Analysis

  • max time kernel
    97s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 07:53

General

  • Target

    36932db04e753c3df460a487f44348be639b1a8f80a79400d95b5fa03a690e37.exe

  • Size

    687KB

  • MD5

    aba5acaf213cfe0790aab7e426fecca6

  • SHA1

    741711943309ae1b11e0d5b5dcba7b59e0b90533

  • SHA256

    36932db04e753c3df460a487f44348be639b1a8f80a79400d95b5fa03a690e37

  • SHA512

    57a75a3999ad7051fc43b83ada035d556a6c5384934ecdefd0e37f5a71d495683636752900495b30d040a91ceb97abc3e79eb96f4421c6d0696a0af72ba4de12

  • SSDEEP

    12288:9Mr+y90KRaQAnnJ7Wa7frO86yjCd2R57M/XoFUROuXmaCXXEg:ry0/k+OMjCY57SoFluXHCR

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36932db04e753c3df460a487f44348be639b1a8f80a79400d95b5fa03a690e37.exe
    "C:\Users\Admin\AppData\Local\Temp\36932db04e753c3df460a487f44348be639b1a8f80a79400d95b5fa03a690e37.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4400
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un846680.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un846680.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1824
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3124.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3124.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:380
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 1096
          4⤵
          • Program crash
          PID:3836
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6765.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6765.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1284
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1284 -s 1764
          4⤵
          • Program crash
          PID:3032
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si208384.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si208384.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5012
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 380 -ip 380
    1⤵
      PID:344
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 1284 -ip 1284
      1⤵
        PID:4840

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si208384.exe

        Filesize

        175KB

        MD5

        3a94ff562d5849db8ec1fbe4511daf3a

        SHA1

        793da11c47db5b27e3096850c3d89ca0b7ad838f

        SHA256

        c7243d3d6371b82246302242a78514f31e759c003776b965723e9271cdb0e078

        SHA512

        3bc4ccc2a5d0eb76069f0218c1f10f9f09e6ee66d99fbb2b796b2fb11218bd631bb832e7ea150553e6524b48702569502edbf38db9fd01134115e54fd923b8b4

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si208384.exe

        Filesize

        175KB

        MD5

        3a94ff562d5849db8ec1fbe4511daf3a

        SHA1

        793da11c47db5b27e3096850c3d89ca0b7ad838f

        SHA256

        c7243d3d6371b82246302242a78514f31e759c003776b965723e9271cdb0e078

        SHA512

        3bc4ccc2a5d0eb76069f0218c1f10f9f09e6ee66d99fbb2b796b2fb11218bd631bb832e7ea150553e6524b48702569502edbf38db9fd01134115e54fd923b8b4

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un846680.exe

        Filesize

        545KB

        MD5

        18516515c76b173e7eaa2315b7ebbbc8

        SHA1

        383aba4e63725ab8f208dac110632e3473d368c9

        SHA256

        3d14b931d86545f99dbd9cddac2486baedf13f7cb9d7b3e9270dfa78f75f1377

        SHA512

        820a98e0e6d6db8bff6191d3d426bbd95454e9d6862421899a92feee092fde6d2bdab5c27ee1c40fdc3b5df12b82c07815707dd69ff8d005360e7cf5ce4ae60a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un846680.exe

        Filesize

        545KB

        MD5

        18516515c76b173e7eaa2315b7ebbbc8

        SHA1

        383aba4e63725ab8f208dac110632e3473d368c9

        SHA256

        3d14b931d86545f99dbd9cddac2486baedf13f7cb9d7b3e9270dfa78f75f1377

        SHA512

        820a98e0e6d6db8bff6191d3d426bbd95454e9d6862421899a92feee092fde6d2bdab5c27ee1c40fdc3b5df12b82c07815707dd69ff8d005360e7cf5ce4ae60a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3124.exe

        Filesize

        321KB

        MD5

        5265f82e751806837cb936f6b6ed9de6

        SHA1

        537e2340701e8b8df174d466da243a35ede64134

        SHA256

        e8561a44315d04c8468b2ab7e14877b69cc2714520c96adfd8d07686f2727723

        SHA512

        13db459d97a5931b8b5b947ad92794a49ecc2031839e7cd0f96baaa32586ffd5fa4fff3bfae03d22fc1a63d850d0abb818d1de20907bc930a159c2b7f7caf6ea

