Analysis

  • max time kernel
    60s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 05:25

General

  • Target

    3877a868b539b05031b6e6ea5fbce2310613ca5e6fa6f70c6e5e17ffca72bab5.exe

  • Size

    690KB

  • MD5

    6c8191af94e3a7bed7547485c3e4a6ae

  • SHA1

    e256673c39db83176471760c3048523367309238

  • SHA256

    3877a868b539b05031b6e6ea5fbce2310613ca5e6fa6f70c6e5e17ffca72bab5

  • SHA512

    26fd48c64cc5f26fecd296539b275337e3f689048f9037114b0c5a7de746552a26dfff04ee73515d6a47675a56aa10867a210b0391d63e7a9aecb78a783b9065

  • SSDEEP

    12288:pMrSy906uyVRrVAPpZLdyY65hLuyIK39uSl6hPbavhFR4figF//gO8D:LyD7rSUXfayIKNuE6ZbazR4agGOi

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3877a868b539b05031b6e6ea5fbce2310613ca5e6fa6f70c6e5e17ffca72bab5.exe
    "C:\Users\Admin\AppData\Local\Temp\3877a868b539b05031b6e6ea5fbce2310613ca5e6fa6f70c6e5e17ffca72bab5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un527674.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un527674.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4100
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4622.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4622.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3228
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3228 -s 1028
          4⤵
          • Program crash
          PID:4856
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2373.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2373.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2080
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 1936
          4⤵
          • Program crash
          PID:3684
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si127032.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si127032.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1916
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3228 -ip 3228
    1⤵
      PID:4820
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2080 -ip 2080
      1⤵
        PID:3672

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si127032.exe

        Filesize

        175KB

        MD5

        c2fbee9873b1d29d0a3fb24b5fed6750

        SHA1

        9310871bff5f8e9c19279f2069ccddad51da6b53

        SHA256

        c3ae1d65d1a04dfb74bddf26175733f2089b55b166819608a365adbb2a58ec2c

        SHA512

        b1bc1ad2168c74621edf327572f9556419ad5778efc693ab581f14c651d8a701a3b07ac29331192ec4f1e8e9a24be2bc64432803b4f322dd599a6ecef71d6dbb

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si127032.exe

        Filesize

        175KB

        MD5

        c2fbee9873b1d29d0a3fb24b5fed6750

        SHA1

        9310871bff5f8e9c19279f2069ccddad51da6b53

        SHA256

        c3ae1d65d1a04dfb74bddf26175733f2089b55b166819608a365adbb2a58ec2c

        SHA512

        b1bc1ad2168c74621edf327572f9556419ad5778efc693ab581f14c651d8a701a3b07ac29331192ec4f1e8e9a24be2bc64432803b4f322dd599a6ecef71d6dbb

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un527674.exe

        Filesize

        548KB

        MD5

        2929e1e15a1d58d1b6a18f054dd04868

        SHA1

        fb278da747b9d11ad79bd105418f9af279756801

        SHA256

        dc96381b0ca1ed33ddd3bae009cd8fe1c36c11bb1830b0b11d1bab7a58419d33

        SHA512

        f10b6f0fc3ae8ee04780d4883dc7a241de49ad4d79f67c55e0401a7c13d80e4fd98ed2f717c1a87eb830b2727c7254a85b87e815265717094088cc59de5911a0

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un527674.exe

        Filesize

        548KB

        MD5

        2929e1e15a1d58d1b6a18f054dd04868

        SHA1

        fb278da747b9d11ad79bd105418f9af279756801

        SHA256

        dc96381b0ca1ed33ddd3bae009cd8fe1c36c11bb1830b0b11d1bab7a58419d33

        SHA512

        f10b6f0fc3ae8ee04780d4883dc7a241de49ad4d79f67c55e0401a7c13d80e4fd98ed2f717c1a87eb830b2727c7254a85b87e815265717094088cc59de5911a0

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4622.exe

        Filesize

        291KB

        MD5

        76ecc22b3359b06091f739cdf17409a9

        SHA1

        f3508ec56967b33f75b14bcfb9b2412ee3a681aa

        SHA256

        fa90808cf2e4594df52d53fa6252490069d46323500e6e1131713376b7b1be91

        SHA512

        206f652b604d5549a332d8ade82a55923ecab3b0831059bdc0064186fc36609822ee900e33dad13a9fbbdfd75b3022ca1254022b1318a80ef6532105269b0e70

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4622.exe

        Filesize

        291KB

        MD5

        76ecc22b3359b06091f739cdf17409a9

        SHA1

        f3508ec56967b33f75b14bcfb9b2412ee3a681aa

        SHA256

        fa90808cf2e4594df52d53fa6252490069d46323500e6e1131713376b7b1be91

        SHA512

        206f652b604d5549a332d8ade82a55923ecab3b0831059bdc0064186fc36609822ee900e33dad13a9fbbdfd75b3022ca1254022b1318a80ef6532105269b0e70

