Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 02:27

General

  • Target

    936e182d5114373e2d6608bc528d3e66716655d0177903b37e8dbd912903f83a.exe

  • Size

    689KB

  • MD5

    39b0be139665d421001d24d00d7c2000

  • SHA1

    8307ce4e21677b52b3b5e05a1dedbaec13e7bb85

  • SHA256

    936e182d5114373e2d6608bc528d3e66716655d0177903b37e8dbd912903f83a

  • SHA512

    8866edab1af1d8e9565f27caa52f38e9707e28ff7c1bd1d281cb94ff2d5242a344d3c05d4744b014247ddfcd484412b09abda0f8e88269c7c36d57ff5acc56f7

  • SSDEEP

    12288:pMr3y90GcXhOVqvuKCTAwSVuy965hLuXAkYAD5fNohmsvnF9tfigg1TVXZoDf:SyV+hOVqxCTQrQfaXAU12d9tag/f

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\936e182d5114373e2d6608bc528d3e66716655d0177903b37e8dbd912903f83a.exe
    "C:\Users\Admin\AppData\Local\Temp\936e182d5114373e2d6608bc528d3e66716655d0177903b37e8dbd912903f83a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un375505.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un375505.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2716
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5345.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5345.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4564
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4564 -s 1064
          4⤵
          • Program crash
          PID:3960
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9951.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9951.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4512
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4512 -s 1336
          4⤵
          • Program crash
          PID:3696
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si517044.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si517044.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4552
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4564 -ip 4564
    1⤵
      PID:3980
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4512 -ip 4512
      1⤵
        PID:2172

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si517044.exe
        Filesize

        175KB

        MD5

        b595846bdcc5a2846078086a4cc85951

        SHA1

        42f6e0e4db46dba972bc169a7bf181a7756a8cc7

        SHA256

        7c45fd533a418a86c5a9b306b77b6d546446f3859bb61afb09381ebf4bb44cc4

        SHA512

        11b9938ef4312ed220ba8283e5aa689d62dab93c92b19d48a23a8671d237f788450eff9722c02487c9c6d68e92abfe228424304cd2e0fd6078c7df98e857a8f9

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si517044.exe
        Filesize

        175KB

        MD5

        b595846bdcc5a2846078086a4cc85951

        SHA1

        42f6e0e4db46dba972bc169a7bf181a7756a8cc7

        SHA256

        7c45fd533a418a86c5a9b306b77b6d546446f3859bb61afb09381ebf4bb44cc4

        SHA512

        11b9938ef4312ed220ba8283e5aa689d62dab93c92b19d48a23a8671d237f788450eff9722c02487c9c6d68e92abfe228424304cd2e0fd6078c7df98e857a8f9

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un375505.exe
        Filesize

        548KB

        MD5

        0e52baee8a17cc3d753935f26efe93cb

        SHA1

        505f567292971f0f3d983a8cd66f6bfa26150c51

        SHA256

        ecd27e168ee376fe887568656a91b3d6e95455f113441c2e4d489e40d2a37460

        SHA512

        b222a9bcdb289f12a9e5dc3922cb9d942b6bc662e02f8c13f15d345e2c6f166271dc9c3f8bdbc1c2a311e3733a991fe4c2e88f17df5e6098c4498971ae2e2575

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un375505.exe
        Filesize

        548KB

        MD5

        0e52baee8a17cc3d753935f26efe93cb

        SHA1

        505f567292971f0f3d983a8cd66f6bfa26150c51

        SHA256

        ecd27e168ee376fe887568656a91b3d6e95455f113441c2e4d489e40d2a37460

        SHA512

        b222a9bcdb289f12a9e5dc3922cb9d942b6bc662e02f8c13f15d345e2c6f166271dc9c3f8bdbc1c2a311e3733a991fe4c2e88f17df5e6098c4498971ae2e2575

