Analysis

  • max time kernel
    61s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 08:44

General

  • Target

    fdd9871062d3349f518cb095fb05589d665e3654742d0aa789e193abc9862ee8.exe

  • Size

    686KB

  • MD5

    853d11ba9669b817fee51d64fc3f2287

  • SHA1

    3b10d4bce1c5260f12bb7d60d5cc30a125d4799f

  • SHA256

    fdd9871062d3349f518cb095fb05589d665e3654742d0aa789e193abc9862ee8

  • SHA512

    c9184ac193d5c36dadc17e22427b4f8bd7571e8aba61b4f141261498ae47bfd5ef37ca9c79537a3ed52906226714f4099fd343628ccbb749962b242d076e7c00

  • SSDEEP

    12288:jMrvy90PiIRl+sHGX6yjC30R5qdKFMRREUKnuXt/7A:UyzIJHGRjC050WOREZuXl7A

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fdd9871062d3349f518cb095fb05589d665e3654742d0aa789e193abc9862ee8.exe
    "C:\Users\Admin\AppData\Local\Temp\fdd9871062d3349f518cb095fb05589d665e3654742d0aa789e193abc9862ee8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3148
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un953697.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un953697.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3284
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7200.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7200.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2948
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 1100
          4⤵
          • Program crash
          PID:3604
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9568.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9568.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5048
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5048 -s 1352
          4⤵
          • Program crash
          PID:4044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si338977.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si338977.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3840
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2948 -ip 2948
    1⤵
      PID:2088
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5048 -ip 5048
      1⤵
        PID:2656

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si338977.exe
        Filesize

        175KB

        MD5

        9987a52e56a7ef0e1f0dedfb9475249c

        SHA1

        d7595a023ea93a44cd17306944fe406dc3e95b93

        SHA256

        5083ae30cf82c720e01ab3e0bf9ddaf7be05f16bd6ffa0eeb1b50fe5626c15f5

        SHA512

        3e1c0f0b3137d25a48e8d9422554a3a41cd5fa61548283c0810f70b8d8f1b4f4ccfd23290964f34c1426b01d56a790cc1880aa9e59b54db2a1213e32d864a42d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si338977.exe
        Filesize

        175KB

        MD5

        9987a52e56a7ef0e1f0dedfb9475249c

        SHA1

        d7595a023ea93a44cd17306944fe406dc3e95b93

        SHA256

        5083ae30cf82c720e01ab3e0bf9ddaf7be05f16bd6ffa0eeb1b50fe5626c15f5

        SHA512

        3e1c0f0b3137d25a48e8d9422554a3a41cd5fa61548283c0810f70b8d8f1b4f4ccfd23290964f34c1426b01d56a790cc1880aa9e59b54db2a1213e32d864a42d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un953697.exe
        Filesize

        545KB

        MD5

        eb94dc1c5f4a530c0914bc31621e4a99

        SHA1

        19888fa757451d1e2832ba252a3a93c993851f22

        SHA256

        b261dc7bbc328053f216c22b859cfe8ce73f04d8b27707c315eee12ea424e32e

        SHA512

        c8b614da815358c807fd60308213c584c933418aa03648671918ba112ce9551b14f9a567e6b58f9e7ca113f544f1cf55c52004c2c2ec0564cf51f7b185b95fa1

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un953697.exe
        Filesize

        545KB

        MD5

        eb94dc1c5f4a530c0914bc31621e4a99

        SHA1

        19888fa757451d1e2832ba252a3a93c993851f22

        SHA256

        b261dc7bbc328053f216c22b859cfe8ce73f04d8b27707c315eee12ea424e32e

        SHA512

        c8b614da815358c807fd60308213c584c933418aa03648671918ba112ce9551b14f9a567e6b58f9e7ca113f544f1cf55c52004c2c2ec0564cf51f7b185b95fa1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7200.exe
        Filesize

        321KB

        MD5

        2009eaf3d589b5cc00e030555a9ef4e7

        SHA1

        036750a9b52e32d3aed5f3f0fd0a2b03d3e3d471

        SHA256

        83d1b1ee1990772e19cd001401ca731927b34fa724e24f5a606e9c4da2ada513

        SHA512

        96ce39c6929e194f6bd196eed25f313ca6a652a0fcff39e99dbc010e0f53cea777e982779365b5e8e5b94bfba3f93f06a7653274164b6faf2404b233480bb429

