Analysis

  • max time kernel
    95s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 10:22

General

  • Target

    3cf01f23cb97d067b3478786361671d55ec219c1c1e20e4205d94c2a12a0ed3d.exe

  • Size

    697KB

  • MD5

    a87733f3ce7e4e4b35d7b241d0bfb745

  • SHA1

    6d03f8323768c740afe097d19caaf6581695a7f9

  • SHA256

    3cf01f23cb97d067b3478786361671d55ec219c1c1e20e4205d94c2a12a0ed3d

  • SHA512

    59e523a08eb61d286b294c3636e2cbede489dcae18b048dfab56044d17748922dca531ac0bbf6d238fb0833b3559605ea9e2dfa824a2474b18c26e0abda54bde

  • SSDEEP

    12288:7Mrty90oxnVgoiiTOMk/WVhknKOiGGHv8Ikp8HOMJbL6nbGjTAxI9gTB9igz6eN6:uyXJVgfim/9nKONsv8RcOqGGjwI92r6r

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

muse

C2

176.113.115.145:4125

Attributes
  • auth_value

    b91988a63a24940038d9262827a5320c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3cf01f23cb97d067b3478786361671d55ec219c1c1e20e4205d94c2a12a0ed3d.exe
    "C:\Users\Admin\AppData\Local\Temp\3cf01f23cb97d067b3478786361671d55ec219c1c1e20e4205d94c2a12a0ed3d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1656
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un453041.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un453041.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4704
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3650.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3650.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4548
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4548 -s 1092
          4⤵
          • Program crash
          PID:3292
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8171.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8171.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2728
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 1328
          4⤵
          • Program crash
          PID:1264
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si814474.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si814474.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4852
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4548 -ip 4548
    1⤵
      PID:448
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2728 -ip 2728
      1⤵
        PID:3800

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si814474.exe
        Filesize

        175KB

        MD5

        f0aca40fc53afdf1e666fc2cacd3cac2

        SHA1

        1ec82028da2183517ab4497b7510ffa98b5dafdd

        SHA256

        4adaa989e68664082d0f5dc8837ec47b7827514a3a5186f52f99e943c61bb729

        SHA512

        5a3e1dc709b4316256f450f19ea4f69c11eae795a3ca88720192ec1cec8d3ecd3294cf4c81f81acc79e6c952984bbb727a820586bc51ad37c8a60b42b311aa69

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si814474.exe
        Filesize

        175KB

        MD5

        f0aca40fc53afdf1e666fc2cacd3cac2

        SHA1

        1ec82028da2183517ab4497b7510ffa98b5dafdd

        SHA256

        4adaa989e68664082d0f5dc8837ec47b7827514a3a5186f52f99e943c61bb729

        SHA512

        5a3e1dc709b4316256f450f19ea4f69c11eae795a3ca88720192ec1cec8d3ecd3294cf4c81f81acc79e6c952984bbb727a820586bc51ad37c8a60b42b311aa69

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un453041.exe
        Filesize

        555KB

        MD5

        f5d093bd6319bffd16285c668ef67853

        SHA1

        ad5370b873cbc8ee9ea2873ffe00364867bc52b8

        SHA256

        1b86bbcb1b28487b39bf3b8843a39727f6cbc32f21a68582c84c577db9ed58d5

        SHA512

        f745355c191712abfc86062cb7f5f4db921e6aa5bcb9b43362169784e1c9b6af59cb762a3aed2ae69b221a80fce6751fa0e0d4b2f42404272064f233c1cdabba

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un453041.exe
        Filesize

        555KB

        MD5

        f5d093bd6319bffd16285c668ef67853

        SHA1

        ad5370b873cbc8ee9ea2873ffe00364867bc52b8

        SHA256

        1b86bbcb1b28487b39bf3b8843a39727f6cbc32f21a68582c84c577db9ed58d5

        SHA512

        f745355c191712abfc86062cb7f5f4db921e6aa5bcb9b43362169784e1c9b6af59cb762a3aed2ae69b221a80fce6751fa0e0d4b2f42404272064f233c1cdabba

