Analysis

  • max time kernel
    112s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 08:13

General

  • Target

    56aea7458f3be0f396b0a5525dd538f3b5bb4ee11e6b7c29e730a3853613f484.exe

  • Size

    686KB

  • MD5

    f9cf6ecf63139ee1a722b7f874284bf0

  • SHA1

    a0c7ae2c4ab10993f10c1273205aec9901d1b618

  • SHA256

    56aea7458f3be0f396b0a5525dd538f3b5bb4ee11e6b7c29e730a3853613f484

  • SHA512

    2227e6417fc604002f390b795b234870161247256293ce61d9cc8391feb822c630c83c5c7d0d41787ca0e2cd3e0829e7722ef7f43f3ba8c3bd87576a2a80c61d

  • SSDEEP

    12288:+Mr4y90s4xO8Rb5vsZtvir4RmrbXiP278es4GlIRbb76AUE+4uFkv4by:iyd4xO450ZtvWtyP284gIRz6A9+kQby

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56aea7458f3be0f396b0a5525dd538f3b5bb4ee11e6b7c29e730a3853613f484.exe
    "C:\Users\Admin\AppData\Local\Temp\56aea7458f3be0f396b0a5525dd538f3b5bb4ee11e6b7c29e730a3853613f484.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2724
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un830119.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un830119.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3488
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8881.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8881.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4632
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4632 -s 1080
          4⤵
          • Program crash
          PID:1620
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9870.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9870.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4988
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 1540
          4⤵
          • Program crash
          PID:3224
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si024908.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si024908.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2280
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4632 -ip 4632
    1⤵
      PID:4044
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4988 -ip 4988
      1⤵
        PID:4648

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si024908.exe
        Filesize

        175KB

        MD5

        7d40279478ff8a746421d5b57af2b126

        SHA1

        d9a9a4be8c711be7743a6de02c7083261d5a895f

        SHA256

        e2649f35f02d44c85f3d5d240b5309a77ea208ac488377bf850b5bb2441fff23

        SHA512

        cde2fb21456f954c77ac8a4fe34b00ad96f031ac0fb9b19da46f47af0aa624e21e347238e0addfa80b456fa81c5f77b9743221f3b271fdeae18f85263ba167f7

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si024908.exe
        Filesize

        175KB

        MD5

        7d40279478ff8a746421d5b57af2b126

        SHA1

        d9a9a4be8c711be7743a6de02c7083261d5a895f

        SHA256

        e2649f35f02d44c85f3d5d240b5309a77ea208ac488377bf850b5bb2441fff23

        SHA512

        cde2fb21456f954c77ac8a4fe34b00ad96f031ac0fb9b19da46f47af0aa624e21e347238e0addfa80b456fa81c5f77b9743221f3b271fdeae18f85263ba167f7

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un830119.exe
        Filesize

        544KB

        MD5

        30522dfc1a0317ebff7f71a462e271b9

        SHA1

        cbfbd4beb67f4f424d3e9e34ea232a3118760459

        SHA256

        54ffdbddb8773b7622f15b0bc1fddd340e0bff0b1dbb772b20a62513a11ca87c

        SHA512

        086d53202ea39d057d2da78da3afa789fee71575421c0ad0d7ec465aa2de14143c70e51dedf8a69dc3583217517adc200d06bc91329e016fff6b818b0768278b

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un830119.exe
        Filesize

        544KB

        MD5

        30522dfc1a0317ebff7f71a462e271b9

        SHA1

        cbfbd4beb67f4f424d3e9e34ea232a3118760459

        SHA256

        54ffdbddb8773b7622f15b0bc1fddd340e0bff0b1dbb772b20a62513a11ca87c

        SHA512

        086d53202ea39d057d2da78da3afa789fee71575421c0ad0d7ec465aa2de14143c70e51dedf8a69dc3583217517adc200d06bc91329e016fff6b818b0768278b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8881.exe
        Filesize

        321KB

        MD5

        770287cb47d367426eb9686da6c40197

        SHA1

        2fbe3afbae2cbcd14a6457cc1ab0193bfd3fc7c6

        SHA256

        72883ddfa01bf8f6e53ece5dcab683a57b1f0335767327acab6b8c8e0c398338

        SHA512

        930ef1925722ec12e180506fb73603abcab12fb66526d05f37073779a0221893cb6c57218a7c1a5fe58606423f3e8ddbe21559246a89fdd182ccc0f9c5935aa7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8881.exe
        Filesize

