Analysis

  • max time kernel
    87s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 01:06

General

  • Target

    e303a7dbcc1dce6b01cccfa9f5336bd8a429ff433efed401dcb400197ffc0a92.exe

  • Size

    689KB

  • MD5

    9eb6b607fa7c57e1a4ce70f7c1dfec1c

  • SHA1

    ca1e785fc9502bd70f5703845fd61fcff6d075d3

  • SHA256

    e303a7dbcc1dce6b01cccfa9f5336bd8a429ff433efed401dcb400197ffc0a92

  • SHA512

    1b4a078aa09ba6f8ce961d57e3f03d60e066758e67d9b8aad8a92c8aeb90d6955c5eabbc8f369eae44748f652a72316656d7db044c4452d7ce35a23276961913

  • SSDEEP

    12288:NMray90LDLvnfD7GjfPWuKsvYyb65hLuch2qP7Ohi/jllsaBv1wmJ9vOFW0figt4:fywDbGbPW2ZGfaLIOhssaBymJ9aW0agq

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e303a7dbcc1dce6b01cccfa9f5336bd8a429ff433efed401dcb400197ffc0a92.exe
    "C:\Users\Admin\AppData\Local\Temp\e303a7dbcc1dce6b01cccfa9f5336bd8a429ff433efed401dcb400197ffc0a92.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un730324.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un730324.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5072
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3491.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3491.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1800
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 1016
          4⤵
          • Program crash
          PID:368
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7208.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7208.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4340
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4340 -s 1816
          4⤵
          • Program crash
          PID:4352
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si194320.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si194320.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:796
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1800 -ip 1800
    1⤵
      PID:668
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4340 -ip 4340
      1⤵
        PID:908

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si194320.exe

        Filesize

        175KB

        MD5

        f2f0c0a81d7b82e7bf3c7893b1a0eedf

        SHA1

        848d68d3d76a2a73e3b274d852948f14e88b63d2

        SHA256

        91aa3b26a7590f0cbe94dc0fa8ccb43e29f850ce21cac7950c3322d2d5bfcf76

        SHA512

        e6bff05c9f281c4f83740c990199774bde026cd6e6e544a89d8000dbd0d594c50188a28202cd34c44590d5f2f07457c99a70611d1e313dc4f6d9e9702afb377a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si194320.exe

        Filesize

        175KB

        MD5

        f2f0c0a81d7b82e7bf3c7893b1a0eedf

        SHA1

        848d68d3d76a2a73e3b274d852948f14e88b63d2

        SHA256

        91aa3b26a7590f0cbe94dc0fa8ccb43e29f850ce21cac7950c3322d2d5bfcf76

        SHA512

        e6bff05c9f281c4f83740c990199774bde026cd6e6e544a89d8000dbd0d594c50188a28202cd34c44590d5f2f07457c99a70611d1e313dc4f6d9e9702afb377a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un730324.exe

        Filesize

        547KB

        MD5

        192f2e6ff6b03e8958560666143967b0

        SHA1

        dc05d2068e118e46023134ddad01b4c9c0e2c471

        SHA256

        692869522de3fafae03ae3bdafb6f338ab44bd16f64762b82a69e4aa7b25077e

        SHA512

        0ef4bc5d4fe4c7d0973f3737aae5c4e39c34887612ba1287798084e4944633ae4b7fd4ec630976ccd9aee563ae6106dc497e33afa1140a2632245baf186827b6

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un730324.exe

        Filesize

        547KB

        MD5

        192f2e6ff6b03e8958560666143967b0

        SHA1

        dc05d2068e118e46023134ddad01b4c9c0e2c471

        SHA256

        692869522de3fafae03ae3bdafb6f338ab44bd16f64762b82a69e4aa7b25077e

        SHA512

        0ef4bc5d4fe4c7d0973f3737aae5c4e39c34887612ba1287798084e4944633ae4b7fd4ec630976ccd9aee563ae6106dc497e33afa1140a2632245baf186827b6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3491.exe

