Analysis

  • max time kernel
    72s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 02:15

General

  • Target

    7112cca3f968614b0be7c3d05f6282e649d91658541deb77942026475fe09a94.exe

  • Size

    689KB

  • MD5

    7ffb020b57382740f8561e1073463dbc

  • SHA1

    9280b56bc42fb024f3e660111eb2526e98c8acd3

  • SHA256

    7112cca3f968614b0be7c3d05f6282e649d91658541deb77942026475fe09a94

  • SHA512

    a7306d41e64e8bd7bf68a662422e184d550088ee959aa28c202d2249f61dfa7c0a786441ade55ff9632bee40ef85d0066a6309a0df6beb87c25f831aab364097

  • SSDEEP

    12288:hMrHy90jtTPz8AXYw6d6XTyX65hLuheAMSKI3VATEEepEIFmJKvNFamfigEvrTln:iycQqYw6+OKfacALZ3VATErpE+mJKvaj

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7112cca3f968614b0be7c3d05f6282e649d91658541deb77942026475fe09a94.exe
    "C:\Users\Admin\AppData\Local\Temp\7112cca3f968614b0be7c3d05f6282e649d91658541deb77942026475fe09a94.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un840896.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un840896.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4156
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0390.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0390.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2296
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2296 -s 1084
          4⤵
          • Program crash
          PID:3664
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2531.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2531.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2668
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2668 -s 1332
          4⤵
          • Program crash
          PID:4664
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si947819.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si947819.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:620
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2296 -ip 2296
    1⤵
      PID:2896
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2668 -ip 2668
      1⤵
        PID:1444

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si947819.exe
        Filesize

        175KB

        MD5

        f5c57e89bbd4c503d585de90e744be5b

        SHA1

        d30cc70287c9b0ccd727a1e2a3382739e1250929

        SHA256

        9aa243e7536f5b2cd09db57e0ad790a64ac362a55de3a5ab5576b2f3cfbe5e3d

        SHA512

        07712a2f458f26973d2fae021851575468050d5dea59c6d0829ecb1db7642442b6becbfe1c64cce0c0905d722d42f28b16a62e0bd1b83fcce8954d26033a8937

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si947819.exe
        Filesize

        175KB

        MD5

        f5c57e89bbd4c503d585de90e744be5b

        SHA1

        d30cc70287c9b0ccd727a1e2a3382739e1250929

        SHA256

        9aa243e7536f5b2cd09db57e0ad790a64ac362a55de3a5ab5576b2f3cfbe5e3d

        SHA512

        07712a2f458f26973d2fae021851575468050d5dea59c6d0829ecb1db7642442b6becbfe1c64cce0c0905d722d42f28b16a62e0bd1b83fcce8954d26033a8937

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un840896.exe
        Filesize

        547KB

        MD5

        3ac152e092d70ec4bb90c2435831360c

        SHA1

        1a03c9551e2256aeb098ee2ec7a1c70e9db29f5a

        SHA256

        2d9cd9db08cdf17e344524a76dd3350ad16763a7a8a1c211d31562905dff9f53

        SHA512

        245113bce23cb4331e0b0c1e86acb508e03b71044bd894b4d27ae339ea909d543ff30d8c95f51242933eb1846838baf450cf857d8cb624938da6ca4cac39b927

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un840896.exe
        Filesize

        547KB

        MD5

        3ac152e092d70ec4bb90c2435831360c

        SHA1

        1a03c9551e2256aeb098ee2ec7a1c70e9db29f5a

        SHA256

        2d9cd9db08cdf17e344524a76dd3350ad16763a7a8a1c211d31562905dff9f53

        SHA512

        245113bce23cb4331e0b0c1e86acb508e03b71044bd894b4d27ae339ea909d543ff30d8c95f51242933eb1846838baf450cf857d8cb624938da6ca4cac39b927

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0390.exe
        Filesize

        291KB

        MD5

        ebd5bc3bcdd3cb84c01c1b1b56de6d47

        SHA1

        ae522fc69743390a6663f14e67af00433e3ac188

        SHA256

        9f43868afac8fc07e46ca33c6e04807439b2453be6c6c42c80fec195e31efd4c

        SHA512

        ed5ddd9908d5423d965098acc84b5cea5c91350bbc849af444fa03bb7fe2e2f12f6a532fcb5908ac5cf925087907e8c563f98e8d2623774f3a4843b8319c66a8

