Analysis

  • max time kernel
    86s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 03:13

General

  • Target

    c4599af9a10320ffaa4862d520f07496d2608bc5fb204336ca6b445e97b94af4.exe

  • Size

    689KB

  • MD5

    2b6c04198b327d6882d974d06883645c

  • SHA1

    3e0d290f4b9048912b8f92d047d778fad1a1b3a9

  • SHA256

    c4599af9a10320ffaa4862d520f07496d2608bc5fb204336ca6b445e97b94af4

  • SHA512

    e8f30e21fa479737bee165caf231de8136d255495e4610786da0eb92922e786acb12f4fc3ba925f1a83b75381a8d0b07dd6d36119f01b87fac0f94bad89e9e9c

  • SSDEEP

    12288:AMrWy90qj/sRN5RTqALb/0M91kkGvuked0nVo2aEmJ4vMFJsfigA7q/hQnBxd:myHcNjuc4Fzdo2lmJ4UJsagWgQBxd

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c4599af9a10320ffaa4862d520f07496d2608bc5fb204336ca6b445e97b94af4.exe
    "C:\Users\Admin\AppData\Local\Temp\c4599af9a10320ffaa4862d520f07496d2608bc5fb204336ca6b445e97b94af4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4420
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un595520.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un595520.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4596
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2256.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2256.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1208
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1208 -s 1080
          4⤵
          • Program crash
          PID:4896
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0369.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0369.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3908
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3908 -s 1340
          4⤵
          • Program crash
          PID:3760
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si980630.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si980630.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2592
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1208 -ip 1208
    1⤵
      PID:1848
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3908 -ip 3908
      1⤵
        PID:4068

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si980630.exe

        Filesize

        175KB

        MD5

        6da23526589199da4cd141ce496f1448

        SHA1

        7236ad11c7259eed78c583575db48aa4110de094

        SHA256

        9436c4ccffb6bb3c7fabff24202db669a5d539e4679a77bf104b40626ea01aec

        SHA512

        5e574b230367758c17d4c5274ccc29d0a4a4b692b6f780cd17ab4e4fb61b089e59ae250f280c62524fb58956fd922be006913ed5c40fa94c0f59d24535cf76de

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si980630.exe

        Filesize

        175KB

        MD5

        6da23526589199da4cd141ce496f1448

        SHA1

        7236ad11c7259eed78c583575db48aa4110de094

        SHA256

        9436c4ccffb6bb3c7fabff24202db669a5d539e4679a77bf104b40626ea01aec

        SHA512

        5e574b230367758c17d4c5274ccc29d0a4a4b692b6f780cd17ab4e4fb61b089e59ae250f280c62524fb58956fd922be006913ed5c40fa94c0f59d24535cf76de

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un595520.exe

        Filesize

        547KB

        MD5

        8beefb0ad2a3769c195129becc4370d1

        SHA1

        b2a53b12c9aeca3efb786d643666ce9f7ebd69f1

        SHA256

        565ff95d6ee441d66b6307dbd0ca0648340cdc69019eed40af34ed34dcbf5c05

        SHA512

        8a3633111e37fe82f8fca29cc4d09062e9ad53120f086d505e3d85e8752a5534137ed233fa6d52ca4967ce1b778893d06faf9f1c99669ebcf3b1c5ccbb33e851

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un595520.exe

        Filesize

        547KB

        MD5

        8beefb0ad2a3769c195129becc4370d1

        SHA1

        b2a53b12c9aeca3efb786d643666ce9f7ebd69f1

        SHA256

        565ff95d6ee441d66b6307dbd0ca0648340cdc69019eed40af34ed34dcbf5c05

        SHA512

        8a3633111e37fe82f8fca29cc4d09062e9ad53120f086d505e3d85e8752a5534137ed233fa6d52ca4967ce1b778893d06faf9f1c99669ebcf3b1c5ccbb33e851