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2373.exe

        Filesize

        345KB

        MD5

        e6de5a0d17722031c175a2d51d64f1ee

        SHA1

        9ab91093a0d1b199676fa301d9a20ff90bb2c716

        SHA256

        1d314d3a89a85eec34cff3eca9b9101fa13c887b592dfae519f447e285723b5f

        SHA512

        d87873658e4caffdcc03bf96690683d726f6a1458082c518c51c6e1455db40572a61ac6a15f2f8b6bde373ddd08bfcc4f95e5f258e88524d981e4fbe69a9f7de

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2373.exe

        Filesize

        345KB

        MD5

        e6de5a0d17722031c175a2d51d64f1ee

        SHA1

        9ab91093a0d1b199676fa301d9a20ff90bb2c716

        SHA256

        1d314d3a89a85eec34cff3eca9b9101fa13c887b592dfae519f447e285723b5f

        SHA512

        d87873658e4caffdcc03bf96690683d726f6a1458082c518c51c6e1455db40572a61ac6a15f2f8b6bde373ddd08bfcc4f95e5f258e88524d981e4fbe69a9f7de

      • memory/1916-1122-0x0000000005920000-0x0000000005930000-memory.dmp

        Filesize

        64KB

      • memory/1916-1121-0x0000000000D30000-0x0000000000D62000-memory.dmp

        Filesize

        200KB

      • memory/2080-227-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2080-1104-0x00000000060A0000-0x00000000060B0000-memory.dmp

        Filesize

        64KB

      • memory/2080-1115-0x00000000060A0000-0x00000000060B0000-memory.dmp

        Filesize

        64KB

      • memory/2080-1114-0x0000000007F30000-0x000000000845C000-memory.dmp

        Filesize

        5.2MB

      • memory/2080-1113-0x0000000007D60000-0x0000000007F22000-memory.dmp

        Filesize

        1.8MB

      • memory/2080-1112-0x0000000007B90000-0x0000000007BE0000-memory.dmp

        Filesize

        320KB

      • memory/2080-1111-0x0000000007B00000-0x0000000007B76000-memory.dmp

        Filesize

        472KB

      • memory/2080-1110-0x00000000060A0000-0x00000000060B0000-memory.dmp

        Filesize

        64KB

      • memory/2080-1109-0x00000000060A0000-0x00000000060B0000-memory.dmp

        Filesize

        64KB

      • memory/2080-1108-0x00000000060A0000-0x00000000060B0000-memory.dmp

        Filesize

        64KB

      • memory/2080-1106-0x0000000007930000-0x00000000079C2000-memory.dmp

        Filesize

        584KB

      • memory/2080-1105-0x0000000007260000-0x00000000072C6000-memory.dmp

        Filesize

        408KB

      • memory/2080-1103-0x0000000006F70000-0x0000000006FAC000-memory.dmp

        Filesize

        240KB

      • memory/2080-1102-0x0000000006F50000-0x0000000006F62000-memory.dmp

        Filesize

        72KB

      • memory/2080-1101-0x0000000006E10000-0x0000000006F1A000-memory.dmp

        Filesize

        1.0MB

      • memory/2080-1100-0x0000000006770000-0x0000000006D88000-memory.dmp

        Filesize

        6.1MB

      • memory/2080-225-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2080-223-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2080-221-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2080-219-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2080-190-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2080-193-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2080-195-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2080-191-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2080-197-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2080-199-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2080-201-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2080-203-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2080-205-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2080-208-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2080-210-0x00000000060A0000-0x00000000060B0000-memory.dmp

        Filesize

        64KB

      • memory/2080-212-0x00000000060A0000-0x00000000060B0000-memory.dmp

        Filesize

        64KB

      • memory/2080-213-0x00000000060A0000-0x00000000060B0000-memory.dmp

        Filesize

        64KB

      • memory/2080-215-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2080-211-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/2080-207-0x0000000001B00000-0x0000000001B4B000-memory.dmp

        Filesize

        300KB

      • memory/2080-217-0x0000000006010000-0x000000000604F000-memory.dmp

        Filesize

        252KB

      • memory/3228-173-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/3228-150-0x0000000004D90000-0x0000000004DA0000-memory.dmp

        Filesize

        64KB

      • memory/3228-185-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/3228-183-0x0000000004D90000-0x0000000004DA0000-memory.dmp

        Filesize

        64KB

      • memory/3228-152-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/3228-182-0x0000000004D90000-0x0000000004DA0000-memory.dmp

        Filesize

        64KB

      • memory/3228-181-0x0000000004D90000-0x0000000004DA0000-memory.dmp

        Filesize

        64KB

      • memory/3228-180-0x0000000000400000-0x000000000070B000-memory.dmp

        Filesize

        3.0MB

      • memory/3228-179-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/3228-157-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/3228-148-0x0000000004DA0000-0x0000000005344000-memory.dmp

        Filesize

        5.6MB

      • memory/3228-155-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/3228-169-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/3228-171-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/3228-153-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/3228-167-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/3228-165-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/3228-161-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/3228-163-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/3228-159-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/3228-151-0x0000000004D90000-0x0000000004DA0000-memory.dmp

        Filesize

        64KB

      • memory/3228-175-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/3228-149-0x00000000007F0000-0x000000000081D000-memory.dmp

        Filesize

        180KB

      • memory/3228-177-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB