Analysis

  • max time kernel
    135s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 12:00

General

  • Target

    979e1904bb41e702f1365b40050b3730646688d9160e5f2d6e80e1e929d79617.exe

  • Size

    697KB

  • MD5

    397a42e5c3a05f90c1dd22f03f333b34

  • SHA1

    cb326ea441355713dc9fe97001431560724179b2

  • SHA256

    979e1904bb41e702f1365b40050b3730646688d9160e5f2d6e80e1e929d79617

  • SHA512

    6a7d1827b6219f80181861c9802b4999dd36a402a372c64ce9dee1e9cd571465a80c8e208abbe1bfc994ed2a41ba12e17a70697b5eab2304941d65b5526fe9eb

  • SSDEEP

    12288:zMrry90j3x/kahN/V5q7zTyt8B/YKxyqZBSL6w/GjDAxI9gYjilgO:Yy23lDt5qutGxXmPGjgI9fOv

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

muse

C2

176.113.115.145:4125

Attributes
  • auth_value

    b91988a63a24940038d9262827a5320c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\979e1904bb41e702f1365b40050b3730646688d9160e5f2d6e80e1e929d79617.exe
    "C:\Users\Admin\AppData\Local\Temp\979e1904bb41e702f1365b40050b3730646688d9160e5f2d6e80e1e929d79617.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4456
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un763474.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un763474.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4696
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4677.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4677.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4264
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4264 -s 1084
          4⤵
          • Program crash
          PID:4976
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4621.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4621.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3120
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3120 -s 1352
          4⤵
          • Program crash
          PID:4620
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si325133.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si325133.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2312
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4264 -ip 4264
    1⤵
      PID:5036
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 3120 -ip 3120
      1⤵
        PID:2612

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si325133.exe

        Filesize

        175KB

        MD5

        63154c854b9d41590d169acc4dce9250

        SHA1

        243b237e8e51c3d192ba82d7d32b669f864808bc

        SHA256

        9442b87e8091cf09749bdce771e9fcacae90a4a597faa2e2fafa0e6032d3ef92

        SHA512

        30c1cd36a569f3c61d1f09f128eba05c5aceec2bb3d43bd6cf28a606824a2c35b04eedcc6ac5d9d0f6847169ab1a21c3337971a505bfc132be44ef8514fa7eb5

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si325133.exe

        Filesize

        175KB

        MD5

        63154c854b9d41590d169acc4dce9250

        SHA1

        243b237e8e51c3d192ba82d7d32b669f864808bc

        SHA256

        9442b87e8091cf09749bdce771e9fcacae90a4a597faa2e2fafa0e6032d3ef92

        SHA512

        30c1cd36a569f3c61d1f09f128eba05c5aceec2bb3d43bd6cf28a606824a2c35b04eedcc6ac5d9d0f6847169ab1a21c3337971a505bfc132be44ef8514fa7eb5

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un763474.exe

        Filesize

        555KB

        MD5

        864bdda444d4f9de46e27e44411526b4

        SHA1

        41be5abc1048142a3041cd50fbe5cacde4904a81

        SHA256

        2983f76178c36895be7adb6c79082bfa9ae9d2fa2e269a82c16220eb277e6180

        SHA512

        9023293ef2c4c1a1d13f02e2c5b45211edfe2814a17f8eca0801c3a2dc19286592326e8e35c7d219268cd81634ac1a7bb5ff4238e75e7ceeacf1f9417c255b6a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un763474.exe

        Filesize

        555KB

        MD5

        864bdda444d4f9de46e27e44411526b4

        SHA1

        41be5abc1048142a3041cd50fbe5cacde4904a81

        SHA256

        2983f76178c36895be7adb6c79082bfa9ae9d2fa2e269a82c16220eb277e6180

        SHA512

        9023293ef2c4c1a1d13f02e2c5b45211edfe2814a17f8eca0801c3a2dc19286592326e8e35c7d219268cd81634ac1a7bb5ff4238e75e7ceeacf1f9417c255b6a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4677.exe

