Analysis

  • max time kernel
    108s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 01:58

General

  • Target

    d06017236cf43b8e8efec21fb7c38c8a8e3093405b7054d29a534994a02d2b6f.exe

  • Size

    690KB

  • MD5

    64d732ce2c00c49ef1d7c563d3b390ae

  • SHA1

    0964ee3d57427c458fa283f724fcbb9a9fa34a9f

  • SHA256

    d06017236cf43b8e8efec21fb7c38c8a8e3093405b7054d29a534994a02d2b6f

  • SHA512

    a746590673a7e2e5e1f57f86fd60f0d19c48827966c956351b8cabc73cae8f803732b89c06cf775856bcdb1e8f5f65f86ee3415262380971177e28b99691682c

  • SSDEEP

    12288:iMrsy902MNGJVUKTVSrdl+Key765hLuNJk9AQUfKQF1tv5G4G4vTFiJfigVmXn/i:yydM47XSTbmfaNJS6KW1tv5G45iJagc6

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d06017236cf43b8e8efec21fb7c38c8a8e3093405b7054d29a534994a02d2b6f.exe
    "C:\Users\Admin\AppData\Local\Temp\d06017236cf43b8e8efec21fb7c38c8a8e3093405b7054d29a534994a02d2b6f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4272
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un220333.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un220333.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:736
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9650.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9650.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3736
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3736 -s 1080
          4⤵
          • Program crash
          PID:2572
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8396.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8396.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1288
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1288 -s 1348
          4⤵
          • Program crash
          PID:3324
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si482267.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si482267.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:748
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3736 -ip 3736
    1⤵
      PID:3088
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1288 -ip 1288
      1⤵
        PID:4984

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si482267.exe

        Filesize

        175KB

        MD5

        bb047c3330cab159f7d223a6b60eec78

        SHA1

        f26e2a8ff0ea64cad9dccda51668b513f8a7b84b

        SHA256

        00b32639c6fb1d9372808fd71066f8610b0502dc9479f48798bf9994f0033b07

        SHA512

        3cd896dcc8003cfc6fd03bb94981aa010037d81cd548866e8a50319c83352fa4133aac5fbdfce5ccd9bb10a55af8f4f9d2fc84125717ba16b1bfa8dd1d45ca2f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si482267.exe

        Filesize

        175KB

        MD5

        bb047c3330cab159f7d223a6b60eec78

        SHA1

        f26e2a8ff0ea64cad9dccda51668b513f8a7b84b

        SHA256

        00b32639c6fb1d9372808fd71066f8610b0502dc9479f48798bf9994f0033b07

        SHA512

        3cd896dcc8003cfc6fd03bb94981aa010037d81cd548866e8a50319c83352fa4133aac5fbdfce5ccd9bb10a55af8f4f9d2fc84125717ba16b1bfa8dd1d45ca2f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un220333.exe

        Filesize

        548KB

        MD5

        cad25ef3d1e7e26f9427fc7f2002288e

        SHA1

        88f1e22e5339647498c86ffca1f7fa643baa53cd

        SHA256

        22b3e3017282d268bbb34db5baab5d3b4e3700f5b7543e9a0c2e737df0a0d5e7

        SHA512

        4f78f9afb9b32c199427835dc262c976f981dc624573867d58e361d36077e9d4860934c7f649f86e0581054591e04403941d6836549c1d54f511a27c6e1a586a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un220333.exe

        Filesize

        548KB

        MD5

        cad25ef3d1e7e26f9427fc7f2002288e

        SHA1

        88f1e22e5339647498c86ffca1f7fa643baa53cd

        SHA256

        22b3e3017282d268bbb34db5baab5d3b4e3700f5b7543e9a0c2e737df0a0d5e7

        SHA512

        4f78f9afb9b32c199427835dc262c976f981dc624573867d58e361d36077e9d4860934c7f649f86e0581054591e04403941d6836549c1d54f511a27c6e1a586a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9650.exe

