Analysis

  • max time kernel
    109s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 09:09

General

  • Target

    f000450101ec0de170c96cde0e8729d0fc3a5575ef845182ad8923a35215ab2a.exe

  • Size

    683KB

  • MD5

    5559355b894df55fe2921a39e1704816

  • SHA1

    5d668860ba8a30f0e40e961c15f26c472bf529e8

  • SHA256

    f000450101ec0de170c96cde0e8729d0fc3a5575ef845182ad8923a35215ab2a

  • SHA512

    214cdd732535560aa2d712e29c751f3e084aef0c42ea4450a866db436f617da69991a7aeeb0315b81f052c6041ba64092aaafe3b2af6f6a22a3f09ba727c7f5e

  • SSDEEP

    12288:HMrPy90F7qSdr5Smj4uPk/Es6fEEKWreQqTUlimZLzFO:QySlN53mVLW61mZLc

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f000450101ec0de170c96cde0e8729d0fc3a5575ef845182ad8923a35215ab2a.exe
    "C:\Users\Admin\AppData\Local\Temp\f000450101ec0de170c96cde0e8729d0fc3a5575ef845182ad8923a35215ab2a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:748
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un277914.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un277914.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4464
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5830.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5830.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1676
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1676 -s 1084
          4⤵
          • Program crash
          PID:4532
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0508.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0508.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1808
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1808 -s 1328
          4⤵
          • Program crash
          PID:2580
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si213560.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si213560.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2848
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1676 -ip 1676
    1⤵
      PID:2116
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 1808 -ip 1808
      1⤵
        PID:4960

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si213560.exe
        Filesize

        175KB

        MD5

        52c06b29cb1200085b07d0673e358b28

        SHA1

        9f913e084b0784a97a73f95f04541920f3eea7ec

        SHA256

        a28fec1df9d6b1e6eddcf5da8b5754500d910bad490ab5b121877fa1b23b8b86

        SHA512

        4efdda26031dec86c05978daada9efbc27c94249b617ad14895fbc592201dbffe915d3a7d68344b5e8ddfed77ae6ff451c2113a21ce8949f5b782edf52a1804a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si213560.exe
        Filesize

        175KB

        MD5

        52c06b29cb1200085b07d0673e358b28

        SHA1

        9f913e084b0784a97a73f95f04541920f3eea7ec

        SHA256

        a28fec1df9d6b1e6eddcf5da8b5754500d910bad490ab5b121877fa1b23b8b86

        SHA512

        4efdda26031dec86c05978daada9efbc27c94249b617ad14895fbc592201dbffe915d3a7d68344b5e8ddfed77ae6ff451c2113a21ce8949f5b782edf52a1804a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un277914.exe
        Filesize

        541KB

        MD5

        dc16c3b6859f7e167e3e0796636f1874

        SHA1

        ac6c30a96cdf0faa58d41ee64830a8a19bfd1adb

        SHA256

        3bb8607357ca43b28226d1b8d146f201d4811e95595046d4fc5c4a1166762002

        SHA512

        2d2bba1ad324a89fc156e90d846f4902c545d0e8f40c9d6ba10b3cb7453c8ae42376050979ffc1c41dd1bde199ae8d69d4ec8bbfd884f2d618bca90c2a868092

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un277914.exe
        Filesize

        541KB

        MD5

        dc16c3b6859f7e167e3e0796636f1874

        SHA1

        ac6c30a96cdf0faa58d41ee64830a8a19bfd1adb

        SHA256

        3bb8607357ca43b28226d1b8d146f201d4811e95595046d4fc5c4a1166762002

        SHA512

        2d2bba1ad324a89fc156e90d846f4902c545d0e8f40c9d6ba10b3cb7453c8ae42376050979ffc1c41dd1bde199ae8d69d4ec8bbfd884f2d618bca90c2a868092

