Analysis

  • max time kernel
    98s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 04:17

General

  • Target

    a19c5277a013fc8839289f89c8dc4ed05d3b4652b4c92782d238ad166924d19b.exe

  • Size

    689KB

  • MD5

    bbed096b238651c1f95f2abe09b02b66

  • SHA1

    1e81cce81e952bd42b743c80b3b4f872133a69a8

  • SHA256

    a19c5277a013fc8839289f89c8dc4ed05d3b4652b4c92782d238ad166924d19b

  • SHA512

    ea3053429b8c9dbaf061896435672c6c3e047af76f7d9aaf33519fff907990cdb422cd595a9a011359eb42810ee817c60c89adca74136fd2e69efbaaf915dc97

  • SSDEEP

    12288:ZMrSy90AcwpRbi5QDyOCwevemlMe5z3muMys65hLuGy4iwDodfR/0bj6WBrFv7Fi:3yfcoAvwevemlMeRFNzfaDfde6WBrFhi

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a19c5277a013fc8839289f89c8dc4ed05d3b4652b4c92782d238ad166924d19b.exe
    "C:\Users\Admin\AppData\Local\Temp\a19c5277a013fc8839289f89c8dc4ed05d3b4652b4c92782d238ad166924d19b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un441927.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un441927.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3360
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6003.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6003.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4424
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4424 -s 1080
          4⤵
          • Program crash
          PID:1744
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9897.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9897.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2652
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 972
          4⤵
          • Program crash
          PID:2024
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si133615.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si133615.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1216
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4424 -ip 4424
    1⤵
      PID:1900
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2652 -ip 2652
      1⤵
        PID:1432

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si133615.exe
        Filesize

        175KB

        MD5

        e6a7b8fa30fb96981ab78b62e9f039c3

        SHA1

        25a1d2bba98cf5b4e32e493bec13c881ddfbe963

        SHA256

        4f774d2409b24d22ecca3b5919b63b9956d09beb4a577a442b1cb883e62c0c5a

        SHA512

        d07fba212decfa49bb01044698edf1d020a7c40db83fd173d5d4ae31f5eeafe465c59118d2346020b5b4b9e2cda8f1bd810e3efded520dcf251b7e22083c9050

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si133615.exe
        Filesize

        175KB

        MD5

        e6a7b8fa30fb96981ab78b62e9f039c3

        SHA1

        25a1d2bba98cf5b4e32e493bec13c881ddfbe963

        SHA256

        4f774d2409b24d22ecca3b5919b63b9956d09beb4a577a442b1cb883e62c0c5a

        SHA512

        d07fba212decfa49bb01044698edf1d020a7c40db83fd173d5d4ae31f5eeafe465c59118d2346020b5b4b9e2cda8f1bd810e3efded520dcf251b7e22083c9050

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un441927.exe
        Filesize

        548KB

        MD5

        6b2add57708e1991b551c0e95a04d5ea

        SHA1

        e15f342ee7a08a43d821a4116d9bae5a8f52abe7

        SHA256

        eda1a3aad7ae9ec461b74b9b9aed8300c7e10807fffe4dcd8c13ff65278a3131

        SHA512

        56ec107507e818efea1b8ad6dd051a4856b476a30898600420713f20652862b9b21c5d0fcdf9cbf250ab6d14beae2cf4d04c6715aebf5d9cfbc3a57177fbec8d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un441927.exe
        Filesize

        548KB

        MD5

        6b2add57708e1991b551c0e95a04d5ea

        SHA1

        e15f342ee7a08a43d821a4116d9bae5a8f52abe7

        SHA256

        eda1a3aad7ae9ec461b74b9b9aed8300c7e10807fffe4dcd8c13ff65278a3131

        SHA512

        56ec107507e818efea1b8ad6dd051a4856b476a30898600420713f20652862b9b21c5d0fcdf9cbf250ab6d14beae2cf4d04c6715aebf5d9cfbc3a57177fbec8d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6003.exe
        Filesize

        291KB

        MD5

        78b202681045343a3666586d5e644979

        SHA1

        d98d119edb2d028f7f607e0f8c49b09676990f3b

        SHA256

        5bece8d9a119cefe55abcbf7eec2f746ce18255e7d0e1dd3126da3fa09efe705

        SHA512

        fa4fedbb1b5229976c70a5e436de0dae08dedc177bf885f80cf50d28b8720b70bd0e22b77b14159a849cfd81b959c489786e7fd5b980c11fd1a3a14de0d80581

