Analysis

  • max time kernel
    55s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2023, 11:02

General

  • Target

    812f1bf9390886c55c76d40592221b2eceba75df5959dcee663eb12d69d142ef.exe

  • Size

    697KB

  • MD5

    d11a2f5606467d8d4a0c729b9c04183f

  • SHA1

    59997142a3e4ba6d3c5dca48461ba30b09206792

  • SHA256

    812f1bf9390886c55c76d40592221b2eceba75df5959dcee663eb12d69d142ef

  • SHA512

    5dac100ad5f13a5d00d6c64cd4c9abcc6cfb43d0698065e4b00b10cb73f06560f7f2404c9ed3a852a94f4505a0a8035b522e3fe4d361b1e384e5bda7eda24427

  • SSDEEP

    12288:yMruy90Q6oC4bZA0UkZZqtp/YKksx8lRFQphL6DZGjcAxI9gykqpGSWt:kywXkZ+ZksxGUwGj1I9rvGt

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

muse

C2

176.113.115.145:4125

Attributes
  • auth_value

    b91988a63a24940038d9262827a5320c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\812f1bf9390886c55c76d40592221b2eceba75df5959dcee663eb12d69d142ef.exe
    "C:\Users\Admin\AppData\Local\Temp\812f1bf9390886c55c76d40592221b2eceba75df5959dcee663eb12d69d142ef.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:452
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un498730.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un498730.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1196
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4916.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4916.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3252
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3252 -s 1080
          4⤵
          • Program crash
          PID:2112
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7898.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7898.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2060
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 1872
          4⤵
          • Program crash
          PID:4920
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si188767.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si188767.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1560
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3252 -ip 3252
    1⤵
      PID:1736
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 2060 -ip 2060
      1⤵
        PID:664

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si188767.exe

        Filesize

        175KB

        MD5

        b9d4e7a88c5d20beb2809aea4fbdefa3

        SHA1

        c375b5d47df0b49f2f42b151389344feb7027b06

        SHA256

        37720a033f6afe175bf595313b2cd9f86ea79cb8e8006dd4f7bc5708e9f2bc39

        SHA512

        2c75c221b2426ff5e6d96046b909fd870706fe6d5d39c8188f515f578e266bb101015fa43c8db9ea9e5c088f14fcb51e5eec00e14b97a602cd19bf28cf7301c6

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si188767.exe

        Filesize

        175KB

        MD5

        b9d4e7a88c5d20beb2809aea4fbdefa3

        SHA1

        c375b5d47df0b49f2f42b151389344feb7027b06

        SHA256

        37720a033f6afe175bf595313b2cd9f86ea79cb8e8006dd4f7bc5708e9f2bc39

        SHA512

        2c75c221b2426ff5e6d96046b909fd870706fe6d5d39c8188f515f578e266bb101015fa43c8db9ea9e5c088f14fcb51e5eec00e14b97a602cd19bf28cf7301c6

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un498730.exe

        Filesize

        555KB

        MD5

        6e857894f1ca57d034711fb8d754dfc5

        SHA1

        0581eae489f9c997603985bc6fa967d1ef41f76b

        SHA256

        400c6e7bd69925c8bee08e187861cd35d773d7f85d0b62119be907d5b095c76f

        SHA512

        12533f200088fa914675acf56e1f8fd53148f3c9344a72d55d9c59181edd86697799e85f8a491ecbf46248e43a8bc823a72572379e4376de6c5f26e5f550e77c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un498730.exe

        Filesize

        555KB

        MD5

        6e857894f1ca57d034711fb8d754dfc5

        SHA1

        0581eae489f9c997603985bc6fa967d1ef41f76b

        SHA256

        400c6e7bd69925c8bee08e187861cd35d773d7f85d0b62119be907d5b095c76f

        SHA512

        12533f200088fa914675acf56e1f8fd53148f3c9344a72d55d9c59181edd86697799e85f8a491ecbf46248e43a8bc823a72572379e4376de6c5f26e5f550e77c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4916.exe

