Analysis

  • max time kernel
    93s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 04:40

General

  • Target

    f8fc7db95f115d71e1ae789d730881d38833c2c56706c0481149fbd6ea9577cf.exe

  • Size

    689KB

  • MD5

    ea0c061b61c9e4b4a027e273dfc894c0

  • SHA1

    21ce94017ee4ceb031637ca89342e6b97176d538

  • SHA256

    f8fc7db95f115d71e1ae789d730881d38833c2c56706c0481149fbd6ea9577cf

  • SHA512

    ceabc5515072734c595f4e4662fba9370ec8799b8911a7abe4d92c2280ac41a7a1c86a6518e1fe5ef4573a63e50d59d26ad79875151358ba5b97e5cbf3388f02

  • SSDEEP

    12288:yMriy90wzkDz5mRVXnrwC1zdRJ+eT4TIiAoUmJ2voFf6figC2sChFQq:ky9zk8D3rwG+eTyDwmJ2Af6agYeFQq

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f8fc7db95f115d71e1ae789d730881d38833c2c56706c0481149fbd6ea9577cf.exe
    "C:\Users\Admin\AppData\Local\Temp\f8fc7db95f115d71e1ae789d730881d38833c2c56706c0481149fbd6ea9577cf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4516
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un178691.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un178691.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1656
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9928.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9928.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4000
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 1080
          4⤵
          • Program crash
          PID:1748
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8476.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8476.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4920
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4920 -s 1352
          4⤵
          • Program crash
          PID:4392
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si625359.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si625359.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4984
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4000 -ip 4000
    1⤵
      PID:3580
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4920 -ip 4920
      1⤵
        PID:4464

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si625359.exe
        Filesize

        175KB

        MD5

        f4bbcd4e7ba216a55578d8faea3222b1

        SHA1

        5ae74c54df15928e528127a6551db3e92c258c37

        SHA256

        30266ac169e161d566256e070f68a0d2b5f7e70f015c25b912d47f9862f621ea

        SHA512

        bafa6920eb55d00c5f7e4447d5715761f7c3c883de62a91ac9e08555ac1d4aa51b428b586c9088adb52535e4a149e1e9388a2e664e0f30162a4c0bbe23bb4b80

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si625359.exe
        Filesize

        175KB

        MD5

        f4bbcd4e7ba216a55578d8faea3222b1

        SHA1

        5ae74c54df15928e528127a6551db3e92c258c37

        SHA256

        30266ac169e161d566256e070f68a0d2b5f7e70f015c25b912d47f9862f621ea

        SHA512

        bafa6920eb55d00c5f7e4447d5715761f7c3c883de62a91ac9e08555ac1d4aa51b428b586c9088adb52535e4a149e1e9388a2e664e0f30162a4c0bbe23bb4b80

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un178691.exe
        Filesize

        547KB

        MD5

        8757e623962d4833dc287499c3306eb0

        SHA1

        5bbd8425f27b711731255509ce16ee8cb051af9b

        SHA256

        4baac63354c74dba1dd06bed6b590fab10c02dac411939a98d3a9f156e84d8f3

        SHA512

        52cb481b0615cf62a0413e3025557766fbf333403d189d3f79fb9006b5fa039bce6e118cc442357e3af8d3a060cd66b2e30a7edcc1c4524154286eea9f614759

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un178691.exe
        Filesize

        547KB

        MD5

        8757e623962d4833dc287499c3306eb0

        SHA1

        5bbd8425f27b711731255509ce16ee8cb051af9b

        SHA256

        4baac63354c74dba1dd06bed6b590fab10c02dac411939a98d3a9f156e84d8f3

        SHA512

        52cb481b0615cf62a0413e3025557766fbf333403d189d3f79fb9006b5fa039bce6e118cc442357e3af8d3a060cd66b2e30a7edcc1c4524154286eea9f614759

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9928.exe
        Filesize

        291KB

        MD5

        9eb78abfa660661539e854e7514b758b

        SHA1

        c6188bf8d6191f485c06ff7b5ce4321af6c1c22e

        SHA256

        d5c02c9a2e11ea8ab9b81280aeb4589954aba9c520ab1da6d573a46ed177f1bb

        SHA512

        0b8504fe9f729a287f4a0d552c38f8aa0bbc9318f457fadf2dc1552732c194e0a000679b4aabe9ff162c3487277ff9753654b3d0dfeb70b9ec9fb78633dabeae

