Analysis

  • max time kernel
    61s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 03:04

General

  • Target

    1ed1a1c68e418514a4d028ebe0f795e86992bc898e36fb612018f20f424201c5.exe

  • Size

    689KB

  • MD5

    05bd7227c6aa4e5b88969a0f59b98299

  • SHA1

    ae30d8292556992f53fbadd0f7825c67f18ec2b7

  • SHA256

    1ed1a1c68e418514a4d028ebe0f795e86992bc898e36fb612018f20f424201c5

  • SHA512

    ac3db793d2493bdc07c0c3fd018dd919b4d206ce83589e126190f925eb270f9006614bf15278dcbf4768673ace5328a195ef2be80436c31179f76cbd2d5287e9

  • SSDEEP

    12288:yMrcy90P28ctlL3Quy365hLudFZ9v+DT4Tcd2bX5jwmJZvWFYQfigFtjbwlhszfi:SyfxlzQrqfadFb+DTybXpwmJZSYQagTk

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ed1a1c68e418514a4d028ebe0f795e86992bc898e36fb612018f20f424201c5.exe
    "C:\Users\Admin\AppData\Local\Temp\1ed1a1c68e418514a4d028ebe0f795e86992bc898e36fb612018f20f424201c5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:368
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un790458.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un790458.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1304
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2259.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2259.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2320
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2320 -s 1080
          4⤵
          • Program crash
          PID:4780
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2735.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2735.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2536
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 1344
          4⤵
          • Program crash
          PID:3104
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si476550.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si476550.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1760
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2320 -ip 2320
    1⤵
      PID:488
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2536 -ip 2536
      1⤵
        PID:3204

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si476550.exe

        Filesize

        175KB

        MD5

        7bd0b64ef415a2a7203730032e0b087b

        SHA1

        c1c75e97ae50993cd7445480d6a8a6c1df8e90a5

        SHA256

        ef0354b4096878fb00a737e477b8b59d7270be0645707283fc2fa9c646daff27

        SHA512

        8f59502fd91632e3a82209efc7990d19a1f1888ef8fdfee6a8ef815fa2466dd986b5cd040399cb27c593fe0017ce227464fdc449a2ecbceeec87614acb878eb4

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si476550.exe

        Filesize

        175KB

        MD5

        7bd0b64ef415a2a7203730032e0b087b

        SHA1

        c1c75e97ae50993cd7445480d6a8a6c1df8e90a5

        SHA256

        ef0354b4096878fb00a737e477b8b59d7270be0645707283fc2fa9c646daff27

        SHA512

        8f59502fd91632e3a82209efc7990d19a1f1888ef8fdfee6a8ef815fa2466dd986b5cd040399cb27c593fe0017ce227464fdc449a2ecbceeec87614acb878eb4

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un790458.exe

        Filesize

        547KB

        MD5

        a0efebefd5fa261ae0a913e23e45db39

        SHA1

        076553bf1812eaaa101be1445d04d12193400925

        SHA256

        60e468f858230a724bc845475586b08b9b5683333f4c20f558d08cfb21eabdb2

        SHA512

        6380ef8ca5da1a03129b5b0c3a22d0b1396d571675efd0a7e786944efa3eb46996dc7f3c8a75e11d21ddb03c23a9b85b9254d1f0c8e8236901eebd94b7ecc877

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un790458.exe

        Filesize

        547KB

        MD5

        a0efebefd5fa261ae0a913e23e45db39

        SHA1

        076553bf1812eaaa101be1445d04d12193400925

        SHA256

        60e468f858230a724bc845475586b08b9b5683333f4c20f558d08cfb21eabdb2

        SHA512

        6380ef8ca5da1a03129b5b0c3a22d0b1396d571675efd0a7e786944efa3eb46996dc7f3c8a75e11d21ddb03c23a9b85b9254d1f0c8e8236901eebd94b7ecc877

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2259.exe

        Filesize

        291KB

        MD5

        d87fa69459c1fc331d440ed8ade8a984

        SHA1

        0498a805151233b89315d698a559b98870a328d7

        SHA256

        966baf754eddaaf30f27ff48566c405d6c7fd0998ed37728281a8a281c190d91

        SHA512

        6709af97a47c61800df3d843c67ff5e60e183b6aea11e1888903a50ecca3db17d395bd53b00342e651a205a2beb946236879934ddd8d030c68e73b3ef1a90274

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2259.exe

        Filesize

        291KB

        MD5

        d87fa69459c1fc331d440ed8ade8a984

        SHA1

        0498a805151233b89315d698a559b98870a328d7

        SHA256

        966baf754eddaaf30f27ff48566c405d6c7fd0998ed37728281a8a281c190d91

        SHA512

        6709af97a47c61800df3d843c67ff5e60e183b6aea11e1888903a50ecca3db17d395bd53b00342e651a205a2beb946236879934ddd8d030c68e73b3ef1a90274

