Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 04:02

General

  • Target

    87b3ab7c5acfa48575bc31a8eaaee2dbc58baca94b09f83465cb692fefc7ab78.exe

  • Size

    689KB

  • MD5

    ad82a82c333c7abea8001f6d6460fc28

  • SHA1

    d5779bea78594b3908da0e100760cee62790650d

  • SHA256

    87b3ab7c5acfa48575bc31a8eaaee2dbc58baca94b09f83465cb692fefc7ab78

  • SHA512

    8ba450793de6660ba7217ca01a03115b0ba548155ff3a9ef3d559b165b84d2d104be1467ea680bb921d0cac7cdceaed258aad7e6a7794762565e526deda0be7c

  • SSDEEP

    12288:TMrpy90P9WljYNT+YvVqC691xbG9W+DT4Tcd2W5jZtBxYmJGvHFa6fignag7u4u7:my3GNSkM5tbl+DTyW+mJG9a6agnV64Eh

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\87b3ab7c5acfa48575bc31a8eaaee2dbc58baca94b09f83465cb692fefc7ab78.exe
    "C:\Users\Admin\AppData\Local\Temp\87b3ab7c5acfa48575bc31a8eaaee2dbc58baca94b09f83465cb692fefc7ab78.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1664
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un489364.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un489364.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4972
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5378.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5378.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4440
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4440 -s 1084
          4⤵
          • Program crash
          PID:3200
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6139.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6139.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3136
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3136 -s 1540
          4⤵
          • Program crash
          PID:1944
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si621753.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si621753.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2108
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4440 -ip 4440
    1⤵
      PID:4760
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 3136 -ip 3136
      1⤵
        PID:1996

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si621753.exe
        Filesize

        175KB

        MD5

        0f97f04b6f6a1c079151e0b1bcf60265

        SHA1

        83c0ff63bcf2f186d4b792c8812c13ec417eb8f7

        SHA256

        a511b46eef5fc3a1172d4c6af6cb1e548868701f23273383047a978331826886

        SHA512

        dc3ad74aeee254c13fd09f42c9e34332391eb0c3c5b8a2766bb3e971f2d52b726eb91c48fe29ef362b80281a8647c0ba8a24e2effaf9ce62448b1cbe2eeb6d96

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si621753.exe
        Filesize

        175KB

        MD5

        0f97f04b6f6a1c079151e0b1bcf60265

        SHA1

        83c0ff63bcf2f186d4b792c8812c13ec417eb8f7

        SHA256

        a511b46eef5fc3a1172d4c6af6cb1e548868701f23273383047a978331826886

        SHA512

        dc3ad74aeee254c13fd09f42c9e34332391eb0c3c5b8a2766bb3e971f2d52b726eb91c48fe29ef362b80281a8647c0ba8a24e2effaf9ce62448b1cbe2eeb6d96

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un489364.exe
        Filesize

        547KB

        MD5

        2a6f14acbea72896d8c6651038989f09

        SHA1

        549bf9bd01b7b2e1728b9ec649aaa3b67b77cbcf

        SHA256

        af0ecd8a77170699d1479a1f9c1bbf20612371cb83659b44b921d54eef93734e

        SHA512

        f91a3ea279ed70adf28c4146eab802a1c793cacde5e61820b852357e038570c074a52003690e38e9bba27ff90cc47160935f28b61fdd58dfdb3b9b9f1733d623

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un489364.exe
        Filesize

        547KB

        MD5

        2a6f14acbea72896d8c6651038989f09

        SHA1

        549bf9bd01b7b2e1728b9ec649aaa3b67b77cbcf

        SHA256

        af0ecd8a77170699d1479a1f9c1bbf20612371cb83659b44b921d54eef93734e

        SHA512

        f91a3ea279ed70adf28c4146eab802a1c793cacde5e61820b852357e038570c074a52003690e38e9bba27ff90cc47160935f28b61fdd58dfdb3b9b9f1733d623

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5378.exe
        Filesize

        291KB

        MD5

        d3fbd7008bd7aa8f49b24b18cd7facc8

        SHA1

        c3b8abfb126bfee2fd6f0061b9e920ac8b5bd8fa

        SHA256

        1ddf5df869824995200322b76d4586883f50d29130ba6a0b8402ff18906f7d11

        SHA512

        76b9aa09d3c770b1813606cde207907c52ca3691195c441ffe89ad88122b0b7f700cb385addf7c4a1678d5eef8378566cbd809dcda1ad6369a752ee5fde079d8

