Analysis

  • max time kernel
    128s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 01:24

General

  • Target

    ba433b5999b683001205825fd41ef65c32f8b8e90f4d2ee62385c6b50c2ed209.exe

  • Size

    690KB

  • MD5

    a2aae0b671b1bc782097483a7fc32065

  • SHA1

    7ab9f5c1ddb8df8abf3272df9884e960d14c655e

  • SHA256

    ba433b5999b683001205825fd41ef65c32f8b8e90f4d2ee62385c6b50c2ed209

  • SHA512

    29f2819ee939918c39741ef036e3deb2c12562b5de88260e41e998d01e9b9278c99213eba10ebc20705ded4c79931e7d6ac2e929911581f19bcc0e176fed725f

  • SSDEEP

    12288:wMrqy90AG4U9/biS46GfIyK65hLu7UXyxLuXd2D+vdFLlfigs/28pbDVdQ4:KyPyiSBGx5fa7UXS0cD+vLlagDkbD3b

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba433b5999b683001205825fd41ef65c32f8b8e90f4d2ee62385c6b50c2ed209.exe
    "C:\Users\Admin\AppData\Local\Temp\ba433b5999b683001205825fd41ef65c32f8b8e90f4d2ee62385c6b50c2ed209.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un151934.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un151934.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1436
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5169.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5169.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2072
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 1080
          4⤵
          • Program crash
          PID:1672
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1113.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1113.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1936
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 1344
          4⤵
          • Program crash
          PID:4984
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si690482.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si690482.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3940
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2072 -ip 2072
    1⤵
      PID:1520
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1936 -ip 1936
      1⤵
        PID:4644

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si690482.exe

        Filesize

        175KB

        MD5

        ec4a8ebe6e4fb9ee986e74a2a2ff5a62

        SHA1

        dec249256f12117f7ac955754ab6b348475f1be7

        SHA256

        49f6827115fc2d7f554a98d632aa46471bd5bae11f2938b8fb67cf803cafca06

        SHA512

        158e80950f27e003ec7df30907412cf429d0e4dc3fec9a48cdb4715e1399fcb7eea16d7c82f1e7644150b92aabdc9fb7469ae07412369894813d56e210a29fc7

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si690482.exe

        Filesize

        175KB

        MD5

        ec4a8ebe6e4fb9ee986e74a2a2ff5a62

        SHA1

        dec249256f12117f7ac955754ab6b348475f1be7

        SHA256

        49f6827115fc2d7f554a98d632aa46471bd5bae11f2938b8fb67cf803cafca06

        SHA512

        158e80950f27e003ec7df30907412cf429d0e4dc3fec9a48cdb4715e1399fcb7eea16d7c82f1e7644150b92aabdc9fb7469ae07412369894813d56e210a29fc7

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un151934.exe

        Filesize

        548KB

        MD5

        8b10c12939d91dff8af57d32a342ecc4

        SHA1

        ca2ccef61b6979b1de7e1263e0014a06054d9a6a

        SHA256

        fc6c973bec17dba026a723a36a44238c79593c3187719283ddcbfb6cf7a82014

        SHA512

        bd4095ef2522ccda5b2353d1c734d0382c95fb8ce2b1af45fde8d611438e7778e6d0add9cc7c1e4c640704d7166bdbe6f5ff1f260b8502639d27bc508773d748

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un151934.exe

        Filesize

        548KB

        MD5

        8b10c12939d91dff8af57d32a342ecc4

        SHA1

        ca2ccef61b6979b1de7e1263e0014a06054d9a6a

        SHA256

        fc6c973bec17dba026a723a36a44238c79593c3187719283ddcbfb6cf7a82014

        SHA512

        bd4095ef2522ccda5b2353d1c734d0382c95fb8ce2b1af45fde8d611438e7778e6d0add9cc7c1e4c640704d7166bdbe6f5ff1f260b8502639d27bc508773d748

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5169.exe

        Filesize

        291KB

        MD5

        60a7f226ecc89c50834f7023811a447b

        SHA1

        8e3e28c1278ebb043d269872bbcb8e6aaa7ba2d1

        SHA256

        af45dd49db3cfa275e35fe80c70971660c031b4edd98cf5d70ae374decb33f2d

        SHA512

        48d30c78ecbd607f9e05983682ffdfade54b4b693acb6bcc68a5061c1eccb70d336e2951e17a6910fc90248d3f7120027f77f64a0a02a862f4d6dbae2adeba48

