Analysis

  • max time kernel
    85s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 05:12

General

  • Target

    1d20366d3b03e38e0282b76e3597b2fb65349c7a65fe40b6faf137d2fa0447ad.exe

  • Size

    690KB

  • MD5

    b07f7b60de650e740dbc5221c2d17898

  • SHA1

    afab5ef2955746d10d6d4490a608988cb8504db1

  • SHA256

    1d20366d3b03e38e0282b76e3597b2fb65349c7a65fe40b6faf137d2fa0447ad

  • SHA512

    826a84cbc74b8cca36e70a800777278c3f91ad34856ac84decbf25a11ce7266a477c81186655715c1db8380f76477ed64f142e7ab52268e519bb42e6b3196b40

  • SSDEEP

    12288:YMr3y90kSJshdX8KbqlWsG7oiyc65hLuZt+cMCpdBN2T0R6v3FKjfig/tDnjsm:fySshdMK2nvDfaZt+c5NUtKjaglDgm

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d20366d3b03e38e0282b76e3597b2fb65349c7a65fe40b6faf137d2fa0447ad.exe
    "C:\Users\Admin\AppData\Local\Temp\1d20366d3b03e38e0282b76e3597b2fb65349c7a65fe40b6faf137d2fa0447ad.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3644
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un384239.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un384239.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2108
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4219.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4219.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3568
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3568 -s 1076
          4⤵
          • Program crash
          PID:696
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4471.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4471.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5068
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 1360
          4⤵
          • Program crash
          PID:1340
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si041577.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si041577.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5080
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3568 -ip 3568
    1⤵
      PID:2096
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 5068 -ip 5068
      1⤵
        PID:1884

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si041577.exe
        Filesize

        175KB

        MD5

        da2b7b0db6dc9085ea2a84b639d791a9

        SHA1

        834f03727d4e4d2a602a3aab74f628efc6175250

        SHA256

        3270f7cdb9eb824ad69da3c418215536f180fa492fc2c9637de5193083512e1b

        SHA512

        1827a704a4baa56b9fe134722f98360c379505f786a2db87bf487329031b544cef9300e9fe9c6fa9d66f5c5ff827dd0f02e4eb58fa25a333117bde7791899608

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si041577.exe
        Filesize

        175KB

        MD5

        da2b7b0db6dc9085ea2a84b639d791a9

        SHA1

        834f03727d4e4d2a602a3aab74f628efc6175250

        SHA256

        3270f7cdb9eb824ad69da3c418215536f180fa492fc2c9637de5193083512e1b

        SHA512

        1827a704a4baa56b9fe134722f98360c379505f786a2db87bf487329031b544cef9300e9fe9c6fa9d66f5c5ff827dd0f02e4eb58fa25a333117bde7791899608

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un384239.exe
        Filesize

        548KB

        MD5

        cd6dfc95879a33205d92fcad4c28992c

        SHA1

        0b645ccf7fe4dbc7246c0be8cfa466eca8f52371

        SHA256

        d906f96b716c57a0e7dd61a50ad2624f589af368e6c0daa67bd933f9ab454071

        SHA512

        916de145e605fe452ace171aa718261510f8eb7587d6f2351604b7d79550c752ba8b9a899332d1c37083ee1100fbaecb0d37db6f7d68931238c28b9747a703f7

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un384239.exe
        Filesize

        548KB

        MD5

        cd6dfc95879a33205d92fcad4c28992c

        SHA1

        0b645ccf7fe4dbc7246c0be8cfa466eca8f52371

        SHA256

        d906f96b716c57a0e7dd61a50ad2624f589af368e6c0daa67bd933f9ab454071

        SHA512

        916de145e605fe452ace171aa718261510f8eb7587d6f2351604b7d79550c752ba8b9a899332d1c37083ee1100fbaecb0d37db6f7d68931238c28b9747a703f7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4219.exe
        Filesize

        291KB

        MD5

        227582bca21a9876d68a904167de9b40

        SHA1

        9de04e94f2b4d47671c87223219f60d12c202882

        SHA256

        dd6d04e2ad36b598c6932c1f1bf9227d5b0dfd0c1e7dba5fed17f5b1dc7d1ef5

        SHA512

        7b54d01103bdf342a5dbd489d653f87bdb2b26907ae5e31383e659ca1f65f2d6271f18001f3d4b498bd19e71aa9fcbc634b1f9b6dcfc61340c606757e8fe40d3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4219.exe
        Filesize