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7200.exe
        Filesize

        321KB

        MD5

        2009eaf3d589b5cc00e030555a9ef4e7

        SHA1

        036750a9b52e32d3aed5f3f0fd0a2b03d3e3d471

        SHA256

        83d1b1ee1990772e19cd001401ca731927b34fa724e24f5a606e9c4da2ada513

        SHA512

        96ce39c6929e194f6bd196eed25f313ca6a652a0fcff39e99dbc010e0f53cea777e982779365b5e8e5b94bfba3f93f06a7653274164b6faf2404b233480bb429

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9568.exe
        Filesize

        380KB

        MD5

        b29f093898a4814600d5258782d91db2

        SHA1

        661aae1232aaf987e39b8a603e2e5f715168af3b

        SHA256

        7e910e74e1f857627d8cde1d2244793882c1a29dbbbe3528c355dfe569841b81

        SHA512

        8cb848170ea09df9bebe958488ba85aec86d8f63fbecee94bea2db0c5bca86c5f3ddec966f1150ca9d2a9544b2fcb031ef1e94683217958f7a4039042e9ba800

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9568.exe
        Filesize

        380KB

        MD5

        b29f093898a4814600d5258782d91db2

        SHA1

        661aae1232aaf987e39b8a603e2e5f715168af3b

        SHA256

        7e910e74e1f857627d8cde1d2244793882c1a29dbbbe3528c355dfe569841b81

        SHA512

        8cb848170ea09df9bebe958488ba85aec86d8f63fbecee94bea2db0c5bca86c5f3ddec966f1150ca9d2a9544b2fcb031ef1e94683217958f7a4039042e9ba800

      • memory/2948-151-0x0000000002CA0000-0x0000000002CCD000-memory.dmp
        Filesize

        180KB

      • memory/2948-152-0x0000000007270000-0x0000000007814000-memory.dmp
        Filesize

        5.6MB

      • memory/2948-153-0x0000000007260000-0x0000000007270000-memory.dmp
        Filesize

        64KB

      • memory/2948-154-0x0000000007260000-0x0000000007270000-memory.dmp
        Filesize

        64KB

      • memory/2948-155-0x0000000004B60000-0x0000000004B72000-memory.dmp
        Filesize

        72KB

      • memory/2948-156-0x0000000004B60000-0x0000000004B72000-memory.dmp
        Filesize

        72KB

      • memory/2948-158-0x0000000004B60000-0x0000000004B72000-memory.dmp
        Filesize

        72KB

      • memory/2948-160-0x0000000004B60000-0x0000000004B72000-memory.dmp
        Filesize

        72KB

      • memory/2948-162-0x0000000004B60000-0x0000000004B72000-memory.dmp
        Filesize

        72KB

      • memory/2948-164-0x0000000004B60000-0x0000000004B72000-memory.dmp
        Filesize

        72KB

      • memory/2948-166-0x0000000004B60000-0x0000000004B72000-memory.dmp
        Filesize

        72KB

      • memory/2948-168-0x0000000004B60000-0x0000000004B72000-memory.dmp
        Filesize

        72KB

      • memory/2948-170-0x0000000004B60000-0x0000000004B72000-memory.dmp
        Filesize

        72KB

      • memory/2948-172-0x0000000004B60000-0x0000000004B72000-memory.dmp
        Filesize

        72KB

      • memory/2948-174-0x0000000004B60000-0x0000000004B72000-memory.dmp
        Filesize

        72KB

      • memory/2948-176-0x0000000004B60000-0x0000000004B72000-memory.dmp
        Filesize

        72KB

      • memory/2948-178-0x0000000004B60000-0x0000000004B72000-memory.dmp
        Filesize

        72KB

      • memory/2948-180-0x0000000004B60000-0x0000000004B72000-memory.dmp
        Filesize

        72KB

      • memory/2948-182-0x0000000004B60000-0x0000000004B72000-memory.dmp
        Filesize

        72KB

      • memory/2948-183-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/2948-184-0x0000000002CA0000-0x0000000002CCD000-memory.dmp
        Filesize

        180KB

      • memory/2948-185-0x0000000007260000-0x0000000007270000-memory.dmp
        Filesize

        64KB

      • memory/2948-186-0x0000000007260000-0x0000000007270000-memory.dmp
        Filesize

        64KB

      • memory/2948-187-0x0000000007260000-0x0000000007270000-memory.dmp
        Filesize

        64KB

      • memory/2948-189-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/3840-1125-0x0000000000E50000-0x0000000000E82000-memory.dmp
        Filesize

