Analysis

  • max time kernel
    99s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 02:39

General

  • Target

    e99793d3e9a3816c664d48df3c4e6c6d3e7bbf25dee1db5cbce34ce2b5d5150f.exe

  • Size

    688KB

  • MD5

    fa6d16d00f96ab70dd3536d7ae190494

  • SHA1

    e2a0ccc89b3e4db7e540b0ce52bd621c665dece9

  • SHA256

    e99793d3e9a3816c664d48df3c4e6c6d3e7bbf25dee1db5cbce34ce2b5d5150f

  • SHA512

    a1dff961698b6315cd5e005065746bd8ab80dd7153e13e993ea1f63a68066f0ed0ecf42c097f4934ee7bfde058a547ffdcb6f088cc74760be129aaa3cac6023c

  • SSDEEP

    12288:CMrPy90oWrGEqO1GDfwvyy65hLuHuxXYnAPSsZiumJMvaFhefigDmvcAtz:5y/Wy/BfwKhfaOaNumJMmheagivcAtz

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e99793d3e9a3816c664d48df3c4e6c6d3e7bbf25dee1db5cbce34ce2b5d5150f.exe
    "C:\Users\Admin\AppData\Local\Temp\e99793d3e9a3816c664d48df3c4e6c6d3e7bbf25dee1db5cbce34ce2b5d5150f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3492
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un180696.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un180696.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1124
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1310.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1310.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1324
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1324 -s 1080
          4⤵
          • Program crash
          PID:5064
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3432.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3432.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2844
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 1328
          4⤵
          • Program crash
          PID:3856
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si504473.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si504473.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2184
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1324 -ip 1324
    1⤵
      PID:2692
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2844 -ip 2844
      1⤵
        PID:3152

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si504473.exe

        Filesize

        175KB

        MD5

        9940e4ea89ea2f89c015cdad5e4e69d3

        SHA1

        d29a4418d49048456baec0c4971ccdbfcd457367

        SHA256

        44fddcc7d56a7ae7e6c79db897f95cb4b7146eaf1c214bda73f567f77c64196b

        SHA512

        ffd74c9c751f1e344a3c83504d4a541ebc68cba60174a57fcd80dfc47e1b8252fd6b188ceb99a6ec87fa8ce398e2bf0ac0433043941e396f16e26907c250818c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si504473.exe

        Filesize

        175KB

        MD5

        9940e4ea89ea2f89c015cdad5e4e69d3

        SHA1

        d29a4418d49048456baec0c4971ccdbfcd457367

        SHA256

        44fddcc7d56a7ae7e6c79db897f95cb4b7146eaf1c214bda73f567f77c64196b

        SHA512

        ffd74c9c751f1e344a3c83504d4a541ebc68cba60174a57fcd80dfc47e1b8252fd6b188ceb99a6ec87fa8ce398e2bf0ac0433043941e396f16e26907c250818c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un180696.exe

        Filesize

        547KB

        MD5

        f7b394b1f661d24e76de13a61869b6db

        SHA1

        1b99866fee67ce31ec06c3c411b8d5d6166f9927

        SHA256

        63b02df92dc055191be3d541befc842d62c3ee23af78f0cbad5b2f1591736679

        SHA512

        db30e17d6b4d6e6d69dfe19ca9c8c066a12b51493db3381825e0953470bdd655b4e86b94ff86690c8f023734e7e05e61065bee128d8d27f16b2b523b3e790b8b

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un180696.exe

        Filesize

        547KB

        MD5

        f7b394b1f661d24e76de13a61869b6db

        SHA1

        1b99866fee67ce31ec06c3c411b8d5d6166f9927

        SHA256

        63b02df92dc055191be3d541befc842d62c3ee23af78f0cbad5b2f1591736679

        SHA512

        db30e17d6b4d6e6d69dfe19ca9c8c066a12b51493db3381825e0953470bdd655b4e86b94ff86690c8f023734e7e05e61065bee128d8d27f16b2b523b3e790b8b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1310.exe

