Analysis

  • max time kernel
    109s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 07:18

General

  • Target

    893fc9c0be532e821b34b5894c68937293ea927da28be1267837c695e1332a0f.exe

  • Size

    687KB

  • MD5

    4b32bc6709823587a1e442364422eb14

  • SHA1

    3c3b0cd70f179ec809db6bb70b0a88daefe691a6

  • SHA256

    893fc9c0be532e821b34b5894c68937293ea927da28be1267837c695e1332a0f

  • SHA512

    76e7770589d30f29c65b6d1fb60e489cb66bb574303ca38ef962d8188a9bb45b391a592876b6251ccf6c81bb7ddffaf7dd641415178b0df7505e9c497f28ac42

  • SSDEEP

    12288:FMrcy90I65n0Kqzwjx46yjCp+R5gvPl839veU03uXmkipB5R:FyxKwwjyjCI5Et8NmpuXy5R

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\893fc9c0be532e821b34b5894c68937293ea927da28be1267837c695e1332a0f.exe
    "C:\Users\Admin\AppData\Local\Temp\893fc9c0be532e821b34b5894c68937293ea927da28be1267837c695e1332a0f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3516
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un923950.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un923950.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3036
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1367.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1367.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4192
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4192 -s 1080
          4⤵
          • Program crash
          PID:1568
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9377.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9377.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1328
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1328 -s 1540
          4⤵
          • Program crash
          PID:1432
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si819521.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si819521.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3656
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4192 -ip 4192
    1⤵
      PID:836
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 1328 -ip 1328
      1⤵
        PID:1404

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si819521.exe
        Filesize

        175KB

        MD5

        1dbb95e02a115ee6885714de41059b12

        SHA1

        863bf14a3fa3b341ecc38569172a2cf5b49b0f5a

        SHA256

        12f7996d5ec06d15920fdb0f4b4404a4f48e11ec3a552b95c77f821f836a8691

        SHA512

        7374d0b6bf260e4968d3e450048aaed8ee4bc4014fc8b89f333330b3268837fc4ef1d9a6e756d6f3c7336b5689e9e166cadeb8e2f20c19e2b614cba204f27b96

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si819521.exe
        Filesize

        175KB

        MD5

        1dbb95e02a115ee6885714de41059b12

        SHA1

        863bf14a3fa3b341ecc38569172a2cf5b49b0f5a

        SHA256

        12f7996d5ec06d15920fdb0f4b4404a4f48e11ec3a552b95c77f821f836a8691

        SHA512

        7374d0b6bf260e4968d3e450048aaed8ee4bc4014fc8b89f333330b3268837fc4ef1d9a6e756d6f3c7336b5689e9e166cadeb8e2f20c19e2b614cba204f27b96

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un923950.exe
        Filesize

        545KB

        MD5

        b2ea1494535a55799562bffa7460ffe8

        SHA1

        27584f74ad628bb8c73b2f1034bbf8e182847a12

        SHA256

        217966639ed011cce8293ed6d60b4e1e953878bbaf7d7a7f544dfe844b828496

        SHA512

        850ecfa647f334e3986f2298b7b7761e04e6ecf856d00b2b4c4bc3f83ba6ca8b2f0224320165f8bc301e26f097cd844c2016b318051b28c8ae7e70087a5f122d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un923950.exe
        Filesize

        545KB

        MD5

        b2ea1494535a55799562bffa7460ffe8

        SHA1

        27584f74ad628bb8c73b2f1034bbf8e182847a12

        SHA256

        217966639ed011cce8293ed6d60b4e1e953878bbaf7d7a7f544dfe844b828496

        SHA512

        850ecfa647f334e3986f2298b7b7761e04e6ecf856d00b2b4c4bc3f83ba6ca8b2f0224320165f8bc301e26f097cd844c2016b318051b28c8ae7e70087a5f122d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1367.exe
        Filesize

        321KB

        MD5

        31714c7ee1cb6456779619aa7ebcea49

        SHA1

        3448ec0ad5adb7251dedeb9cd434a4c22775e8e8

        SHA256

        eaf2b941d6decad66342802952aa2c083ca6daa0ba53c8f74759bae926af8b8a

        SHA512

        f0f73f1e81226a31a252a30686f57e426650bd9120ec96f444c28d4e08889c3f893f41ae637525f2a49575b87491813be75f763d7b692d4883a61ef38a5cdafd

