Analysis

  • max time kernel
    109s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 01:05

General

  • Target

    77b345f70904c2a0e72b84d707007138631f63b633d4deac15edfcb630e20763.exe

  • Size

    690KB

  • MD5

    68fc6b0656d121268b06b0f09fc424b6

  • SHA1

    babd10ea8de31b975276e5261da44ffe3ed4174d

  • SHA256

    77b345f70904c2a0e72b84d707007138631f63b633d4deac15edfcb630e20763

  • SHA512

    7d621839e39f212f31e5920558dbede87305f51a90b0575c75540d1ab0aabf7849d25bedca7e5273d5ea7df7e0af3519402d62bfec852d8ab41addd83d80ee49

  • SSDEEP

    12288:7Mrsy90l5EVwgG7rBGG/jiyk1MK/Xa8OW6aiOvoXFxvAFOvfigGcJlnLKsg:Lyg5HtH4CNEqnaiOg1xYOvagGOJm

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\77b345f70904c2a0e72b84d707007138631f63b633d4deac15edfcb630e20763.exe
    "C:\Users\Admin\AppData\Local\Temp\77b345f70904c2a0e72b84d707007138631f63b633d4deac15edfcb630e20763.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3516
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un511369.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un511369.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:628
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7877.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7877.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3648
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3648 -s 1080
          4⤵
          • Program crash
          PID:8
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7703.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7703.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5104
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5104 -s 1336
          4⤵
          • Program crash
          PID:2472
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si473057.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si473057.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3788
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3648 -ip 3648
    1⤵
      PID:4584
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 5104 -ip 5104
      1⤵
        PID:1896

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si473057.exe

        Filesize

        175KB

        MD5

        cc6cbdda0c8e2d6161e2116e00214160

        SHA1

        25c93b0aca1125339dc9922bcda480a04cef326c

        SHA256

        d070c857be09bad34225cd33542f6c943351e52f1d53ca9c81bfb9cb4b697d86

        SHA512

        acc211ec34fb60007a253ba8c0acacc8869224567e308b5700ebe72b0ae634d3b0a37e24929cf5b9b920bb463bcb272a357c29cb9a1cf686e155eb469f9357de

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si473057.exe

        Filesize

        175KB

        MD5

        cc6cbdda0c8e2d6161e2116e00214160

        SHA1

        25c93b0aca1125339dc9922bcda480a04cef326c

        SHA256

        d070c857be09bad34225cd33542f6c943351e52f1d53ca9c81bfb9cb4b697d86

        SHA512

        acc211ec34fb60007a253ba8c0acacc8869224567e308b5700ebe72b0ae634d3b0a37e24929cf5b9b920bb463bcb272a357c29cb9a1cf686e155eb469f9357de

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un511369.exe

        Filesize

        548KB

        MD5

        01fa3d15d87613a53d157dacfec9ca15

        SHA1

        c48ecd9e28f6e295e4bb2a59684b0cd6fc2e00b8

        SHA256

        d2354db3eecc93841fd0492d23b76956df30b6045e6350608544b37ab4dc25f1

        SHA512

        e18857b884508015fe299e05ac12c2d65f62620782bed2ad0d237e1d34ed31899acb97736897aad294f3b42adddc33bdd9a5bdb1ce60e09af72c7fba3d713c13

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un511369.exe

        Filesize

        548KB

        MD5

        01fa3d15d87613a53d157dacfec9ca15

        SHA1

        c48ecd9e28f6e295e4bb2a59684b0cd6fc2e00b8

        SHA256

        d2354db3eecc93841fd0492d23b76956df30b6045e6350608544b37ab4dc25f1

        SHA512

        e18857b884508015fe299e05ac12c2d65f62620782bed2ad0d237e1d34ed31899acb97736897aad294f3b42adddc33bdd9a5bdb1ce60e09af72c7fba3d713c13

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7877.exe

        Filesize

        291KB

        MD5

        65774cd2be736251e4393d8b5f1ddc90

        SHA1

        0a2c3403372f0bdb6b4b80d99e29b0e0031009a3

        SHA256

        c6950075c56304a7b18ef3bc4804fa36006bf68d82d7275620cf8bf80bde0aec

        SHA512

        bfb32245b1e10f55d516f3e45ee58090552e908a55900156825b6ee1fb26862661ef373ad709c7b36fa7d9ac186bafe45ced00e70ec15531163645c5721ecf6b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7877.exe

