Analysis

  • max time kernel
    90s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 07:41

General

  • Target

    121f150b73aeaf7f2e0da2dadbcc30da5893fb0a00427f208af862c21155abd5.exe

  • Size

    682KB

  • MD5

    565bd7f600da882212dee93b68512c9d

  • SHA1

    da45f3b132f50b20981f720558aad49e14194f1e

  • SHA256

    121f150b73aeaf7f2e0da2dadbcc30da5893fb0a00427f208af862c21155abd5

  • SHA512

    aba2c87876fef0ff83a69cea3bc3c559f9a5a80f32f428965ff634d82ea04dffce52b669d6e932cee0efffe0ef7464ff597fe61b462feb8b8dedb729601bb04e

  • SSDEEP

    12288:cMrAy90pJsPeKxv9ohjzxTbrxO39xv/n7WMwCUUxZmhL3DY5P6/o:0yCJsPeKB9ohBTbrKtj+CU8mhLzY9F

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\121f150b73aeaf7f2e0da2dadbcc30da5893fb0a00427f208af862c21155abd5.exe
    "C:\Users\Admin\AppData\Local\Temp\121f150b73aeaf7f2e0da2dadbcc30da5893fb0a00427f208af862c21155abd5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4212
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un067958.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un067958.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4568
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1457.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1457.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:456
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 456 -s 1080
          4⤵
          • Program crash
          PID:4924
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1374.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1374.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3760
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3760 -s 1348
          4⤵
          • Program crash
          PID:4496
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si363001.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si363001.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4572
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 456 -ip 456
    1⤵
      PID:4748
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3760 -ip 3760
      1⤵
        PID:5008

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si363001.exe
        Filesize

        175KB

        MD5

        9df3b75ffc090517685e2793aee73a2c

        SHA1

        8baa4a1d5f43ff3e593101e5c8fd2826cc2e21c1

        SHA256

        b014dbfff4cbfc6efe103ed5f85912460d81cc290bac2f80b1c527cd30cbba13

        SHA512

        199ce2c78a05c8326e5fb256053921815fa501c8603e3e3b50559a3392ba2d70124f40c6f5f93b829f956f0f7ff87c0a2f2a01d936862789b21441a8b9decdbc

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si363001.exe
        Filesize

        175KB

        MD5

        9df3b75ffc090517685e2793aee73a2c

        SHA1

        8baa4a1d5f43ff3e593101e5c8fd2826cc2e21c1

        SHA256

        b014dbfff4cbfc6efe103ed5f85912460d81cc290bac2f80b1c527cd30cbba13

        SHA512

        199ce2c78a05c8326e5fb256053921815fa501c8603e3e3b50559a3392ba2d70124f40c6f5f93b829f956f0f7ff87c0a2f2a01d936862789b21441a8b9decdbc

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un067958.exe
        Filesize

        540KB

        MD5

        ee75c19736bdc4cede57204370706cb7

        SHA1

        24a77f980725e20f1bc866c488fa8eeca76668ad

        SHA256

        eed09910ec0b538a160a6a857ac84c67475353632bfd8e0c520b9ac8b0901c0d

        SHA512

        07d75a4f103f6d20258edeb8c4ca1176212106f874f39038301396d83b7ff40e567cc00713713db285f44f6192ce45face03b85edd76134822a6dc64f1fb4a46

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un067958.exe
        Filesize

        540KB

        MD5

        ee75c19736bdc4cede57204370706cb7

        SHA1

        24a77f980725e20f1bc866c488fa8eeca76668ad

        SHA256

        eed09910ec0b538a160a6a857ac84c67475353632bfd8e0c520b9ac8b0901c0d

        SHA512

        07d75a4f103f6d20258edeb8c4ca1176212106f874f39038301396d83b7ff40e567cc00713713db285f44f6192ce45face03b85edd76134822a6dc64f1fb4a46

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1457.exe
        Filesize

        321KB

        MD5

        c7c85e6fc9b608f780ef1e4b648adcc8

        SHA1

        edde48b1e0bc835ba45d10f6cc9e52af39538352

        SHA256

        f769ea33c303e37c6857be37ae316b473dfc1e8d57726cefefb4eb747438b570

        SHA512

        cfad07c07993b14f220d4d27d23b902f62819a2d212ea8ad5047faa8b42590ad42961ad36271f5f14c9de05088ecf4b4494c84f831d04d256d62803e071d074f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1457.exe
        Filesize

