Analysis

  • max time kernel
    93s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 02:21

General

  • Target

    1456ea1b708dfc3fd664982c218526a34c5d979ffceeefa230011d4f73bb310a.exe

  • Size

    689KB

  • MD5

    246ee83e46d70e6f2d3a2b3c843d6a3d

  • SHA1

    0f9d05bc18102189b473d12f91b1d9be7a87c5ee

  • SHA256

    1456ea1b708dfc3fd664982c218526a34c5d979ffceeefa230011d4f73bb310a

  • SHA512

    7c0cad502c4ed420b7e92ca89f9585e9f5482bc0039a56cf17c74f185f966c5b369d051ab77b602ab9a3d0ae18004659c685143bf9dd7546a077f6f6f996205d

  • SSDEEP

    12288:QMryy90inx18ElNJ8TL0nX95B0uh11QMon93+DT4Tid2cs8nGHCkmJ6vrFtYfig6:yyDnx18ElNIQNz0fMw+DTyJ8imJ6htYQ

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1456ea1b708dfc3fd664982c218526a34c5d979ffceeefa230011d4f73bb310a.exe
    "C:\Users\Admin\AppData\Local\Temp\1456ea1b708dfc3fd664982c218526a34c5d979ffceeefa230011d4f73bb310a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:820
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un247212.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un247212.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8150.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8150.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3312
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 1084
          4⤵
          • Program crash
          PID:1268
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4107.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4107.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5000
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5000 -s 1328
          4⤵
          • Program crash
          PID:2536
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si775886.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si775886.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2044
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3312 -ip 3312
    1⤵
      PID:4528
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5000 -ip 5000
      1⤵
        PID:1404

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si775886.exe

        Filesize

        175KB

        MD5

        6c9b895ac9e3972bf699a12837c72cc1

        SHA1

        e997334510d2883f7bcf92646cec627fb85287d3

        SHA256

        4853a7cface9590b38775043d6abe9f66b457f20c319f7154fbdb016be1cdaf7

        SHA512

        e0c229d6028529dee5d6abbe21b0016216d996239842f3df7e1e0f5ddc4213a42ecfbeea0846f5b38ad9ac34984429fc581f04bdf89823baee337dbd7a3904ad

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si775886.exe

        Filesize

        175KB

        MD5

        6c9b895ac9e3972bf699a12837c72cc1

        SHA1

        e997334510d2883f7bcf92646cec627fb85287d3

        SHA256

        4853a7cface9590b38775043d6abe9f66b457f20c319f7154fbdb016be1cdaf7

        SHA512

        e0c229d6028529dee5d6abbe21b0016216d996239842f3df7e1e0f5ddc4213a42ecfbeea0846f5b38ad9ac34984429fc581f04bdf89823baee337dbd7a3904ad

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un247212.exe

        Filesize

        547KB

        MD5

        e2aaa78f9f1a8d064fa2595d14a6d554

        SHA1

        4a05b00c41454ffef1de39cf0a76bdbf4bffc516

        SHA256

        7b366f38e3a3fcceb6de2b7e99bac19a025be36627538149aa781f388e6e6531

        SHA512

        9e8a144f86f792a77a7eddb36d1b962264d2f5e9ef4ae5453ab1693d642a9deb1313b5ecd7f3101e2c22e20d8859e18721dc8df75a035aec1e97802afdade922

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un247212.exe

        Filesize

        547KB

        MD5

        e2aaa78f9f1a8d064fa2595d14a6d554

        SHA1

        4a05b00c41454ffef1de39cf0a76bdbf4bffc516

        SHA256

        7b366f38e3a3fcceb6de2b7e99bac19a025be36627538149aa781f388e6e6531

        SHA512

        9e8a144f86f792a77a7eddb36d1b962264d2f5e9ef4ae5453ab1693d642a9deb1313b5ecd7f3101e2c22e20d8859e18721dc8df75a035aec1e97802afdade922

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8150.exe

        Filesize

        291KB

        MD5

        dc9c5698de530b51d104f959844a9998

        SHA1

        a04d4f4993a70de01e19c96887974eab52e2a077

        SHA256

        2054398cce30a56bd319f124634e496c66cb250febd544c48b98f36066b39e09

        SHA512

        46cc69dc357405f26f96a61a427f10080644a4d87cddfaa7da9623dc584f5c3e4d3b6e59eddf4f376c95372361a91cd1548d74f7d3ba17a278582f659df9402b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8150.exe

        Filesize

        291KB

        MD5

        dc9c5698de530b51d104f959844a9998

        SHA1

        a04d4f4993a70de01e19c96887974eab52e2a077

        SHA256

        2054398cce30a56bd319f124634e496c66cb250febd544c48b98f36066b39e09

        SHA512

        46cc69dc357405f26f96a61a427f10080644a4d87cddfaa7da9623dc584f5c3e4d3b6e59eddf4f376c95372361a91cd1548d74f7d3ba17a278582f659df9402b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4107.exe

        Filesize

        345KB

        MD5

        c051256d706eaac4b1a9c3d7f47b7d71

        SHA1

        4087624ff15511706dafb21cf2eb5d587f3d7372

        SHA256

        98231fbca50594f2b7d148e0cff4280ed5317f74d2833f8743e7652702a1e3c1

        SHA512

        b8bfbf5f503ab5a19e9ab5ef2010240209876102b71169514f8cdc7a86cbfb5aa30b6653b3a1ef6503f89818f16f8e3595780de4d307d0acd2fffe97c6eaa304