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0390.exe
        Filesize

        291KB

        MD5

        ebd5bc3bcdd3cb84c01c1b1b56de6d47

        SHA1

        ae522fc69743390a6663f14e67af00433e3ac188

        SHA256

        9f43868afac8fc07e46ca33c6e04807439b2453be6c6c42c80fec195e31efd4c

        SHA512

        ed5ddd9908d5423d965098acc84b5cea5c91350bbc849af444fa03bb7fe2e2f12f6a532fcb5908ac5cf925087907e8c563f98e8d2623774f3a4843b8319c66a8

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2531.exe
        Filesize

        345KB

        MD5

        ace17c5c7535bf12edae0639c6e4ed26

        SHA1

        125d036fc624f9808a4556e4489c810ccff05527

        SHA256

        075dbce4f1855af9b9a0b19b38a70bb6333eee429a31e7dce5852bea04e234c7

        SHA512

        4640503c059dc9e9534a1a9bea7f18a2f3269a8fc37b0726cb31943ee78110e7a75b927b25cb6b187444a2923c64f10359da5940ac1952b0c4adb2a330d9beed

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2531.exe
        Filesize

        345KB

        MD5

        ace17c5c7535bf12edae0639c6e4ed26

        SHA1

        125d036fc624f9808a4556e4489c810ccff05527

        SHA256

        075dbce4f1855af9b9a0b19b38a70bb6333eee429a31e7dce5852bea04e234c7

        SHA512

        4640503c059dc9e9534a1a9bea7f18a2f3269a8fc37b0726cb31943ee78110e7a75b927b25cb6b187444a2923c64f10359da5940ac1952b0c4adb2a330d9beed

      • memory/620-1121-0x0000000000890000-0x00000000008C2000-memory.dmp
        Filesize

        200KB

      • memory/620-1122-0x00000000054B0000-0x00000000054C0000-memory.dmp
        Filesize

        64KB

      • memory/2296-156-0x0000000002960000-0x0000000002972000-memory.dmp
        Filesize

        72KB

      • memory/2296-166-0x0000000002960000-0x0000000002972000-memory.dmp
        Filesize

        72KB

      • memory/2296-152-0x0000000005010000-0x0000000005020000-memory.dmp
        Filesize

        64KB

      • memory/2296-151-0x0000000005010000-0x0000000005020000-memory.dmp
        Filesize

        64KB

      • memory/2296-153-0x0000000002960000-0x0000000002972000-memory.dmp
        Filesize

        72KB

      • memory/2296-154-0x0000000002960000-0x0000000002972000-memory.dmp
        Filesize

        72KB

      • memory/2296-150-0x0000000005010000-0x0000000005020000-memory.dmp
        Filesize

        64KB

      • memory/2296-158-0x0000000002960000-0x0000000002972000-memory.dmp
        Filesize

        72KB

      • memory/2296-160-0x0000000002960000-0x0000000002972000-memory.dmp
        Filesize

        72KB

      • memory/2296-162-0x0000000002960000-0x0000000002972000-memory.dmp
        Filesize

        72KB

      • memory/2296-164-0x0000000002960000-0x0000000002972000-memory.dmp
        Filesize

        72KB

      • memory/2296-149-0x0000000000710000-0x000000000073D000-memory.dmp
        Filesize

        180KB

      • memory/2296-168-0x0000000002960000-0x0000000002972000-memory.dmp
        Filesize

        72KB

      • memory/2296-170-0x0000000002960000-0x0000000002972000-memory.dmp
        Filesize

        72KB

      • memory/2296-172-0x0000000002960000-0x0000000002972000-memory.dmp
        Filesize

        72KB

      • memory/2296-174-0x0000000002960000-0x0000000002972000-memory.dmp
        Filesize

        72KB

      • memory/2296-176-0x0000000002960000-0x0000000002972000-memory.dmp
        Filesize

        72KB

      • memory/2296-178-0x0000000002960000-0x0000000002972000-memory.dmp
        Filesize

        72KB

      • memory/2296-180-0x0000000002960000-0x0000000002972000-memory.dmp
        Filesize

        72KB

      • memory/2296-181-0x0000000000400000-0x000000000070B000-memory.dmp
        Filesize

        3.0MB

      • memory/2296-182-0x0000000005010000-0x0000000005020000-memory.dmp
        Filesize

        64KB

      • memory/2296-183-0x0000000005010000-0x0000000005020000-memory.dmp
        Filesize

        64KB

      • memory/2296-185-0x0000000000400000-0x000000000070B000-memory.dmp
        Filesize

        3.0MB

      • memory/2296-148-0x0000000005020000-0x00000000055C4000-memory.dmp
        Filesize