        Filesize

        347KB

        MD5

        62385fb337fc401de83d4665f69ebf02

        SHA1

        65d599b99ff9f59a8736488f47cbee2ae6c42fba

        SHA256

        26606e93238012344c9ddd7b59b558d3bf056111c8294932b1f23d817654f97c

        SHA512

        809d57ea96cfb31c200e3ea36cd55249eb73c4fc5d80091e866b79324e2dbfe8891b2165d920941f4980f481f706800c2854cfe24f7fe8bffbc8468d670af118

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4916.exe

        Filesize

        347KB

        MD5

        62385fb337fc401de83d4665f69ebf02

        SHA1

        65d599b99ff9f59a8736488f47cbee2ae6c42fba

        SHA256

        26606e93238012344c9ddd7b59b558d3bf056111c8294932b1f23d817654f97c

        SHA512

        809d57ea96cfb31c200e3ea36cd55249eb73c4fc5d80091e866b79324e2dbfe8891b2165d920941f4980f481f706800c2854cfe24f7fe8bffbc8468d670af118

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7898.exe

        Filesize

        406KB

        MD5

        f3eb6e7d0821c85ca23016caa0ae224c

        SHA1

        d91d013d70d18c6973b0ab37f1a2e8f6e56b9a14

        SHA256

        5f58a3deacf400da35b77f3f31d6756cfdceb6a15e83aa9780182a7dcc75b55c

        SHA512

        aef9ac25fff24de6796812520d952cc69c63ba5fd83d22603a8285b3fd87be1a4ec5c2482c19dc6f8e75597c8c06d1d9a3c9a929f280a137b1e33296012f5f61

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7898.exe

        Filesize

        406KB

        MD5

        f3eb6e7d0821c85ca23016caa0ae224c

        SHA1

        d91d013d70d18c6973b0ab37f1a2e8f6e56b9a14

        SHA256

        5f58a3deacf400da35b77f3f31d6756cfdceb6a15e83aa9780182a7dcc75b55c

        SHA512

        aef9ac25fff24de6796812520d952cc69c63ba5fd83d22603a8285b3fd87be1a4ec5c2482c19dc6f8e75597c8c06d1d9a3c9a929f280a137b1e33296012f5f61

      • memory/1560-1123-0x0000000004F20000-0x0000000004F30000-memory.dmp

        Filesize

        64KB

      • memory/1560-1122-0x0000000000490000-0x00000000004C2000-memory.dmp

        Filesize

        200KB

      • memory/2060-1102-0x0000000007E40000-0x0000000007F4A000-memory.dmp

        Filesize

        1.0MB

      • memory/2060-1104-0x0000000004850000-0x0000000004860000-memory.dmp

        Filesize

        64KB

      • memory/2060-1116-0x0000000008F80000-0x00000000094AC000-memory.dmp

        Filesize

        5.2MB

      • memory/2060-1115-0x0000000008DB0000-0x0000000008F72000-memory.dmp

        Filesize

        1.8MB

      • memory/2060-1114-0x0000000008D20000-0x0000000008D70000-memory.dmp

        Filesize

        320KB

      • memory/2060-1113-0x0000000008C90000-0x0000000008D06000-memory.dmp

        Filesize

        472KB

      • memory/2060-1112-0x0000000004850000-0x0000000004860000-memory.dmp

        Filesize

        64KB

      • memory/2060-1111-0x0000000008960000-0x00000000089F2000-memory.dmp

        Filesize

        584KB

      • memory/2060-1109-0x0000000004850000-0x0000000004860000-memory.dmp

        Filesize

        64KB

      • memory/2060-1110-0x0000000004850000-0x0000000004860000-memory.dmp

        Filesize

        64KB

      • memory/2060-1108-0x0000000004850000-0x0000000004860000-memory.dmp

        Filesize

        64KB

      • memory/2060-1107-0x0000000008290000-0x00000000082F6000-memory.dmp

        Filesize

        408KB

      • memory/2060-1105-0x0000000007FA0000-0x0000000007FDC000-memory.dmp

        Filesize

        240KB

      • memory/2060-1103-0x0000000007F80000-0x0000000007F92000-memory.dmp

        Filesize

        72KB

      • memory/2060-1101-0x00000000077A0000-0x0000000007DB8000-memory.dmp

        Filesize

        6.1MB

      • memory/2060-228-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2060-226-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2060-224-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2060-222-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2060-220-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2060-218-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2060-191-0x0000000002CA0000-0x0000000002CEB000-memory.dmp

