Analysis

  • max time kernel
    65s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 10:18

General

  • Target

    5648a3093938b887c0224688ed377a6b50daaaab50df538b18ea70c44440dd48.exe

  • Size

    699KB

  • MD5

    da8aab197d44484e44024b656a7675c8

  • SHA1

    960166cd2f0fcc6851514f7393c493a4424a2f89

  • SHA256

    5648a3093938b887c0224688ed377a6b50daaaab50df538b18ea70c44440dd48

  • SHA512

    69d92abf413bd98aab6158ad5d47c2a7746ee5e94cfbbec7cafdee902afd2afcfff55ea19f8c755509bec1b8f6423f58f5312a3b3a1d513998a1e91245f46e86

  • SSDEEP

    12288:lMrWy90/MBYNEgVjS8U65XG1tvhYpEvfVahZDJAtXgtkr2m69EGjVyxv9gzQQTXJ:rygjS8UxJqavMh5JC4U5GjMv9O45AJ

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

muse

C2

176.113.115.145:4125

Attributes
  • auth_value

    b91988a63a24940038d9262827a5320c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5648a3093938b887c0224688ed377a6b50daaaab50df538b18ea70c44440dd48.exe
    "C:\Users\Admin\AppData\Local\Temp\5648a3093938b887c0224688ed377a6b50daaaab50df538b18ea70c44440dd48.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1392
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un076278.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un076278.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2152
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9569.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9569.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3204
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3204 -s 1080
          4⤵
          • Program crash
          PID:2872
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0539.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0539.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3736
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3736 -s 1472
          4⤵
          • Program crash
          PID:4252
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si383474.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si383474.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4812
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3204 -ip 3204
    1⤵
      PID:4500
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3736 -ip 3736
      1⤵
        PID:3356

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si383474.exe
        Filesize

        175KB

        MD5

        a2cc3c6fdc34a3563a09b997ba6f04c7

        SHA1

        b57ca811a3547a50d19b2024cd04c8adadb370ac

        SHA256

        4227a9a193433b98e569e081c9212178ad676f6bd9951d70366464095c3d3be5

        SHA512

        2471e0eeeb2226953817d622f7e375d2c76f3a922b268fd85ee0668c25973b9f06cd5cd01cb511062c2342a7720adca1edda8e85926fe76bf0bba206116f9d0d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si383474.exe
        Filesize

        175KB

        MD5

        a2cc3c6fdc34a3563a09b997ba6f04c7

        SHA1

        b57ca811a3547a50d19b2024cd04c8adadb370ac

        SHA256

        4227a9a193433b98e569e081c9212178ad676f6bd9951d70366464095c3d3be5

        SHA512

        2471e0eeeb2226953817d622f7e375d2c76f3a922b268fd85ee0668c25973b9f06cd5cd01cb511062c2342a7720adca1edda8e85926fe76bf0bba206116f9d0d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un076278.exe
        Filesize

        557KB

        MD5

        ade54aada9c75dce75b392a9b03fe2b0

        SHA1

        1213bed62aacb0a940a9a44ada3c45e00c57fef6

        SHA256

        2e96c4cb374fe2951eb7fae3db618cb19e84612fd52b595ce1ea162313ced3a9

        SHA512

        bade29f153bbd04cbb0437bc882167740cbd553c508229b4228002145b8102cc0784bf4c88d109c60dee486b54b24a606590e2d83f44998ce4afdcd5466056b1

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un076278.exe
        Filesize

        557KB

        MD5

        ade54aada9c75dce75b392a9b03fe2b0

        SHA1

        1213bed62aacb0a940a9a44ada3c45e00c57fef6

        SHA256

        2e96c4cb374fe2951eb7fae3db618cb19e84612fd52b595ce1ea162313ced3a9

        SHA512

        bade29f153bbd04cbb0437bc882167740cbd553c508229b4228002145b8102cc0784bf4c88d109c60dee486b54b24a606590e2d83f44998ce4afdcd5466056b1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9569.exe
        Filesize

        322KB

        MD5

        38537ab58bfe4f1d9374f1e5234156e0

        SHA1

        524236420734662be85b3f4ad97f3e942ed2bf3a

        SHA256

        2b9844fe984ad87ce4721473979f8a3c8ee839ffe8a8ff09ef82e792330e2871

        SHA512

        f4a859fa78222d5f6f7ccd57c28aaa9b25ce8fd016d24324405d11e2c1dd06192e3ff6643af60a905fb6a368f15e41b26f7a99409382113590f8af8b4df774a7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9569.exe
        Filesize