        Filesize

        291KB

        MD5

        01126a23e322eb496ef5a9f5602f6ac4

        SHA1

        95508e3c4cdf2f69fdfb0bcf0e4c4d19ba0758b1

        SHA256

        da8b3e7edc214a0732dc977666b0ad9853b855e2cac7cb9b1b2edccd4a00a429

        SHA512

        2be2a4199f2ee7cc634c9779433b171c23e76c02297fe603fcc15dc768db9b5f476298ed144991eabea4bf49e2fd4c8686d91126ef704a887b8da92c839cfbea

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9650.exe

        Filesize

        291KB

        MD5

        01126a23e322eb496ef5a9f5602f6ac4

        SHA1

        95508e3c4cdf2f69fdfb0bcf0e4c4d19ba0758b1

        SHA256

        da8b3e7edc214a0732dc977666b0ad9853b855e2cac7cb9b1b2edccd4a00a429

        SHA512

        2be2a4199f2ee7cc634c9779433b171c23e76c02297fe603fcc15dc768db9b5f476298ed144991eabea4bf49e2fd4c8686d91126ef704a887b8da92c839cfbea

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8396.exe

        Filesize

        345KB

        MD5

        11f9fa46542f66c550568ba3da0e0606

        SHA1

        f7a7fbf35487041a802c2fd57e27025a2bb92139

        SHA256

        6498bf7ee6520fdb745ff54706cf9e64dc7d6dc5ba404e16ac6ea20738f6afc3

        SHA512

        30792f0417bbdf27d0454b554d63e4c5f3cbad9771bfde111dd6f5348a2949b0e81244057a8a32b71e62cc58d85df50f037c03ce6c5df0cbedc1fbcf22326d40

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8396.exe

        Filesize

        345KB

        MD5

        11f9fa46542f66c550568ba3da0e0606

        SHA1

        f7a7fbf35487041a802c2fd57e27025a2bb92139

        SHA256

        6498bf7ee6520fdb745ff54706cf9e64dc7d6dc5ba404e16ac6ea20738f6afc3

        SHA512

        30792f0417bbdf27d0454b554d63e4c5f3cbad9771bfde111dd6f5348a2949b0e81244057a8a32b71e62cc58d85df50f037c03ce6c5df0cbedc1fbcf22326d40

