Analysis

  • max time kernel
    100s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 05:37

General

  • Target

    d270f06cafea600b8ca2586dbf611b63317b01fd9e356adf44f1d7158a983706.exe

  • Size

    689KB

  • MD5

    974ac9d56af9e114dde49fff890e84c1

  • SHA1

    19d2467658c310fc8e2921da120bb69ba1c833e0

  • SHA256

    d270f06cafea600b8ca2586dbf611b63317b01fd9e356adf44f1d7158a983706

  • SHA512

    ed0eb072f33a0b3a22ab1606e1e970cd35edb9af4d4a2575e94584cd4ddc1e80a355bac409661808f923db4f60cde43cf7e729f3b488045711906ee7b0ed8d55

  • SSDEEP

    12288:eMrWy905HpHiObYlBBsto82wyl65hLu1N49g+DT4Tid2CTWPKHAybmJ+vrFwlfim:EyYY4YlBqa8C4fah+DTykWPhAmJ+BwlR

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d270f06cafea600b8ca2586dbf611b63317b01fd9e356adf44f1d7158a983706.exe
    "C:\Users\Admin\AppData\Local\Temp\d270f06cafea600b8ca2586dbf611b63317b01fd9e356adf44f1d7158a983706.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3964
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un555506.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un555506.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0894.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0894.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5112
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 1084
          4⤵
          • Program crash
          PID:1148
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3724.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3724.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4056
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4056 -s 1676
          4⤵
          • Program crash
          PID:3516
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si515428.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si515428.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4296
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 5112 -ip 5112
    1⤵
      PID:932
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4056 -ip 4056
      1⤵
        PID:2196

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si515428.exe
        Filesize

        175KB

        MD5

        85d429e15b7491ace8bcf421b5de3182

        SHA1

        2170f168a7bd96b9ad9d02fd13c3119dd3771a80

        SHA256

        3b40139c5c9f70fe1d0a122424a437ae6c043c37bfe599e5af8e90fe218089e7

        SHA512

        afb108bd2c79618f73c6c05a31a90bc1597ecde410f5d9162ed2bab53fdea02b923af56b8711fadb6c3a35a9591d2d0b9683c07093cf04251be2869ef3a61573

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si515428.exe
        Filesize

        175KB

        MD5

        85d429e15b7491ace8bcf421b5de3182

        SHA1

        2170f168a7bd96b9ad9d02fd13c3119dd3771a80

        SHA256

        3b40139c5c9f70fe1d0a122424a437ae6c043c37bfe599e5af8e90fe218089e7

        SHA512

        afb108bd2c79618f73c6c05a31a90bc1597ecde410f5d9162ed2bab53fdea02b923af56b8711fadb6c3a35a9591d2d0b9683c07093cf04251be2869ef3a61573

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un555506.exe
        Filesize

        547KB

        MD5

        e6cb8e01f88c9af4c574a989e734d574

        SHA1

        f355b3089318f7b863be3822330c4665e1b4d404

        SHA256

        b562629e7c78abfaf80a8fd4c34db558d714f761e543ec4150a4b744d6799a5c

        SHA512

        83da765e47de90db6b773f28c7d040c80384a9c24a9d45f2a1763430eab354456ffda2b341cf34f035918d7dabc8d54f089c9fd0b0320ea8f0c7aad3ecb46456

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un555506.exe
        Filesize

        547KB

        MD5

        e6cb8e01f88c9af4c574a989e734d574

        SHA1

        f355b3089318f7b863be3822330c4665e1b4d404

        SHA256

        b562629e7c78abfaf80a8fd4c34db558d714f761e543ec4150a4b744d6799a5c

        SHA512

        83da765e47de90db6b773f28c7d040c80384a9c24a9d45f2a1763430eab354456ffda2b341cf34f035918d7dabc8d54f089c9fd0b0320ea8f0c7aad3ecb46456