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2256.exe

        Filesize

        291KB

        MD5

        6a8641157b3c37f61c3803a9f938932f

        SHA1

        b7bb697539370fd3c593dc83fcd6c956482d5d34

        SHA256

        d1a508dacbe1e5f4df081e9ea0dcfdd34d067384329670feecd2bb79794cd588

        SHA512

        cc625430ccbee75bb59427ddccb2608f9eeabfbe141362501325507d7eee9c97edf710f00ea9eea62747851b93aea5de610046ec6891a00a9082fbee546944b5

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2256.exe

        Filesize

        291KB

        MD5

        6a8641157b3c37f61c3803a9f938932f

        SHA1

        b7bb697539370fd3c593dc83fcd6c956482d5d34

        SHA256

        d1a508dacbe1e5f4df081e9ea0dcfdd34d067384329670feecd2bb79794cd588

        SHA512

        cc625430ccbee75bb59427ddccb2608f9eeabfbe141362501325507d7eee9c97edf710f00ea9eea62747851b93aea5de610046ec6891a00a9082fbee546944b5

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0369.exe

        Filesize

        345KB

        MD5

        f111e19e80574da424ab6abede1aeabd

        SHA1

        dd5cb467a518a0db2591b95f08c16a31d174a78c

        SHA256

        271c674224331fddedc02afe702ba5ff6a20de5a498d4032704ed2ef90399adb

        SHA512

        a375e4058d4ab1cfc10abd9540f57ed07b575aa73f698144958b8776dcb4668d6efca3d59cdf4fd758b10d4b083002eb1d07090b0a4ac2d39599e08d5b6c7046

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0369.exe

        Filesize

        345KB

        MD5

        f111e19e80574da424ab6abede1aeabd

        SHA1

        dd5cb467a518a0db2591b95f08c16a31d174a78c

        SHA256

        271c674224331fddedc02afe702ba5ff6a20de5a498d4032704ed2ef90399adb

        SHA512

        a375e4058d4ab1cfc10abd9540f57ed07b575aa73f698144958b8776dcb4668d6efca3d59cdf4fd758b10d4b083002eb1d07090b0a4ac2d39599e08d5b6c7046

      • memory/1208-148-0x0000000004D80000-0x0000000005324000-memory.dmp

        Filesize

        5.6MB

      • memory/1208-149-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/1208-150-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/1208-152-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/1208-154-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/1208-156-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/1208-159-0x0000000000830000-0x000000000085D000-memory.dmp

        Filesize

        180KB

      • memory/1208-158-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/1208-160-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB

      • memory/1208-163-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB

      • memory/1208-166-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/1208-164-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB

      • memory/1208-168-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/1208-162-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/1208-170-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/1208-172-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/1208-174-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/1208-176-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/1208-178-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/1208-180-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/1208-181-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/1208-182-0x0000000004D70000-0x0000000004D80000-memory.dmp

        Filesize

        64KB

      • memory/1208-184-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/2592-1120-0x00000000007E0000-0x0000000000812000-memory.dmp

