Analysis

  • max time kernel
    86s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 09:18

General

  • Target

    bd89c3eedbe6a7ad26283103fd92830feaf7e393b284ea8fd3ac63e0b7cc5d1c.exe

  • Size

    683KB

  • MD5

    6f32ef190599252f1df996594eed44a2

  • SHA1

    0182e4c00716ef2aedff28a5a18625184fe0aa55

  • SHA256

    bd89c3eedbe6a7ad26283103fd92830feaf7e393b284ea8fd3ac63e0b7cc5d1c

  • SHA512

    9f7eea8e37dde305d0be6b5d7c5c731331c9c9efa606d3306a9972dbb703f9a304efb05e4328823efe1cfc708ad9fc463b5dda26cf3575276ec8169821e6b601

  • SSDEEP

    12288:EMrWy90XWQQanvEbjXgShzRJOe/FgNgfUSzmfL3FOCit:iynQQAEbNlOe/0KzmfLVm

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd89c3eedbe6a7ad26283103fd92830feaf7e393b284ea8fd3ac63e0b7cc5d1c.exe
    "C:\Users\Admin\AppData\Local\Temp\bd89c3eedbe6a7ad26283103fd92830feaf7e393b284ea8fd3ac63e0b7cc5d1c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4924
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un765290.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un765290.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:372
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8037.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8037.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:548
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 548 -s 1080
          4⤵
          • Program crash
          PID:956
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3538.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3538.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4788
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4788 -s 1340
          4⤵
          • Program crash
          PID:4908
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si717887.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si717887.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2748
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 548 -ip 548
    1⤵
      PID:4732
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4788 -ip 4788
      1⤵
        PID:4032

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si717887.exe
        Filesize

        175KB

        MD5

        dfbed72b462c0ebaf2ce538fb7e261a2

        SHA1

        d0576fd6cb5c0145ce8db372076499bf1ace4934

        SHA256

        adb40a23fde0dad96976e6c0802366d7f2042da295a94e77ed992d1fb624d9a8

        SHA512

        4fc6fa156a36ab2e726dd4c5b4900767201c049ed0b05a07a67ca99f041743ae1e2680ddb1c0bb93ce7bc552100a5a9917f7a27d12e857204deabe50d68cdd2a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si717887.exe
        Filesize

        175KB

        MD5

        dfbed72b462c0ebaf2ce538fb7e261a2

        SHA1

        d0576fd6cb5c0145ce8db372076499bf1ace4934

        SHA256

        adb40a23fde0dad96976e6c0802366d7f2042da295a94e77ed992d1fb624d9a8

        SHA512

        4fc6fa156a36ab2e726dd4c5b4900767201c049ed0b05a07a67ca99f041743ae1e2680ddb1c0bb93ce7bc552100a5a9917f7a27d12e857204deabe50d68cdd2a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un765290.exe
        Filesize

        541KB

        MD5

        3264309627816a7d567ca5e7caa6575b

        SHA1

        94bfdd40f609efc34666468be190b9685084af60

        SHA256

        09e52b053b70e9e9fc451d88278c8674ee6eb506310b9773bfdd9e8aa0269d41

        SHA512

        928f318d4415d8fb0a9ea1e60022eb7f4082cc51394350116a985464cb0150ce74020cdf110738e5d33cc5f91c6c7643a14253dc147221e6a8822ed109103753

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un765290.exe
        Filesize

        541KB

        MD5

        3264309627816a7d567ca5e7caa6575b

        SHA1

        94bfdd40f609efc34666468be190b9685084af60

        SHA256

        09e52b053b70e9e9fc451d88278c8674ee6eb506310b9773bfdd9e8aa0269d41

        SHA512

        928f318d4415d8fb0a9ea1e60022eb7f4082cc51394350116a985464cb0150ce74020cdf110738e5d33cc5f91c6c7643a14253dc147221e6a8822ed109103753

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8037.exe
        Filesize

        321KB

        MD5

        9c43318a20a2e87744c67a617557cff9

        SHA1

        496e6bf28d59ef8916dda3ff447c30c432195ee6

        SHA256

        03e7c5764776efb1997d401048563d5d84cd3e0ac74cf0f496473c809990c651

        SHA512

        b431a611ce8c306a6c2e1a90ce0abb6aa282c63cc55942afbfc2a0993196a1846ce70d6c0faba203e88351a846a71ce0a57fd60c093ce7ec65fef39895351262

