Analysis

  • max time kernel
    105s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 05:30

General

  • Target

    0586936d5fb93155dcdc730ae297270b3c02eccc7fa1ac07302f98e98863c2a6.exe

  • Size

    689KB

  • MD5

    6326a4ab26d1ae5214db9b27edf6dcdd

  • SHA1

    584c7159408a4509a307e8db1a1bad6e9dc2b0aa

  • SHA256

    0586936d5fb93155dcdc730ae297270b3c02eccc7fa1ac07302f98e98863c2a6

  • SHA512

    63a3be660e9df363fd2ac479f252351550074d3a3d3932f2e7e0f1118b3057528175b91e7cf174f6ab1377746b7d31caa76c08e978bd4232e987e881ab39736d

  • SSDEEP

    12288:rMrwy90TjVskFP39k5yEfplpyM65hLucsWMSKI3V5UZszv9FDYfignV0gm19AVRh:nymVl39ksGgTfacsWLZ3V5UKzPDYagWi

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0586936d5fb93155dcdc730ae297270b3c02eccc7fa1ac07302f98e98863c2a6.exe
    "C:\Users\Admin\AppData\Local\Temp\0586936d5fb93155dcdc730ae297270b3c02eccc7fa1ac07302f98e98863c2a6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un726535.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un726535.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4108
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5088.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5088.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4932
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 1028
          4⤵
          • Program crash
          PID:4680
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7815.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7815.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:376
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 376 -s 2060
          4⤵
          • Program crash
          PID:2064
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si194656.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si194656.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1944
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4932 -ip 4932
    1⤵
      PID:4528
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 376 -ip 376
      1⤵
        PID:4284

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si194656.exe
        Filesize

        175KB

        MD5

        1d063427d05b72670fd9142490189c70

        SHA1

        10dc9fbfbc5cb7944e83cd94ed4890904224457a

        SHA256

        863716a0808599989c134c44d48e767ba9cdc27c2d9545c1fe9b444b3bfece2c

        SHA512

        15d9867459c16d762293f9f26478b7e72837e0f90830a493993ca70ca937617fee13253995cda34bcd053d0c0fbb1b72e7acf09d949c0ee9c921c8a9b2b967fe

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si194656.exe
        Filesize

        175KB

        MD5

        1d063427d05b72670fd9142490189c70

        SHA1

        10dc9fbfbc5cb7944e83cd94ed4890904224457a

        SHA256

        863716a0808599989c134c44d48e767ba9cdc27c2d9545c1fe9b444b3bfece2c

        SHA512

        15d9867459c16d762293f9f26478b7e72837e0f90830a493993ca70ca937617fee13253995cda34bcd053d0c0fbb1b72e7acf09d949c0ee9c921c8a9b2b967fe

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un726535.exe
        Filesize

        547KB

        MD5

        3a38135e840fea89f1e278a067be9ac5

        SHA1

        b96e63edd3dcd3752948d5f2e547e71917062390

        SHA256

        01c253b843ef06cf2b5ca630ed8d8527323402927635e128573c3a7af2bfc193

        SHA512

        97f6d2064f160263f2bc5f83a93278452db58fbf2dbe58bd18fbd03a93117a38061258f7b987ff8a6caa74bc59a48b1facda019c4338ac6de25cd13171381cf7

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un726535.exe
        Filesize

        547KB

        MD5

        3a38135e840fea89f1e278a067be9ac5

        SHA1

        b96e63edd3dcd3752948d5f2e547e71917062390

        SHA256

        01c253b843ef06cf2b5ca630ed8d8527323402927635e128573c3a7af2bfc193

        SHA512

        97f6d2064f160263f2bc5f83a93278452db58fbf2dbe58bd18fbd03a93117a38061258f7b987ff8a6caa74bc59a48b1facda019c4338ac6de25cd13171381cf7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5088.exe
        Filesize

        291KB

        MD5

        9e7e25ae3d049607d7342e4d1c789b0e

        SHA1

        b99c98c86f34b111a72e1d7d46acb073a1634430

        SHA256

        64fe455aaa93060c5b83b611816013a281801e945eca40c79fcf70a2c46f0592

        SHA512

        0e97d328f1515c3a2f7248498dc0d8aedf9b78104f0b049bb5cb3eed610a878a98dd15bcc6817adef0b161c7acb6ee3a465249f9f5e674de7f95ad2a8942bf20