        322KB

        MD5

        38537ab58bfe4f1d9374f1e5234156e0

        SHA1

        524236420734662be85b3f4ad97f3e942ed2bf3a

        SHA256

        2b9844fe984ad87ce4721473979f8a3c8ee839ffe8a8ff09ef82e792330e2871

        SHA512

        f4a859fa78222d5f6f7ccd57c28aaa9b25ce8fd016d24324405d11e2c1dd06192e3ff6643af60a905fb6a368f15e41b26f7a99409382113590f8af8b4df774a7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0539.exe
        Filesize

        406KB

        MD5

        330b6b5d1a761c38050eb63b534fc864

        SHA1

        335f913233c7a09d67f5ba67eec0f05d93b0b2e9

        SHA256

        cfd76ef0313fc0b5d2648ea909eed2a8e8fc90aad27865cf871a1dd6bca3faea

        SHA512

        da6fa5bb130ece15586ca197d8dc3176f3baf1bad0c42d6418d95cd6d1d3c36109b9b23200af7811b513145a9cc890c486b14651cc62fa661cacef1d4e3260cb

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0539.exe
        Filesize

        406KB

        MD5

        330b6b5d1a761c38050eb63b534fc864

        SHA1

        335f913233c7a09d67f5ba67eec0f05d93b0b2e9

        SHA256

        cfd76ef0313fc0b5d2648ea909eed2a8e8fc90aad27865cf871a1dd6bca3faea

        SHA512

        da6fa5bb130ece15586ca197d8dc3176f3baf1bad0c42d6418d95cd6d1d3c36109b9b23200af7811b513145a9cc890c486b14651cc62fa661cacef1d4e3260cb

      • memory/3204-148-0x0000000002B90000-0x0000000002BBD000-memory.dmp
        Filesize

        180KB

      • memory/3204-149-0x0000000007390000-0x0000000007934000-memory.dmp
        Filesize

        5.6MB

      • memory/3204-150-0x0000000007220000-0x0000000007232000-memory.dmp
        Filesize

        72KB

      • memory/3204-151-0x0000000007220000-0x0000000007232000-memory.dmp
        Filesize

        72KB

      • memory/3204-153-0x0000000007220000-0x0000000007232000-memory.dmp
        Filesize

        72KB

      • memory/3204-155-0x0000000007220000-0x0000000007232000-memory.dmp
        Filesize

        72KB

      • memory/3204-157-0x0000000007220000-0x0000000007232000-memory.dmp
        Filesize

        72KB

      • memory/3204-161-0x0000000007220000-0x0000000007232000-memory.dmp
        Filesize

        72KB

      • memory/3204-159-0x0000000007220000-0x0000000007232000-memory.dmp
        Filesize

        72KB

      • memory/3204-165-0x0000000007220000-0x0000000007232000-memory.dmp
        Filesize

        72KB

      • memory/3204-173-0x0000000007220000-0x0000000007232000-memory.dmp
        Filesize

        72KB

      • memory/3204-177-0x0000000007220000-0x0000000007232000-memory.dmp
        Filesize

        72KB

      • memory/3204-179-0x0000000007380000-0x0000000007390000-memory.dmp
        Filesize

        64KB

      • memory/3204-180-0x0000000007380000-0x0000000007390000-memory.dmp
        Filesize

        64KB

      • memory/3204-178-0x0000000007380000-0x0000000007390000-memory.dmp
        Filesize

        64KB

      • memory/3204-175-0x0000000007220000-0x0000000007232000-memory.dmp
        Filesize

        72KB

      • memory/3204-171-0x0000000007220000-0x0000000007232000-memory.dmp
        Filesize

        72KB

      • memory/3204-169-0x0000000007220000-0x0000000007232000-memory.dmp
        Filesize

        72KB

      • memory/3204-167-0x0000000007220000-0x0000000007232000-memory.dmp
        Filesize

        72KB

      • memory/3204-163-0x0000000007220000-0x0000000007232000-memory.dmp
        Filesize

        72KB

      • memory/3204-181-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/3204-184-0x0000000007380000-0x0000000007390000-memory.dmp
        Filesize

        64KB

      • memory/3204-185-0x0000000007380000-0x0000000007390000-memory.dmp
        Filesize

        64KB

      • memory/3204-183-0x0000000007380000-0x0000000007390000-memory.dmp
        Filesize

        64KB

      • memory/3204-186-0x0000000000400000-0x0000000002B7E000-memory.dmp
        Filesize

        39.5MB

      • memory/3736-191-0x0000000002CD0000-0x0000000002D1B000-memory.dmp
        Filesize