        Filesize

        291KB

        MD5

        6545c51a989d0668b9877d9658935556

        SHA1

        687429672bf79c5acbdb32045d2bf5ceac8bfed8

        SHA256

        22335cdf4af76a72d27e85d105b978bd9b190586a60ea2eb9e400b70279cd20d

        SHA512

        879b5fadfb28f75c68e880c6583aed3fcc6ba78b57844fe3983979b8b9c6556a39fbfd772b649e3760c90bfbf93afd7de97b3f6ac8d12e83c90f4db5902ebf46

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3491.exe

        Filesize

        291KB

        MD5

        6545c51a989d0668b9877d9658935556

        SHA1

        687429672bf79c5acbdb32045d2bf5ceac8bfed8

        SHA256

        22335cdf4af76a72d27e85d105b978bd9b190586a60ea2eb9e400b70279cd20d

        SHA512

        879b5fadfb28f75c68e880c6583aed3fcc6ba78b57844fe3983979b8b9c6556a39fbfd772b649e3760c90bfbf93afd7de97b3f6ac8d12e83c90f4db5902ebf46

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7208.exe

        Filesize

        345KB

        MD5

        7c754f909797bbe562b6f311dd84caf1

        SHA1

        fb1670cfbc7cacf2167a6167522880e8b17c2102

        SHA256

        7ce3094165d05a6b673d1cf57aecacd7c613010303bf25daa54efa7afa79860c

        SHA512

        8ea06664d5477f5fc3fdd21223d84ffae7eb3830b354a3bcf0d2ec74b29e4b49e0bea24d4561d203ba63cf02be2bb425f4f384d94d9571afd4ef3475280e5af2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7208.exe

        Filesize

        345KB

        MD5

        7c754f909797bbe562b6f311dd84caf1

        SHA1

        fb1670cfbc7cacf2167a6167522880e8b17c2102

        SHA256

        7ce3094165d05a6b673d1cf57aecacd7c613010303bf25daa54efa7afa79860c

        SHA512

        8ea06664d5477f5fc3fdd21223d84ffae7eb3830b354a3bcf0d2ec74b29e4b49e0bea24d4561d203ba63cf02be2bb425f4f384d94d9571afd4ef3475280e5af2

      • memory/796-1120-0x0000000000C10000-0x0000000000C42000-memory.dmp

        Filesize

        200KB

      • memory/796-1121-0x0000000005500000-0x0000000005510000-memory.dmp

        Filesize

        64KB

      • memory/1800-157-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/1800-167-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/1800-151-0x0000000004E60000-0x0000000004E70000-memory.dmp

        Filesize

        64KB

      • memory/1800-152-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/1800-153-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/1800-155-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/1800-149-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/1800-159-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/1800-161-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/1800-165-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/1800-163-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/1800-150-0x0000000004E60000-0x0000000004E70000-memory.dmp

        Filesize

        64KB

      • memory/1800-173-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/1800-171-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/1800-169-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/1800-175-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/1800-177-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/1800-179-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/1800-180-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/1800-181-0x0000000004E60000-0x0000000004E70000-memory.dmp

        Filesize

        64KB

      • memory/1800-182-0x0000000004E60000-0x0000000004E70000-memory.dmp

        Filesize

        64KB

      • memory/1800-184-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/1800-148-0x0000000004E70000-0x0000000005414000-memory.dmp