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0894.exe
        Filesize

        291KB

        MD5

        74d032b6295d42ee3a7ccfe2e2aa6728

        SHA1

        83cb9bdd0698aa4294434e639d3b4b1e62c3ce20

        SHA256

        6cb50dbc4e53ea377d9859f5caffd6764e974f669ee396aec6b6edf4385b5471

        SHA512

        cfb6fb150d5c9f33343a20446ce896131030f35e22050bd2afa9de820d40fc5efdc064e3a392609248f694332fd216efef960dd2e1388f150c11d818e6b1e302

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0894.exe
        Filesize

        291KB

        MD5

        74d032b6295d42ee3a7ccfe2e2aa6728

        SHA1

        83cb9bdd0698aa4294434e639d3b4b1e62c3ce20

        SHA256

        6cb50dbc4e53ea377d9859f5caffd6764e974f669ee396aec6b6edf4385b5471

        SHA512

        cfb6fb150d5c9f33343a20446ce896131030f35e22050bd2afa9de820d40fc5efdc064e3a392609248f694332fd216efef960dd2e1388f150c11d818e6b1e302

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3724.exe
        Filesize

        345KB

        MD5

        7244e0fd6c75d541e214eccdee78b5d5

        SHA1

        a75b7e3b289a18775c993d07831ebd0a28b40d73

        SHA256

        11fc5fc8c279e0f5997f610537665987aec9c2459343efffc0f897d91e57262a

        SHA512

        c5020251c8741e8ae7f2cd9f844c0be1efca0ed34a9af63113c700e5880cbe5edaacf790c0c91b1cb0f0149721a0bd14bf46534a6c1ae97460eab73e598343b7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3724.exe
        Filesize

        345KB

        MD5

        7244e0fd6c75d541e214eccdee78b5d5

        SHA1

        a75b7e3b289a18775c993d07831ebd0a28b40d73

        SHA256

        11fc5fc8c279e0f5997f610537665987aec9c2459343efffc0f897d91e57262a

        SHA512

        c5020251c8741e8ae7f2cd9f844c0be1efca0ed34a9af63113c700e5880cbe5edaacf790c0c91b1cb0f0149721a0bd14bf46534a6c1ae97460eab73e598343b7

      • memory/4056-1102-0x0000000006E10000-0x0000000006F1A000-memory.dmp
        Filesize

        1.0MB

      • memory/4056-1103-0x0000000006F50000-0x0000000006F62000-memory.dmp
        Filesize

        72KB

      • memory/4056-219-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/4056-217-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/4056-215-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/4056-205-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/4056-1116-0x0000000008880000-0x00000000088D0000-memory.dmp
        Filesize

        320KB

      • memory/4056-1115-0x00000000087E0000-0x0000000008856000-memory.dmp
        Filesize

        472KB

      • memory/4056-1114-0x0000000007F90000-0x00000000084BC000-memory.dmp
        Filesize

        5.2MB

      • memory/4056-1113-0x0000000007DC0000-0x0000000007F82000-memory.dmp
        Filesize

        1.8MB

      • memory/4056-1112-0x00000000060F0000-0x0000000006100000-memory.dmp
        Filesize

        64KB

      • memory/4056-1111-0x00000000060F0000-0x0000000006100000-memory.dmp
        Filesize

        64KB

      • memory/4056-1110-0x00000000060F0000-0x0000000006100000-memory.dmp
        Filesize

        64KB

      • memory/4056-207-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/4056-1109-0x00000000060F0000-0x0000000006100000-memory.dmp
        Filesize

        64KB

      • memory/4056-1107-0x0000000007930000-0x00000000079C2000-memory.dmp
        Filesize

        584KB

      • memory/4056-1106-0x0000000007260000-0x00000000072C6000-memory.dmp
        Filesize

        408KB

      • memory/4056-1105-0x00000000060F0000-0x0000000006100000-memory.dmp
        Filesize

        64KB

      • memory/4056-1104-0x0000000006F70000-0x0000000006FAC000-memory.dmp
        Filesize

        240KB

      • memory/4056-221-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/4056-1101-0x00000000067B0000-0x0000000006DC8000-memory.dmp
        Filesize

        6.1MB

      • memory/4056-582-0x00000000060F0000-0x0000000006100000-memory.dmp
        Filesize