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8037.exe
        Filesize

        321KB

        MD5

        9c43318a20a2e87744c67a617557cff9

        SHA1

        496e6bf28d59ef8916dda3ff447c30c432195ee6

        SHA256

        03e7c5764776efb1997d401048563d5d84cd3e0ac74cf0f496473c809990c651

        SHA512

        b431a611ce8c306a6c2e1a90ce0abb6aa282c63cc55942afbfc2a0993196a1846ce70d6c0faba203e88351a846a71ce0a57fd60c093ce7ec65fef39895351262

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3538.exe
        Filesize

        380KB

        MD5

        096df3333d27f27ae362f003266069cf

        SHA1

        c2cdaf94040df03c98ede773c5d0baccca58d9b3

        SHA256

        0d6ac302c3186e26763bf9004ae24463c254e66c67fdd431e397ca37fd674cf3

        SHA512

        81365b5c3f860e68969eaf261cc14133f93c1ca19f305487c37b729809dc3d39471023514ce9267f770b1cfe34a714d66a1aa5348908edf29541c84023097f99

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3538.exe
        Filesize

        380KB

        MD5

        096df3333d27f27ae362f003266069cf

        SHA1

        c2cdaf94040df03c98ede773c5d0baccca58d9b3

        SHA256

        0d6ac302c3186e26763bf9004ae24463c254e66c67fdd431e397ca37fd674cf3

        SHA512

        81365b5c3f860e68969eaf261cc14133f93c1ca19f305487c37b729809dc3d39471023514ce9267f770b1cfe34a714d66a1aa5348908edf29541c84023097f99

      • memory/548-148-0x0000000002B80000-0x0000000002BAD000-memory.dmp
        Filesize

        180KB

      • memory/548-149-0x0000000007300000-0x00000000078A4000-memory.dmp
        Filesize

        5.6MB

      • memory/548-150-0x0000000004ED0000-0x0000000004EE2000-memory.dmp
        Filesize

        72KB

      • memory/548-151-0x0000000004ED0000-0x0000000004EE2000-memory.dmp
        Filesize

        72KB

      • memory/548-153-0x0000000004ED0000-0x0000000004EE2000-memory.dmp
        Filesize

        72KB

      • memory/548-155-0x0000000004ED0000-0x0000000004EE2000-memory.dmp
        Filesize

        72KB

      • memory/548-157-0x0000000004ED0000-0x0000000004EE2000-memory.dmp
        Filesize

        72KB

      • memory/548-159-0x0000000004ED0000-0x0000000004EE2000-memory.dmp
        Filesize

        72KB

      • memory/548-161-0x0000000004ED0000-0x0000000004EE2000-memory.dmp
        Filesize

        72KB

      • memory/548-163-0x0000000004ED0000-0x0000000004EE2000-memory.dmp
        Filesize

        72KB

      • memory/548-165-0x0000000004ED0000-0x0000000004EE2000-memory.dmp
        Filesize

        72KB

      • memory/548-167-0x0000000004ED0000-0x0000000004EE2000-memory.dmp
        Filesize

        72KB

      • memory/548-169-0x0000000004ED0000-0x0000000004EE2000-memory.dmp
        Filesize

        72KB

      • memory/548-171-0x0000000004ED0000-0x0000000004EE2000-memory.dmp
        Filesize

        72KB

      • memory/548-175-0x0000000004ED0000-0x0000000004EE2000-memory.dmp
        Filesize

        72KB

      • memory/548-177-0x0000000004ED0000-0x0000000004EE2000-memory.dmp
        Filesize

        72KB

      • memory/548-173-0x0000000004ED0000-0x0000000004EE2000-memory.dmp
        Filesize

        72KB

      • memory/548-178-0x0000000004F60000-0x0000000004F70000-memory.dmp
        Filesize

        64KB

      • memory/548-179-0x0000000004F60000-0x0000000004F70000-memory.dmp
        Filesize

        64KB

      • memory/548-180-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/548-182-0x0000000004F60000-0x0000000004F70000-memory.dmp
        Filesize

        64KB

      • memory/548-183-0x0000000004F60000-0x0000000004F70000-memory.dmp
        Filesize

        64KB

      • memory/548-184-0x0000000004F60000-0x0000000004F70000-memory.dmp
        Filesize

        64KB

      • memory/548-185-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/2748-1121-0x0000000000240000-0x0000000000272000-memory.dmp
        Filesize

        200KB

      • memory/2748-1122-0x0000000004DD0000-0x0000000004DE0000-memory.dmp
        Filesize

        64KB

      • memory/4788-191-0x0000000004BE0000-0x0000000004C1F000-memory.dmp
        Filesize