        Filesize

        347KB

        MD5

        a1d6431d68bd065cfd1de26bd2d8230d

        SHA1

        f3b3e0edce926bf872ad2971664083e263794da1

        SHA256

        d68ebd54b238a38298332b58bf1b7d8a683e7e065db67010781713279c844155

        SHA512

        7bf5196963b731add03cd0785ee687be5df2100a1cc2cfc6edf1dffa1e01f2c3f1dd5adb73b52488c23c94e1691d408cd41fc2cd6f069b74e49182fb2ed554e6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4677.exe

        Filesize

        347KB

        MD5

        a1d6431d68bd065cfd1de26bd2d8230d

        SHA1

        f3b3e0edce926bf872ad2971664083e263794da1

        SHA256

        d68ebd54b238a38298332b58bf1b7d8a683e7e065db67010781713279c844155

        SHA512

        7bf5196963b731add03cd0785ee687be5df2100a1cc2cfc6edf1dffa1e01f2c3f1dd5adb73b52488c23c94e1691d408cd41fc2cd6f069b74e49182fb2ed554e6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4621.exe

        Filesize

        406KB

        MD5

        bd000ea4033929aa73f583146eeb9522

        SHA1

        9d873f4c3f197bd2b7aea5e8de7c6428bf1750eb

        SHA256

        26769d98f8005914c5cec39d130c6c952ac9897653a0d64d19a67d5d089ac56e

        SHA512

        d9f7821043ad63f253d7a7e3b9b0f9fcd2017954d9fc9b910d7ffc4c86499e7434ea935daa59f465e58f71c6913884656bfcdb09e58b1b7d60d3898af094100e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4621.exe

        Filesize

        406KB

        MD5

        bd000ea4033929aa73f583146eeb9522

        SHA1

        9d873f4c3f197bd2b7aea5e8de7c6428bf1750eb

        SHA256

        26769d98f8005914c5cec39d130c6c952ac9897653a0d64d19a67d5d089ac56e

        SHA512

        d9f7821043ad63f253d7a7e3b9b0f9fcd2017954d9fc9b910d7ffc4c86499e7434ea935daa59f465e58f71c6913884656bfcdb09e58b1b7d60d3898af094100e

      • memory/2312-1123-0x0000000004E50000-0x0000000004E60000-memory.dmp

        Filesize

        64KB

      • memory/2312-1122-0x0000000004E50000-0x0000000004E60000-memory.dmp

        Filesize

        64KB

      • memory/2312-1121-0x0000000000570000-0x00000000005A2000-memory.dmp

        Filesize

        200KB

      • memory/3120-1102-0x0000000007F80000-0x0000000007F92000-memory.dmp

        Filesize

        72KB

      • memory/3120-1107-0x0000000007370000-0x0000000007380000-memory.dmp

        Filesize

        64KB

      • memory/3120-1115-0x000000000A660000-0x000000000A6B0000-memory.dmp

        Filesize

        320KB

      • memory/3120-1114-0x0000000004AD0000-0x0000000004B46000-memory.dmp

        Filesize

        472KB

      • memory/3120-1113-0x0000000008E80000-0x00000000093AC000-memory.dmp

        Filesize

        5.2MB

      • memory/3120-1112-0x0000000008C90000-0x0000000008E52000-memory.dmp

        Filesize

        1.8MB

      • memory/3120-1111-0x0000000007370000-0x0000000007380000-memory.dmp

        Filesize

        64KB

      • memory/3120-1110-0x0000000008330000-0x0000000008396000-memory.dmp

        Filesize

        408KB

      • memory/3120-1109-0x0000000008290000-0x0000000008322000-memory.dmp

        Filesize

        584KB

      • memory/3120-1108-0x0000000007370000-0x0000000007380000-memory.dmp

        Filesize

        64KB

      • memory/3120-1106-0x0000000007370000-0x0000000007380000-memory.dmp

        Filesize

        64KB

      • memory/3120-1104-0x0000000007FA0000-0x0000000007FDC000-memory.dmp

        Filesize

        240KB

      • memory/3120-1103-0x0000000007370000-0x0000000007380000-memory.dmp

        Filesize

        64KB

      • memory/3120-1101-0x0000000007260000-0x000000000736A000-memory.dmp

        Filesize

        1.0MB

      • memory/3120-1100-0x0000000007930000-0x0000000007F48000-memory.dmp

        Filesize

        6.1MB

      • memory/3120-227-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/3120-225-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/3120-223-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/3120-221-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/3120-219-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/3120-191-0x0000000002C70000-0x0000000002CBB000-memory.dmp