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1367.exe
        Filesize

        321KB

        MD5

        31714c7ee1cb6456779619aa7ebcea49

        SHA1

        3448ec0ad5adb7251dedeb9cd434a4c22775e8e8

        SHA256

        eaf2b941d6decad66342802952aa2c083ca6daa0ba53c8f74759bae926af8b8a

        SHA512

        f0f73f1e81226a31a252a30686f57e426650bd9120ec96f444c28d4e08889c3f893f41ae637525f2a49575b87491813be75f763d7b692d4883a61ef38a5cdafd

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9377.exe
        Filesize

        380KB

        MD5

        eb16b672faec43d2e16ea2647db78bb9

        SHA1

        c1250b91290dfa2eec74c371cffe1b6f5fba998f

        SHA256

        8ebd0a62fc6e3c661d1f2dbf475b3be2df74a90aaca5e4385ea27a5b1a866cdf

        SHA512

        cb23b6465eff5e670482a404f290d7ee9051980b88547a4a9c4ea368b659f45967a2b08941f9616f304b3bf18873f88b93c494e62714029ae1dcac7acb4acbdc

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9377.exe
        Filesize

        380KB

        MD5

        eb16b672faec43d2e16ea2647db78bb9

        SHA1

        c1250b91290dfa2eec74c371cffe1b6f5fba998f

        SHA256

        8ebd0a62fc6e3c661d1f2dbf475b3be2df74a90aaca5e4385ea27a5b1a866cdf

        SHA512

        cb23b6465eff5e670482a404f290d7ee9051980b88547a4a9c4ea368b659f45967a2b08941f9616f304b3bf18873f88b93c494e62714029ae1dcac7acb4acbdc

      • memory/1328-1102-0x0000000007F20000-0x000000000802A000-memory.dmp
        Filesize

        1.0MB

      • memory/1328-1103-0x0000000007280000-0x0000000007292000-memory.dmp
        Filesize

        72KB

      • memory/1328-209-0x0000000004DF0000-0x0000000004E2F000-memory.dmp
        Filesize

        252KB

      • memory/1328-211-0x0000000004DF0000-0x0000000004E2F000-memory.dmp
        Filesize

        252KB

      • memory/1328-219-0x0000000004DF0000-0x0000000004E2F000-memory.dmp
        Filesize

        252KB

      • memory/1328-205-0x0000000004DF0000-0x0000000004E2F000-memory.dmp
        Filesize

        252KB

      • memory/1328-1116-0x000000000CB80000-0x000000000CBD0000-memory.dmp
        Filesize

        320KB

      • memory/1328-1115-0x000000000CB00000-0x000000000CB76000-memory.dmp
        Filesize

        472KB

      • memory/1328-1114-0x0000000007340000-0x0000000007350000-memory.dmp
        Filesize

        64KB

      • memory/1328-1113-0x0000000007340000-0x0000000007350000-memory.dmp
        Filesize

        64KB

      • memory/1328-1112-0x0000000008D50000-0x000000000927C000-memory.dmp
        Filesize

        5.2MB

      • memory/1328-1111-0x0000000008B80000-0x0000000008D42000-memory.dmp
        Filesize

        1.8MB

      • memory/1328-1110-0x0000000008320000-0x0000000008386000-memory.dmp
        Filesize

        408KB

      • memory/1328-207-0x0000000004DF0000-0x0000000004E2F000-memory.dmp
        Filesize

        252KB

      • memory/1328-1109-0x0000000008280000-0x0000000008312000-memory.dmp
        Filesize

        584KB

      • memory/1328-1108-0x0000000007340000-0x0000000007350000-memory.dmp
        Filesize

        64KB

      • memory/1328-1107-0x0000000007340000-0x0000000007350000-memory.dmp
        Filesize

        64KB

      • memory/1328-1105-0x0000000007340000-0x0000000007350000-memory.dmp
        Filesize

        64KB

      • memory/1328-1104-0x00000000072A0000-0x00000000072DC000-memory.dmp
        Filesize

        240KB

      • memory/1328-223-0x0000000004DF0000-0x0000000004E2F000-memory.dmp
        Filesize

        252KB

      • memory/1328-1101-0x0000000007900000-0x0000000007F18000-memory.dmp
        Filesize

        6.1MB

      • memory/1328-231-0x0000000007340000-0x0000000007350000-memory.dmp
        Filesize

        64KB

      • memory/1328-227-0x0000000004DF0000-0x0000000004E2F000-memory.dmp
        Filesize

        252KB

      • memory/1328-192-0x0000000007340000-0x0000000007350000-memory.dmp
        Filesize

        64KB

      • memory/1328-191-0x0000000002BE0000-0x0000000002C2B000-memory.dmp
        Filesize

