Analysis

  • max time kernel
    135s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 09:04

General

  • Target

    7cab917b2a7b988582688e7ba02834b176ac8b2f15da3e6cc19ecc33c22e07b4.exe

  • Size

    683KB

  • MD5

    cbc420afb49fe68118037457c4bab420

  • SHA1

    5f0270b581f988c1337eb622255a9d34bb5e6ac4

  • SHA256

    7cab917b2a7b988582688e7ba02834b176ac8b2f15da3e6cc19ecc33c22e07b4

  • SHA512

    1741c88b0a8949a6c4d6e0dac98d6ceb102718b6ac7ff7cd67258c584e2e84ea5f6eecc0652a794669536a6460c8944f17145ee94559cc4b1b5d3dadcd34e793

  • SSDEEP

    12288:EMrwy9032j3Z/WMS5laOe3qH9XG7OUyhmZL3donhiy:kyJLBS5TMqJnXmZLgR

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7cab917b2a7b988582688e7ba02834b176ac8b2f15da3e6cc19ecc33c22e07b4.exe
    "C:\Users\Admin\AppData\Local\Temp\7cab917b2a7b988582688e7ba02834b176ac8b2f15da3e6cc19ecc33c22e07b4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3388
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un954343.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un954343.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3772
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6677.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6677.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1052
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1052 -s 1080
          4⤵
          • Program crash
          PID:4168
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9395.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9395.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4572
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4572 -s 1348
          4⤵
          • Program crash
          PID:1468
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si538440.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si538440.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2428
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1052 -ip 1052
    1⤵
      PID:4660
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4572 -ip 4572
      1⤵
        PID:4276

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si538440.exe
        Filesize

        175KB

        MD5

        21e81e3bd7768facda8f3ee81f9958b6

        SHA1

        77a9aed74f779663c325e1c8a6384123489b2d9a

        SHA256

        ea86aadc2d1eea47c97cfe789a283f06945687950b49a86d1de3f82f71994ea7

        SHA512

        babbff3a4c5505c94c38288763c6c30c78d7954a94a752b812cb0124702f2416d0ae40c3d788f12cbc3e7d571beee287b2ab811d778f3fe5340212e2efcb7512

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si538440.exe
        Filesize

        175KB

        MD5

        21e81e3bd7768facda8f3ee81f9958b6

        SHA1

        77a9aed74f779663c325e1c8a6384123489b2d9a

        SHA256

        ea86aadc2d1eea47c97cfe789a283f06945687950b49a86d1de3f82f71994ea7

        SHA512

        babbff3a4c5505c94c38288763c6c30c78d7954a94a752b812cb0124702f2416d0ae40c3d788f12cbc3e7d571beee287b2ab811d778f3fe5340212e2efcb7512

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un954343.exe
        Filesize

        541KB

        MD5

        38ae4095c8285b8f29b6a0f8c96d0193

        SHA1

        055924e61b06dff3edb02549656240a86af29fea

        SHA256

        9e0e813a3594bb0beadb27ec34acaf91560a6b425eb0b83e4ee9c03f78aaed2d

        SHA512

        0ef43093a10a0f5706b52cb4bf05ac50a35f4bd26f9fef8d93c57a54003da00a83c32243750380e79cd2d14da0c76bd1cd557a1a96c9950cdc4f163e54ad02f5

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un954343.exe
        Filesize

        541KB

        MD5

        38ae4095c8285b8f29b6a0f8c96d0193

        SHA1

        055924e61b06dff3edb02549656240a86af29fea

        SHA256

        9e0e813a3594bb0beadb27ec34acaf91560a6b425eb0b83e4ee9c03f78aaed2d

        SHA512

        0ef43093a10a0f5706b52cb4bf05ac50a35f4bd26f9fef8d93c57a54003da00a83c32243750380e79cd2d14da0c76bd1cd557a1a96c9950cdc4f163e54ad02f5

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6677.exe
        Filesize

        321KB

        MD5

        77ba075ceb54646e10bceb44c18b3673

        SHA1

        40319ec69792a1fbd5cb6740f77f9a57cbaedaa4

        SHA256

        cba74279c090bb07d7b8e55d29edf152d609cee5808759fa5929e912f4b779fb

        SHA512

        84987ff1c4e1a653aecadf9ce8c871dd22a8db8853dd6d25ee15469567e9d87d242f9cea32074c687a716132afe16c404af50f6972a139bc9791d1d53a9efb25

