Analysis

  • max time kernel
    91s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 02:36

General

  • Target

    7f3646e9607ea87009f371a581482ab25c1fd6f7190d0c69fd036f2d689a9a0a.exe

  • Size

    689KB

  • MD5

    e4161a8b20a823e8d96927c8a334f769

  • SHA1

    c089ea0b91a0da737db761443b773bb224b8827d

  • SHA256

    7f3646e9607ea87009f371a581482ab25c1fd6f7190d0c69fd036f2d689a9a0a

  • SHA512

    348ef2ceb0805c8338a8a44bc52a21163b63950e6287f8dfb13845c48c46ff98532ce9ecb5be07758ae0a951ace9db25bead9e68d09ca9dc51a6ce8549d33b4b

  • SSDEEP

    12288:eMrGy90Z2qc6we77px7WJ+eplgiFVjESQIBmJivTFqTfigjVu5y1W/:UyKe6RjS+epVRrBmJiJqTagjyqM

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f3646e9607ea87009f371a581482ab25c1fd6f7190d0c69fd036f2d689a9a0a.exe
    "C:\Users\Admin\AppData\Local\Temp\7f3646e9607ea87009f371a581482ab25c1fd6f7190d0c69fd036f2d689a9a0a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:980
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un444042.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un444042.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4016
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0863.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0863.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2940
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2940 -s 1080
          4⤵
          • Program crash
          PID:428
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8813.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8813.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4352
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4352 -s 2044
          4⤵
          • Program crash
          PID:4116
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si763267.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si763267.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2796
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2940 -ip 2940
    1⤵
      PID:2740
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4352 -ip 4352
      1⤵
        PID:1908

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si763267.exe

        Filesize

        175KB

        MD5

        8303990f09fa409a189b43674cbfeee9

        SHA1

        23db7481a4b652646852ef2a6caaee0629f3ca27

        SHA256

        3b310aec6272f0ba5fb1d02899240d5b88be63e301cb25a286378894069ecd44

        SHA512

        47941bf4692ab7679dd29548e1e5fd6165f1feba9f277c838ad9cff0d069094b329755f87d8b12b18a390e5ef2f998de70b56410a92d6f2348c50a4148702171

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si763267.exe

        Filesize

        175KB

        MD5

        8303990f09fa409a189b43674cbfeee9

        SHA1

        23db7481a4b652646852ef2a6caaee0629f3ca27

        SHA256

        3b310aec6272f0ba5fb1d02899240d5b88be63e301cb25a286378894069ecd44

        SHA512

        47941bf4692ab7679dd29548e1e5fd6165f1feba9f277c838ad9cff0d069094b329755f87d8b12b18a390e5ef2f998de70b56410a92d6f2348c50a4148702171

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un444042.exe

        Filesize

        547KB

        MD5

        887d40d8bf74bd0c9c0a60ba75219d1d

        SHA1

        9c40cc167794fe5781510ecbf02d0aa9ce388d6f

        SHA256

        8140cd3069c81d89d0f59e9d1091950a1299b3b96ab494b691f0ad6c5358437d

        SHA512

        52ddc91857e074753178ce7f721479ec605cba6e3f95c8a3a0a7e7cd388b19d23b4daff60249d42905905245b5ce996956d3d6e39b0d839c2564c8ab98636199

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un444042.exe

        Filesize

        547KB

        MD5

        887d40d8bf74bd0c9c0a60ba75219d1d

        SHA1

        9c40cc167794fe5781510ecbf02d0aa9ce388d6f

        SHA256

        8140cd3069c81d89d0f59e9d1091950a1299b3b96ab494b691f0ad6c5358437d

        SHA512

        52ddc91857e074753178ce7f721479ec605cba6e3f95c8a3a0a7e7cd388b19d23b4daff60249d42905905245b5ce996956d3d6e39b0d839c2564c8ab98636199

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0863.exe

        Filesize

        291KB

        MD5

        ea55399bdb8825f8bb9449f28d56ca3f

        SHA1

        5d23593eed0d7eb55755d4d53374767ac0044cc4

        SHA256

        37f371cbe8f5b52cc62765390268921c4b76f92406b7115a6e50e5ec346b7444

        SHA512

        e47709d0ea3d6d73756ac26ef440ea01d0c2659225533987ea357f76f3374cdf281378bca68087f69c1eebc3235f2d68c0563d87904a0c11cfada7f5e0197c67

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0863.exe

        Filesize

        291KB

        MD5

        ea55399bdb8825f8bb9449f28d56ca3f

        SHA1

        5d23593eed0d7eb55755d4d53374767ac0044cc4

        SHA256

        37f371cbe8f5b52cc62765390268921c4b76f92406b7115a6e50e5ec346b7444

        SHA512

        e47709d0ea3d6d73756ac26ef440ea01d0c2659225533987ea357f76f3374cdf281378bca68087f69c1eebc3235f2d68c0563d87904a0c11cfada7f5e0197c67

