Analysis

  • max time kernel
    61s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 02:46

General

  • Target

    ac67c47dfca52a55a30a99f1f0d1355f31f7924673f690d14ec46c41d8f1b63e.exe

  • Size

    689KB

  • MD5

    2f5c28d6f1a67d6c4776291c227a08d2

  • SHA1

    10dd45578d5ffb65fb81b6fcce12bc0f0b721456

  • SHA256

    ac67c47dfca52a55a30a99f1f0d1355f31f7924673f690d14ec46c41d8f1b63e

  • SHA512

    f2549059e7c89f32279c6659fce3ba0ba8662db44e830cce147b574cfe3c8b10a3f61c849eded3e0e12367df96b299ff3b64edade742d2696d39efb285dedb9d

  • SSDEEP

    12288:LMrvy90lPBOwzw12my665hLuLYUJEK3luSBPSmJ4vNFRBfig9lL+J7QGx:UyKcwzw12zJfaLJEK1uo6mJ4vRBag9cD

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac67c47dfca52a55a30a99f1f0d1355f31f7924673f690d14ec46c41d8f1b63e.exe
    "C:\Users\Admin\AppData\Local\Temp\ac67c47dfca52a55a30a99f1f0d1355f31f7924673f690d14ec46c41d8f1b63e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4488
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un320991.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un320991.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2624
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7896.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7896.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4324
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 1080
          4⤵
          • Program crash
          PID:2728
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3511.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3511.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2228
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 1356
          4⤵
          • Program crash
          PID:4056
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si308919.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si308919.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5028
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4324 -ip 4324
    1⤵
      PID:3880
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2228 -ip 2228
      1⤵
        PID:4480

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si308919.exe

        Filesize

        175KB

        MD5

        c1634d2c3231bf220b4f790b47909b7f

        SHA1

        8cd724bce619e21d544dd60b3d2c5f50299dd1d7

        SHA256

        571d2e0daf7e4eb57f5ab58e52eac84aa933bdcb1156f6a20b1a7664ca0a5e5e

        SHA512

        1f1bbd55a49dc254917d089567eb7ce53ebd4d89b85f34759ee57c6e4dd942f1435f01d473d4abeda3acc94eb32696c44e6b3d857c6386b2a387e80959e888d6

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si308919.exe

        Filesize

        175KB

        MD5

        c1634d2c3231bf220b4f790b47909b7f

        SHA1

        8cd724bce619e21d544dd60b3d2c5f50299dd1d7

        SHA256

        571d2e0daf7e4eb57f5ab58e52eac84aa933bdcb1156f6a20b1a7664ca0a5e5e

        SHA512

        1f1bbd55a49dc254917d089567eb7ce53ebd4d89b85f34759ee57c6e4dd942f1435f01d473d4abeda3acc94eb32696c44e6b3d857c6386b2a387e80959e888d6

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un320991.exe

        Filesize

        547KB

        MD5

        aeb16aedb02a6f748f5176059bd2ac3c

        SHA1

        b7a77ee3c992b0fb1db6e7c31e333c74d899a544

        SHA256

        2473c8c4a3d5943ff2561a6bdee46a3ce07e503a1f4dc8d396064cf83f822511

        SHA512

        dbd60c7dede703156a8c84fc8aff04530d2990e7e895c8f867b2abf41c0f03fe0e26fd4894d8589597c7470ed45eecda8402442e704043359f7d7fcbf0dfe766

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un320991.exe

        Filesize

        547KB

        MD5

        aeb16aedb02a6f748f5176059bd2ac3c

        SHA1

        b7a77ee3c992b0fb1db6e7c31e333c74d899a544

        SHA256

        2473c8c4a3d5943ff2561a6bdee46a3ce07e503a1f4dc8d396064cf83f822511

        SHA512

        dbd60c7dede703156a8c84fc8aff04530d2990e7e895c8f867b2abf41c0f03fe0e26fd4894d8589597c7470ed45eecda8402442e704043359f7d7fcbf0dfe766

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7896.exe

        Filesize

        291KB

        MD5

        aa69471d64edc771aa1e8ace9ff72307

        SHA1

        4d76e0e1b4a3f1b511439fb384bf22b71d7d5d88

        SHA256

        f0bdd05b38f6389790e78593b5c22c2d630b4df134c2674628d8adab687a9042

        SHA512

        06013b7f8d6dec1a3c0479237ec5e12c34ed202ebcd19887c225064e06387428b6f45ebd14a2afb9d343155bf8524f90b89627d5eddd27225f21173a53573f8f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7896.exe

        Filesize

        291KB

        MD5

        aa69471d64edc771aa1e8ace9ff72307

        SHA1

        4d76e0e1b4a3f1b511439fb384bf22b71d7d5d88

        SHA256

        f0bdd05b38f6389790e78593b5c22c2d630b4df134c2674628d8adab687a9042

        SHA512

        06013b7f8d6dec1a3c0479237ec5e12c34ed202ebcd19887c225064e06387428b6f45ebd14a2afb9d343155bf8524f90b89627d5eddd27225f21173a53573f8f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3511.exe

        Filesize

        345KB

        MD5

        3d31e13d32f3890df584c2dc0412b7de

        SHA1

        106181e0cc5552608a0b7292eb8a74faff0be04c

        SHA256

        038bd8e3bc86ad915a34fbd2667d73746c1bd6f055a470646c6d553f269b59d9

        SHA512

        f4a80c03323d06605b5cf2584d04875b0b316dac78f74026a8306b09e3f5db44166259691a636d3c54dc478340783adad7e267ab861164aaae311b6b03e75234

