Analysis

  • max time kernel
    113s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 01:35

General

  • Target

    59f241b9261acba1a73b6455644c0752ea52b25eb2be5ec68679e44ed234962a.exe

  • Size

    689KB

  • MD5

    beaa4d6e1646645141f5f4ad5b6abed5

  • SHA1

    22f887d6d78b1ec93e4d2cd3db560fdef3715af9

  • SHA256

    59f241b9261acba1a73b6455644c0752ea52b25eb2be5ec68679e44ed234962a

  • SHA512

    9288828aa794882f6fc56d0acbcbeb79bf9b6782092d4b6add1aab34384a6caec29ae5a7656bc6b04ff742f2ba60535880bfd1449cb1bfd986d07af89ab92997

  • SSDEEP

    12288:QMr6y90JIsAKSfE/TOSbuyZ65hLutJMy+D22l/oXikZ9IivHFlPfig6E+v1uDSyR:6yTfE/y6kfat9+D2SuTNdlPagzq1ySyR

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59f241b9261acba1a73b6455644c0752ea52b25eb2be5ec68679e44ed234962a.exe
    "C:\Users\Admin\AppData\Local\Temp\59f241b9261acba1a73b6455644c0752ea52b25eb2be5ec68679e44ed234962a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4900
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un626834.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un626834.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3244
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4782.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4782.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3008
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3008 -s 1064
          4⤵
          • Program crash
          PID:1384
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2242.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2242.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4956
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4956 -s 1596
          4⤵
          • Program crash
          PID:3044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si834240.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si834240.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:400
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3008 -ip 3008
    1⤵
      PID:2168
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4956 -ip 4956
      1⤵
        PID:3952

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si834240.exe

        Filesize

        175KB

        MD5

        ab9b1ca81b7f73cd7fcd618df42b58c5

        SHA1

        8140a4b2d50a5cd4ca3926e84f59f697cdbfae70

        SHA256

        a240e52df904592e984aee2e3022be9f35816f2ff7f71fad38059c7266c4afcf

        SHA512

        ec0487305c7a8cc3f1730b0628d0562c7900ae19c374dcd36d3d66c7632ed1f7acd6e4154aa6b57d54ed57ae2c12d8e8a80dc902013005b07ae30087684f45a8

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si834240.exe

        Filesize

        175KB

        MD5

        ab9b1ca81b7f73cd7fcd618df42b58c5

        SHA1

        8140a4b2d50a5cd4ca3926e84f59f697cdbfae70

        SHA256

        a240e52df904592e984aee2e3022be9f35816f2ff7f71fad38059c7266c4afcf

        SHA512

        ec0487305c7a8cc3f1730b0628d0562c7900ae19c374dcd36d3d66c7632ed1f7acd6e4154aa6b57d54ed57ae2c12d8e8a80dc902013005b07ae30087684f45a8

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un626834.exe

        Filesize

        548KB

        MD5

        cdbb28ad93139c89a1c4ffbeb3bee519

        SHA1

        e1943d782125dcd22d1499c06f85eec2e8d5c7af

        SHA256

        77d066f486158aaab7ede0b51d8d43871373134c5cc9e59257c4c7a2cae708d4

        SHA512

        e62809cf6cf3c3b8590a2a2c8775259132b45b5431e8ef6fe9f2d3cee73490328cf4410503b05949f4c8fb2110917ab8e965dda68a64361728ba06e51aa1194a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un626834.exe

        Filesize

        548KB

        MD5

        cdbb28ad93139c89a1c4ffbeb3bee519

        SHA1

        e1943d782125dcd22d1499c06f85eec2e8d5c7af

        SHA256

        77d066f486158aaab7ede0b51d8d43871373134c5cc9e59257c4c7a2cae708d4

        SHA512

        e62809cf6cf3c3b8590a2a2c8775259132b45b5431e8ef6fe9f2d3cee73490328cf4410503b05949f4c8fb2110917ab8e965dda68a64361728ba06e51aa1194a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4782.exe

        Filesize

        291KB

        MD5

        8eb154d867bbbd48b974fbfb3a94da2c

        SHA1

        3b8b7f8716d54c0503e4b54db05e3eab2b9d4f8e

        SHA256

        40f57e568c8eb69cdde154bdb953fb858281069b1289f9594e9c35ece08cf503

        SHA512

        a42b66ca3e1a26e05b79b795c6855b08ea23652c9c7883048f5d700fd12499227143efb5edf081ba3507a0378e1847f20375aff7f22a666962c5ebc8a6b7df01

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4782.exe

        Filesize

        291KB

        MD5

        8eb154d867bbbd48b974fbfb3a94da2c

        SHA1

        3b8b7f8716d54c0503e4b54db05e3eab2b9d4f8e

        SHA256

        40f57e568c8eb69cdde154bdb953fb858281069b1289f9594e9c35ece08cf503

        SHA512

        a42b66ca3e1a26e05b79b795c6855b08ea23652c9c7883048f5d700fd12499227143efb5edf081ba3507a0378e1847f20375aff7f22a666962c5ebc8a6b7df01

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2242.exe

        Filesize

        345KB

        MD5

        6d8aa5d5c05ddec712e7a521be2fe56a

        SHA1

        e60309cadc36c3c0020b5c0a9de7228e7c0057c2

        SHA256

        f5f29dfd9b6c06a046f9c7320f4655bb508eb01f5fdd52492b929cc8d8f242fc

        SHA512

        6bb2826e5f31025da302222f695730548f1a54d1c5846657473563c81ece6fb7cd5a3c4766276432318e3b1d3b9ec702ff7176bb224082fc74112476c93f8142

