Analysis

  • max time kernel
    105s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 08:00

General

  • Target

    0548f281bc1f2d0dfb68a237f69c91943e18a787df4456118c6880c54db1a7eb.exe

  • Size

    683KB

  • MD5

    ccd14ae643089701f3e2e0c425399d87

  • SHA1

    8827a4b083a23ecadfe2d621c08dd4d7e5f2aae9

  • SHA256

    0548f281bc1f2d0dfb68a237f69c91943e18a787df4456118c6880c54db1a7eb

  • SHA512

    de3673f5381a2e2573262904d945365f5549bb0dbd078af21308da5388afa5ffd6dabcbf1f3194c64c404092efbf786baa73b6ed38d5a0d3482649faa9ebbdb8

  • SSDEEP

    12288:MMrXy90ohV+SNjjs7Ms/YIHFHFk/J/F3322dfUDMmkL3FaP3d:byXsS9jnlIllcJ/F33ZB3mkL4Pt

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0548f281bc1f2d0dfb68a237f69c91943e18a787df4456118c6880c54db1a7eb.exe
    "C:\Users\Admin\AppData\Local\Temp\0548f281bc1f2d0dfb68a237f69c91943e18a787df4456118c6880c54db1a7eb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1180
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un296321.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un296321.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3432
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7557.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7557.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4684
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 1088
          4⤵
          • Program crash
          PID:2948
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9988.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9988.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1948
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 1540
          4⤵
          • Program crash
          PID:4732
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si506865.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si506865.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4992
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4684 -ip 4684
    1⤵
      PID:3048
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 1948 -ip 1948
      1⤵
        PID:576

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si506865.exe
        Filesize

        175KB

        MD5

        3e7f15b160ecbf04eeff836d48763b13

        SHA1

        dc4447f2558d23f0570a5224f0196565dd34ae61

        SHA256

        63fad10f103ea3265d0f57b170098b62beb70c232690a1b74b222bacd65915a7

        SHA512

        a1c22120a341c67956f179621be876e9cfd84e181d87d12bcc79815f0e5517b2ad2ce894146b2a1cafa4ef5c0c8e9c474d5dacaa4252c2d77ae40a953d1d04e4

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si506865.exe
        Filesize

        175KB

        MD5

        3e7f15b160ecbf04eeff836d48763b13

        SHA1

        dc4447f2558d23f0570a5224f0196565dd34ae61

        SHA256

        63fad10f103ea3265d0f57b170098b62beb70c232690a1b74b222bacd65915a7

        SHA512

        a1c22120a341c67956f179621be876e9cfd84e181d87d12bcc79815f0e5517b2ad2ce894146b2a1cafa4ef5c0c8e9c474d5dacaa4252c2d77ae40a953d1d04e4

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un296321.exe
        Filesize

        541KB

        MD5

        8e60260e685d47d5f8fc918a498096ef

        SHA1

        3a2ed8de025b64d23061d00f18f7e7972c66e825

        SHA256

        2b1f006c1ae481d8e10484c5265af411bd0d130fafe052fc36188d528e8877b1

        SHA512

        7b632f953b35e1e877da21c4559abd9870635f0e338c8e59d4cf32420a06cc39e32c8a32bcefc9ae7ac2b1d90c3cea3f1c79d2c5a3efb8255aa02bdffcf69dac

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un296321.exe
        Filesize

        541KB

        MD5

        8e60260e685d47d5f8fc918a498096ef

        SHA1

        3a2ed8de025b64d23061d00f18f7e7972c66e825

        SHA256

        2b1f006c1ae481d8e10484c5265af411bd0d130fafe052fc36188d528e8877b1

        SHA512

        7b632f953b35e1e877da21c4559abd9870635f0e338c8e59d4cf32420a06cc39e32c8a32bcefc9ae7ac2b1d90c3cea3f1c79d2c5a3efb8255aa02bdffcf69dac

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7557.exe
        Filesize

        321KB

        MD5

        a8a0fe504b8138e03b4e19fe82a970e5

        SHA1

        408dfa16d1ec8dca736a32927487035963d59c34

        SHA256

        1c63defe7689cda7cef067e19c533404f5ffc42625023d81e5042cbf48086c0b

        SHA512

        f1d430f8f867f736db4322560d01797d48d9b7d82652308a2ccf6b90e06177775a558f7b06e6af72ea078362058ab743549db082f03162c36c618d994b1e16b2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7557.exe
        Filesize

