Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 07:01

General

  • Target

    39d0f3882a21f01f30a17d08ecdeef30c8911de72a1e3fabcc47f092aaa09f5a.exe

  • Size

    683KB

  • MD5

    081161c6465db8861adccd529b205aa4

  • SHA1

    07042eb39b99bdf31003cc3ea3a1705a158d3ba7

  • SHA256

    39d0f3882a21f01f30a17d08ecdeef30c8911de72a1e3fabcc47f092aaa09f5a

  • SHA512

    79144611c8823c81ba5ca69d25f82c1eef69cfc82fbe214a84d9652e2e5c89d444eff8059dbcc1e17ceecaa123e50b50068f9e41441abae5062f5a1cdb78a216

  • SSDEEP

    12288:MMriy90lmePo/RYemFqD4xAj0dNauAeS2As38gLfJZ4aWbrk2lqPS:WyDigGtFqkG7uN3DTRqNqq

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\39d0f3882a21f01f30a17d08ecdeef30c8911de72a1e3fabcc47f092aaa09f5a.exe
    "C:\Users\Admin\AppData\Local\Temp\39d0f3882a21f01f30a17d08ecdeef30c8911de72a1e3fabcc47f092aaa09f5a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4416
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un816425.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un816425.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3192
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7678.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7678.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4668
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4668 -s 1084
          4⤵
          • Program crash
          PID:872
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3026.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3026.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1372
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 1132
          4⤵
          • Program crash
          PID:452
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si246222.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si246222.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4900
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4668 -ip 4668
    1⤵
      PID:3460
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 1372 -ip 1372
      1⤵
        PID:3376

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si246222.exe
        Filesize

        175KB

        MD5

        c0a286fc30b6dd42c8a7a4d571b8a1d4

        SHA1

        0563597d446f01302599a148e43c0c0e3e6ddbb5

        SHA256

        db5c8693d0b5dd591727eb78aeb6b873e7c51fac179babf3dcd1f5e67f96022d

        SHA512

        45bc79ab008c8202e035cc5757721229719a14ed20d8419db8d22de2f5b7a1f003210e8d8e2670190617b5b6cdf3ef2f2b63b08dd30f37a58826a3af56fd5eba

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si246222.exe
        Filesize

        175KB

        MD5

        c0a286fc30b6dd42c8a7a4d571b8a1d4

        SHA1

        0563597d446f01302599a148e43c0c0e3e6ddbb5

        SHA256

        db5c8693d0b5dd591727eb78aeb6b873e7c51fac179babf3dcd1f5e67f96022d

        SHA512

        45bc79ab008c8202e035cc5757721229719a14ed20d8419db8d22de2f5b7a1f003210e8d8e2670190617b5b6cdf3ef2f2b63b08dd30f37a58826a3af56fd5eba

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un816425.exe
        Filesize

        541KB

        MD5

        dd28253ce00a93cfa6825723e07f4eef

        SHA1

        9edbaaa28642db68679af6b2a68a9ad779abf06f

        SHA256

        63a762bdd311bbd000b75783a55576f5e6ecd8b3ec1f21ed26d4bf438d1da0c1

        SHA512

        1dc9cccaf6c90a78723b2ae639236114998ad1d2e6c5432e39ec5f54317358a51ceaab9859415a4bf4dabfb62bbdc23c21f28b992d90cf3319a29f68470a4811

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un816425.exe
        Filesize

        541KB

        MD5

        dd28253ce00a93cfa6825723e07f4eef

        SHA1

        9edbaaa28642db68679af6b2a68a9ad779abf06f

        SHA256

        63a762bdd311bbd000b75783a55576f5e6ecd8b3ec1f21ed26d4bf438d1da0c1

        SHA512

        1dc9cccaf6c90a78723b2ae639236114998ad1d2e6c5432e39ec5f54317358a51ceaab9859415a4bf4dabfb62bbdc23c21f28b992d90cf3319a29f68470a4811

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7678.exe
        Filesize

        322KB

        MD5

        64ad31c522454dbda0a4efd39069629b

        SHA1

        f7a6f169afb133380b0ee47513655afd6c8c620d

        SHA256

        d11d6990e40d51f9fd971c1264c0135c00ac5b53a5ddcc804bb05c5122500612

        SHA512

        4220c51d6de52e48ea392fa5e6a03af711df3eb7f68b89115f164b8abba6bd035fee03c33ba6a2baacf732d7a8820c31dbdb33b7ef8095f325be9816f5576e0b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7678.exe
        Filesize

