Analysis

  • max time kernel
    64s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 11:34

General

  • Target

    e6a036b7beed462832a8b69beb7918da779d41c3625bda63db9dbfdb2e7087e0.exe

  • Size

    698KB

  • MD5

    8ebd40b064733a2f7cd65a289e5e805d

  • SHA1

    0af16707631102cdfa72c51a58b817c9fbcaa927

  • SHA256

    e6a036b7beed462832a8b69beb7918da779d41c3625bda63db9dbfdb2e7087e0

  • SHA512

    ad2e306e94b0058891deff5e79229107c0ac1e199cf40dadd5bb5d3d1bdb62537811502e640569361e2cca1678cbb289a8997db14afdb83e698739efdebb3b8f

  • SSDEEP

    12288:uMr3y90X9VbV49ovkHvW/bYMzxNWi7GdFLxdVL6kGGj8AxI9gMW2XeW/:Ry0pgrHODPKOG7Lxd52GjVI95PP

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

muse

C2

176.113.115.145:4125

Attributes
  • auth_value

    b91988a63a24940038d9262827a5320c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6a036b7beed462832a8b69beb7918da779d41c3625bda63db9dbfdb2e7087e0.exe
    "C:\Users\Admin\AppData\Local\Temp\e6a036b7beed462832a8b69beb7918da779d41c3625bda63db9dbfdb2e7087e0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4608
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un359329.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un359329.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7708.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7708.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:412
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 412 -s 1080
          4⤵
          • Program crash
          PID:5040
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2876.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2876.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4496
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4496 -s 1348
          4⤵
          • Program crash
          PID:784
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si684346.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si684346.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4520
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 412 -ip 412
    1⤵
      PID:3336
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4496 -ip 4496
      1⤵
        PID:1036

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si684346.exe

        Filesize

        175KB

        MD5

        c8ac6fba7d67c2b16b8ee6e4c80c8d3b

        SHA1

        c02944e43db03bf26ac58fc278928a178b28be15

        SHA256

        a4838e583be609ed0ea53f82bf379c8ad1398b2804c07fe0eefb4465f67228b6

        SHA512

        dfcb6cc9a1f084b9bbeb441f34ea27424275bf255d40df3e0d0f7a2313fb403d56117aad5478ded3e255209fcd970a37d37ce46f034977efb90c561c19a865c0

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si684346.exe

        Filesize

        175KB

        MD5

        c8ac6fba7d67c2b16b8ee6e4c80c8d3b

        SHA1

        c02944e43db03bf26ac58fc278928a178b28be15

        SHA256

        a4838e583be609ed0ea53f82bf379c8ad1398b2804c07fe0eefb4465f67228b6

        SHA512

        dfcb6cc9a1f084b9bbeb441f34ea27424275bf255d40df3e0d0f7a2313fb403d56117aad5478ded3e255209fcd970a37d37ce46f034977efb90c561c19a865c0

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un359329.exe

        Filesize

        556KB

        MD5

        d10c137a745de171802e974965dfaff1

        SHA1

        cbee7111e033514c7dd58f4c45cb3e570b72430c

        SHA256

        e6bb421ad03adc77d7013eaa9809a1eeaf478ed78190b7e2c5ed9cfbbe708b24

        SHA512

        3173634954b158061c16c59e1959dfec43cc624e9d39650da85b882d3991258af35a0a3f2b969839804af45fb8bbf4da8a390e323d196fdfd01b80b6333f30ad

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un359329.exe

        Filesize

        556KB

        MD5

        d10c137a745de171802e974965dfaff1

        SHA1

        cbee7111e033514c7dd58f4c45cb3e570b72430c

        SHA256

        e6bb421ad03adc77d7013eaa9809a1eeaf478ed78190b7e2c5ed9cfbbe708b24

        SHA512

        3173634954b158061c16c59e1959dfec43cc624e9d39650da85b882d3991258af35a0a3f2b969839804af45fb8bbf4da8a390e323d196fdfd01b80b6333f30ad

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7708.exe

        Filesize

        347KB

        MD5

        0f26b83a5a5c1dc25caf59c11e7510aa

        SHA1

        931785b9b1fe4c9f998c8af6bd18636d7bd36618

        SHA256

        aed74fe95c913fb39c6ad7acf2be60d89c3280978d6532ebcb0468c64193e2df

        SHA512

        08faee3d19690636375e548ea4314fc3fb37bc8e02f8faa1cd0d7179a0567ebdc00f8cf302449853db3ca3906ea79643a6fedb4c4fde5f9fc38061e137985f40

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7708.exe

        Filesize

        347KB

        MD5

        0f26b83a5a5c1dc25caf59c11e7510aa

        SHA1

        931785b9b1fe4c9f998c8af6bd18636d7bd36618

        SHA256

        aed74fe95c913fb39c6ad7acf2be60d89c3280978d6532ebcb0468c64193e2df

        SHA512

        08faee3d19690636375e548ea4314fc3fb37bc8e02f8faa1cd0d7179a0567ebdc00f8cf302449853db3ca3906ea79643a6fedb4c4fde5f9fc38061e137985f40

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2876.exe

        Filesize

        406KB

        MD5

        85ed53ce5f187d37caa63e1bbe54d2b3

        SHA1

        3f8329ce32c8b83260190a66fd3ca61eff76cde3

        SHA256

        6fc1495634fce6ce9779bfa003b7fa89eacbd84af31c1b629bcac4c2a2c072e6

        SHA512

        8cb7caafa757dc99f423c9dff69f344411ea0d7ddfdc528fd0cdceed6075ff6fb8bbda96b394f62f036972786dd597c8331bd08a03660d5c24045de43704786c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2876.exe