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3124.exe

        Filesize

        321KB

        MD5

        5265f82e751806837cb936f6b6ed9de6

        SHA1

        537e2340701e8b8df174d466da243a35ede64134

        SHA256

        e8561a44315d04c8468b2ab7e14877b69cc2714520c96adfd8d07686f2727723

        SHA512

        13db459d97a5931b8b5b947ad92794a49ecc2031839e7cd0f96baaa32586ffd5fa4fff3bfae03d22fc1a63d850d0abb818d1de20907bc930a159c2b7f7caf6ea

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6765.exe

        Filesize

        380KB

        MD5

        a5c364abbbc7ff765d1ee360acd8211a

        SHA1

        ba783b504ffd27bd49e78ce6496fee16bfb59e42

        SHA256

        8166fc8c64762815038e5ebe11e2d9ad1b535f52dc278bb7db9e443dc6faea2b

        SHA512

        96720325f855d6c27c89bbf20b1e42f942abbab309a1f23ad60356c2b9fc9c492d9e87829cbbd19d255cf5f6675a53c3036e60720826b377f6992c0d3866f7ff

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6765.exe

        Filesize

        380KB

        MD5

        a5c364abbbc7ff765d1ee360acd8211a

        SHA1

        ba783b504ffd27bd49e78ce6496fee16bfb59e42

        SHA256

        8166fc8c64762815038e5ebe11e2d9ad1b535f52dc278bb7db9e443dc6faea2b

        SHA512

        96720325f855d6c27c89bbf20b1e42f942abbab309a1f23ad60356c2b9fc9c492d9e87829cbbd19d255cf5f6675a53c3036e60720826b377f6992c0d3866f7ff

