Analysis

  • max time kernel
    145s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 06:35

General

  • Target

    aeb220eb68f9d0f461c9e2e34fcbd9e3fa53612e381ddc8ca56c48063e390e1e.exe

  • Size

    684KB

  • MD5

    601a0f7921be7d616e2436b0a720d435

  • SHA1

    bbbcfd9230fafdb9776261f1eb88bf0908d8a199

  • SHA256

    aeb220eb68f9d0f461c9e2e34fcbd9e3fa53612e381ddc8ca56c48063e390e1e

  • SHA512

    7b017860c1054b104df03b47a36aa6e04d59ebbe98ae0494cf86d67b5676eecccddba96052a81dcda7c70d5eadbb25a22f62595497a4ff59642b1b2024a347d6

  • SSDEEP

    12288:bMrMy90gBtj1k7G7DETVD4u0INO3RCuWL5Bpt4CWSDt9B:7yLT7DETVsuAWLVWWt9B

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aeb220eb68f9d0f461c9e2e34fcbd9e3fa53612e381ddc8ca56c48063e390e1e.exe
    "C:\Users\Admin\AppData\Local\Temp\aeb220eb68f9d0f461c9e2e34fcbd9e3fa53612e381ddc8ca56c48063e390e1e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1304
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un429969.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un429969.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1456
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5021.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5021.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1524
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1524 -s 1092
          4⤵
          • Program crash
          PID:5056
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6183.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6183.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2332
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 1328
          4⤵
          • Program crash
          PID:540
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si085857.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si085857.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:216
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 384 -p 1524 -ip 1524
    1⤵
      PID:2060
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 2332 -ip 2332
      1⤵
        PID:1300
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:1828

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si085857.exe
        Filesize

        175KB

        MD5

        a7ffe7f6d5722dc328fa6ae1462a866b

        SHA1

        0a8349d4df0610c75bbcb4a90ec8c35a3aee3a60

        SHA256

        f759067e77767f40e5857190b0431ec99f382837f97a7c8f19d58cd530f214aa

        SHA512

        2fd94ca5914423653604ac2c2857062a40079acaf0fd59c3b8dbd4bb8834b805b70ae4ac0dae7ae1713edf974397732047308f1ec6c6098d9a990c6ae99beb2b

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si085857.exe
        Filesize

        175KB

        MD5

        a7ffe7f6d5722dc328fa6ae1462a866b

        SHA1

        0a8349d4df0610c75bbcb4a90ec8c35a3aee3a60

        SHA256

        f759067e77767f40e5857190b0431ec99f382837f97a7c8f19d58cd530f214aa

        SHA512

        2fd94ca5914423653604ac2c2857062a40079acaf0fd59c3b8dbd4bb8834b805b70ae4ac0dae7ae1713edf974397732047308f1ec6c6098d9a990c6ae99beb2b

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un429969.exe
        Filesize

        541KB

        MD5

        916555b047313d9e75d7e69b8fbed60e

        SHA1

        d52e05fbc47f36dba12e35e331dd6bd0a7081458

        SHA256

        23232ce3f478569138a04316d25e1a47d0d79fbee6e4683933121b08c110200a

        SHA512

        74c4ea5dad16438acebe43eeb3a3c3639847652868506a59e30322ce8083f799feedd83f743c607d3ff0f28bf3f8c9303c7e11c5b89bf95d3dddf03f906a5251

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un429969.exe
        Filesize

        541KB

        MD5

        916555b047313d9e75d7e69b8fbed60e

        SHA1

        d52e05fbc47f36dba12e35e331dd6bd0a7081458

        SHA256

        23232ce3f478569138a04316d25e1a47d0d79fbee6e4683933121b08c110200a

        SHA512

        74c4ea5dad16438acebe43eeb3a3c3639847652868506a59e30322ce8083f799feedd83f743c607d3ff0f28bf3f8c9303c7e11c5b89bf95d3dddf03f906a5251

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5021.exe
        Filesize

        322KB

        MD5

        864e6a6237ef5900d4160606848ee6f0

        SHA1

        613a19cb25d0a6ba8b4d681cea35ebe8bfc87866

        SHA256

        f27c08369c2bb630b1712bbc9d986eab0aed6ac1088d646c4dc3075445ae4c3e

        SHA512

        fdfef3426778ed3d99b0e5abaa71fe9f2c9336a44a03061b799816645655fa8dabc9ed9578549853fe5da5808623ee121b002d6c7ef928f9735c736cc2e03397