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4107.exe

        Filesize

        345KB

        MD5

        c051256d706eaac4b1a9c3d7f47b7d71

        SHA1

        4087624ff15511706dafb21cf2eb5d587f3d7372

        SHA256

        98231fbca50594f2b7d148e0cff4280ed5317f74d2833f8743e7652702a1e3c1

        SHA512

        b8bfbf5f503ab5a19e9ab5ef2010240209876102b71169514f8cdc7a86cbfb5aa30b6653b3a1ef6503f89818f16f8e3595780de4d307d0acd2fffe97c6eaa304

      • memory/2044-1120-0x0000000000080000-0x00000000000B2000-memory.dmp

        Filesize

        200KB

      • memory/2044-1121-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/3312-156-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/3312-166-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/3312-151-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/3312-152-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/3312-153-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/3312-154-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/3312-149-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/3312-158-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/3312-160-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/3312-162-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/3312-164-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/3312-150-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/3312-168-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/3312-170-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/3312-172-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/3312-174-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/3312-176-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/3312-178-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/3312-180-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/3312-181-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/3312-182-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/3312-184-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/3312-148-0x0000000004E40000-0x00000000053E4000-memory.dmp

        Filesize

        5.6MB

      • memory/5000-192-0x0000000003A90000-0x0000000003ACF000-memory.dmp

        Filesize

        252KB

      • memory/5000-224-0x0000000006140000-0x0000000006150000-memory.dmp

        Filesize

        64KB

      • memory/5000-194-0x0000000003A90000-0x0000000003ACF000-memory.dmp

        Filesize

        252KB

      • memory/5000-196-0x0000000003A90000-0x0000000003ACF000-memory.dmp

        Filesize

        252KB

      • memory/5000-198-0x0000000003A90000-0x0000000003ACF000-memory.dmp

        Filesize

        252KB

      • memory/5000-200-0x0000000003A90000-0x0000000003ACF000-memory.dmp

        Filesize

        252KB

      • memory/5000-202-0x0000000003A90000-0x0000000003ACF000-memory.dmp

        Filesize

        252KB

      • memory/5000-204-0x0000000003A90000-0x0000000003ACF000-memory.dmp

        Filesize

        252KB

      • memory/5000-206-0x0000000003A90000-0x0000000003ACF000-memory.dmp

        Filesize

        252KB

      • memory/5000-208-0x0000000003A90000-0x0000000003ACF000-memory.dmp

        Filesize

        252KB

      • memory/5000-210-0x0000000003A90000-0x0000000003ACF000-memory.dmp

        Filesize

        252KB

      • memory/5000-212-0x0000000003A90000-0x0000000003ACF000-memory.dmp

        Filesize

        252KB

      • memory/5000-214-0x0000000003A90000-0x0000000003ACF000-memory.dmp

        Filesize

        252KB

      • memory/5000-216-0x0000000003A90000-0x0000000003ACF000-memory.dmp

        Filesize

        252KB

      • memory/5000-218-0x0000000003A90000-0x0000000003ACF000-memory.dmp

        Filesize

        252KB

      • memory/5000-221-0x0000000001B00000-0x0000000001B4B000-memory.dmp

        Filesize

        300KB

      • memory/5000-223-0x0000000006140000-0x0000000006150000-memory.dmp

        Filesize

        64KB

      • memory/5000-220-0x0000000003A90000-0x0000000003ACF000-memory.dmp

        Filesize

        252KB

      • memory/5000-225-0x0000000003A90000-0x0000000003ACF000-memory.dmp

        Filesize

        252KB

      • memory/5000-190-0x0000000003A90000-0x0000000003ACF000-memory.dmp

        Filesize

        252KB

      • memory/5000-227-0x0000000006140000-0x0000000006150000-memory.dmp

        Filesize

        64KB

      • memory/5000-1099-0x0000000006700000-0x0000000006D18000-memory.dmp

        Filesize

        6.1MB

      • memory/5000-1100-0x0000000006D20000-0x0000000006E2A000-memory.dmp

        Filesize

        1.0MB

      • memory/5000-1101-0x0000000006120000-0x0000000006132000-memory.dmp

        Filesize

        72KB

      • memory/5000-1102-0x0000000006E30000-0x0000000006E6C000-memory.dmp

        Filesize

        240KB

      • memory/5000-1103-0x0000000006140000-0x0000000006150000-memory.dmp

        Filesize

        64KB

      • memory/5000-1105-0x0000000007120000-0x0000000007186000-memory.dmp

        Filesize

        408KB

      • memory/5000-1106-0x0000000007920000-0x00000000079B2000-memory.dmp

        Filesize

        584KB

      • memory/5000-1107-0x0000000007A00000-0x0000000007A76000-memory.dmp

        Filesize

        472KB

      • memory/5000-1108-0x0000000007A90000-0x0000000007AE0000-memory.dmp

        Filesize

        320KB

      • memory/5000-1109-0x0000000006140000-0x0000000006150000-memory.dmp

        Filesize

        64KB

      • memory/5000-1110-0x0000000006140000-0x0000000006150000-memory.dmp

        Filesize

        64KB

      • memory/5000-1111-0x0000000006140000-0x0000000006150000-memory.dmp

        Filesize

        64KB

      • memory/5000-189-0x0000000003A90000-0x0000000003ACF000-memory.dmp

        Filesize

        252KB

      • memory/5000-1112-0x0000000007D40000-0x0000000007F02000-memory.dmp

        Filesize

        1.8MB

      • memory/5000-1113-0x0000000007F60000-0x000000000848C000-memory.dmp

        Filesize

        5.2MB

      • memory/5000-1114-0x0000000006140000-0x0000000006150000-memory.dmp

        Filesize

        64KB