Analysis

  • max time kernel
    97s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 02:10

General

  • Target

    3aff83f629aa2a2e9158680f84ff5e2d040590823f51a2bd4df637d58d3c3159.exe

  • Size

    688KB

  • MD5

    7491278e5cb82d94a818950c4b18294b

  • SHA1

    4e024d75ac9824a0f9174653012433c0a905dfb0

  • SHA256

    3aff83f629aa2a2e9158680f84ff5e2d040590823f51a2bd4df637d58d3c3159

  • SHA512

    677489c9a70d58d36ade3ca2933753011d42866f781407f2f6fca83f678859374daa145d7886bd882e5edb04e4f23b7158055f4be4db899a9788e4c04a40bfc4

  • SSDEEP

    12288:iMrOy90vTp+AttQEZ5w8Yhym65hLuL8Fx6EjKhJNGrwb4lBmJkvSFmofig+r/6u+:oyGxttQEZsItfaYFjKhJmg4XmJkumoaW

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3aff83f629aa2a2e9158680f84ff5e2d040590823f51a2bd4df637d58d3c3159.exe
    "C:\Users\Admin\AppData\Local\Temp\3aff83f629aa2a2e9158680f84ff5e2d040590823f51a2bd4df637d58d3c3159.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4400
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un646162.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un646162.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1008
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2144.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2144.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4192
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4192 -s 1088
          4⤵
          • Program crash
          PID:1064
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1715.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1715.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3888
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 1728
          4⤵
          • Program crash
          PID:2212
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si407297.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si407297.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1176
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4192 -ip 4192
    1⤵
      PID:3872
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3888 -ip 3888
      1⤵
        PID:1344

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si407297.exe

        Filesize

        175KB

        MD5

        9fc1a2333f6ef1d34d1810ce1dfd738b

        SHA1

        2ba42514d8e63c1907817ccefb11da31e9b2610a

        SHA256

        d674d49c4218476ec2c5e57981daff60eb5734d88f47e44e7cfdeb82685c47c1

        SHA512

        f6be2e66a403303509d1d3c5652c86f61fc12d65e225f46e7e5f79fed6e8df233b6b7b0e8d9f2ebb8828679597e74d92db76afaa5db5d7ab5aca01bd3695593c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si407297.exe

        Filesize

        175KB

        MD5

        9fc1a2333f6ef1d34d1810ce1dfd738b

        SHA1

        2ba42514d8e63c1907817ccefb11da31e9b2610a

        SHA256

        d674d49c4218476ec2c5e57981daff60eb5734d88f47e44e7cfdeb82685c47c1

        SHA512

        f6be2e66a403303509d1d3c5652c86f61fc12d65e225f46e7e5f79fed6e8df233b6b7b0e8d9f2ebb8828679597e74d92db76afaa5db5d7ab5aca01bd3695593c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un646162.exe

        Filesize

        547KB

        MD5

        747cf1ef037a228f2185faa2ce0f46d3

        SHA1

        eb1c0a7d268dd6163675b00a56ccaa501edbc46b

        SHA256

        9c9fb2e48d6b25a15ef8c00bbdb41e3991c004c32e1982f0e8a9630bf2099dbb

        SHA512

        e541fa36e1cea8c70dcb0d93467c02a972d10cee97be34cfd9c83f65368b3f1dc1006db757b92590f71d29e1f3fdfe6fa29fd62b37fcee0a0cb1ccbe59b144ad

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un646162.exe

        Filesize

        547KB

        MD5

        747cf1ef037a228f2185faa2ce0f46d3

        SHA1

        eb1c0a7d268dd6163675b00a56ccaa501edbc46b

        SHA256

        9c9fb2e48d6b25a15ef8c00bbdb41e3991c004c32e1982f0e8a9630bf2099dbb

        SHA512

        e541fa36e1cea8c70dcb0d93467c02a972d10cee97be34cfd9c83f65368b3f1dc1006db757b92590f71d29e1f3fdfe6fa29fd62b37fcee0a0cb1ccbe59b144ad