        200KB

      • memory/3840-1126-0x0000000005A70000-0x0000000005A80000-memory.dmp
        Filesize

        64KB

      • memory/5048-197-0x0000000007270000-0x0000000007280000-memory.dmp
        Filesize

        64KB

      • memory/5048-229-0x0000000007830000-0x000000000786F000-memory.dmp
        Filesize

        252KB

      • memory/5048-196-0x0000000007270000-0x0000000007280000-memory.dmp
        Filesize

        64KB

      • memory/5048-198-0x0000000007830000-0x000000000786F000-memory.dmp
        Filesize

        252KB

      • memory/5048-199-0x0000000007830000-0x000000000786F000-memory.dmp
        Filesize

        252KB

      • memory/5048-201-0x0000000007830000-0x000000000786F000-memory.dmp
        Filesize

        252KB

      • memory/5048-203-0x0000000007830000-0x000000000786F000-memory.dmp
        Filesize

        252KB

      • memory/5048-205-0x0000000007830000-0x000000000786F000-memory.dmp
        Filesize

        252KB

      • memory/5048-207-0x0000000007830000-0x000000000786F000-memory.dmp
        Filesize

        252KB

      • memory/5048-209-0x0000000007830000-0x000000000786F000-memory.dmp
        Filesize

        252KB

      • memory/5048-211-0x0000000007830000-0x000000000786F000-memory.dmp
        Filesize

        252KB

      • memory/5048-213-0x0000000007830000-0x000000000786F000-memory.dmp
        Filesize

        252KB

      • memory/5048-215-0x0000000007830000-0x000000000786F000-memory.dmp
        Filesize

        252KB

      • memory/5048-217-0x0000000007830000-0x000000000786F000-memory.dmp
        Filesize

        252KB

      • memory/5048-219-0x0000000007830000-0x000000000786F000-memory.dmp
        Filesize

        252KB

      • memory/5048-221-0x0000000007830000-0x000000000786F000-memory.dmp
        Filesize

        252KB

      • memory/5048-223-0x0000000007830000-0x000000000786F000-memory.dmp
        Filesize

        252KB

      • memory/5048-225-0x0000000007830000-0x000000000786F000-memory.dmp
        Filesize

        252KB

      • memory/5048-227-0x0000000007830000-0x000000000786F000-memory.dmp
        Filesize

        252KB

      • memory/5048-195-0x0000000007270000-0x0000000007280000-memory.dmp
        Filesize

        64KB

      • memory/5048-231-0x0000000007830000-0x000000000786F000-memory.dmp
        Filesize

        252KB

      • memory/5048-1104-0x00000000078D0000-0x0000000007EE8000-memory.dmp
        Filesize

        6.1MB

      • memory/5048-1105-0x0000000007F70000-0x000000000807A000-memory.dmp
        Filesize

        1.0MB

      • memory/5048-1106-0x00000000080B0000-0x00000000080C2000-memory.dmp
        Filesize

        72KB

      • memory/5048-1107-0x00000000080D0000-0x000000000810C000-memory.dmp
        Filesize

        240KB

      • memory/5048-1108-0x0000000007270000-0x0000000007280000-memory.dmp
        Filesize

        64KB

      • memory/5048-1110-0x00000000083C0000-0x0000000008452000-memory.dmp
        Filesize

        584KB

      • memory/5048-1111-0x0000000008460000-0x00000000084C6000-memory.dmp
        Filesize

        408KB

      • memory/5048-1113-0x0000000007270000-0x0000000007280000-memory.dmp
        Filesize

        64KB

      • memory/5048-1112-0x0000000007270000-0x0000000007280000-memory.dmp
        Filesize

        64KB

      • memory/5048-1114-0x0000000007270000-0x0000000007280000-memory.dmp
        Filesize

        64KB

      • memory/5048-1115-0x0000000008B80000-0x0000000008D42000-memory.dmp
        Filesize

        1.8MB

      • memory/5048-1116-0x0000000008D50000-0x000000000927C000-memory.dmp
        Filesize

        5.2MB

      • memory/5048-194-0x0000000002C60000-0x0000000002CAB000-memory.dmp
        Filesize

        300KB

      • memory/5048-1117-0x00000000093D0000-0x0000000009446000-memory.dmp
        Filesize

        472KB

      • memory/5048-1118-0x0000000009450000-0x00000000094A0000-memory.dmp
        Filesize

        320KB

      • memory/5048-1119-0x0000000007270000-0x0000000007280000-memory.dmp
        Filesize

        64KB