Analysis

  • max time kernel
    94s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 03:34

General

  • Target

    dbda5c0fb7dc2b929baee3fad30e7939653e51245128977d179c9707bda00dc4.exe

  • Size

    690KB

  • MD5

    f7c7d32fd41a4863efa4d280e39d1a9c

  • SHA1

    589a78e0b1c921db8f28355ec9f2a6413981e9ed

  • SHA256

    dbda5c0fb7dc2b929baee3fad30e7939653e51245128977d179c9707bda00dc4

  • SHA512

    a3f72ebbd09dcb438af2272d0e0e85600288f1f8fe5fd4eeb6a2ba6964cae41faafbde272c3716cc4fdb958ed4b177c19f0d0259b6cd265b8830e6605a0c87e3

  • SSDEEP

    12288:LMriy90EtUVQub2qcepCuPQy565hLuBaG4gNZF6BQEvvFFSHfigbJEKJaLd++rgI:FyN6VQub2PepphEfaoYZF6BQIHSHagNa

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dbda5c0fb7dc2b929baee3fad30e7939653e51245128977d179c9707bda00dc4.exe
    "C:\Users\Admin\AppData\Local\Temp\dbda5c0fb7dc2b929baee3fad30e7939653e51245128977d179c9707bda00dc4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1364
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un260175.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un260175.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3540
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5964.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5964.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1304
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1304 -s 1088
          4⤵
          • Program crash
          PID:3060
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7623.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7623.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:908
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 908 -s 1956
          4⤵
          • Program crash
          PID:2380
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si181976.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si181976.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3208
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1304 -ip 1304
    1⤵
      PID:4164
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 908 -ip 908
      1⤵
        PID:3732

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si181976.exe
        Filesize

        175KB

        MD5

        b5d6c5e2ac675ecc0b916f6010a965be

        SHA1

        085400d35949650151eb2e20b8eaebccc8f5e936

        SHA256

        da334a5e0571a8431f8aa951674fc617eff8ebfa5ff946be2508db4d2a5ace21

        SHA512

        80e7d097ef864cd3d4b93a118586f3aa8cc6117b65c88590b5a7d6a176c90eaec82e331eb37f01967c0bad26738fd0d33e2c88f5265f7fa4a4aef9e455aa927e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si181976.exe
        Filesize

        175KB

        MD5

        b5d6c5e2ac675ecc0b916f6010a965be

        SHA1

        085400d35949650151eb2e20b8eaebccc8f5e936

        SHA256

        da334a5e0571a8431f8aa951674fc617eff8ebfa5ff946be2508db4d2a5ace21

        SHA512

        80e7d097ef864cd3d4b93a118586f3aa8cc6117b65c88590b5a7d6a176c90eaec82e331eb37f01967c0bad26738fd0d33e2c88f5265f7fa4a4aef9e455aa927e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un260175.exe
        Filesize

        548KB

        MD5

        7d77172bc528235e9fdf63870ddc049d

        SHA1

        3eb04bada1fb9f66268bc7eb9901cd3cec7b8ec1

        SHA256

        31861f5defd0e436177a26637de9a67cafab7f14a1538f7561a94e4625a9cd0a

        SHA512

        0f129c7ecc40f1a47c097617969708f21e402ec60caf57672665b6c475236cb069586b756aca1f93e36dc57db0a47d8066fea7537fd0e8217d29530c8e65bbc1

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un260175.exe
        Filesize

        548KB

        MD5

        7d77172bc528235e9fdf63870ddc049d

        SHA1

        3eb04bada1fb9f66268bc7eb9901cd3cec7b8ec1

        SHA256

        31861f5defd0e436177a26637de9a67cafab7f14a1538f7561a94e4625a9cd0a

        SHA512

        0f129c7ecc40f1a47c097617969708f21e402ec60caf57672665b6c475236cb069586b756aca1f93e36dc57db0a47d8066fea7537fd0e8217d29530c8e65bbc1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5964.exe
        Filesize

        291KB

        MD5

        0475a34e829eef6b92d6ce545923cbed

        SHA1

        508d6122367c1b836cbf574fb2a231c60e2830f3

        SHA256

        357a4faec68f34c95387698f6733f0e2399f5b54e51326a14c152c8cce1a0210

        SHA512

        baf2b4ef9aab6e18df088d5c2f7d13885d50f37d659855430fbfa6c8f9e9f0f179a41a3dc8b524ca03149939a4960e2fbb7fbfa00a67e9151f8d767542e81866