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6677.exe
        Filesize

        321KB

        MD5

        77ba075ceb54646e10bceb44c18b3673

        SHA1

        40319ec69792a1fbd5cb6740f77f9a57cbaedaa4

        SHA256

        cba74279c090bb07d7b8e55d29edf152d609cee5808759fa5929e912f4b779fb

        SHA512

        84987ff1c4e1a653aecadf9ce8c871dd22a8db8853dd6d25ee15469567e9d87d242f9cea32074c687a716132afe16c404af50f6972a139bc9791d1d53a9efb25

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9395.exe
        Filesize

        380KB

        MD5

        1f42c790f5d9bfd64e7211cc0a62a2d6

        SHA1

        f4d7b327db39619481ec3ccadaf1f768a75aac3d

        SHA256

        f8b19277008a70bff0ab1dc736851f3e3589eea4453d9f68a942407b8ca233dd

        SHA512

        c6ef1ffdd98799ffa71dcad878d3c6a982aceef8273368ec5dbecb4f720532b9c7253aa95a06d1bafb8995be51d7e635ad1a89ae217d5903d1f49eaed692fc19

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9395.exe
        Filesize

        380KB

        MD5

        1f42c790f5d9bfd64e7211cc0a62a2d6

        SHA1

        f4d7b327db39619481ec3ccadaf1f768a75aac3d

        SHA256

        f8b19277008a70bff0ab1dc736851f3e3589eea4453d9f68a942407b8ca233dd

        SHA512

        c6ef1ffdd98799ffa71dcad878d3c6a982aceef8273368ec5dbecb4f720532b9c7253aa95a06d1bafb8995be51d7e635ad1a89ae217d5903d1f49eaed692fc19

      • memory/1052-148-0x0000000002B80000-0x0000000002BAD000-memory.dmp
        Filesize

        180KB

      • memory/1052-149-0x0000000007460000-0x0000000007A04000-memory.dmp
        Filesize

        5.6MB

      • memory/1052-150-0x0000000004ED0000-0x0000000004EE2000-memory.dmp
        Filesize

        72KB

      • memory/1052-151-0x0000000004ED0000-0x0000000004EE2000-memory.dmp
        Filesize

        72KB

      • memory/1052-153-0x0000000004ED0000-0x0000000004EE2000-memory.dmp
        Filesize

        72KB

      • memory/1052-155-0x0000000004ED0000-0x0000000004EE2000-memory.dmp
        Filesize

        72KB

      • memory/1052-157-0x0000000004ED0000-0x0000000004EE2000-memory.dmp
        Filesize

        72KB

      • memory/1052-159-0x0000000004ED0000-0x0000000004EE2000-memory.dmp
        Filesize

        72KB

      • memory/1052-161-0x0000000004ED0000-0x0000000004EE2000-memory.dmp
        Filesize

        72KB

      • memory/1052-165-0x0000000004ED0000-0x0000000004EE2000-memory.dmp
        Filesize

        72KB

      • memory/1052-163-0x0000000004ED0000-0x0000000004EE2000-memory.dmp
        Filesize

        72KB

      • memory/1052-167-0x0000000004ED0000-0x0000000004EE2000-memory.dmp
        Filesize

        72KB

      • memory/1052-169-0x0000000004ED0000-0x0000000004EE2000-memory.dmp
        Filesize

        72KB

      • memory/1052-171-0x0000000004ED0000-0x0000000004EE2000-memory.dmp
        Filesize

        72KB

      • memory/1052-173-0x0000000004ED0000-0x0000000004EE2000-memory.dmp
        Filesize

        72KB

      • memory/1052-175-0x0000000004ED0000-0x0000000004EE2000-memory.dmp
        Filesize

        72KB

      • memory/1052-177-0x0000000004ED0000-0x0000000004EE2000-memory.dmp
        Filesize

        72KB

      • memory/1052-178-0x0000000007450000-0x0000000007460000-memory.dmp
        Filesize

        64KB

      • memory/1052-179-0x0000000007450000-0x0000000007460000-memory.dmp
        Filesize

        64KB

      • memory/1052-180-0x0000000007450000-0x0000000007460000-memory.dmp
        Filesize

        64KB

      • memory/1052-181-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/1052-183-0x0000000007450000-0x0000000007460000-memory.dmp
        Filesize

        64KB

      • memory/1052-184-0x0000000007450000-0x0000000007460000-memory.dmp
        Filesize

        64KB

      • memory/1052-185-0x0000000007450000-0x0000000007460000-memory.dmp
        Filesize

        64KB

      • memory/1052-186-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/2428-1122-0x0000000000550000-0x0000000000582000-memory.dmp
        Filesize

        200KB

      • memory/2428-1123-0x0000000004EA0000-0x0000000004EB0000-memory.dmp
        Filesize

