Analysis

  • max time kernel
    130s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 08:12

General

  • Target

    c6219fd8353f56e73fb02c27e03c3e4cb9d2ebfad9c4c49eea4315d2a88eb3d7.exe

  • Size

    685KB

  • MD5

    c7ae216ae7cd212b835134c78b3a76c8

  • SHA1

    007e58d8d1c85d2f3266207d3a0dbcab97aea06c

  • SHA256

    c6219fd8353f56e73fb02c27e03c3e4cb9d2ebfad9c4c49eea4315d2a88eb3d7

  • SHA512

    98285b651cc6df5a9fef1ce5d14499a382d18589403c3f4554395c7bc8950ecfe8b092a398ad6386c30308b00c8ec2837cddbd7254810f1cd0416d1405135905

  • SSDEEP

    12288:HMray90Tul/IY8b6rvYS1okRKzAjgRUb3XFyljQqE5Rt52UDmNO3:pyour8bpSyAcRAXYJQx5RT27NQ

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6219fd8353f56e73fb02c27e03c3e4cb9d2ebfad9c4c49eea4315d2a88eb3d7.exe
    "C:\Users\Admin\AppData\Local\Temp\c6219fd8353f56e73fb02c27e03c3e4cb9d2ebfad9c4c49eea4315d2a88eb3d7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4400
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un353740.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un353740.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1008
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8651.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8651.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4760
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4760 -s 1080
          4⤵
          • Program crash
          PID:3316
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4483.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4483.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2352
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2352 -s 1328
          4⤵
          • Program crash
          PID:1388
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si774506.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si774506.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2300
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 4760 -ip 4760
    1⤵
      PID:1908
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2352 -ip 2352
      1⤵
        PID:1016
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:5000

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si774506.exe
        Filesize

        175KB

        MD5

        8d3c1a1c3fe3885f28900f32708170af

        SHA1

        642fca80bf2c6783d4856a24c204883edfac4ac2

        SHA256

        ffa9205cc70f79538d69cada4267a4037eec2b5b2c4298a0061f852dd17098af

        SHA512

        8484d025b1f78ae3e1319ce4f9cd22e01210f296ec238a96f149bbbcfba5cfe1c1e3ee4775a0c1309b5767f96b96a47a72681fff96c2eb9e819a0f5899483774

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si774506.exe
        Filesize

        175KB

        MD5

        8d3c1a1c3fe3885f28900f32708170af

        SHA1

        642fca80bf2c6783d4856a24c204883edfac4ac2

        SHA256

        ffa9205cc70f79538d69cada4267a4037eec2b5b2c4298a0061f852dd17098af

        SHA512

        8484d025b1f78ae3e1319ce4f9cd22e01210f296ec238a96f149bbbcfba5cfe1c1e3ee4775a0c1309b5767f96b96a47a72681fff96c2eb9e819a0f5899483774

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un353740.exe
        Filesize

        544KB

        MD5

        2533d60ffb170d83a79f31f472f9da35

        SHA1

        278d480aae6e4e3b04b4279f92956eebb16a5144

        SHA256

        e19d8cdcf7eb7da18fe7bc4e7027d9702f58946acfc128484a3e3badd1ac4bc8

        SHA512

        d90250948ba6808b2956b7a8c3c15a8a509d0ae7f9b0965e7e0a7a7ef06d577f4d494d8db44d6c3f9216371c6f6a77195ba9b2c64ab610579f642cdab613e716

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un353740.exe
        Filesize

        544KB

        MD5

        2533d60ffb170d83a79f31f472f9da35

        SHA1

        278d480aae6e4e3b04b4279f92956eebb16a5144

        SHA256

        e19d8cdcf7eb7da18fe7bc4e7027d9702f58946acfc128484a3e3badd1ac4bc8

        SHA512

        d90250948ba6808b2956b7a8c3c15a8a509d0ae7f9b0965e7e0a7a7ef06d577f4d494d8db44d6c3f9216371c6f6a77195ba9b2c64ab610579f642cdab613e716

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8651.exe
        Filesize

        321KB

        MD5

        36d65663a1d3465266951c2be5198d89

        SHA1

        1b46be78692d725d4127f9b281032ef05b0d9d8a

        SHA256

        6365a2f630778ad2fe01fef178a693abff82baa686aac162804b95aa1e3a4125

        SHA512

        b4444703489b5524e84cc052e5e89fa69b0a64b4a4b27c7112e8279e49c9248d51c79683e26ce65de7e5ef20d14474e326cf9b3e6dbfa2af28f915342ed5f090