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5378.exe
        Filesize

        291KB

        MD5

        d3fbd7008bd7aa8f49b24b18cd7facc8

        SHA1

        c3b8abfb126bfee2fd6f0061b9e920ac8b5bd8fa

        SHA256

        1ddf5df869824995200322b76d4586883f50d29130ba6a0b8402ff18906f7d11

        SHA512

        76b9aa09d3c770b1813606cde207907c52ca3691195c441ffe89ad88122b0b7f700cb385addf7c4a1678d5eef8378566cbd809dcda1ad6369a752ee5fde079d8

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6139.exe
        Filesize

        345KB

        MD5

        ffe3d4d27a6ca34c03f9bbb1b23a37db

        SHA1

        885c88fda9e594fb5ff1943585e97fe9131f364b

        SHA256

        25d92bfaab8b5cfd4968c19e434718207cdbeb9856ced6a9b3f879389354d667

        SHA512

        ebc7b39d1424d2d22e8bfa1d0186ba258f012224a3825f53aef10eb5b952e6678654c7b719c1bb84bc8e256a33da6069060865ce0efa1d1fabf98ecbddde566a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6139.exe
        Filesize

        345KB

        MD5

        ffe3d4d27a6ca34c03f9bbb1b23a37db

        SHA1

        885c88fda9e594fb5ff1943585e97fe9131f364b

        SHA256

        25d92bfaab8b5cfd4968c19e434718207cdbeb9856ced6a9b3f879389354d667

        SHA512

        ebc7b39d1424d2d22e8bfa1d0186ba258f012224a3825f53aef10eb5b952e6678654c7b719c1bb84bc8e256a33da6069060865ce0efa1d1fabf98ecbddde566a

      • memory/2108-1124-0x00000000054C0000-0x00000000054D0000-memory.dmp
        Filesize

        64KB

      • memory/2108-1123-0x00000000054C0000-0x00000000054D0000-memory.dmp
        Filesize

        64KB

      • memory/2108-1122-0x0000000000C10000-0x0000000000C42000-memory.dmp
        Filesize

        200KB

      • memory/3136-1102-0x0000000006D90000-0x0000000006E9A000-memory.dmp
        Filesize

        1.0MB

      • memory/3136-1105-0x00000000061B0000-0x00000000061C0000-memory.dmp
        Filesize

        64KB

      • memory/3136-1116-0x00000000061B0000-0x00000000061C0000-memory.dmp
        Filesize

        64KB

      • memory/3136-1115-0x00000000082B0000-0x0000000008300000-memory.dmp
        Filesize

        320KB

      • memory/3136-1114-0x0000000008230000-0x00000000082A6000-memory.dmp
        Filesize

        472KB

      • memory/3136-1113-0x00000000061B0000-0x00000000061C0000-memory.dmp
        Filesize

        64KB

      • memory/3136-1112-0x00000000061B0000-0x00000000061C0000-memory.dmp
        Filesize

        64KB

      • memory/3136-1111-0x00000000061B0000-0x00000000061C0000-memory.dmp
        Filesize

        64KB

      • memory/3136-1110-0x0000000007AC0000-0x0000000007FEC000-memory.dmp
        Filesize

        5.2MB

      • memory/3136-1109-0x00000000078F0000-0x0000000007AB2000-memory.dmp
        Filesize

        1.8MB

      • memory/3136-1107-0x00000000077E0000-0x0000000007872000-memory.dmp
        Filesize

        584KB

      • memory/3136-1106-0x0000000007120000-0x0000000007186000-memory.dmp
        Filesize

        408KB

      • memory/3136-1104-0x0000000006140000-0x000000000617C000-memory.dmp
        Filesize

        240KB

      • memory/3136-1103-0x0000000006120000-0x0000000006132000-memory.dmp
        Filesize

        72KB

      • memory/3136-1101-0x0000000006770000-0x0000000006D88000-memory.dmp
        Filesize

        6.1MB

      • memory/3136-269-0x00000000061B0000-0x00000000061C0000-memory.dmp
        Filesize

        64KB

      • memory/3136-265-0x00000000061B0000-0x00000000061C0000-memory.dmp
        Filesize

        64KB

      • memory/3136-268-0x00000000061B0000-0x00000000061C0000-memory.dmp
        Filesize

        64KB

      • memory/3136-264-0x0000000001B50000-0x0000000001B9B000-memory.dmp
        Filesize

        300KB

      • memory/3136-224-0x0000000005FF0000-0x000000000602F000-memory.dmp
        Filesize

        252KB

      • memory/3136-191-0x0000000005FF0000-0x000000000602F000-memory.dmp
        Filesize

        252KB

      • memory/3136-192-0x0000000005FF0000-0x000000000602F000-memory.dmp
        Filesize

        252KB

      • memory/3136-194-0x0000000005FF0000-0x000000000602F000-memory.dmp
        Filesize

