Analysis

  • max time kernel
    61s
  • max time network
    82s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 03:40

General

  • Target

    7c72045e75db4c36f9b06f9ad86010947a6bd02084bac0ca586d48b4af64efe1.exe

  • Size

    689KB

  • MD5

    53da8b0837d56a07449c2b8d6a4d88c0

  • SHA1

    542bcce2d6259b9542290aa987c1c15eea3cf18f

  • SHA256

    7c72045e75db4c36f9b06f9ad86010947a6bd02084bac0ca586d48b4af64efe1

  • SHA512

    62b485527619b7d11b092459385fa92f26459c8f2e04158fb2094fcb66d1c270a51348f93e6aa728f9f6d2228279647926660356f9b17054ef3db360baf8602a

  • SSDEEP

    12288:IMrKy90qVzE1pfWEoKIPyC65hLu6dv0MSKI3VMRFMK6L0JJlvUFE0fighA5/iPky:yyPtEnOE6qRfa6F0LZ3VMRFMDLslcE0t

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7c72045e75db4c36f9b06f9ad86010947a6bd02084bac0ca586d48b4af64efe1.exe
    "C:\Users\Admin\AppData\Local\Temp\7c72045e75db4c36f9b06f9ad86010947a6bd02084bac0ca586d48b4af64efe1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4732
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un953510.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un953510.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4696
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0955.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0955.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1416
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1416 -s 1084
          4⤵
          • Program crash
          PID:4644
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9680.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9680.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1156
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1156 -s 1808
          4⤵
          • Program crash
          PID:4668
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si839580.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si839580.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4080
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1416 -ip 1416
    1⤵
      PID:4648
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 1156 -ip 1156
      1⤵
        PID:2252

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si839580.exe

        Filesize

        175KB

        MD5

        0b8399b8fea057e6c412799fd9b0cf38

        SHA1

        36a0ebdbe1a92cb1cb1cd47b68e413440705b6d9

        SHA256

        6c937a4399aba445f6e49240ffdb9fcb129bf7d7c000fcfb1eb190465f2d28d0

        SHA512

        82517f918fc18f6091c20ea43397059759b113cbd99ca1a207d5bb10e19a191fd8ccc0740d0ccb6f3e12f5ea3515691a79fa5abba416cfc16f2414f378151069

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si839580.exe

        Filesize

        175KB

        MD5

        0b8399b8fea057e6c412799fd9b0cf38

        SHA1

        36a0ebdbe1a92cb1cb1cd47b68e413440705b6d9

        SHA256

        6c937a4399aba445f6e49240ffdb9fcb129bf7d7c000fcfb1eb190465f2d28d0

        SHA512

        82517f918fc18f6091c20ea43397059759b113cbd99ca1a207d5bb10e19a191fd8ccc0740d0ccb6f3e12f5ea3515691a79fa5abba416cfc16f2414f378151069

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un953510.exe

        Filesize

        547KB

        MD5

        d826d5ff03b5594f18294ea4d0fbfd5c

        SHA1

        db829b1f859a1af5fd42d82a685555c1d03d3fe1

        SHA256

        3d083123b10cd8aaa37ab80e3e3747a62c356708a6b12f6f5cda448e3d3bd246

        SHA512

        4c846088ffec5452019a4fed3ff98973a9023bbc1d08623394eb3f15262de82d8967a00af57e3a2bd7d470a1d41074e71accb1f5a3d826fd517e6f3d578ae23e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un953510.exe

        Filesize

        547KB

        MD5

        d826d5ff03b5594f18294ea4d0fbfd5c

        SHA1

        db829b1f859a1af5fd42d82a685555c1d03d3fe1

        SHA256

        3d083123b10cd8aaa37ab80e3e3747a62c356708a6b12f6f5cda448e3d3bd246

        SHA512

        4c846088ffec5452019a4fed3ff98973a9023bbc1d08623394eb3f15262de82d8967a00af57e3a2bd7d470a1d41074e71accb1f5a3d826fd517e6f3d578ae23e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0955.exe

        Filesize

        291KB

        MD5

        ce9be8e544fe7b5cbc76f9696c801987

        SHA1

        c494bbd62f6194b0349ca90423b6b86a7e58c594

        SHA256

        05db96d8ec5b0681f276bea42ec01289c04077e99f0658cd5b3da4acd5e74ac7

        SHA512

        60a8c943c8e300c1b1634fed05562fca43c7fdeedcfaf88d15e56cc66cc356f0a368b42164f3239a473e46aa219dfe8f2f39ca3275d193f6b03f40fdcb00a583

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0955.exe

        Filesize

        291KB

        MD5

        ce9be8e544fe7b5cbc76f9696c801987

        SHA1

        c494bbd62f6194b0349ca90423b6b86a7e58c594

        SHA256

        05db96d8ec5b0681f276bea42ec01289c04077e99f0658cd5b3da4acd5e74ac7

        SHA512

        60a8c943c8e300c1b1634fed05562fca43c7fdeedcfaf88d15e56cc66cc356f0a368b42164f3239a473e46aa219dfe8f2f39ca3275d193f6b03f40fdcb00a583

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9680.exe

        Filesize

        345KB

        MD5

        209700b0cfcf2824296b9141a9824489

        SHA1

        db21d28259232a06e2b36d7856628476cea287a8

        SHA256

        bec24756392b3e4afba43a405305910dc107b7f1076e30a6f7f3444a0068a903

        SHA512

        5ea498c39592af81858d5d18c584efee0701361ddf3abaaa4d97f73ad7f31dc59fcec37c90b78e7a359d788452e626d8afc43d48e0ce6c8cdaefec86c1533108