        Filesize

        300KB

      • memory/3120-192-0x0000000007370000-0x0000000007380000-memory.dmp

        Filesize

        64KB

      • memory/3120-193-0x0000000007370000-0x0000000007380000-memory.dmp

        Filesize

        64KB

      • memory/3120-194-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/3120-195-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/3120-197-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/3120-199-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/3120-201-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/3120-203-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/3120-205-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/3120-207-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/3120-209-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/3120-211-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/3120-213-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/3120-215-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/3120-217-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/4264-170-0x0000000007400000-0x0000000007410000-memory.dmp

        Filesize

        64KB

      • memory/4264-184-0x0000000007400000-0x0000000007410000-memory.dmp

        Filesize

        64KB

      • memory/4264-158-0x0000000007230000-0x0000000007242000-memory.dmp

        Filesize

        72KB

      • memory/4264-185-0x0000000007400000-0x0000000007410000-memory.dmp

        Filesize

        64KB

      • memory/4264-172-0x0000000007230000-0x0000000007242000-memory.dmp

        Filesize

        72KB

      • memory/4264-182-0x0000000007400000-0x0000000007410000-memory.dmp

        Filesize

        64KB

      • memory/4264-181-0x0000000000400000-0x0000000002B84000-memory.dmp

        Filesize

        39.5MB

      • memory/4264-174-0x0000000007400000-0x0000000007410000-memory.dmp

        Filesize

        64KB

      • memory/4264-180-0x0000000007230000-0x0000000007242000-memory.dmp

        Filesize

        72KB

      • memory/4264-178-0x0000000007230000-0x0000000007242000-memory.dmp

        Filesize

        72KB

      • memory/4264-162-0x0000000007230000-0x0000000007242000-memory.dmp

        Filesize

        72KB

      • memory/4264-176-0x0000000007230000-0x0000000007242000-memory.dmp

        Filesize

        72KB

      • memory/4264-186-0x0000000000400000-0x0000000002B84000-memory.dmp

        Filesize

        39.5MB

      • memory/4264-160-0x0000000007230000-0x0000000007242000-memory.dmp

        Filesize

        72KB

      • memory/4264-156-0x0000000007230000-0x0000000007242000-memory.dmp

        Filesize

        72KB

      • memory/4264-173-0x0000000007400000-0x0000000007410000-memory.dmp

        Filesize

        64KB

      • memory/4264-169-0x0000000002F20000-0x0000000002F4D000-memory.dmp

        Filesize

        180KB

      • memory/4264-168-0x0000000007230000-0x0000000007242000-memory.dmp

        Filesize

        72KB

      • memory/4264-166-0x0000000007230000-0x0000000007242000-memory.dmp

        Filesize

        72KB

      • memory/4264-164-0x0000000007230000-0x0000000007242000-memory.dmp

        Filesize

        72KB

      • memory/4264-154-0x0000000007230000-0x0000000007242000-memory.dmp

        Filesize

        72KB

      • memory/4264-152-0x0000000007230000-0x0000000007242000-memory.dmp

        Filesize

        72KB

      • memory/4264-150-0x0000000007230000-0x0000000007242000-memory.dmp

        Filesize

        72KB

      • memory/4264-149-0x0000000007230000-0x0000000007242000-memory.dmp

        Filesize

        72KB

      • memory/4264-148-0x0000000007410000-0x00000000079B4000-memory.dmp

        Filesize

        5.6MB