Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 08:04

General

  • Target

    01af39be74e4103f0175ed8c1107d89114eb65c6cc64d827da4664da583ce882.exe

  • Size

    686KB

  • MD5

    25d303dd8e7bfff1f945dec83de4de4d

  • SHA1

    000019ed12a6889eb7983dfd1a151640efbfc816

  • SHA256

    01af39be74e4103f0175ed8c1107d89114eb65c6cc64d827da4664da583ce882

  • SHA512

    1c9fb11429229d01143b07db4cc5e9e5457f58f22906f70d686385c4170bb4f245c16e5e9a3b86720d2c8b18d905923f45ac926d934e5a89e980cc2861a509ff

  • SSDEEP

    12288:9Mriy9071xFzOc5/XwKMO1gw5/HkRKzAjgyUkfXFylhGqEPXAweBXGGUPYmXcfBl:3y613H6KMRw5tAcyPXYvGxPXqtbrmX8l

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01af39be74e4103f0175ed8c1107d89114eb65c6cc64d827da4664da583ce882.exe
    "C:\Users\Admin\AppData\Local\Temp\01af39be74e4103f0175ed8c1107d89114eb65c6cc64d827da4664da583ce882.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4340
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un096040.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un096040.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3460
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9773.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9773.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3216
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3216 -s 1080
          4⤵
          • Program crash
          PID:2064
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6775.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6775.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4120
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4120 -s 1356
          4⤵
          • Program crash
          PID:1128
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si636583.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si636583.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4496
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3216 -ip 3216
    1⤵
      PID:3832
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4120 -ip 4120
      1⤵
        PID:4448

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si636583.exe
        Filesize

        175KB

        MD5

        f976e2da97a965f826b9cfceac5c9567

        SHA1

        6fc2e001c8f431390173b5a8a3e062f065a8d89f

        SHA256

        35bba32fef65056e7d090cbf864f2f9ebecd71703b2bdf7d67cab43ed05f6982

        SHA512

        cbeac91dbe97feebede223668a8b294a0fe3c44b85bbedb8b3c4411752608761e2144859165046789aaee9c7b4d55d6693ab5fce0b62c12b97b4c79f4d4ba15d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si636583.exe
        Filesize

        175KB

        MD5

        f976e2da97a965f826b9cfceac5c9567

        SHA1

        6fc2e001c8f431390173b5a8a3e062f065a8d89f

        SHA256

        35bba32fef65056e7d090cbf864f2f9ebecd71703b2bdf7d67cab43ed05f6982

        SHA512

        cbeac91dbe97feebede223668a8b294a0fe3c44b85bbedb8b3c4411752608761e2144859165046789aaee9c7b4d55d6693ab5fce0b62c12b97b4c79f4d4ba15d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un096040.exe
        Filesize

        544KB

        MD5

        666d11b35c8c63b9a14962ace6a38383

        SHA1

        1982fe01623714f0a3aaac6989f0ff3cb482dbe3

        SHA256

        ba501c41ff73c109ad862790fa2197060839a14b54c521d31d956173da0c0100

        SHA512

        6e1a59b23f770627d000f95fc075cb21bdfcaf06598c25f56cff25a09cd8ea3c5aeb4368a9e9b0580dcf640dcf67ef3aebda718851c5c1b2d9e275289f0a6ea1

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un096040.exe
        Filesize

        544KB

        MD5

        666d11b35c8c63b9a14962ace6a38383

        SHA1

        1982fe01623714f0a3aaac6989f0ff3cb482dbe3

        SHA256

        ba501c41ff73c109ad862790fa2197060839a14b54c521d31d956173da0c0100

        SHA512

        6e1a59b23f770627d000f95fc075cb21bdfcaf06598c25f56cff25a09cd8ea3c5aeb4368a9e9b0580dcf640dcf67ef3aebda718851c5c1b2d9e275289f0a6ea1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9773.exe
        Filesize

        321KB

        MD5

        da7de2460f55f56729ab5c02ad5810e1

        SHA1

        0e0febd5092e756640c1528394d3ef5ce055832b

        SHA256

        ec671a2083ab5a5f12d45381a6685f58ee33f81a2404dbe9bc29afa3ac694c1b

        SHA512

        1c901a9ef39b47b7836d74f9fd99ace455d302e45987d2c988aa3122f93d225df6f1c89c02fe449ff76693b22380ec0b8c0798937f7179cf09f3334b737301ff