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8651.exe
        Filesize

        321KB

        MD5

        36d65663a1d3465266951c2be5198d89

        SHA1

        1b46be78692d725d4127f9b281032ef05b0d9d8a

        SHA256

        6365a2f630778ad2fe01fef178a693abff82baa686aac162804b95aa1e3a4125

        SHA512

        b4444703489b5524e84cc052e5e89fa69b0a64b4a4b27c7112e8279e49c9248d51c79683e26ce65de7e5ef20d14474e326cf9b3e6dbfa2af28f915342ed5f090

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4483.exe
        Filesize

        380KB

        MD5

        e9719ac56ce87283e8ed4eb58275ec1c

        SHA1

        f1ab380f89b6b22e8b1014dedb49fd41c9f8affe

        SHA256

        97aa7d2a08b4c7c74b627da9ac4baf36cc2b9a44c944ec3f228c95ff23e867b1

        SHA512

        399569accaa87fb81be9539207ebe95b946fb843c07648ee713f53afe0b5580ca068b41ceeaace58ce7cb7c0a955f621c7183f5eba9c5b3bf5b60bb494fa89ae

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4483.exe
        Filesize

        380KB

        MD5

        e9719ac56ce87283e8ed4eb58275ec1c

        SHA1

        f1ab380f89b6b22e8b1014dedb49fd41c9f8affe

        SHA256

        97aa7d2a08b4c7c74b627da9ac4baf36cc2b9a44c944ec3f228c95ff23e867b1

        SHA512

        399569accaa87fb81be9539207ebe95b946fb843c07648ee713f53afe0b5580ca068b41ceeaace58ce7cb7c0a955f621c7183f5eba9c5b3bf5b60bb494fa89ae

      • memory/2300-1124-0x00000000054E0000-0x00000000054F0000-memory.dmp
        Filesize

        64KB

      • memory/2300-1123-0x00000000054E0000-0x00000000054F0000-memory.dmp
        Filesize

        64KB

      • memory/2300-1122-0x00000000008F0000-0x0000000000922000-memory.dmp
        Filesize

        200KB

      • memory/2352-1102-0x0000000007F70000-0x000000000807A000-memory.dmp
        Filesize

        1.0MB

      • memory/2352-1105-0x0000000002F80000-0x0000000002F90000-memory.dmp
        Filesize

        64KB

      • memory/2352-1116-0x0000000002F80000-0x0000000002F90000-memory.dmp
        Filesize

        64KB

      • memory/2352-1115-0x0000000008F90000-0x00000000094BC000-memory.dmp
        Filesize

        5.2MB

      • memory/2352-1114-0x0000000008DA0000-0x0000000008F62000-memory.dmp
        Filesize

        1.8MB

      • memory/2352-1113-0x0000000002F80000-0x0000000002F90000-memory.dmp
        Filesize

        64KB

      • memory/2352-1112-0x0000000002F80000-0x0000000002F90000-memory.dmp
        Filesize

        64KB

      • memory/2352-1111-0x0000000002F80000-0x0000000002F90000-memory.dmp
        Filesize

        64KB

      • memory/2352-1110-0x0000000008BF0000-0x0000000008C40000-memory.dmp
        Filesize

        320KB

      • memory/2352-1109-0x0000000008B60000-0x0000000008BD6000-memory.dmp
        Filesize

        472KB

      • memory/2352-1108-0x0000000008A90000-0x0000000008B22000-memory.dmp
        Filesize

        584KB

      • memory/2352-1107-0x00000000083C0000-0x0000000008426000-memory.dmp
        Filesize

        408KB

      • memory/2352-1104-0x00000000080D0000-0x000000000810C000-memory.dmp
        Filesize

        240KB

      • memory/2352-1103-0x00000000080B0000-0x00000000080C2000-memory.dmp
        Filesize

        72KB

      • memory/2352-1101-0x00000000078D0000-0x0000000007EE8000-memory.dmp
        Filesize

        6.1MB

      • memory/2352-228-0x0000000007710000-0x000000000774F000-memory.dmp
        Filesize

        252KB

      • memory/2352-226-0x0000000007710000-0x000000000774F000-memory.dmp
        Filesize

        252KB

      • memory/2352-224-0x0000000007710000-0x000000000774F000-memory.dmp
        Filesize

        252KB

      • memory/2352-222-0x0000000007710000-0x000000000774F000-memory.dmp
        Filesize

        252KB

      • memory/2352-220-0x0000000007710000-0x000000000774F000-memory.dmp
        Filesize

        252KB

      • memory/2352-191-0x0000000007710000-0x000000000774F000-memory.dmp
        Filesize

        252KB

      • memory/2352-192-0x0000000007710000-0x000000000774F000-memory.dmp
        Filesize

