Analysis

  • max time kernel
    106s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 04:05

General

  • Target

    aaca9a1f33d439155f0b2367b57a75ea6f1d013147414ba77c7ccc377cc68a5d.exe

  • Size

    689KB

  • MD5

    3d147c085cfc7a2e022d1e0411010035

  • SHA1

    65ce20985fdcfff0f98dec52c3bf391474d6a6e1

  • SHA256

    aaca9a1f33d439155f0b2367b57a75ea6f1d013147414ba77c7ccc377cc68a5d

  • SHA512

    e3a37d5f9767e147182fbca860f2c89d3cee90b8bf195dfab4f3136e06989d5078d4980ad8e1023998b04d53406ae5b4a8dbf972e9a1b6e58952d5eb165720ef

  • SSDEEP

    12288:+MrMy907rgKwSLAd8uYueZ0Mx19GWukeUVQRAxZYjmJovGFexfigFK4J/O1Ne45J:myjaAidrzD3gmJoyexagMV5rAK

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aaca9a1f33d439155f0b2367b57a75ea6f1d013147414ba77c7ccc377cc68a5d.exe
    "C:\Users\Admin\AppData\Local\Temp\aaca9a1f33d439155f0b2367b57a75ea6f1d013147414ba77c7ccc377cc68a5d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4484
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un703629.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un703629.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4652
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2331.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2331.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:428
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 428 -s 1080
          4⤵
          • Program crash
          PID:4432
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4375.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4375.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2464
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2464 -s 1340
          4⤵
          • Program crash
          PID:5028
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si523911.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si523911.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4872
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 428 -ip 428
    1⤵
      PID:820
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2464 -ip 2464
      1⤵
        PID:1268

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si523911.exe
        Filesize

        175KB

        MD5

        628c5a57c643e30fc1f635a4f037faf8

        SHA1

        af8855fa2ec1bbfe5d28f435999979150faee674

        SHA256

        2cb454ca01884ed200ee06dddc44efefba1f12297ac04ea9cf45bc0bba7a7cea

        SHA512

        51b57d24a0750f4d5ce23648cb72ba4429bb47d8d5a6cdce2f16b37fd3fd969e11888825069d35f37e44c71ca94e8ad098e89d1b7d2b3c290a9f711e46a03be6

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si523911.exe
        Filesize

        175KB

        MD5

        628c5a57c643e30fc1f635a4f037faf8

        SHA1

        af8855fa2ec1bbfe5d28f435999979150faee674

        SHA256

        2cb454ca01884ed200ee06dddc44efefba1f12297ac04ea9cf45bc0bba7a7cea

        SHA512

        51b57d24a0750f4d5ce23648cb72ba4429bb47d8d5a6cdce2f16b37fd3fd969e11888825069d35f37e44c71ca94e8ad098e89d1b7d2b3c290a9f711e46a03be6

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un703629.exe
        Filesize

        547KB

        MD5

        d1bed3b809b9af68eb234dde01bd5a9e

        SHA1

        107de6e0e887db95d3b01c502ba788446aa632a6

        SHA256

        870bbf0adc78fffcd66597a2f80c79301398e74d3831e9372d7346a8bd7d609f

        SHA512

        717b67c02d21145c612678ad70ffd335a8bf07459179f288b90f68be87a2a00bbd4c8eebaccae4a5df7d4186dc55b56644d882706a4ba9079abaf5b1116c8cd1

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un703629.exe
        Filesize

        547KB

        MD5

        d1bed3b809b9af68eb234dde01bd5a9e

        SHA1

        107de6e0e887db95d3b01c502ba788446aa632a6

        SHA256

        870bbf0adc78fffcd66597a2f80c79301398e74d3831e9372d7346a8bd7d609f

        SHA512

        717b67c02d21145c612678ad70ffd335a8bf07459179f288b90f68be87a2a00bbd4c8eebaccae4a5df7d4186dc55b56644d882706a4ba9079abaf5b1116c8cd1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2331.exe
        Filesize

        291KB

        MD5

        e967db616c139d649676d47dd9eeccb5

        SHA1

        378d110eb64926ba398e76aee269b307ce73e2bd

        SHA256

        3068b1892cb95b8bc30d49d86723706ed50ddde7ae6c90652cf0f2b23f79f65f

        SHA512

        a86cf938d77216b30c1494a901d51ccf50cd2f0c875a91fa8392858e97e1c29fe24e17dc663fedcc5e767958e45a7834ab5dc04ee712b8554dd97c4819148296

