Analysis

  • max time kernel
    95s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 02:55

General

  • Target

    e08244ded0da8941e2fee839f7b2fb83f9a8ab5a2979bcd3fbfba6ea974eba4f.exe

  • Size

    689KB

  • MD5

    400ea411325269f0407b510eb0501862

  • SHA1

    49c2cf1ff2c2f981d99d1f4d2b92a140d4a94df5

  • SHA256

    e08244ded0da8941e2fee839f7b2fb83f9a8ab5a2979bcd3fbfba6ea974eba4f

  • SHA512

    0616aebc924f3d1a201416e35a2109acaa3b8df3d2fe14b61e97897441c0365d7511a0883a9f4d50d97163906daa877d0c858072a15a500a6c94ea148fda26a0

  • SSDEEP

    12288:WMr/y901Pl3zyvLh3qx8Z1y865hLudcRx11F7nMzX3jDdY3mJxv1Fr7figGwWnx9:dyuDyjtqx8ZcjfaeRx17Mznj6mJxnr7U

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e08244ded0da8941e2fee839f7b2fb83f9a8ab5a2979bcd3fbfba6ea974eba4f.exe
    "C:\Users\Admin\AppData\Local\Temp\e08244ded0da8941e2fee839f7b2fb83f9a8ab5a2979bcd3fbfba6ea974eba4f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:920
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un907578.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un907578.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3812
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9701.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9701.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1056
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1056 -s 1084
          4⤵
          • Program crash
          PID:4436
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8202.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8202.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1096
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1096 -s 1348
          4⤵
          • Program crash
          PID:2112
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si695676.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si695676.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4116
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1056 -ip 1056
    1⤵
      PID:2812
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1096 -ip 1096
      1⤵
        PID:1320

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si695676.exe

        Filesize

        175KB

        MD5

        7ab0820cd6e165784091662dc4ea9775

        SHA1

        8b078b8895cf572964061eea039b09bebec59440

        SHA256

        628aac29a512eb3aa8a417988538a3a23558c88407fb6fec9df37b0927c94c0b

        SHA512

        f1e3343d4c8d1598310b7c62d599f2f0de63c57ae8650209a918ee9c36af4908c949451b3e6f8d8d481642dce27def72b90633915d628fcefb48627c592adcfd

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si695676.exe

        Filesize

        175KB

        MD5

        7ab0820cd6e165784091662dc4ea9775

        SHA1

        8b078b8895cf572964061eea039b09bebec59440

        SHA256

        628aac29a512eb3aa8a417988538a3a23558c88407fb6fec9df37b0927c94c0b

        SHA512

        f1e3343d4c8d1598310b7c62d599f2f0de63c57ae8650209a918ee9c36af4908c949451b3e6f8d8d481642dce27def72b90633915d628fcefb48627c592adcfd

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un907578.exe

        Filesize

        547KB

        MD5

        4578aed117e89e6c5f5c06fd719429d8

        SHA1

        633a04879a376f8dabec268f14020b37aeb9db80

        SHA256

        b3d3057e881301f71a5275e3674062bf9df4ce6d0dfe3e0ce58945ed7b399583

        SHA512

        8071b795a649f3436c2e03664dc05bb2762e5ec5f50200abea2ae7ccf0af9f76199ae80c5b75d5941115b6d5e23e664525785fded45b6caf4e301ca72fd9c864

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un907578.exe

        Filesize

        547KB

        MD5

        4578aed117e89e6c5f5c06fd719429d8

        SHA1

        633a04879a376f8dabec268f14020b37aeb9db80

        SHA256

        b3d3057e881301f71a5275e3674062bf9df4ce6d0dfe3e0ce58945ed7b399583

        SHA512

        8071b795a649f3436c2e03664dc05bb2762e5ec5f50200abea2ae7ccf0af9f76199ae80c5b75d5941115b6d5e23e664525785fded45b6caf4e301ca72fd9c864