        Filesize

        291KB

        MD5

        e74d8c0ace5bbd8c1085afd8f90a5e81

        SHA1

        c8c046f1991b88f81ec30f297896a2c35c6f6133

        SHA256

        0ccbcfbecf8945fe7b2e16df0377bcb2f6f2175c714e18bc91fda8d4e49d6125

        SHA512

        0c67afd19a6e94807341bca6fb162606d3c7f185ef1e2b0373b332489dad83c7157660a0287b3d4dd2582f0b5ab2145140eb68c26bdc8064257ff33e052eec33

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1310.exe

        Filesize

        291KB

        MD5

        e74d8c0ace5bbd8c1085afd8f90a5e81

        SHA1

        c8c046f1991b88f81ec30f297896a2c35c6f6133

        SHA256

        0ccbcfbecf8945fe7b2e16df0377bcb2f6f2175c714e18bc91fda8d4e49d6125

        SHA512

        0c67afd19a6e94807341bca6fb162606d3c7f185ef1e2b0373b332489dad83c7157660a0287b3d4dd2582f0b5ab2145140eb68c26bdc8064257ff33e052eec33

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3432.exe

        Filesize

        345KB

        MD5

        01ed183c2cec101b59231955bb810157

        SHA1

        b84b3e23afa0e2049c98d100e4b81d17c10f9ab7

        SHA256

        f7f308c1467a1be70d6a04a0804ba7adf638f9e5f06cdd8fafc335c4b25d4704

        SHA512

        1512334566ef5b931ddbacfbc968322c105fb53d339f9d1bb9de8d94964ac89906ce11774fe39d96f082bd22f8315160019006500bc309d217205ab4e93c76fe

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3432.exe

        Filesize

        345KB

        MD5

        01ed183c2cec101b59231955bb810157

        SHA1

        b84b3e23afa0e2049c98d100e4b81d17c10f9ab7

        SHA256

        f7f308c1467a1be70d6a04a0804ba7adf638f9e5f06cdd8fafc335c4b25d4704

        SHA512

        1512334566ef5b931ddbacfbc968322c105fb53d339f9d1bb9de8d94964ac89906ce11774fe39d96f082bd22f8315160019006500bc309d217205ab4e93c76fe