        322KB

        MD5

        64ad31c522454dbda0a4efd39069629b

        SHA1

        f7a6f169afb133380b0ee47513655afd6c8c620d

        SHA256

        d11d6990e40d51f9fd971c1264c0135c00ac5b53a5ddcc804bb05c5122500612

        SHA512

        4220c51d6de52e48ea392fa5e6a03af711df3eb7f68b89115f164b8abba6bd035fee03c33ba6a2baacf732d7a8820c31dbdb33b7ef8095f325be9816f5576e0b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3026.exe
        Filesize

        379KB

        MD5

        d00b78889346979fa450b16b2018ca85

        SHA1

        d5090ecf12c4b8f66fdd7dbf30b28479bcc23fc1

        SHA256

        349b483eed61c0a4065f2475bdaa7c91b4930f6f2838663f1911e90a07b07b7a

        SHA512

        819b9c97ca8ed7f8cd47974a29415021d749d04046474c5bf246a0ee05ae9859a6fd86a23e78d93efb831498ced5f248b978faf0a84d97fac08ad5f3251b0d31

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3026.exe
        Filesize

        379KB

        MD5

        d00b78889346979fa450b16b2018ca85

        SHA1

        d5090ecf12c4b8f66fdd7dbf30b28479bcc23fc1

        SHA256

        349b483eed61c0a4065f2475bdaa7c91b4930f6f2838663f1911e90a07b07b7a

        SHA512

        819b9c97ca8ed7f8cd47974a29415021d749d04046474c5bf246a0ee05ae9859a6fd86a23e78d93efb831498ced5f248b978faf0a84d97fac08ad5f3251b0d31

      • memory/1372-1102-0x0000000007F70000-0x000000000807A000-memory.dmp
        Filesize

        1.0MB

      • memory/1372-226-0x0000000007180000-0x00000000071BF000-memory.dmp
        Filesize

        252KB

      • memory/1372-200-0x0000000007180000-0x00000000071BF000-memory.dmp
        Filesize

        252KB

      • memory/1372-202-0x0000000007180000-0x00000000071BF000-memory.dmp
        Filesize

        252KB

      • memory/1372-1115-0x00000000096A0000-0x00000000096F0000-memory.dmp
        Filesize

        320KB

      • memory/1372-1114-0x0000000009620000-0x0000000009696000-memory.dmp
        Filesize

        472KB

      • memory/1372-1113-0x0000000008E50000-0x000000000937C000-memory.dmp
        Filesize

        5.2MB

      • memory/1372-1112-0x0000000008C80000-0x0000000008E42000-memory.dmp
        Filesize

        1.8MB

      • memory/1372-1111-0x00000000071D0000-0x00000000071E0000-memory.dmp
        Filesize

        64KB

      • memory/1372-1110-0x00000000071D0000-0x00000000071E0000-memory.dmp
        Filesize

        64KB

      • memory/1372-204-0x0000000007180000-0x00000000071BF000-memory.dmp
        Filesize

        252KB

      • memory/1372-1109-0x00000000071D0000-0x00000000071E0000-memory.dmp
        Filesize

        64KB

      • memory/1372-1108-0x0000000008460000-0x00000000084C6000-memory.dmp
        Filesize

        408KB

      • memory/1372-1107-0x00000000083C0000-0x0000000008452000-memory.dmp
        Filesize

        584KB

      • memory/1372-1105-0x00000000071D0000-0x00000000071E0000-memory.dmp
        Filesize

        64KB

      • memory/1372-1104-0x00000000080D0000-0x000000000810C000-memory.dmp
        Filesize

        240KB

      • memory/1372-1103-0x00000000080B0000-0x00000000080C2000-memory.dmp
        Filesize

        72KB

      • memory/1372-1101-0x00000000078D0000-0x0000000007EE8000-memory.dmp
        Filesize

        6.1MB

      • memory/1372-228-0x0000000007180000-0x00000000071BF000-memory.dmp
        Filesize

        252KB

      • memory/1372-214-0x0000000007180000-0x00000000071BF000-memory.dmp
        Filesize

        252KB

      • memory/1372-224-0x0000000007180000-0x00000000071BF000-memory.dmp
        Filesize

        252KB

      • memory/1372-222-0x0000000007180000-0x00000000071BF000-memory.dmp
        Filesize

        252KB

      • memory/1372-220-0x0000000007180000-0x00000000071BF000-memory.dmp
        Filesize

        252KB

      • memory/1372-191-0x0000000002B90000-0x0000000002BDB000-memory.dmp
        Filesize