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5830.exe
        Filesize

        321KB

        MD5

        0e16b6402fb71f37f073e8d24b3c244f

        SHA1

        9779df21c6f9614ef311d7b48c812eca0eae924c

        SHA256

        2ccb3feda9764433ad416c617aa73506942b9a6b414095f42bf0bb5bcce437f6

        SHA512

        91ad9d16cf941c86562051f692f764dbe917d42fc9b190f13d1ab745276ab99aa520762344419cecaa0eec1196aa3339994a5bc466f92f70ec11845b2823eb9d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5830.exe
        Filesize

        321KB

        MD5

        0e16b6402fb71f37f073e8d24b3c244f

        SHA1

        9779df21c6f9614ef311d7b48c812eca0eae924c

        SHA256

        2ccb3feda9764433ad416c617aa73506942b9a6b414095f42bf0bb5bcce437f6

        SHA512

        91ad9d16cf941c86562051f692f764dbe917d42fc9b190f13d1ab745276ab99aa520762344419cecaa0eec1196aa3339994a5bc466f92f70ec11845b2823eb9d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0508.exe
        Filesize

        380KB

        MD5

        766b3a11d6125cad7f12e652ed9223a9

        SHA1

        640d834e6ca4fea5d7e0f811c27249b387dbe715

        SHA256

        507b072de822b98a6d38e9a48182ef6ee36305ecfdad69ab883a4fafefd0a7f7

        SHA512

        82708be12090138d964de4e001e5de931138a70f6fd1e68c6c765262034462c6dddab4ac787a6db5ee17f80f69340f8fecca7abab306203ee3b2140fdc1d6f4b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0508.exe
        Filesize

        380KB

        MD5

        766b3a11d6125cad7f12e652ed9223a9

        SHA1

        640d834e6ca4fea5d7e0f811c27249b387dbe715

        SHA256

        507b072de822b98a6d38e9a48182ef6ee36305ecfdad69ab883a4fafefd0a7f7

        SHA512

        82708be12090138d964de4e001e5de931138a70f6fd1e68c6c765262034462c6dddab4ac787a6db5ee17f80f69340f8fecca7abab306203ee3b2140fdc1d6f4b

      • memory/1676-148-0x00000000073D0000-0x0000000007974000-memory.dmp
        Filesize

        5.6MB

      • memory/1676-151-0x00000000073C0000-0x00000000073D0000-memory.dmp
        Filesize

        64KB

      • memory/1676-152-0x0000000007230000-0x0000000007242000-memory.dmp
        Filesize

        72KB

      • memory/1676-154-0x00000000073C0000-0x00000000073D0000-memory.dmp
        Filesize

        64KB

      • memory/1676-150-0x0000000007230000-0x0000000007242000-memory.dmp
        Filesize

        72KB

      • memory/1676-158-0x0000000007230000-0x0000000007242000-memory.dmp
        Filesize

        72KB

      • memory/1676-156-0x00000000073C0000-0x00000000073D0000-memory.dmp
        Filesize

        64KB

      • memory/1676-155-0x0000000007230000-0x0000000007242000-memory.dmp
        Filesize

        72KB

      • memory/1676-149-0x0000000002B80000-0x0000000002BAD000-memory.dmp
        Filesize

        180KB

      • memory/1676-160-0x0000000007230000-0x0000000007242000-memory.dmp
        Filesize

        72KB

      • memory/1676-162-0x0000000007230000-0x0000000007242000-memory.dmp
        Filesize

        72KB

      • memory/1676-164-0x0000000007230000-0x0000000007242000-memory.dmp
        Filesize

        72KB

      • memory/1676-166-0x0000000007230000-0x0000000007242000-memory.dmp
        Filesize

        72KB

      • memory/1676-168-0x0000000007230000-0x0000000007242000-memory.dmp
        Filesize

        72KB

      • memory/1676-170-0x0000000007230000-0x0000000007242000-memory.dmp
        Filesize

