Analysis

  • max time kernel
    61s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 11:25

General

  • Target

    4bd41065c00f9eca3b375a907a56bfe21193d12a463e8b5abf7cf3e553ec5bbe.exe

  • Size

    698KB

  • MD5

    246efc9e75588d2b61007fed7496e8df

  • SHA1

    9d9c6534418e427c8a4b14b8a25dcef4a7a7f4f3

  • SHA256

    4bd41065c00f9eca3b375a907a56bfe21193d12a463e8b5abf7cf3e553ec5bbe

  • SHA512

    1439b82cdd8eee031f14be8944ed44450def10b4f889a0caa9cd8200a69b8a6f3743fbf2ceabd106465f6d4f44bc97af091b35049706b4d01e3a14ab5ce93331

  • SSDEEP

    12288:TMr3y90VryLEbc+E8inz1og2v0L6gXGjiAxI9gavGKZNTU:syKeEb5EnZog2CpGjfI991ZNTU

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

muse

C2

176.113.115.145:4125

Attributes
  • auth_value

    b91988a63a24940038d9262827a5320c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4bd41065c00f9eca3b375a907a56bfe21193d12a463e8b5abf7cf3e553ec5bbe.exe
    "C:\Users\Admin\AppData\Local\Temp\4bd41065c00f9eca3b375a907a56bfe21193d12a463e8b5abf7cf3e553ec5bbe.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5068
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un955837.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un955837.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4968
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0927.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0927.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3352
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3352 -s 1080
          4⤵
          • Program crash
          PID:4444
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1953.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1953.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5012
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5012 -s 1724
          4⤵
          • Program crash
          PID:2592
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si257074.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si257074.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3912
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3352 -ip 3352
    1⤵
      PID:2908
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 5012 -ip 5012
      1⤵
        PID:2672

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si257074.exe
        Filesize

        175KB

        MD5

        b09c96c83f736b44882a593fb12b9a11

        SHA1

        0d8d9c264fc10f9a26f7bfca09f2c406a4adf77f

        SHA256

        ffb72412d863bb47e2770cf7fbd07b5604471bc342a97cf789f8bb66abcbc45e

        SHA512

        a9e756276de0514298f082f99bb29904a76f1a7b957dc00b1402728ddbd3ca5898ad8335216a29492d55f409223be92d9123a3ba60ce97e9b08432be09346b7e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si257074.exe
        Filesize

        175KB

        MD5

        b09c96c83f736b44882a593fb12b9a11

        SHA1

        0d8d9c264fc10f9a26f7bfca09f2c406a4adf77f

        SHA256

        ffb72412d863bb47e2770cf7fbd07b5604471bc342a97cf789f8bb66abcbc45e

        SHA512

        a9e756276de0514298f082f99bb29904a76f1a7b957dc00b1402728ddbd3ca5898ad8335216a29492d55f409223be92d9123a3ba60ce97e9b08432be09346b7e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un955837.exe
        Filesize

        556KB

        MD5

        60c852ba6facef3f305a863c642d2524

        SHA1

        4e7c60db9c269fe97ef73fa0c3430669cfdedcce

        SHA256

        a58468ae91d3a0f34099db777ae163e198b0532ffade4c7bc3dd959a97cead63

        SHA512

        e151b5e9c932a56602cbb4000be6d5c8d2401e37d92922ee59b44d5a12461ca9dd6b991868bb9e6ac2d7fe4ba0ddd2104dace8d9e379d5ae8bd9261cbbf2859a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un955837.exe
        Filesize

        556KB

        MD5

        60c852ba6facef3f305a863c642d2524

        SHA1

        4e7c60db9c269fe97ef73fa0c3430669cfdedcce

        SHA256

        a58468ae91d3a0f34099db777ae163e198b0532ffade4c7bc3dd959a97cead63

        SHA512

        e151b5e9c932a56602cbb4000be6d5c8d2401e37d92922ee59b44d5a12461ca9dd6b991868bb9e6ac2d7fe4ba0ddd2104dace8d9e379d5ae8bd9261cbbf2859a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0927.exe
        Filesize

        347KB

        MD5

        8c25091f34d168103a4ffada29b6ed41

        SHA1

        6b16a049204ddaf35e264c88e0705ba6ae9b8350

        SHA256

        855dca5ffbce484d8b5163e9d4eb7c2af3862e845c35462920ae06da748fd3be

        SHA512

        47a955b5c6cde9bf89efa3d52ea28b9cffa888f745738a4de3dde897ce6b675c6d6a38697a147cafdb0e5b008578ecb83e8438097e905b51a5eaf90e8b90498f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0927.exe
        Filesize