        321KB

        MD5

        c7c85e6fc9b608f780ef1e4b648adcc8

        SHA1

        edde48b1e0bc835ba45d10f6cc9e52af39538352

        SHA256

        f769ea33c303e37c6857be37ae316b473dfc1e8d57726cefefb4eb747438b570

        SHA512

        cfad07c07993b14f220d4d27d23b902f62819a2d212ea8ad5047faa8b42590ad42961ad36271f5f14c9de05088ecf4b4494c84f831d04d256d62803e071d074f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1374.exe
        Filesize

        380KB

        MD5

        050665b6f14452637b044ead1f4ba324

        SHA1

        81f178c18cafaf4b885afd4e1a2cdfee7c261e1a

        SHA256

        b0689b159dbf4f3f2dd0800ea8d214f55920f6ff9212d05c7c67137c29b1919f

        SHA512

        8d4f2931685fed2ef8b617dd9b7d06115497dedfdc7b5ada76abcea608a912bfcf5ca776d226970bc206afc332eea17bf187c497ee225368de41965a3a7adad5

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1374.exe
        Filesize

        380KB

        MD5

        050665b6f14452637b044ead1f4ba324

        SHA1

        81f178c18cafaf4b885afd4e1a2cdfee7c261e1a

        SHA256

        b0689b159dbf4f3f2dd0800ea8d214f55920f6ff9212d05c7c67137c29b1919f

        SHA512

        8d4f2931685fed2ef8b617dd9b7d06115497dedfdc7b5ada76abcea608a912bfcf5ca776d226970bc206afc332eea17bf187c497ee225368de41965a3a7adad5

      • memory/456-148-0x0000000002C50000-0x0000000002C7D000-memory.dmp
        Filesize

        180KB

      • memory/456-149-0x00000000072C0000-0x0000000007864000-memory.dmp
        Filesize

        5.6MB

      • memory/456-150-0x00000000072B0000-0x00000000072C0000-memory.dmp
        Filesize

        64KB

      • memory/456-151-0x00000000072B0000-0x00000000072C0000-memory.dmp
        Filesize

        64KB

      • memory/456-152-0x00000000072B0000-0x00000000072C0000-memory.dmp
        Filesize

        64KB

      • memory/456-153-0x0000000004BA0000-0x0000000004BB2000-memory.dmp
        Filesize

        72KB

      • memory/456-154-0x0000000004BA0000-0x0000000004BB2000-memory.dmp
        Filesize

        72KB

      • memory/456-156-0x0000000004BA0000-0x0000000004BB2000-memory.dmp
        Filesize

        72KB

      • memory/456-158-0x0000000004BA0000-0x0000000004BB2000-memory.dmp
        Filesize

        72KB

      • memory/456-160-0x0000000004BA0000-0x0000000004BB2000-memory.dmp
        Filesize

        72KB

      • memory/456-162-0x0000000004BA0000-0x0000000004BB2000-memory.dmp
        Filesize

        72KB

      • memory/456-164-0x0000000004BA0000-0x0000000004BB2000-memory.dmp
        Filesize

        72KB

      • memory/456-166-0x0000000004BA0000-0x0000000004BB2000-memory.dmp
        Filesize

        72KB

      • memory/456-168-0x0000000004BA0000-0x0000000004BB2000-memory.dmp
        Filesize

        72KB

      • memory/456-170-0x0000000004BA0000-0x0000000004BB2000-memory.dmp
        Filesize

        72KB

      • memory/456-172-0x0000000004BA0000-0x0000000004BB2000-memory.dmp
        Filesize

        72KB

      • memory/456-174-0x0000000004BA0000-0x0000000004BB2000-memory.dmp
        Filesize

        72KB

      • memory/456-178-0x0000000004BA0000-0x0000000004BB2000-memory.dmp
        Filesize

        72KB

      • memory/456-176-0x0000000004BA0000-0x0000000004BB2000-memory.dmp
        Filesize