        72KB

      • memory/1676-172-0x0000000007230000-0x0000000007242000-memory.dmp
        Filesize

        72KB

      • memory/1676-174-0x0000000007230000-0x0000000007242000-memory.dmp
        Filesize

        72KB

      • memory/1676-176-0x0000000007230000-0x0000000007242000-memory.dmp
        Filesize

        72KB

      • memory/1676-178-0x0000000007230000-0x0000000007242000-memory.dmp
        Filesize

        72KB

      • memory/1676-180-0x0000000007230000-0x0000000007242000-memory.dmp
        Filesize

        72KB

      • memory/1676-181-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/1676-182-0x00000000073C0000-0x00000000073D0000-memory.dmp
        Filesize

        64KB

      • memory/1676-183-0x00000000073C0000-0x00000000073D0000-memory.dmp
        Filesize

        64KB

      • memory/1676-184-0x00000000073C0000-0x00000000073D0000-memory.dmp
        Filesize

        64KB

      • memory/1676-186-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/1808-191-0x0000000002B90000-0x0000000002BDB000-memory.dmp
        Filesize

        300KB

      • memory/1808-192-0x0000000004DB0000-0x0000000004DC0000-memory.dmp
        Filesize

        64KB

      • memory/1808-193-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/1808-195-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/1808-197-0x0000000004DB0000-0x0000000004DC0000-memory.dmp
        Filesize

        64KB

      • memory/1808-198-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/1808-194-0x0000000004DB0000-0x0000000004DC0000-memory.dmp
        Filesize

        64KB

      • memory/1808-200-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/1808-202-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/1808-206-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/1808-204-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/1808-210-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/1808-208-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/1808-212-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/1808-214-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/1808-216-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/1808-218-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/1808-220-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/1808-222-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/1808-224-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/1808-226-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/1808-228-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/1808-1101-0x00000000077C0000-0x0000000007DD8000-memory.dmp
        Filesize

        6.1MB

      • memory/1808-1102-0x0000000007E30000-0x0000000007F3A000-memory.dmp
        Filesize

        1.0MB

      • memory/1808-1103-0x0000000007F70000-0x0000000007F82000-memory.dmp
        Filesize

        72KB

      • memory/1808-1104-0x0000000007F90000-0x0000000007FCC000-memory.dmp
        Filesize

        240KB

      • memory/1808-1105-0x0000000004DB0000-0x0000000004DC0000-memory.dmp
        Filesize

        64KB

      • memory/1808-1107-0x0000000008280000-0x00000000082E6000-memory.dmp
        Filesize

        408KB

      • memory/1808-1108-0x0000000008A80000-0x0000000008B12000-memory.dmp
        Filesize

        584KB

      • memory/1808-1109-0x0000000004DB0000-0x0000000004DC0000-memory.dmp
        Filesize

        64KB

      • memory/1808-1110-0x0000000004DB0000-0x0000000004DC0000-memory.dmp
        Filesize

        64KB

      • memory/1808-1111-0x0000000004DB0000-0x0000000004DC0000-memory.dmp
        Filesize

        64KB

      • memory/1808-1112-0x0000000008C80000-0x0000000008E42000-memory.dmp
        Filesize

        1.8MB

      • memory/1808-1113-0x0000000008E60000-0x000000000938C000-memory.dmp
        Filesize

        5.2MB

      • memory/1808-1114-0x00000000094C0000-0x0000000009536000-memory.dmp
        Filesize

        472KB

      • memory/1808-1115-0x0000000009550000-0x00000000095A0000-memory.dmp
        Filesize

        320KB

      • memory/1808-1116-0x0000000004DB0000-0x0000000004DC0000-memory.dmp
        Filesize

        64KB

      • memory/2848-1122-0x00000000006E0000-0x0000000000712000-memory.dmp
        Filesize

        200KB

      • memory/2848-1123-0x0000000005000000-0x0000000005010000-memory.dmp
        Filesize

        64KB