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2331.exe
        Filesize

        291KB

        MD5

        e967db616c139d649676d47dd9eeccb5

        SHA1

        378d110eb64926ba398e76aee269b307ce73e2bd

        SHA256

        3068b1892cb95b8bc30d49d86723706ed50ddde7ae6c90652cf0f2b23f79f65f

        SHA512

        a86cf938d77216b30c1494a901d51ccf50cd2f0c875a91fa8392858e97e1c29fe24e17dc663fedcc5e767958e45a7834ab5dc04ee712b8554dd97c4819148296

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4375.exe
        Filesize

        345KB

        MD5

        fed6b068c35f66c6be35190afa5550ec

        SHA1

        68d2abd37a83ec4cbcc99d857b3546959a4833c8

        SHA256

        bd9a19d034606e0b9353795669b576a18476bf1c01dfebd17d2c9d72ffa69148

        SHA512

        caa9c0b9099cbb971f3f85f59c5feaabcfda3bf1ae44d7d40a8164a64ff2b672f6cc4f8e99339dfe93d6172c4e1c95051255b8b583d9c271342f036c82152c6d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4375.exe
        Filesize

        345KB

        MD5

        fed6b068c35f66c6be35190afa5550ec

        SHA1

        68d2abd37a83ec4cbcc99d857b3546959a4833c8

        SHA256

        bd9a19d034606e0b9353795669b576a18476bf1c01dfebd17d2c9d72ffa69148

        SHA512

        caa9c0b9099cbb971f3f85f59c5feaabcfda3bf1ae44d7d40a8164a64ff2b672f6cc4f8e99339dfe93d6172c4e1c95051255b8b583d9c271342f036c82152c6d

      • memory/428-148-0x00000000007E0000-0x000000000080D000-memory.dmp
        Filesize

        180KB

      • memory/428-149-0x0000000004D80000-0x0000000005324000-memory.dmp
        Filesize

        5.6MB

      • memory/428-150-0x0000000002820000-0x0000000002832000-memory.dmp
        Filesize

        72KB

      • memory/428-151-0x0000000002820000-0x0000000002832000-memory.dmp
        Filesize

        72KB

      • memory/428-153-0x0000000002820000-0x0000000002832000-memory.dmp
        Filesize

        72KB

      • memory/428-155-0x0000000002820000-0x0000000002832000-memory.dmp
        Filesize

        72KB

      • memory/428-157-0x0000000002820000-0x0000000002832000-memory.dmp
        Filesize

        72KB

      • memory/428-159-0x0000000002820000-0x0000000002832000-memory.dmp
        Filesize

        72KB

      • memory/428-161-0x0000000002820000-0x0000000002832000-memory.dmp
        Filesize

        72KB

      • memory/428-163-0x0000000002820000-0x0000000002832000-memory.dmp
        Filesize

        72KB

      • memory/428-167-0x0000000002820000-0x0000000002832000-memory.dmp
        Filesize

        72KB

      • memory/428-165-0x0000000002820000-0x0000000002832000-memory.dmp
        Filesize

        72KB

      • memory/428-169-0x0000000002820000-0x0000000002832000-memory.dmp
        Filesize

        72KB

      • memory/428-171-0x0000000002820000-0x0000000002832000-memory.dmp
        Filesize

        72KB

      • memory/428-175-0x0000000002820000-0x0000000002832000-memory.dmp
        Filesize

        72KB

      • memory/428-173-0x0000000002820000-0x0000000002832000-memory.dmp
        Filesize

        72KB

      • memory/428-177-0x0000000002820000-0x0000000002832000-memory.dmp
        Filesize

        72KB

      • memory/428-178-0x0000000002850000-0x0000000002860000-memory.dmp
        Filesize

        64KB

      • memory/428-179-0x0000000002850000-0x0000000002860000-memory.dmp
        Filesize

        64KB

      • memory/428-180-0x0000000002850000-0x0000000002860000-memory.dmp
        Filesize

        64KB

      • memory/428-181-0x0000000000400000-0x000000000070B000-memory.dmp
        Filesize

        3.0MB

      • memory/428-183-0x0000000002850000-0x0000000002860000-memory.dmp
        Filesize

        64KB

      • memory/428-184-0x0000000002850000-0x0000000002860000-memory.dmp
        Filesize

        64KB

      • memory/428-185-0x0000000002850000-0x0000000002860000-memory.dmp
        Filesize

        64KB

      • memory/428-186-0x0000000000400000-0x000000000070B000-memory.dmp
        Filesize

        3.0MB

      • memory/2464-194-0x00000000065B0000-0x00000000065EF000-memory.dmp
        Filesize

