Analysis

  • max time kernel
    109s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 03:27

General

  • Target

    a1da3e1da1ebd33258be39446615995c7b837feb0302f6ce26e26e30964bb30c.exe

  • Size

    689KB

  • MD5

    fa95fdf9dff79aa81f3ca1d254aad83a

  • SHA1

    4965d669a3c16a6b4f8bc65810639b3301bade32

  • SHA256

    a1da3e1da1ebd33258be39446615995c7b837feb0302f6ce26e26e30964bb30c

  • SHA512

    f2124588cc9b30aba464e4d5326904d44ec5dcba0189f1b855fd785b8874a53cd2d048712bd0d74909f654effc1cd5344ee42e4722b5ac3bdfebbc4960d4a5b2

  • SSDEEP

    12288:rMrIy90nltSTNjw2Amxjoyo65hLu0FNUK3ruSB+f5110cb0zNucFmJbvZF5Pfigh:Xy8rS5txjpHfaFK7uo0SvmJbb5PagyWx

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1da3e1da1ebd33258be39446615995c7b837feb0302f6ce26e26e30964bb30c.exe
    "C:\Users\Admin\AppData\Local\Temp\a1da3e1da1ebd33258be39446615995c7b837feb0302f6ce26e26e30964bb30c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4248
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un088196.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un088196.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4272
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8890.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8890.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2204
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 1080
          4⤵
          • Program crash
          PID:1080
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6068.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6068.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3900
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 1452
          4⤵
          • Program crash
          PID:4872
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si580501.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si580501.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4384
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2204 -ip 2204
    1⤵
      PID:4616
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 3900 -ip 3900
      1⤵
        PID:1792

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si580501.exe
        Filesize

        175KB

        MD5

        6441237e651727400651c715b803a1c8

        SHA1

        ea99d82ff0f0e3de025187343c220e52c72c7683

        SHA256

        9594c64edca74aeaa10896525ff1df94ccf8b9e510d5fecf6b1b302bca71c1f5

        SHA512

        fd083dba77d608272135d102a16b3d002b3a98283e59cb4af5c7290bb203d3bf568fb1c3cc641ce2bdfff49e268bf958768ea4f089cfcdfc76d928252484e04a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si580501.exe
        Filesize

        175KB

        MD5

        6441237e651727400651c715b803a1c8

        SHA1

        ea99d82ff0f0e3de025187343c220e52c72c7683

        SHA256

        9594c64edca74aeaa10896525ff1df94ccf8b9e510d5fecf6b1b302bca71c1f5

        SHA512

        fd083dba77d608272135d102a16b3d002b3a98283e59cb4af5c7290bb203d3bf568fb1c3cc641ce2bdfff49e268bf958768ea4f089cfcdfc76d928252484e04a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un088196.exe
        Filesize

        547KB

        MD5

        4f0ee84897540391e3339c91c49eaccd

        SHA1

        5ff052d5e9a1526f7aa6246fa3380d3faff2b936

        SHA256

        49eed16a20b6010a79bbd23375a086cb1d3d3fee36d739feeb15d7fad48b015a

        SHA512

        5116da8e2904adc09523a1bdad60c655688bdcff9a250bb786ea94f538d8c03ea4d36a56c0676ed1aa3fab5357668b5cf536e9b01832cb2c9a0d99e3289a6720

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un088196.exe
        Filesize

        547KB

        MD5

        4f0ee84897540391e3339c91c49eaccd

        SHA1

        5ff052d5e9a1526f7aa6246fa3380d3faff2b936

        SHA256

        49eed16a20b6010a79bbd23375a086cb1d3d3fee36d739feeb15d7fad48b015a

        SHA512

        5116da8e2904adc09523a1bdad60c655688bdcff9a250bb786ea94f538d8c03ea4d36a56c0676ed1aa3fab5357668b5cf536e9b01832cb2c9a0d99e3289a6720

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8890.exe
        Filesize

        291KB

        MD5

        45ae137c3cc817779a687bd4bab9f84b

        SHA1

        2af546eb5f1388875a27a5e624b3e9f6423e664f

        SHA256

        ef2e9341bd525fc3e359334ce20df5568ee7bb943c50e6c2481be0ac4aa2915f

        SHA512

        3c468844d04dcd4fb3bfc745d4705e9811a978b2fe6726f11b4c3587785a7f367b1bb8f7a542b094ec4fb6f5c236985126cb73d75cdfdef9df46eea5586d7491

