Analysis

  • max time kernel
    135s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 08:30

General

  • Target

    4e62c2ddf7b51664ce22a8f3724560b7b8c8598e9d3724b9a959db89e625ab50.exe

  • Size

    684KB

  • MD5

    d2ed6d2dc316e07269ac9ee8b583ddad

  • SHA1

    e31c8bc60090f6b5a0be27b7740256b60e10f634

  • SHA256

    4e62c2ddf7b51664ce22a8f3724560b7b8c8598e9d3724b9a959db89e625ab50

  • SHA512

    bd07f71a0369613949a0f0225edf21da7cea3077cbb85068d9b37fe2803ee03221cae72d5e0b18943410b5d613ce0a87d135a5f370880394bc03a36965a96e23

  • SSDEEP

    12288:CMr2y90CLvRYT1T8E0CAph4287g5t49Kyzz0peeILUl2mLL3oY:IyrLRYT1T8gAo2C9Kyzy8NmLLYY

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e62c2ddf7b51664ce22a8f3724560b7b8c8598e9d3724b9a959db89e625ab50.exe
    "C:\Users\Admin\AppData\Local\Temp\4e62c2ddf7b51664ce22a8f3724560b7b8c8598e9d3724b9a959db89e625ab50.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3480
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un958752.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un958752.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0690.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0690.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4576
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 1084
          4⤵
          • Program crash
          PID:4792
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1021.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1021.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2172
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 1156
          4⤵
          • Program crash
          PID:2528
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si923888.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si923888.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4108
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4576 -ip 4576
    1⤵
      PID:3948
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2172 -ip 2172
      1⤵
        PID:3312
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:652

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si923888.exe
        Filesize

        175KB

        MD5

        ff580fba67bd407cf1fbbfcf0d61612b

        SHA1

        e778846db56b45d61490803ee4fbb95a8bc14fc2

        SHA256

        c8cfa4abf719c1bf9c805567848c23d308db567754eba51425ff331834870b9e

        SHA512

        1cb3e658ef008d318b73b9aa4ece49cbce312c7dfd767655ef9520083085247c0dc2fba0e598dfbc5d6ede6a42f3a8f0dbf43a78b851a603eabdcca7ed370a14

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si923888.exe
        Filesize

        175KB

        MD5

        ff580fba67bd407cf1fbbfcf0d61612b

        SHA1

        e778846db56b45d61490803ee4fbb95a8bc14fc2

        SHA256

        c8cfa4abf719c1bf9c805567848c23d308db567754eba51425ff331834870b9e

        SHA512

        1cb3e658ef008d318b73b9aa4ece49cbce312c7dfd767655ef9520083085247c0dc2fba0e598dfbc5d6ede6a42f3a8f0dbf43a78b851a603eabdcca7ed370a14

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un958752.exe
        Filesize

        542KB

        MD5

        93aecf0dc3ca45ddc6c6b1903f7d1bd1

        SHA1

        6ad88dff36bef44d6509f2eb991e66eaa36f35a6

        SHA256

        bc25abb88fd2d5c1479df5bff139c24e2e44a35621130afe15247dfe91cd2d2c

        SHA512

        59fe2dcec7e447e30be69f28df366d20abbd00cafc661a40459ac5a9360b5167faa201fc14693bb574c27e73efdd17dd3339c0d835dfaeb6256f7faa919ce9e3

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un958752.exe
        Filesize

        542KB

        MD5

        93aecf0dc3ca45ddc6c6b1903f7d1bd1

        SHA1

        6ad88dff36bef44d6509f2eb991e66eaa36f35a6

        SHA256

        bc25abb88fd2d5c1479df5bff139c24e2e44a35621130afe15247dfe91cd2d2c

        SHA512

        59fe2dcec7e447e30be69f28df366d20abbd00cafc661a40459ac5a9360b5167faa201fc14693bb574c27e73efdd17dd3339c0d835dfaeb6256f7faa919ce9e3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0690.exe
        Filesize

        321KB

        MD5

        16ecd53adaaf887ea550efaaa5548ade

        SHA1

        4a499e02bfdbf287b92fca7edc1e622170f7130f

        SHA256

        8f83f28d75c0b8660e33d7bdb3e7251225ac1584b6ebe5ba5e16bf7d18de8796

        SHA512

        19a3a275ad3fe7fb7696e01ded70f5928b13c7511af3b51f6218e2f06d407abc0bcbf1ec89828e67099987d6ed474955be58bf5c0fcf9fb98a45aa83328e6cb0