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6003.exe
        Filesize

        291KB

        MD5

        78b202681045343a3666586d5e644979

        SHA1

        d98d119edb2d028f7f607e0f8c49b09676990f3b

        SHA256

        5bece8d9a119cefe55abcbf7eec2f746ce18255e7d0e1dd3126da3fa09efe705

        SHA512

        fa4fedbb1b5229976c70a5e436de0dae08dedc177bf885f80cf50d28b8720b70bd0e22b77b14159a849cfd81b959c489786e7fd5b980c11fd1a3a14de0d80581

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9897.exe
        Filesize

        345KB

        MD5

        f543a7246bc0065a215714f29f2d16d4

        SHA1

        831ba5c46e7fa832b0fa0ceec22c812f93a49bb6

        SHA256

        03f181fb6dadffddb5fee6960c1a7cd7ba053e67392b922f089c9482131d5b5c

        SHA512

        d9bef54e1dfbde0568c267613542af2cd1da0e1ac3689dd17a5c5ca88ecc044de366d0f8ad65691bb42ac9e23dc84897a73135bfb06a18b223644f3d1e4752f4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9897.exe
        Filesize

        345KB

        MD5

        f543a7246bc0065a215714f29f2d16d4

        SHA1

        831ba5c46e7fa832b0fa0ceec22c812f93a49bb6

        SHA256

        03f181fb6dadffddb5fee6960c1a7cd7ba053e67392b922f089c9482131d5b5c

        SHA512

        d9bef54e1dfbde0568c267613542af2cd1da0e1ac3689dd17a5c5ca88ecc044de366d0f8ad65691bb42ac9e23dc84897a73135bfb06a18b223644f3d1e4752f4

      • memory/1216-1121-0x0000000005C10000-0x0000000005C20000-memory.dmp
        Filesize

        64KB

      • memory/1216-1120-0x0000000000FB0000-0x0000000000FE2000-memory.dmp
        Filesize

        200KB

      • memory/2652-486-0x00000000037F0000-0x0000000003800000-memory.dmp
        Filesize

        64KB

      • memory/2652-1101-0x0000000006E10000-0x0000000006F1A000-memory.dmp
        Filesize

        1.0MB

      • memory/2652-1114-0x0000000008090000-0x00000000085BC000-memory.dmp
        Filesize

        5.2MB

      • memory/2652-1113-0x0000000007EC0000-0x0000000008082000-memory.dmp
        Filesize

        1.8MB

      • memory/2652-1112-0x0000000007CD0000-0x0000000007D20000-memory.dmp
        Filesize

        320KB

      • memory/2652-1111-0x0000000007C50000-0x0000000007CC6000-memory.dmp
        Filesize

        472KB

      • memory/2652-1110-0x00000000037F0000-0x0000000003800000-memory.dmp
        Filesize

        64KB

      • memory/2652-1109-0x00000000037F0000-0x0000000003800000-memory.dmp
        Filesize

        64KB

      • memory/2652-1108-0x00000000037F0000-0x0000000003800000-memory.dmp
        Filesize

        64KB

      • memory/2652-1106-0x0000000007930000-0x00000000079C2000-memory.dmp
        Filesize

        584KB

      • memory/2652-1105-0x0000000007260000-0x00000000072C6000-memory.dmp
        Filesize

        408KB

      • memory/2652-1104-0x00000000037F0000-0x0000000003800000-memory.dmp
        Filesize

        64KB

      • memory/2652-1103-0x0000000006F70000-0x0000000006FAC000-memory.dmp
        Filesize

        240KB

      • memory/2652-1102-0x0000000006F50000-0x0000000006F62000-memory.dmp
        Filesize

        72KB

      • memory/2652-1100-0x00000000067A0000-0x0000000006DB8000-memory.dmp
        Filesize

        6.1MB

      • memory/2652-484-0x00000000037F0000-0x0000000003800000-memory.dmp
        Filesize

        64KB

      • memory/2652-483-0x0000000001B30000-0x0000000001B7B000-memory.dmp
        Filesize

        300KB

      • memory/2652-224-0x0000000003B00000-0x0000000003B3F000-memory.dmp
        Filesize

        252KB

      • memory/2652-222-0x0000000003B00000-0x0000000003B3F000-memory.dmp
        Filesize

        252KB

      • memory/2652-220-0x0000000003B00000-0x0000000003B3F000-memory.dmp
        Filesize

        252KB

      • memory/2652-218-0x0000000003B00000-0x0000000003B3F000-memory.dmp
        Filesize

        252KB

      • memory/2652-192-0x0000000003B00000-0x0000000003B3F000-memory.dmp
        Filesize

