Analysis

  • max time kernel
    61s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 09:07

General

  • Target

    899628d1e791088d15c3f773d04ca725b2f55949456e1dd02ac5b0a029b3241a.exe

  • Size

    683KB

  • MD5

    83d2598758b148c155d818a41b760db8

  • SHA1

    54a4e23def06455ef8351f51a8cb4f87d0b1b3e5

  • SHA256

    899628d1e791088d15c3f773d04ca725b2f55949456e1dd02ac5b0a029b3241a

  • SHA512

    0be1efc750494449cc69f91f43ff81818ba6b46d0344b016ed28647b628ce65e1f4e405854c371014a023fdab3281cbed0f8aae67658804732ecb5e4487f71c0

  • SSDEEP

    12288:yMryy90I6pHJ5rEfv6TOk3/Es6fEscGzLzBOUgLmJL3jb3qlm:syurrEf9YVpyAjmJLzb3v

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\899628d1e791088d15c3f773d04ca725b2f55949456e1dd02ac5b0a029b3241a.exe
    "C:\Users\Admin\AppData\Local\Temp\899628d1e791088d15c3f773d04ca725b2f55949456e1dd02ac5b0a029b3241a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un300090.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un300090.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4544
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0286.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0286.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:704
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 704 -s 1080
          4⤵
          • Program crash
          PID:4168
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5345.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5345.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4984
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 1744
          4⤵
          • Program crash
          PID:1412
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si948438.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si948438.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1112
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 704 -ip 704
    1⤵
      PID:4308
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4984 -ip 4984
      1⤵
        PID:3332

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si948438.exe
        Filesize

        175KB

        MD5

        6422b9e8e888718f9d6c7e2ebbd37c13

        SHA1

        5c8b8aea03728a1a218e4b9c1b9fc70ecf004e0b

        SHA256

        fd60b66e7dd95e149fd14f616fb2392e70af93b643b9b8c62777d50ae759418c

        SHA512

        8a21fceba53fef5a843b80669bc8f027a93ea2a55cea36ba3902eb960703a7492613da6855d552ab4dacd2cd29846adf106687d0f445673b5a1110bbe2a4aeea

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si948438.exe
        Filesize

        175KB

        MD5

        6422b9e8e888718f9d6c7e2ebbd37c13

        SHA1

        5c8b8aea03728a1a218e4b9c1b9fc70ecf004e0b

        SHA256

        fd60b66e7dd95e149fd14f616fb2392e70af93b643b9b8c62777d50ae759418c

        SHA512

        8a21fceba53fef5a843b80669bc8f027a93ea2a55cea36ba3902eb960703a7492613da6855d552ab4dacd2cd29846adf106687d0f445673b5a1110bbe2a4aeea

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un300090.exe
        Filesize

        541KB

        MD5

        d77d49a56699276f8140063b2b71ceb6

        SHA1

        5b04cb5a9bbeac1886763d4a85ddd0fe0c27d039

        SHA256

        96cd549759bfa9ef95ebaf4986bea69dd1600253da9f29b26ea18726c19ce92a

        SHA512

        fc41eb2a654673ab1767011c9d6c458141c1345434059b79ac54821993d2b15fe6f89fee861710d8139e7b3293fa789fc55b7abcb4cb7af75b884f31283d5762

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un300090.exe
        Filesize

        541KB

        MD5

        d77d49a56699276f8140063b2b71ceb6

        SHA1

        5b04cb5a9bbeac1886763d4a85ddd0fe0c27d039

        SHA256

        96cd549759bfa9ef95ebaf4986bea69dd1600253da9f29b26ea18726c19ce92a

        SHA512

        fc41eb2a654673ab1767011c9d6c458141c1345434059b79ac54821993d2b15fe6f89fee861710d8139e7b3293fa789fc55b7abcb4cb7af75b884f31283d5762

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0286.exe
        Filesize

        321KB

        MD5

        4c36771fbb6b47a5fd6ff53908dca5b3

        SHA1

        e3b437e24eadba9a16f5bbd54c3568b20d4afce3

        SHA256

        98069159b254c206e836b418f97306f221f10f2faf064bed496ceb436ff5afa6

        SHA512

        01c825b07e50f9ed401c38ae3fc31d18c31a9a2450f9dcd9a1ed1a1c43e787b76b59bb3b84227045bf9f287ab5eb7d690c07333f57f6525cea56ab28c57bee4c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0286.exe
        Filesize

