Analysis

  • max time kernel
    93s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 03:57

General

  • Target

    ea0689bb1b68b18d82435c5deb708ac0cc5019648c95f204d3e705d13c1ecac3.exe

  • Size

    690KB

  • MD5

    bbbfc66a73284db051aa0da5dcfa5230

  • SHA1

    4bd3019830822979fea5a622268685dc8d3046f5

  • SHA256

    ea0689bb1b68b18d82435c5deb708ac0cc5019648c95f204d3e705d13c1ecac3

  • SHA512

    ab3c08927cd82e31414ff0d0bbab14f58a7acf7e759b0174410bf2e2c047ef7840a43a9046ff08d5d565333e21d3a3ce87e3d13fc66a758493f12b4b044d1cd5

  • SSDEEP

    12288:vMrsy908a7xUP0DCyV65hLuSTRcNgyx9atvxvRF3kfigzMJnaTi:jy0xdPIfaeRGg+aBxz3kagzJi

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea0689bb1b68b18d82435c5deb708ac0cc5019648c95f204d3e705d13c1ecac3.exe
    "C:\Users\Admin\AppData\Local\Temp\ea0689bb1b68b18d82435c5deb708ac0cc5019648c95f204d3e705d13c1ecac3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4944
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un904540.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un904540.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4280
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0706.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0706.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5064
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5064 -s 1080
          4⤵
          • Program crash
          PID:2856
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1074.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1074.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:8
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 8 -s 1292
          4⤵
          • Program crash
          PID:1744
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si553928.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si553928.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3900
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5064 -ip 5064
    1⤵
      PID:4344
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 8 -ip 8
      1⤵
        PID:3424

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si553928.exe
        Filesize

        175KB

        MD5

        b171c12c92ddfabec26fbdabdb0c9c21

        SHA1

        05dbf376ed754e6496b24f1d3350cfea4cc57370

        SHA256

        ca00fc1898ac952bf489a481bfd69fd4752928f1660367f708746600b37755eb

        SHA512

        be015cf3dd68ee82eef8d33d35c8b295157ac88834d1ae68942521b5dbc1a198a9e1ef1efcfbf8e641fd21bb810c1127a9a9110cefaa4c06c840d99bbe965ecc

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si553928.exe
        Filesize

        175KB

        MD5

        b171c12c92ddfabec26fbdabdb0c9c21

        SHA1

        05dbf376ed754e6496b24f1d3350cfea4cc57370

        SHA256

        ca00fc1898ac952bf489a481bfd69fd4752928f1660367f708746600b37755eb

        SHA512

        be015cf3dd68ee82eef8d33d35c8b295157ac88834d1ae68942521b5dbc1a198a9e1ef1efcfbf8e641fd21bb810c1127a9a9110cefaa4c06c840d99bbe965ecc

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un904540.exe
        Filesize

        548KB

        MD5

        e70c7b45745db39f62485e15ee746a70

        SHA1

        2e05f7742f0035f1f0be9d0b82cf52e4af84fdb0

        SHA256

        44c75735b9f56006db86dbdcd417086f3f8040de95429e83eee8cfe38d6ee9e3

        SHA512

        4b141ea287a7195a61b7bff1f84d177dd198a85adb9ebbb74c85e6a216c9706c27582397788688c08d0216b58742b08f2629983f73b6569ef53787e731b1f7c8

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un904540.exe
        Filesize

        548KB

        MD5

        e70c7b45745db39f62485e15ee746a70

        SHA1

        2e05f7742f0035f1f0be9d0b82cf52e4af84fdb0

        SHA256

        44c75735b9f56006db86dbdcd417086f3f8040de95429e83eee8cfe38d6ee9e3

        SHA512

        4b141ea287a7195a61b7bff1f84d177dd198a85adb9ebbb74c85e6a216c9706c27582397788688c08d0216b58742b08f2629983f73b6569ef53787e731b1f7c8