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5169.exe

        Filesize

        291KB

        MD5

        60a7f226ecc89c50834f7023811a447b

        SHA1

        8e3e28c1278ebb043d269872bbcb8e6aaa7ba2d1

        SHA256

        af45dd49db3cfa275e35fe80c70971660c031b4edd98cf5d70ae374decb33f2d

        SHA512

        48d30c78ecbd607f9e05983682ffdfade54b4b693acb6bcc68a5061c1eccb70d336e2951e17a6910fc90248d3f7120027f77f64a0a02a862f4d6dbae2adeba48

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1113.exe

        Filesize

        345KB

        MD5

        827fc27d806f5a832cef552ed4ff9ea7

        SHA1

        ccaed057bc9460c586b717573cf7739bb0a7244f

        SHA256

        514592b2ca4472850a70e4ecf13edb0fda8eea1e39cdaf12715ad63bff0eaecc

        SHA512

        1f260dd753f4cbd46714c3f9db22bc77119aaeaecbe1efa3f9a840e9908c0e1bc2123c1688bac84c2187f284f449357500ce0558123e20cd4b26bc5aac1f1f6f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1113.exe

        Filesize

        345KB

        MD5

        827fc27d806f5a832cef552ed4ff9ea7

        SHA1

        ccaed057bc9460c586b717573cf7739bb0a7244f

        SHA256

        514592b2ca4472850a70e4ecf13edb0fda8eea1e39cdaf12715ad63bff0eaecc

        SHA512

        1f260dd753f4cbd46714c3f9db22bc77119aaeaecbe1efa3f9a840e9908c0e1bc2123c1688bac84c2187f284f449357500ce0558123e20cd4b26bc5aac1f1f6f