        252KB

      • memory/2652-191-0x0000000003B00000-0x0000000003B3F000-memory.dmp
        Filesize

        252KB

      • memory/2652-194-0x0000000003B00000-0x0000000003B3F000-memory.dmp
        Filesize

        252KB

      • memory/2652-196-0x0000000003B00000-0x0000000003B3F000-memory.dmp
        Filesize

        252KB

      • memory/2652-198-0x0000000003B00000-0x0000000003B3F000-memory.dmp
        Filesize

        252KB

      • memory/2652-200-0x0000000003B00000-0x0000000003B3F000-memory.dmp
        Filesize

        252KB

      • memory/2652-202-0x0000000003B00000-0x0000000003B3F000-memory.dmp
        Filesize

        252KB

      • memory/2652-204-0x0000000003B00000-0x0000000003B3F000-memory.dmp
        Filesize

        252KB

      • memory/2652-206-0x0000000003B00000-0x0000000003B3F000-memory.dmp
        Filesize

        252KB

      • memory/2652-208-0x0000000003B00000-0x0000000003B3F000-memory.dmp
        Filesize

        252KB

      • memory/2652-210-0x0000000003B00000-0x0000000003B3F000-memory.dmp
        Filesize

        252KB

      • memory/2652-212-0x0000000003B00000-0x0000000003B3F000-memory.dmp
        Filesize

        252KB

      • memory/2652-214-0x0000000003B00000-0x0000000003B3F000-memory.dmp
        Filesize

        252KB

      • memory/2652-216-0x0000000003B00000-0x0000000003B3F000-memory.dmp
        Filesize

        252KB

      • memory/4424-175-0x00000000023E0000-0x00000000023F2000-memory.dmp
        Filesize

        72KB

      • memory/4424-183-0x0000000004F30000-0x0000000004F40000-memory.dmp
        Filesize

        64KB

      • memory/4424-153-0x00000000023E0000-0x00000000023F2000-memory.dmp
        Filesize

        72KB

      • memory/4424-185-0x0000000004F30000-0x0000000004F40000-memory.dmp
        Filesize

        64KB

      • memory/4424-173-0x00000000023E0000-0x00000000023F2000-memory.dmp
        Filesize

        72KB

      • memory/4424-182-0x0000000000400000-0x000000000070B000-memory.dmp
        Filesize

        3.0MB

      • memory/4424-152-0x00000000023E0000-0x00000000023F2000-memory.dmp
        Filesize

        72KB

      • memory/4424-171-0x00000000023E0000-0x00000000023F2000-memory.dmp
        Filesize

        72KB

      • memory/4424-157-0x00000000023E0000-0x00000000023F2000-memory.dmp
        Filesize

        72KB

      • memory/4424-180-0x0000000004F30000-0x0000000004F40000-memory.dmp
        Filesize

        64KB

      • memory/4424-179-0x00000000023E0000-0x00000000023F2000-memory.dmp
        Filesize

        72KB

      • memory/4424-177-0x00000000023E0000-0x00000000023F2000-memory.dmp
        Filesize

        72KB

      • memory/4424-186-0x0000000000400000-0x000000000070B000-memory.dmp
        Filesize

        3.0MB

      • memory/4424-155-0x00000000023E0000-0x00000000023F2000-memory.dmp
        Filesize

        72KB

      • memory/4424-181-0x0000000004F30000-0x0000000004F40000-memory.dmp
        Filesize

        64KB

      • memory/4424-169-0x00000000023E0000-0x00000000023F2000-memory.dmp
        Filesize

        72KB

      • memory/4424-167-0x00000000023E0000-0x00000000023F2000-memory.dmp
        Filesize

        72KB

      • memory/4424-165-0x00000000023E0000-0x00000000023F2000-memory.dmp
        Filesize

        72KB

      • memory/4424-163-0x00000000023E0000-0x00000000023F2000-memory.dmp
        Filesize

        72KB

      • memory/4424-161-0x00000000023E0000-0x00000000023F2000-memory.dmp
        Filesize

        72KB

      • memory/4424-159-0x00000000023E0000-0x00000000023F2000-memory.dmp
        Filesize

        72KB

      • memory/4424-151-0x0000000004F40000-0x00000000054E4000-memory.dmp
        Filesize

        5.6MB

      • memory/4424-150-0x0000000004F30000-0x0000000004F40000-memory.dmp
        Filesize

        64KB

      • memory/4424-149-0x0000000004F30000-0x0000000004F40000-memory.dmp
        Filesize

        64KB

      • memory/4424-148-0x0000000000710000-0x000000000073D000-memory.dmp
        Filesize

        180KB