        252KB

      • memory/4788-225-0x0000000004BE0000-0x0000000004C1F000-memory.dmp
        Filesize

        252KB

      • memory/4788-195-0x0000000004BE0000-0x0000000004C1F000-memory.dmp
        Filesize

        252KB

      • memory/4788-196-0x0000000002C60000-0x0000000002CAB000-memory.dmp
        Filesize

        300KB

      • memory/4788-199-0x0000000004BE0000-0x0000000004C1F000-memory.dmp
        Filesize

        252KB

      • memory/4788-201-0x0000000004A90000-0x0000000004AA0000-memory.dmp
        Filesize

        64KB

      • memory/4788-203-0x0000000004A90000-0x0000000004AA0000-memory.dmp
        Filesize

        64KB

      • memory/4788-205-0x0000000004BE0000-0x0000000004C1F000-memory.dmp
        Filesize

        252KB

      • memory/4788-207-0x0000000004BE0000-0x0000000004C1F000-memory.dmp
        Filesize

        252KB

      • memory/4788-202-0x0000000004BE0000-0x0000000004C1F000-memory.dmp
        Filesize

        252KB

      • memory/4788-198-0x0000000004A90000-0x0000000004AA0000-memory.dmp
        Filesize

        64KB

      • memory/4788-209-0x0000000004BE0000-0x0000000004C1F000-memory.dmp
        Filesize

        252KB

      • memory/4788-211-0x0000000004BE0000-0x0000000004C1F000-memory.dmp
        Filesize

        252KB

      • memory/4788-213-0x0000000004BE0000-0x0000000004C1F000-memory.dmp
        Filesize

        252KB

      • memory/4788-215-0x0000000004BE0000-0x0000000004C1F000-memory.dmp
        Filesize

        252KB

      • memory/4788-217-0x0000000004BE0000-0x0000000004C1F000-memory.dmp
        Filesize

        252KB

      • memory/4788-219-0x0000000004BE0000-0x0000000004C1F000-memory.dmp
        Filesize

        252KB

      • memory/4788-221-0x0000000004BE0000-0x0000000004C1F000-memory.dmp
        Filesize

        252KB

      • memory/4788-223-0x0000000004BE0000-0x0000000004C1F000-memory.dmp
        Filesize

        252KB

      • memory/4788-193-0x0000000004BE0000-0x0000000004C1F000-memory.dmp
        Filesize

        252KB

      • memory/4788-227-0x0000000004BE0000-0x0000000004C1F000-memory.dmp
        Filesize

        252KB

      • memory/4788-1100-0x0000000007900000-0x0000000007F18000-memory.dmp
        Filesize

        6.1MB

      • memory/4788-1101-0x0000000007F70000-0x000000000807A000-memory.dmp
        Filesize

        1.0MB

      • memory/4788-1102-0x00000000080B0000-0x00000000080C2000-memory.dmp
        Filesize

        72KB

      • memory/4788-1103-0x00000000080D0000-0x000000000810C000-memory.dmp
        Filesize

        240KB

      • memory/4788-1104-0x0000000004A90000-0x0000000004AA0000-memory.dmp
        Filesize

        64KB

      • memory/4788-1106-0x0000000004A90000-0x0000000004AA0000-memory.dmp
        Filesize

        64KB

      • memory/4788-1107-0x0000000004A90000-0x0000000004AA0000-memory.dmp
        Filesize

        64KB

      • memory/4788-1108-0x0000000004A90000-0x0000000004AA0000-memory.dmp
        Filesize

        64KB

      • memory/4788-1109-0x00000000083C0000-0x0000000008452000-memory.dmp
        Filesize

        584KB

      • memory/4788-1110-0x0000000008460000-0x00000000084C6000-memory.dmp
        Filesize

        408KB

      • memory/4788-1111-0x0000000008CA0000-0x0000000008D16000-memory.dmp
        Filesize

        472KB

      • memory/4788-1112-0x0000000008D30000-0x0000000008D80000-memory.dmp
        Filesize

        320KB

      • memory/4788-190-0x0000000004BE0000-0x0000000004C1F000-memory.dmp
        Filesize

        252KB

      • memory/4788-1113-0x0000000008EB0000-0x0000000009072000-memory.dmp
        Filesize

        1.8MB

      • memory/4788-1114-0x0000000009080000-0x00000000095AC000-memory.dmp
        Filesize

        5.2MB

      • memory/4788-1115-0x0000000004A90000-0x0000000004AA0000-memory.dmp
        Filesize

        64KB