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3650.exe
        Filesize

        347KB

        MD5

        9dfbb3893368b5089036af7e6625ab80

        SHA1

        f2edbd6007b5f7be07094a9384a85081c7d4887f

        SHA256

        b22532c1e13e483cf21701c3198eb02407546de62fc5bc6c32e50347aaf58042

        SHA512

        4ba479ea0c83522c9367c27dcbfe559809f765ed790cf6e10081d10ed8de1a8fd6dc4200c73a4ea897dbd36ff9d68c8e104b3d5be545d5040b6502828a642035

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3650.exe
        Filesize

        347KB

        MD5

        9dfbb3893368b5089036af7e6625ab80

        SHA1

        f2edbd6007b5f7be07094a9384a85081c7d4887f

        SHA256

        b22532c1e13e483cf21701c3198eb02407546de62fc5bc6c32e50347aaf58042

        SHA512

        4ba479ea0c83522c9367c27dcbfe559809f765ed790cf6e10081d10ed8de1a8fd6dc4200c73a4ea897dbd36ff9d68c8e104b3d5be545d5040b6502828a642035

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8171.exe
        Filesize

        406KB

        MD5

        e8a7197f17b06297bc01095609f07a1a

        SHA1

        7bfae2ddc6144d41f6271e50211d231eddb360e0

        SHA256

        ba6b5572c32b2797ab17e605f8dd4a566da51d051a32706624ef35c0008170ab

        SHA512

        789ba62ed617750d57337045245b74e05eb8eb27601d968a962960800d1b51aa724d5168f6e819aec44ac30c072ff593f668ecb63cf7f8a07516a424e2b64cc7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8171.exe
        Filesize

        406KB

        MD5

        e8a7197f17b06297bc01095609f07a1a

        SHA1

        7bfae2ddc6144d41f6271e50211d231eddb360e0

        SHA256

        ba6b5572c32b2797ab17e605f8dd4a566da51d051a32706624ef35c0008170ab

        SHA512

        789ba62ed617750d57337045245b74e05eb8eb27601d968a962960800d1b51aa724d5168f6e819aec44ac30c072ff593f668ecb63cf7f8a07516a424e2b64cc7

      • memory/2728-226-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/2728-1102-0x0000000007F80000-0x000000000808A000-memory.dmp
        Filesize

        1.0MB

      • memory/2728-1116-0x0000000004DC0000-0x0000000004DD0000-memory.dmp
        Filesize

        64KB

      • memory/2728-1114-0x0000000009090000-0x00000000095BC000-memory.dmp
        Filesize

        5.2MB

      • memory/2728-1113-0x0000000008EB0000-0x0000000009072000-memory.dmp
        Filesize

        1.8MB

      • memory/2728-1112-0x0000000004DC0000-0x0000000004DD0000-memory.dmp
        Filesize

        64KB

      • memory/2728-1111-0x0000000004DC0000-0x0000000004DD0000-memory.dmp
        Filesize

        64KB

      • memory/2728-1110-0x0000000008C00000-0x0000000008C50000-memory.dmp
        Filesize

        320KB

      • memory/2728-1109-0x0000000008B60000-0x0000000008BD6000-memory.dmp
        Filesize

        472KB

      • memory/2728-1108-0x0000000008A90000-0x0000000008B22000-memory.dmp
        Filesize

        584KB

      • memory/2728-1107-0x00000000083D0000-0x0000000008436000-memory.dmp
        Filesize

        408KB

      • memory/2728-1105-0x0000000004DC0000-0x0000000004DD0000-memory.dmp
        Filesize

        64KB

      • memory/2728-1104-0x00000000080E0000-0x000000000811C000-memory.dmp
        Filesize

        240KB

      • memory/2728-1103-0x00000000080C0000-0x00000000080D2000-memory.dmp
        Filesize

        72KB

      • memory/2728-1101-0x00000000078E0000-0x0000000007EF8000-memory.dmp
        Filesize

        6.1MB

      • memory/2728-228-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/2728-224-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/2728-222-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/2728-220-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/2728-218-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/2728-216-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/2728-214-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/2728-208-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/2728-191-0x0000000002BA0000-0x0000000002BEB000-memory.dmp
        Filesize