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9701.exe

        Filesize

        291KB

        MD5

        98683ab4bc2c17058f8578c248d277bf

        SHA1

        8a77f751b412cc04f4e0368de4f6882704319363

        SHA256

        0d97bbd42f86c8fd6abe37bc13d75630bc90498278c1e984c671fb0bffdb902b

        SHA512

        282538b85373cba3794f818978baec8fa47adef1ab3c51772c0b08c3a024728734a1d4ab4415bab7154c6248ff98b2344562768e76ac9bc7fe3a273b7baeafbc

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9701.exe

        Filesize

        291KB

        MD5

        98683ab4bc2c17058f8578c248d277bf

        SHA1

        8a77f751b412cc04f4e0368de4f6882704319363

        SHA256

        0d97bbd42f86c8fd6abe37bc13d75630bc90498278c1e984c671fb0bffdb902b

        SHA512

        282538b85373cba3794f818978baec8fa47adef1ab3c51772c0b08c3a024728734a1d4ab4415bab7154c6248ff98b2344562768e76ac9bc7fe3a273b7baeafbc

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8202.exe

        Filesize

        345KB

        MD5

        3b10cbba19e358c3b2372ec9722fb503

        SHA1

        cc6335f3fd7a931894c3d66668e84295ba22c5dc

        SHA256

        447bf73d360315ea2fbfe15bbafb16ebcb0982a00767f1e735e1e5410c5efdb6

        SHA512

        a681e33fb0887530c90a68bb9b90712cf7b3b84c9a63e42996ec1f326463a8b31fbcfa12a431926a1993b90fcf20701a6bd70f7d58b2c44b063be0de56e81cc8

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8202.exe

        Filesize

        345KB

        MD5

        3b10cbba19e358c3b2372ec9722fb503

        SHA1

        cc6335f3fd7a931894c3d66668e84295ba22c5dc

        SHA256

        447bf73d360315ea2fbfe15bbafb16ebcb0982a00767f1e735e1e5410c5efdb6

        SHA512

        a681e33fb0887530c90a68bb9b90712cf7b3b84c9a63e42996ec1f326463a8b31fbcfa12a431926a1993b90fcf20701a6bd70f7d58b2c44b063be0de56e81cc8

      • memory/1056-148-0x0000000004D70000-0x0000000005314000-memory.dmp

        Filesize

        5.6MB

      • memory/1056-149-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/1056-150-0x00000000026F0000-0x0000000002700000-memory.dmp

        Filesize

        64KB

      • memory/1056-152-0x00000000026F0000-0x0000000002700000-memory.dmp

        Filesize

        64KB

      • memory/1056-151-0x00000000026F0000-0x0000000002700000-memory.dmp

        Filesize

        64KB

      • memory/1056-153-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/1056-154-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/1056-156-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/1056-158-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/1056-160-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/1056-162-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/1056-164-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/1056-166-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/1056-168-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/1056-170-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/1056-172-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/1056-174-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/1056-176-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/1056-178-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/1056-180-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/1056-181-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/1056-182-0x00000000026F0000-0x0000000002700000-memory.dmp

        Filesize

        64KB

      • memory/1056-183-0x00000000026F0000-0x0000000002700000-memory.dmp

        Filesize

        64KB

      • memory/1056-184-0x00000000026F0000-0x0000000002700000-memory.dmp

        Filesize

        64KB

      • memory/1056-186-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/1096-192-0x00000000065C0000-0x00000000065FF000-memory.dmp