        321KB

        MD5

        a8a0fe504b8138e03b4e19fe82a970e5

        SHA1

        408dfa16d1ec8dca736a32927487035963d59c34

        SHA256

        1c63defe7689cda7cef067e19c533404f5ffc42625023d81e5042cbf48086c0b

        SHA512

        f1d430f8f867f736db4322560d01797d48d9b7d82652308a2ccf6b90e06177775a558f7b06e6af72ea078362058ab743549db082f03162c36c618d994b1e16b2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9988.exe
        Filesize

        380KB

        MD5

        1e0ec80e99aca97f490b53038c79061f

        SHA1

        c480c83f72891899e572d16469c93bb159454269

        SHA256

        0b317853338ccf5a0febd6e38a6b46375e36119fec41b9cbc4e8e6baaf4ea708

        SHA512

        5155367f0d890fc87355d4f45aaa28c8e02b1cb5f989b38c2d0cb133437feed2331ea50ad85dee7048892064a3cddb6b21dd22d4c33825c9922eeb4bb48b9bc1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9988.exe
        Filesize

        380KB

        MD5

        1e0ec80e99aca97f490b53038c79061f

        SHA1

        c480c83f72891899e572d16469c93bb159454269

        SHA256

        0b317853338ccf5a0febd6e38a6b46375e36119fec41b9cbc4e8e6baaf4ea708

        SHA512

        5155367f0d890fc87355d4f45aaa28c8e02b1cb5f989b38c2d0cb133437feed2331ea50ad85dee7048892064a3cddb6b21dd22d4c33825c9922eeb4bb48b9bc1

      • memory/1948-1099-0x00000000077F0000-0x0000000007E08000-memory.dmp
        Filesize

        6.1MB

      • memory/1948-1102-0x0000000004EB0000-0x0000000004EC0000-memory.dmp
        Filesize

        64KB

      • memory/1948-1114-0x0000000009FA0000-0x000000000A4CC000-memory.dmp
        Filesize

        5.2MB

      • memory/1948-1113-0x0000000009DD0000-0x0000000009F92000-memory.dmp
        Filesize

        1.8MB

      • memory/1948-1112-0x0000000009D70000-0x0000000009DC0000-memory.dmp
        Filesize

        320KB

      • memory/1948-1110-0x0000000009CE0000-0x0000000009D56000-memory.dmp
        Filesize

        472KB

      • memory/1948-1111-0x0000000004EB0000-0x0000000004EC0000-memory.dmp
        Filesize

        64KB

      • memory/1948-1109-0x0000000008930000-0x00000000089C2000-memory.dmp
        Filesize

        584KB

      • memory/1948-1108-0x0000000008280000-0x00000000082E6000-memory.dmp
        Filesize

        408KB

      • memory/1948-1107-0x0000000004EB0000-0x0000000004EC0000-memory.dmp
        Filesize

        64KB

      • memory/1948-1106-0x0000000004EB0000-0x0000000004EC0000-memory.dmp
        Filesize

        64KB

      • memory/1948-1105-0x0000000004EB0000-0x0000000004EC0000-memory.dmp
        Filesize

        64KB

      • memory/1948-1103-0x0000000007F90000-0x0000000007FCC000-memory.dmp
        Filesize

        240KB

      • memory/1948-1101-0x0000000007F70000-0x0000000007F82000-memory.dmp
        Filesize

        72KB

      • memory/1948-1100-0x0000000007E50000-0x0000000007F5A000-memory.dmp
        Filesize

        1.0MB

      • memory/1948-226-0x0000000004E10000-0x0000000004E4F000-memory.dmp
        Filesize

        252KB

      • memory/1948-224-0x0000000004E10000-0x0000000004E4F000-memory.dmp
        Filesize

        252KB

      • memory/1948-222-0x0000000004E10000-0x0000000004E4F000-memory.dmp
        Filesize

        252KB

      • memory/1948-220-0x0000000004E10000-0x0000000004E4F000-memory.dmp
        Filesize

        252KB

      • memory/1948-218-0x0000000004E10000-0x0000000004E4F000-memory.dmp
        Filesize

        252KB

      • memory/1948-216-0x0000000004E10000-0x0000000004E4F000-memory.dmp
        Filesize

        252KB

      • memory/1948-189-0x0000000002D90000-0x0000000002DDB000-memory.dmp
        Filesize

        300KB

      • memory/1948-192-0x0000000004EB0000-0x0000000004EC0000-memory.dmp
        Filesize