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5088.exe
        Filesize

        291KB

        MD5

        9e7e25ae3d049607d7342e4d1c789b0e

        SHA1

        b99c98c86f34b111a72e1d7d46acb073a1634430

        SHA256

        64fe455aaa93060c5b83b611816013a281801e945eca40c79fcf70a2c46f0592

        SHA512

        0e97d328f1515c3a2f7248498dc0d8aedf9b78104f0b049bb5cb3eed610a878a98dd15bcc6817adef0b161c7acb6ee3a465249f9f5e674de7f95ad2a8942bf20

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7815.exe
        Filesize

        345KB

        MD5

        1a9e85cff2e358a22ee56e02e9d00535

        SHA1

        ef19cf5d0cdf56c1408c9435400a2eed3b4d85df

        SHA256

        dea6b7dc77d0b07d9502334b1297c2c105536ad443d52a2dfec79906d821b76f

        SHA512

        337c6ed7b4d96d1176b230ae2e4825be8ec65c7f1615528d39659b6bbd6c00479992899cfa5821d583bc5396c281de593fec5ff22491f6618b86a66ad5d9eb75

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7815.exe
        Filesize

        345KB

        MD5

        1a9e85cff2e358a22ee56e02e9d00535

        SHA1

        ef19cf5d0cdf56c1408c9435400a2eed3b4d85df

        SHA256

        dea6b7dc77d0b07d9502334b1297c2c105536ad443d52a2dfec79906d821b76f

        SHA512

        337c6ed7b4d96d1176b230ae2e4825be8ec65c7f1615528d39659b6bbd6c00479992899cfa5821d583bc5396c281de593fec5ff22491f6618b86a66ad5d9eb75

      • memory/376-1099-0x0000000006D60000-0x0000000006E6A000-memory.dmp
        Filesize

        1.0MB

      • memory/376-1102-0x0000000006180000-0x0000000006190000-memory.dmp
        Filesize

        64KB

      • memory/376-1113-0x0000000006180000-0x0000000006190000-memory.dmp
        Filesize

        64KB

      • memory/376-1112-0x0000000007DE0000-0x000000000830C000-memory.dmp
        Filesize

        5.2MB

      • memory/376-1111-0x0000000007C10000-0x0000000007DD2000-memory.dmp
        Filesize

        1.8MB

      • memory/376-1110-0x0000000006180000-0x0000000006190000-memory.dmp
        Filesize

        64KB

      • memory/376-1109-0x0000000006180000-0x0000000006190000-memory.dmp
        Filesize

        64KB

      • memory/376-1108-0x0000000006180000-0x0000000006190000-memory.dmp
        Filesize

        64KB

      • memory/376-1106-0x0000000007B90000-0x0000000007BE0000-memory.dmp
        Filesize

        320KB

      • memory/376-1105-0x0000000007B00000-0x0000000007B76000-memory.dmp
        Filesize

        472KB

      • memory/376-1104-0x00000000071C0000-0x0000000007226000-memory.dmp
        Filesize

        408KB

      • memory/376-1103-0x0000000007120000-0x00000000071B2000-memory.dmp
        Filesize

        584KB

      • memory/376-1101-0x0000000006140000-0x000000000617C000-memory.dmp
        Filesize

        240KB

      • memory/376-1100-0x0000000006120000-0x0000000006132000-memory.dmp
        Filesize

        72KB

      • memory/376-1098-0x0000000006740000-0x0000000006D58000-memory.dmp
        Filesize

        6.1MB

      • memory/376-225-0x00000000039C0000-0x00000000039FF000-memory.dmp
        Filesize

        252KB

      • memory/376-223-0x00000000039C0000-0x00000000039FF000-memory.dmp
        Filesize

        252KB

      • memory/376-221-0x00000000039C0000-0x00000000039FF000-memory.dmp
        Filesize

        252KB

      • memory/376-219-0x00000000039C0000-0x00000000039FF000-memory.dmp
        Filesize

        252KB

      • memory/376-217-0x00000000039C0000-0x00000000039FF000-memory.dmp
        Filesize

        252KB

      • memory/376-188-0x00000000039C0000-0x00000000039FF000-memory.dmp
        Filesize

        252KB

      • memory/376-189-0x00000000039C0000-0x00000000039FF000-memory.dmp
        Filesize

        252KB

      • memory/376-191-0x00000000039C0000-0x00000000039FF000-memory.dmp
        Filesize

        252KB

      • memory/376-193-0x00000000039C0000-0x00000000039FF000-memory.dmp
        Filesize

