Analysis

  • max time kernel
    128s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 07:15

General

  • Target

    812c86103c9e4bb29ffbb249cb8f057add2a08c1adc7d4050290c88b3307c28a.exe

  • Size

    687KB

  • MD5

    a49ce846a74fce3f014bbf0ee3b32d81

  • SHA1

    f00e603f7d66e957d63987cb50024a8aa2a8f868

  • SHA256

    812c86103c9e4bb29ffbb249cb8f057add2a08c1adc7d4050290c88b3307c28a

  • SHA512

    13e7e92d9fe5f5cb7c3019f801120e7f935654a7b1bf99b2df546ebeee7f0105ec2d8a7db80d755e6fca90d15065a7294a80fd86cd20df9f7d4ef563a37dbc79

  • SSDEEP

    12288:EMrLy9059oa4lqp9H7FUk6yjCdUR5QiQvr8p5UqbuX8aepAKoQ:3yX09H7FljCG5Kr8PBuXLUoQ

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\812c86103c9e4bb29ffbb249cb8f057add2a08c1adc7d4050290c88b3307c28a.exe
    "C:\Users\Admin\AppData\Local\Temp\812c86103c9e4bb29ffbb249cb8f057add2a08c1adc7d4050290c88b3307c28a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4480
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un096874.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un096874.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1348
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2130.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2130.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1788
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 1084
          4⤵
          • Program crash
          PID:4556
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1149.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1149.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1952
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 1772
          4⤵
          • Program crash
          PID:856
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si000809.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si000809.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4608
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1788 -ip 1788
    1⤵
      PID:4544
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1952 -ip 1952
      1⤵
        PID:2100

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si000809.exe
        Filesize

        175KB

        MD5

        953948aa76c6166504e804faf29b654d

        SHA1

        c8ba4e788eb252a7874f2f0caf2b9cca00618056

        SHA256

        cd8e26021ab132581f9c9159cf0bd5708b4bf5ad9e6ce1b256dbf0ff4a0321e9

        SHA512

        58c1669cc483be1fe009c8d6277b336d99f26edb0a2490836e7627cbb143dcf09df6c0df82dc1d17928babb72d14d2eba6d26e77c28a24868d15dfdd982a1cdd

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si000809.exe
        Filesize

        175KB

        MD5

        953948aa76c6166504e804faf29b654d

        SHA1

        c8ba4e788eb252a7874f2f0caf2b9cca00618056

        SHA256

        cd8e26021ab132581f9c9159cf0bd5708b4bf5ad9e6ce1b256dbf0ff4a0321e9

        SHA512

        58c1669cc483be1fe009c8d6277b336d99f26edb0a2490836e7627cbb143dcf09df6c0df82dc1d17928babb72d14d2eba6d26e77c28a24868d15dfdd982a1cdd

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un096874.exe
        Filesize

        545KB

        MD5

        ab41efebaa682b7c9c4716f2b7800fa3

        SHA1

        f4848cb9ed5fd7b4cfc11512c3770a4b0e867179

        SHA256

        94e2cc962902057318dad537f9000dbe7c8aba0a02d6c5d18e4f793ab06397d1

        SHA512

        ff3a38371aee05793d68ec2b41d15a02644e4fb389f601af71a007d37157dde06f432074a0b82a43d6030bfb569586e8ce479aff0604d39afc7c1730071a7596

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un096874.exe
        Filesize

        545KB

        MD5

        ab41efebaa682b7c9c4716f2b7800fa3

        SHA1

        f4848cb9ed5fd7b4cfc11512c3770a4b0e867179

        SHA256

        94e2cc962902057318dad537f9000dbe7c8aba0a02d6c5d18e4f793ab06397d1

        SHA512

        ff3a38371aee05793d68ec2b41d15a02644e4fb389f601af71a007d37157dde06f432074a0b82a43d6030bfb569586e8ce479aff0604d39afc7c1730071a7596

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2130.exe
        Filesize

        321KB

        MD5

        cd11a933c899bb55437da71a5b6e48de

        SHA1

        ccc05229aeeaa7bb1b9516fab86a553e65db2667

        SHA256

        b57f93a027fdbbfcf4572cd204e898422c6d3fbd0cdb0a191b008473159b8b8a

        SHA512

        c046cce930cdd90058e5de654f7c576ba11be64cf4144f1ad5346b91de009c04ab8044e166a02fc5fab6a6e91a4f7ff257e8c8956097928d90bb167205019361