        64KB

      • memory/4056-227-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/4056-191-0x0000000001B00000-0x0000000001B4B000-memory.dmp
        Filesize

        300KB

      • memory/4056-192-0x00000000060F0000-0x0000000006100000-memory.dmp
        Filesize

        64KB

      • memory/4056-209-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/4056-194-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/4056-195-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/4056-197-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/4056-199-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/4056-201-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/4056-203-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/4056-225-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/4056-223-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/4056-193-0x00000000060F0000-0x0000000006100000-memory.dmp
        Filesize

        64KB

      • memory/4056-211-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/4056-213-0x0000000005FE0000-0x000000000601F000-memory.dmp
        Filesize

        252KB

      • memory/4296-1122-0x0000000000A20000-0x0000000000A52000-memory.dmp
        Filesize

        200KB

      • memory/4296-1123-0x00000000055D0000-0x00000000055E0000-memory.dmp
        Filesize

        64KB

      • memory/4296-1124-0x00000000055D0000-0x00000000055E0000-memory.dmp
        Filesize

        64KB

      • memory/5112-182-0x0000000004C10000-0x0000000004C20000-memory.dmp
        Filesize

        64KB

      • memory/5112-176-0x0000000005230000-0x0000000005242000-memory.dmp
        Filesize

        72KB

      • memory/5112-160-0x0000000005230000-0x0000000005242000-memory.dmp
        Filesize

        72KB

      • memory/5112-151-0x0000000004C10000-0x0000000004C20000-memory.dmp
        Filesize

        64KB

      • memory/5112-152-0x0000000004C10000-0x0000000004C20000-memory.dmp
        Filesize

        64KB

      • memory/5112-186-0x0000000000400000-0x000000000070B000-memory.dmp
        Filesize

        3.0MB

      • memory/5112-150-0x0000000004C10000-0x0000000004C20000-memory.dmp
        Filesize

        64KB

      • memory/5112-184-0x0000000004C10000-0x0000000004C20000-memory.dmp
        Filesize

        64KB

      • memory/5112-183-0x0000000004C10000-0x0000000004C20000-memory.dmp
        Filesize

        64KB

      • memory/5112-153-0x0000000005230000-0x0000000005242000-memory.dmp
        Filesize

        72KB

      • memory/5112-181-0x0000000000400000-0x000000000070B000-memory.dmp
        Filesize

        3.0MB

      • memory/5112-180-0x0000000005230000-0x0000000005242000-memory.dmp
        Filesize

        72KB

      • memory/5112-178-0x0000000005230000-0x0000000005242000-memory.dmp
        Filesize

        72KB

      • memory/5112-174-0x0000000005230000-0x0000000005242000-memory.dmp
        Filesize

        72KB

      • memory/5112-172-0x0000000005230000-0x0000000005242000-memory.dmp
        Filesize

        72KB

      • memory/5112-170-0x0000000005230000-0x0000000005242000-memory.dmp
        Filesize

        72KB

      • memory/5112-168-0x0000000005230000-0x0000000005242000-memory.dmp
        Filesize

        72KB

      • memory/5112-166-0x0000000005230000-0x0000000005242000-memory.dmp
        Filesize

        72KB

      • memory/5112-164-0x0000000005230000-0x0000000005242000-memory.dmp
        Filesize

        72KB

      • memory/5112-162-0x0000000005230000-0x0000000005242000-memory.dmp
        Filesize

        72KB

      • memory/5112-149-0x0000000000920000-0x000000000094D000-memory.dmp
        Filesize

        180KB

      • memory/5112-148-0x0000000004C20000-0x00000000051C4000-memory.dmp
        Filesize

        5.6MB

      • memory/5112-158-0x0000000005230000-0x0000000005242000-memory.dmp
        Filesize

        72KB

      • memory/5112-156-0x0000000005230000-0x0000000005242000-memory.dmp
        Filesize

        72KB

      • memory/5112-154-0x0000000005230000-0x0000000005242000-memory.dmp
        Filesize

        72KB