      • memory/380-148-0x0000000002C50000-0x0000000002C7D000-memory.dmp

        Filesize

        180KB

      • memory/380-149-0x0000000007130000-0x00000000076D4000-memory.dmp

        Filesize

        5.6MB

      • memory/380-150-0x0000000004B00000-0x0000000004B12000-memory.dmp

        Filesize

        72KB

      • memory/380-151-0x0000000004B00000-0x0000000004B12000-memory.dmp

        Filesize

        72KB

      • memory/380-153-0x0000000004B00000-0x0000000004B12000-memory.dmp

        Filesize

        72KB

      • memory/380-155-0x0000000004B00000-0x0000000004B12000-memory.dmp

        Filesize

        72KB

      • memory/380-157-0x0000000004B00000-0x0000000004B12000-memory.dmp

        Filesize

        72KB

      • memory/380-159-0x0000000004B00000-0x0000000004B12000-memory.dmp

        Filesize

        72KB

      • memory/380-161-0x0000000004B00000-0x0000000004B12000-memory.dmp

        Filesize

        72KB

      • memory/380-163-0x0000000004B00000-0x0000000004B12000-memory.dmp

        Filesize

        72KB

      • memory/380-165-0x0000000004B00000-0x0000000004B12000-memory.dmp

        Filesize

        72KB

      • memory/380-167-0x0000000004B00000-0x0000000004B12000-memory.dmp

        Filesize

        72KB

      • memory/380-169-0x0000000004B00000-0x0000000004B12000-memory.dmp

        Filesize

        72KB

      • memory/380-171-0x0000000004B00000-0x0000000004B12000-memory.dmp

        Filesize

        72KB

      • memory/380-173-0x0000000004B00000-0x0000000004B12000-memory.dmp

        Filesize

        72KB

      • memory/380-175-0x0000000004B00000-0x0000000004B12000-memory.dmp

        Filesize

        72KB

      • memory/380-177-0x0000000004B00000-0x0000000004B12000-memory.dmp

        Filesize

        72KB

      • memory/380-178-0x0000000004A50000-0x0000000004A60000-memory.dmp

        Filesize

        64KB

      • memory/380-179-0x0000000004A50000-0x0000000004A60000-memory.dmp

        Filesize

        64KB

      • memory/380-180-0x0000000004A50000-0x0000000004A60000-memory.dmp

        Filesize

        64KB

      • memory/380-181-0x0000000000400000-0x0000000002B7E000-memory.dmp

        Filesize

        39.5MB

      • memory/380-182-0x0000000004A50000-0x0000000004A60000-memory.dmp

        Filesize

        64KB

      • memory/380-183-0x0000000004A50000-0x0000000004A60000-memory.dmp

        Filesize

        64KB

      • memory/380-185-0x0000000004A50000-0x0000000004A60000-memory.dmp

        Filesize

        64KB

      • memory/380-186-0x0000000000400000-0x0000000002B7E000-memory.dmp

        Filesize

        39.5MB

      • memory/1284-191-0x0000000007700000-0x000000000773F000-memory.dmp

        Filesize

        252KB

      • memory/1284-194-0x0000000007700000-0x000000000773F000-memory.dmp

        Filesize

        252KB

      • memory/1284-196-0x0000000007700000-0x000000000773F000-memory.dmp

        Filesize

        252KB

      • memory/1284-192-0x0000000007700000-0x000000000773F000-memory.dmp

        Filesize

        252KB

      • memory/1284-198-0x0000000007700000-0x000000000773F000-memory.dmp

        Filesize

        252KB

      • memory/1284-200-0x0000000007700000-0x000000000773F000-memory.dmp

        Filesize

        252KB

      • memory/1284-202-0x0000000007700000-0x000000000773F000-memory.dmp

        Filesize

        252KB

      • memory/1284-204-0x0000000007700000-0x000000000773F000-memory.dmp

        Filesize

        252KB

      • memory/1284-207-0x0000000007700000-0x000000000773F000-memory.dmp

        Filesize

        252KB

      • memory/1284-206-0x0000000002CA0000-0x0000000002CEB000-memory.dmp

        Filesize

        300KB

      • memory/1284-209-0x0000000004C80000-0x0000000004C90000-memory.dmp

        Filesize

        64KB

      • memory/1284-210-0x0000000007700000-0x000000000773F000-memory.dmp

        Filesize

        252KB

      • memory/1284-211-0x0000000004C80000-0x0000000004C90000-memory.dmp

        Filesize

        64KB

      • memory/1284-214-0x0000000007700000-0x000000000773F000-memory.dmp

        Filesize

        252KB

      • memory/1284-213-0x0000000004C80000-0x0000000004C90000-memory.dmp

        Filesize

        64KB

      • memory/1284-216-0x0000000007700000-0x000000000773F000-memory.dmp

        Filesize

        252KB

      • memory/1284-218-0x0000000007700000-0x000000000773F000-memory.dmp

        Filesize

        252KB

      • memory/1284-220-0x0000000007700000-0x000000000773F000-memory.dmp

        Filesize

        252KB

      • memory/1284-222-0x0000000007700000-0x000000000773F000-memory.dmp

        Filesize

        252KB

      • memory/1284-224-0x0000000007700000-0x000000000773F000-memory.dmp

        Filesize

        252KB

      • memory/1284-226-0x0000000007700000-0x000000000773F000-memory.dmp

        Filesize

        252KB

      • memory/1284-228-0x0000000007700000-0x000000000773F000-memory.dmp

        Filesize

        252KB

      • memory/1284-1101-0x00000000078D0000-0x0000000007EE8000-memory.dmp

        Filesize

        6.1MB

      • memory/1284-1102-0x0000000007F70000-0x000000000807A000-memory.dmp

        Filesize

        1.0MB

      • memory/1284-1103-0x00000000080B0000-0x00000000080C2000-memory.dmp

        Filesize

        72KB

      • memory/1284-1104-0x00000000080D0000-0x000000000810C000-memory.dmp

        Filesize

        240KB

      • memory/1284-1105-0x0000000004C80000-0x0000000004C90000-memory.dmp

        Filesize

        64KB

      • memory/1284-1106-0x00000000083C0000-0x0000000008426000-memory.dmp

        Filesize

        408KB

      • memory/1284-1108-0x0000000008A70000-0x0000000008B02000-memory.dmp

        Filesize

        584KB

      • memory/1284-1109-0x0000000008B60000-0x0000000008BD6000-memory.dmp

        Filesize

        472KB

      • memory/1284-1110-0x0000000008BF0000-0x0000000008C40000-memory.dmp

        Filesize

        320KB

      • memory/1284-1111-0x0000000004C80000-0x0000000004C90000-memory.dmp

        Filesize

        64KB

      • memory/1284-1112-0x0000000004C80000-0x0000000004C90000-memory.dmp

        Filesize

        64KB

      • memory/1284-1113-0x0000000004C80000-0x0000000004C90000-memory.dmp

        Filesize

        64KB

      • memory/1284-1114-0x0000000008EB0000-0x0000000009072000-memory.dmp

        Filesize

        1.8MB

      • memory/1284-1115-0x00000000090C0000-0x00000000095EC000-memory.dmp

        Filesize

        5.2MB

      • memory/1284-1116-0x0000000004C80000-0x0000000004C90000-memory.dmp

        Filesize

        64KB

      • memory/5012-1122-0x0000000000440000-0x0000000000472000-memory.dmp

        Filesize

        200KB

      • memory/5012-1123-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

        Filesize

        64KB