Analysis

  • max time kernel
    98s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 03:49

General

  • Target

    efbcbf608abbce7cb6c890b5d5e014ccabb2f4a399b5631bcb65169a6b8ffb37.exe

  • Size

    689KB

  • MD5

    4623428b09570d791fa0db3635ba226a

  • SHA1

    216806f746338696353dfa0d8b08a40a41782bc8

  • SHA256

    efbcbf608abbce7cb6c890b5d5e014ccabb2f4a399b5631bcb65169a6b8ffb37

  • SHA512

    a22eaa62e4508dd7b59fdf2f31b3d8c54e4959edcc6055e9ea1d1455bcd4f7fa336c15b8b014110a1c3a88475261b3443155392cad34e8d352ecbfb0219d8fd2

  • SSDEEP

    12288:bMrey90wYEMeGMGO3tVy665hLuhR+3Hx2cZuNAg0vVFMbfigo8rCIA6B:1yEMPKJfaKh2eun03Mbago+Cp8

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\efbcbf608abbce7cb6c890b5d5e014ccabb2f4a399b5631bcb65169a6b8ffb37.exe
    "C:\Users\Admin\AppData\Local\Temp\efbcbf608abbce7cb6c890b5d5e014ccabb2f4a399b5631bcb65169a6b8ffb37.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3776
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un742176.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un742176.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:460
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5721.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5721.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4496
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4496 -s 1084
          4⤵
          • Program crash
          PID:4596
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2956.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2956.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2136
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 1324
          4⤵
          • Program crash
          PID:4900
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si217069.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si217069.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1760
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4496 -ip 4496
    1⤵
      PID:1664
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2136 -ip 2136
      1⤵
        PID:4812

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si217069.exe

        Filesize

        175KB

        MD5

        6a1fd5108b393b3c205854566ce27298

        SHA1

        a47ea600bd60f473e794c4eb0443d6ba569b932d

        SHA256

        fdf0f84f250c8b178c3c174383ff2f1e205c290d2b7360a80961db32ef96cd39

        SHA512

        b4a5a1f944b973121ebaf386ceafaca2177df59b3736656079851e3b52b397d914d3a9e76b2c6475e93a03382e9e2cbf339a65cea01688f0d99b0d4cd3a6e9d7

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si217069.exe

        Filesize

        175KB

        MD5

        6a1fd5108b393b3c205854566ce27298

        SHA1

        a47ea600bd60f473e794c4eb0443d6ba569b932d

        SHA256

        fdf0f84f250c8b178c3c174383ff2f1e205c290d2b7360a80961db32ef96cd39

        SHA512

        b4a5a1f944b973121ebaf386ceafaca2177df59b3736656079851e3b52b397d914d3a9e76b2c6475e93a03382e9e2cbf339a65cea01688f0d99b0d4cd3a6e9d7

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un742176.exe

        Filesize

        547KB

        MD5

        318bdddf5fb0b41aac30466b3256d263

        SHA1

        be3ea306057bf857e3ca4fc6ddc504361a389b32

        SHA256

        9a9e558374ae014cd10bc6a89a701e4a8db4142eeb4714a7c6eb56509b6ebb8b

        SHA512

        c89157130e319a9f3b21df400fc6d93204b77e6a6bc8e4a9d92d5b6379bbd3c9eaa233c982dc3979ea6701445825393e06a307902b280ede587d949b5dbf469f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un742176.exe

        Filesize

        547KB

        MD5

        318bdddf5fb0b41aac30466b3256d263

        SHA1

        be3ea306057bf857e3ca4fc6ddc504361a389b32

        SHA256

        9a9e558374ae014cd10bc6a89a701e4a8db4142eeb4714a7c6eb56509b6ebb8b

        SHA512

        c89157130e319a9f3b21df400fc6d93204b77e6a6bc8e4a9d92d5b6379bbd3c9eaa233c982dc3979ea6701445825393e06a307902b280ede587d949b5dbf469f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5721.exe

        Filesize

        291KB

        MD5

        10f36b14994668f5fe0dae88ef036d24

        SHA1

        a42320168cf1ab5b1805d241bfcc0437872375d7

        SHA256

        52f5a03d989cb94255643495d3bf22eb2db94540a625685473a327d8f5a782ae

        SHA512

        83a4d0d7b8d2aea80975c61a439e495f08541c082638d5e604c96b7f883d084157947726d76f990385df021b092e27e0b4d6becf82a2a85a293e54f3c4906435

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5721.exe

        Filesize

        291KB

        MD5

        10f36b14994668f5fe0dae88ef036d24

        SHA1

        a42320168cf1ab5b1805d241bfcc0437872375d7

        SHA256

        52f5a03d989cb94255643495d3bf22eb2db94540a625685473a327d8f5a782ae

        SHA512

        83a4d0d7b8d2aea80975c61a439e495f08541c082638d5e604c96b7f883d084157947726d76f990385df021b092e27e0b4d6becf82a2a85a293e54f3c4906435

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2956.exe

        Filesize

        345KB

        MD5

        437e55a4c26c9d365e2c83f8d0947070

        SHA1

        3df04844c3673b784b7e2faff4a903c553260f98

        SHA256

        b2eee3c9a60609247833e36b919b062d14a1ccc955152442f1749b24382d2af3

        SHA512

        2ccc6c8aea142c9bfa18d0381875e80498765d3cbac77172833d622e7cba54bb59d6ccc379fd2da98b5c23b421adb7c174dd5aa489480992065035b6c948247e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2956.exe