        Filesize

        291KB

        MD5

        65774cd2be736251e4393d8b5f1ddc90

        SHA1

        0a2c3403372f0bdb6b4b80d99e29b0e0031009a3

        SHA256

        c6950075c56304a7b18ef3bc4804fa36006bf68d82d7275620cf8bf80bde0aec

        SHA512

        bfb32245b1e10f55d516f3e45ee58090552e908a55900156825b6ee1fb26862661ef373ad709c7b36fa7d9ac186bafe45ced00e70ec15531163645c5721ecf6b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7703.exe

        Filesize

        345KB

        MD5

        168bb60ae888a71f8058a66b05252b97

        SHA1

        48be8d8b31179d5641c06263e378584bb31428c8

        SHA256

        16938ee990c6361c1fd2c8c16819505cb3e7d46a49f11fe886f185c96dfa73a1

        SHA512

        a7c7534c627d6c8b026f26025c5e1bbd1f4c108cdd3fde8b2b5ee1eb9ba3bbb6aae10300aa6aebcf0a3322b445022587e1e39f467e53be69cf868c83805c0a1e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7703.exe

        Filesize

        345KB

        MD5

        168bb60ae888a71f8058a66b05252b97

        SHA1

        48be8d8b31179d5641c06263e378584bb31428c8

        SHA256

        16938ee990c6361c1fd2c8c16819505cb3e7d46a49f11fe886f185c96dfa73a1

        SHA512

        a7c7534c627d6c8b026f26025c5e1bbd1f4c108cdd3fde8b2b5ee1eb9ba3bbb6aae10300aa6aebcf0a3322b445022587e1e39f467e53be69cf868c83805c0a1e

      • memory/3648-148-0x00000000008F0000-0x000000000091D000-memory.dmp

        Filesize

        180KB

      • memory/3648-150-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/3648-149-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/3648-151-0x0000000004EF0000-0x0000000005494000-memory.dmp

        Filesize

        5.6MB

      • memory/3648-152-0x0000000002570000-0x0000000002582000-memory.dmp

        Filesize

        72KB

      • memory/3648-153-0x0000000002570000-0x0000000002582000-memory.dmp

        Filesize

        72KB

      • memory/3648-155-0x0000000002570000-0x0000000002582000-memory.dmp

        Filesize

        72KB

      • memory/3648-157-0x0000000002570000-0x0000000002582000-memory.dmp

        Filesize

        72KB

      • memory/3648-159-0x0000000002570000-0x0000000002582000-memory.dmp

        Filesize

        72KB

      • memory/3648-161-0x0000000002570000-0x0000000002582000-memory.dmp

        Filesize

        72KB

      • memory/3648-163-0x0000000002570000-0x0000000002582000-memory.dmp

        Filesize

        72KB

      • memory/3648-165-0x0000000002570000-0x0000000002582000-memory.dmp

        Filesize

        72KB

      • memory/3648-167-0x0000000002570000-0x0000000002582000-memory.dmp

        Filesize

        72KB

      • memory/3648-169-0x0000000002570000-0x0000000002582000-memory.dmp

        Filesize

        72KB

      • memory/3648-171-0x0000000002570000-0x0000000002582000-memory.dmp

        Filesize

        72KB

      • memory/3648-173-0x0000000002570000-0x0000000002582000-memory.dmp

        Filesize

        72KB

      • memory/3648-175-0x0000000002570000-0x0000000002582000-memory.dmp

        Filesize

        72KB

      • memory/3648-177-0x0000000002570000-0x0000000002582000-memory.dmp

        Filesize

        72KB

      • memory/3648-179-0x0000000002570000-0x0000000002582000-memory.dmp

        Filesize

        72KB

      • memory/3648-180-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/3648-181-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/3648-182-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/3648-184-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/3788-1120-0x00000000004C0000-0x00000000004F2000-memory.dmp