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5021.exe
        Filesize

        322KB

        MD5

        864e6a6237ef5900d4160606848ee6f0

        SHA1

        613a19cb25d0a6ba8b4d681cea35ebe8bfc87866

        SHA256

        f27c08369c2bb630b1712bbc9d986eab0aed6ac1088d646c4dc3075445ae4c3e

        SHA512

        fdfef3426778ed3d99b0e5abaa71fe9f2c9336a44a03061b799816645655fa8dabc9ed9578549853fe5da5808623ee121b002d6c7ef928f9735c736cc2e03397

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6183.exe
        Filesize

        379KB

        MD5

        f46c44f4df4891313bb7f361efbaba95

        SHA1

        beefb123781e4b99ede07cfd73572cb145216eae

        SHA256

        482bfd93f65320357b646934f50e6b87493d13abb02502fa0fb651d1b5a2d1c9

        SHA512

        6d214a7e8434f00f57877eb90d1c00786ce56bcb537509f52e77e2c7688a2f189feb05fb12087709263dad442ebf4df01002182b063b7f1cb61e84753746a70e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6183.exe
        Filesize

        379KB

        MD5

        f46c44f4df4891313bb7f361efbaba95

        SHA1

        beefb123781e4b99ede07cfd73572cb145216eae

        SHA256

        482bfd93f65320357b646934f50e6b87493d13abb02502fa0fb651d1b5a2d1c9

        SHA512

        6d214a7e8434f00f57877eb90d1c00786ce56bcb537509f52e77e2c7688a2f189feb05fb12087709263dad442ebf4df01002182b063b7f1cb61e84753746a70e

      • memory/216-1119-0x00000000000F0000-0x0000000000122000-memory.dmp
        Filesize

        200KB

      • memory/216-1120-0x0000000004CE0000-0x0000000004CF0000-memory.dmp
        Filesize

        64KB

      • memory/216-1121-0x0000000004CE0000-0x0000000004CF0000-memory.dmp
        Filesize

        64KB

      • memory/1524-159-0x0000000004B80000-0x0000000004B92000-memory.dmp
        Filesize

        72KB

      • memory/1524-171-0x0000000004B80000-0x0000000004B92000-memory.dmp
        Filesize

        72KB

      • memory/1524-153-0x0000000004B80000-0x0000000004B92000-memory.dmp
        Filesize

        72KB

      • memory/1524-155-0x0000000004B80000-0x0000000004B92000-memory.dmp
        Filesize

        72KB

      • memory/1524-157-0x0000000004B80000-0x0000000004B92000-memory.dmp
        Filesize

        72KB

      • memory/1524-150-0x0000000004B80000-0x0000000004B92000-memory.dmp
        Filesize

        72KB

      • memory/1524-161-0x0000000004B80000-0x0000000004B92000-memory.dmp
        Filesize

        72KB

      • memory/1524-163-0x0000000004B80000-0x0000000004B92000-memory.dmp
        Filesize

        72KB

      • memory/1524-165-0x0000000004B80000-0x0000000004B92000-memory.dmp
        Filesize

        72KB

      • memory/1524-167-0x0000000004B80000-0x0000000004B92000-memory.dmp
        Filesize

        72KB

      • memory/1524-169-0x0000000004B80000-0x0000000004B92000-memory.dmp
        Filesize

        72KB

      • memory/1524-151-0x0000000004B80000-0x0000000004B92000-memory.dmp
        Filesize

        72KB

      • memory/1524-177-0x0000000004B80000-0x0000000004B92000-memory.dmp
        Filesize

        72KB

      • memory/1524-175-0x0000000004B80000-0x0000000004B92000-memory.dmp
        Filesize

        72KB

      • memory/1524-173-0x0000000004B80000-0x0000000004B92000-memory.dmp
        Filesize

        72KB

      • memory/1524-178-0x00000000072A0000-0x00000000072B0000-memory.dmp
        Filesize

        64KB

      • memory/1524-179-0x00000000072A0000-0x00000000072B0000-memory.dmp
        Filesize

        64KB

      • memory/1524-180-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/1524-182-0x00000000072A0000-0x00000000072B0000-memory.dmp
        Filesize

        64KB

      • memory/1524-183-0x00000000072A0000-0x00000000072B0000-memory.dmp
        Filesize

        64KB

      • memory/1524-184-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/1524-149-0x00000000072B0000-0x0000000007854000-memory.dmp
        Filesize

