0x0000000004F90000-memory.dmp

      Filesize

      64KB

    • memory/648-186-0x0000000000400000-0x000000000070B000-memory.dmp

      Filesize

      3.0MB

    • memory/1992-191-0x0000000002660000-0x000000000269F000-memory.dmp

      Filesize

      252KB

    • memory/1992-192-0x0000000002660000-0x000000000269F000-memory.dmp

      Filesize

      252KB

    • memory/1992-194-0x0000000002660000-0x000000000269F000-memory.dmp

      Filesize

      252KB

    • memory/1992-196-0x0000000002660000-0x000000000269F000-memory.dmp

      Filesize

      252KB

    • memory/1992-198-0x0000000002660000-0x000000000269F000-memory.dmp

      Filesize

      252KB

    • memory/1992-200-0x0000000002660000-0x000000000269F000-memory.dmp

      Filesize

      252KB

    • memory/1992-202-0x0000000002660000-0x000000000269F000-memory.dmp

      Filesize

      252KB

    • memory/1992-204-0x0000000002660000-0x000000000269F000-memory.dmp

      Filesize

      252KB

    • memory/1992-206-0x0000000002660000-0x000000000269F000-memory.dmp

      Filesize

      252KB

    • memory/1992-208-0x0000000002660000-0x000000000269F000-memory.dmp

      Filesize

      252KB

    • memory/1992-210-0x0000000002660000-0x000000000269F000-memory.dmp

      Filesize

      252KB

    • memory/1992-212-0x0000000002660000-0x000000000269F000-memory.dmp

      Filesize

      252KB

    • memory/1992-214-0x0000000002660000-0x000000000269F000-memory.dmp

      Filesize

      252KB

    • memory/1992-216-0x0000000002660000-0x000000000269F000-memory.dmp

      Filesize

      252KB

    • memory/1992-218-0x0000000002660000-0x000000000269F000-memory.dmp

      Filesize

      252KB

    • memory/1992-220-0x0000000002660000-0x000000000269F000-memory.dmp

      Filesize

      252KB

    • memory/1992-222-0x0000000002660000-0x000000000269F000-memory.dmp

      Filesize

      252KB

    • memory/1992-224-0x0000000002660000-0x000000000269F000-memory.dmp

      Filesize

      252KB

    • memory/1992-331-0x0000000000850000-0x000000000089B000-memory.dmp

      Filesize

      300KB

    • memory/1992-333-0x0000000000B50000-0x0000000000B60000-memory.dmp

      Filesize

      64KB

    • memory/1992-334-0x0000000000B50000-0x0000000000B60000-memory.dmp

      Filesize

      64KB

    • memory/1992-336-0x0000000000B50000-0x0000000000B60000-memory.dmp

      Filesize

      64KB

    • memory/1992-1101-0x00000000054A0000-0x0000000005AB8000-memory.dmp

      Filesize

      6.1MB

    • memory/1992-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp

      Filesize

      1.0MB

    • memory/1992-1103-0x0000000005C40000-0x0000000005C52000-memory.dmp

      Filesize

      72KB

    • memory/1992-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp

      Filesize

      240KB

    • memory/1992-1105-0x0000000000B50000-0x0000000000B60000-memory.dmp

      Filesize

      64KB

    • memory/1992-1107-0x0000000005F50000-0x0000000005FE2000-memory.dmp

      Filesize

      584KB

    • memory/1992-1108-0x0000000005FF0000-0x0000000006056000-memory.dmp

      Filesize

      408KB

    • memory/1992-1109-0x0000000006710000-0x00000000068D2000-memory.dmp

      Filesize

      1.8MB

    • memory/1992-1110-0x00000000068F0000-0x0000000006E1C000-memory.dmp

      Filesize

      5.2MB

    • memory/1992-1112-0x0000000000B50000-0x0000000000B60000-memory.dmp

      Filesize

      64KB

    • memory/1992-1111-0x0000000000B50000-0x0000000000B60000-memory.dmp

      Filesize

      64KB

    • memory/1992-1113-0x0000000000B50000-0x0000000000B60000-memory.dmp

      Filesize

      64KB

    • memory/1992-1114-0x0000000000B50000-0x0000000000B60000-memory.dmp

      Filesize

      64KB

    • memory/1992-1115-0x00000000071A0000-0x0000000007216000-memory.dmp

      Filesize

      472KB

    • memory/1992-1116-0x0000000007230000-0x0000000007280000-memory.dmp

      Filesize

      320KB