Analysis

  • max time kernel
    127s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 09:24

General

  • Target

    47047d70e0fe20957ddaa74655d804c7ed95d0f4982bf51ff573d8f8722c6f10.exe

  • Size

    682KB

  • MD5

    f3d43aa1aba3589269b0040013ba2a98

  • SHA1

    f8b2d971f8a37c3509885f9987feaec6f1a83369

  • SHA256

    47047d70e0fe20957ddaa74655d804c7ed95d0f4982bf51ff573d8f8722c6f10

  • SHA512

    b4fa5a331a5d019f37a81b49e15da4b58da5733086debe49835155c5a226f5333bf1c6ac1b9593ec8ca90671c90c767da09ed2f128666c867d773321ff9155d2

  • SSDEEP

    12288:EMr8y90GGNmfAJPHOui2pTobKOrRCpC4JkGUktmMLFf12EzTrp:gyX2mWuuxp4NCRBmMLf2gp

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\47047d70e0fe20957ddaa74655d804c7ed95d0f4982bf51ff573d8f8722c6f10.exe
    "C:\Users\Admin\AppData\Local\Temp\47047d70e0fe20957ddaa74655d804c7ed95d0f4982bf51ff573d8f8722c6f10.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4268
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un946767.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un946767.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4932
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8153.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8153.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1236
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1236 -s 1080
          4⤵
          • Program crash
          PID:4652
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1020.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1020.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3740
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3740 -s 1336
          4⤵
          • Program crash
          PID:4564
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si687662.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si687662.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2716
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1236 -ip 1236
    1⤵
      PID:4680
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3740 -ip 3740
      1⤵
        PID:3396

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si687662.exe
        Filesize

        175KB

        MD5

        2778c75bcfbfa2754e94f18febb8a0d4

        SHA1

        e34c50802886a7efccfa53ef6c73a950051840e9

        SHA256

        92b6d18d3512ac23db66a2db3c287fb9f552fa95fa949afe257b5d38895095c4

        SHA512

        4c823b532ea12ca13be657db9efcd5729b7fa6b8829d8624ef522277dbd2fb7aefdef9b3b77de43d80378945205fca7c8681e5f1c2be55a212239b95ab5d9a80

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si687662.exe
        Filesize

        175KB

        MD5

        2778c75bcfbfa2754e94f18febb8a0d4

        SHA1

        e34c50802886a7efccfa53ef6c73a950051840e9

        SHA256

        92b6d18d3512ac23db66a2db3c287fb9f552fa95fa949afe257b5d38895095c4

        SHA512

        4c823b532ea12ca13be657db9efcd5729b7fa6b8829d8624ef522277dbd2fb7aefdef9b3b77de43d80378945205fca7c8681e5f1c2be55a212239b95ab5d9a80

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un946767.exe
        Filesize

        540KB

        MD5

        1c2e3b940d2b057fc57f819d82a79782

        SHA1

        7ee0be78c3666aad32124e4afa6b86f84c2c14fc

        SHA256

        1f50a769aac79df1b0e58768b2a416728186091be09bdac93673f94938748eab

        SHA512

        e1b86128b762d31f58555b94eb1e924627236304a51cee9d57a5eebc6621bfe902254741acca9a5c7968e27a851b324eaaca8a57b7f229e22d7f14b23b74749d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un946767.exe
        Filesize

        540KB

        MD5

        1c2e3b940d2b057fc57f819d82a79782

        SHA1

        7ee0be78c3666aad32124e4afa6b86f84c2c14fc

        SHA256

        1f50a769aac79df1b0e58768b2a416728186091be09bdac93673f94938748eab

        SHA512

        e1b86128b762d31f58555b94eb1e924627236304a51cee9d57a5eebc6621bfe902254741acca9a5c7968e27a851b324eaaca8a57b7f229e22d7f14b23b74749d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8153.exe
        Filesize

        321KB

        MD5

        69ee165cf7790bcf735beb08045a4583

        SHA1

        b6b49cece6706ceed946bd77a7ce3b30688ab69d

        SHA256

        4daf6fff28bc4ac7f4e3c5f7287dc090af3d57fddad660d1f6339c6aee825136

        SHA512

        3b6836c312217274aa1662606e6e5ed9da1ca6ffcddc88e53245cbd0f9ba9f9ecbb6530af9903d097be01f25924f467685ba47e93ea6ff0b678d48d5a62dfd39