        5.6MB

      • memory/1524-148-0x0000000002B80000-0x0000000002BAD000-memory.dmp
        Filesize

        180KB

      • memory/2332-190-0x00000000072B0000-0x00000000072C0000-memory.dmp
        Filesize

        64KB

      • memory/2332-223-0x0000000007150000-0x000000000718F000-memory.dmp
        Filesize

        252KB

      • memory/2332-193-0x0000000007150000-0x000000000718F000-memory.dmp
        Filesize

        252KB

      • memory/2332-195-0x0000000007150000-0x000000000718F000-memory.dmp
        Filesize

        252KB

      • memory/2332-197-0x0000000007150000-0x000000000718F000-memory.dmp
        Filesize

        252KB

      • memory/2332-199-0x0000000007150000-0x000000000718F000-memory.dmp
        Filesize

        252KB

      • memory/2332-201-0x0000000007150000-0x000000000718F000-memory.dmp
        Filesize

        252KB

      • memory/2332-203-0x0000000007150000-0x000000000718F000-memory.dmp
        Filesize

        252KB

      • memory/2332-205-0x0000000007150000-0x000000000718F000-memory.dmp
        Filesize

        252KB

      • memory/2332-207-0x0000000007150000-0x000000000718F000-memory.dmp
        Filesize

        252KB

      • memory/2332-209-0x0000000007150000-0x000000000718F000-memory.dmp
        Filesize

        252KB

      • memory/2332-211-0x0000000007150000-0x000000000718F000-memory.dmp
        Filesize

        252KB

      • memory/2332-213-0x0000000007150000-0x000000000718F000-memory.dmp
        Filesize

        252KB

      • memory/2332-215-0x0000000007150000-0x000000000718F000-memory.dmp
        Filesize

        252KB

      • memory/2332-217-0x0000000007150000-0x000000000718F000-memory.dmp
        Filesize

        252KB

      • memory/2332-219-0x0000000007150000-0x000000000718F000-memory.dmp
        Filesize

        252KB

      • memory/2332-221-0x0000000007150000-0x000000000718F000-memory.dmp
        Filesize

        252KB

      • memory/2332-192-0x0000000007150000-0x000000000718F000-memory.dmp
        Filesize

        252KB

      • memory/2332-225-0x0000000007150000-0x000000000718F000-memory.dmp
        Filesize

        252KB

      • memory/2332-239-0x00000000072B0000-0x00000000072C0000-memory.dmp
        Filesize

        64KB

      • memory/2332-1099-0x0000000007970000-0x0000000007F88000-memory.dmp
        Filesize

        6.1MB

      • memory/2332-1100-0x0000000007F90000-0x000000000809A000-memory.dmp
        Filesize

        1.0MB

      • memory/2332-1101-0x00000000080B0000-0x00000000080C2000-memory.dmp
        Filesize

        72KB

      • memory/2332-1102-0x00000000080D0000-0x000000000810C000-memory.dmp
        Filesize

        240KB

      • memory/2332-1103-0x00000000072B0000-0x00000000072C0000-memory.dmp
        Filesize

        64KB

      • memory/2332-1105-0x00000000083C0000-0x0000000008426000-memory.dmp
        Filesize

        408KB

      • memory/2332-1106-0x0000000008A80000-0x0000000008B12000-memory.dmp
        Filesize

        584KB

      • memory/2332-1107-0x00000000072B0000-0x00000000072C0000-memory.dmp
        Filesize

        64KB

      • memory/2332-1108-0x00000000072B0000-0x00000000072C0000-memory.dmp
        Filesize

        64KB

      • memory/2332-1109-0x0000000008C60000-0x0000000008CD6000-memory.dmp
        Filesize

        472KB

      • memory/2332-1110-0x0000000008CF0000-0x0000000008D40000-memory.dmp
        Filesize

        320KB

      • memory/2332-191-0x00000000072B0000-0x00000000072C0000-memory.dmp
        Filesize

        64KB

      • memory/2332-189-0x0000000002C60000-0x0000000002CAB000-memory.dmp
        Filesize

        300KB

      • memory/2332-1111-0x00000000072B0000-0x00000000072C0000-memory.dmp
        Filesize

        64KB

      • memory/2332-1112-0x000000000A030000-0x000000000A1F2000-memory.dmp
        Filesize

        1.8MB

      • memory/2332-1113-0x000000000A200000-0x000000000A72C000-memory.dmp
        Filesize

        5.2MB