      • memory/748-1122-0x00000000048D0000-0x00000000048E0000-memory.dmp

        Filesize

        64KB

      • memory/748-1121-0x0000000000030000-0x0000000000062000-memory.dmp

        Filesize

        200KB

      • memory/1288-249-0x00000000062A0000-0x00000000062B0000-memory.dmp

        Filesize

        64KB

      • memory/1288-1104-0x0000000006F90000-0x0000000006FCC000-memory.dmp

        Filesize

        240KB

      • memory/1288-1115-0x0000000008530000-0x0000000008580000-memory.dmp

        Filesize

        320KB

      • memory/1288-1114-0x00000000084A0000-0x0000000008516000-memory.dmp

        Filesize

        472KB

      • memory/1288-1113-0x00000000062A0000-0x00000000062B0000-memory.dmp

        Filesize

        64KB

      • memory/1288-1112-0x0000000007D40000-0x000000000826C000-memory.dmp

        Filesize

        5.2MB

      • memory/1288-1111-0x00000000062A0000-0x00000000062B0000-memory.dmp

        Filesize

        64KB

      • memory/1288-1110-0x00000000062A0000-0x00000000062B0000-memory.dmp

        Filesize

        64KB

      • memory/1288-1109-0x0000000007B60000-0x0000000007D22000-memory.dmp

        Filesize

        1.8MB

      • memory/1288-1107-0x0000000007300000-0x0000000007366000-memory.dmp

        Filesize

        408KB

      • memory/1288-1106-0x0000000007260000-0x00000000072F2000-memory.dmp

        Filesize

        584KB

      • memory/1288-1105-0x00000000062A0000-0x00000000062B0000-memory.dmp

        Filesize

        64KB

      • memory/1288-1103-0x0000000006260000-0x0000000006272000-memory.dmp

        Filesize

        72KB

      • memory/1288-1102-0x0000000006E80000-0x0000000006F8A000-memory.dmp

        Filesize

        1.0MB

      • memory/1288-1101-0x0000000006860000-0x0000000006E78000-memory.dmp

        Filesize

        6.1MB

      • memory/1288-251-0x00000000062A0000-0x00000000062B0000-memory.dmp

        Filesize

        64KB

      • memory/1288-247-0x00000000062A0000-0x00000000062B0000-memory.dmp

        Filesize

        64KB

      • memory/1288-246-0x0000000001B40000-0x0000000001B8B000-memory.dmp

        Filesize

        300KB

      • memory/1288-224-0x00000000038C0000-0x00000000038FF000-memory.dmp

        Filesize

        252KB

      • memory/1288-222-0x00000000038C0000-0x00000000038FF000-memory.dmp

        Filesize

        252KB

      • memory/1288-220-0x00000000038C0000-0x00000000038FF000-memory.dmp

        Filesize

        252KB

      • memory/1288-191-0x00000000038C0000-0x00000000038FF000-memory.dmp

        Filesize

        252KB

      • memory/1288-192-0x00000000038C0000-0x00000000038FF000-memory.dmp

        Filesize

        252KB

      • memory/1288-194-0x00000000038C0000-0x00000000038FF000-memory.dmp

        Filesize

        252KB

      • memory/1288-196-0x00000000038C0000-0x00000000038FF000-memory.dmp

        Filesize

        252KB

      • memory/1288-198-0x00000000038C0000-0x00000000038FF000-memory.dmp

        Filesize

        252KB

      • memory/1288-200-0x00000000038C0000-0x00000000038FF000-memory.dmp

        Filesize

        252KB

      • memory/1288-202-0x00000000038C0000-0x00000000038FF000-memory.dmp

        Filesize

        252KB

      • memory/1288-204-0x00000000038C0000-0x00000000038FF000-memory.dmp

        Filesize

        252KB

      • memory/1288-206-0x00000000038C0000-0x00000000038FF000-memory.dmp

        Filesize

        252KB

      • memory/1288-208-0x00000000038C0000-0x00000000038FF000-memory.dmp

        Filesize

        252KB

      • memory/1288-210-0x00000000038C0000-0x00000000038FF000-memory.dmp

        Filesize

        252KB

      • memory/1288-212-0x00000000038C0000-0x00000000038FF000-memory.dmp

        Filesize

        252KB

      • memory/1288-214-0x00000000038C0000-0x00000000038FF000-memory.dmp

        Filesize

        252KB

      • memory/1288-216-0x00000000038C0000-0x00000000038FF000-memory.dmp

        Filesize

        252KB

      • memory/1288-218-0x00000000038C0000-0x00000000038FF000-memory.dmp

        Filesize

        252KB

      • memory/3736-174-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3736-183-0x0000000004F30000-0x0000000004F40000-memory.dmp

        Filesize

        64KB

      • memory/3736-153-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3736-184-0x0000000004F30000-0x0000000004F40000-memory.dmp

        Filesize

        64KB

      • memory/3736-172-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3736-152-0x0000000004F30000-0x0000000004F40000-memory.dmp

        Filesize

        64KB

      • memory/3736-182-0x0000000004F30000-0x0000000004F40000-memory.dmp

        Filesize

        64KB

      • memory/3736-170-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3736-180-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3736-178-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3736-156-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3736-176-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3736-186-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/3736-154-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3736-181-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/3736-168-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3736-166-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3736-164-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3736-162-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3736-160-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3736-158-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3736-151-0x0000000004F30000-0x0000000004F40000-memory.dmp

        Filesize

        64KB

      • memory/3736-150-0x0000000004F30000-0x0000000004F40000-memory.dmp

        Filesize

        64KB

      • memory/3736-149-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/3736-148-0x0000000004F40000-0x00000000054E4000-memory.dmp

        Filesize

        5.6MB