        64KB

      • memory/1948-193-0x0000000004E10000-0x0000000004E4F000-memory.dmp
        Filesize

        252KB

      • memory/1948-196-0x0000000004E10000-0x0000000004E4F000-memory.dmp
        Filesize

        252KB

      • memory/1948-198-0x0000000004E10000-0x0000000004E4F000-memory.dmp
        Filesize

        252KB

      • memory/1948-195-0x0000000004EB0000-0x0000000004EC0000-memory.dmp
        Filesize

        64KB

      • memory/1948-200-0x0000000004E10000-0x0000000004E4F000-memory.dmp
        Filesize

        252KB

      • memory/1948-191-0x0000000004EB0000-0x0000000004EC0000-memory.dmp
        Filesize

        64KB

      • memory/1948-190-0x0000000004E10000-0x0000000004E4F000-memory.dmp
        Filesize

        252KB

      • memory/1948-202-0x0000000004E10000-0x0000000004E4F000-memory.dmp
        Filesize

        252KB

      • memory/1948-204-0x0000000004E10000-0x0000000004E4F000-memory.dmp
        Filesize

        252KB

      • memory/1948-206-0x0000000004E10000-0x0000000004E4F000-memory.dmp
        Filesize

        252KB

      • memory/1948-210-0x0000000004E10000-0x0000000004E4F000-memory.dmp
        Filesize

        252KB

      • memory/1948-208-0x0000000004E10000-0x0000000004E4F000-memory.dmp
        Filesize

        252KB

      • memory/1948-212-0x0000000004E10000-0x0000000004E4F000-memory.dmp
        Filesize

        252KB

      • memory/1948-214-0x0000000004E10000-0x0000000004E4F000-memory.dmp
        Filesize

        252KB

      • memory/4684-172-0x0000000007210000-0x0000000007220000-memory.dmp
        Filesize

        64KB

      • memory/4684-182-0x0000000007210000-0x0000000007220000-memory.dmp
        Filesize

        64KB

      • memory/4684-150-0x00000000077E0000-0x00000000077F2000-memory.dmp
        Filesize

        72KB

      • memory/4684-183-0x0000000007210000-0x0000000007220000-memory.dmp
        Filesize

        64KB

      • memory/4684-169-0x00000000077E0000-0x00000000077F2000-memory.dmp
        Filesize

        72KB

      • memory/4684-180-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/4684-151-0x00000000077E0000-0x00000000077F2000-memory.dmp
        Filesize

        72KB

      • memory/4684-170-0x0000000007210000-0x0000000007220000-memory.dmp
        Filesize

        64KB

      • memory/4684-177-0x00000000077E0000-0x00000000077F2000-memory.dmp
        Filesize

        72KB

      • memory/4684-155-0x00000000077E0000-0x00000000077F2000-memory.dmp
        Filesize

        72KB

      • memory/4684-175-0x00000000077E0000-0x00000000077F2000-memory.dmp
        Filesize

        72KB

      • memory/4684-173-0x00000000077E0000-0x00000000077F2000-memory.dmp
        Filesize

        72KB

      • memory/4684-184-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/4684-153-0x00000000077E0000-0x00000000077F2000-memory.dmp
        Filesize

        72KB

      • memory/4684-179-0x00000000077E0000-0x00000000077F2000-memory.dmp
        Filesize

        72KB

      • memory/4684-167-0x00000000077E0000-0x00000000077F2000-memory.dmp
        Filesize

        72KB

      • memory/4684-165-0x00000000077E0000-0x00000000077F2000-memory.dmp
        Filesize

        72KB

      • memory/4684-163-0x00000000077E0000-0x00000000077F2000-memory.dmp
        Filesize

        72KB

      • memory/4684-161-0x00000000077E0000-0x00000000077F2000-memory.dmp
        Filesize

        72KB

      • memory/4684-159-0x00000000077E0000-0x00000000077F2000-memory.dmp
        Filesize

        72KB

      • memory/4684-157-0x00000000077E0000-0x00000000077F2000-memory.dmp
        Filesize

        72KB

      • memory/4684-149-0x0000000007220000-0x00000000077C4000-memory.dmp
        Filesize

        5.6MB

      • memory/4684-148-0x0000000002C50000-0x0000000002C7D000-memory.dmp
        Filesize

        180KB

      • memory/4992-1121-0x0000000000EC0000-0x0000000000EF2000-memory.dmp
        Filesize

        200KB

      • memory/4992-1122-0x00000000057E0000-0x00000000057F0000-memory.dmp
        Filesize

        64KB