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5964.exe
        Filesize

        291KB

        MD5

        0475a34e829eef6b92d6ce545923cbed

        SHA1

        508d6122367c1b836cbf574fb2a231c60e2830f3

        SHA256

        357a4faec68f34c95387698f6733f0e2399f5b54e51326a14c152c8cce1a0210

        SHA512

        baf2b4ef9aab6e18df088d5c2f7d13885d50f37d659855430fbfa6c8f9e9f0f179a41a3dc8b524ca03149939a4960e2fbb7fbfa00a67e9151f8d767542e81866

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7623.exe
        Filesize

        345KB

        MD5

        8e44d683fa50c0d930336e3c23f1c377

        SHA1

        a5a592515b995dd787cb29e7e0005fc9e88aa2f6

        SHA256

        54be1b9f51e9f0e93ab78b47ecd364bfb88d46cf9c7f4169e1b2eb3f51067866

        SHA512

        63627dc6751861e7530f48e9cbe4416c226a316aee2c621f13ae7eee4d47e4d31573a79a8ce90c4cf7e06294920d9dafc0a34c36e97cea4d522cc81218bc72fb

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7623.exe
        Filesize

        345KB

        MD5

        8e44d683fa50c0d930336e3c23f1c377

        SHA1

        a5a592515b995dd787cb29e7e0005fc9e88aa2f6

        SHA256

        54be1b9f51e9f0e93ab78b47ecd364bfb88d46cf9c7f4169e1b2eb3f51067866

        SHA512

        63627dc6751861e7530f48e9cbe4416c226a316aee2c621f13ae7eee4d47e4d31573a79a8ce90c4cf7e06294920d9dafc0a34c36e97cea4d522cc81218bc72fb

      • memory/908-1102-0x0000000006E10000-0x0000000006F1A000-memory.dmp
        Filesize

        1.0MB

      • memory/908-226-0x0000000003B80000-0x0000000003BBF000-memory.dmp
        Filesize

        252KB

      • memory/908-204-0x0000000003B80000-0x0000000003BBF000-memory.dmp
        Filesize

        252KB

      • memory/908-206-0x0000000003B80000-0x0000000003BBF000-memory.dmp
        Filesize

        252KB

      • memory/908-1115-0x0000000007FF0000-0x000000000851C000-memory.dmp
        Filesize

        5.2MB

      • memory/908-1114-0x0000000007C20000-0x0000000007DE2000-memory.dmp
        Filesize

        1.8MB

      • memory/908-1113-0x0000000007BC0000-0x0000000007C10000-memory.dmp
        Filesize

        320KB

      • memory/908-1112-0x0000000007B20000-0x0000000007B96000-memory.dmp
        Filesize

        472KB

      • memory/908-1111-0x00000000060E0000-0x00000000060F0000-memory.dmp
        Filesize

        64KB

      • memory/908-1110-0x00000000060E0000-0x00000000060F0000-memory.dmp
        Filesize

        64KB

      • memory/908-208-0x0000000003B80000-0x0000000003BBF000-memory.dmp
        Filesize

        252KB

      • memory/908-1109-0x00000000060E0000-0x00000000060F0000-memory.dmp
        Filesize

        64KB

      • memory/908-1107-0x0000000007300000-0x0000000007366000-memory.dmp
        Filesize

        408KB

      • memory/908-1106-0x0000000007260000-0x00000000072F2000-memory.dmp
        Filesize

        584KB

      • memory/908-1105-0x00000000060E0000-0x00000000060F0000-memory.dmp
        Filesize

        64KB

      • memory/908-1104-0x0000000006F70000-0x0000000006FAC000-memory.dmp
        Filesize

        240KB

      • memory/908-1103-0x0000000006F50000-0x0000000006F62000-memory.dmp
        Filesize

        72KB

      • memory/908-1101-0x00000000067A0000-0x0000000006DB8000-memory.dmp
        Filesize

        6.1MB

      • memory/908-228-0x0000000003B80000-0x0000000003BBF000-memory.dmp
        Filesize

        252KB

      • memory/908-215-0x0000000003B80000-0x0000000003BBF000-memory.dmp
        Filesize

        252KB

      • memory/908-224-0x0000000003B80000-0x0000000003BBF000-memory.dmp
        Filesize

        252KB

      • memory/908-222-0x0000000003B80000-0x0000000003BBF000-memory.dmp
        Filesize

        252KB

      • memory/908-217-0x00000000060E0000-0x00000000060F0000-memory.dmp
        Filesize

        64KB

      • memory/908-191-0x0000000003B80000-0x0000000003BBF000-memory.dmp
        Filesize

        252KB

      • memory/908-194-0x0000000003B80000-0x0000000003BBF000-memory.dmp
        Filesize

        252KB

      • memory/908-192-0x0000000003B80000-0x0000000003BBF000-memory.dmp
        Filesize