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2242.exe

        Filesize

        345KB

        MD5

        6d8aa5d5c05ddec712e7a521be2fe56a

        SHA1

        e60309cadc36c3c0020b5c0a9de7228e7c0057c2

        SHA256

        f5f29dfd9b6c06a046f9c7320f4655bb508eb01f5fdd52492b929cc8d8f242fc

        SHA512

        6bb2826e5f31025da302222f695730548f1a54d1c5846657473563c81ece6fb7cd5a3c4766276432318e3b1d3b9ec702ff7176bb224082fc74112476c93f8142

      • memory/400-1120-0x00000000007E0000-0x0000000000812000-memory.dmp

        Filesize

        200KB

      • memory/400-1121-0x0000000005060000-0x0000000005070000-memory.dmp

        Filesize

        64KB

      • memory/3008-156-0x0000000002670000-0x0000000002682000-memory.dmp

        Filesize

        72KB

      • memory/3008-166-0x0000000002670000-0x0000000002682000-memory.dmp

        Filesize

        72KB

      • memory/3008-151-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/3008-152-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/3008-153-0x0000000002670000-0x0000000002682000-memory.dmp

        Filesize

        72KB

      • memory/3008-154-0x0000000002670000-0x0000000002682000-memory.dmp

        Filesize

        72KB

      • memory/3008-149-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/3008-158-0x0000000002670000-0x0000000002682000-memory.dmp

        Filesize

        72KB

      • memory/3008-160-0x0000000002670000-0x0000000002682000-memory.dmp

        Filesize

        72KB

      • memory/3008-162-0x0000000002670000-0x0000000002682000-memory.dmp

        Filesize

        72KB

      • memory/3008-164-0x0000000002670000-0x0000000002682000-memory.dmp

        Filesize

        72KB

      • memory/3008-150-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/3008-168-0x0000000002670000-0x0000000002682000-memory.dmp

        Filesize

        72KB

      • memory/3008-170-0x0000000002670000-0x0000000002682000-memory.dmp

        Filesize

        72KB

      • memory/3008-172-0x0000000002670000-0x0000000002682000-memory.dmp

        Filesize

        72KB

      • memory/3008-174-0x0000000002670000-0x0000000002682000-memory.dmp

        Filesize

        72KB

      • memory/3008-176-0x0000000002670000-0x0000000002682000-memory.dmp

        Filesize

        72KB

      • memory/3008-178-0x0000000002670000-0x0000000002682000-memory.dmp

        Filesize

        72KB

      • memory/3008-180-0x0000000002670000-0x0000000002682000-memory.dmp

        Filesize

        72KB

      • memory/3008-181-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/3008-182-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/3008-183-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/3008-185-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/3008-148-0x0000000004F50000-0x00000000054F4000-memory.dmp

        Filesize

        5.6MB

      • memory/4956-191-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4956-222-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4956-196-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4956-195-0x0000000001B00000-0x0000000001B4B000-memory.dmp

        Filesize

        300KB

      • memory/4956-197-0x0000000006190000-0x00000000061A0000-memory.dmp

        Filesize

        64KB

      • memory/4956-199-0x0000000006190000-0x00000000061A0000-memory.dmp

        Filesize

        64KB

      • memory/4956-200-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4956-202-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4956-204-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4956-206-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4956-208-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4956-210-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4956-212-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4956-214-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4956-216-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4956-218-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4956-220-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4956-193-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4956-224-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4956-226-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4956-1099-0x0000000006750000-0x0000000006D68000-memory.dmp

        Filesize

        6.1MB

      • memory/4956-1100-0x0000000006D70000-0x0000000006E7A000-memory.dmp

        Filesize

        1.0MB

      • memory/4956-1101-0x0000000006120000-0x0000000006132000-memory.dmp

        Filesize

        72KB

      • memory/4956-1102-0x0000000006140000-0x000000000617C000-memory.dmp

        Filesize

        240KB

      • memory/4956-1103-0x0000000006190000-0x00000000061A0000-memory.dmp

        Filesize

        64KB

      • memory/4956-1105-0x0000000006190000-0x00000000061A0000-memory.dmp

        Filesize

        64KB

      • memory/4956-1106-0x0000000006190000-0x00000000061A0000-memory.dmp

        Filesize

        64KB

      • memory/4956-1107-0x0000000006190000-0x00000000061A0000-memory.dmp

        Filesize

        64KB

      • memory/4956-1108-0x0000000007120000-0x00000000071B2000-memory.dmp

        Filesize

        584KB

      • memory/4956-1109-0x00000000071C0000-0x0000000007226000-memory.dmp

        Filesize

        408KB

      • memory/4956-1110-0x00000000078B0000-0x0000000007926000-memory.dmp

        Filesize

        472KB

      • memory/4956-1111-0x0000000007950000-0x00000000079A0000-memory.dmp

        Filesize

        320KB

      • memory/4956-190-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4956-1112-0x00000000079C0000-0x0000000007B82000-memory.dmp

        Filesize

        1.8MB

      • memory/4956-1113-0x0000000007BA0000-0x00000000080CC000-memory.dmp

        Filesize

        5.2MB

      • memory/4956-1114-0x0000000006190000-0x00000000061A0000-memory.dmp

        Filesize

        64KB