Analysis

  • max time kernel
    61s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 03:33

General

  • Target

    1ba653eb8a0633e5450989333ffd706d58fde688d4692849d895f1073c905778.exe

  • Size

    688KB

  • MD5

    f512cb02b5dec6a85650deb4fc67b0d9

  • SHA1

    12581df072761537e742f552ad821df245ec1415

  • SHA256

    1ba653eb8a0633e5450989333ffd706d58fde688d4692849d895f1073c905778

  • SHA512

    a6a60cbaddb7b12003be259eb81b68572a7b503ea601c0aa14a4c31a661fe2fc138e782c61e9df0af03f1b59a9ef7425342deedd508b4a975c76c83af59bd1c2

  • SSDEEP

    12288:WMrOy909EHIHwRdTeEPEL0KS3Hfyu65hLuGoLb0CYvlWakutKdmJvvGFNIfigwA0:sy7HIHaAk+Y61fapPDIlWak7dmJvSNIg

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ba653eb8a0633e5450989333ffd706d58fde688d4692849d895f1073c905778.exe
    "C:\Users\Admin\AppData\Local\Temp\1ba653eb8a0633e5450989333ffd706d58fde688d4692849d895f1073c905778.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4244
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un741506.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un741506.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1488
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5236.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5236.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4520
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4520 -s 1080
          4⤵
          • Program crash
          PID:5080
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9834.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9834.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1556
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1556 -s 1328
          4⤵
          • Program crash
          PID:4944
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si060600.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si060600.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5052
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4520 -ip 4520
    1⤵
      PID:4992
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1556 -ip 1556
      1⤵
        PID:908

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si060600.exe
        Filesize

        175KB

        MD5

        0782fdfd25ec498331ed4be69af2da77

        SHA1

        2662259f96f60b99c72ea2aa2f62e65b254aa738

        SHA256

        eefaaca6ef5c6feb21111ce87a9483a126e55566d42d5291f51072f45c994f37

        SHA512

        92adf5d267d25060c8e256c6153671607219a7719aa8c69c480668634749fea649b46cd315f708b8ceb2f1d8044a82f86f83a21b98dd7c5cf73d70aefb23b673

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si060600.exe
        Filesize

        175KB

        MD5

        0782fdfd25ec498331ed4be69af2da77

        SHA1

        2662259f96f60b99c72ea2aa2f62e65b254aa738

        SHA256

        eefaaca6ef5c6feb21111ce87a9483a126e55566d42d5291f51072f45c994f37

        SHA512

        92adf5d267d25060c8e256c6153671607219a7719aa8c69c480668634749fea649b46cd315f708b8ceb2f1d8044a82f86f83a21b98dd7c5cf73d70aefb23b673

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un741506.exe
        Filesize

        547KB

        MD5

        38942ed647966139df59d55976fc3bb2

        SHA1

        6f794775747cb151bfd5c176f63b95e4190f6a9a

        SHA256

        3d2d216db8b6cc38cbf1976613b655b36cff090a8c37fc14e0d35380963b08e3

        SHA512

        e413494e927dfeecd1630fe52b998ebdf3fc3ee732835acd25a1bdda5a2203444cd1909586b6263ea93775639676d33d97d5b0a2212b6e73fcf5f4fea3a21cca

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un741506.exe
        Filesize

        547KB

        MD5

        38942ed647966139df59d55976fc3bb2

        SHA1

        6f794775747cb151bfd5c176f63b95e4190f6a9a

        SHA256

        3d2d216db8b6cc38cbf1976613b655b36cff090a8c37fc14e0d35380963b08e3

        SHA512

        e413494e927dfeecd1630fe52b998ebdf3fc3ee732835acd25a1bdda5a2203444cd1909586b6263ea93775639676d33d97d5b0a2212b6e73fcf5f4fea3a21cca

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5236.exe
        Filesize

        291KB

        MD5

        2382f9d8ee4d02f6c02384c461045a96

        SHA1

        a0cf995e4315f581d637d85df713b408994d6736

        SHA256

        530d67e57e8bbe63aeb502f0c811a8fd8a707219b0f0f0ae11c1bc1c0732afc8

        SHA512

        6f3823e12a02a9d0971c7a8b121d172128ead58e9eb4ac1344e814c6a5e4aa883b4ec3da3259250f904ff4b218951df71968e50e42425aca413676ab4a377936