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9928.exe
        Filesize

        291KB

        MD5

        9eb78abfa660661539e854e7514b758b

        SHA1

        c6188bf8d6191f485c06ff7b5ce4321af6c1c22e

        SHA256

        d5c02c9a2e11ea8ab9b81280aeb4589954aba9c520ab1da6d573a46ed177f1bb

        SHA512

        0b8504fe9f729a287f4a0d552c38f8aa0bbc9318f457fadf2dc1552732c194e0a000679b4aabe9ff162c3487277ff9753654b3d0dfeb70b9ec9fb78633dabeae

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8476.exe
        Filesize

        345KB

        MD5

        425c543ec1b95f4457565eaf35a998ee

        SHA1

        6caec31a594275652256880e42308b77ef84ac4d

        SHA256

        f3596ceb4236a335013266538d471250399ee27e9c3200509f705a26e5de03d7

        SHA512

        ea4470880b9a1fdf13bebcaae5cec7481197b7dc66a68025f18e9778928151299813cc0166646797a6bbf8e27f73984b51948ae401de201b46e2d033ddb76288

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8476.exe
        Filesize

        345KB

        MD5

        425c543ec1b95f4457565eaf35a998ee

        SHA1

        6caec31a594275652256880e42308b77ef84ac4d

        SHA256

        f3596ceb4236a335013266538d471250399ee27e9c3200509f705a26e5de03d7

        SHA512

        ea4470880b9a1fdf13bebcaae5cec7481197b7dc66a68025f18e9778928151299813cc0166646797a6bbf8e27f73984b51948ae401de201b46e2d033ddb76288

      • memory/4000-148-0x0000000004EB0000-0x0000000005454000-memory.dmp
        Filesize

        5.6MB

      • memory/4000-149-0x00000000007E0000-0x000000000080D000-memory.dmp
        Filesize

        180KB

      • memory/4000-150-0x0000000004EA0000-0x0000000004EB0000-memory.dmp
        Filesize

        64KB

      • memory/4000-151-0x0000000004EA0000-0x0000000004EB0000-memory.dmp
        Filesize

        64KB

      • memory/4000-152-0x0000000002920000-0x0000000002932000-memory.dmp
        Filesize

        72KB

      • memory/4000-153-0x0000000002920000-0x0000000002932000-memory.dmp
        Filesize

        72KB

      • memory/4000-155-0x0000000002920000-0x0000000002932000-memory.dmp
        Filesize

        72KB

      • memory/4000-157-0x0000000002920000-0x0000000002932000-memory.dmp
        Filesize

        72KB

      • memory/4000-159-0x0000000002920000-0x0000000002932000-memory.dmp
        Filesize

        72KB

      • memory/4000-161-0x0000000002920000-0x0000000002932000-memory.dmp
        Filesize

        72KB

      • memory/4000-163-0x0000000002920000-0x0000000002932000-memory.dmp
        Filesize

        72KB

      • memory/4000-165-0x0000000002920000-0x0000000002932000-memory.dmp
        Filesize

        72KB

      • memory/4000-167-0x0000000002920000-0x0000000002932000-memory.dmp
        Filesize

        72KB

      • memory/4000-169-0x0000000002920000-0x0000000002932000-memory.dmp
        Filesize

        72KB

      • memory/4000-171-0x0000000002920000-0x0000000002932000-memory.dmp
        Filesize

        72KB

      • memory/4000-173-0x0000000002920000-0x0000000002932000-memory.dmp
        Filesize

        72KB

      • memory/4000-175-0x0000000002920000-0x0000000002932000-memory.dmp
        Filesize

        72KB

      • memory/4000-177-0x0000000002920000-0x0000000002932000-memory.dmp
        Filesize

        72KB

      • memory/4000-179-0x0000000002920000-0x0000000002932000-memory.dmp
        Filesize

        72KB

      • memory/4000-180-0x0000000000400000-0x000000000070B000-memory.dmp
        Filesize

        3.0MB

      • memory/4000-182-0x0000000000400000-0x000000000070B000-memory.dmp
        Filesize

        3.0MB

      • memory/4920-187-0x00000000038C0000-0x00000000038FF000-memory.dmp
        Filesize

        252KB

      • memory/4920-188-0x00000000038C0000-0x00000000038FF000-memory.dmp
        Filesize

        252KB

      • memory/4920-190-0x00000000038C0000-0x00000000038FF000-memory.dmp
        Filesize