        Filesize

        252KB

      • memory/1096-194-0x00000000065C0000-0x00000000065FF000-memory.dmp

        Filesize

        252KB

      • memory/1096-191-0x00000000065C0000-0x00000000065FF000-memory.dmp

        Filesize

        252KB

      • memory/1096-196-0x00000000065C0000-0x00000000065FF000-memory.dmp

        Filesize

        252KB

      • memory/1096-198-0x00000000065C0000-0x00000000065FF000-memory.dmp

        Filesize

        252KB

      • memory/1096-200-0x00000000065C0000-0x00000000065FF000-memory.dmp

        Filesize

        252KB

      • memory/1096-202-0x00000000065C0000-0x00000000065FF000-memory.dmp

        Filesize

        252KB

      • memory/1096-205-0x0000000001A50000-0x0000000001A9B000-memory.dmp

        Filesize

        300KB

      • memory/1096-204-0x00000000065C0000-0x00000000065FF000-memory.dmp

        Filesize

        252KB

      • memory/1096-206-0x00000000039F0000-0x0000000003A00000-memory.dmp

        Filesize

        64KB

      • memory/1096-209-0x00000000039F0000-0x0000000003A00000-memory.dmp

        Filesize

        64KB

      • memory/1096-208-0x00000000065C0000-0x00000000065FF000-memory.dmp

        Filesize

        252KB

      • memory/1096-211-0x00000000039F0000-0x0000000003A00000-memory.dmp

        Filesize

        64KB

      • memory/1096-212-0x00000000065C0000-0x00000000065FF000-memory.dmp

        Filesize

        252KB

      • memory/1096-214-0x00000000065C0000-0x00000000065FF000-memory.dmp

        Filesize

        252KB

      • memory/1096-216-0x00000000065C0000-0x00000000065FF000-memory.dmp

        Filesize

        252KB

      • memory/1096-218-0x00000000065C0000-0x00000000065FF000-memory.dmp

        Filesize

        252KB

      • memory/1096-220-0x00000000065C0000-0x00000000065FF000-memory.dmp

        Filesize

        252KB

      • memory/1096-222-0x00000000065C0000-0x00000000065FF000-memory.dmp

        Filesize

        252KB

      • memory/1096-224-0x00000000065C0000-0x00000000065FF000-memory.dmp

        Filesize

        252KB

      • memory/1096-226-0x00000000065C0000-0x00000000065FF000-memory.dmp

        Filesize

        252KB

      • memory/1096-228-0x00000000065C0000-0x00000000065FF000-memory.dmp

        Filesize

        252KB

      • memory/1096-1101-0x0000000006770000-0x0000000006D88000-memory.dmp

        Filesize

        6.1MB

      • memory/1096-1102-0x0000000006E10000-0x0000000006F1A000-memory.dmp

        Filesize

        1.0MB

      • memory/1096-1103-0x0000000006F50000-0x0000000006F62000-memory.dmp

        Filesize

        72KB

      • memory/1096-1104-0x0000000006F70000-0x0000000006FAC000-memory.dmp

        Filesize

        240KB

      • memory/1096-1105-0x00000000039F0000-0x0000000003A00000-memory.dmp

        Filesize

        64KB

      • memory/1096-1106-0x0000000007260000-0x00000000072F2000-memory.dmp

        Filesize

        584KB

      • memory/1096-1107-0x0000000007300000-0x0000000007366000-memory.dmp

        Filesize

        408KB

      • memory/1096-1109-0x00000000039F0000-0x0000000003A00000-memory.dmp

        Filesize

        64KB

      • memory/1096-1110-0x00000000039F0000-0x0000000003A00000-memory.dmp

        Filesize

        64KB

      • memory/1096-1111-0x0000000007B60000-0x0000000007D22000-memory.dmp

        Filesize

        1.8MB

      • memory/1096-1112-0x0000000007D40000-0x000000000826C000-memory.dmp

        Filesize

        5.2MB

      • memory/1096-1113-0x0000000008390000-0x0000000008406000-memory.dmp

        Filesize

        472KB

      • memory/1096-1114-0x0000000008430000-0x0000000008480000-memory.dmp

        Filesize

        320KB

      • memory/1096-1115-0x00000000039F0000-0x0000000003A00000-memory.dmp

        Filesize

        64KB

      • memory/4116-1121-0x0000000000680000-0x00000000006B2000-memory.dmp

        Filesize

        200KB

      • memory/4116-1122-0x0000000005300000-0x0000000005310000-memory.dmp

        Filesize

        64KB