Analysis

  • max time kernel
    106s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 01:20

General

  • Target

    3fccf4fc820f37cbd99790b681e34beee053c1c3a3699c5e7df9da5f7313bd47.exe

  • Size

    690KB

  • MD5

    7299d0f566de007c9fe2c2733c0bdbc4

  • SHA1

    68c7f45d72f30eaffbbe00de59cf8d67d77b72a5

  • SHA256

    3fccf4fc820f37cbd99790b681e34beee053c1c3a3699c5e7df9da5f7313bd47

  • SHA512

    55f29eb436e8956d23eb9477a9e4b0f9ef75d299e5fcc0745ad905e98339ea53ebf31f29384aabf56ecbff798e32e183907b8ca56509f1166942dbbfba6e5e13

  • SSDEEP

    12288:kMrWy90OBCcrpV1oMPya65hLumvAMSKI3VenfcdmQP3vdFPYfig775zo2fHLRkFp:iytB7l7oMqpfamvALZ3Vefs3PPYagtox

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3fccf4fc820f37cbd99790b681e34beee053c1c3a3699c5e7df9da5f7313bd47.exe
    "C:\Users\Admin\AppData\Local\Temp\3fccf4fc820f37cbd99790b681e34beee053c1c3a3699c5e7df9da5f7313bd47.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un200204.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un200204.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3928
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3712.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3712.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4172
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4172 -s 1084
          4⤵
          • Program crash
          PID:1840
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9420.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9420.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4076
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4076 -s 1316
          4⤵
          • Program crash
          PID:4440
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si418623.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si418623.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2624
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4172 -ip 4172
    1⤵
      PID:4680
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4076 -ip 4076
      1⤵
        PID:4256

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si418623.exe

        Filesize

        175KB

        MD5

        0561455944e3e5075321bfd62f2ea727

        SHA1

        fd0e7d445b7d8317c34cb0b650173a5156ba958e

        SHA256

        f6e141f6bda8a81209d472c529483ee8699cb130fdce463851eb5aa1368b3447

        SHA512

        bfa402f0ac776cd4e97620d80f0a125ec258e035a512e0eaf83efe500b2948c069102760b2c4224e38e6cab769fd069a2d69d648c63ab276cb4a4ac4a9480ca5

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si418623.exe

        Filesize

        175KB

        MD5

        0561455944e3e5075321bfd62f2ea727

        SHA1

        fd0e7d445b7d8317c34cb0b650173a5156ba958e

        SHA256

        f6e141f6bda8a81209d472c529483ee8699cb130fdce463851eb5aa1368b3447

        SHA512

        bfa402f0ac776cd4e97620d80f0a125ec258e035a512e0eaf83efe500b2948c069102760b2c4224e38e6cab769fd069a2d69d648c63ab276cb4a4ac4a9480ca5

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un200204.exe

        Filesize

        548KB

        MD5

        a6643c7b43e6c278ce2b5e4a729fd434

        SHA1

        937e302d46dfd1b63f38e09211d3d89e859b0abe

        SHA256

        da722c221c26da815c6bdcbf77a2666c24dca6ba35bae7e007eb054353a9691c

        SHA512

        be229c36422a5bd91696fd58daa8ec4744f83803aa937f132c3ea9a75e4402be3717700eafcf06123ae93ae45f34e3c5794adad391c88dab726c79f87032a3b6

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un200204.exe

        Filesize

        548KB

        MD5

        a6643c7b43e6c278ce2b5e4a729fd434

        SHA1

        937e302d46dfd1b63f38e09211d3d89e859b0abe

        SHA256

        da722c221c26da815c6bdcbf77a2666c24dca6ba35bae7e007eb054353a9691c

        SHA512

        be229c36422a5bd91696fd58daa8ec4744f83803aa937f132c3ea9a75e4402be3717700eafcf06123ae93ae45f34e3c5794adad391c88dab726c79f87032a3b6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3712.exe

        Filesize

        291KB

        MD5

        51428e1d10a3f7bb4c8fdc04ad148d16

        SHA1

        c2cfd1f053bffbbaccadfa7b69053ccf0039f8d1

        SHA256

        fad931d1819061cdb8ea6352a8e33e727c5c4cd9d943c0fbd31798277e599602

        SHA512

        b58201cec2283718fd79da73ef33ed2423f54c2e3f3f25ba42dab7dc4f865fc0ed359caaef5f3bfb12faac39efc2542a193ed59f928a839721f259670fcac178

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3712.exe

        Filesize

        291KB

        MD5

        51428e1d10a3f7bb4c8fdc04ad148d16

        SHA1

        c2cfd1f053bffbbaccadfa7b69053ccf0039f8d1

        SHA256

        fad931d1819061cdb8ea6352a8e33e727c5c4cd9d943c0fbd31798277e599602

        SHA512

        b58201cec2283718fd79da73ef33ed2423f54c2e3f3f25ba42dab7dc4f865fc0ed359caaef5f3bfb12faac39efc2542a193ed59f928a839721f259670fcac178