        252KB

      • memory/908-196-0x0000000003B80000-0x0000000003BBF000-memory.dmp
        Filesize

        252KB

      • memory/908-198-0x0000000003B80000-0x0000000003BBF000-memory.dmp
        Filesize

        252KB

      • memory/908-200-0x0000000003B80000-0x0000000003BBF000-memory.dmp
        Filesize

        252KB

      • memory/908-202-0x0000000003B80000-0x0000000003BBF000-memory.dmp
        Filesize

        252KB

      • memory/908-220-0x0000000003B80000-0x0000000003BBF000-memory.dmp
        Filesize

        252KB

      • memory/908-1116-0x00000000060E0000-0x00000000060F0000-memory.dmp
        Filesize

        64KB

      • memory/908-218-0x0000000003B80000-0x0000000003BBF000-memory.dmp
        Filesize

        252KB

      • memory/908-210-0x0000000003B80000-0x0000000003BBF000-memory.dmp
        Filesize

        252KB

      • memory/908-211-0x0000000001B00000-0x0000000001B4B000-memory.dmp
        Filesize

        300KB

      • memory/908-213-0x00000000060E0000-0x00000000060F0000-memory.dmp
        Filesize

        64KB

      • memory/908-214-0x00000000060E0000-0x00000000060F0000-memory.dmp
        Filesize

        64KB

      • memory/1304-181-0x0000000000400000-0x000000000070B000-memory.dmp
        Filesize

        3.0MB

      • memory/1304-170-0x0000000004C70000-0x0000000004C82000-memory.dmp
        Filesize

        72KB

      • memory/1304-148-0x0000000004D30000-0x00000000052D4000-memory.dmp
        Filesize

        5.6MB

      • memory/1304-151-0x0000000004D20000-0x0000000004D30000-memory.dmp
        Filesize

        64KB

      • memory/1304-152-0x0000000004D20000-0x0000000004D30000-memory.dmp
        Filesize

        64KB

      • memory/1304-186-0x0000000000400000-0x000000000070B000-memory.dmp
        Filesize

        3.0MB

      • memory/1304-184-0x0000000004D20000-0x0000000004D30000-memory.dmp
        Filesize

        64KB

      • memory/1304-183-0x0000000004D20000-0x0000000004D30000-memory.dmp
        Filesize

        64KB

      • memory/1304-182-0x0000000004D20000-0x0000000004D30000-memory.dmp
        Filesize

        64KB

      • memory/1304-150-0x0000000004D20000-0x0000000004D30000-memory.dmp
        Filesize

        64KB

      • memory/1304-153-0x0000000004C70000-0x0000000004C82000-memory.dmp
        Filesize

        72KB

      • memory/1304-180-0x0000000004C70000-0x0000000004C82000-memory.dmp
        Filesize

        72KB

      • memory/1304-178-0x0000000004C70000-0x0000000004C82000-memory.dmp
        Filesize

        72KB

      • memory/1304-176-0x0000000004C70000-0x0000000004C82000-memory.dmp
        Filesize

        72KB

      • memory/1304-174-0x0000000004C70000-0x0000000004C82000-memory.dmp
        Filesize

        72KB

      • memory/1304-172-0x0000000004C70000-0x0000000004C82000-memory.dmp
        Filesize

        72KB

      • memory/1304-168-0x0000000004C70000-0x0000000004C82000-memory.dmp
        Filesize

        72KB

      • memory/1304-166-0x0000000004C70000-0x0000000004C82000-memory.dmp
        Filesize

        72KB

      • memory/1304-164-0x0000000004C70000-0x0000000004C82000-memory.dmp
        Filesize

        72KB

      • memory/1304-162-0x0000000004C70000-0x0000000004C82000-memory.dmp
        Filesize

        72KB

      • memory/1304-160-0x0000000004C70000-0x0000000004C82000-memory.dmp
        Filesize

        72KB

      • memory/1304-158-0x0000000004C70000-0x0000000004C82000-memory.dmp
        Filesize

        72KB

      • memory/1304-156-0x0000000004C70000-0x0000000004C82000-memory.dmp
        Filesize

        72KB

      • memory/1304-149-0x00000000007E0000-0x000000000080D000-memory.dmp
        Filesize

        180KB

      • memory/1304-154-0x0000000004C70000-0x0000000004C82000-memory.dmp
        Filesize

        72KB

      • memory/3208-1122-0x00000000006B0000-0x00000000006E2000-memory.dmp
        Filesize

        200KB

      • memory/3208-1123-0x00000000052A0000-0x00000000052B0000-memory.dmp
        Filesize

        64KB