Analysis

  • max time kernel
    93s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 01:32

General

  • Target

    0047a120f6e8e50c4c3f32e36afcd449954a8fe754e96a1ac91e4d9c04de377e.exe

  • Size

    689KB

  • MD5

    719dbaf91099132827a59f330a83e749

  • SHA1

    b69bff08f10272e9b6b79446d21728a36b8a9f45

  • SHA256

    0047a120f6e8e50c4c3f32e36afcd449954a8fe754e96a1ac91e4d9c04de377e

  • SHA512

    ac33dbcf6886cbeb80162d28510f6a2558f7ddd44c0c56ce2e73e3d42efb40f6219bfb89bf300a7b69268871c32ce08f63efc03afcc850190dc2c530453559af

  • SSDEEP

    12288:BMrmy90577tlRPulRM6szyv65hLuE+K3huSvdvRvNipvXqmJsvVFxtfigaP2/S1B:7yWplEDMtuifa7KRuqCvamJsnxtagapB

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0047a120f6e8e50c4c3f32e36afcd449954a8fe754e96a1ac91e4d9c04de377e.exe
    "C:\Users\Admin\AppData\Local\Temp\0047a120f6e8e50c4c3f32e36afcd449954a8fe754e96a1ac91e4d9c04de377e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:544
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un423333.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un423333.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:564
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2602.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2602.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4380
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4380 -s 1084
          4⤵
          • Program crash
          PID:3688
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1979.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1979.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1432
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1432 -s 1368
          4⤵
          • Program crash
          PID:5048
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si715957.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si715957.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4172
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4380 -ip 4380
    1⤵
      PID:4856
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1432 -ip 1432
      1⤵
        PID:3804

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si715957.exe

        Filesize

        175KB

        MD5

        62a2831abfb957029016295090ec06fc

        SHA1

        0a25a9066f0f18cd4d2e23f58bdeb6cfe6a7d901

        SHA256

        e3c3606d0180a879155d5774d1b9d3709ae55f77460c6796c2030dc824a50dfb

        SHA512

        abafd9dcd595e6e6dc1a144c4cfeff0fb043f8ff7e5f3c679bea49d7cf93c3bea2d084486735b3a995c17b2da39045c39bf2701098e681b036243553e851ab8a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si715957.exe

        Filesize

        175KB

        MD5

        62a2831abfb957029016295090ec06fc

        SHA1

        0a25a9066f0f18cd4d2e23f58bdeb6cfe6a7d901

        SHA256

        e3c3606d0180a879155d5774d1b9d3709ae55f77460c6796c2030dc824a50dfb

        SHA512

        abafd9dcd595e6e6dc1a144c4cfeff0fb043f8ff7e5f3c679bea49d7cf93c3bea2d084486735b3a995c17b2da39045c39bf2701098e681b036243553e851ab8a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un423333.exe

        Filesize

        547KB

        MD5

        aa327e4b1777ae96905c19b3b546a82c

        SHA1

        c27a34ab9e504d99c70b9feb8a0ba20aeb35acd0

        SHA256

        ea9cf266fbc66142fff6e014cf2c3151318ae9971cee8420abf03ca7f70d5230

        SHA512

        4fa64f422fe13a223a9b5fac4bf4d506baf919e9a7117732ce9f7ce8656701589d448d32ca5cccdb084bea52ca200bb457e7a901e88d4d2954db5b7f2f3bfc78

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un423333.exe

        Filesize

        547KB

        MD5

        aa327e4b1777ae96905c19b3b546a82c

        SHA1

        c27a34ab9e504d99c70b9feb8a0ba20aeb35acd0

        SHA256

        ea9cf266fbc66142fff6e014cf2c3151318ae9971cee8420abf03ca7f70d5230

        SHA512

        4fa64f422fe13a223a9b5fac4bf4d506baf919e9a7117732ce9f7ce8656701589d448d32ca5cccdb084bea52ca200bb457e7a901e88d4d2954db5b7f2f3bfc78

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2602.exe

        Filesize

        291KB

        MD5

        31df8caf762592c6b2108f3c6fbb9456

        SHA1

        aabe5376bcf6b202ce4b2332c7d682704b8a7568

        SHA256

        83cd41d11145c68f0a6129b8d9e563279ecebe2e6079077993cfb67443300b05

        SHA512

        c71896b79b92585805f07cc07d9fecdf6baca7b9a202a88864623367ba347a8a2cf68c5b07c1a887ee54602066db12c17c06b247a29ee7a621a8c37ce2141e29