        321KB

        MD5

        770287cb47d367426eb9686da6c40197

        SHA1

        2fbe3afbae2cbcd14a6457cc1ab0193bfd3fc7c6

        SHA256

        72883ddfa01bf8f6e53ece5dcab683a57b1f0335767327acab6b8c8e0c398338

        SHA512

        930ef1925722ec12e180506fb73603abcab12fb66526d05f37073779a0221893cb6c57218a7c1a5fe58606423f3e8ddbe21559246a89fdd182ccc0f9c5935aa7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9870.exe
        Filesize

        380KB

        MD5

        67623de4f26badbc4b24e1cf3f9c6a0d

        SHA1

        bbccfb6d0c7b7be93ad9519d82a684c1e1608709

        SHA256

        40ebfa1dc204b0b8aed6f4018e6e77a4fcb034311f57ef558f56846c52012610

        SHA512

        5563d4684c19ad7de92c965c0d06dfb56d6fbbcfeaa441c8375d7e87a45a34153c2c5bebbb7a729777aec82e70a3ec1d9832d0356e86dffe69f448afa1d08e18

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9870.exe
        Filesize

        380KB

        MD5

        67623de4f26badbc4b24e1cf3f9c6a0d

        SHA1

        bbccfb6d0c7b7be93ad9519d82a684c1e1608709

        SHA256

        40ebfa1dc204b0b8aed6f4018e6e77a4fcb034311f57ef558f56846c52012610

        SHA512

        5563d4684c19ad7de92c965c0d06dfb56d6fbbcfeaa441c8375d7e87a45a34153c2c5bebbb7a729777aec82e70a3ec1d9832d0356e86dffe69f448afa1d08e18

      • memory/2280-1123-0x0000000000CB0000-0x0000000000CE2000-memory.dmp
        Filesize

        200KB

      • memory/2280-1124-0x00000000058A0000-0x00000000058B0000-memory.dmp
        Filesize

        64KB

      • memory/4632-160-0x0000000004C60000-0x0000000004C72000-memory.dmp
        Filesize

        72KB

      • memory/4632-174-0x0000000004C60000-0x0000000004C72000-memory.dmp
        Filesize

        72KB

      • memory/4632-152-0x0000000004C60000-0x0000000004C72000-memory.dmp
        Filesize

        72KB

      • memory/4632-154-0x0000000004C60000-0x0000000004C72000-memory.dmp
        Filesize

        72KB

      • memory/4632-156-0x0000000004C60000-0x0000000004C72000-memory.dmp
        Filesize

        72KB

      • memory/4632-158-0x0000000004C60000-0x0000000004C72000-memory.dmp
        Filesize

        72KB

      • memory/4632-150-0x0000000007120000-0x00000000076C4000-memory.dmp
        Filesize

        5.6MB

      • memory/4632-162-0x0000000004C60000-0x0000000004C72000-memory.dmp
        Filesize

        72KB

      • memory/4632-164-0x0000000004C60000-0x0000000004C72000-memory.dmp
        Filesize

        72KB

      • memory/4632-166-0x0000000004C60000-0x0000000004C72000-memory.dmp
        Filesize

        72KB

      • memory/4632-168-0x0000000004C60000-0x0000000004C72000-memory.dmp
        Filesize

        72KB

      • memory/4632-170-0x0000000004C60000-0x0000000004C72000-memory.dmp
        Filesize

        72KB

      • memory/4632-172-0x0000000004C60000-0x0000000004C72000-memory.dmp
        Filesize

        72KB

      • memory/4632-151-0x0000000004C60000-0x0000000004C72000-memory.dmp
        Filesize

        72KB

      • memory/4632-176-0x0000000004C60000-0x0000000004C72000-memory.dmp
        Filesize

        72KB

      • memory/4632-178-0x0000000004C60000-0x0000000004C72000-memory.dmp
        Filesize

        72KB

      • memory/4632-179-0x0000000004870000-0x0000000004880000-memory.dmp
        Filesize

        64KB

      • memory/4632-180-0x0000000004870000-0x0000000004880000-memory.dmp
        Filesize

        64KB

      • memory/4632-181-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/4632-182-0x0000000004870000-0x0000000004880000-memory.dmp
        Filesize

        64KB

      • memory/4632-183-0x0000000004870000-0x0000000004880000-memory.dmp
        Filesize

        64KB

      • memory/4632-184-0x0000000004870000-0x0000000004880000-memory.dmp
        Filesize

        64KB

      • memory/4632-186-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/4632-149-0x0000000004870000-0x0000000004880000-memory.dmp
        Filesize