        300KB

      • memory/2728-195-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/2728-193-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/2728-194-0x0000000004DC0000-0x0000000004DD0000-memory.dmp
        Filesize

        64KB

      • memory/2728-192-0x0000000004DC0000-0x0000000004DD0000-memory.dmp
        Filesize

        64KB

      • memory/2728-198-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/2728-197-0x0000000004DC0000-0x0000000004DD0000-memory.dmp
        Filesize

        64KB

      • memory/2728-200-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/2728-202-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/2728-204-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/2728-206-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/2728-210-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/2728-212-0x0000000004D30000-0x0000000004D6F000-memory.dmp
        Filesize

        252KB

      • memory/4548-174-0x0000000004CA0000-0x0000000004CB2000-memory.dmp
        Filesize

        72KB

      • memory/4548-160-0x0000000004CA0000-0x0000000004CB2000-memory.dmp
        Filesize

        72KB

      • memory/4548-151-0x0000000007200000-0x0000000007210000-memory.dmp
        Filesize

        64KB

      • memory/4548-184-0x0000000007200000-0x0000000007210000-memory.dmp
        Filesize

        64KB

      • memory/4548-183-0x0000000007200000-0x0000000007210000-memory.dmp
        Filesize

        64KB

      • memory/4548-182-0x0000000007200000-0x0000000007210000-memory.dmp
        Filesize

        64KB

      • memory/4548-181-0x0000000000400000-0x0000000002B84000-memory.dmp
        Filesize

        39.5MB

      • memory/4548-150-0x0000000007200000-0x0000000007210000-memory.dmp
        Filesize

        64KB

      • memory/4548-180-0x0000000004CA0000-0x0000000004CB2000-memory.dmp
        Filesize

        72KB

      • memory/4548-178-0x0000000004CA0000-0x0000000004CB2000-memory.dmp
        Filesize

        72KB

      • memory/4548-153-0x0000000004CA0000-0x0000000004CB2000-memory.dmp
        Filesize

        72KB

      • memory/4548-176-0x0000000004CA0000-0x0000000004CB2000-memory.dmp
        Filesize

        72KB

      • memory/4548-186-0x0000000000400000-0x0000000002B84000-memory.dmp
        Filesize

        39.5MB

      • memory/4548-172-0x0000000004CA0000-0x0000000004CB2000-memory.dmp
        Filesize

        72KB

      • memory/4548-156-0x0000000004CA0000-0x0000000004CB2000-memory.dmp
        Filesize

        72KB

      • memory/4548-164-0x0000000004CA0000-0x0000000004CB2000-memory.dmp
        Filesize

        72KB

      • memory/4548-166-0x0000000004CA0000-0x0000000004CB2000-memory.dmp
        Filesize

        72KB

      • memory/4548-168-0x0000000004CA0000-0x0000000004CB2000-memory.dmp
        Filesize

        72KB

      • memory/4548-162-0x0000000004CA0000-0x0000000004CB2000-memory.dmp
        Filesize

        72KB

      • memory/4548-152-0x0000000007200000-0x0000000007210000-memory.dmp
        Filesize

        64KB

      • memory/4548-158-0x0000000004CA0000-0x0000000004CB2000-memory.dmp
        Filesize

        72KB

      • memory/4548-170-0x0000000004CA0000-0x0000000004CB2000-memory.dmp
        Filesize

        72KB

      • memory/4548-154-0x0000000004CA0000-0x0000000004CB2000-memory.dmp
        Filesize

        72KB

      • memory/4548-149-0x0000000002B90000-0x0000000002BBD000-memory.dmp
        Filesize

        180KB

      • memory/4548-148-0x0000000007210000-0x00000000077B4000-memory.dmp
        Filesize

        5.6MB

      • memory/4852-1121-0x0000000000A00000-0x0000000000A32000-memory.dmp
        Filesize

        200KB

      • memory/4852-1122-0x0000000005280000-0x0000000005290000-memory.dmp
        Filesize

        64KB