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9773.exe
        Filesize

        321KB

        MD5

        da7de2460f55f56729ab5c02ad5810e1

        SHA1

        0e0febd5092e756640c1528394d3ef5ce055832b

        SHA256

        ec671a2083ab5a5f12d45381a6685f58ee33f81a2404dbe9bc29afa3ac694c1b

        SHA512

        1c901a9ef39b47b7836d74f9fd99ace455d302e45987d2c988aa3122f93d225df6f1c89c02fe449ff76693b22380ec0b8c0798937f7179cf09f3334b737301ff

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6775.exe
        Filesize

        380KB

        MD5

        0d802f33f32f4fb849f5f36589807bc5

        SHA1

        7957b2d026fe8ea4fd3859fde80cb1116c12111e

        SHA256

        951a5f32cb9c8f545984b71635285756ea14cf2d5c0fe75acbfb7e0e129d4d37

        SHA512

        34316d5bc7409ef291e530774a7bc58b4a56a708620683bdd8aa1305f3060883e93209837ba8a72de15c960580af84dd692e567878d169766af025d0fbde958b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6775.exe
        Filesize

        380KB

        MD5

        0d802f33f32f4fb849f5f36589807bc5

        SHA1

        7957b2d026fe8ea4fd3859fde80cb1116c12111e

        SHA256

        951a5f32cb9c8f545984b71635285756ea14cf2d5c0fe75acbfb7e0e129d4d37

        SHA512

        34316d5bc7409ef291e530774a7bc58b4a56a708620683bdd8aa1305f3060883e93209837ba8a72de15c960580af84dd692e567878d169766af025d0fbde958b

      • memory/3216-148-0x0000000002C70000-0x0000000002C9D000-memory.dmp
        Filesize

        180KB

      • memory/3216-149-0x00000000074A0000-0x0000000007A44000-memory.dmp
        Filesize

        5.6MB

      • memory/3216-150-0x0000000007490000-0x00000000074A0000-memory.dmp
        Filesize

        64KB

      • memory/3216-151-0x0000000007490000-0x00000000074A0000-memory.dmp
        Filesize

        64KB

      • memory/3216-152-0x0000000007490000-0x00000000074A0000-memory.dmp
        Filesize

        64KB

      • memory/3216-153-0x0000000004DC0000-0x0000000004DD2000-memory.dmp
        Filesize

        72KB

      • memory/3216-154-0x0000000004DC0000-0x0000000004DD2000-memory.dmp
        Filesize

        72KB

      • memory/3216-156-0x0000000004DC0000-0x0000000004DD2000-memory.dmp
        Filesize

        72KB

      • memory/3216-158-0x0000000004DC0000-0x0000000004DD2000-memory.dmp
        Filesize

        72KB

      • memory/3216-160-0x0000000004DC0000-0x0000000004DD2000-memory.dmp
        Filesize

        72KB

      • memory/3216-162-0x0000000004DC0000-0x0000000004DD2000-memory.dmp
        Filesize

        72KB

      • memory/3216-164-0x0000000004DC0000-0x0000000004DD2000-memory.dmp
        Filesize

        72KB

      • memory/3216-166-0x0000000004DC0000-0x0000000004DD2000-memory.dmp
        Filesize

        72KB

      • memory/3216-168-0x0000000004DC0000-0x0000000004DD2000-memory.dmp
        Filesize

        72KB

      • memory/3216-170-0x0000000004DC0000-0x0000000004DD2000-memory.dmp
        Filesize

        72KB

      • memory/3216-172-0x0000000004DC0000-0x0000000004DD2000-memory.dmp
        Filesize

        72KB

      • memory/3216-174-0x0000000004DC0000-0x0000000004DD2000-memory.dmp
        Filesize

        72KB

      • memory/3216-176-0x0000000004DC0000-0x0000000004DD2000-memory.dmp
        Filesize

        72KB

      • memory/3216-178-0x0000000004DC0000-0x0000000004DD2000-memory.dmp
        Filesize

        72KB

      • memory/3216-180-0x0000000004DC0000-0x0000000004DD2000-memory.dmp
        Filesize

        72KB

      • memory/3216-181-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/3216-182-0x0000000007490000-0x00000000074A0000-memory.dmp
        Filesize

        64KB

      • memory/3216-183-0x0000000007490000-0x00000000074A0000-memory.dmp
        Filesize

        64KB

      • memory/3216-184-0x0000000007490000-0x00000000074A0000-memory.dmp
        Filesize

        64KB

      • memory/3216-186-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/4120-191-0x0000000002CB0000-0x0000000002CFB000-memory.dmp
        Filesize

        300KB

      • memory/4120-193-0x0000000007230000-0x000000000726F000-memory.dmp
        Filesize

        252KB

      • memory/4120-192-0x0000000007230000-0x000000000726F000-memory.dmp
        Filesize