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8153.exe
        Filesize

        321KB

        MD5

        69ee165cf7790bcf735beb08045a4583

        SHA1

        b6b49cece6706ceed946bd77a7ce3b30688ab69d

        SHA256

        4daf6fff28bc4ac7f4e3c5f7287dc090af3d57fddad660d1f6339c6aee825136

        SHA512

        3b6836c312217274aa1662606e6e5ed9da1ca6ffcddc88e53245cbd0f9ba9f9ecbb6530af9903d097be01f25924f467685ba47e93ea6ff0b678d48d5a62dfd39

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1020.exe
        Filesize

        380KB

        MD5

        a6a8677decde80d90c67e6e0389a0a77

        SHA1

        c59908a6c94a1ac43845d21c4fcbfad908f04ead

        SHA256

        214c5ec65744657db51fe6039624994f6d0c998c4ae80e09904d046ee5b50a00

        SHA512

        133fd29852650f4f08a6d235fc3d9c3f76445f12a3b7c0c4763109df6dfc50e52096253914471b70d06dc9f8be7fe3c52660267bbcc9c15c5aae4f4074d4b37f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1020.exe
        Filesize

        380KB

        MD5

        a6a8677decde80d90c67e6e0389a0a77

        SHA1

        c59908a6c94a1ac43845d21c4fcbfad908f04ead

        SHA256

        214c5ec65744657db51fe6039624994f6d0c998c4ae80e09904d046ee5b50a00

        SHA512

        133fd29852650f4f08a6d235fc3d9c3f76445f12a3b7c0c4763109df6dfc50e52096253914471b70d06dc9f8be7fe3c52660267bbcc9c15c5aae4f4074d4b37f

      • memory/1236-148-0x0000000002C50000-0x0000000002C7D000-memory.dmp
        Filesize

        180KB

      • memory/1236-149-0x00000000073A0000-0x0000000007944000-memory.dmp
        Filesize

        5.6MB

      • memory/1236-150-0x0000000004DD0000-0x0000000004DE2000-memory.dmp
        Filesize

        72KB

      • memory/1236-151-0x0000000004DD0000-0x0000000004DE2000-memory.dmp
        Filesize

        72KB

      • memory/1236-153-0x0000000004DD0000-0x0000000004DE2000-memory.dmp
        Filesize

        72KB

      • memory/1236-155-0x0000000004DD0000-0x0000000004DE2000-memory.dmp
        Filesize

        72KB

      • memory/1236-157-0x0000000004DD0000-0x0000000004DE2000-memory.dmp
        Filesize

        72KB

      • memory/1236-159-0x0000000004DD0000-0x0000000004DE2000-memory.dmp
        Filesize

        72KB

      • memory/1236-161-0x0000000004DD0000-0x0000000004DE2000-memory.dmp
        Filesize

        72KB

      • memory/1236-163-0x0000000004DD0000-0x0000000004DE2000-memory.dmp
        Filesize

        72KB

      • memory/1236-165-0x0000000004DD0000-0x0000000004DE2000-memory.dmp
        Filesize

        72KB

      • memory/1236-167-0x0000000004DD0000-0x0000000004DE2000-memory.dmp
        Filesize

        72KB

      • memory/1236-169-0x0000000004DD0000-0x0000000004DE2000-memory.dmp
        Filesize

        72KB

      • memory/1236-171-0x0000000004DD0000-0x0000000004DE2000-memory.dmp
        Filesize

        72KB

      • memory/1236-173-0x0000000004DD0000-0x0000000004DE2000-memory.dmp
        Filesize

        72KB

      • memory/1236-175-0x0000000004DD0000-0x0000000004DE2000-memory.dmp
        Filesize

        72KB

      • memory/1236-177-0x0000000004DD0000-0x0000000004DE2000-memory.dmp
        Filesize

        72KB

      • memory/1236-178-0x0000000007390000-0x00000000073A0000-memory.dmp
        Filesize

        64KB

      • memory/1236-179-0x0000000007390000-0x00000000073A0000-memory.dmp
        Filesize

        64KB

      • memory/1236-180-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/1236-181-0x0000000007390000-0x00000000073A0000-memory.dmp
        Filesize

        64KB

      • memory/1236-182-0x0000000007390000-0x00000000073A0000-memory.dmp
        Filesize

        64KB

      • memory/1236-184-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/2716-1119-0x0000000000570000-0x00000000005A2000-memory.dmp
        Filesize