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3511.exe

        Filesize

        345KB

        MD5

        3d31e13d32f3890df584c2dc0412b7de

        SHA1

        106181e0cc5552608a0b7292eb8a74faff0be04c

        SHA256

        038bd8e3bc86ad915a34fbd2667d73746c1bd6f055a470646c6d553f269b59d9

        SHA512

        f4a80c03323d06605b5cf2584d04875b0b316dac78f74026a8306b09e3f5db44166259691a636d3c54dc478340783adad7e267ab861164aaae311b6b03e75234

      • memory/2228-227-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/2228-1102-0x0000000006E10000-0x0000000006E22000-memory.dmp

        Filesize

        72KB

      • memory/2228-1114-0x00000000085F0000-0x0000000008640000-memory.dmp

        Filesize

        320KB

      • memory/2228-1113-0x0000000008550000-0x00000000085C6000-memory.dmp

        Filesize

        472KB

      • memory/2228-1112-0x0000000007D10000-0x000000000823C000-memory.dmp

        Filesize

        5.2MB

      • memory/2228-1111-0x0000000006060000-0x0000000006070000-memory.dmp

        Filesize

        64KB

      • memory/2228-1110-0x0000000007B20000-0x0000000007CE2000-memory.dmp

        Filesize

        1.8MB

      • memory/2228-1109-0x0000000006060000-0x0000000006070000-memory.dmp

        Filesize

        64KB

      • memory/2228-1108-0x0000000006060000-0x0000000006070000-memory.dmp

        Filesize

        64KB

      • memory/2228-1106-0x00000000071C0000-0x0000000007226000-memory.dmp

        Filesize

        408KB

      • memory/2228-1105-0x0000000007120000-0x00000000071B2000-memory.dmp

        Filesize

        584KB

      • memory/2228-1104-0x0000000006060000-0x0000000006070000-memory.dmp

        Filesize

        64KB

      • memory/2228-1103-0x0000000006E30000-0x0000000006E6C000-memory.dmp

        Filesize

        240KB

      • memory/2228-1101-0x0000000006CD0000-0x0000000006DDA000-memory.dmp

        Filesize

        1.0MB

      • memory/2228-1100-0x0000000006630000-0x0000000006C48000-memory.dmp

        Filesize

        6.1MB

      • memory/2228-225-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/2228-223-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/2228-221-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/2228-219-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/2228-217-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/2228-215-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/2228-213-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/2228-190-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/2228-191-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/2228-193-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/2228-196-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/2228-195-0x0000000001B00000-0x0000000001B4B000-memory.dmp

        Filesize

        300KB

      • memory/2228-197-0x0000000006060000-0x0000000006070000-memory.dmp

        Filesize

        64KB

      • memory/2228-200-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/2228-201-0x0000000006060000-0x0000000006070000-memory.dmp

        Filesize

        64KB

      • memory/2228-203-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/2228-199-0x0000000006060000-0x0000000006070000-memory.dmp

        Filesize

        64KB

      • memory/2228-205-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/2228-207-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/2228-209-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/2228-211-0x0000000005FD0000-0x000000000600F000-memory.dmp

        Filesize

        252KB

      • memory/4324-173-0x0000000005240000-0x0000000005252000-memory.dmp

        Filesize

        72KB

      • memory/4324-185-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/4324-171-0x0000000005240000-0x0000000005252000-memory.dmp

        Filesize

        72KB

      • memory/4324-169-0x0000000005240000-0x0000000005252000-memory.dmp

        Filesize

        72KB

      • memory/4324-182-0x0000000002650000-0x0000000002660000-memory.dmp

        Filesize

        64KB

      • memory/4324-181-0x0000000002650000-0x0000000002660000-memory.dmp

        Filesize

        64KB

      • memory/4324-180-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/4324-149-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/4324-179-0x0000000005240000-0x0000000005252000-memory.dmp

        Filesize

        72KB

      • memory/4324-177-0x0000000005240000-0x0000000005252000-memory.dmp

        Filesize

        72KB

      • memory/4324-153-0x0000000005240000-0x0000000005252000-memory.dmp

        Filesize

        72KB

      • memory/4324-175-0x0000000005240000-0x0000000005252000-memory.dmp

        Filesize

        72KB

      • memory/4324-151-0x0000000002650000-0x0000000002660000-memory.dmp

        Filesize

        64KB

      • memory/4324-152-0x0000000005240000-0x0000000005252000-memory.dmp

        Filesize

        72KB

      • memory/4324-183-0x0000000002650000-0x0000000002660000-memory.dmp

        Filesize

        64KB

      • memory/4324-167-0x0000000005240000-0x0000000005252000-memory.dmp

        Filesize

        72KB

      • memory/4324-165-0x0000000005240000-0x0000000005252000-memory.dmp

        Filesize

        72KB

      • memory/4324-163-0x0000000005240000-0x0000000005252000-memory.dmp

        Filesize

        72KB

      • memory/4324-161-0x0000000005240000-0x0000000005252000-memory.dmp

        Filesize

        72KB

      • memory/4324-159-0x0000000005240000-0x0000000005252000-memory.dmp

        Filesize

        72KB

      • memory/4324-157-0x0000000005240000-0x0000000005252000-memory.dmp

        Filesize

        72KB

      • memory/4324-155-0x0000000005240000-0x0000000005252000-memory.dmp

        Filesize

        72KB

      • memory/4324-150-0x0000000002650000-0x0000000002660000-memory.dmp

        Filesize

        64KB

      • memory/4324-148-0x0000000004C90000-0x0000000005234000-memory.dmp

        Filesize

        5.6MB

      • memory/5028-1120-0x0000000000210000-0x0000000000242000-memory.dmp

        Filesize

        200KB

      • memory/5028-1121-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

        Filesize

        64KB