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0690.exe
        Filesize

        321KB

        MD5

        16ecd53adaaf887ea550efaaa5548ade

        SHA1

        4a499e02bfdbf287b92fca7edc1e622170f7130f

        SHA256

        8f83f28d75c0b8660e33d7bdb3e7251225ac1584b6ebe5ba5e16bf7d18de8796

        SHA512

        19a3a275ad3fe7fb7696e01ded70f5928b13c7511af3b51f6218e2f06d407abc0bcbf1ec89828e67099987d6ed474955be58bf5c0fcf9fb98a45aa83328e6cb0

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1021.exe
        Filesize

        380KB

        MD5

        7bc5396b12218d7e044c246c4d2d16a9

        SHA1

        97718d7e3e22b3c11d69e8d7c4d5ed7f13e989e9

        SHA256

        1ee645283c808a2bb874303e98344884ca134d7d7314a77c355b91b0c4ab6324

        SHA512

        0ab9b73ad533a82183996b1bd620ed98386b118b09cdf5d2f4b90af528fca2fa54767e4653a32584682f1992b6c129ea5c08fcb1152015a8aefc7fe532724f6c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1021.exe
        Filesize

        380KB

        MD5

        7bc5396b12218d7e044c246c4d2d16a9

        SHA1

        97718d7e3e22b3c11d69e8d7c4d5ed7f13e989e9

        SHA256

        1ee645283c808a2bb874303e98344884ca134d7d7314a77c355b91b0c4ab6324

        SHA512

        0ab9b73ad533a82183996b1bd620ed98386b118b09cdf5d2f4b90af528fca2fa54767e4653a32584682f1992b6c129ea5c08fcb1152015a8aefc7fe532724f6c

      • memory/2172-1102-0x0000000007F70000-0x000000000807A000-memory.dmp
        Filesize

        1.0MB

      • memory/2172-1103-0x0000000003090000-0x00000000030A0000-memory.dmp
        Filesize

        64KB

      • memory/2172-223-0x0000000003090000-0x00000000030A0000-memory.dmp
        Filesize

        64KB

      • memory/2172-221-0x0000000002B90000-0x0000000002BDB000-memory.dmp
        Filesize

        300KB

      • memory/2172-218-0x00000000076F0000-0x000000000772F000-memory.dmp
        Filesize

        252KB

      • memory/2172-208-0x00000000076F0000-0x000000000772F000-memory.dmp
        Filesize

        252KB

      • memory/2172-1116-0x0000000003090000-0x00000000030A0000-memory.dmp
        Filesize

        64KB

      • memory/2172-1115-0x0000000009540000-0x0000000009590000-memory.dmp
        Filesize

        320KB

      • memory/2172-1114-0x00000000094C0000-0x0000000009536000-memory.dmp
        Filesize

        472KB

      • memory/2172-1113-0x0000000003090000-0x00000000030A0000-memory.dmp
        Filesize

        64KB

      • memory/2172-1112-0x0000000003090000-0x00000000030A0000-memory.dmp
        Filesize

        64KB

      • memory/2172-1111-0x0000000003090000-0x00000000030A0000-memory.dmp
        Filesize

        64KB

      • memory/2172-1110-0x0000000008E50000-0x000000000937C000-memory.dmp
        Filesize

        5.2MB

      • memory/2172-210-0x00000000076F0000-0x000000000772F000-memory.dmp
        Filesize

        252KB

      • memory/2172-1109-0x0000000008C80000-0x0000000008E42000-memory.dmp
        Filesize

        1.8MB

      • memory/2172-1108-0x0000000008A90000-0x0000000008B22000-memory.dmp
        Filesize

        584KB

      • memory/2172-1107-0x00000000083C0000-0x0000000008426000-memory.dmp
        Filesize

        408KB

      • memory/2172-1105-0x00000000080D0000-0x000000000810C000-memory.dmp
        Filesize

        240KB

      • memory/2172-1104-0x00000000080B0000-0x00000000080C2000-memory.dmp
        Filesize

        72KB

      • memory/2172-226-0x0000000003090000-0x00000000030A0000-memory.dmp
        Filesize

        64KB

      • memory/2172-1101-0x00000000078D0000-0x0000000007EE8000-memory.dmp
        Filesize

        6.1MB

      • memory/2172-220-0x00000000076F0000-0x000000000772F000-memory.dmp
        Filesize

        252KB

      • memory/2172-227-0x00000000076F0000-0x000000000772F000-memory.dmp
        Filesize

        252KB

      • memory/2172-191-0x00000000076F0000-0x000000000772F000-memory.dmp
        Filesize

        252KB

      • memory/2172-192-0x00000000076F0000-0x000000000772F000-memory.dmp
        Filesize