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2130.exe
        Filesize

        321KB

        MD5

        cd11a933c899bb55437da71a5b6e48de

        SHA1

        ccc05229aeeaa7bb1b9516fab86a553e65db2667

        SHA256

        b57f93a027fdbbfcf4572cd204e898422c6d3fbd0cdb0a191b008473159b8b8a

        SHA512

        c046cce930cdd90058e5de654f7c576ba11be64cf4144f1ad5346b91de009c04ab8044e166a02fc5fab6a6e91a4f7ff257e8c8956097928d90bb167205019361

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1149.exe
        Filesize

        380KB

        MD5

        4aefcff8775793114625b68b834a1f30

        SHA1

        e8b0bad9648b24025f81fd1e9e442f0d9b2916e1

        SHA256

        a142771a9c4e9a8e08b571301388c513a1c532a3801f8fa0eea1cd2f54bc31d6

        SHA512

        e8675da88579a5c186db9d6d930cfb335de1d3a8220cb300891f2b280497b5e427fe042b78b8498220a1f0083f1d822e585a49ab00839b1e9ddcffbc45a9db40

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1149.exe
        Filesize

        380KB

        MD5

        4aefcff8775793114625b68b834a1f30

        SHA1

        e8b0bad9648b24025f81fd1e9e442f0d9b2916e1

        SHA256

        a142771a9c4e9a8e08b571301388c513a1c532a3801f8fa0eea1cd2f54bc31d6

        SHA512

        e8675da88579a5c186db9d6d930cfb335de1d3a8220cb300891f2b280497b5e427fe042b78b8498220a1f0083f1d822e585a49ab00839b1e9ddcffbc45a9db40

      • memory/1788-148-0x0000000002B80000-0x0000000002BAD000-memory.dmp
        Filesize

        180KB

      • memory/1788-149-0x00000000070B0000-0x0000000007654000-memory.dmp
        Filesize

        5.6MB

      • memory/1788-150-0x00000000076A0000-0x00000000076B2000-memory.dmp
        Filesize

        72KB

      • memory/1788-151-0x00000000076A0000-0x00000000076B2000-memory.dmp
        Filesize

        72KB

      • memory/1788-153-0x00000000076A0000-0x00000000076B2000-memory.dmp
        Filesize

        72KB

      • memory/1788-155-0x00000000076A0000-0x00000000076B2000-memory.dmp
        Filesize

        72KB

      • memory/1788-161-0x00000000076A0000-0x00000000076B2000-memory.dmp
        Filesize

        72KB

      • memory/1788-159-0x00000000076A0000-0x00000000076B2000-memory.dmp
        Filesize

        72KB

      • memory/1788-163-0x00000000076A0000-0x00000000076B2000-memory.dmp
        Filesize

        72KB

      • memory/1788-157-0x00000000076A0000-0x00000000076B2000-memory.dmp
        Filesize

        72KB

      • memory/1788-165-0x00000000076A0000-0x00000000076B2000-memory.dmp
        Filesize

        72KB

      • memory/1788-169-0x00000000076A0000-0x00000000076B2000-memory.dmp
        Filesize

        72KB

      • memory/1788-171-0x00000000076A0000-0x00000000076B2000-memory.dmp
        Filesize

        72KB

      • memory/1788-177-0x00000000076A0000-0x00000000076B2000-memory.dmp
        Filesize

        72KB

      • memory/1788-175-0x00000000076A0000-0x00000000076B2000-memory.dmp
        Filesize

        72KB

      • memory/1788-173-0x00000000076A0000-0x00000000076B2000-memory.dmp
        Filesize

        72KB

      • memory/1788-167-0x00000000076A0000-0x00000000076B2000-memory.dmp
        Filesize

        72KB

      • memory/1788-178-0x00000000070A0000-0x00000000070B0000-memory.dmp
        Filesize

        64KB

      • memory/1788-180-0x00000000070A0000-0x00000000070B0000-memory.dmp
        Filesize

        64KB

      • memory/1788-179-0x00000000070A0000-0x00000000070B0000-memory.dmp
        Filesize

        64KB

      • memory/1788-181-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/1788-183-0x00000000070A0000-0x00000000070B0000-memory.dmp
        Filesize

        64KB

      • memory/1788-184-0x00000000070A0000-0x00000000070B0000-memory.dmp
        Filesize

        64KB

      • memory/1788-185-0x00000000070A0000-0x00000000070B0000-memory.dmp
        Filesize

        64KB

      • memory/1788-186-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/1952-191-0x0000000004CF0000-0x0000000004D2F000-memory.dmp
        Filesize

        252KB

      • memory/1952-194-0x0000000004CF0000-0x0000000004D2F000-memory.dmp
        Filesize

        252KB

      • memory/1952-192-0x0000000004CF0000-0x0000000004D2F000-memory.dmp
        Filesize