        Filesize

        200KB

      • memory/3788-1122-0x0000000004D60000-0x0000000004D70000-memory.dmp

        Filesize

        64KB

      • memory/3788-1121-0x0000000004D60000-0x0000000004D70000-memory.dmp

        Filesize

        64KB

      • memory/5104-190-0x0000000003990000-0x00000000039CF000-memory.dmp

        Filesize

        252KB

      • memory/5104-464-0x00000000061F0000-0x0000000006200000-memory.dmp

        Filesize

        64KB

      • memory/5104-196-0x0000000003990000-0x00000000039CF000-memory.dmp

        Filesize

        252KB

      • memory/5104-198-0x0000000003990000-0x00000000039CF000-memory.dmp

        Filesize

        252KB

      • memory/5104-200-0x0000000003990000-0x00000000039CF000-memory.dmp

        Filesize

        252KB

      • memory/5104-202-0x0000000003990000-0x00000000039CF000-memory.dmp

        Filesize

        252KB

      • memory/5104-204-0x0000000003990000-0x00000000039CF000-memory.dmp

        Filesize

        252KB

      • memory/5104-206-0x0000000003990000-0x00000000039CF000-memory.dmp

        Filesize

        252KB

      • memory/5104-208-0x0000000003990000-0x00000000039CF000-memory.dmp

        Filesize

        252KB

      • memory/5104-210-0x0000000003990000-0x00000000039CF000-memory.dmp

        Filesize

        252KB

      • memory/5104-212-0x0000000003990000-0x00000000039CF000-memory.dmp

        Filesize

        252KB

      • memory/5104-214-0x0000000003990000-0x00000000039CF000-memory.dmp

        Filesize

        252KB

      • memory/5104-216-0x0000000003990000-0x00000000039CF000-memory.dmp

        Filesize

        252KB

      • memory/5104-218-0x0000000003990000-0x00000000039CF000-memory.dmp

        Filesize

        252KB

      • memory/5104-220-0x0000000003990000-0x00000000039CF000-memory.dmp

        Filesize

        252KB

      • memory/5104-222-0x0000000003990000-0x00000000039CF000-memory.dmp

        Filesize

        252KB

      • memory/5104-458-0x0000000001B70000-0x0000000001BBB000-memory.dmp

        Filesize

        300KB

      • memory/5104-460-0x00000000061F0000-0x0000000006200000-memory.dmp

        Filesize

        64KB

      • memory/5104-462-0x00000000061F0000-0x0000000006200000-memory.dmp

        Filesize

        64KB

      • memory/5104-194-0x0000000003990000-0x00000000039CF000-memory.dmp

        Filesize

        252KB

      • memory/5104-1099-0x00000000068B0000-0x0000000006EC8000-memory.dmp

        Filesize

        6.1MB

      • memory/5104-1100-0x0000000006ED0000-0x0000000006FDA000-memory.dmp

        Filesize

        1.0MB

      • memory/5104-1101-0x0000000006160000-0x0000000006172000-memory.dmp

        Filesize

        72KB

      • memory/5104-1103-0x0000000006180000-0x00000000061BC000-memory.dmp

        Filesize

        240KB

      • memory/5104-1102-0x00000000061F0000-0x0000000006200000-memory.dmp

        Filesize

        64KB

      • memory/5104-1104-0x0000000007260000-0x00000000072F2000-memory.dmp

        Filesize

        584KB

      • memory/5104-1105-0x0000000007300000-0x0000000007366000-memory.dmp

        Filesize

        408KB

      • memory/5104-1106-0x0000000007A00000-0x0000000007A76000-memory.dmp

        Filesize

        472KB

      • memory/5104-1107-0x0000000007A90000-0x0000000007AE0000-memory.dmp

        Filesize

        320KB

      • memory/5104-1109-0x00000000061F0000-0x0000000006200000-memory.dmp

        Filesize

        64KB

      • memory/5104-1110-0x00000000061F0000-0x0000000006200000-memory.dmp

        Filesize

        64KB

      • memory/5104-1111-0x00000000061F0000-0x0000000006200000-memory.dmp

        Filesize

        64KB

      • memory/5104-192-0x0000000003990000-0x00000000039CF000-memory.dmp

        Filesize

        252KB

      • memory/5104-189-0x0000000003990000-0x00000000039CF000-memory.dmp

        Filesize

        252KB

      • memory/5104-1112-0x00000000061F0000-0x0000000006200000-memory.dmp

        Filesize

        64KB

      • memory/5104-1113-0x000000000A2E0000-0x000000000A4A2000-memory.dmp

        Filesize

        1.8MB

      • memory/5104-1114-0x000000000A4B0000-0x000000000A9DC000-memory.dmp

        Filesize

        5.2MB