Analysis

  • max time kernel
    87s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 01:59

General

  • Target

    3bc7e2de16d1963095b103b996035083f27aec50bd5fa8e29f8d479d6cca5014.exe

  • Size

    690KB

  • MD5

    b0a1b4f540d26f159d691372b5edfd64

  • SHA1

    dd360038c06eb7ef7b430bc7d137c84fb9b1ec5e

  • SHA256

    3bc7e2de16d1963095b103b996035083f27aec50bd5fa8e29f8d479d6cca5014

  • SHA512

    9bd7806ac859a69719e0321d7426518448d738ce94ad1d8b5ee3a42477ffb0ef112f5227d44a67b62f688860a8ed0caec9543ef6573222034d62f071a64316a5

  • SSDEEP

    12288:WMrwy905JYppfbDBrcDI9kPtOyo65hLuUCABpMSKx3eAeyFoiOqg2ivVFShfigdF:ayQJYn3BrcDRpHfaUtpLw3eSFoiOWinw

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3bc7e2de16d1963095b103b996035083f27aec50bd5fa8e29f8d479d6cca5014.exe
    "C:\Users\Admin\AppData\Local\Temp\3bc7e2de16d1963095b103b996035083f27aec50bd5fa8e29f8d479d6cca5014.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2676
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un433098.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un433098.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:640
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5841.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5841.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3764
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3764 -s 1080
          4⤵
          • Program crash
          PID:3432
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7487.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7487.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4840
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 1348
          4⤵
          • Program crash
          PID:1056
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si706888.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si706888.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4412
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3764 -ip 3764
    1⤵
      PID:4000
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4840 -ip 4840
      1⤵
        PID:2944

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si706888.exe

        Filesize

        175KB

        MD5

        7d6d081f8b1eb8ddb5ea477e12674df5

        SHA1

        9a52282ee18cd511b709a9c5efab4c08015108bf

        SHA256

        b3f2c802056b2e90e763664b870117627e6e6f99184adca991f95498ba2afbbc

        SHA512

        e18ae630e0023f85766fdea5c220ec41c91ca13d1442cde5eb30fc904053aca7a085c11d6e57ba039a11124c88a2a3017633da78818b3e5cd7bf7209ea4dc2e1

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si706888.exe

        Filesize

        175KB

        MD5

        7d6d081f8b1eb8ddb5ea477e12674df5

        SHA1

        9a52282ee18cd511b709a9c5efab4c08015108bf

        SHA256

        b3f2c802056b2e90e763664b870117627e6e6f99184adca991f95498ba2afbbc

        SHA512

        e18ae630e0023f85766fdea5c220ec41c91ca13d1442cde5eb30fc904053aca7a085c11d6e57ba039a11124c88a2a3017633da78818b3e5cd7bf7209ea4dc2e1

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un433098.exe

        Filesize

        548KB

        MD5

        f1ec0759899666760d6b9b7c3713f87e

        SHA1

        daea9c860d85e53ff56f8a3d1e5dcbf510a5412f

        SHA256

        e87f2b237d63eee6a02a76f2358130b064eb1282742bc9497cc74233088f7ab4

        SHA512

        998ba32a6dea01d6836720eba8db754d51313cacddfb2564d248ce31d9334e856c6c9701c13c0bde1e6e7c29111f060fef4a4d0f171f7235994f7b84f23665f1

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un433098.exe

        Filesize

        548KB

        MD5

        f1ec0759899666760d6b9b7c3713f87e

        SHA1

        daea9c860d85e53ff56f8a3d1e5dcbf510a5412f

        SHA256

        e87f2b237d63eee6a02a76f2358130b064eb1282742bc9497cc74233088f7ab4

        SHA512

        998ba32a6dea01d6836720eba8db754d51313cacddfb2564d248ce31d9334e856c6c9701c13c0bde1e6e7c29111f060fef4a4d0f171f7235994f7b84f23665f1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5841.exe

        Filesize

        291KB

        MD5

        8614d2746cc925941b4e621ee2a0e5df

        SHA1

        7fde51fdfa9620f91a54caddab9f845a6675b4fe

        SHA256

        77dd8ddada90b752cc03a2eed520284c97b1f1575fd2eac41422f8c841695cd2

        SHA512

        f8d5b656fec5044515d301bf9818dd8e6db04535a83b1c34f0f4e4de9e038433840909508d438a652f5315ae78532964f86d03d8b61b1f7abf231d84325ab090

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5841.exe

        Filesize

        291KB

        MD5

        8614d2746cc925941b4e621ee2a0e5df

        SHA1

        7fde51fdfa9620f91a54caddab9f845a6675b4fe

        SHA256

        77dd8ddada90b752cc03a2eed520284c97b1f1575fd2eac41422f8c841695cd2

        SHA512

        f8d5b656fec5044515d301bf9818dd8e6db04535a83b1c34f0f4e4de9e038433840909508d438a652f5315ae78532964f86d03d8b61b1f7abf231d84325ab090

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7487.exe

        Filesize

        345KB

        MD5

        b46f6234fbdcd64a1f36dda8ed17177b

        SHA1

        9dd38d7bec08430b0a260b502bd7c8fb5f4bfac4

        SHA256

        f0476f2c5b9b4102a11d68ff0f5d18c1a2d0b816efeaf2dc19db6bd73baf738c

        SHA512

        3e7127d5d09a08f94a1ca7627d0ed4f8342ca3752c70b173aaef77017f6e9b6e96406fc75279c9aa68ce2cf5e36814c8f945a9558e22697f4f6a5d715a7d04b4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7487.exe