        64KB

      • memory/4632-148-0x0000000002C80000-0x0000000002CAD000-memory.dmp
        Filesize

        180KB

      • memory/4988-195-0x0000000007200000-0x0000000007210000-memory.dmp
        Filesize

        64KB

      • memory/4988-226-0x0000000007130000-0x000000000716F000-memory.dmp
        Filesize

        252KB

      • memory/4988-198-0x0000000007130000-0x000000000716F000-memory.dmp
        Filesize

        252KB

      • memory/4988-197-0x0000000007200000-0x0000000007210000-memory.dmp
        Filesize

        64KB

      • memory/4988-193-0x0000000007200000-0x0000000007210000-memory.dmp
        Filesize

        64KB

      • memory/4988-200-0x0000000007130000-0x000000000716F000-memory.dmp
        Filesize

        252KB

      • memory/4988-202-0x0000000007130000-0x000000000716F000-memory.dmp
        Filesize

        252KB

      • memory/4988-204-0x0000000007130000-0x000000000716F000-memory.dmp
        Filesize

        252KB

      • memory/4988-206-0x0000000007130000-0x000000000716F000-memory.dmp
        Filesize

        252KB

      • memory/4988-208-0x0000000007130000-0x000000000716F000-memory.dmp
        Filesize

        252KB

      • memory/4988-210-0x0000000007130000-0x000000000716F000-memory.dmp
        Filesize

        252KB

      • memory/4988-214-0x0000000007130000-0x000000000716F000-memory.dmp
        Filesize

        252KB

      • memory/4988-212-0x0000000007130000-0x000000000716F000-memory.dmp
        Filesize

        252KB

      • memory/4988-218-0x0000000007130000-0x000000000716F000-memory.dmp
        Filesize

        252KB

      • memory/4988-216-0x0000000007130000-0x000000000716F000-memory.dmp
        Filesize

        252KB

      • memory/4988-220-0x0000000007130000-0x000000000716F000-memory.dmp
        Filesize

        252KB

      • memory/4988-222-0x0000000007130000-0x000000000716F000-memory.dmp
        Filesize

        252KB

      • memory/4988-224-0x0000000007130000-0x000000000716F000-memory.dmp
        Filesize

        252KB

      • memory/4988-228-0x0000000007130000-0x000000000716F000-memory.dmp
        Filesize

        252KB

      • memory/4988-194-0x0000000007130000-0x000000000716F000-memory.dmp
        Filesize

        252KB

      • memory/4988-1101-0x00000000077C0000-0x0000000007DD8000-memory.dmp
        Filesize

        6.1MB

      • memory/4988-1102-0x0000000007E30000-0x0000000007F3A000-memory.dmp
        Filesize

        1.0MB

      • memory/4988-1103-0x0000000007F70000-0x0000000007F82000-memory.dmp
        Filesize

        72KB

      • memory/4988-1104-0x0000000007F90000-0x0000000007FCC000-memory.dmp
        Filesize

        240KB

      • memory/4988-1105-0x0000000007200000-0x0000000007210000-memory.dmp
        Filesize

        64KB

      • memory/4988-1107-0x0000000008280000-0x0000000008312000-memory.dmp
        Filesize

        584KB

      • memory/4988-1108-0x0000000008320000-0x0000000008386000-memory.dmp
        Filesize

        408KB

      • memory/4988-1109-0x0000000007200000-0x0000000007210000-memory.dmp
        Filesize

        64KB

      • memory/4988-1110-0x0000000007200000-0x0000000007210000-memory.dmp
        Filesize

        64KB

      • memory/4988-1111-0x0000000007200000-0x0000000007210000-memory.dmp
        Filesize

        64KB

      • memory/4988-1112-0x0000000008A50000-0x0000000008C12000-memory.dmp
        Filesize

        1.8MB

      • memory/4988-1113-0x0000000008C20000-0x000000000914C000-memory.dmp
        Filesize

        5.2MB

      • memory/4988-1114-0x0000000007200000-0x0000000007210000-memory.dmp
        Filesize

        64KB

      • memory/4988-192-0x0000000007130000-0x000000000716F000-memory.dmp
        Filesize

        252KB

      • memory/4988-191-0x0000000002C90000-0x0000000002CDB000-memory.dmp
        Filesize

        300KB

      • memory/4988-1115-0x0000000009280000-0x00000000092F6000-memory.dmp
        Filesize

        472KB

      • memory/4988-1116-0x0000000009300000-0x0000000009350000-memory.dmp
        Filesize

        320KB