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2735.exe

        Filesize

        345KB

        MD5

        65bb4da3ec5d80e7844382a237fbed3d

        SHA1

        7b8591518e9728a9372bc50fbe6e09b1e863da13

        SHA256

        08bcd0f5a7f4a53cb9b7d69be827b51279bc1e028dec54394ca5f2211b4d3d56

        SHA512

        96d70cb46f6ff49570efc74e26d886e615d9753b9f2278145e3fdcd6aeb5de044d84ef63274da4cf27c9cf043c7c754e54f500967c7cb5fb09bf228e2249fdba

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2735.exe

        Filesize

        345KB

        MD5

        65bb4da3ec5d80e7844382a237fbed3d

        SHA1

        7b8591518e9728a9372bc50fbe6e09b1e863da13

        SHA256

        08bcd0f5a7f4a53cb9b7d69be827b51279bc1e028dec54394ca5f2211b4d3d56

        SHA512

        96d70cb46f6ff49570efc74e26d886e615d9753b9f2278145e3fdcd6aeb5de044d84ef63274da4cf27c9cf043c7c754e54f500967c7cb5fb09bf228e2249fdba

      • memory/1760-1122-0x0000000000480000-0x00000000004B2000-memory.dmp

        Filesize

        200KB

      • memory/1760-1123-0x0000000004D20000-0x0000000004D30000-memory.dmp

        Filesize

        64KB

      • memory/2320-156-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/2320-170-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/2320-151-0x0000000000B10000-0x0000000000B20000-memory.dmp

        Filesize

        64KB

      • memory/2320-152-0x0000000000B10000-0x0000000000B20000-memory.dmp

        Filesize

        64KB

      • memory/2320-153-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/2320-154-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/2320-149-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/2320-158-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/2320-160-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/2320-162-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/2320-164-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/2320-166-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/2320-168-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/2320-150-0x0000000000B10000-0x0000000000B20000-memory.dmp

        Filesize

        64KB

      • memory/2320-172-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/2320-174-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/2320-176-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/2320-178-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/2320-180-0x0000000002710000-0x0000000002722000-memory.dmp

        Filesize

        72KB

      • memory/2320-181-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/2320-182-0x0000000000B10000-0x0000000000B20000-memory.dmp

        Filesize

        64KB

      • memory/2320-183-0x0000000000B10000-0x0000000000B20000-memory.dmp

        Filesize

        64KB

      • memory/2320-184-0x0000000000B10000-0x0000000000B20000-memory.dmp

        Filesize

        64KB

      • memory/2320-186-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/2320-148-0x0000000004D80000-0x0000000005324000-memory.dmp

        Filesize

        5.6MB

      • memory/2536-194-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2536-228-0x0000000006090000-0x00000000060A0000-memory.dmp

        Filesize

        64KB

      • memory/2536-196-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2536-198-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2536-200-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2536-202-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2536-204-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2536-206-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2536-208-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2536-210-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2536-212-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2536-214-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2536-216-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2536-218-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2536-220-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2536-222-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2536-224-0x0000000001B60000-0x0000000001BAB000-memory.dmp

        Filesize

        300KB

      • memory/2536-226-0x0000000006090000-0x00000000060A0000-memory.dmp

        Filesize

        64KB

      • memory/2536-225-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2536-192-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2536-230-0x0000000006090000-0x00000000060A0000-memory.dmp

        Filesize

        64KB

      • memory/2536-1101-0x0000000006650000-0x0000000006C68000-memory.dmp

        Filesize

        6.1MB

      • memory/2536-1102-0x0000000006CD0000-0x0000000006DDA000-memory.dmp

        Filesize

        1.0MB

      • memory/2536-1103-0x0000000006E10000-0x0000000006E22000-memory.dmp

        Filesize

        72KB

      • memory/2536-1104-0x0000000006E30000-0x0000000006E6C000-memory.dmp

        Filesize

        240KB

      • memory/2536-1105-0x0000000006090000-0x00000000060A0000-memory.dmp

        Filesize

        64KB

      • memory/2536-1107-0x0000000007120000-0x00000000071B2000-memory.dmp

        Filesize

        584KB

      • memory/2536-1108-0x00000000071C0000-0x0000000007226000-memory.dmp

        Filesize

        408KB

      • memory/2536-1109-0x0000000006090000-0x00000000060A0000-memory.dmp

        Filesize

        64KB

      • memory/2536-1110-0x0000000006090000-0x00000000060A0000-memory.dmp

        Filesize

        64KB

      • memory/2536-1111-0x0000000006090000-0x00000000060A0000-memory.dmp

        Filesize

        64KB

      • memory/2536-1112-0x0000000007B20000-0x0000000007B96000-memory.dmp

        Filesize

        472KB

      • memory/2536-1113-0x0000000007BB0000-0x0000000007C00000-memory.dmp

        Filesize

        320KB

      • memory/2536-191-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2536-1114-0x0000000006090000-0x00000000060A0000-memory.dmp

        Filesize

        64KB

      • memory/2536-1115-0x0000000007C40000-0x0000000007E02000-memory.dmp

        Filesize

        1.8MB

      • memory/2536-1116-0x0000000007E10000-0x000000000833C000-memory.dmp

        Filesize

        5.2MB