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5345.exe
        Filesize

        291KB

        MD5

        c073be52f261047ad6dd578613c68d6b

        SHA1

        e1d1521a87bdf1fc8021fe0bd9a73750a2f96ebd

        SHA256

        9907767abb77071b14325de59dab8aa75036efa0e8626ccd7db152a62a72c43e

        SHA512

        11303cf2f620d407beb9d7af27b224fbb0d0e51922029e503e319e561fc50f5f988e2ebf975c297268ceeef35be9f3a02cf71c6a009975bafc394c4e307de16b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5345.exe
        Filesize

        291KB

        MD5

        c073be52f261047ad6dd578613c68d6b

        SHA1

        e1d1521a87bdf1fc8021fe0bd9a73750a2f96ebd

        SHA256

        9907767abb77071b14325de59dab8aa75036efa0e8626ccd7db152a62a72c43e

        SHA512

        11303cf2f620d407beb9d7af27b224fbb0d0e51922029e503e319e561fc50f5f988e2ebf975c297268ceeef35be9f3a02cf71c6a009975bafc394c4e307de16b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9951.exe
        Filesize

        345KB

        MD5

        c584823c30a9b6ba3c4bc4642cecd4c5

        SHA1

        247a02a43c8071e9056973f70484da0b6b8dbc5d

        SHA256

        4e7a4b62c6b5433d941bfd55796091c1d82d324cd66a794fea910efd51219c68

        SHA512

        01a420ef3832c972a946b20890c7396ad9bc477fa27922301b65536a324363d39c56ac258186e2bbd7fe607f79eed7e125a9004892db782da0894a360ec4a63d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9951.exe
        Filesize

        345KB

        MD5

        c584823c30a9b6ba3c4bc4642cecd4c5

        SHA1

        247a02a43c8071e9056973f70484da0b6b8dbc5d

        SHA256

        4e7a4b62c6b5433d941bfd55796091c1d82d324cd66a794fea910efd51219c68

        SHA512

        01a420ef3832c972a946b20890c7396ad9bc477fa27922301b65536a324363d39c56ac258186e2bbd7fe607f79eed7e125a9004892db782da0894a360ec4a63d

      • memory/4512-1102-0x0000000006E10000-0x0000000006F1A000-memory.dmp
        Filesize

        1.0MB

      • memory/4512-1103-0x0000000006F50000-0x0000000006F62000-memory.dmp
        Filesize

        72KB

      • memory/4512-218-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4512-216-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4512-214-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4512-204-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4512-1116-0x0000000005EB0000-0x0000000005EC0000-memory.dmp
        Filesize

        64KB

      • memory/4512-1115-0x00000000083E0000-0x0000000008430000-memory.dmp
        Filesize

        320KB

      • memory/4512-1114-0x0000000008340000-0x00000000083B6000-memory.dmp
        Filesize

        472KB

      • memory/4512-1113-0x0000000007CF0000-0x000000000821C000-memory.dmp
        Filesize

        5.2MB

      • memory/4512-1112-0x0000000007B20000-0x0000000007CE2000-memory.dmp
        Filesize

        1.8MB

      • memory/4512-1111-0x0000000005EB0000-0x0000000005EC0000-memory.dmp
        Filesize

        64KB

      • memory/4512-1110-0x0000000005EB0000-0x0000000005EC0000-memory.dmp
        Filesize

        64KB

      • memory/4512-206-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4512-1109-0x0000000005EB0000-0x0000000005EC0000-memory.dmp
        Filesize

        64KB

      • memory/4512-1107-0x0000000007300000-0x0000000007366000-memory.dmp
        Filesize

        408KB

      • memory/4512-1106-0x0000000007260000-0x00000000072F2000-memory.dmp
        Filesize

        584KB

      • memory/4512-1105-0x0000000005EB0000-0x0000000005EC0000-memory.dmp
        Filesize

        64KB

      • memory/4512-1104-0x0000000006F70000-0x0000000006FAC000-memory.dmp
        Filesize

        240KB

      • memory/4512-220-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4512-1101-0x0000000006770000-0x0000000006D88000-memory.dmp
        Filesize