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0706.exe
        Filesize

        291KB

        MD5

        db90c9af85768db9418df9322d15b7a1

        SHA1

        8a728a2b94b436340488f795c3ed17195d9e1439

        SHA256

        9aeb1e3b75c9573a39797f98d13e4e142774a09151a809b19c4889a3e48485d3

        SHA512

        912ef076a284f25b0a6aabb83cdccd57cde5fea9a040fa31cbf7b3db40855399a30b0e229e8c319bafa88a2e4a7d97c75a41526cc0f57c78e975a857e4e8c508

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0706.exe
        Filesize

        291KB

        MD5

        db90c9af85768db9418df9322d15b7a1

        SHA1

        8a728a2b94b436340488f795c3ed17195d9e1439

        SHA256

        9aeb1e3b75c9573a39797f98d13e4e142774a09151a809b19c4889a3e48485d3

        SHA512

        912ef076a284f25b0a6aabb83cdccd57cde5fea9a040fa31cbf7b3db40855399a30b0e229e8c319bafa88a2e4a7d97c75a41526cc0f57c78e975a857e4e8c508

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1074.exe
        Filesize

        345KB

        MD5

        164daf57ff9a338148a52b3f5de05415

        SHA1

        4b2c01b6448f86fa60a726ff27aa2bc4dfd752cd

        SHA256

        b37aabc61f6042e6fb2d5a2126c4349c3f12459efae31f82c04a491c5e9506e6

        SHA512

        4a600a54c80c04e5409c3c1b166479c1b5b08201ca5427ec2b2df13b2bb0a23f40596cb398574aa101cff9944b173ed500b98de8b9d58172b7f786bd0ea52f19

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1074.exe
        Filesize

        345KB

        MD5

        164daf57ff9a338148a52b3f5de05415

        SHA1

        4b2c01b6448f86fa60a726ff27aa2bc4dfd752cd

        SHA256

        b37aabc61f6042e6fb2d5a2126c4349c3f12459efae31f82c04a491c5e9506e6

        SHA512

        4a600a54c80c04e5409c3c1b166479c1b5b08201ca5427ec2b2df13b2bb0a23f40596cb398574aa101cff9944b173ed500b98de8b9d58172b7f786bd0ea52f19

      • memory/8-227-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/8-1102-0x0000000006F50000-0x0000000006F62000-memory.dmp
        Filesize

        72KB

      • memory/8-1115-0x0000000008530000-0x0000000008580000-memory.dmp
        Filesize

        320KB

      • memory/8-1114-0x00000000084A0000-0x0000000008516000-memory.dmp
        Filesize

        472KB

      • memory/8-1113-0x0000000003B10000-0x0000000003B20000-memory.dmp
        Filesize

        64KB

      • memory/8-1112-0x0000000003B10000-0x0000000003B20000-memory.dmp
        Filesize

        64KB

      • memory/8-1111-0x0000000003B10000-0x0000000003B20000-memory.dmp
        Filesize

        64KB

      • memory/8-1110-0x0000000003B10000-0x0000000003B20000-memory.dmp
        Filesize

        64KB

      • memory/8-1108-0x0000000007CF0000-0x000000000821C000-memory.dmp
        Filesize

        5.2MB

      • memory/8-1107-0x0000000007B20000-0x0000000007CE2000-memory.dmp
        Filesize

        1.8MB

      • memory/8-1106-0x0000000007300000-0x0000000007366000-memory.dmp
        Filesize

        408KB

      • memory/8-1105-0x0000000007260000-0x00000000072F2000-memory.dmp
        Filesize

        584KB

      • memory/8-1104-0x0000000003B10000-0x0000000003B20000-memory.dmp
        Filesize

        64KB

      • memory/8-1103-0x0000000006F70000-0x0000000006FAC000-memory.dmp
        Filesize

        240KB

      • memory/8-1101-0x0000000006E10000-0x0000000006F1A000-memory.dmp
        Filesize