        200KB

      • memory/2716-1120-0x0000000004EA0000-0x0000000004EB0000-memory.dmp
        Filesize

        64KB

      • memory/3740-191-0x0000000007160000-0x000000000719F000-memory.dmp
        Filesize

        252KB

      • memory/3740-221-0x0000000007160000-0x000000000719F000-memory.dmp
        Filesize

        252KB

      • memory/3740-195-0x0000000007160000-0x000000000719F000-memory.dmp
        Filesize

        252KB

      • memory/3740-193-0x0000000007350000-0x0000000007360000-memory.dmp
        Filesize

        64KB

      • memory/3740-189-0x0000000007160000-0x000000000719F000-memory.dmp
        Filesize

        252KB

      • memory/3740-197-0x0000000007160000-0x000000000719F000-memory.dmp
        Filesize

        252KB

      • memory/3740-199-0x0000000007160000-0x000000000719F000-memory.dmp
        Filesize

        252KB

      • memory/3740-201-0x0000000007160000-0x000000000719F000-memory.dmp
        Filesize

        252KB

      • memory/3740-203-0x0000000007160000-0x000000000719F000-memory.dmp
        Filesize

        252KB

      • memory/3740-205-0x0000000007160000-0x000000000719F000-memory.dmp
        Filesize

        252KB

      • memory/3740-207-0x0000000007160000-0x000000000719F000-memory.dmp
        Filesize

        252KB

      • memory/3740-209-0x0000000007160000-0x000000000719F000-memory.dmp
        Filesize

        252KB

      • memory/3740-211-0x0000000007160000-0x000000000719F000-memory.dmp
        Filesize

        252KB

      • memory/3740-213-0x0000000007160000-0x000000000719F000-memory.dmp
        Filesize

        252KB

      • memory/3740-215-0x0000000007160000-0x000000000719F000-memory.dmp
        Filesize

        252KB

      • memory/3740-217-0x0000000007160000-0x000000000719F000-memory.dmp
        Filesize

        252KB

      • memory/3740-219-0x0000000007160000-0x000000000719F000-memory.dmp
        Filesize

        252KB

      • memory/3740-192-0x0000000007350000-0x0000000007360000-memory.dmp
        Filesize

        64KB

      • memory/3740-223-0x0000000007160000-0x000000000719F000-memory.dmp
        Filesize

        252KB

      • memory/3740-225-0x0000000007160000-0x000000000719F000-memory.dmp
        Filesize

        252KB

      • memory/3740-1098-0x0000000007910000-0x0000000007F28000-memory.dmp
        Filesize

        6.1MB

      • memory/3740-1099-0x0000000007F70000-0x000000000807A000-memory.dmp
        Filesize

        1.0MB

      • memory/3740-1100-0x00000000080B0000-0x00000000080C2000-memory.dmp
        Filesize

        72KB

      • memory/3740-1101-0x0000000007350000-0x0000000007360000-memory.dmp
        Filesize

        64KB

      • memory/3740-1102-0x00000000080D0000-0x000000000810C000-memory.dmp
        Filesize

        240KB

      • memory/3740-1104-0x00000000083C0000-0x0000000008426000-memory.dmp
        Filesize

        408KB

      • memory/3740-1105-0x0000000008A70000-0x0000000008B02000-memory.dmp
        Filesize

        584KB

      • memory/3740-1106-0x0000000008B60000-0x0000000008BD6000-memory.dmp
        Filesize

        472KB

      • memory/3740-1107-0x0000000008BF0000-0x0000000008C40000-memory.dmp
        Filesize

        320KB

      • memory/3740-1108-0x0000000007350000-0x0000000007360000-memory.dmp
        Filesize

        64KB

      • memory/3740-1109-0x0000000007350000-0x0000000007360000-memory.dmp
        Filesize

        64KB

      • memory/3740-1110-0x0000000007350000-0x0000000007360000-memory.dmp
        Filesize

        64KB

      • memory/3740-190-0x0000000002C80000-0x0000000002CCB000-memory.dmp
        Filesize

        300KB

      • memory/3740-1111-0x0000000008D60000-0x0000000008F22000-memory.dmp
        Filesize

        1.8MB

      • memory/3740-1112-0x0000000008F40000-0x000000000946C000-memory.dmp
        Filesize

        5.2MB

      • memory/3740-1113-0x0000000007350000-0x0000000007360000-memory.dmp
        Filesize

        64KB