      • memory/1936-227-0x0000000005FF0000-0x000000000602F000-memory.dmp

        Filesize

        252KB

      • memory/1936-1102-0x0000000006E10000-0x0000000006E22000-memory.dmp

        Filesize

        72KB

      • memory/1936-1115-0x00000000060C0000-0x00000000060D0000-memory.dmp

        Filesize

        64KB

      • memory/1936-1114-0x00000000082B0000-0x0000000008300000-memory.dmp

        Filesize

        320KB

      • memory/1936-1113-0x0000000008220000-0x0000000008296000-memory.dmp

        Filesize

        472KB

      • memory/1936-1110-0x00000000060C0000-0x00000000060D0000-memory.dmp

        Filesize

        64KB

      • memory/1936-1111-0x00000000060C0000-0x00000000060D0000-memory.dmp

        Filesize

        64KB

      • memory/1936-1112-0x00000000060C0000-0x00000000060D0000-memory.dmp

        Filesize

        64KB

      • memory/1936-1108-0x0000000007AC0000-0x0000000007FEC000-memory.dmp

        Filesize

        5.2MB

      • memory/1936-1107-0x00000000078E0000-0x0000000007AA2000-memory.dmp

        Filesize

        1.8MB

      • memory/1936-1106-0x00000000071C0000-0x0000000007226000-memory.dmp

        Filesize

        408KB

      • memory/1936-1105-0x0000000007120000-0x00000000071B2000-memory.dmp

        Filesize

        584KB

      • memory/1936-1104-0x0000000006E30000-0x0000000006E6C000-memory.dmp

        Filesize

        240KB

      • memory/1936-1103-0x00000000060C0000-0x00000000060D0000-memory.dmp

        Filesize

        64KB

      • memory/1936-1101-0x0000000006CD0000-0x0000000006DDA000-memory.dmp

        Filesize

        1.0MB

      • memory/1936-1100-0x0000000006680000-0x0000000006C98000-memory.dmp

        Filesize

        6.1MB

      • memory/1936-225-0x0000000005FF0000-0x000000000602F000-memory.dmp

        Filesize

        252KB

      • memory/1936-223-0x0000000005FF0000-0x000000000602F000-memory.dmp

        Filesize

        252KB

      • memory/1936-221-0x0000000005FF0000-0x000000000602F000-memory.dmp

        Filesize

        252KB

      • memory/1936-219-0x0000000005FF0000-0x000000000602F000-memory.dmp

        Filesize

        252KB

      • memory/1936-217-0x0000000005FF0000-0x000000000602F000-memory.dmp

        Filesize

        252KB

      • memory/1936-215-0x0000000005FF0000-0x000000000602F000-memory.dmp

        Filesize

        252KB

      • memory/1936-213-0x0000000005FF0000-0x000000000602F000-memory.dmp

        Filesize

        252KB

      • memory/1936-191-0x00000000033B0000-0x00000000033FB000-memory.dmp

        Filesize

        300KB

      • memory/1936-192-0x00000000060C0000-0x00000000060D0000-memory.dmp

        Filesize

        64KB

      • memory/1936-193-0x00000000060C0000-0x00000000060D0000-memory.dmp

        Filesize

        64KB

      • memory/1936-194-0x0000000005FF0000-0x000000000602F000-memory.dmp

        Filesize

        252KB

      • memory/1936-195-0x0000000005FF0000-0x000000000602F000-memory.dmp

        Filesize

        252KB

      • memory/1936-197-0x0000000005FF0000-0x000000000602F000-memory.dmp

        Filesize

        252KB

      • memory/1936-199-0x0000000005FF0000-0x000000000602F000-memory.dmp

        Filesize

        252KB

      • memory/1936-201-0x0000000005FF0000-0x000000000602F000-memory.dmp

        Filesize

        252KB

      • memory/1936-203-0x0000000005FF0000-0x000000000602F000-memory.dmp

        Filesize

        252KB

      • memory/1936-205-0x0000000005FF0000-0x000000000602F000-memory.dmp

        Filesize

        252KB

      • memory/1936-207-0x0000000005FF0000-0x000000000602F000-memory.dmp

        Filesize

        252KB

      • memory/1936-209-0x0000000005FF0000-0x000000000602F000-memory.dmp

        Filesize

        252KB

      • memory/1936-211-0x0000000005FF0000-0x000000000602F000-memory.dmp

        Filesize

        252KB

      • memory/2072-174-0x00000000024D0000-0x00000000024E2000-memory.dmp

        Filesize

        72KB

      • memory/2072-160-0x00000000024D0000-0x00000000024E2000-memory.dmp

        Filesize

        72KB

      • memory/2072-151-0x00000000023B0000-0x00000000023C0000-memory.dmp

        Filesize

        64KB

      • memory/2072-184-0x00000000023B0000-0x00000000023C0000-memory.dmp

        Filesize

        64KB

      • memory/2072-183-0x00000000023B0000-0x00000000023C0000-memory.dmp

        Filesize

        64KB

      • memory/2072-182-0x00000000023B0000-0x00000000023C0000-memory.dmp

        Filesize

        64KB

      • memory/2072-181-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/2072-150-0x00000000023B0000-0x00000000023C0000-memory.dmp

        Filesize

        64KB

      • memory/2072-180-0x00000000024D0000-0x00000000024E2000-memory.dmp

        Filesize

        72KB

      • memory/2072-178-0x00000000024D0000-0x00000000024E2000-memory.dmp

        Filesize

        72KB

      • memory/2072-153-0x00000000024D0000-0x00000000024E2000-memory.dmp

        Filesize

        72KB

      • memory/2072-176-0x00000000024D0000-0x00000000024E2000-memory.dmp

        Filesize

        72KB

      • memory/2072-186-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/2072-172-0x00000000024D0000-0x00000000024E2000-memory.dmp

        Filesize

        72KB

      • memory/2072-154-0x00000000024D0000-0x00000000024E2000-memory.dmp

        Filesize

        72KB

      • memory/2072-168-0x00000000024D0000-0x00000000024E2000-memory.dmp

        Filesize

        72KB

      • memory/2072-166-0x00000000024D0000-0x00000000024E2000-memory.dmp

        Filesize

        72KB

      • memory/2072-164-0x00000000024D0000-0x00000000024E2000-memory.dmp

        Filesize

        72KB

      • memory/2072-162-0x00000000024D0000-0x00000000024E2000-memory.dmp

        Filesize

        72KB

      • memory/2072-152-0x00000000023B0000-0x00000000023C0000-memory.dmp

        Filesize

        64KB

      • memory/2072-158-0x00000000024D0000-0x00000000024E2000-memory.dmp

        Filesize

        72KB

      • memory/2072-170-0x00000000024D0000-0x00000000024E2000-memory.dmp

        Filesize

        72KB

      • memory/2072-156-0x00000000024D0000-0x00000000024E2000-memory.dmp

        Filesize

        72KB

      • memory/2072-149-0x0000000004E50000-0x00000000053F4000-memory.dmp

        Filesize

        5.6MB

      • memory/2072-148-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/3940-1121-0x00000000005B0000-0x00000000005E2000-memory.dmp

        Filesize

        200KB

      • memory/3940-1122-0x0000000004F80000-0x0000000004F90000-memory.dmp

        Filesize

        64KB