        6.1MB

      • memory/4512-228-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4512-226-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4512-192-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4512-191-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4512-208-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4512-197-0x0000000001A40000-0x0000000001A8B000-memory.dmp
        Filesize

        300KB

      • memory/4512-196-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4512-199-0x0000000005EB0000-0x0000000005EC0000-memory.dmp
        Filesize

        64KB

      • memory/4512-200-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4512-203-0x0000000005EB0000-0x0000000005EC0000-memory.dmp
        Filesize

        64KB

      • memory/4512-201-0x0000000005EB0000-0x0000000005EC0000-memory.dmp
        Filesize

        64KB

      • memory/4512-224-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4512-222-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4512-194-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4512-210-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4512-212-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4552-1122-0x0000000000F60000-0x0000000000F92000-memory.dmp
        Filesize

        200KB

      • memory/4552-1123-0x0000000005C50000-0x0000000005C60000-memory.dmp
        Filesize

        64KB

      • memory/4552-1124-0x0000000005C50000-0x0000000005C60000-memory.dmp
        Filesize

        64KB

      • memory/4564-182-0x0000000004DF0000-0x0000000004E00000-memory.dmp
        Filesize

        64KB

      • memory/4564-176-0x0000000002680000-0x0000000002692000-memory.dmp
        Filesize

        72KB

      • memory/4564-162-0x0000000002680000-0x0000000002692000-memory.dmp
        Filesize

        72KB

      • memory/4564-151-0x0000000004DF0000-0x0000000004E00000-memory.dmp
        Filesize

        64KB

      • memory/4564-152-0x0000000004DF0000-0x0000000004E00000-memory.dmp
        Filesize

        64KB

      • memory/4564-186-0x0000000000400000-0x000000000070B000-memory.dmp
        Filesize

        3.0MB

      • memory/4564-150-0x0000000004DF0000-0x0000000004E00000-memory.dmp
        Filesize

        64KB

      • memory/4564-184-0x0000000004DF0000-0x0000000004E00000-memory.dmp
        Filesize

        64KB

      • memory/4564-183-0x0000000004DF0000-0x0000000004E00000-memory.dmp
        Filesize

        64KB

      • memory/4564-153-0x0000000002680000-0x0000000002692000-memory.dmp
        Filesize

        72KB

      • memory/4564-181-0x0000000000400000-0x000000000070B000-memory.dmp
        Filesize

        3.0MB

      • memory/4564-180-0x0000000002680000-0x0000000002692000-memory.dmp
        Filesize

        72KB

      • memory/4564-178-0x0000000002680000-0x0000000002692000-memory.dmp
        Filesize

        72KB

      • memory/4564-174-0x0000000002680000-0x0000000002692000-memory.dmp
        Filesize

        72KB

      • memory/4564-172-0x0000000002680000-0x0000000002692000-memory.dmp
        Filesize

        72KB

      • memory/4564-170-0x0000000002680000-0x0000000002692000-memory.dmp
        Filesize

        72KB

      • memory/4564-168-0x0000000002680000-0x0000000002692000-memory.dmp
        Filesize

        72KB

      • memory/4564-166-0x0000000002680000-0x0000000002692000-memory.dmp
        Filesize

        72KB

      • memory/4564-164-0x0000000002680000-0x0000000002692000-memory.dmp
        Filesize

        72KB

      • memory/4564-160-0x0000000002680000-0x0000000002692000-memory.dmp
        Filesize

        72KB

      • memory/4564-149-0x0000000000710000-0x000000000073D000-memory.dmp
        Filesize

        180KB

      • memory/4564-148-0x0000000004E00000-0x00000000053A4000-memory.dmp
        Filesize

        5.6MB

      • memory/4564-158-0x0000000002680000-0x0000000002692000-memory.dmp
        Filesize

        72KB

      • memory/4564-156-0x0000000002680000-0x0000000002692000-memory.dmp
        Filesize

        72KB

      • memory/4564-154-0x0000000002680000-0x0000000002692000-memory.dmp
        Filesize

        72KB