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8890.exe
        Filesize

        291KB

        MD5

        45ae137c3cc817779a687bd4bab9f84b

        SHA1

        2af546eb5f1388875a27a5e624b3e9f6423e664f

        SHA256

        ef2e9341bd525fc3e359334ce20df5568ee7bb943c50e6c2481be0ac4aa2915f

        SHA512

        3c468844d04dcd4fb3bfc745d4705e9811a978b2fe6726f11b4c3587785a7f367b1bb8f7a542b094ec4fb6f5c236985126cb73d75cdfdef9df46eea5586d7491

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6068.exe
        Filesize

        345KB

        MD5

        57499b400edc9c3273b35eafb0e5efc8

        SHA1

        97fc945e47db7035ce0caa97284e830aff525799

        SHA256

        f0964ee9542641acde69b94f044f7e35b178ac5d2e6bfa98300aef7e7e2b22ab

        SHA512

        e797fc40726a1120b6f848b58a44bde82794afaa5acb33863a4e62435118994e02873dcdd2570490bfb06c9f4c5a467474f8687682d9fd20d507ffd30349fe51

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6068.exe
        Filesize

        345KB

        MD5

        57499b400edc9c3273b35eafb0e5efc8

        SHA1

        97fc945e47db7035ce0caa97284e830aff525799

        SHA256

        f0964ee9542641acde69b94f044f7e35b178ac5d2e6bfa98300aef7e7e2b22ab

        SHA512

        e797fc40726a1120b6f848b58a44bde82794afaa5acb33863a4e62435118994e02873dcdd2570490bfb06c9f4c5a467474f8687682d9fd20d507ffd30349fe51

      • memory/2204-148-0x0000000004EF0000-0x0000000005494000-memory.dmp
        Filesize

        5.6MB

      • memory/2204-149-0x0000000000710000-0x000000000073D000-memory.dmp
        Filesize

        180KB

      • memory/2204-152-0x0000000004DB0000-0x0000000004DC2000-memory.dmp
        Filesize

        72KB

      • memory/2204-151-0x0000000004EE0000-0x0000000004EF0000-memory.dmp
        Filesize

        64KB

      • memory/2204-150-0x0000000004EE0000-0x0000000004EF0000-memory.dmp
        Filesize

        64KB

      • memory/2204-156-0x0000000004DB0000-0x0000000004DC2000-memory.dmp
        Filesize

        72KB

      • memory/2204-154-0x0000000004DB0000-0x0000000004DC2000-memory.dmp
        Filesize

        72KB

      • memory/2204-153-0x0000000004EE0000-0x0000000004EF0000-memory.dmp
        Filesize

        64KB

      • memory/2204-160-0x0000000004DB0000-0x0000000004DC2000-memory.dmp
        Filesize

        72KB

      • memory/2204-158-0x0000000004DB0000-0x0000000004DC2000-memory.dmp
        Filesize

        72KB

      • memory/2204-162-0x0000000004DB0000-0x0000000004DC2000-memory.dmp
        Filesize

        72KB

      • memory/2204-164-0x0000000004DB0000-0x0000000004DC2000-memory.dmp
        Filesize

        72KB

      • memory/2204-166-0x0000000004DB0000-0x0000000004DC2000-memory.dmp
        Filesize

        72KB

      • memory/2204-168-0x0000000004DB0000-0x0000000004DC2000-memory.dmp
        Filesize

        72KB

      • memory/2204-170-0x0000000004DB0000-0x0000000004DC2000-memory.dmp
        Filesize

        72KB

      • memory/2204-172-0x0000000004DB0000-0x0000000004DC2000-memory.dmp
        Filesize

        72KB

      • memory/2204-174-0x0000000004DB0000-0x0000000004DC2000-memory.dmp
        Filesize

        72KB

      • memory/2204-176-0x0000000004DB0000-0x0000000004DC2000-memory.dmp
        Filesize

        72KB

      • memory/2204-178-0x0000000004DB0000-0x0000000004DC2000-memory.dmp
        Filesize

        72KB

      • memory/2204-180-0x0000000004DB0000-0x0000000004DC2000-memory.dmp
        Filesize

        72KB

      • memory/2204-181-0x0000000000400000-0x000000000070B000-memory.dmp
        Filesize

        3.0MB

      • memory/2204-182-0x0000000004EE0000-0x0000000004EF0000-memory.dmp
        Filesize

        64KB

      • memory/2204-183-0x0000000004EE0000-0x0000000004EF0000-memory.dmp
        Filesize

        64KB

      • memory/2204-184-0x0000000004EE0000-0x0000000004EF0000-memory.dmp
        Filesize

        64KB

      • memory/2204-186-0x0000000000400000-0x000000000070B000-memory.dmp
        Filesize