        1.0MB

      • memory/8-1100-0x0000000006770000-0x0000000006D88000-memory.dmp
        Filesize

        6.1MB

      • memory/8-225-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/8-223-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/8-221-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/8-219-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/8-217-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/8-211-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/8-190-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/8-191-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/8-193-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/8-195-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/8-197-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/8-199-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/8-201-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/8-203-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/8-205-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/8-207-0x0000000001C20000-0x0000000001C6B000-memory.dmp
        Filesize

        300KB

      • memory/8-209-0x0000000003B10000-0x0000000003B20000-memory.dmp
        Filesize

        64KB

      • memory/8-208-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/8-212-0x0000000003B10000-0x0000000003B20000-memory.dmp
        Filesize

        64KB

      • memory/8-214-0x0000000003B10000-0x0000000003B20000-memory.dmp
        Filesize

        64KB

      • memory/8-215-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/3900-1121-0x0000000000290000-0x00000000002C2000-memory.dmp
        Filesize

        200KB

      • memory/3900-1122-0x0000000004B20000-0x0000000004B30000-memory.dmp
        Filesize

        64KB

      • memory/5064-172-0x0000000002470000-0x0000000002482000-memory.dmp
        Filesize

        72KB

      • memory/5064-148-0x0000000005050000-0x00000000055F4000-memory.dmp
        Filesize

        5.6MB

      • memory/5064-182-0x0000000005040000-0x0000000005050000-memory.dmp
        Filesize

        64KB

      • memory/5064-181-0x0000000000400000-0x000000000070B000-memory.dmp
        Filesize

        3.0MB

      • memory/5064-150-0x0000000005040000-0x0000000005050000-memory.dmp
        Filesize

        64KB

      • memory/5064-180-0x0000000002470000-0x0000000002482000-memory.dmp
        Filesize

        72KB

      • memory/5064-178-0x0000000002470000-0x0000000002482000-memory.dmp
        Filesize

        72KB

      • memory/5064-153-0x0000000002470000-0x0000000002482000-memory.dmp
        Filesize

        72KB

      • memory/5064-176-0x0000000002470000-0x0000000002482000-memory.dmp
        Filesize

        72KB

      • memory/5064-174-0x0000000002470000-0x0000000002482000-memory.dmp
        Filesize

        72KB

      • memory/5064-151-0x0000000005040000-0x0000000005050000-memory.dmp
        Filesize

        64KB

      • memory/5064-183-0x0000000005040000-0x0000000005050000-memory.dmp
        Filesize

        64KB

      • memory/5064-164-0x0000000002470000-0x0000000002482000-memory.dmp
        Filesize

        72KB

      • memory/5064-166-0x0000000002470000-0x0000000002482000-memory.dmp
        Filesize

        72KB

      • memory/5064-168-0x0000000002470000-0x0000000002482000-memory.dmp
        Filesize

        72KB

      • memory/5064-162-0x0000000002470000-0x0000000002482000-memory.dmp
        Filesize

        72KB

      • memory/5064-160-0x0000000002470000-0x0000000002482000-memory.dmp
        Filesize

        72KB

      • memory/5064-158-0x0000000002470000-0x0000000002482000-memory.dmp
        Filesize

        72KB

      • memory/5064-156-0x0000000002470000-0x0000000002482000-memory.dmp
        Filesize

        72KB

      • memory/5064-154-0x0000000002470000-0x0000000002482000-memory.dmp
        Filesize

        72KB

      • memory/5064-149-0x0000000000710000-0x000000000073D000-memory.dmp
        Filesize

        180KB

      • memory/5064-170-0x0000000002470000-0x0000000002482000-memory.dmp
        Filesize

        72KB

      • memory/5064-185-0x0000000000400000-0x000000000070B000-memory.dmp
        Filesize

        3.0MB

      • memory/5064-152-0x0000000005040000-0x0000000005050000-memory.dmp
        Filesize

        64KB