        72KB

      • memory/456-180-0x0000000004BA0000-0x0000000004BB2000-memory.dmp
        Filesize

        72KB

      • memory/456-181-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/456-182-0x00000000072B0000-0x00000000072C0000-memory.dmp
        Filesize

        64KB

      • memory/456-183-0x00000000072B0000-0x00000000072C0000-memory.dmp
        Filesize

        64KB

      • memory/456-184-0x00000000072B0000-0x00000000072C0000-memory.dmp
        Filesize

        64KB

      • memory/456-186-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/3760-191-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
        Filesize

        252KB

      • memory/3760-192-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
        Filesize

        252KB

      • memory/3760-194-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
        Filesize

        252KB

      • memory/3760-196-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
        Filesize

        252KB

      • memory/3760-198-0x0000000002C60000-0x0000000002CAB000-memory.dmp
        Filesize

        300KB

      • memory/3760-200-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
        Filesize

        252KB

      • memory/3760-199-0x00000000073C0000-0x00000000073D0000-memory.dmp
        Filesize

        64KB

      • memory/3760-201-0x00000000073C0000-0x00000000073D0000-memory.dmp
        Filesize

        64KB

      • memory/3760-204-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
        Filesize

        252KB

      • memory/3760-203-0x00000000073C0000-0x00000000073D0000-memory.dmp
        Filesize

        64KB

      • memory/3760-206-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
        Filesize

        252KB

      • memory/3760-208-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
        Filesize

        252KB

      • memory/3760-210-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
        Filesize

        252KB

      • memory/3760-212-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
        Filesize

        252KB

      • memory/3760-214-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
        Filesize

        252KB

      • memory/3760-216-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
        Filesize

        252KB

      • memory/3760-218-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
        Filesize

        252KB

      • memory/3760-220-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
        Filesize

        252KB

      • memory/3760-222-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
        Filesize

        252KB

      • memory/3760-224-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
        Filesize

        252KB

      • memory/3760-226-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
        Filesize

        252KB

      • memory/3760-228-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
        Filesize

        252KB

      • memory/3760-1101-0x0000000007980000-0x0000000007F98000-memory.dmp
        Filesize

        6.1MB

      • memory/3760-1102-0x0000000007FA0000-0x00000000080AA000-memory.dmp
        Filesize

        1.0MB

      • memory/3760-1103-0x00000000080B0000-0x00000000080C2000-memory.dmp
        Filesize

        72KB

      • memory/3760-1104-0x00000000080D0000-0x000000000810C000-memory.dmp
        Filesize

        240KB

      • memory/3760-1105-0x00000000073C0000-0x00000000073D0000-memory.dmp
        Filesize

        64KB

      • memory/3760-1107-0x00000000073C0000-0x00000000073D0000-memory.dmp
        Filesize

        64KB

      • memory/3760-1108-0x00000000073C0000-0x00000000073D0000-memory.dmp
        Filesize

        64KB

      • memory/3760-1109-0x00000000073C0000-0x00000000073D0000-memory.dmp
        Filesize

        64KB

      • memory/3760-1110-0x00000000073C0000-0x00000000073D0000-memory.dmp
        Filesize

        64KB

      • memory/3760-1111-0x0000000008500000-0x0000000008566000-memory.dmp
        Filesize

        408KB

      • memory/3760-1112-0x0000000008D00000-0x0000000008D92000-memory.dmp
        Filesize

        584KB

      • memory/3760-1114-0x0000000008F00000-0x00000000090C2000-memory.dmp
        Filesize

        1.8MB

      • memory/3760-1115-0x00000000090E0000-0x000000000960C000-memory.dmp
        Filesize

        5.2MB

      • memory/3760-1116-0x0000000009950000-0x00000000099C6000-memory.dmp
        Filesize

        472KB

      • memory/3760-1117-0x00000000099E0000-0x0000000009A30000-memory.dmp
        Filesize

        320KB

      • memory/4572-1123-0x0000000000530000-0x0000000000562000-memory.dmp
        Filesize

        200KB

      • memory/4572-1124-0x0000000004E10000-0x0000000004E20000-memory.dmp
        Filesize

        64KB