      • memory/1324-148-0x0000000004EE0000-0x0000000005484000-memory.dmp

        Filesize

        5.6MB

      • memory/1324-149-0x0000000000800000-0x000000000082D000-memory.dmp

        Filesize

        180KB

      • memory/1324-150-0x0000000002710000-0x0000000002720000-memory.dmp

        Filesize

        64KB

      • memory/1324-151-0x0000000002710000-0x0000000002720000-memory.dmp

        Filesize

        64KB

      • memory/1324-152-0x0000000002710000-0x0000000002720000-memory.dmp

        Filesize

        64KB

      • memory/1324-153-0x0000000002870000-0x0000000002882000-memory.dmp

        Filesize

        72KB

      • memory/1324-154-0x0000000002870000-0x0000000002882000-memory.dmp

        Filesize

        72KB

      • memory/1324-156-0x0000000002870000-0x0000000002882000-memory.dmp

        Filesize

        72KB

      • memory/1324-158-0x0000000002870000-0x0000000002882000-memory.dmp

        Filesize

        72KB

      • memory/1324-160-0x0000000002870000-0x0000000002882000-memory.dmp

        Filesize

        72KB

      • memory/1324-162-0x0000000002870000-0x0000000002882000-memory.dmp

        Filesize

        72KB

      • memory/1324-164-0x0000000002870000-0x0000000002882000-memory.dmp

        Filesize

        72KB

      • memory/1324-166-0x0000000002870000-0x0000000002882000-memory.dmp

        Filesize

        72KB

      • memory/1324-168-0x0000000002870000-0x0000000002882000-memory.dmp

        Filesize

        72KB

      • memory/1324-170-0x0000000002870000-0x0000000002882000-memory.dmp

        Filesize

        72KB

      • memory/1324-172-0x0000000002870000-0x0000000002882000-memory.dmp

        Filesize

        72KB

      • memory/1324-174-0x0000000002870000-0x0000000002882000-memory.dmp

        Filesize

        72KB

      • memory/1324-176-0x0000000002870000-0x0000000002882000-memory.dmp

        Filesize

        72KB

      • memory/1324-178-0x0000000002870000-0x0000000002882000-memory.dmp

        Filesize

        72KB

      • memory/1324-180-0x0000000002870000-0x0000000002882000-memory.dmp

        Filesize

        72KB

      • memory/1324-181-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/1324-182-0x0000000002710000-0x0000000002720000-memory.dmp

        Filesize

        64KB

      • memory/1324-183-0x0000000002710000-0x0000000002720000-memory.dmp

        Filesize

        64KB

      • memory/1324-185-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/2184-1121-0x0000000000170000-0x00000000001A2000-memory.dmp

        Filesize

        200KB

      • memory/2184-1122-0x0000000004CF0000-0x0000000004D00000-memory.dmp

        Filesize

        64KB

      • memory/2844-191-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/2844-333-0x0000000003550000-0x0000000003560000-memory.dmp

        Filesize

        64KB

      • memory/2844-195-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/2844-197-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/2844-199-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/2844-201-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/2844-203-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/2844-205-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/2844-207-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/2844-209-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/2844-211-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/2844-213-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/2844-215-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/2844-217-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/2844-219-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/2844-221-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/2844-223-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/2844-329-0x0000000003460000-0x00000000034AB000-memory.dmp

        Filesize

        300KB

      • memory/2844-330-0x0000000003550000-0x0000000003560000-memory.dmp

        Filesize

        64KB

      • memory/2844-193-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/2844-335-0x0000000003550000-0x0000000003560000-memory.dmp

        Filesize

        64KB

      • memory/2844-1100-0x0000000006770000-0x0000000006D88000-memory.dmp

        Filesize

        6.1MB

      • memory/2844-1101-0x0000000006E10000-0x0000000006F1A000-memory.dmp

        Filesize

        1.0MB

      • memory/2844-1102-0x0000000006F50000-0x0000000006F62000-memory.dmp

        Filesize

        72KB

      • memory/2844-1103-0x0000000006F70000-0x0000000006FAC000-memory.dmp

        Filesize

        240KB

      • memory/2844-1104-0x0000000003550000-0x0000000003560000-memory.dmp

        Filesize

        64KB

      • memory/2844-1105-0x0000000007260000-0x00000000072C6000-memory.dmp

        Filesize

        408KB

      • memory/2844-1106-0x0000000007920000-0x00000000079B2000-memory.dmp

        Filesize

        584KB

      • memory/2844-1108-0x0000000003550000-0x0000000003560000-memory.dmp

        Filesize

        64KB

      • memory/2844-1109-0x0000000003550000-0x0000000003560000-memory.dmp

        Filesize

        64KB

      • memory/2844-1110-0x0000000003550000-0x0000000003560000-memory.dmp

        Filesize

        64KB

      • memory/2844-1111-0x0000000007B20000-0x0000000007B96000-memory.dmp

        Filesize

        472KB

      • memory/2844-1112-0x0000000007BB0000-0x0000000007C00000-memory.dmp

        Filesize

        320KB

      • memory/2844-190-0x00000000065B0000-0x00000000065EF000-memory.dmp

        Filesize

        252KB

      • memory/2844-1113-0x0000000007D60000-0x0000000007F22000-memory.dmp

        Filesize

        1.8MB

      • memory/2844-1114-0x0000000007F30000-0x000000000845C000-memory.dmp

        Filesize

        5.2MB

      • memory/2844-1115-0x0000000003550000-0x0000000003560000-memory.dmp

        Filesize

        64KB