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2144.exe

        Filesize

        291KB

        MD5

        f241c6d27958f6efd421b3915353f3ff

        SHA1

        cc150d82eff71a69a96c0cc8d481c12903d71368

        SHA256

        7d9446bea7316260f525527cf0f2ab0cbfc65886343cc8de2f74230302b618e4

        SHA512

        f8af71217d3a80e9ddee19ff7e8e37b15157200f43776261d3b1be9f43e25056f93c731d1ecccd9e01d1e407f6c2c733387f8f2e155bd6855506f0e357dae1fb

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2144.exe

        Filesize

        291KB

        MD5

        f241c6d27958f6efd421b3915353f3ff

        SHA1

        cc150d82eff71a69a96c0cc8d481c12903d71368

        SHA256

        7d9446bea7316260f525527cf0f2ab0cbfc65886343cc8de2f74230302b618e4

        SHA512

        f8af71217d3a80e9ddee19ff7e8e37b15157200f43776261d3b1be9f43e25056f93c731d1ecccd9e01d1e407f6c2c733387f8f2e155bd6855506f0e357dae1fb

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1715.exe

        Filesize

        345KB

        MD5

        292af942982b0fb15085f347a6ad31e3

        SHA1

        fa27fecd2ef81ab106f994769354de6269caab85

        SHA256

        72b8af586ff8e63d3dc1d755bd344a68209dee0e9db451755eeafa0690d661e2

        SHA512

        27994f7b764f41aaf321db0e1e21d58ca25981d46fa167768b94206eb4edf7c349c3e348fb1c63ccc369fef25add3f233c5f5d70bb7b96425ee4c0ba7c8b430c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1715.exe

        Filesize

        345KB

        MD5

        292af942982b0fb15085f347a6ad31e3

        SHA1

        fa27fecd2ef81ab106f994769354de6269caab85

        SHA256

        72b8af586ff8e63d3dc1d755bd344a68209dee0e9db451755eeafa0690d661e2

        SHA512

        27994f7b764f41aaf321db0e1e21d58ca25981d46fa167768b94206eb4edf7c349c3e348fb1c63ccc369fef25add3f233c5f5d70bb7b96425ee4c0ba7c8b430c