        Filesize

        345KB

        MD5

        b46f6234fbdcd64a1f36dda8ed17177b

        SHA1

        9dd38d7bec08430b0a260b502bd7c8fb5f4bfac4

        SHA256

        f0476f2c5b9b4102a11d68ff0f5d18c1a2d0b816efeaf2dc19db6bd73baf738c

        SHA512

        3e7127d5d09a08f94a1ca7627d0ed4f8342ca3752c70b173aaef77017f6e9b6e96406fc75279c9aa68ce2cf5e36814c8f945a9558e22697f4f6a5d715a7d04b4

      • memory/3764-165-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/3764-171-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/3764-150-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/3764-151-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/3764-153-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/3764-155-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/3764-157-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/3764-159-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/3764-161-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/3764-163-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/3764-148-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/3764-167-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/3764-169-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/3764-149-0x0000000004F50000-0x00000000054F4000-memory.dmp

        Filesize

        5.6MB

      • memory/3764-173-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/3764-175-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/3764-177-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/3764-178-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/3764-179-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/3764-180-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/3764-181-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/3764-183-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/3764-184-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/3764-185-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/3764-186-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/4412-1121-0x0000000000EE0000-0x0000000000F12000-memory.dmp

        Filesize

        200KB

      • memory/4412-1123-0x0000000005A80000-0x0000000005A90000-memory.dmp

        Filesize

        64KB

      • memory/4412-1122-0x0000000005A80000-0x0000000005A90000-memory.dmp

        Filesize

        64KB

      • memory/4840-194-0x00000000065E0000-0x000000000661F000-memory.dmp

        Filesize

        252KB

      • memory/4840-196-0x00000000065E0000-0x000000000661F000-memory.dmp

        Filesize

        252KB

      • memory/4840-198-0x00000000065E0000-0x000000000661F000-memory.dmp

        Filesize

        252KB

      • memory/4840-200-0x00000000065E0000-0x000000000661F000-memory.dmp

        Filesize

        252KB

      • memory/4840-202-0x00000000065E0000-0x000000000661F000-memory.dmp

        Filesize

        252KB

      • memory/4840-204-0x00000000065E0000-0x000000000661F000-memory.dmp

        Filesize

        252KB

      • memory/4840-206-0x00000000065E0000-0x000000000661F000-memory.dmp

        Filesize

        252KB

      • memory/4840-208-0x00000000065E0000-0x000000000661F000-memory.dmp

        Filesize

        252KB

      • memory/4840-210-0x00000000065E0000-0x000000000661F000-memory.dmp

        Filesize

        252KB

      • memory/4840-214-0x00000000065E0000-0x000000000661F000-memory.dmp

        Filesize

        252KB

      • memory/4840-212-0x00000000065E0000-0x000000000661F000-memory.dmp

        Filesize

        252KB

      • memory/4840-216-0x00000000065E0000-0x000000000661F000-memory.dmp

        Filesize

        252KB

      • memory/4840-218-0x00000000065E0000-0x000000000661F000-memory.dmp

        Filesize

        252KB

      • memory/4840-220-0x00000000065E0000-0x000000000661F000-memory.dmp

        Filesize

        252KB

      • memory/4840-222-0x00000000065E0000-0x000000000661F000-memory.dmp

        Filesize

        252KB

      • memory/4840-224-0x00000000065E0000-0x000000000661F000-memory.dmp

        Filesize

        252KB

      • memory/4840-316-0x0000000003B60000-0x0000000003B70000-memory.dmp

        Filesize

        64KB

      • memory/4840-315-0x0000000001A30000-0x0000000001A7B000-memory.dmp

        Filesize

        300KB

      • memory/4840-318-0x0000000003B60000-0x0000000003B70000-memory.dmp

        Filesize

        64KB

      • memory/4840-1100-0x0000000006770000-0x0000000006D88000-memory.dmp

        Filesize

        6.1MB

      • memory/4840-1101-0x0000000006E10000-0x0000000006F1A000-memory.dmp

        Filesize

        1.0MB

      • memory/4840-1102-0x0000000006F50000-0x0000000006F62000-memory.dmp

        Filesize

        72KB

      • memory/4840-1103-0x0000000003B60000-0x0000000003B70000-memory.dmp

        Filesize

        64KB

      • memory/4840-1104-0x0000000006F70000-0x0000000006FAC000-memory.dmp

        Filesize

        240KB

      • memory/4840-1105-0x0000000007260000-0x00000000072F2000-memory.dmp

        Filesize

        584KB

      • memory/4840-1106-0x0000000007300000-0x0000000007366000-memory.dmp

        Filesize

        408KB

      • memory/4840-1108-0x0000000007A30000-0x0000000007BF2000-memory.dmp

        Filesize

        1.8MB

      • memory/4840-1109-0x0000000007C00000-0x000000000812C000-memory.dmp

        Filesize

        5.2MB

      • memory/4840-1110-0x0000000003B60000-0x0000000003B70000-memory.dmp

        Filesize

        64KB

      • memory/4840-1111-0x0000000003B60000-0x0000000003B70000-memory.dmp

        Filesize

        64KB

      • memory/4840-1112-0x0000000003B60000-0x0000000003B70000-memory.dmp

        Filesize

        64KB

      • memory/4840-192-0x00000000065E0000-0x000000000661F000-memory.dmp

        Filesize

        252KB

      • memory/4840-191-0x00000000065E0000-0x000000000661F000-memory.dmp

        Filesize

        252KB

      • memory/4840-1113-0x0000000003B60000-0x0000000003B70000-memory.dmp

        Filesize

        64KB

      • memory/4840-1114-0x0000000003950000-0x00000000039C6000-memory.dmp

        Filesize

        472KB

      • memory/4840-1115-0x0000000009640000-0x0000000009690000-memory.dmp

        Filesize

        320KB