        252KB

      • memory/4920-192-0x00000000038C0000-0x00000000038FF000-memory.dmp
        Filesize

        252KB

      • memory/4920-194-0x00000000038C0000-0x00000000038FF000-memory.dmp
        Filesize

        252KB

      • memory/4920-196-0x00000000038C0000-0x00000000038FF000-memory.dmp
        Filesize

        252KB

      • memory/4920-198-0x00000000038C0000-0x00000000038FF000-memory.dmp
        Filesize

        252KB

      • memory/4920-200-0x00000000038C0000-0x00000000038FF000-memory.dmp
        Filesize

        252KB

      • memory/4920-202-0x00000000038C0000-0x00000000038FF000-memory.dmp
        Filesize

        252KB

      • memory/4920-204-0x00000000038C0000-0x00000000038FF000-memory.dmp
        Filesize

        252KB

      • memory/4920-206-0x00000000038C0000-0x00000000038FF000-memory.dmp
        Filesize

        252KB

      • memory/4920-208-0x00000000038C0000-0x00000000038FF000-memory.dmp
        Filesize

        252KB

      • memory/4920-210-0x00000000038C0000-0x00000000038FF000-memory.dmp
        Filesize

        252KB

      • memory/4920-212-0x00000000038C0000-0x00000000038FF000-memory.dmp
        Filesize

        252KB

      • memory/4920-214-0x00000000038C0000-0x00000000038FF000-memory.dmp
        Filesize

        252KB

      • memory/4920-217-0x00000000038C0000-0x00000000038FF000-memory.dmp
        Filesize

        252KB

      • memory/4920-216-0x0000000001B00000-0x0000000001B4B000-memory.dmp
        Filesize

        300KB

      • memory/4920-218-0x00000000063A0000-0x00000000063B0000-memory.dmp
        Filesize

        64KB

      • memory/4920-220-0x00000000038C0000-0x00000000038FF000-memory.dmp
        Filesize

        252KB

      • memory/4920-221-0x00000000063A0000-0x00000000063B0000-memory.dmp
        Filesize

        64KB

      • memory/4920-223-0x00000000063A0000-0x00000000063B0000-memory.dmp
        Filesize

        64KB

      • memory/4920-224-0x00000000038C0000-0x00000000038FF000-memory.dmp
        Filesize

        252KB

      • memory/4920-1097-0x0000000006960000-0x0000000006F78000-memory.dmp
        Filesize

        6.1MB

      • memory/4920-1098-0x0000000006F80000-0x000000000708A000-memory.dmp
        Filesize

        1.0MB

      • memory/4920-1099-0x0000000003C00000-0x0000000003C12000-memory.dmp
        Filesize

        72KB

      • memory/4920-1100-0x0000000003D40000-0x0000000003D7C000-memory.dmp
        Filesize

        240KB

      • memory/4920-1101-0x00000000063A0000-0x00000000063B0000-memory.dmp
        Filesize

        64KB

      • memory/4920-1103-0x0000000007260000-0x00000000072F2000-memory.dmp
        Filesize

        584KB

      • memory/4920-1104-0x0000000007300000-0x0000000007366000-memory.dmp
        Filesize

        408KB

      • memory/4920-1105-0x00000000063A0000-0x00000000063B0000-memory.dmp
        Filesize

        64KB

      • memory/4920-1106-0x00000000063A0000-0x00000000063B0000-memory.dmp
        Filesize

        64KB

      • memory/4920-1107-0x00000000063A0000-0x00000000063B0000-memory.dmp
        Filesize

        64KB

      • memory/4920-1108-0x0000000007A20000-0x0000000007BE2000-memory.dmp
        Filesize

        1.8MB

      • memory/4920-1109-0x0000000007C00000-0x000000000812C000-memory.dmp
        Filesize

        5.2MB

      • memory/4920-1110-0x00000000063A0000-0x00000000063B0000-memory.dmp
        Filesize

        64KB

      • memory/4920-1111-0x00000000085F0000-0x0000000008666000-memory.dmp
        Filesize

        472KB

      • memory/4920-1112-0x0000000008680000-0x00000000086D0000-memory.dmp
        Filesize

        320KB

      • memory/4984-1118-0x0000000000630000-0x0000000000662000-memory.dmp
        Filesize

        200KB

      • memory/4984-1119-0x0000000004F50000-0x0000000004F60000-memory.dmp
        Filesize

        64KB