        300KB

      • memory/1328-215-0x0000000004DF0000-0x0000000004E2F000-memory.dmp
        Filesize

        252KB

      • memory/1328-194-0x0000000004DF0000-0x0000000004E2F000-memory.dmp
        Filesize

        252KB

      • memory/1328-197-0x0000000004DF0000-0x0000000004E2F000-memory.dmp
        Filesize

        252KB

      • memory/1328-199-0x0000000004DF0000-0x0000000004E2F000-memory.dmp
        Filesize

        252KB

      • memory/1328-195-0x0000000004DF0000-0x0000000004E2F000-memory.dmp
        Filesize

        252KB

      • memory/1328-201-0x0000000004DF0000-0x0000000004E2F000-memory.dmp
        Filesize

        252KB

      • memory/1328-203-0x0000000004DF0000-0x0000000004E2F000-memory.dmp
        Filesize

        252KB

      • memory/1328-225-0x0000000004DF0000-0x0000000004E2F000-memory.dmp
        Filesize

        252KB

      • memory/1328-221-0x0000000004DF0000-0x0000000004E2F000-memory.dmp
        Filesize

        252KB

      • memory/1328-193-0x0000000007340000-0x0000000007350000-memory.dmp
        Filesize

        64KB

      • memory/1328-217-0x0000000004DF0000-0x0000000004E2F000-memory.dmp
        Filesize

        252KB

      • memory/1328-213-0x0000000004DF0000-0x0000000004E2F000-memory.dmp
        Filesize

        252KB

      • memory/3656-1122-0x00000000007F0000-0x0000000000822000-memory.dmp
        Filesize

        200KB

      • memory/3656-1123-0x0000000005230000-0x0000000005240000-memory.dmp
        Filesize

        64KB

      • memory/3656-1124-0x0000000005230000-0x0000000005240000-memory.dmp
        Filesize

        64KB

      • memory/4192-183-0x00000000049C0000-0x00000000049D0000-memory.dmp
        Filesize

        64KB

      • memory/4192-178-0x00000000049C0000-0x00000000049D0000-memory.dmp
        Filesize

        64KB

      • memory/4192-165-0x00000000077F0000-0x0000000007802000-memory.dmp
        Filesize

        72KB

      • memory/4192-151-0x00000000077F0000-0x0000000007802000-memory.dmp
        Filesize

        72KB

      • memory/4192-153-0x00000000077F0000-0x0000000007802000-memory.dmp
        Filesize

        72KB

      • memory/4192-186-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/4192-150-0x00000000077F0000-0x0000000007802000-memory.dmp
        Filesize

        72KB

      • memory/4192-184-0x00000000049C0000-0x00000000049D0000-memory.dmp
        Filesize

        64KB

      • memory/4192-185-0x00000000049C0000-0x00000000049D0000-memory.dmp
        Filesize

        64KB

      • memory/4192-155-0x00000000077F0000-0x0000000007802000-memory.dmp
        Filesize

        72KB

      • memory/4192-181-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/4192-180-0x00000000049C0000-0x00000000049D0000-memory.dmp
        Filesize

        64KB

      • memory/4192-179-0x00000000049C0000-0x00000000049D0000-memory.dmp
        Filesize

        64KB

      • memory/4192-177-0x00000000077F0000-0x0000000007802000-memory.dmp
        Filesize

        72KB

      • memory/4192-175-0x00000000077F0000-0x0000000007802000-memory.dmp
        Filesize

        72KB

      • memory/4192-173-0x00000000077F0000-0x0000000007802000-memory.dmp
        Filesize

        72KB

      • memory/4192-171-0x00000000077F0000-0x0000000007802000-memory.dmp
        Filesize

        72KB

      • memory/4192-169-0x00000000077F0000-0x0000000007802000-memory.dmp
        Filesize

        72KB

      • memory/4192-167-0x00000000077F0000-0x0000000007802000-memory.dmp
        Filesize

        72KB

      • memory/4192-163-0x00000000077F0000-0x0000000007802000-memory.dmp
        Filesize

        72KB

      • memory/4192-149-0x0000000007200000-0x00000000077A4000-memory.dmp
        Filesize

        5.6MB

      • memory/4192-148-0x0000000002C50000-0x0000000002C7D000-memory.dmp
        Filesize

        180KB

      • memory/4192-161-0x00000000077F0000-0x0000000007802000-memory.dmp
        Filesize

        72KB

      • memory/4192-159-0x00000000077F0000-0x0000000007802000-memory.dmp
        Filesize

        72KB

      • memory/4192-157-0x00000000077F0000-0x0000000007802000-memory.dmp
        Filesize

        72KB