        Filesize

        300KB

      • memory/2060-192-0x0000000004850000-0x0000000004860000-memory.dmp

        Filesize

        64KB

      • memory/2060-193-0x0000000004850000-0x0000000004860000-memory.dmp

        Filesize

        64KB

      • memory/2060-194-0x0000000004850000-0x0000000004860000-memory.dmp

        Filesize

        64KB

      • memory/2060-195-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2060-196-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2060-198-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2060-200-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2060-202-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2060-204-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2060-206-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2060-208-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2060-212-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2060-210-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2060-214-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2060-216-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/3252-174-0x0000000007240000-0x0000000007252000-memory.dmp

        Filesize

        72KB

      • memory/3252-151-0x0000000007390000-0x00000000073A0000-memory.dmp

        Filesize

        64KB

      • memory/3252-186-0x0000000000400000-0x0000000002B84000-memory.dmp

        Filesize

        39.5MB

      • memory/3252-185-0x0000000007390000-0x00000000073A0000-memory.dmp

        Filesize

        64KB

      • memory/3252-183-0x0000000007390000-0x00000000073A0000-memory.dmp

        Filesize

        64KB

      • memory/3252-182-0x0000000007390000-0x00000000073A0000-memory.dmp

        Filesize

        64KB

      • memory/3252-181-0x0000000000400000-0x0000000002B84000-memory.dmp

        Filesize

        39.5MB

      • memory/3252-152-0x0000000007390000-0x00000000073A0000-memory.dmp

        Filesize

        64KB

      • memory/3252-180-0x0000000007240000-0x0000000007252000-memory.dmp

        Filesize

        72KB

      • memory/3252-156-0x0000000007240000-0x0000000007252000-memory.dmp

        Filesize

        72KB

      • memory/3252-178-0x0000000007240000-0x0000000007252000-memory.dmp

        Filesize

        72KB

      • memory/3252-176-0x0000000007240000-0x0000000007252000-memory.dmp

        Filesize

        72KB

      • memory/3252-154-0x0000000007240000-0x0000000007252000-memory.dmp

        Filesize

        72KB

      • memory/3252-170-0x0000000007240000-0x0000000007252000-memory.dmp

        Filesize

        72KB

      • memory/3252-153-0x0000000007240000-0x0000000007252000-memory.dmp

        Filesize

        72KB

      • memory/3252-168-0x0000000007240000-0x0000000007252000-memory.dmp

        Filesize

        72KB

      • memory/3252-166-0x0000000007240000-0x0000000007252000-memory.dmp

        Filesize

        72KB

      • memory/3252-164-0x0000000007240000-0x0000000007252000-memory.dmp

        Filesize

        72KB

      • memory/3252-162-0x0000000007240000-0x0000000007252000-memory.dmp

        Filesize

        72KB

      • memory/3252-160-0x0000000007240000-0x0000000007252000-memory.dmp

        Filesize

        72KB

      • memory/3252-158-0x0000000007240000-0x0000000007252000-memory.dmp

        Filesize

        72KB

      • memory/3252-172-0x0000000007240000-0x0000000007252000-memory.dmp

        Filesize

        72KB

      • memory/3252-150-0x0000000007390000-0x00000000073A0000-memory.dmp

        Filesize

        64KB

      • memory/3252-149-0x00000000073A0000-0x0000000007944000-memory.dmp

        Filesize

        5.6MB

      • memory/3252-148-0x0000000002C60000-0x0000000002C8D000-memory.dmp

        Filesize

        180KB