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9680.exe

        Filesize

        345KB

        MD5

        209700b0cfcf2824296b9141a9824489

        SHA1

        db21d28259232a06e2b36d7856628476cea287a8

        SHA256

        bec24756392b3e4afba43a405305910dc107b7f1076e30a6f7f3444a0068a903

        SHA512

        5ea498c39592af81858d5d18c584efee0701361ddf3abaaa4d97f73ad7f31dc59fcec37c90b78e7a359d788452e626d8afc43d48e0ce6c8cdaefec86c1533108

      • memory/1156-227-0x0000000003B10000-0x0000000003B4F000-memory.dmp

        Filesize

        252KB

      • memory/1156-1102-0x0000000007050000-0x0000000007062000-memory.dmp

        Filesize

        72KB

      • memory/1156-1115-0x0000000006120000-0x0000000006130000-memory.dmp

        Filesize

        64KB

      • memory/1156-1114-0x0000000007F20000-0x000000000844C000-memory.dmp

        Filesize

        5.2MB

      • memory/1156-1113-0x0000000007D50000-0x0000000007F12000-memory.dmp

        Filesize

        1.8MB

      • memory/1156-1112-0x0000000006120000-0x0000000006130000-memory.dmp

        Filesize

        64KB

      • memory/1156-1111-0x0000000006120000-0x0000000006130000-memory.dmp

        Filesize

        64KB

      • memory/1156-1110-0x0000000006120000-0x0000000006130000-memory.dmp

        Filesize

        64KB

      • memory/1156-1108-0x0000000007CD0000-0x0000000007D20000-memory.dmp

        Filesize

        320KB

      • memory/1156-1107-0x0000000007C40000-0x0000000007CB6000-memory.dmp

        Filesize

        472KB

      • memory/1156-1106-0x0000000007400000-0x0000000007466000-memory.dmp

        Filesize

        408KB

      • memory/1156-1105-0x0000000007360000-0x00000000073F2000-memory.dmp

        Filesize

        584KB

      • memory/1156-1104-0x0000000006120000-0x0000000006130000-memory.dmp

        Filesize

        64KB

      • memory/1156-1103-0x0000000007070000-0x00000000070AC000-memory.dmp

        Filesize

        240KB

      • memory/1156-1101-0x0000000006F10000-0x000000000701A000-memory.dmp

        Filesize

        1.0MB

      • memory/1156-1100-0x00000000068E0000-0x0000000006EF8000-memory.dmp

        Filesize

        6.1MB

      • memory/1156-225-0x0000000003B10000-0x0000000003B4F000-memory.dmp

        Filesize

        252KB

      • memory/1156-223-0x0000000003B10000-0x0000000003B4F000-memory.dmp

        Filesize

        252KB

      • memory/1156-221-0x0000000003B10000-0x0000000003B4F000-memory.dmp

        Filesize

        252KB

      • memory/1156-219-0x0000000003B10000-0x0000000003B4F000-memory.dmp

        Filesize

        252KB

      • memory/1156-217-0x0000000003B10000-0x0000000003B4F000-memory.dmp

        Filesize

        252KB

      • memory/1156-215-0x0000000003B10000-0x0000000003B4F000-memory.dmp

        Filesize

        252KB

      • memory/1156-191-0x0000000003B10000-0x0000000003B4F000-memory.dmp

        Filesize

        252KB

      • memory/1156-193-0x0000000003B10000-0x0000000003B4F000-memory.dmp

        Filesize

        252KB

      • memory/1156-190-0x0000000003B10000-0x0000000003B4F000-memory.dmp

        Filesize

        252KB

      • memory/1156-195-0x0000000003B10000-0x0000000003B4F000-memory.dmp

        Filesize

        252KB

      • memory/1156-197-0x0000000003B10000-0x0000000003B4F000-memory.dmp

        Filesize

        252KB

      • memory/1156-199-0x0000000001B00000-0x0000000001B4B000-memory.dmp

        Filesize

        300KB

      • memory/1156-200-0x0000000003B10000-0x0000000003B4F000-memory.dmp

        Filesize

        252KB

      • memory/1156-201-0x0000000006120000-0x0000000006130000-memory.dmp

        Filesize

        64KB

      • memory/1156-204-0x0000000003B10000-0x0000000003B4F000-memory.dmp

        Filesize

        252KB

      • memory/1156-203-0x0000000006120000-0x0000000006130000-memory.dmp

        Filesize

        64KB

      • memory/1156-206-0x0000000006120000-0x0000000006130000-memory.dmp

        Filesize

        64KB

      • memory/1156-207-0x0000000003B10000-0x0000000003B4F000-memory.dmp

        Filesize

        252KB

      • memory/1156-209-0x0000000003B10000-0x0000000003B4F000-memory.dmp

        Filesize

        252KB

      • memory/1156-211-0x0000000003B10000-0x0000000003B4F000-memory.dmp

        Filesize

        252KB

      • memory/1156-213-0x0000000003B10000-0x0000000003B4F000-memory.dmp

        Filesize

        252KB

      • memory/1416-173-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/1416-185-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/1416-171-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/1416-169-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/1416-181-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/1416-182-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/1416-150-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/1416-180-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/1416-179-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/1416-153-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/1416-177-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/1416-175-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/1416-151-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/1416-152-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/1416-183-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/1416-167-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/1416-165-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/1416-163-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/1416-161-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/1416-159-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/1416-157-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/1416-155-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/1416-149-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/1416-148-0x0000000004E20000-0x00000000053C4000-memory.dmp

        Filesize

        5.6MB

      • memory/4080-1121-0x0000000000440000-0x0000000000472000-memory.dmp

        Filesize

        200KB

      • memory/4080-1122-0x0000000005090000-0x00000000050A0000-memory.dmp

        Filesize

        64KB