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2602.exe

        Filesize

        291KB

        MD5

        31df8caf762592c6b2108f3c6fbb9456

        SHA1

        aabe5376bcf6b202ce4b2332c7d682704b8a7568

        SHA256

        83cd41d11145c68f0a6129b8d9e563279ecebe2e6079077993cfb67443300b05

        SHA512

        c71896b79b92585805f07cc07d9fecdf6baca7b9a202a88864623367ba347a8a2cf68c5b07c1a887ee54602066db12c17c06b247a29ee7a621a8c37ce2141e29

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1979.exe

        Filesize

        345KB

        MD5

        d703a1179d379a4ad775c5eeb2dcf516

        SHA1

        f34f72246386b7891b6036f1dfd97a3d3f872aa4

        SHA256

        a27036f00ec6c6821aa50974d08c770a2e9fa8c5094922ee1669ba202f2a2e0a

        SHA512

        dba55667f8f2386e7722c16e91399078a570dad0f6d068099023654abe4208a4afa896dc8a86332bbcbbf1fd194e5d8471ddde7da6f25d47e5949908fc3f32f7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1979.exe

        Filesize

        345KB

        MD5

        d703a1179d379a4ad775c5eeb2dcf516

        SHA1

        f34f72246386b7891b6036f1dfd97a3d3f872aa4

        SHA256

        a27036f00ec6c6821aa50974d08c770a2e9fa8c5094922ee1669ba202f2a2e0a

        SHA512

        dba55667f8f2386e7722c16e91399078a570dad0f6d068099023654abe4208a4afa896dc8a86332bbcbbf1fd194e5d8471ddde7da6f25d47e5949908fc3f32f7