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9420.exe

        Filesize

        345KB

        MD5

        19d5e8c9d5bfebf47c7803b2dee2a940

        SHA1

        f286f2aa998cb23ee97382584bdfb04363fa3f18

        SHA256

        c6cca9ffa7b49b6abc4c2cea6bc24b6046f8f1e393b321dcca283432bbdbbdce

        SHA512

        76d35f551f9380da7dc2aff675cb044c618843c1f1fdda4cef64c31247ca0e48929459bb67f34592f0fc9b5d2a50fcfaa5c529beb1e88c9f82f5fb24129bcdf0

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9420.exe

        Filesize

        345KB

        MD5

        19d5e8c9d5bfebf47c7803b2dee2a940

        SHA1

        f286f2aa998cb23ee97382584bdfb04363fa3f18

        SHA256

        c6cca9ffa7b49b6abc4c2cea6bc24b6046f8f1e393b321dcca283432bbdbbdce

        SHA512

        76d35f551f9380da7dc2aff675cb044c618843c1f1fdda4cef64c31247ca0e48929459bb67f34592f0fc9b5d2a50fcfaa5c529beb1e88c9f82f5fb24129bcdf0

      • memory/2624-1122-0x0000000005370000-0x0000000005380000-memory.dmp

        Filesize

        64KB

      • memory/2624-1121-0x0000000000AC0000-0x0000000000AF2000-memory.dmp

        Filesize

        200KB

      • memory/4076-395-0x0000000006080000-0x0000000006090000-memory.dmp

        Filesize

        64KB

      • memory/4076-1104-0x0000000006080000-0x0000000006090000-memory.dmp

        Filesize

        64KB

      • memory/4076-1115-0x0000000006080000-0x0000000006090000-memory.dmp

        Filesize

        64KB

      • memory/4076-1114-0x0000000008730000-0x0000000008780000-memory.dmp

        Filesize

        320KB

      • memory/4076-1113-0x0000000008690000-0x0000000008706000-memory.dmp

        Filesize

        472KB

      • memory/4076-1112-0x0000000008040000-0x000000000856C000-memory.dmp

        Filesize

        5.2MB

      • memory/4076-1111-0x0000000007C70000-0x0000000007E32000-memory.dmp

        Filesize

        1.8MB

      • memory/4076-1110-0x0000000006080000-0x0000000006090000-memory.dmp

        Filesize

        64KB

      • memory/4076-1109-0x0000000006080000-0x0000000006090000-memory.dmp

        Filesize

        64KB

      • memory/4076-1108-0x0000000006080000-0x0000000006090000-memory.dmp

        Filesize

        64KB

      • memory/4076-1106-0x00000000077E0000-0x0000000007872000-memory.dmp

        Filesize

        584KB

      • memory/4076-1105-0x0000000007120000-0x0000000007186000-memory.dmp

        Filesize

        408KB

      • memory/4076-1103-0x0000000006E30000-0x0000000006E6C000-memory.dmp

        Filesize

        240KB

      • memory/4076-1102-0x0000000006E10000-0x0000000006E22000-memory.dmp

        Filesize

        72KB

      • memory/4076-1101-0x0000000006CD0000-0x0000000006DDA000-memory.dmp

        Filesize

        1.0MB

      • memory/4076-1100-0x0000000006640000-0x0000000006C58000-memory.dmp

        Filesize

        6.1MB

      • memory/4076-391-0x0000000001B00000-0x0000000001B4B000-memory.dmp

        Filesize

        300KB

      • memory/4076-393-0x0000000006080000-0x0000000006090000-memory.dmp

        Filesize

        64KB

      • memory/4076-224-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4076-222-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4076-220-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4076-191-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4076-192-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4076-194-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4076-196-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4076-198-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4076-200-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4076-202-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4076-204-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4076-206-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4076-208-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4076-210-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4076-212-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4076-214-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4076-216-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4076-218-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4172-174-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4172-183-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

        Filesize

        64KB

      • memory/4172-153-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4172-184-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

        Filesize

        64KB

      • memory/4172-172-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4172-151-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

        Filesize

        64KB

      • memory/4172-182-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

        Filesize

        64KB

      • memory/4172-170-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4172-180-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4172-178-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4172-156-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4172-176-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4172-186-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/4172-154-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4172-181-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/4172-168-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4172-166-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4172-164-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4172-162-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4172-160-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4172-158-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/4172-152-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

        Filesize

        64KB

      • memory/4172-150-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

        Filesize

        64KB

      • memory/4172-149-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/4172-148-0x0000000004CE0000-0x0000000005284000-memory.dmp

        Filesize

        5.6MB