        321KB

        MD5

        4c36771fbb6b47a5fd6ff53908dca5b3

        SHA1

        e3b437e24eadba9a16f5bbd54c3568b20d4afce3

        SHA256

        98069159b254c206e836b418f97306f221f10f2faf064bed496ceb436ff5afa6

        SHA512

        01c825b07e50f9ed401c38ae3fc31d18c31a9a2450f9dcd9a1ed1a1c43e787b76b59bb3b84227045bf9f287ab5eb7d690c07333f57f6525cea56ab28c57bee4c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5345.exe
        Filesize

        380KB

        MD5

        c57aaac67f045db8a2384e7c7c1f14ad

        SHA1

        8f57779d8f24b1f83fd3556270fc28e3e264d437

        SHA256

        41d007d86d30b480f4c1c7dbf4daf1229f2994b043d2d68ebd6b9c818ba1e410

        SHA512

        d9fe677e6a198240a15d33638394021d3a42e43eb0c76922fe2971b1baf9f9f3b1fe668d43cb87a4217441c8a6fb935485d4e67aa99b34dbacaa3d6fea08222f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5345.exe
        Filesize

        380KB

        MD5

        c57aaac67f045db8a2384e7c7c1f14ad

        SHA1

        8f57779d8f24b1f83fd3556270fc28e3e264d437

        SHA256

        41d007d86d30b480f4c1c7dbf4daf1229f2994b043d2d68ebd6b9c818ba1e410

        SHA512

        d9fe677e6a198240a15d33638394021d3a42e43eb0c76922fe2971b1baf9f9f3b1fe668d43cb87a4217441c8a6fb935485d4e67aa99b34dbacaa3d6fea08222f

      • memory/704-158-0x00000000076A0000-0x00000000076B2000-memory.dmp
        Filesize

        72KB

      • memory/704-168-0x00000000076A0000-0x00000000076B2000-memory.dmp
        Filesize

        72KB

      • memory/704-151-0x00000000070E0000-0x00000000070F0000-memory.dmp
        Filesize

        64KB

      • memory/704-150-0x00000000070E0000-0x00000000070F0000-memory.dmp
        Filesize

        64KB

      • memory/704-152-0x00000000070E0000-0x00000000070F0000-memory.dmp
        Filesize

        64KB

      • memory/704-153-0x00000000076A0000-0x00000000076B2000-memory.dmp
        Filesize

        72KB

      • memory/704-154-0x00000000076A0000-0x00000000076B2000-memory.dmp
        Filesize

        72KB

      • memory/704-156-0x00000000076A0000-0x00000000076B2000-memory.dmp
        Filesize

        72KB

      • memory/704-148-0x00000000070F0000-0x0000000007694000-memory.dmp
        Filesize

        5.6MB

      • memory/704-160-0x00000000076A0000-0x00000000076B2000-memory.dmp
        Filesize

        72KB

      • memory/704-162-0x00000000076A0000-0x00000000076B2000-memory.dmp
        Filesize

        72KB

      • memory/704-164-0x00000000076A0000-0x00000000076B2000-memory.dmp
        Filesize

        72KB

      • memory/704-166-0x00000000076A0000-0x00000000076B2000-memory.dmp
        Filesize

        72KB

      • memory/704-149-0x0000000002C50000-0x0000000002C7D000-memory.dmp
        Filesize

        180KB

      • memory/704-170-0x00000000076A0000-0x00000000076B2000-memory.dmp
        Filesize

        72KB

      • memory/704-172-0x00000000076A0000-0x00000000076B2000-memory.dmp
        Filesize

        72KB

      • memory/704-174-0x00000000076A0000-0x00000000076B2000-memory.dmp
        Filesize

        72KB

      • memory/704-176-0x00000000076A0000-0x00000000076B2000-memory.dmp
        Filesize

        72KB

      • memory/704-178-0x00000000076A0000-0x00000000076B2000-memory.dmp
        Filesize

        72KB

      • memory/704-180-0x00000000076A0000-0x00000000076B2000-memory.dmp
        Filesize

        72KB

      • memory/704-181-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/704-182-0x00000000070E0000-0x00000000070F0000-memory.dmp
        Filesize

        64KB

      • memory/704-184-0x00000000070E0000-0x00000000070F0000-memory.dmp
        Filesize

        64KB

      • memory/704-183-0x00000000070E0000-0x00000000070F0000-memory.dmp
        Filesize

        64KB

      • memory/704-186-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/1112-1121-0x0000000000040000-0x0000000000072000-memory.dmp
        Filesize

        200KB

      • memory/1112-1122-0x00000000048F0000-0x0000000004900000-memory.dmp
        Filesize

        64KB

      • memory/4984-191-0x0000000002B90000-0x0000000002BDB000-memory.dmp
        Filesize

        300KB

      • memory/4984-223-0x0000000007720000-0x000000000775F000-memory.dmp
        Filesize

        252KB

      • memory/4984-195-0x0000000007720000-0x000000000775F000-memory.dmp
        Filesize

        252KB

      • memory/4984-193-0x0000000004A30000-0x0000000004A40000-memory.dmp
        Filesize

        64KB

      • memory/4984-197-0x0000000007720000-0x000000000775F000-memory.dmp
        Filesize

        252KB

      • memory/4984-199-0x0000000007720000-0x000000000775F000-memory.dmp
        Filesize

        252KB

      • memory/4984-201-0x0000000007720000-0x000000000775F000-memory.dmp
        Filesize

        252KB

      • memory/4984-205-0x0000000007720000-0x000000000775F000-memory.dmp
        Filesize

        252KB

      • memory/4984-203-0x0000000007720000-0x000000000775F000-memory.dmp
        Filesize

        252KB

      • memory/4984-207-0x0000000007720000-0x000000000775F000-memory.dmp
        Filesize

        252KB

      • memory/4984-209-0x0000000007720000-0x000000000775F000-memory.dmp
        Filesize

        252KB

      • memory/4984-211-0x0000000007720000-0x000000000775F000-memory.dmp
        Filesize

        252KB

      • memory/4984-213-0x0000000007720000-0x000000000775F000-memory.dmp
        Filesize

        252KB

      • memory/4984-215-0x0000000007720000-0x000000000775F000-memory.dmp
        Filesize

        252KB

      • memory/4984-217-0x0000000007720000-0x000000000775F000-memory.dmp
        Filesize

        252KB

      • memory/4984-219-0x0000000007720000-0x000000000775F000-memory.dmp
        Filesize

        252KB

      • memory/4984-221-0x0000000007720000-0x000000000775F000-memory.dmp
        Filesize

        252KB

      • memory/4984-194-0x0000000007720000-0x000000000775F000-memory.dmp
        Filesize

        252KB

      • memory/4984-225-0x0000000007720000-0x000000000775F000-memory.dmp
        Filesize

        252KB

      • memory/4984-227-0x0000000007720000-0x000000000775F000-memory.dmp
        Filesize

        252KB

      • memory/4984-1100-0x00000000078D0000-0x0000000007EE8000-memory.dmp
        Filesize

        6.1MB

      • memory/4984-1101-0x0000000007F70000-0x000000000807A000-memory.dmp
        Filesize

        1.0MB

      • memory/4984-1102-0x00000000080B0000-0x00000000080C2000-memory.dmp
        Filesize

        72KB

      • memory/4984-1103-0x00000000080D0000-0x000000000810C000-memory.dmp
        Filesize

        240KB

      • memory/4984-1104-0x0000000004A30000-0x0000000004A40000-memory.dmp
        Filesize

        64KB

      • memory/4984-1106-0x00000000083C0000-0x0000000008426000-memory.dmp
        Filesize

        408KB

      • memory/4984-1107-0x0000000008A70000-0x0000000008B02000-memory.dmp
        Filesize

        584KB

      • memory/4984-1108-0x0000000004A30000-0x0000000004A40000-memory.dmp
        Filesize

        64KB

      • memory/4984-1109-0x0000000004A30000-0x0000000004A40000-memory.dmp
        Filesize

        64KB

      • memory/4984-1110-0x0000000004A30000-0x0000000004A40000-memory.dmp
        Filesize

        64KB

      • memory/4984-1111-0x0000000008CC0000-0x0000000008D36000-memory.dmp
        Filesize

        472KB

      • memory/4984-1112-0x0000000008D50000-0x0000000008DA0000-memory.dmp
        Filesize

        320KB

      • memory/4984-192-0x0000000004A30000-0x0000000004A40000-memory.dmp
        Filesize

        64KB

      • memory/4984-1113-0x0000000008DB0000-0x0000000008F72000-memory.dmp
        Filesize

        1.8MB

      • memory/4984-1114-0x0000000008F80000-0x00000000094AC000-memory.dmp
        Filesize

        5.2MB

      • memory/4984-1115-0x0000000004A30000-0x0000000004A40000-memory.dmp
        Filesize

        64KB