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8813.exe

        Filesize

        345KB

        MD5

        4fb0bdeef221af27c54bc9b2fd75330d

        SHA1

        24dec0e00f42963986eee5afbf344684cd9a4562

        SHA256

        bbe9b10595c604f19f10030642fe1e49eeec626b99fcd9036ca9ff58828004fa

        SHA512

        28c0277a1cbea9968fd173562d5326133c76b8d747748ad770366a8765531fb310cd3acc94a92b82b4a17bbfdc0c2e34d37df9b414ba45988e57ab3f89612fbe

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8813.exe

        Filesize

        345KB

        MD5

        4fb0bdeef221af27c54bc9b2fd75330d

        SHA1

        24dec0e00f42963986eee5afbf344684cd9a4562

        SHA256

        bbe9b10595c604f19f10030642fe1e49eeec626b99fcd9036ca9ff58828004fa

        SHA512

        28c0277a1cbea9968fd173562d5326133c76b8d747748ad770366a8765531fb310cd3acc94a92b82b4a17bbfdc0c2e34d37df9b414ba45988e57ab3f89612fbe

      • memory/2796-1122-0x0000000000090000-0x00000000000C2000-memory.dmp

        Filesize

        200KB

      • memory/2796-1123-0x0000000004C30000-0x0000000004C40000-memory.dmp

        Filesize

        64KB

      • memory/2796-1124-0x0000000004C30000-0x0000000004C40000-memory.dmp

        Filesize

        64KB

      • memory/2940-157-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/2940-169-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/2940-153-0x0000000002710000-0x0000000002720000-memory.dmp

        Filesize

        64KB

      • memory/2940-154-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/2940-155-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/2940-151-0x0000000002710000-0x0000000002720000-memory.dmp

        Filesize

        64KB

      • memory/2940-159-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/2940-161-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/2940-163-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/2940-165-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/2940-167-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/2940-152-0x0000000002710000-0x0000000002720000-memory.dmp

        Filesize

        64KB

      • memory/2940-171-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/2940-173-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/2940-175-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/2940-177-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/2940-179-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/2940-181-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/2940-182-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/2940-183-0x0000000002710000-0x0000000002720000-memory.dmp

        Filesize

        64KB

      • memory/2940-184-0x0000000002710000-0x0000000002720000-memory.dmp

        Filesize

        64KB

      • memory/2940-186-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/2940-150-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/2940-149-0x0000000004C70000-0x0000000005214000-memory.dmp

        Filesize

        5.6MB

      • memory/4352-196-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/4352-228-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/4352-198-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/4352-200-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/4352-202-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/4352-204-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/4352-208-0x0000000001B00000-0x0000000001B4B000-memory.dmp

        Filesize

        300KB

      • memory/4352-206-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/4352-210-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/4352-211-0x00000000060E0000-0x00000000060F0000-memory.dmp

        Filesize

        64KB

      • memory/4352-209-0x00000000060E0000-0x00000000060F0000-memory.dmp

        Filesize

        64KB

      • memory/4352-214-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/4352-213-0x00000000060E0000-0x00000000060F0000-memory.dmp

        Filesize

        64KB

      • memory/4352-218-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/4352-220-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/4352-216-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/4352-222-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/4352-224-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/4352-226-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/4352-194-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/4352-1101-0x00000000067A0000-0x0000000006DB8000-memory.dmp

        Filesize

        6.1MB

      • memory/4352-1102-0x0000000006E10000-0x0000000006F1A000-memory.dmp

        Filesize

        1.0MB

      • memory/4352-1103-0x0000000006F50000-0x0000000006F62000-memory.dmp

        Filesize

        72KB

      • memory/4352-1104-0x0000000006F70000-0x0000000006FAC000-memory.dmp

        Filesize

        240KB

      • memory/4352-1105-0x00000000060E0000-0x00000000060F0000-memory.dmp

        Filesize

        64KB

      • memory/4352-1106-0x0000000007260000-0x00000000072F2000-memory.dmp

        Filesize

        584KB

      • memory/4352-1108-0x0000000007300000-0x0000000007366000-memory.dmp

        Filesize

        408KB

      • memory/4352-1109-0x0000000007A00000-0x0000000007A76000-memory.dmp

        Filesize

        472KB

      • memory/4352-1110-0x0000000007A90000-0x0000000007AE0000-memory.dmp

        Filesize

        320KB

      • memory/4352-1111-0x00000000060E0000-0x00000000060F0000-memory.dmp

        Filesize

        64KB

      • memory/4352-1112-0x00000000060E0000-0x00000000060F0000-memory.dmp

        Filesize

        64KB

      • memory/4352-1113-0x00000000060E0000-0x00000000060F0000-memory.dmp

        Filesize

        64KB

      • memory/4352-192-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/4352-191-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/4352-1114-0x00000000060E0000-0x00000000060F0000-memory.dmp

        Filesize

        64KB

      • memory/4352-1115-0x0000000008FB0000-0x0000000009172000-memory.dmp

        Filesize

        1.8MB

      • memory/4352-1116-0x0000000009180000-0x00000000096AC000-memory.dmp

        Filesize

        5.2MB