      • memory/1432-339-0x00000000061E0000-0x00000000061F0000-memory.dmp

        Filesize

        64KB

      • memory/1432-1102-0x0000000006F50000-0x0000000006F62000-memory.dmp

        Filesize

        72KB

      • memory/1432-1115-0x00000000061E0000-0x00000000061F0000-memory.dmp

        Filesize

        64KB

      • memory/1432-1114-0x0000000007E20000-0x000000000834C000-memory.dmp

        Filesize

        5.2MB

      • memory/1432-1113-0x0000000007C50000-0x0000000007E12000-memory.dmp

        Filesize

        1.8MB

      • memory/1432-1112-0x0000000007BF0000-0x0000000007C40000-memory.dmp

        Filesize

        320KB

      • memory/1432-1111-0x0000000007B60000-0x0000000007BD6000-memory.dmp

        Filesize

        472KB

      • memory/1432-1110-0x00000000061E0000-0x00000000061F0000-memory.dmp

        Filesize

        64KB

      • memory/1432-1109-0x00000000061E0000-0x00000000061F0000-memory.dmp

        Filesize

        64KB

      • memory/1432-1108-0x00000000061E0000-0x00000000061F0000-memory.dmp

        Filesize

        64KB

      • memory/1432-1106-0x0000000007300000-0x0000000007366000-memory.dmp

        Filesize

        408KB

      • memory/1432-1105-0x0000000007260000-0x00000000072F2000-memory.dmp

        Filesize

        584KB

      • memory/1432-1104-0x0000000006F70000-0x0000000006FAC000-memory.dmp

        Filesize

        240KB

      • memory/1432-1103-0x00000000061E0000-0x00000000061F0000-memory.dmp

        Filesize

        64KB

      • memory/1432-1101-0x0000000006E10000-0x0000000006F1A000-memory.dmp

        Filesize

        1.0MB

      • memory/1432-1100-0x00000000067A0000-0x0000000006DB8000-memory.dmp

        Filesize

        6.1MB

      • memory/1432-337-0x00000000061E0000-0x00000000061F0000-memory.dmp

        Filesize

        64KB

      • memory/1432-335-0x0000000001A30000-0x0000000001A7B000-memory.dmp

        Filesize

        300KB

      • memory/1432-224-0x00000000037C0000-0x00000000037FF000-memory.dmp

        Filesize

        252KB

      • memory/1432-222-0x00000000037C0000-0x00000000037FF000-memory.dmp

        Filesize

        252KB

      • memory/1432-220-0x00000000037C0000-0x00000000037FF000-memory.dmp

        Filesize

        252KB

      • memory/1432-218-0x00000000037C0000-0x00000000037FF000-memory.dmp

        Filesize

        252KB

      • memory/1432-216-0x00000000037C0000-0x00000000037FF000-memory.dmp

        Filesize

        252KB

      • memory/1432-192-0x00000000037C0000-0x00000000037FF000-memory.dmp

        Filesize

        252KB

      • memory/1432-194-0x00000000037C0000-0x00000000037FF000-memory.dmp

        Filesize

        252KB

      • memory/1432-191-0x00000000037C0000-0x00000000037FF000-memory.dmp

        Filesize

        252KB

      • memory/1432-196-0x00000000037C0000-0x00000000037FF000-memory.dmp

        Filesize

        252KB

      • memory/1432-198-0x00000000037C0000-0x00000000037FF000-memory.dmp

        Filesize

        252KB

      • memory/1432-200-0x00000000037C0000-0x00000000037FF000-memory.dmp

        Filesize

        252KB

      • memory/1432-202-0x00000000037C0000-0x00000000037FF000-memory.dmp

        Filesize

        252KB

      • memory/1432-204-0x00000000037C0000-0x00000000037FF000-memory.dmp

        Filesize

        252KB

      • memory/1432-206-0x00000000037C0000-0x00000000037FF000-memory.dmp

        Filesize

        252KB

      • memory/1432-208-0x00000000037C0000-0x00000000037FF000-memory.dmp

        Filesize

        252KB

      • memory/1432-210-0x00000000037C0000-0x00000000037FF000-memory.dmp

        Filesize

        252KB

      • memory/1432-212-0x00000000037C0000-0x00000000037FF000-memory.dmp

        Filesize

        252KB

      • memory/1432-214-0x00000000037C0000-0x00000000037FF000-memory.dmp

        Filesize

        252KB

      • memory/4172-1121-0x0000000000680000-0x00000000006B2000-memory.dmp

        Filesize

        200KB

      • memory/4172-1122-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/4380-175-0x00000000028B0000-0x00000000028C2000-memory.dmp

        Filesize

        72KB

      • memory/4380-181-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/4380-171-0x00000000028B0000-0x00000000028C2000-memory.dmp

        Filesize

        72KB

      • memory/4380-182-0x0000000004EF0000-0x0000000004F00000-memory.dmp

        Filesize

        64KB

      • memory/4380-169-0x00000000028B0000-0x00000000028C2000-memory.dmp

        Filesize

        72KB

      • memory/4380-150-0x0000000004EF0000-0x0000000004F00000-memory.dmp

        Filesize

        64KB

      • memory/4380-180-0x0000000004EF0000-0x0000000004F00000-memory.dmp

        Filesize

        64KB

      • memory/4380-167-0x00000000028B0000-0x00000000028C2000-memory.dmp

        Filesize

        72KB

      • memory/4380-153-0x00000000028B0000-0x00000000028C2000-memory.dmp

        Filesize

        72KB

      • memory/4380-177-0x00000000028B0000-0x00000000028C2000-memory.dmp

        Filesize

        72KB

      • memory/4380-151-0x0000000004F00000-0x00000000054A4000-memory.dmp

        Filesize

        5.6MB

      • memory/4380-173-0x00000000028B0000-0x00000000028C2000-memory.dmp

        Filesize

        72KB

      • memory/4380-183-0x0000000004EF0000-0x0000000004F00000-memory.dmp

        Filesize

        64KB

      • memory/4380-185-0x0000000004EF0000-0x0000000004F00000-memory.dmp

        Filesize

        64KB

      • memory/4380-179-0x00000000028B0000-0x00000000028C2000-memory.dmp

        Filesize

        72KB

      • memory/4380-165-0x00000000028B0000-0x00000000028C2000-memory.dmp

        Filesize

        72KB

      • memory/4380-163-0x00000000028B0000-0x00000000028C2000-memory.dmp

        Filesize

        72KB

      • memory/4380-161-0x00000000028B0000-0x00000000028C2000-memory.dmp

        Filesize

        72KB

      • memory/4380-159-0x00000000028B0000-0x00000000028C2000-memory.dmp

        Filesize

        72KB

      • memory/4380-157-0x00000000028B0000-0x00000000028C2000-memory.dmp

        Filesize

        72KB

      • memory/4380-155-0x00000000028B0000-0x00000000028C2000-memory.dmp

        Filesize

        72KB

      • memory/4380-149-0x0000000004EF0000-0x0000000004F00000-memory.dmp

        Filesize

        64KB

      • memory/4380-148-0x00000000008F0000-0x000000000091D000-memory.dmp

        Filesize

        180KB

      • memory/4380-186-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/4380-152-0x00000000028B0000-0x00000000028C2000-memory.dmp

        Filesize

        72KB