Analysis

  • max time kernel
    88s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 04:14

General

  • Target

    505c59d1cfa12c54ddf7f8a9111e7d1eedae34f04cf966274fdcb43a1bb0a84f.exe

  • Size

    689KB

  • MD5

    91d41e0c880bed94fd4d7fb5eea6ecd0

  • SHA1

    cc70d5e6436e2be9bf424ced0e426a614f04cf3f

  • SHA256

    505c59d1cfa12c54ddf7f8a9111e7d1eedae34f04cf966274fdcb43a1bb0a84f

  • SHA512

    39813d26b4f012d40aff5e9c407dcd3c5f9947e699c34c5ee3fb55038c2814d2a5a5f83b46379aec0c3d87ca90c2b7781f2d6c7a78f1ce82a6bc2c4e88337937

  • SSDEEP

    12288:8MrEy909Y/vEswR2fnLZbGwMvUpyF65hLuwBlihKxWl5LvbFu1figf4KxSOv7fqX:Iy6YEjRaLZbGwMcgYfaaiEIRu1agmOvg

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\505c59d1cfa12c54ddf7f8a9111e7d1eedae34f04cf966274fdcb43a1bb0a84f.exe
    "C:\Users\Admin\AppData\Local\Temp\505c59d1cfa12c54ddf7f8a9111e7d1eedae34f04cf966274fdcb43a1bb0a84f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un797306.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un797306.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2808
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5301.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5301.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1292
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 1040
          4⤵
          • Program crash
          PID:5076
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8286.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8286.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4948
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4948 -s 1844
          4⤵
          • Program crash
          PID:1372
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si406962.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si406962.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2040
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1292 -ip 1292
    1⤵
      PID:5068
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4948 -ip 4948
      1⤵
        PID:1068

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si406962.exe
        Filesize

        175KB

        MD5

        03b1a088082820999116e38c20fba500

        SHA1

        f05021e90d08d8a9f71bdfdf27f3da17c3d865bc

        SHA256

        db94ecd7fa2a3c5c2410c8454b5d31b55c005f695fb7c2e32fe4d47270a76819

        SHA512

        e6905ee8dfd823a7dec46d75986da2227d8df3ad20c08f5eb7a0e78bc95c09a887a50843c0051b9264eec9ccc63ee52fe55c10518448e310c93734146f7b96ce

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si406962.exe
        Filesize

        175KB

        MD5

        03b1a088082820999116e38c20fba500

        SHA1

        f05021e90d08d8a9f71bdfdf27f3da17c3d865bc

        SHA256

        db94ecd7fa2a3c5c2410c8454b5d31b55c005f695fb7c2e32fe4d47270a76819

        SHA512

        e6905ee8dfd823a7dec46d75986da2227d8df3ad20c08f5eb7a0e78bc95c09a887a50843c0051b9264eec9ccc63ee52fe55c10518448e310c93734146f7b96ce

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un797306.exe
        Filesize

        548KB

        MD5

        7240cd2bbc5c21ab3b6da743c71cc86e

        SHA1

        08c048b1fb828708517e656993924dee49de49d8

        SHA256

        c3cbe991e338d0dafb705cb9c06c8084bf848acfa3027b44743ee54dd101841f

        SHA512

        68c9cfe38beaf7f88f6a46e3034ca789a19e8caed19b72fad435d4fdb5ced2e99db052ff33605b10274707afee58f334a817083bd08c10f854f13143a4164adf

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un797306.exe
        Filesize

        548KB

        MD5

        7240cd2bbc5c21ab3b6da743c71cc86e

        SHA1

        08c048b1fb828708517e656993924dee49de49d8

        SHA256

        c3cbe991e338d0dafb705cb9c06c8084bf848acfa3027b44743ee54dd101841f

        SHA512

        68c9cfe38beaf7f88f6a46e3034ca789a19e8caed19b72fad435d4fdb5ced2e99db052ff33605b10274707afee58f334a817083bd08c10f854f13143a4164adf