        300KB

      • memory/3736-192-0x0000000007090000-0x00000000070A0000-memory.dmp
        Filesize

        64KB

      • memory/3736-193-0x0000000007090000-0x00000000070A0000-memory.dmp
        Filesize

        64KB

      • memory/3736-194-0x0000000007040000-0x000000000707F000-memory.dmp
        Filesize

        252KB

      • memory/3736-195-0x0000000007040000-0x000000000707F000-memory.dmp
        Filesize

        252KB

      • memory/3736-197-0x0000000007040000-0x000000000707F000-memory.dmp
        Filesize

        252KB

      • memory/3736-199-0x0000000007040000-0x000000000707F000-memory.dmp
        Filesize

        252KB

      • memory/3736-201-0x0000000007040000-0x000000000707F000-memory.dmp
        Filesize

        252KB

      • memory/3736-203-0x0000000007040000-0x000000000707F000-memory.dmp
        Filesize

        252KB

      • memory/3736-205-0x0000000007040000-0x000000000707F000-memory.dmp
        Filesize

        252KB

      • memory/3736-207-0x0000000007040000-0x000000000707F000-memory.dmp
        Filesize

        252KB

      • memory/3736-209-0x0000000007040000-0x000000000707F000-memory.dmp
        Filesize

        252KB

      • memory/3736-211-0x0000000007040000-0x000000000707F000-memory.dmp
        Filesize

        252KB

      • memory/3736-213-0x0000000007040000-0x000000000707F000-memory.dmp
        Filesize

        252KB

      • memory/3736-215-0x0000000007040000-0x000000000707F000-memory.dmp
        Filesize

        252KB

      • memory/3736-217-0x0000000007040000-0x000000000707F000-memory.dmp
        Filesize

        252KB

      • memory/3736-219-0x0000000007040000-0x000000000707F000-memory.dmp
        Filesize

        252KB

      • memory/3736-221-0x0000000007090000-0x00000000070A0000-memory.dmp
        Filesize

        64KB

      • memory/3736-222-0x0000000007040000-0x000000000707F000-memory.dmp
        Filesize

        252KB

      • memory/3736-224-0x0000000007040000-0x000000000707F000-memory.dmp
        Filesize

        252KB

      • memory/3736-226-0x0000000007040000-0x000000000707F000-memory.dmp
        Filesize

        252KB

      • memory/3736-228-0x0000000007040000-0x000000000707F000-memory.dmp
        Filesize

        252KB

      • memory/3736-1101-0x00000000077A0000-0x0000000007DB8000-memory.dmp
        Filesize

        6.1MB

      • memory/3736-1102-0x0000000007E40000-0x0000000007F4A000-memory.dmp
        Filesize

        1.0MB

      • memory/3736-1103-0x0000000007F80000-0x0000000007F92000-memory.dmp
        Filesize

        72KB

      • memory/3736-1104-0x0000000007090000-0x00000000070A0000-memory.dmp
        Filesize

        64KB

      • memory/3736-1105-0x0000000007FA0000-0x0000000007FDC000-memory.dmp
        Filesize

        240KB

      • memory/3736-1107-0x0000000007090000-0x00000000070A0000-memory.dmp
        Filesize

        64KB

      • memory/3736-1108-0x0000000007090000-0x00000000070A0000-memory.dmp
        Filesize

        64KB

      • memory/3736-1109-0x0000000008290000-0x00000000082F6000-memory.dmp
        Filesize

        408KB

      • memory/3736-1110-0x0000000008960000-0x00000000089F2000-memory.dmp
        Filesize

        584KB

      • memory/3736-1111-0x0000000007090000-0x00000000070A0000-memory.dmp
        Filesize

        64KB

      • memory/3736-1113-0x0000000009E10000-0x0000000009FD2000-memory.dmp
        Filesize

        1.8MB

      • memory/3736-1114-0x0000000009FE0000-0x000000000A50C000-memory.dmp
        Filesize

        5.2MB

      • memory/3736-1115-0x0000000008BB0000-0x0000000008C26000-memory.dmp
        Filesize

        472KB

      • memory/3736-1116-0x0000000008C40000-0x0000000008C90000-memory.dmp
        Filesize

        320KB

      • memory/4812-1122-0x00000000006B0000-0x00000000006E2000-memory.dmp
        Filesize

        200KB

      • memory/4812-1123-0x0000000004F60000-0x0000000004F70000-memory.dmp
        Filesize

        64KB

      • memory/4812-1124-0x0000000004F60000-0x0000000004F70000-memory.dmp
        Filesize

        64KB