        291KB

        MD5

        227582bca21a9876d68a904167de9b40

        SHA1

        9de04e94f2b4d47671c87223219f60d12c202882

        SHA256

        dd6d04e2ad36b598c6932c1f1bf9227d5b0dfd0c1e7dba5fed17f5b1dc7d1ef5

        SHA512

        7b54d01103bdf342a5dbd489d653f87bdb2b26907ae5e31383e659ca1f65f2d6271f18001f3d4b498bd19e71aa9fcbc634b1f9b6dcfc61340c606757e8fe40d3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4471.exe
        Filesize

        345KB

        MD5

        488bb9a3c2b76129a7c6eafa8eb40255

        SHA1

        d7ff3c186c8d580d43467a7a9639d7365ade1b35

        SHA256

        2f9478a6aa727c689e1d6802b79f64e00dfdb5f31ccf56d9e1a672a0c68492c1

        SHA512

        36b5cfa457b3dba51e3ca7db454c18fc4dc8f4a851a6d619e035a57107655360b3a6f48b1fb3902daab5c8599a6943bc55fb85f1ba3d59d7a6240cce6fdbeda6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4471.exe
        Filesize

        345KB

        MD5

        488bb9a3c2b76129a7c6eafa8eb40255

        SHA1

        d7ff3c186c8d580d43467a7a9639d7365ade1b35

        SHA256

        2f9478a6aa727c689e1d6802b79f64e00dfdb5f31ccf56d9e1a672a0c68492c1

        SHA512

        36b5cfa457b3dba51e3ca7db454c18fc4dc8f4a851a6d619e035a57107655360b3a6f48b1fb3902daab5c8599a6943bc55fb85f1ba3d59d7a6240cce6fdbeda6

      • memory/3568-148-0x0000000004EF0000-0x0000000005494000-memory.dmp
        Filesize

        5.6MB

      • memory/3568-149-0x0000000002310000-0x0000000002322000-memory.dmp
        Filesize

        72KB

      • memory/3568-150-0x0000000002310000-0x0000000002322000-memory.dmp
        Filesize

        72KB

      • memory/3568-153-0x0000000002310000-0x0000000002322000-memory.dmp
        Filesize

        72KB

      • memory/3568-156-0x0000000002310000-0x0000000002322000-memory.dmp
        Filesize

        72KB

      • memory/3568-155-0x0000000004EE0000-0x0000000004EF0000-memory.dmp
        Filesize

        64KB

      • memory/3568-152-0x0000000000800000-0x000000000082D000-memory.dmp
        Filesize

        180KB

      • memory/3568-157-0x0000000004EE0000-0x0000000004EF0000-memory.dmp
        Filesize

        64KB

      • memory/3568-159-0x0000000004EE0000-0x0000000004EF0000-memory.dmp
        Filesize

        64KB

      • memory/3568-160-0x0000000002310000-0x0000000002322000-memory.dmp
        Filesize

        72KB

      • memory/3568-162-0x0000000002310000-0x0000000002322000-memory.dmp
        Filesize

        72KB

      • memory/3568-164-0x0000000002310000-0x0000000002322000-memory.dmp
        Filesize

        72KB

      • memory/3568-166-0x0000000002310000-0x0000000002322000-memory.dmp
        Filesize

        72KB

      • memory/3568-168-0x0000000002310000-0x0000000002322000-memory.dmp
        Filesize

        72KB

      • memory/3568-170-0x0000000002310000-0x0000000002322000-memory.dmp
        Filesize

        72KB

      • memory/3568-172-0x0000000002310000-0x0000000002322000-memory.dmp
        Filesize

        72KB

      • memory/3568-174-0x0000000002310000-0x0000000002322000-memory.dmp
        Filesize

        72KB

      • memory/3568-176-0x0000000002310000-0x0000000002322000-memory.dmp
        Filesize

        72KB

      • memory/3568-178-0x0000000002310000-0x0000000002322000-memory.dmp
        Filesize

        72KB

      • memory/3568-180-0x0000000002310000-0x0000000002322000-memory.dmp
        Filesize

        72KB

      • memory/3568-181-0x0000000000400000-0x000000000070B000-memory.dmp
        Filesize

        3.0MB

      • memory/3568-182-0x0000000004EE0000-0x0000000004EF0000-memory.dmp
        Filesize

        64KB

      • memory/3568-183-0x0000000004EE0000-0x0000000004EF0000-memory.dmp
        Filesize

        64KB

      • memory/3568-184-0x0000000004EE0000-0x0000000004EF0000-memory.dmp
        Filesize

        64KB

      • memory/3568-186-0x0000000000400000-0x000000000070B000-memory.dmp
        Filesize

        3.0MB

      • memory/5068-191-0x0000000003BF0000-0x0000000003C2F000-memory.dmp
        Filesize

        252KB

      • memory/5068-194-0x0000000003BF0000-0x0000000003C2F000-memory.dmp
        Filesize