        300KB

      • memory/1372-192-0x00000000071D0000-0x00000000071E0000-memory.dmp
        Filesize

        64KB

      • memory/1372-196-0x00000000071D0000-0x00000000071E0000-memory.dmp
        Filesize

        64KB

      • memory/1372-194-0x00000000071D0000-0x00000000071E0000-memory.dmp
        Filesize

        64KB

      • memory/1372-195-0x0000000007180000-0x00000000071BF000-memory.dmp
        Filesize

        252KB

      • memory/1372-193-0x0000000007180000-0x00000000071BF000-memory.dmp
        Filesize

        252KB

      • memory/1372-198-0x0000000007180000-0x00000000071BF000-memory.dmp
        Filesize

        252KB

      • memory/1372-218-0x0000000007180000-0x00000000071BF000-memory.dmp
        Filesize

        252KB

      • memory/1372-1116-0x00000000071D0000-0x00000000071E0000-memory.dmp
        Filesize

        64KB

      • memory/1372-216-0x0000000007180000-0x00000000071BF000-memory.dmp
        Filesize

        252KB

      • memory/1372-206-0x0000000007180000-0x00000000071BF000-memory.dmp
        Filesize

        252KB

      • memory/1372-208-0x0000000007180000-0x00000000071BF000-memory.dmp
        Filesize

        252KB

      • memory/1372-210-0x0000000007180000-0x00000000071BF000-memory.dmp
        Filesize

        252KB

      • memory/1372-212-0x0000000007180000-0x00000000071BF000-memory.dmp
        Filesize

        252KB

      • memory/4668-181-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/4668-172-0x0000000007220000-0x0000000007232000-memory.dmp
        Filesize

        72KB

      • memory/4668-148-0x0000000002C50000-0x0000000002C7D000-memory.dmp
        Filesize

        180KB

      • memory/4668-151-0x0000000007220000-0x0000000007232000-memory.dmp
        Filesize

        72KB

      • memory/4668-152-0x0000000007220000-0x0000000007232000-memory.dmp
        Filesize

        72KB

      • memory/4668-186-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/4668-185-0x0000000007330000-0x0000000007340000-memory.dmp
        Filesize

        64KB

      • memory/4668-184-0x0000000007330000-0x0000000007340000-memory.dmp
        Filesize

        64KB

      • memory/4668-182-0x0000000007330000-0x0000000007340000-memory.dmp
        Filesize

        64KB

      • memory/4668-150-0x0000000007340000-0x00000000078E4000-memory.dmp
        Filesize

        5.6MB

      • memory/4668-154-0x0000000007220000-0x0000000007232000-memory.dmp
        Filesize

        72KB

      • memory/4668-180-0x0000000007330000-0x0000000007340000-memory.dmp
        Filesize

        64KB

      • memory/4668-179-0x0000000007330000-0x0000000007340000-memory.dmp
        Filesize

        64KB

      • memory/4668-178-0x0000000007220000-0x0000000007232000-memory.dmp
        Filesize

        72KB

      • memory/4668-176-0x0000000007220000-0x0000000007232000-memory.dmp
        Filesize

        72KB

      • memory/4668-174-0x0000000007220000-0x0000000007232000-memory.dmp
        Filesize

        72KB

      • memory/4668-170-0x0000000007220000-0x0000000007232000-memory.dmp
        Filesize

        72KB

      • memory/4668-168-0x0000000007220000-0x0000000007232000-memory.dmp
        Filesize

        72KB

      • memory/4668-166-0x0000000007220000-0x0000000007232000-memory.dmp
        Filesize

        72KB

      • memory/4668-164-0x0000000007220000-0x0000000007232000-memory.dmp
        Filesize

        72KB

      • memory/4668-162-0x0000000007220000-0x0000000007232000-memory.dmp
        Filesize

        72KB

      • memory/4668-160-0x0000000007220000-0x0000000007232000-memory.dmp
        Filesize

        72KB

      • memory/4668-158-0x0000000007220000-0x0000000007232000-memory.dmp
        Filesize

        72KB

      • memory/4668-149-0x0000000007330000-0x0000000007340000-memory.dmp
        Filesize

        64KB

      • memory/4668-156-0x0000000007220000-0x0000000007232000-memory.dmp
        Filesize

        72KB

      • memory/4900-1122-0x0000000000920000-0x0000000000952000-memory.dmp
        Filesize

        200KB

      • memory/4900-1123-0x00000000051D0000-0x00000000051E0000-memory.dmp
        Filesize

        64KB