        64KB

      • memory/4572-193-0x0000000004CB0000-0x0000000004CC0000-memory.dmp
        Filesize

        64KB

      • memory/4572-226-0x0000000004D00000-0x0000000004D3F000-memory.dmp
        Filesize

        252KB

      • memory/4572-194-0x0000000004D00000-0x0000000004D3F000-memory.dmp
        Filesize

        252KB

      • memory/4572-196-0x0000000004CB0000-0x0000000004CC0000-memory.dmp
        Filesize

        64KB

      • memory/4572-195-0x0000000004D00000-0x0000000004D3F000-memory.dmp
        Filesize

        252KB

      • memory/4572-198-0x0000000004D00000-0x0000000004D3F000-memory.dmp
        Filesize

        252KB

      • memory/4572-200-0x0000000004D00000-0x0000000004D3F000-memory.dmp
        Filesize

        252KB

      • memory/4572-202-0x0000000004D00000-0x0000000004D3F000-memory.dmp
        Filesize

        252KB

      • memory/4572-204-0x0000000004D00000-0x0000000004D3F000-memory.dmp
        Filesize

        252KB

      • memory/4572-206-0x0000000004D00000-0x0000000004D3F000-memory.dmp
        Filesize

        252KB

      • memory/4572-208-0x0000000004D00000-0x0000000004D3F000-memory.dmp
        Filesize

        252KB

      • memory/4572-210-0x0000000004D00000-0x0000000004D3F000-memory.dmp
        Filesize

        252KB

      • memory/4572-212-0x0000000004D00000-0x0000000004D3F000-memory.dmp
        Filesize

        252KB

      • memory/4572-218-0x0000000004D00000-0x0000000004D3F000-memory.dmp
        Filesize

        252KB

      • memory/4572-220-0x0000000004D00000-0x0000000004D3F000-memory.dmp
        Filesize

        252KB

      • memory/4572-216-0x0000000004D00000-0x0000000004D3F000-memory.dmp
        Filesize

        252KB

      • memory/4572-214-0x0000000004D00000-0x0000000004D3F000-memory.dmp
        Filesize

        252KB

      • memory/4572-222-0x0000000004D00000-0x0000000004D3F000-memory.dmp
        Filesize

        252KB

      • memory/4572-224-0x0000000004D00000-0x0000000004D3F000-memory.dmp
        Filesize

        252KB

      • memory/4572-192-0x0000000004CB0000-0x0000000004CC0000-memory.dmp
        Filesize

        64KB

      • memory/4572-228-0x0000000004D00000-0x0000000004D3F000-memory.dmp
        Filesize

        252KB

      • memory/4572-1101-0x0000000007790000-0x0000000007DA8000-memory.dmp
        Filesize

        6.1MB

      • memory/4572-1102-0x0000000007E30000-0x0000000007F3A000-memory.dmp
        Filesize

        1.0MB

      • memory/4572-1103-0x0000000007F70000-0x0000000007F82000-memory.dmp
        Filesize

        72KB

      • memory/4572-1104-0x0000000004CB0000-0x0000000004CC0000-memory.dmp
        Filesize

        64KB

      • memory/4572-1105-0x0000000007F90000-0x0000000007FCC000-memory.dmp
        Filesize

        240KB

      • memory/4572-1107-0x0000000004CB0000-0x0000000004CC0000-memory.dmp
        Filesize

        64KB

      • memory/4572-1108-0x0000000004CB0000-0x0000000004CC0000-memory.dmp
        Filesize

        64KB

      • memory/4572-1109-0x0000000004CB0000-0x0000000004CC0000-memory.dmp
        Filesize

        64KB

      • memory/4572-1110-0x0000000008280000-0x0000000008312000-memory.dmp
        Filesize

        584KB

      • memory/4572-1111-0x0000000008320000-0x0000000008386000-memory.dmp
        Filesize

        408KB

      • memory/4572-1112-0x0000000008A40000-0x0000000008C02000-memory.dmp
        Filesize

        1.8MB

      • memory/4572-1113-0x0000000004CB0000-0x0000000004CC0000-memory.dmp
        Filesize

        64KB

      • memory/4572-191-0x0000000002B90000-0x0000000002BDB000-memory.dmp
        Filesize

        300KB

      • memory/4572-1114-0x0000000008C20000-0x000000000914C000-memory.dmp
        Filesize

        5.2MB

      • memory/4572-1115-0x00000000093C0000-0x0000000009436000-memory.dmp
        Filesize

        472KB

      • memory/4572-1116-0x0000000009450000-0x00000000094A0000-memory.dmp
        Filesize

        320KB