      • memory/1176-1122-0x0000000005020000-0x0000000005030000-memory.dmp

        Filesize

        64KB

      • memory/1176-1121-0x0000000000430000-0x0000000000462000-memory.dmp

        Filesize

        200KB

      • memory/3888-365-0x00000000061D0000-0x00000000061E0000-memory.dmp

        Filesize

        64KB

      • memory/3888-1104-0x00000000061D0000-0x00000000061E0000-memory.dmp

        Filesize

        64KB

      • memory/3888-1115-0x0000000008090000-0x00000000085BC000-memory.dmp

        Filesize

        5.2MB

      • memory/3888-1114-0x0000000007EC0000-0x0000000008082000-memory.dmp

        Filesize

        1.8MB

      • memory/3888-1113-0x00000000061D0000-0x00000000061E0000-memory.dmp

        Filesize

        64KB

      • memory/3888-1112-0x0000000007D30000-0x0000000007D80000-memory.dmp

        Filesize

        320KB

      • memory/3888-1111-0x0000000007CA0000-0x0000000007D16000-memory.dmp

        Filesize

        472KB

      • memory/3888-1110-0x00000000061D0000-0x00000000061E0000-memory.dmp

        Filesize

        64KB

      • memory/3888-1109-0x00000000061D0000-0x00000000061E0000-memory.dmp

        Filesize

        64KB

      • memory/3888-1107-0x0000000007300000-0x0000000007366000-memory.dmp

        Filesize

        408KB

      • memory/3888-1106-0x0000000007260000-0x00000000072F2000-memory.dmp

        Filesize

        584KB

      • memory/3888-1105-0x0000000006F70000-0x0000000006FAC000-memory.dmp

        Filesize

        240KB

      • memory/3888-1103-0x0000000006F50000-0x0000000006F62000-memory.dmp

        Filesize

        72KB

      • memory/3888-1102-0x0000000006E10000-0x0000000006F1A000-memory.dmp

        Filesize

        1.0MB

      • memory/3888-1101-0x0000000006790000-0x0000000006DA8000-memory.dmp

        Filesize

        6.1MB

      • memory/3888-368-0x00000000061D0000-0x00000000061E0000-memory.dmp

        Filesize

        64KB

      • memory/3888-363-0x00000000061D0000-0x00000000061E0000-memory.dmp

        Filesize

        64KB

      • memory/3888-361-0x0000000001B20000-0x0000000001B6B000-memory.dmp

        Filesize

        300KB

      • memory/3888-224-0x0000000003C80000-0x0000000003CBF000-memory.dmp

        Filesize

        252KB

      • memory/3888-222-0x0000000003C80000-0x0000000003CBF000-memory.dmp

        Filesize

        252KB

      • memory/3888-220-0x0000000003C80000-0x0000000003CBF000-memory.dmp

        Filesize

        252KB

      • memory/3888-191-0x0000000003C80000-0x0000000003CBF000-memory.dmp

        Filesize

        252KB

      • memory/3888-192-0x0000000003C80000-0x0000000003CBF000-memory.dmp

        Filesize

        252KB

      • memory/3888-194-0x0000000003C80000-0x0000000003CBF000-memory.dmp

        Filesize

        252KB

      • memory/3888-196-0x0000000003C80000-0x0000000003CBF000-memory.dmp

        Filesize

        252KB

      • memory/3888-198-0x0000000003C80000-0x0000000003CBF000-memory.dmp

        Filesize

        252KB

      • memory/3888-200-0x0000000003C80000-0x0000000003CBF000-memory.dmp

        Filesize

        252KB

      • memory/3888-202-0x0000000003C80000-0x0000000003CBF000-memory.dmp

        Filesize

        252KB

      • memory/3888-204-0x0000000003C80000-0x0000000003CBF000-memory.dmp

        Filesize

        252KB

      • memory/3888-206-0x0000000003C80000-0x0000000003CBF000-memory.dmp

        Filesize

        252KB

      • memory/3888-208-0x0000000003C80000-0x0000000003CBF000-memory.dmp

        Filesize

        252KB

      • memory/3888-210-0x0000000003C80000-0x0000000003CBF000-memory.dmp

        Filesize

        252KB

      • memory/3888-212-0x0000000003C80000-0x0000000003CBF000-memory.dmp

        Filesize

        252KB

      • memory/3888-214-0x0000000003C80000-0x0000000003CBF000-memory.dmp

        Filesize

        252KB

      • memory/3888-216-0x0000000003C80000-0x0000000003CBF000-memory.dmp

        Filesize

        252KB

      • memory/3888-218-0x0000000003C80000-0x0000000003CBF000-memory.dmp

        Filesize

        252KB

      • memory/4192-177-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/4192-184-0x0000000004F00000-0x0000000004F10000-memory.dmp

        Filesize

        64KB

      • memory/4192-150-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/4192-185-0x0000000004F00000-0x0000000004F10000-memory.dmp

        Filesize

        64KB

      • memory/4192-175-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/4192-155-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/4192-183-0x0000000004F00000-0x0000000004F10000-memory.dmp

        Filesize

        64KB

      • memory/4192-173-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/4192-180-0x0000000004F00000-0x0000000004F10000-memory.dmp

        Filesize

        64KB

      • memory/4192-179-0x0000000004F00000-0x0000000004F10000-memory.dmp

        Filesize

        64KB

      • memory/4192-159-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/4192-178-0x0000000004F00000-0x0000000004F10000-memory.dmp

        Filesize

        64KB

      • memory/4192-186-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/4192-157-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/4192-181-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/4192-171-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/4192-169-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/4192-167-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/4192-165-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/4192-163-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/4192-161-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/4192-153-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/4192-151-0x0000000004DC0000-0x0000000004DD2000-memory.dmp

        Filesize

        72KB

      • memory/4192-149-0x0000000004F10000-0x00000000054B4000-memory.dmp

        Filesize

        5.6MB

      • memory/4192-148-0x0000000000800000-0x000000000082D000-memory.dmp

        Filesize

        180KB