        252KB

      • memory/2352-194-0x0000000002B90000-0x0000000002BDB000-memory.dmp
        Filesize

        300KB

      • memory/2352-195-0x0000000007710000-0x000000000774F000-memory.dmp
        Filesize

        252KB

      • memory/2352-196-0x0000000002F80000-0x0000000002F90000-memory.dmp
        Filesize

        64KB

      • memory/2352-200-0x0000000002F80000-0x0000000002F90000-memory.dmp
        Filesize

        64KB

      • memory/2352-199-0x0000000007710000-0x000000000774F000-memory.dmp
        Filesize

        252KB

      • memory/2352-198-0x0000000002F80000-0x0000000002F90000-memory.dmp
        Filesize

        64KB

      • memory/2352-202-0x0000000007710000-0x000000000774F000-memory.dmp
        Filesize

        252KB

      • memory/2352-204-0x0000000007710000-0x000000000774F000-memory.dmp
        Filesize

        252KB

      • memory/2352-206-0x0000000007710000-0x000000000774F000-memory.dmp
        Filesize

        252KB

      • memory/2352-208-0x0000000007710000-0x000000000774F000-memory.dmp
        Filesize

        252KB

      • memory/2352-216-0x0000000007710000-0x000000000774F000-memory.dmp
        Filesize

        252KB

      • memory/2352-214-0x0000000007710000-0x000000000774F000-memory.dmp
        Filesize

        252KB

      • memory/2352-212-0x0000000007710000-0x000000000774F000-memory.dmp
        Filesize

        252KB

      • memory/2352-210-0x0000000007710000-0x000000000774F000-memory.dmp
        Filesize

        252KB

      • memory/2352-218-0x0000000007710000-0x000000000774F000-memory.dmp
        Filesize

        252KB

      • memory/4760-178-0x0000000004C90000-0x0000000004CA2000-memory.dmp
        Filesize

        72KB

      • memory/4760-184-0x0000000007250000-0x0000000007260000-memory.dmp
        Filesize

        64KB

      • memory/4760-158-0x0000000004C90000-0x0000000004CA2000-memory.dmp
        Filesize

        72KB

      • memory/4760-185-0x0000000007250000-0x0000000007260000-memory.dmp
        Filesize

        64KB

      • memory/4760-176-0x0000000007250000-0x0000000007260000-memory.dmp
        Filesize

        64KB

      • memory/4760-183-0x0000000007250000-0x0000000007260000-memory.dmp
        Filesize

        64KB

      • memory/4760-156-0x0000000004C90000-0x0000000004CA2000-memory.dmp
        Filesize

        72KB

      • memory/4760-174-0x0000000007250000-0x0000000007260000-memory.dmp
        Filesize

        64KB

      • memory/4760-172-0x0000000004C90000-0x0000000004CA2000-memory.dmp
        Filesize

        72KB

      • memory/4760-162-0x0000000004C90000-0x0000000004CA2000-memory.dmp
        Filesize

        72KB

      • memory/4760-177-0x0000000007250000-0x0000000007260000-memory.dmp
        Filesize

        64KB

      • memory/4760-180-0x0000000004C90000-0x0000000004CA2000-memory.dmp
        Filesize

        72KB

      • memory/4760-186-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/4760-160-0x0000000004C90000-0x0000000004CA2000-memory.dmp
        Filesize

        72KB

      • memory/4760-181-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/4760-173-0x0000000002C70000-0x0000000002C9D000-memory.dmp
        Filesize

        180KB

      • memory/4760-170-0x0000000004C90000-0x0000000004CA2000-memory.dmp
        Filesize

        72KB

      • memory/4760-168-0x0000000004C90000-0x0000000004CA2000-memory.dmp
        Filesize

        72KB

      • memory/4760-166-0x0000000004C90000-0x0000000004CA2000-memory.dmp
        Filesize

        72KB

      • memory/4760-164-0x0000000004C90000-0x0000000004CA2000-memory.dmp
        Filesize

        72KB

      • memory/4760-152-0x0000000004C90000-0x0000000004CA2000-memory.dmp
        Filesize

        72KB

      • memory/4760-154-0x0000000004C90000-0x0000000004CA2000-memory.dmp
        Filesize

        72KB

      • memory/4760-150-0x0000000004C90000-0x0000000004CA2000-memory.dmp
        Filesize

        72KB

      • memory/4760-149-0x0000000004C90000-0x0000000004CA2000-memory.dmp
        Filesize

        72KB

      • memory/4760-148-0x0000000007260000-0x0000000007804000-memory.dmp
        Filesize

        5.6MB