        Filesize

        200KB

      • memory/2592-1121-0x00000000054F0000-0x0000000005500000-memory.dmp

        Filesize

        64KB

      • memory/3908-192-0x0000000003AE0000-0x0000000003B1F000-memory.dmp

        Filesize

        252KB

      • memory/3908-224-0x0000000003AE0000-0x0000000003B1F000-memory.dmp

        Filesize

        252KB

      • memory/3908-194-0x0000000003AE0000-0x0000000003B1F000-memory.dmp

        Filesize

        252KB

      • memory/3908-196-0x0000000003AE0000-0x0000000003B1F000-memory.dmp

        Filesize

        252KB

      • memory/3908-198-0x0000000003AE0000-0x0000000003B1F000-memory.dmp

        Filesize

        252KB

      • memory/3908-200-0x0000000003AE0000-0x0000000003B1F000-memory.dmp

        Filesize

        252KB

      • memory/3908-202-0x0000000003AE0000-0x0000000003B1F000-memory.dmp

        Filesize

        252KB

      • memory/3908-204-0x0000000003AE0000-0x0000000003B1F000-memory.dmp

        Filesize

        252KB

      • memory/3908-206-0x0000000003AE0000-0x0000000003B1F000-memory.dmp

        Filesize

        252KB

      • memory/3908-208-0x0000000003AE0000-0x0000000003B1F000-memory.dmp

        Filesize

        252KB

      • memory/3908-210-0x0000000003AE0000-0x0000000003B1F000-memory.dmp

        Filesize

        252KB

      • memory/3908-212-0x0000000003AE0000-0x0000000003B1F000-memory.dmp

        Filesize

        252KB

      • memory/3908-215-0x0000000003AE0000-0x0000000003B1F000-memory.dmp

        Filesize

        252KB

      • memory/3908-217-0x0000000006200000-0x0000000006210000-memory.dmp

        Filesize

        64KB

      • memory/3908-219-0x0000000006200000-0x0000000006210000-memory.dmp

        Filesize

        64KB

      • memory/3908-221-0x0000000006200000-0x0000000006210000-memory.dmp

        Filesize

        64KB

      • memory/3908-218-0x0000000003AE0000-0x0000000003B1F000-memory.dmp

        Filesize

        252KB

      • memory/3908-214-0x0000000001B00000-0x0000000001B4B000-memory.dmp

        Filesize

        300KB

      • memory/3908-222-0x0000000003AE0000-0x0000000003B1F000-memory.dmp

        Filesize

        252KB

      • memory/3908-190-0x0000000003AE0000-0x0000000003B1F000-memory.dmp

        Filesize

        252KB

      • memory/3908-226-0x0000000003AE0000-0x0000000003B1F000-memory.dmp

        Filesize

        252KB

      • memory/3908-1099-0x00000000067C0000-0x0000000006DD8000-memory.dmp

        Filesize

        6.1MB

      • memory/3908-1100-0x00000000060F0000-0x00000000061FA000-memory.dmp

        Filesize

        1.0MB

      • memory/3908-1101-0x0000000006E10000-0x0000000006E22000-memory.dmp

        Filesize

        72KB

      • memory/3908-1102-0x0000000006E30000-0x0000000006E6C000-memory.dmp

        Filesize

        240KB

      • memory/3908-1103-0x0000000006200000-0x0000000006210000-memory.dmp

        Filesize

        64KB

      • memory/3908-1105-0x0000000007120000-0x00000000071B2000-memory.dmp

        Filesize

        584KB

      • memory/3908-1106-0x00000000071C0000-0x0000000007226000-memory.dmp

        Filesize

        408KB

      • memory/3908-1107-0x00000000079E0000-0x0000000007BA2000-memory.dmp

        Filesize

        1.8MB

      • memory/3908-1108-0x0000000006200000-0x0000000006210000-memory.dmp

        Filesize

        64KB

      • memory/3908-1110-0x0000000006200000-0x0000000006210000-memory.dmp

        Filesize

        64KB

      • memory/3908-1109-0x0000000006200000-0x0000000006210000-memory.dmp

        Filesize

        64KB

      • memory/3908-1111-0x0000000007BC0000-0x00000000080EC000-memory.dmp

        Filesize

        5.2MB

      • memory/3908-189-0x0000000003AE0000-0x0000000003B1F000-memory.dmp

        Filesize

        252KB

      • memory/3908-1112-0x0000000008230000-0x00000000082A6000-memory.dmp

        Filesize

        472KB

      • memory/3908-1113-0x00000000082B0000-0x0000000008300000-memory.dmp

        Filesize

        320KB

      • memory/3908-1114-0x0000000006200000-0x0000000006210000-memory.dmp

        Filesize

        64KB