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5301.exe
        Filesize

        291KB

        MD5

        fa69d50b715610d9dc6daa0436863627

        SHA1

        89a66b31521144429f061faf868425e71f13701e

        SHA256

        7e7331229234bbab6b726273a12baf5d509a96ab9354e95fea7191430808be12

        SHA512

        f17d96f7c3f168695d7dd26c23893593e67c863e80c8783180b95886f0787457354baa9f67d09c41efebc43ff55cae9158e86160a8874a3367fd7dee2bb60d76

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5301.exe
        Filesize

        291KB

        MD5

        fa69d50b715610d9dc6daa0436863627

        SHA1

        89a66b31521144429f061faf868425e71f13701e

        SHA256

        7e7331229234bbab6b726273a12baf5d509a96ab9354e95fea7191430808be12

        SHA512

        f17d96f7c3f168695d7dd26c23893593e67c863e80c8783180b95886f0787457354baa9f67d09c41efebc43ff55cae9158e86160a8874a3367fd7dee2bb60d76

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8286.exe
        Filesize

        345KB

        MD5

        c14188251e89434b2fb51b483623a518

        SHA1

        541e4939a43ba661de35cba04bf2e29d53628059

        SHA256

        e91851aea3c21b44787b9a7c6f11278b7726108c8bf256d1f38d5b49cbdc847d

        SHA512

        796397b366aaa5346b3be853b675c12a32a4d72c5d5209b49c424f217ee212241ce75a40ce5b0bbbd571902ad7ea1d714f074e47db583c397149cac4c2139a41

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8286.exe
        Filesize

        345KB

        MD5

        c14188251e89434b2fb51b483623a518

        SHA1

        541e4939a43ba661de35cba04bf2e29d53628059

        SHA256

        e91851aea3c21b44787b9a7c6f11278b7726108c8bf256d1f38d5b49cbdc847d

        SHA512

        796397b366aaa5346b3be853b675c12a32a4d72c5d5209b49c424f217ee212241ce75a40ce5b0bbbd571902ad7ea1d714f074e47db583c397149cac4c2139a41

      • memory/1292-148-0x0000000004C60000-0x0000000005204000-memory.dmp
        Filesize

        5.6MB

      • memory/1292-149-0x00000000020F0000-0x000000000211D000-memory.dmp
        Filesize

        180KB

      • memory/1292-150-0x0000000002590000-0x00000000025A0000-memory.dmp
        Filesize

        64KB

      • memory/1292-151-0x0000000002590000-0x00000000025A0000-memory.dmp
        Filesize

        64KB

      • memory/1292-152-0x0000000002590000-0x00000000025A0000-memory.dmp
        Filesize

        64KB

      • memory/1292-153-0x0000000002750000-0x0000000002762000-memory.dmp
        Filesize

        72KB

      • memory/1292-154-0x0000000002750000-0x0000000002762000-memory.dmp
        Filesize

        72KB

      • memory/1292-156-0x0000000002750000-0x0000000002762000-memory.dmp
        Filesize

        72KB

      • memory/1292-158-0x0000000002750000-0x0000000002762000-memory.dmp
        Filesize

        72KB

      • memory/1292-160-0x0000000002750000-0x0000000002762000-memory.dmp
        Filesize

        72KB

      • memory/1292-162-0x0000000002750000-0x0000000002762000-memory.dmp
        Filesize

        72KB

      • memory/1292-164-0x0000000002750000-0x0000000002762000-memory.dmp
        Filesize

        72KB

      • memory/1292-166-0x0000000002750000-0x0000000002762000-memory.dmp
        Filesize

        72KB

      • memory/1292-168-0x0000000002750000-0x0000000002762000-memory.dmp
        Filesize

        72KB

      • memory/1292-170-0x0000000002750000-0x0000000002762000-memory.dmp
        Filesize