        Filesize

        5.6MB

      • memory/4340-192-0x0000000003890000-0x00000000038CF000-memory.dmp

        Filesize

        252KB

      • memory/4340-529-0x0000000006220000-0x0000000006230000-memory.dmp

        Filesize

        64KB

      • memory/4340-194-0x0000000003890000-0x00000000038CF000-memory.dmp

        Filesize

        252KB

      • memory/4340-196-0x0000000003890000-0x00000000038CF000-memory.dmp

        Filesize

        252KB

      • memory/4340-198-0x0000000003890000-0x00000000038CF000-memory.dmp

        Filesize

        252KB

      • memory/4340-200-0x0000000003890000-0x00000000038CF000-memory.dmp

        Filesize

        252KB

      • memory/4340-202-0x0000000003890000-0x00000000038CF000-memory.dmp

        Filesize

        252KB

      • memory/4340-204-0x0000000003890000-0x00000000038CF000-memory.dmp

        Filesize

        252KB

      • memory/4340-206-0x0000000003890000-0x00000000038CF000-memory.dmp

        Filesize

        252KB

      • memory/4340-208-0x0000000003890000-0x00000000038CF000-memory.dmp

        Filesize

        252KB

      • memory/4340-210-0x0000000003890000-0x00000000038CF000-memory.dmp

        Filesize

        252KB

      • memory/4340-212-0x0000000003890000-0x00000000038CF000-memory.dmp

        Filesize

        252KB

      • memory/4340-214-0x0000000003890000-0x00000000038CF000-memory.dmp

        Filesize

        252KB

      • memory/4340-216-0x0000000003890000-0x00000000038CF000-memory.dmp

        Filesize

        252KB

      • memory/4340-218-0x0000000003890000-0x00000000038CF000-memory.dmp

        Filesize

        252KB

      • memory/4340-220-0x0000000003890000-0x00000000038CF000-memory.dmp

        Filesize

        252KB

      • memory/4340-222-0x0000000003890000-0x00000000038CF000-memory.dmp

        Filesize

        252KB

      • memory/4340-524-0x0000000001C50000-0x0000000001C9B000-memory.dmp

        Filesize

        300KB

      • memory/4340-527-0x0000000006220000-0x0000000006230000-memory.dmp

        Filesize

        64KB

      • memory/4340-189-0x0000000003890000-0x00000000038CF000-memory.dmp

        Filesize

        252KB

      • memory/4340-531-0x0000000006220000-0x0000000006230000-memory.dmp

        Filesize

        64KB

      • memory/4340-1099-0x00000000068E0000-0x0000000006EF8000-memory.dmp

        Filesize

        6.1MB

      • memory/4340-1100-0x0000000006F00000-0x000000000700A000-memory.dmp

        Filesize

        1.0MB

      • memory/4340-1101-0x0000000003D10000-0x0000000003D22000-memory.dmp

        Filesize

        72KB

      • memory/4340-1102-0x0000000003D30000-0x0000000003D6C000-memory.dmp

        Filesize

        240KB

      • memory/4340-1103-0x0000000006220000-0x0000000006230000-memory.dmp

        Filesize

        64KB

      • memory/4340-1104-0x0000000007260000-0x00000000072F2000-memory.dmp

        Filesize

        584KB

      • memory/4340-1105-0x0000000007300000-0x0000000007366000-memory.dmp

        Filesize

        408KB

      • memory/4340-1107-0x0000000006220000-0x0000000006230000-memory.dmp

        Filesize

        64KB

      • memory/4340-1108-0x0000000006220000-0x0000000006230000-memory.dmp

        Filesize

        64KB

      • memory/4340-1109-0x0000000006220000-0x0000000006230000-memory.dmp

        Filesize

        64KB

      • memory/4340-1110-0x0000000007C60000-0x0000000007CD6000-memory.dmp

        Filesize

        472KB

      • memory/4340-1111-0x0000000007D00000-0x0000000007D50000-memory.dmp

        Filesize

        320KB

      • memory/4340-190-0x0000000003890000-0x00000000038CF000-memory.dmp

        Filesize

        252KB

      • memory/4340-1112-0x0000000006220000-0x0000000006230000-memory.dmp

        Filesize

        64KB

      • memory/4340-1113-0x0000000007EC0000-0x0000000008082000-memory.dmp

        Filesize

        1.8MB

      • memory/4340-1114-0x0000000008290000-0x00000000087BC000-memory.dmp

        Filesize

        5.2MB