        252KB

      • memory/2464-224-0x00000000065B0000-0x00000000065EF000-memory.dmp
        Filesize

        252KB

      • memory/2464-193-0x0000000003A50000-0x0000000003A60000-memory.dmp
        Filesize

        64KB

      • memory/2464-192-0x00000000065B0000-0x00000000065EF000-memory.dmp
        Filesize

        252KB

      • memory/2464-195-0x0000000003A50000-0x0000000003A60000-memory.dmp
        Filesize

        64KB

      • memory/2464-198-0x00000000065B0000-0x00000000065EF000-memory.dmp
        Filesize

        252KB

      • memory/2464-197-0x0000000003A50000-0x0000000003A60000-memory.dmp
        Filesize

        64KB

      • memory/2464-200-0x00000000065B0000-0x00000000065EF000-memory.dmp
        Filesize

        252KB

      • memory/2464-202-0x00000000065B0000-0x00000000065EF000-memory.dmp
        Filesize

        252KB

      • memory/2464-204-0x00000000065B0000-0x00000000065EF000-memory.dmp
        Filesize

        252KB

      • memory/2464-206-0x00000000065B0000-0x00000000065EF000-memory.dmp
        Filesize

        252KB

      • memory/2464-208-0x00000000065B0000-0x00000000065EF000-memory.dmp
        Filesize

        252KB

      • memory/2464-210-0x00000000065B0000-0x00000000065EF000-memory.dmp
        Filesize

        252KB

      • memory/2464-212-0x00000000065B0000-0x00000000065EF000-memory.dmp
        Filesize

        252KB

      • memory/2464-214-0x00000000065B0000-0x00000000065EF000-memory.dmp
        Filesize

        252KB

      • memory/2464-216-0x00000000065B0000-0x00000000065EF000-memory.dmp
        Filesize

        252KB

      • memory/2464-218-0x00000000065B0000-0x00000000065EF000-memory.dmp
        Filesize

        252KB

      • memory/2464-220-0x00000000065B0000-0x00000000065EF000-memory.dmp
        Filesize

        252KB

      • memory/2464-222-0x00000000065B0000-0x00000000065EF000-memory.dmp
        Filesize

        252KB

      • memory/2464-191-0x0000000001B10000-0x0000000001B5B000-memory.dmp
        Filesize

        300KB

      • memory/2464-226-0x00000000065B0000-0x00000000065EF000-memory.dmp
        Filesize

        252KB

      • memory/2464-228-0x00000000065B0000-0x00000000065EF000-memory.dmp
        Filesize

        252KB

      • memory/2464-1101-0x0000000006770000-0x0000000006D88000-memory.dmp
        Filesize

        6.1MB

      • memory/2464-1102-0x0000000006E10000-0x0000000006F1A000-memory.dmp
        Filesize

        1.0MB

      • memory/2464-1103-0x0000000006F50000-0x0000000006F62000-memory.dmp
        Filesize

        72KB

      • memory/2464-1104-0x0000000006F70000-0x0000000006FAC000-memory.dmp
        Filesize

        240KB

      • memory/2464-1105-0x0000000003A50000-0x0000000003A60000-memory.dmp
        Filesize

        64KB

      • memory/2464-1106-0x0000000007260000-0x00000000072F2000-memory.dmp
        Filesize

        584KB

      • memory/2464-1107-0x0000000007300000-0x0000000007366000-memory.dmp
        Filesize

        408KB

      • memory/2464-1109-0x0000000007B40000-0x0000000007BB6000-memory.dmp
        Filesize

        472KB

      • memory/2464-1110-0x0000000007BD0000-0x0000000007C20000-memory.dmp
        Filesize

        320KB

      • memory/2464-1111-0x0000000003A50000-0x0000000003A60000-memory.dmp
        Filesize

        64KB

      • memory/2464-1112-0x0000000003A50000-0x0000000003A60000-memory.dmp
        Filesize

        64KB

      • memory/2464-1113-0x0000000003A50000-0x0000000003A60000-memory.dmp
        Filesize

        64KB

      • memory/2464-1114-0x0000000007D50000-0x0000000007F12000-memory.dmp
        Filesize

        1.8MB

      • memory/2464-1115-0x0000000007F20000-0x000000000844C000-memory.dmp
        Filesize

        5.2MB

      • memory/2464-1116-0x0000000003A50000-0x0000000003A60000-memory.dmp
        Filesize

        64KB

      • memory/4872-1122-0x0000000000EC0000-0x0000000000EF2000-memory.dmp
        Filesize

        200KB

      • memory/4872-1123-0x0000000005800000-0x0000000005810000-memory.dmp
        Filesize

        64KB