        Filesize

        345KB

        MD5

        437e55a4c26c9d365e2c83f8d0947070

        SHA1

        3df04844c3673b784b7e2faff4a903c553260f98

        SHA256

        b2eee3c9a60609247833e36b919b062d14a1ccc955152442f1749b24382d2af3

        SHA512

        2ccc6c8aea142c9bfa18d0381875e80498765d3cbac77172833d622e7cba54bb59d6ccc379fd2da98b5c23b421adb7c174dd5aa489480992065035b6c948247e

      • memory/1760-1121-0x00000000050D0000-0x00000000050E0000-memory.dmp

        Filesize

        64KB

      • memory/1760-1120-0x0000000000780000-0x00000000007B2000-memory.dmp

        Filesize

        200KB

      • memory/2136-1099-0x00000000068A0000-0x0000000006EB8000-memory.dmp

        Filesize

        6.1MB

      • memory/2136-1101-0x0000000006060000-0x0000000006072000-memory.dmp

        Filesize

        72KB

      • memory/2136-1114-0x00000000060E0000-0x00000000060F0000-memory.dmp

        Filesize

        64KB

      • memory/2136-1113-0x0000000007CE0000-0x000000000820C000-memory.dmp

        Filesize

        5.2MB

      • memory/2136-1112-0x0000000007B10000-0x0000000007CD2000-memory.dmp

        Filesize

        1.8MB

      • memory/2136-1111-0x00000000060E0000-0x00000000060F0000-memory.dmp

        Filesize

        64KB

      • memory/2136-1110-0x00000000060E0000-0x00000000060F0000-memory.dmp

        Filesize

        64KB

      • memory/2136-1109-0x00000000060E0000-0x00000000060F0000-memory.dmp

        Filesize

        64KB

      • memory/2136-1107-0x0000000007A90000-0x0000000007AE0000-memory.dmp

        Filesize

        320KB

      • memory/2136-1106-0x0000000007A00000-0x0000000007A76000-memory.dmp

        Filesize

        472KB

      • memory/2136-1105-0x0000000007300000-0x0000000007366000-memory.dmp

        Filesize

        408KB

      • memory/2136-1104-0x0000000007260000-0x00000000072F2000-memory.dmp

        Filesize

        584KB

      • memory/2136-1103-0x0000000006080000-0x00000000060BC000-memory.dmp

        Filesize

        240KB

      • memory/2136-1102-0x00000000060E0000-0x00000000060F0000-memory.dmp

        Filesize

        64KB

      • memory/2136-1100-0x0000000006EC0000-0x0000000006FCA000-memory.dmp

        Filesize

        1.0MB

      • memory/2136-226-0x0000000003A80000-0x0000000003ABF000-memory.dmp

        Filesize

        252KB

      • memory/2136-224-0x0000000003A80000-0x0000000003ABF000-memory.dmp

        Filesize

        252KB

      • memory/2136-220-0x00000000060E0000-0x00000000060F0000-memory.dmp

        Filesize

        64KB

      • memory/2136-222-0x0000000003A80000-0x0000000003ABF000-memory.dmp

        Filesize

        252KB

      • memory/2136-190-0x0000000003A80000-0x0000000003ABF000-memory.dmp

        Filesize

        252KB

      • memory/2136-192-0x0000000003A80000-0x0000000003ABF000-memory.dmp

        Filesize

        252KB

      • memory/2136-189-0x0000000003A80000-0x0000000003ABF000-memory.dmp

        Filesize

        252KB

      • memory/2136-194-0x0000000003A80000-0x0000000003ABF000-memory.dmp

        Filesize

        252KB

      • memory/2136-196-0x0000000003A80000-0x0000000003ABF000-memory.dmp

        Filesize

        252KB

      • memory/2136-198-0x0000000003A80000-0x0000000003ABF000-memory.dmp

        Filesize

        252KB

      • memory/2136-200-0x0000000003A80000-0x0000000003ABF000-memory.dmp

        Filesize

        252KB

      • memory/2136-202-0x0000000003A80000-0x0000000003ABF000-memory.dmp

        Filesize

        252KB

      • memory/2136-204-0x0000000003A80000-0x0000000003ABF000-memory.dmp

        Filesize

        252KB

      • memory/2136-206-0x0000000003A80000-0x0000000003ABF000-memory.dmp

        Filesize

        252KB

      • memory/2136-208-0x0000000003A80000-0x0000000003ABF000-memory.dmp

        Filesize

        252KB

      • memory/2136-210-0x0000000003A80000-0x0000000003ABF000-memory.dmp

        Filesize

        252KB

      • memory/2136-212-0x0000000003A80000-0x0000000003ABF000-memory.dmp

        Filesize

        252KB

      • memory/2136-214-0x0000000001B90000-0x0000000001BDB000-memory.dmp

        Filesize

        300KB

      • memory/2136-216-0x0000000003A80000-0x0000000003ABF000-memory.dmp

        Filesize

        252KB

      • memory/2136-219-0x0000000003A80000-0x0000000003ABF000-memory.dmp

        Filesize

        252KB

      • memory/2136-217-0x00000000060E0000-0x00000000060F0000-memory.dmp

        Filesize

        64KB

      • memory/2136-215-0x00000000060E0000-0x00000000060F0000-memory.dmp

        Filesize

        64KB

      • memory/4496-174-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4496-148-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/4496-153-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4496-182-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/4496-152-0x0000000004EA0000-0x0000000005444000-memory.dmp

        Filesize

        5.6MB

      • memory/4496-181-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/4496-156-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4496-180-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4496-178-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4496-170-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4496-184-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/4496-154-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4496-176-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4496-168-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4496-166-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4496-164-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4496-162-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4496-160-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4496-158-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4496-151-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/4496-150-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/4496-149-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/4496-172-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB