Analysis

  • max time kernel
    85s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 05:28

General

  • Target

    9c7b7c3d597dd818b57a953c9ec8b6461d200004682d8df6c98801e94d0f12e8.exe

  • Size

    690KB

  • MD5

    5b0852181178c00945583d79c6f3f64c

  • SHA1

    aab8391993ad4e69b3e327d3cecfbe81dfe70f86

  • SHA256

    9c7b7c3d597dd818b57a953c9ec8b6461d200004682d8df6c98801e94d0f12e8

  • SHA512

    3104996e2b06315f7cacbce11d611d7788381cef86ede6ce19dd2389c50a485c326c0996f75a7137091d1a2e297cd4090aac217cc6c6c7f19c76d7f06003c8d3

  • SSDEEP

    12288:HMrmy9003A304aGnvyj65hLuhX0MSKI3Vc+GrVvxFPwfigdnMz229i77VxL:Nyf6Kufat0LZ3VcxRTPwag22qWVxL

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9c7b7c3d597dd818b57a953c9ec8b6461d200004682d8df6c98801e94d0f12e8.exe
    "C:\Users\Admin\AppData\Local\Temp\9c7b7c3d597dd818b57a953c9ec8b6461d200004682d8df6c98801e94d0f12e8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4264
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un268812.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un268812.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2252
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7422.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7422.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1028
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1028 -s 1084
          4⤵
          • Program crash
          PID:484
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0688.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0688.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:464
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 464 -s 1428
          4⤵
          • Program crash
          PID:4880
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si994173.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si994173.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5096
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1028 -ip 1028
    1⤵
      PID:4852
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 464 -ip 464
      1⤵
        PID:2036

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si994173.exe
        Filesize

        175KB

        MD5

        e3b6beea5548e2f10acd926b4f52b25a

        SHA1

        50ff64e046fd409d09706154d571a65b5ab38283

        SHA256

        7d60b888b5c0e08337b31337690db7b87fc74e33e81062f6f114d92e79efc4ae

        SHA512

        2d5de896a67329517e1ac161d70044ada8b325de30af622fa2a40c390385658f934e9c0c6647cab9c3f64093f626a2ddd67cdb9f31b43099fa3fc3130f0eac64

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si994173.exe
        Filesize

        175KB

        MD5

        e3b6beea5548e2f10acd926b4f52b25a

        SHA1

        50ff64e046fd409d09706154d571a65b5ab38283

        SHA256

        7d60b888b5c0e08337b31337690db7b87fc74e33e81062f6f114d92e79efc4ae

        SHA512

        2d5de896a67329517e1ac161d70044ada8b325de30af622fa2a40c390385658f934e9c0c6647cab9c3f64093f626a2ddd67cdb9f31b43099fa3fc3130f0eac64

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un268812.exe
        Filesize

        548KB

        MD5

        714b7e26d9dd5770d882d2515b75dcae

        SHA1

        51495f46b5a8f18473c963e9d0c8992f0a4a6ca8

        SHA256

        c6ad37250ac866f4511a0fb5a8827b0e9f386dbede3de8bdd946d522462bd71d

        SHA512

        a23afa8b1313ec5bdbaaba7194c2619f19867ee01286b905fe5a12f93c3391359ab9a7d10f3a1d9e878ede0df12df889d5aafc285f59d3f6fffd6c7268642a87

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un268812.exe
        Filesize

        548KB

        MD5

        714b7e26d9dd5770d882d2515b75dcae

        SHA1

        51495f46b5a8f18473c963e9d0c8992f0a4a6ca8

        SHA256

        c6ad37250ac866f4511a0fb5a8827b0e9f386dbede3de8bdd946d522462bd71d

        SHA512

        a23afa8b1313ec5bdbaaba7194c2619f19867ee01286b905fe5a12f93c3391359ab9a7d10f3a1d9e878ede0df12df889d5aafc285f59d3f6fffd6c7268642a87

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7422.exe
        Filesize

        291KB

        MD5

        fcee498697134ddb048e43b46eeb40b8

        SHA1

        ed51c4e50b1de1d20d3ee69f7935b0960770075c

        SHA256

        8487efd5c75483f474d6efb0b4dfc5642bdf0d470404d578c06a3e49caea1703

        SHA512

        294570ff74f903743ebd5e0fde76d5d38fb2213206f3011111778ff756df1b7433f76849ef859087daa0d08ab4dbae411c20a40bffff3d6cad2c040240c3fb54

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7422.exe
        Filesize

        291KB

        MD5

        fcee498697134ddb048e43b46eeb40b8

        SHA1

        ed51c4e50b1de1d20d3ee69f7935b0960770075c

        SHA256

        8487efd5c75483f474d6efb0b4dfc5642bdf0d470404d578c06a3e49caea1703

        SHA512

        294570ff74f903743ebd5e0fde76d5d38fb2213206f3011111778ff756df1b7433f76849ef859087daa0d08ab4dbae411c20a40bffff3d6cad2c040240c3fb54

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0688.exe
        Filesize

        345KB

        MD5

        9dddbee74b1056b64b79104d08717b53

        SHA1

        10523b5480f9489ce66ab93ee8bfac3913a01628

        SHA256

        f3a931922b50152eb905c304cf0610997f41cab7ca749195e601ee79539efebb

        SHA512

        805139eb7235c042b9807eb3688d4efd02a8476bb276d3db8d805e3817dde4cac225df9cad9362d805f66716c6e882b5b671fb62f572627e8d6f03f3d1e57261

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0688.exe
        Filesize

        345KB

        MD5

        9dddbee74b1056b64b79104d08717b53

        SHA1

        10523b5480f9489ce66ab93ee8bfac3913a01628

        SHA256

        f3a931922b50152eb905c304cf0610997f41cab7ca749195e601ee79539efebb

        SHA512

        805139eb7235c042b9807eb3688d4efd02a8476bb276d3db8d805e3817dde4cac225df9cad9362d805f66716c6e882b5b671fb62f572627e8d6f03f3d1e57261

      • memory/464-1099-0x0000000006830000-0x0000000006E48000-memory.dmp
        Filesize

        6.1MB

      • memory/464-1102-0x0000000006F80000-0x0000000006FBC000-memory.dmp
        Filesize

        240KB

      • memory/464-1113-0x0000000006170000-0x0000000006180000-memory.dmp
        Filesize

        64KB

      • memory/464-1112-0x0000000007F30000-0x000000000845C000-memory.dmp
        Filesize

        5.2MB

      • memory/464-1111-0x0000000007D60000-0x0000000007F22000-memory.dmp
        Filesize

        1.8MB

      • memory/464-1110-0x0000000007BF0000-0x0000000007C40000-memory.dmp
        Filesize

        320KB

      • memory/464-1109-0x0000000007B60000-0x0000000007BD6000-memory.dmp
        Filesize

        472KB

      • memory/464-1108-0x0000000006170000-0x0000000006180000-memory.dmp
        Filesize

        64KB

      • memory/464-1107-0x0000000006170000-0x0000000006180000-memory.dmp
        Filesize

        64KB

      • memory/464-1106-0x0000000007910000-0x00000000079A2000-memory.dmp
        Filesize

        584KB

      • memory/464-1105-0x0000000007260000-0x00000000072C6000-memory.dmp
        Filesize

        408KB

      • memory/464-1103-0x0000000006170000-0x0000000006180000-memory.dmp
        Filesize

        64KB

      • memory/464-1101-0x0000000006F60000-0x0000000006F72000-memory.dmp
        Filesize

        72KB

      • memory/464-1100-0x0000000006E50000-0x0000000006F5A000-memory.dmp
        Filesize

        1.0MB

      • memory/464-226-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/464-224-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/464-222-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/464-220-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/464-218-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/464-216-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/464-214-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/464-212-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/464-190-0x0000000001B40000-0x0000000001B8B000-memory.dmp
        Filesize

        300KB

      • memory/464-193-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/464-191-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/464-192-0x0000000006170000-0x0000000006180000-memory.dmp
        Filesize

        64KB

      • memory/464-196-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/464-195-0x0000000006170000-0x0000000006180000-memory.dmp
        Filesize

        64KB

      • memory/464-198-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/464-200-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/464-202-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/464-204-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/464-206-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/464-208-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/464-210-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/1028-172-0x0000000002720000-0x0000000002732000-memory.dmp
        Filesize

        72KB

      • memory/1028-185-0x0000000000400000-0x000000000070B000-memory.dmp
        Filesize

        3.0MB

      • memory/1028-170-0x0000000002720000-0x0000000002732000-memory.dmp
        Filesize

        72KB

      • memory/1028-168-0x0000000002720000-0x0000000002732000-memory.dmp
        Filesize

        72KB

      • memory/1028-182-0x0000000000A80000-0x0000000000A90000-memory.dmp
        Filesize

        64KB

      • memory/1028-181-0x0000000000400000-0x000000000070B000-memory.dmp
        Filesize

        3.0MB

      • memory/1028-180-0x0000000002720000-0x0000000002732000-memory.dmp
        Filesize

        72KB

      • memory/1028-178-0x0000000002720000-0x0000000002732000-memory.dmp
        Filesize

        72KB

      • memory/1028-151-0x0000000004D30000-0x00000000052D4000-memory.dmp
        Filesize

        5.6MB

      • memory/1028-176-0x0000000002720000-0x0000000002732000-memory.dmp
        Filesize

        72KB

      • memory/1028-174-0x0000000002720000-0x0000000002732000-memory.dmp
        Filesize

        72KB

      • memory/1028-153-0x0000000002720000-0x0000000002732000-memory.dmp
        Filesize

        72KB

      • memory/1028-150-0x0000000000A80000-0x0000000000A90000-memory.dmp
        Filesize

        64KB

      • memory/1028-152-0x0000000000A80000-0x0000000000A90000-memory.dmp
        Filesize

        64KB

      • memory/1028-183-0x0000000000A80000-0x0000000000A90000-memory.dmp
        Filesize

        64KB

      • memory/1028-166-0x0000000002720000-0x0000000002732000-memory.dmp
        Filesize

        72KB

      • memory/1028-162-0x0000000002720000-0x0000000002732000-memory.dmp
        Filesize

        72KB

      • memory/1028-164-0x0000000002720000-0x0000000002732000-memory.dmp
        Filesize

        72KB

      • memory/1028-160-0x0000000002720000-0x0000000002732000-memory.dmp
        Filesize

        72KB

      • memory/1028-158-0x0000000002720000-0x0000000002732000-memory.dmp
        Filesize

        72KB

      • memory/1028-156-0x0000000002720000-0x0000000002732000-memory.dmp
        Filesize

        72KB

      • memory/1028-154-0x0000000002720000-0x0000000002732000-memory.dmp
        Filesize

        72KB

      • memory/1028-149-0x0000000000A80000-0x0000000000A90000-memory.dmp
        Filesize

        64KB

      • memory/1028-148-0x0000000000730000-0x000000000075D000-memory.dmp
        Filesize

        180KB

      • memory/5096-1119-0x0000000000CF0000-0x0000000000D22000-memory.dmp
        Filesize

        200KB

      • memory/5096-1120-0x0000000005900000-0x0000000005910000-memory.dmp
        Filesize

        64KB