        252KB

      • memory/4120-195-0x0000000007230000-0x000000000726F000-memory.dmp
        Filesize

        252KB

      • memory/4120-197-0x00000000072A0000-0x00000000072B0000-memory.dmp
        Filesize

        64KB

      • memory/4120-198-0x0000000007230000-0x000000000726F000-memory.dmp
        Filesize

        252KB

      • memory/4120-201-0x00000000072A0000-0x00000000072B0000-memory.dmp
        Filesize

        64KB

      • memory/4120-202-0x0000000007230000-0x000000000726F000-memory.dmp
        Filesize

        252KB

      • memory/4120-199-0x00000000072A0000-0x00000000072B0000-memory.dmp
        Filesize

        64KB

      • memory/4120-204-0x0000000007230000-0x000000000726F000-memory.dmp
        Filesize

        252KB

      • memory/4120-206-0x0000000007230000-0x000000000726F000-memory.dmp
        Filesize

        252KB

      • memory/4120-208-0x0000000007230000-0x000000000726F000-memory.dmp
        Filesize

        252KB

      • memory/4120-210-0x0000000007230000-0x000000000726F000-memory.dmp
        Filesize

        252KB

      • memory/4120-212-0x0000000007230000-0x000000000726F000-memory.dmp
        Filesize

        252KB

      • memory/4120-214-0x0000000007230000-0x000000000726F000-memory.dmp
        Filesize

        252KB

      • memory/4120-216-0x0000000007230000-0x000000000726F000-memory.dmp
        Filesize

        252KB

      • memory/4120-218-0x0000000007230000-0x000000000726F000-memory.dmp
        Filesize

        252KB

      • memory/4120-220-0x0000000007230000-0x000000000726F000-memory.dmp
        Filesize

        252KB

      • memory/4120-222-0x0000000007230000-0x000000000726F000-memory.dmp
        Filesize

        252KB

      • memory/4120-224-0x0000000007230000-0x000000000726F000-memory.dmp
        Filesize

        252KB

      • memory/4120-226-0x0000000007230000-0x000000000726F000-memory.dmp
        Filesize

        252KB

      • memory/4120-228-0x0000000007230000-0x000000000726F000-memory.dmp
        Filesize

        252KB

      • memory/4120-1101-0x00000000079D0000-0x0000000007FE8000-memory.dmp
        Filesize

        6.1MB

      • memory/4120-1102-0x0000000008070000-0x000000000817A000-memory.dmp
        Filesize

        1.0MB

      • memory/4120-1103-0x00000000081B0000-0x00000000081C2000-memory.dmp
        Filesize

        72KB

      • memory/4120-1104-0x00000000081D0000-0x000000000820C000-memory.dmp
        Filesize

        240KB

      • memory/4120-1105-0x00000000072A0000-0x00000000072B0000-memory.dmp
        Filesize

        64KB

      • memory/4120-1107-0x00000000084C0000-0x0000000008552000-memory.dmp
        Filesize

        584KB

      • memory/4120-1108-0x0000000008560000-0x00000000085C6000-memory.dmp
        Filesize

        408KB

      • memory/4120-1109-0x0000000002CB0000-0x0000000002CFB000-memory.dmp
        Filesize

        300KB

      • memory/4120-1110-0x00000000072A0000-0x00000000072B0000-memory.dmp
        Filesize

        64KB

      • memory/4120-1112-0x00000000072A0000-0x00000000072B0000-memory.dmp
        Filesize

        64KB

      • memory/4120-1111-0x00000000072A0000-0x00000000072B0000-memory.dmp
        Filesize

        64KB

      • memory/4120-1113-0x0000000008DA0000-0x0000000008E16000-memory.dmp
        Filesize

        472KB

      • memory/4120-1114-0x0000000008E30000-0x0000000008E80000-memory.dmp
        Filesize

        320KB

      • memory/4120-1115-0x0000000008EB0000-0x0000000009072000-memory.dmp
        Filesize

        1.8MB

      • memory/4120-1116-0x0000000009090000-0x00000000095BC000-memory.dmp
        Filesize

        5.2MB

      • memory/4120-1117-0x00000000072A0000-0x00000000072B0000-memory.dmp
        Filesize

        64KB

      • memory/4496-1123-0x00000000003F0000-0x0000000000422000-memory.dmp
        Filesize

        200KB

      • memory/4496-1124-0x0000000004C60000-0x0000000004C70000-memory.dmp
        Filesize

        64KB

      • memory/4496-1125-0x0000000004C60000-0x0000000004C70000-memory.dmp
        Filesize

        64KB