        252KB

      • memory/2172-212-0x00000000076F0000-0x000000000772F000-memory.dmp
        Filesize

        252KB

      • memory/2172-196-0x00000000076F0000-0x000000000772F000-memory.dmp
        Filesize

        252KB

      • memory/2172-198-0x00000000076F0000-0x000000000772F000-memory.dmp
        Filesize

        252KB

      • memory/2172-200-0x00000000076F0000-0x000000000772F000-memory.dmp
        Filesize

        252KB

      • memory/2172-202-0x00000000076F0000-0x000000000772F000-memory.dmp
        Filesize

        252KB

      • memory/2172-204-0x00000000076F0000-0x000000000772F000-memory.dmp
        Filesize

        252KB

      • memory/2172-206-0x00000000076F0000-0x000000000772F000-memory.dmp
        Filesize

        252KB

      • memory/2172-228-0x0000000003090000-0x00000000030A0000-memory.dmp
        Filesize

        64KB

      • memory/2172-224-0x00000000076F0000-0x000000000772F000-memory.dmp
        Filesize

        252KB

      • memory/2172-194-0x00000000076F0000-0x000000000772F000-memory.dmp
        Filesize

        252KB

      • memory/2172-214-0x00000000076F0000-0x000000000772F000-memory.dmp
        Filesize

        252KB

      • memory/2172-216-0x00000000076F0000-0x000000000772F000-memory.dmp
        Filesize

        252KB

      • memory/4108-1122-0x0000000000850000-0x0000000000882000-memory.dmp
        Filesize

        200KB

      • memory/4108-1123-0x0000000005100000-0x0000000005110000-memory.dmp
        Filesize

        64KB

      • memory/4108-1125-0x0000000005100000-0x0000000005110000-memory.dmp
        Filesize

        64KB

      • memory/4576-183-0x0000000007280000-0x0000000007290000-memory.dmp
        Filesize

        64KB

      • memory/4576-178-0x0000000007280000-0x0000000007290000-memory.dmp
        Filesize

        64KB

      • memory/4576-163-0x00000000049C0000-0x00000000049D2000-memory.dmp
        Filesize

        72KB

      • memory/4576-151-0x00000000049C0000-0x00000000049D2000-memory.dmp
        Filesize

        72KB

      • memory/4576-153-0x00000000049C0000-0x00000000049D2000-memory.dmp
        Filesize

        72KB

      • memory/4576-186-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/4576-150-0x00000000049C0000-0x00000000049D2000-memory.dmp
        Filesize

        72KB

      • memory/4576-185-0x0000000007280000-0x0000000007290000-memory.dmp
        Filesize

        64KB

      • memory/4576-184-0x0000000007280000-0x0000000007290000-memory.dmp
        Filesize

        64KB

      • memory/4576-155-0x00000000049C0000-0x00000000049D2000-memory.dmp
        Filesize

        72KB

      • memory/4576-181-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/4576-180-0x0000000007280000-0x0000000007290000-memory.dmp
        Filesize

        64KB

      • memory/4576-179-0x0000000007280000-0x0000000007290000-memory.dmp
        Filesize

        64KB

      • memory/4576-177-0x00000000049C0000-0x00000000049D2000-memory.dmp
        Filesize

        72KB

      • memory/4576-175-0x00000000049C0000-0x00000000049D2000-memory.dmp
        Filesize

        72KB

      • memory/4576-173-0x00000000049C0000-0x00000000049D2000-memory.dmp
        Filesize

        72KB

      • memory/4576-171-0x00000000049C0000-0x00000000049D2000-memory.dmp
        Filesize

        72KB

      • memory/4576-169-0x00000000049C0000-0x00000000049D2000-memory.dmp
        Filesize

        72KB

      • memory/4576-167-0x00000000049C0000-0x00000000049D2000-memory.dmp
        Filesize

        72KB

      • memory/4576-165-0x00000000049C0000-0x00000000049D2000-memory.dmp
        Filesize

        72KB

      • memory/4576-149-0x0000000007290000-0x0000000007834000-memory.dmp
        Filesize

        5.6MB

      • memory/4576-148-0x0000000002C50000-0x0000000002C7D000-memory.dmp
        Filesize

        180KB

      • memory/4576-161-0x00000000049C0000-0x00000000049D2000-memory.dmp
        Filesize

        72KB

      • memory/4576-159-0x00000000049C0000-0x00000000049D2000-memory.dmp
        Filesize

        72KB

      • memory/4576-157-0x00000000049C0000-0x00000000049D2000-memory.dmp
        Filesize

        72KB