        Filesize

        406KB

        MD5

        85ed53ce5f187d37caa63e1bbe54d2b3

        SHA1

        3f8329ce32c8b83260190a66fd3ca61eff76cde3

        SHA256

        6fc1495634fce6ce9779bfa003b7fa89eacbd84af31c1b629bcac4c2a2c072e6

        SHA512

        8cb7caafa757dc99f423c9dff69f344411ea0d7ddfdc528fd0cdceed6075ff6fb8bbda96b394f62f036972786dd597c8331bd08a03660d5c24045de43704786c

      • memory/412-148-0x0000000002C60000-0x0000000002C8D000-memory.dmp

        Filesize

        180KB

      • memory/412-149-0x0000000007310000-0x0000000007320000-memory.dmp

        Filesize

        64KB

      • memory/412-150-0x0000000007320000-0x00000000078C4000-memory.dmp

        Filesize

        5.6MB

      • memory/412-152-0x0000000007230000-0x0000000007242000-memory.dmp

        Filesize

        72KB

      • memory/412-151-0x0000000007230000-0x0000000007242000-memory.dmp

        Filesize

        72KB

      • memory/412-154-0x0000000007230000-0x0000000007242000-memory.dmp

        Filesize

        72KB

      • memory/412-156-0x0000000007230000-0x0000000007242000-memory.dmp

        Filesize

        72KB

      • memory/412-158-0x0000000007230000-0x0000000007242000-memory.dmp

        Filesize

        72KB

      • memory/412-160-0x0000000007230000-0x0000000007242000-memory.dmp

        Filesize

        72KB

      • memory/412-162-0x0000000007230000-0x0000000007242000-memory.dmp

        Filesize

        72KB

      • memory/412-164-0x0000000007230000-0x0000000007242000-memory.dmp

        Filesize

        72KB

      • memory/412-166-0x0000000007230000-0x0000000007242000-memory.dmp

        Filesize

        72KB

      • memory/412-168-0x0000000007230000-0x0000000007242000-memory.dmp

        Filesize

        72KB

      • memory/412-170-0x0000000007230000-0x0000000007242000-memory.dmp

        Filesize

        72KB

      • memory/412-172-0x0000000007230000-0x0000000007242000-memory.dmp

        Filesize

        72KB

      • memory/412-174-0x0000000007230000-0x0000000007242000-memory.dmp

        Filesize

        72KB

      • memory/412-176-0x0000000007230000-0x0000000007242000-memory.dmp

        Filesize

        72KB

      • memory/412-178-0x0000000007230000-0x0000000007242000-memory.dmp

        Filesize

        72KB

      • memory/412-179-0x0000000000400000-0x0000000002B84000-memory.dmp

        Filesize

        39.5MB

      • memory/412-181-0x0000000000400000-0x0000000002B84000-memory.dmp

        Filesize

        39.5MB

      • memory/4496-186-0x0000000002CA0000-0x0000000002CEB000-memory.dmp

        Filesize

        300KB

      • memory/4496-187-0x00000000072F0000-0x0000000007300000-memory.dmp

        Filesize

        64KB

      • memory/4496-188-0x00000000072F0000-0x0000000007300000-memory.dmp

        Filesize

        64KB

      • memory/4496-189-0x00000000072F0000-0x0000000007300000-memory.dmp

        Filesize

        64KB

      • memory/4496-190-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4496-191-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4496-193-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4496-195-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4496-197-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4496-199-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4496-201-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4496-203-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4496-205-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4496-207-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4496-209-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4496-211-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4496-213-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4496-215-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4496-217-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4496-219-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4496-221-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4496-223-0x0000000007160000-0x000000000719F000-memory.dmp

        Filesize

        252KB

      • memory/4496-1096-0x00000000079B0000-0x0000000007FC8000-memory.dmp

        Filesize

        6.1MB

      • memory/4496-1097-0x0000000007FD0000-0x00000000080DA000-memory.dmp

        Filesize

        1.0MB

      • memory/4496-1098-0x00000000072D0000-0x00000000072E2000-memory.dmp

        Filesize

        72KB

      • memory/4496-1099-0x00000000080E0000-0x000000000811C000-memory.dmp

        Filesize

        240KB

      • memory/4496-1100-0x00000000072F0000-0x0000000007300000-memory.dmp

        Filesize

        64KB

      • memory/4496-1102-0x00000000083D0000-0x0000000008462000-memory.dmp

        Filesize

        584KB

      • memory/4496-1103-0x0000000008470000-0x00000000084D6000-memory.dmp

        Filesize

        408KB

      • memory/4496-1105-0x00000000072F0000-0x0000000007300000-memory.dmp

        Filesize

        64KB

      • memory/4496-1104-0x00000000072F0000-0x0000000007300000-memory.dmp

        Filesize

        64KB

      • memory/4496-1106-0x00000000072F0000-0x0000000007300000-memory.dmp

        Filesize

        64KB

      • memory/4496-1107-0x0000000008DD0000-0x0000000008F92000-memory.dmp

        Filesize

        1.8MB

      • memory/4496-1108-0x0000000008FC0000-0x00000000094EC000-memory.dmp

        Filesize

        5.2MB

      • memory/4496-1109-0x0000000006C80000-0x0000000006CF6000-memory.dmp

        Filesize

        472KB

      • memory/4496-1110-0x000000000A7A0000-0x000000000A7F0000-memory.dmp

        Filesize

        320KB

      • memory/4520-1116-0x0000000000C90000-0x0000000000CC2000-memory.dmp

        Filesize

        200KB

      • memory/4520-1117-0x0000000005510000-0x0000000005520000-memory.dmp

        Filesize

        64KB