        252KB

      • memory/5068-192-0x0000000003BF0000-0x0000000003C2F000-memory.dmp
        Filesize

        252KB

      • memory/5068-198-0x0000000003BF0000-0x0000000003C2F000-memory.dmp
        Filesize

        252KB

      • memory/5068-196-0x0000000003BF0000-0x0000000003C2F000-memory.dmp
        Filesize

        252KB

      • memory/5068-200-0x0000000003BF0000-0x0000000003C2F000-memory.dmp
        Filesize

        252KB

      • memory/5068-202-0x0000000003BF0000-0x0000000003C2F000-memory.dmp
        Filesize

        252KB

      • memory/5068-204-0x0000000003BF0000-0x0000000003C2F000-memory.dmp
        Filesize

        252KB

      • memory/5068-206-0x0000000003BF0000-0x0000000003C2F000-memory.dmp
        Filesize

        252KB

      • memory/5068-208-0x0000000003BF0000-0x0000000003C2F000-memory.dmp
        Filesize

        252KB

      • memory/5068-210-0x0000000003BF0000-0x0000000003C2F000-memory.dmp
        Filesize

        252KB

      • memory/5068-212-0x0000000003BF0000-0x0000000003C2F000-memory.dmp
        Filesize

        252KB

      • memory/5068-214-0x0000000003BF0000-0x0000000003C2F000-memory.dmp
        Filesize

        252KB

      • memory/5068-216-0x0000000003BF0000-0x0000000003C2F000-memory.dmp
        Filesize

        252KB

      • memory/5068-218-0x0000000003BF0000-0x0000000003C2F000-memory.dmp
        Filesize

        252KB

      • memory/5068-220-0x0000000003BF0000-0x0000000003C2F000-memory.dmp
        Filesize

        252KB

      • memory/5068-222-0x0000000003BF0000-0x0000000003C2F000-memory.dmp
        Filesize

        252KB

      • memory/5068-224-0x0000000003BF0000-0x0000000003C2F000-memory.dmp
        Filesize

        252KB

      • memory/5068-228-0x0000000003960000-0x0000000003970000-memory.dmp
        Filesize

        64KB

      • memory/5068-227-0x0000000001B00000-0x0000000001B4B000-memory.dmp
        Filesize

        300KB

      • memory/5068-231-0x0000000003960000-0x0000000003970000-memory.dmp
        Filesize

        64KB

      • memory/5068-234-0x0000000003960000-0x0000000003970000-memory.dmp
        Filesize

        64KB

      • memory/5068-1101-0x0000000006670000-0x0000000006C88000-memory.dmp
        Filesize

        6.1MB

      • memory/5068-1102-0x0000000006CD0000-0x0000000006DDA000-memory.dmp
        Filesize

        1.0MB

      • memory/5068-1103-0x0000000006E10000-0x0000000006E22000-memory.dmp
        Filesize

        72KB

      • memory/5068-1104-0x0000000006E30000-0x0000000006E6C000-memory.dmp
        Filesize

        240KB

      • memory/5068-1105-0x0000000003960000-0x0000000003970000-memory.dmp
        Filesize

        64KB

      • memory/5068-1106-0x0000000007120000-0x00000000071B2000-memory.dmp
        Filesize

        584KB

      • memory/5068-1107-0x00000000071C0000-0x0000000007226000-memory.dmp
        Filesize

        408KB

      • memory/5068-1109-0x0000000003960000-0x0000000003970000-memory.dmp
        Filesize

        64KB

      • memory/5068-1110-0x0000000003960000-0x0000000003970000-memory.dmp
        Filesize

        64KB

      • memory/5068-1111-0x0000000003960000-0x0000000003970000-memory.dmp
        Filesize

        64KB

      • memory/5068-1112-0x00000000079C0000-0x0000000007A36000-memory.dmp
        Filesize

        472KB

      • memory/5068-1113-0x0000000007A50000-0x0000000007AA0000-memory.dmp
        Filesize

        320KB

      • memory/5068-1114-0x0000000007C10000-0x0000000007DD2000-memory.dmp
        Filesize

        1.8MB

      • memory/5068-1115-0x0000000007DE0000-0x000000000830C000-memory.dmp
        Filesize

        5.2MB

      • memory/5068-1116-0x0000000003960000-0x0000000003970000-memory.dmp
        Filesize

        64KB

      • memory/5080-1122-0x00000000002F0000-0x0000000000322000-memory.dmp
        Filesize

        200KB

      • memory/5080-1123-0x0000000004BE0000-0x0000000004BF0000-memory.dmp
        Filesize

        64KB

      • memory/5080-1124-0x0000000004BE0000-0x0000000004BF0000-memory.dmp
        Filesize

        64KB