        347KB

        MD5

        8c25091f34d168103a4ffada29b6ed41

        SHA1

        6b16a049204ddaf35e264c88e0705ba6ae9b8350

        SHA256

        855dca5ffbce484d8b5163e9d4eb7c2af3862e845c35462920ae06da748fd3be

        SHA512

        47a955b5c6cde9bf89efa3d52ea28b9cffa888f745738a4de3dde897ce6b675c6d6a38697a147cafdb0e5b008578ecb83e8438097e905b51a5eaf90e8b90498f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1953.exe
        Filesize

        406KB

        MD5

        0f3121d555e9d6750f1a15cc26b6e0db

        SHA1

        ea6cb405e3eb9380ba4371da9d071d442f06444a

        SHA256

        ca90c320f3820195b65319a4c8b0b9868dc6d79ec80a4d47a7a4fa9417fe1411

        SHA512

        75818ec0089c480480fe2b13ba8371c6ae8a5a3bac85f7fccc50c6eed8efd81f7d7e5387af5d3c7f6e51695eff5f6757ff214ce2a162ba0a4cd2f6c86936bd45

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1953.exe
        Filesize

        406KB

        MD5

        0f3121d555e9d6750f1a15cc26b6e0db

        SHA1

        ea6cb405e3eb9380ba4371da9d071d442f06444a

        SHA256

        ca90c320f3820195b65319a4c8b0b9868dc6d79ec80a4d47a7a4fa9417fe1411

        SHA512

        75818ec0089c480480fe2b13ba8371c6ae8a5a3bac85f7fccc50c6eed8efd81f7d7e5387af5d3c7f6e51695eff5f6757ff214ce2a162ba0a4cd2f6c86936bd45

      • memory/3352-148-0x0000000002C60000-0x0000000002C8D000-memory.dmp
        Filesize

        180KB

      • memory/3352-149-0x0000000007320000-0x00000000078C4000-memory.dmp
        Filesize

        5.6MB

      • memory/3352-150-0x0000000004BF0000-0x0000000004C00000-memory.dmp
        Filesize

        64KB

      • memory/3352-151-0x0000000004BF0000-0x0000000004C00000-memory.dmp
        Filesize

        64KB

      • memory/3352-152-0x0000000004BF0000-0x0000000004C00000-memory.dmp
        Filesize

        64KB

      • memory/3352-153-0x0000000004950000-0x0000000004962000-memory.dmp
        Filesize

        72KB

      • memory/3352-154-0x0000000004950000-0x0000000004962000-memory.dmp
        Filesize

        72KB

      • memory/3352-156-0x0000000004950000-0x0000000004962000-memory.dmp
        Filesize

        72KB

      • memory/3352-158-0x0000000004950000-0x0000000004962000-memory.dmp
        Filesize

        72KB

      • memory/3352-160-0x0000000004950000-0x0000000004962000-memory.dmp
        Filesize

        72KB

      • memory/3352-162-0x0000000004950000-0x0000000004962000-memory.dmp
        Filesize

        72KB

      • memory/3352-164-0x0000000004950000-0x0000000004962000-memory.dmp
        Filesize

        72KB

      • memory/3352-166-0x0000000004950000-0x0000000004962000-memory.dmp
        Filesize

        72KB

      • memory/3352-168-0x0000000004950000-0x0000000004962000-memory.dmp
        Filesize

        72KB

      • memory/3352-170-0x0000000004950000-0x0000000004962000-memory.dmp
        Filesize

        72KB

      • memory/3352-172-0x0000000004950000-0x0000000004962000-memory.dmp
        Filesize

        72KB

      • memory/3352-174-0x0000000004950000-0x0000000004962000-memory.dmp
        Filesize

        72KB

      • memory/3352-176-0x0000000004950000-0x0000000004962000-memory.dmp
        Filesize

        72KB

      • memory/3352-178-0x0000000004950000-0x0000000004962000-memory.dmp
        Filesize

        72KB

      • memory/3352-180-0x0000000004950000-0x0000000004962000-memory.dmp
        Filesize

        72KB

      • memory/3352-181-0x0000000000400000-0x0000000002B84000-memory.dmp
        Filesize

        39.5MB

      • memory/3352-182-0x0000000002C60000-0x0000000002C8D000-memory.dmp
        Filesize

        180KB

      • memory/3352-183-0x0000000004BF0000-0x0000000004C00000-memory.dmp
        Filesize

        64KB

      • memory/3352-184-0x0000000004BF0000-0x0000000004C00000-memory.dmp
        Filesize

        64KB

      • memory/3352-185-0x0000000004BF0000-0x0000000004C00000-memory.dmp
        Filesize

        64KB

      • memory/3352-187-0x0000000000400000-0x0000000002B84000-memory.dmp
        Filesize

        39.5MB

      • memory/3912-1123-0x0000000000A70000-0x0000000000AA2000-memory.dmp
        Filesize