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5236.exe
        Filesize

        291KB

        MD5

        2382f9d8ee4d02f6c02384c461045a96

        SHA1

        a0cf995e4315f581d637d85df713b408994d6736

        SHA256

        530d67e57e8bbe63aeb502f0c811a8fd8a707219b0f0f0ae11c1bc1c0732afc8

        SHA512

        6f3823e12a02a9d0971c7a8b121d172128ead58e9eb4ac1344e814c6a5e4aa883b4ec3da3259250f904ff4b218951df71968e50e42425aca413676ab4a377936

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9834.exe
        Filesize

        345KB

        MD5

        ff67e130b6d70b2883c7f60f37d134ff

        SHA1

        f48375438d3724a25b06f88c9fec7cbb56810fab

        SHA256

        4edf96b78713c72114987d50d05eeffca11e604e123e30cb185b8e81879f8428

        SHA512

        c9a030656c6452757c2e7e8b31cbb72a71e9c719ff060f7b1c1df397beacdfdc6b4eea166c09a01e7f67c359b49506954d55184ce8452b81a534b2c30b215abf

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9834.exe
        Filesize

        345KB

        MD5

        ff67e130b6d70b2883c7f60f37d134ff

        SHA1

        f48375438d3724a25b06f88c9fec7cbb56810fab

        SHA256

        4edf96b78713c72114987d50d05eeffca11e604e123e30cb185b8e81879f8428

        SHA512

        c9a030656c6452757c2e7e8b31cbb72a71e9c719ff060f7b1c1df397beacdfdc6b4eea166c09a01e7f67c359b49506954d55184ce8452b81a534b2c30b215abf

      • memory/1556-1102-0x0000000006E10000-0x0000000006F1A000-memory.dmp
        Filesize

        1.0MB

      • memory/1556-226-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
        Filesize

        252KB

      • memory/1556-204-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
        Filesize

        252KB

      • memory/1556-206-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
        Filesize

        252KB

      • memory/1556-1115-0x00000000084A0000-0x0000000008516000-memory.dmp
        Filesize

        472KB

      • memory/1556-1114-0x0000000006110000-0x0000000006120000-memory.dmp
        Filesize

        64KB

      • memory/1556-1113-0x0000000007E40000-0x000000000836C000-memory.dmp
        Filesize

        5.2MB

      • memory/1556-1112-0x0000000007C60000-0x0000000007E22000-memory.dmp
        Filesize

        1.8MB

      • memory/1556-1111-0x0000000006110000-0x0000000006120000-memory.dmp
        Filesize

        64KB

      • memory/1556-1110-0x0000000006110000-0x0000000006120000-memory.dmp
        Filesize

        64KB

      • memory/1556-209-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
        Filesize

        252KB

      • memory/1556-1109-0x0000000006110000-0x0000000006120000-memory.dmp
        Filesize

        64KB

      • memory/1556-1108-0x0000000007920000-0x00000000079B2000-memory.dmp
        Filesize

        584KB

      • memory/1556-1107-0x0000000007260000-0x00000000072C6000-memory.dmp
        Filesize

        408KB

      • memory/1556-1105-0x0000000006110000-0x0000000006120000-memory.dmp
        Filesize

        64KB

      • memory/1556-1104-0x0000000006F70000-0x0000000006FAC000-memory.dmp
        Filesize

        240KB

      • memory/1556-1103-0x0000000006F50000-0x0000000006F62000-memory.dmp
        Filesize

        72KB

      • memory/1556-1101-0x00000000067D0000-0x0000000006DE8000-memory.dmp
        Filesize

        6.1MB

      • memory/1556-228-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
        Filesize

        252KB

      • memory/1556-215-0x0000000006110000-0x0000000006120000-memory.dmp
        Filesize

        64KB

      • memory/1556-224-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
        Filesize

        252KB

      • memory/1556-222-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
        Filesize

        252KB

      • memory/1556-220-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
        Filesize

        252KB

      • memory/1556-191-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
        Filesize