        3.0MB

      • memory/3900-191-0x0000000003970000-0x00000000039AF000-memory.dmp
        Filesize

        252KB

      • memory/3900-192-0x0000000003970000-0x00000000039AF000-memory.dmp
        Filesize

        252KB

      • memory/3900-194-0x0000000003970000-0x00000000039AF000-memory.dmp
        Filesize

        252KB

      • memory/3900-196-0x0000000003970000-0x00000000039AF000-memory.dmp
        Filesize

        252KB

      • memory/3900-198-0x0000000003970000-0x00000000039AF000-memory.dmp
        Filesize

        252KB

      • memory/3900-200-0x0000000003970000-0x00000000039AF000-memory.dmp
        Filesize

        252KB

      • memory/3900-202-0x0000000003970000-0x00000000039AF000-memory.dmp
        Filesize

        252KB

      • memory/3900-204-0x0000000003970000-0x00000000039AF000-memory.dmp
        Filesize

        252KB

      • memory/3900-206-0x0000000003970000-0x00000000039AF000-memory.dmp
        Filesize

        252KB

      • memory/3900-208-0x0000000003970000-0x00000000039AF000-memory.dmp
        Filesize

        252KB

      • memory/3900-210-0x0000000003970000-0x00000000039AF000-memory.dmp
        Filesize

        252KB

      • memory/3900-212-0x0000000003970000-0x00000000039AF000-memory.dmp
        Filesize

        252KB

      • memory/3900-214-0x0000000003970000-0x00000000039AF000-memory.dmp
        Filesize

        252KB

      • memory/3900-216-0x0000000003970000-0x00000000039AF000-memory.dmp
        Filesize

        252KB

      • memory/3900-218-0x0000000003970000-0x00000000039AF000-memory.dmp
        Filesize

        252KB

      • memory/3900-222-0x0000000003970000-0x00000000039AF000-memory.dmp
        Filesize

        252KB

      • memory/3900-220-0x0000000003970000-0x00000000039AF000-memory.dmp
        Filesize

        252KB

      • memory/3900-225-0x0000000001B00000-0x0000000001B4B000-memory.dmp
        Filesize

        300KB

      • memory/3900-224-0x0000000003970000-0x00000000039AF000-memory.dmp
        Filesize

        252KB

      • memory/3900-226-0x00000000060E0000-0x00000000060F0000-memory.dmp
        Filesize

        64KB

      • memory/3900-228-0x00000000060E0000-0x00000000060F0000-memory.dmp
        Filesize

        64KB

      • memory/3900-1100-0x00000000068A0000-0x0000000006EB8000-memory.dmp
        Filesize

        6.1MB

      • memory/3900-1101-0x0000000006EC0000-0x0000000006FCA000-memory.dmp
        Filesize

        1.0MB

      • memory/3900-1102-0x0000000006060000-0x0000000006072000-memory.dmp
        Filesize

        72KB

      • memory/3900-1103-0x0000000006080000-0x00000000060BC000-memory.dmp
        Filesize

        240KB

      • memory/3900-1104-0x00000000060E0000-0x00000000060F0000-memory.dmp
        Filesize

        64KB

      • memory/3900-1105-0x0000000007260000-0x00000000072F2000-memory.dmp
        Filesize

        584KB

      • memory/3900-1106-0x0000000007300000-0x0000000007366000-memory.dmp
        Filesize

        408KB

      • memory/3900-1108-0x00000000060E0000-0x00000000060F0000-memory.dmp
        Filesize

        64KB

      • memory/3900-1109-0x00000000060E0000-0x00000000060F0000-memory.dmp
        Filesize

        64KB

      • memory/3900-1110-0x00000000060E0000-0x00000000060F0000-memory.dmp
        Filesize

        64KB

      • memory/3900-1111-0x0000000007B00000-0x0000000007B76000-memory.dmp
        Filesize

        472KB

      • memory/3900-1112-0x0000000007B90000-0x0000000007BE0000-memory.dmp
        Filesize

        320KB

      • memory/3900-1113-0x00000000060E0000-0x00000000060F0000-memory.dmp
        Filesize

        64KB

      • memory/3900-1114-0x0000000007D80000-0x0000000007F42000-memory.dmp
        Filesize

        1.8MB

      • memory/3900-1115-0x0000000007F50000-0x000000000847C000-memory.dmp
        Filesize

        5.2MB

      • memory/4384-1121-0x0000000000840000-0x0000000000872000-memory.dmp
        Filesize

        200KB

      • memory/4384-1122-0x0000000005170000-0x0000000005180000-memory.dmp
        Filesize

        64KB