        200KB

      • memory/3912-1124-0x0000000005670000-0x0000000005680000-memory.dmp
        Filesize

        64KB

      • memory/5012-193-0x00000000049F0000-0x0000000004A2F000-memory.dmp
        Filesize

        252KB

      • memory/5012-225-0x00000000049F0000-0x0000000004A2F000-memory.dmp
        Filesize

        252KB

      • memory/5012-195-0x0000000002C70000-0x0000000002CBB000-memory.dmp
        Filesize

        300KB

      • memory/5012-199-0x00000000049F0000-0x0000000004A2F000-memory.dmp
        Filesize

        252KB

      • memory/5012-200-0x00000000072D0000-0x00000000072E0000-memory.dmp
        Filesize

        64KB

      • memory/5012-203-0x00000000049F0000-0x0000000004A2F000-memory.dmp
        Filesize

        252KB

      • memory/5012-202-0x00000000072D0000-0x00000000072E0000-memory.dmp
        Filesize

        64KB

      • memory/5012-198-0x00000000072D0000-0x00000000072E0000-memory.dmp
        Filesize

        64KB

      • memory/5012-205-0x00000000049F0000-0x0000000004A2F000-memory.dmp
        Filesize

        252KB

      • memory/5012-207-0x00000000049F0000-0x0000000004A2F000-memory.dmp
        Filesize

        252KB

      • memory/5012-209-0x00000000049F0000-0x0000000004A2F000-memory.dmp
        Filesize

        252KB

      • memory/5012-211-0x00000000049F0000-0x0000000004A2F000-memory.dmp
        Filesize

        252KB

      • memory/5012-213-0x00000000049F0000-0x0000000004A2F000-memory.dmp
        Filesize

        252KB

      • memory/5012-215-0x00000000049F0000-0x0000000004A2F000-memory.dmp
        Filesize

        252KB

      • memory/5012-217-0x00000000049F0000-0x0000000004A2F000-memory.dmp
        Filesize

        252KB

      • memory/5012-219-0x00000000049F0000-0x0000000004A2F000-memory.dmp
        Filesize

        252KB

      • memory/5012-221-0x00000000049F0000-0x0000000004A2F000-memory.dmp
        Filesize

        252KB

      • memory/5012-223-0x00000000049F0000-0x0000000004A2F000-memory.dmp
        Filesize

        252KB

      • memory/5012-227-0x00000000049F0000-0x0000000004A2F000-memory.dmp
        Filesize

        252KB

      • memory/5012-196-0x00000000049F0000-0x0000000004A2F000-memory.dmp
        Filesize

        252KB

      • memory/5012-229-0x00000000049F0000-0x0000000004A2F000-memory.dmp
        Filesize

        252KB

      • memory/5012-1102-0x0000000007990000-0x0000000007FA8000-memory.dmp
        Filesize

        6.1MB

      • memory/5012-1103-0x0000000007FB0000-0x00000000080BA000-memory.dmp
        Filesize

        1.0MB

      • memory/5012-1104-0x00000000080C0000-0x00000000080D2000-memory.dmp
        Filesize

        72KB

      • memory/5012-1105-0x0000000008120000-0x000000000815C000-memory.dmp
        Filesize

        240KB

      • memory/5012-1106-0x00000000072D0000-0x00000000072E0000-memory.dmp
        Filesize

        64KB

      • memory/5012-1108-0x00000000083D0000-0x0000000008462000-memory.dmp
        Filesize

        584KB

      • memory/5012-1110-0x00000000072D0000-0x00000000072E0000-memory.dmp
        Filesize

        64KB

      • memory/5012-1109-0x0000000008470000-0x00000000084D6000-memory.dmp
        Filesize

        408KB

      • memory/5012-1111-0x00000000072D0000-0x00000000072E0000-memory.dmp
        Filesize

        64KB

      • memory/5012-1112-0x00000000072D0000-0x00000000072E0000-memory.dmp
        Filesize

        64KB

      • memory/5012-1113-0x0000000008BA0000-0x0000000008D62000-memory.dmp
        Filesize

        1.8MB

      • memory/5012-1114-0x0000000008D70000-0x000000000929C000-memory.dmp
        Filesize

        5.2MB

      • memory/5012-192-0x00000000049F0000-0x0000000004A2F000-memory.dmp
        Filesize

        252KB

      • memory/5012-1115-0x0000000009520000-0x0000000009596000-memory.dmp
        Filesize

        472KB

      • memory/5012-1116-0x00000000095A0000-0x00000000095F0000-memory.dmp
        Filesize

        320KB

      • memory/5012-1117-0x00000000072D0000-0x00000000072E0000-memory.dmp
        Filesize

        64KB