        5.6MB

      • memory/2668-191-0x0000000006010000-0x000000000604F000-memory.dmp
        Filesize

        252KB

      • memory/2668-411-0x00000000060C0000-0x00000000060D0000-memory.dmp
        Filesize

        64KB

      • memory/2668-195-0x0000000006010000-0x000000000604F000-memory.dmp
        Filesize

        252KB

      • memory/2668-197-0x0000000006010000-0x000000000604F000-memory.dmp
        Filesize

        252KB

      • memory/2668-199-0x0000000006010000-0x000000000604F000-memory.dmp
        Filesize

        252KB

      • memory/2668-201-0x0000000006010000-0x000000000604F000-memory.dmp
        Filesize

        252KB

      • memory/2668-203-0x0000000006010000-0x000000000604F000-memory.dmp
        Filesize

        252KB

      • memory/2668-205-0x0000000006010000-0x000000000604F000-memory.dmp
        Filesize

        252KB

      • memory/2668-207-0x0000000006010000-0x000000000604F000-memory.dmp
        Filesize

        252KB

      • memory/2668-211-0x0000000006010000-0x000000000604F000-memory.dmp
        Filesize

        252KB

      • memory/2668-209-0x0000000006010000-0x000000000604F000-memory.dmp
        Filesize

        252KB

      • memory/2668-213-0x0000000006010000-0x000000000604F000-memory.dmp
        Filesize

        252KB

      • memory/2668-215-0x0000000006010000-0x000000000604F000-memory.dmp
        Filesize

        252KB

      • memory/2668-217-0x0000000006010000-0x000000000604F000-memory.dmp
        Filesize

        252KB

      • memory/2668-219-0x0000000006010000-0x000000000604F000-memory.dmp
        Filesize

        252KB

      • memory/2668-221-0x0000000006010000-0x000000000604F000-memory.dmp
        Filesize

        252KB

      • memory/2668-223-0x0000000006010000-0x000000000604F000-memory.dmp
        Filesize

        252KB

      • memory/2668-409-0x00000000060C0000-0x00000000060D0000-memory.dmp
        Filesize

        64KB

      • memory/2668-407-0x0000000001A30000-0x0000000001A7B000-memory.dmp
        Filesize

        300KB

      • memory/2668-193-0x0000000006010000-0x000000000604F000-memory.dmp
        Filesize

        252KB

      • memory/2668-414-0x00000000060C0000-0x00000000060D0000-memory.dmp
        Filesize

        64KB

      • memory/2668-1100-0x0000000006780000-0x0000000006D98000-memory.dmp
        Filesize

        6.1MB

      • memory/2668-1101-0x0000000006E10000-0x0000000006F1A000-memory.dmp
        Filesize

        1.0MB

      • memory/2668-1102-0x0000000006F50000-0x0000000006F62000-memory.dmp
        Filesize

        72KB

      • memory/2668-1103-0x00000000060C0000-0x00000000060D0000-memory.dmp
        Filesize

        64KB

      • memory/2668-1104-0x0000000006F70000-0x0000000006FAC000-memory.dmp
        Filesize

        240KB

      • memory/2668-1105-0x0000000007260000-0x00000000072C6000-memory.dmp
        Filesize

        408KB

      • memory/2668-1106-0x0000000007920000-0x00000000079B2000-memory.dmp
        Filesize

        584KB

      • memory/2668-1107-0x0000000007A00000-0x0000000007A76000-memory.dmp
        Filesize

        472KB

      • memory/2668-1108-0x0000000007A90000-0x0000000007AE0000-memory.dmp
        Filesize

        320KB

      • memory/2668-1110-0x00000000060C0000-0x00000000060D0000-memory.dmp
        Filesize

        64KB

      • memory/2668-1111-0x00000000060C0000-0x00000000060D0000-memory.dmp
        Filesize

        64KB

      • memory/2668-1112-0x00000000060C0000-0x00000000060D0000-memory.dmp
        Filesize

        64KB

      • memory/2668-190-0x0000000006010000-0x000000000604F000-memory.dmp
        Filesize

        252KB

      • memory/2668-1113-0x0000000007B00000-0x0000000007CC2000-memory.dmp
        Filesize

        1.8MB

      • memory/2668-1114-0x0000000007CE0000-0x000000000820C000-memory.dmp
        Filesize

        5.2MB

      • memory/2668-1115-0x00000000060C0000-0x00000000060D0000-memory.dmp
        Filesize

        64KB