        72KB

      • memory/1292-172-0x0000000002750000-0x0000000002762000-memory.dmp
        Filesize

        72KB

      • memory/1292-174-0x0000000002750000-0x0000000002762000-memory.dmp
        Filesize

        72KB

      • memory/1292-176-0x0000000002750000-0x0000000002762000-memory.dmp
        Filesize

        72KB

      • memory/1292-178-0x0000000002750000-0x0000000002762000-memory.dmp
        Filesize

        72KB

      • memory/1292-180-0x0000000002750000-0x0000000002762000-memory.dmp
        Filesize

        72KB

      • memory/1292-181-0x0000000000400000-0x000000000070B000-memory.dmp
        Filesize

        3.0MB

      • memory/1292-182-0x0000000002590000-0x00000000025A0000-memory.dmp
        Filesize

        64KB

      • memory/1292-183-0x0000000002590000-0x00000000025A0000-memory.dmp
        Filesize

        64KB

      • memory/1292-185-0x0000000000400000-0x000000000070B000-memory.dmp
        Filesize

        3.0MB

      • memory/2040-1120-0x00000000009B0000-0x00000000009E2000-memory.dmp
        Filesize

        200KB

      • memory/2040-1121-0x0000000005260000-0x0000000005270000-memory.dmp
        Filesize

        64KB

      • memory/4948-191-0x0000000003AB0000-0x0000000003AC0000-memory.dmp
        Filesize

        64KB

      • memory/4948-222-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4948-193-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4948-196-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4948-194-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4948-198-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4948-200-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4948-202-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4948-204-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4948-206-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4948-208-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4948-210-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4948-212-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4948-214-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4948-216-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4948-218-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4948-220-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4948-192-0x0000000003AB0000-0x0000000003AC0000-memory.dmp
        Filesize

        64KB

      • memory/4948-224-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4948-226-0x0000000006590000-0x00000000065CF000-memory.dmp
        Filesize

        252KB

      • memory/4948-1099-0x0000000006630000-0x0000000006C48000-memory.dmp
        Filesize

        6.1MB

      • memory/4948-1100-0x0000000006CD0000-0x0000000006DDA000-memory.dmp
        Filesize

        1.0MB

      • memory/4948-1101-0x0000000006E10000-0x0000000006E22000-memory.dmp
        Filesize

        72KB

      • memory/4948-1102-0x0000000006E30000-0x0000000006E6C000-memory.dmp
        Filesize

        240KB

      • memory/4948-1103-0x0000000003AB0000-0x0000000003AC0000-memory.dmp
        Filesize

        64KB

      • memory/4948-1105-0x0000000007120000-0x00000000071B2000-memory.dmp
        Filesize

        584KB

      • memory/4948-1106-0x00000000071C0000-0x0000000007226000-memory.dmp
        Filesize

        408KB

      • memory/4948-1107-0x0000000003AB0000-0x0000000003AC0000-memory.dmp
        Filesize

        64KB

      • memory/4948-1108-0x0000000003AB0000-0x0000000003AC0000-memory.dmp
        Filesize

        64KB

      • memory/4948-1109-0x0000000003AB0000-0x0000000003AC0000-memory.dmp
        Filesize

        64KB

      • memory/4948-1110-0x00000000078E0000-0x0000000007AA2000-memory.dmp
        Filesize

        1.8MB

      • memory/4948-1111-0x0000000007AC0000-0x0000000007FEC000-memory.dmp
        Filesize

        5.2MB

      • memory/4948-190-0x00000000033F0000-0x000000000343B000-memory.dmp
        Filesize

        300KB

      • memory/4948-1112-0x0000000008390000-0x0000000008406000-memory.dmp
        Filesize

        472KB

      • memory/4948-1113-0x0000000008410000-0x0000000008460000-memory.dmp
        Filesize

        320KB

      • memory/4948-1114-0x0000000003AB0000-0x0000000003AC0000-memory.dmp
        Filesize

        64KB