        252KB

      • memory/1952-200-0x0000000004CF0000-0x0000000004D2F000-memory.dmp
        Filesize

        252KB

      • memory/1952-198-0x0000000004CF0000-0x0000000004D2F000-memory.dmp
        Filesize

        252KB

      • memory/1952-196-0x0000000004CF0000-0x0000000004D2F000-memory.dmp
        Filesize

        252KB

      • memory/1952-202-0x0000000004CF0000-0x0000000004D2F000-memory.dmp
        Filesize

        252KB

      • memory/1952-204-0x0000000004CF0000-0x0000000004D2F000-memory.dmp
        Filesize

        252KB

      • memory/1952-206-0x0000000004CF0000-0x0000000004D2F000-memory.dmp
        Filesize

        252KB

      • memory/1952-208-0x0000000004CF0000-0x0000000004D2F000-memory.dmp
        Filesize

        252KB

      • memory/1952-210-0x0000000004CF0000-0x0000000004D2F000-memory.dmp
        Filesize

        252KB

      • memory/1952-212-0x0000000004CF0000-0x0000000004D2F000-memory.dmp
        Filesize

        252KB

      • memory/1952-216-0x0000000004CF0000-0x0000000004D2F000-memory.dmp
        Filesize

        252KB

      • memory/1952-214-0x0000000004CF0000-0x0000000004D2F000-memory.dmp
        Filesize

        252KB

      • memory/1952-218-0x0000000004CF0000-0x0000000004D2F000-memory.dmp
        Filesize

        252KB

      • memory/1952-220-0x0000000004CF0000-0x0000000004D2F000-memory.dmp
        Filesize

        252KB

      • memory/1952-222-0x0000000004CF0000-0x0000000004D2F000-memory.dmp
        Filesize

        252KB

      • memory/1952-225-0x0000000004CF0000-0x0000000004D2F000-memory.dmp
        Filesize

        252KB

      • memory/1952-226-0x0000000004CE0000-0x0000000004CF0000-memory.dmp
        Filesize

        64KB

      • memory/1952-230-0x0000000004CE0000-0x0000000004CF0000-memory.dmp
        Filesize

        64KB

      • memory/1952-228-0x0000000004CE0000-0x0000000004CF0000-memory.dmp
        Filesize

        64KB

      • memory/1952-224-0x0000000002CA0000-0x0000000002CEB000-memory.dmp
        Filesize

        300KB

      • memory/1952-1101-0x0000000007790000-0x0000000007DA8000-memory.dmp
        Filesize

        6.1MB

      • memory/1952-1102-0x0000000007E30000-0x0000000007F3A000-memory.dmp
        Filesize

        1.0MB

      • memory/1952-1103-0x0000000007F70000-0x0000000007F82000-memory.dmp
        Filesize

        72KB

      • memory/1952-1104-0x0000000007F90000-0x0000000007FCC000-memory.dmp
        Filesize

        240KB

      • memory/1952-1105-0x0000000004CE0000-0x0000000004CF0000-memory.dmp
        Filesize

        64KB

      • memory/1952-1107-0x0000000004CE0000-0x0000000004CF0000-memory.dmp
        Filesize

        64KB

      • memory/1952-1108-0x0000000004CE0000-0x0000000004CF0000-memory.dmp
        Filesize

        64KB

      • memory/1952-1109-0x0000000004CE0000-0x0000000004CF0000-memory.dmp
        Filesize

        64KB

      • memory/1952-1110-0x0000000008280000-0x00000000082E6000-memory.dmp
        Filesize

        408KB

      • memory/1952-1111-0x0000000008A80000-0x0000000008B12000-memory.dmp
        Filesize

        584KB

      • memory/1952-1112-0x0000000008B70000-0x0000000008BE6000-memory.dmp
        Filesize

        472KB

      • memory/1952-1113-0x0000000008BF0000-0x0000000008C40000-memory.dmp
        Filesize

        320KB

      • memory/1952-1114-0x0000000008C70000-0x0000000008E32000-memory.dmp
        Filesize

        1.8MB

      • memory/1952-1115-0x0000000008E40000-0x000000000936C000-memory.dmp
        Filesize

        5.2MB

      • memory/1952-1116-0x0000000004CE0000-0x0000000004CF0000-memory.dmp
        Filesize

        64KB

      • memory/4608-1123-0x0000000000CD0000-0x0000000000D02000-memory.dmp
        Filesize

        200KB

      • memory/4608-1124-0x0000000005540000-0x0000000005550000-memory.dmp
        Filesize

        64KB

      • memory/4608-1125-0x0000000005540000-0x0000000005550000-memory.dmp
        Filesize

        64KB