        252KB

      • memory/376-195-0x00000000039C0000-0x00000000039FF000-memory.dmp
        Filesize

        252KB

      • memory/376-197-0x00000000039C0000-0x00000000039FF000-memory.dmp
        Filesize

        252KB

      • memory/376-200-0x0000000001B10000-0x0000000001B5B000-memory.dmp
        Filesize

        300KB

      • memory/376-199-0x00000000039C0000-0x00000000039FF000-memory.dmp
        Filesize

        252KB

      • memory/376-202-0x0000000006180000-0x0000000006190000-memory.dmp
        Filesize

        64KB

      • memory/376-206-0x0000000006180000-0x0000000006190000-memory.dmp
        Filesize

        64KB

      • memory/376-204-0x0000000006180000-0x0000000006190000-memory.dmp
        Filesize

        64KB

      • memory/376-203-0x00000000039C0000-0x00000000039FF000-memory.dmp
        Filesize

        252KB

      • memory/376-207-0x00000000039C0000-0x00000000039FF000-memory.dmp
        Filesize

        252KB

      • memory/376-209-0x00000000039C0000-0x00000000039FF000-memory.dmp
        Filesize

        252KB

      • memory/376-211-0x00000000039C0000-0x00000000039FF000-memory.dmp
        Filesize

        252KB

      • memory/376-213-0x00000000039C0000-0x00000000039FF000-memory.dmp
        Filesize

        252KB

      • memory/376-215-0x00000000039C0000-0x00000000039FF000-memory.dmp
        Filesize

        252KB

      • memory/1944-1119-0x0000000000510000-0x0000000000542000-memory.dmp
        Filesize

        200KB

      • memory/1944-1120-0x0000000004DB0000-0x0000000004DC0000-memory.dmp
        Filesize

        64KB

      • memory/4932-169-0x00000000027A0000-0x00000000027B2000-memory.dmp
        Filesize

        72KB

      • memory/4932-180-0x0000000000400000-0x000000000070B000-memory.dmp
        Filesize

        3.0MB

      • memory/4932-167-0x00000000027A0000-0x00000000027B2000-memory.dmp
        Filesize

        72KB

      • memory/4932-179-0x00000000027A0000-0x00000000027B2000-memory.dmp
        Filesize

        72KB

      • memory/4932-150-0x0000000004DE0000-0x0000000004DF0000-memory.dmp
        Filesize

        64KB

      • memory/4932-177-0x00000000027A0000-0x00000000027B2000-memory.dmp
        Filesize

        72KB

      • memory/4932-175-0x00000000027A0000-0x00000000027B2000-memory.dmp
        Filesize

        72KB

      • memory/4932-153-0x00000000027A0000-0x00000000027B2000-memory.dmp
        Filesize

        72KB

      • memory/4932-165-0x00000000027A0000-0x00000000027B2000-memory.dmp
        Filesize

        72KB

      • memory/4932-171-0x00000000027A0000-0x00000000027B2000-memory.dmp
        Filesize

        72KB

      • memory/4932-152-0x00000000027A0000-0x00000000027B2000-memory.dmp
        Filesize

        72KB

      • memory/4932-181-0x0000000004DE0000-0x0000000004DF0000-memory.dmp
        Filesize

        64KB

      • memory/4932-173-0x00000000027A0000-0x00000000027B2000-memory.dmp
        Filesize

        72KB

      • memory/4932-163-0x00000000027A0000-0x00000000027B2000-memory.dmp
        Filesize

        72KB

      • memory/4932-161-0x00000000027A0000-0x00000000027B2000-memory.dmp
        Filesize

        72KB

      • memory/4932-159-0x00000000027A0000-0x00000000027B2000-memory.dmp
        Filesize

        72KB

      • memory/4932-157-0x00000000027A0000-0x00000000027B2000-memory.dmp
        Filesize

        72KB

      • memory/4932-155-0x00000000027A0000-0x00000000027B2000-memory.dmp
        Filesize

        72KB

      • memory/4932-149-0x0000000000740000-0x000000000076D000-memory.dmp
        Filesize

        180KB

      • memory/4932-148-0x0000000004DF0000-0x0000000005394000-memory.dmp
        Filesize

        5.6MB

      • memory/4932-183-0x0000000000400000-0x000000000070B000-memory.dmp
        Filesize

        3.0MB

      • memory/4932-151-0x0000000004DE0000-0x0000000004DF0000-memory.dmp
        Filesize

        64KB