        252KB

      • memory/1556-192-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
        Filesize

        252KB

      • memory/1556-194-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
        Filesize

        252KB

      • memory/1556-196-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
        Filesize

        252KB

      • memory/1556-198-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
        Filesize

        252KB

      • memory/1556-200-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
        Filesize

        252KB

      • memory/1556-202-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
        Filesize

        252KB

      • memory/1556-218-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
        Filesize

        252KB

      • memory/1556-1116-0x0000000008530000-0x0000000008580000-memory.dmp
        Filesize

        320KB

      • memory/1556-208-0x0000000001B00000-0x0000000001B4B000-memory.dmp
        Filesize

        300KB

      • memory/1556-210-0x0000000006110000-0x0000000006120000-memory.dmp
        Filesize

        64KB

      • memory/1556-212-0x0000000006110000-0x0000000006120000-memory.dmp
        Filesize

        64KB

      • memory/1556-213-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
        Filesize

        252KB

      • memory/1556-216-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
        Filesize

        252KB

      • memory/4520-181-0x0000000000400000-0x000000000070B000-memory.dmp
        Filesize

        3.0MB

      • memory/4520-170-0x0000000002470000-0x0000000002482000-memory.dmp
        Filesize

        72KB

      • memory/4520-148-0x0000000004F20000-0x00000000054C4000-memory.dmp
        Filesize

        5.6MB

      • memory/4520-152-0x0000000002470000-0x0000000002482000-memory.dmp
        Filesize

        72KB

      • memory/4520-154-0x00000000007E0000-0x000000000080D000-memory.dmp
        Filesize

        180KB

      • memory/4520-186-0x0000000000400000-0x000000000070B000-memory.dmp
        Filesize

        3.0MB

      • memory/4520-184-0x0000000004F10000-0x0000000004F20000-memory.dmp
        Filesize

        64KB

      • memory/4520-183-0x0000000004F10000-0x0000000004F20000-memory.dmp
        Filesize

        64KB

      • memory/4520-182-0x0000000004F10000-0x0000000004F20000-memory.dmp
        Filesize

        64KB

      • memory/4520-150-0x0000000002470000-0x0000000002482000-memory.dmp
        Filesize

        72KB

      • memory/4520-156-0x0000000004F10000-0x0000000004F20000-memory.dmp
        Filesize

        64KB

      • memory/4520-180-0x0000000002470000-0x0000000002482000-memory.dmp
        Filesize

        72KB

      • memory/4520-178-0x0000000002470000-0x0000000002482000-memory.dmp
        Filesize

        72KB

      • memory/4520-176-0x0000000002470000-0x0000000002482000-memory.dmp
        Filesize

        72KB

      • memory/4520-174-0x0000000002470000-0x0000000002482000-memory.dmp
        Filesize

        72KB

      • memory/4520-172-0x0000000002470000-0x0000000002482000-memory.dmp
        Filesize

        72KB

      • memory/4520-168-0x0000000002470000-0x0000000002482000-memory.dmp
        Filesize

        72KB

      • memory/4520-166-0x0000000002470000-0x0000000002482000-memory.dmp
        Filesize

        72KB

      • memory/4520-164-0x0000000002470000-0x0000000002482000-memory.dmp
        Filesize

        72KB

      • memory/4520-162-0x0000000002470000-0x0000000002482000-memory.dmp
        Filesize

        72KB

      • memory/4520-158-0x0000000004F10000-0x0000000004F20000-memory.dmp
        Filesize

        64KB

      • memory/4520-159-0x0000000002470000-0x0000000002482000-memory.dmp
        Filesize

        72KB

      • memory/4520-160-0x0000000004F10000-0x0000000004F20000-memory.dmp
        Filesize

        64KB

      • memory/4520-149-0x0000000002470000-0x0000000002482000-memory.dmp
        Filesize

        72KB

      • memory/4520-155-0x0000000002470000-0x0000000002482000-memory.dmp
        Filesize

        72KB

      • memory/5052-1122-0x00000000007A0000-0x00000000007D2000-memory.dmp
        Filesize

        200KB

      • memory/5052-1123-0x00000000053A0000-0x00000000053B0000-memory.dmp
        Filesize

        64KB