        252KB

      • memory/3136-196-0x0000000005FF0000-0x000000000602F000-memory.dmp
        Filesize

        252KB

      • memory/3136-198-0x0000000005FF0000-0x000000000602F000-memory.dmp
        Filesize

        252KB

      • memory/3136-200-0x0000000005FF0000-0x000000000602F000-memory.dmp
        Filesize

        252KB

      • memory/3136-202-0x0000000005FF0000-0x000000000602F000-memory.dmp
        Filesize

        252KB

      • memory/3136-204-0x0000000005FF0000-0x000000000602F000-memory.dmp
        Filesize

        252KB

      • memory/3136-206-0x0000000005FF0000-0x000000000602F000-memory.dmp
        Filesize

        252KB

      • memory/3136-208-0x0000000005FF0000-0x000000000602F000-memory.dmp
        Filesize

        252KB

      • memory/3136-210-0x0000000005FF0000-0x000000000602F000-memory.dmp
        Filesize

        252KB

      • memory/3136-212-0x0000000005FF0000-0x000000000602F000-memory.dmp
        Filesize

        252KB

      • memory/3136-214-0x0000000005FF0000-0x000000000602F000-memory.dmp
        Filesize

        252KB

      • memory/3136-216-0x0000000005FF0000-0x000000000602F000-memory.dmp
        Filesize

        252KB

      • memory/3136-218-0x0000000005FF0000-0x000000000602F000-memory.dmp
        Filesize

        252KB

      • memory/3136-220-0x0000000005FF0000-0x000000000602F000-memory.dmp
        Filesize

        252KB

      • memory/3136-222-0x0000000005FF0000-0x000000000602F000-memory.dmp
        Filesize

        252KB

      • memory/4440-176-0x0000000002590000-0x00000000025A2000-memory.dmp
        Filesize

        72KB

      • memory/4440-184-0x0000000005040000-0x0000000005050000-memory.dmp
        Filesize

        64KB

      • memory/4440-156-0x0000000002590000-0x00000000025A2000-memory.dmp
        Filesize

        72KB

      • memory/4440-185-0x0000000005040000-0x0000000005050000-memory.dmp
        Filesize

        64KB

      • memory/4440-174-0x0000000002590000-0x00000000025A2000-memory.dmp
        Filesize

        72KB

      • memory/4440-182-0x0000000005040000-0x0000000005050000-memory.dmp
        Filesize

        64KB

      • memory/4440-154-0x0000000002590000-0x00000000025A2000-memory.dmp
        Filesize

        72KB

      • memory/4440-172-0x0000000002590000-0x00000000025A2000-memory.dmp
        Filesize

        72KB

      • memory/4440-180-0x0000000005040000-0x0000000005050000-memory.dmp
        Filesize

        64KB

      • memory/4440-160-0x0000000002590000-0x00000000025A2000-memory.dmp
        Filesize

        72KB

      • memory/4440-179-0x0000000005040000-0x0000000005050000-memory.dmp
        Filesize

        64KB

      • memory/4440-178-0x0000000002590000-0x00000000025A2000-memory.dmp
        Filesize

        72KB

      • memory/4440-186-0x0000000000400000-0x000000000070B000-memory.dmp
        Filesize

        3.0MB

      • memory/4440-158-0x0000000002590000-0x00000000025A2000-memory.dmp
        Filesize

        72KB

      • memory/4440-181-0x0000000000400000-0x000000000070B000-memory.dmp
        Filesize

        3.0MB

      • memory/4440-170-0x0000000002590000-0x00000000025A2000-memory.dmp
        Filesize

        72KB

      • memory/4440-168-0x0000000002590000-0x00000000025A2000-memory.dmp
        Filesize

        72KB

      • memory/4440-166-0x0000000002590000-0x00000000025A2000-memory.dmp
        Filesize

        72KB

      • memory/4440-164-0x0000000002590000-0x00000000025A2000-memory.dmp
        Filesize

        72KB

      • memory/4440-162-0x0000000002590000-0x00000000025A2000-memory.dmp
        Filesize

        72KB

      • memory/4440-152-0x0000000002590000-0x00000000025A2000-memory.dmp
        Filesize

        72KB

      • memory/4440-151-0x0000000002590000-0x00000000025A2000-memory.dmp
        Filesize

        72KB

      • memory/4440-150-0x0000000005050000-0x00000000055F4000-memory.dmp
        Filesize

        5.6MB

      • memory/4440-149-0x0000000005040000-0x0000000005050000-memory.dmp
        Filesize

        64KB

      • memory/4440-148-0x0000000000710000-0x000000000073D000-memory.dmp
        Filesize

        180KB