Analysis

  • max time kernel
    59s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 11:43

General

  • Target

    dc73d33b04b59ed72980864feef1f12048bc746e5d459078476af66e12372262.exe

  • Size

    697KB

  • MD5

    04b31462db6b78ad20675f29f2af7ef5

  • SHA1

    0c0b0a37e1291b2a93e77e2653a04f2c3462aac5

  • SHA256

    dc73d33b04b59ed72980864feef1f12048bc746e5d459078476af66e12372262

  • SHA512

    bed099d097ab5f888c70e8ad25f6c35c41af15ee1ac63b9c1866fa1a852a3b399f77aba0ad512e693ba1a6a96d408ee858bc1267683a2aaa5d98705c102ffd40

  • SSDEEP

    12288:oMrdy90ySwc0A9dBC3dtZsiZZhrp/YDx8WLkZ9LL6scGjqAxI9gja0bxAB4:1yvwBC3/aiZH4x5kvOGjnI9adSB4

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

muse

C2

176.113.115.145:4125

Attributes
  • auth_value

    b91988a63a24940038d9262827a5320c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dc73d33b04b59ed72980864feef1f12048bc746e5d459078476af66e12372262.exe
    "C:\Users\Admin\AppData\Local\Temp\dc73d33b04b59ed72980864feef1f12048bc746e5d459078476af66e12372262.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2296
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un460634.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un460634.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:552
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7003.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7003.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3648
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3648 -s 1080
          4⤵
          • Program crash
          PID:756
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4046.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4046.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2780
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2780 -s 1552
          4⤵
          • Program crash
          PID:4248
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si952110.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si952110.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4064
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3648 -ip 3648
    1⤵
      PID:1952
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 2780 -ip 2780
      1⤵
        PID:3592

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si952110.exe

        Filesize

        175KB

        MD5

        1866a12101e68d6de04b25aca847c59a

        SHA1

        6a9526453ef19fe4dd4470b56687f337d6ed2bcc

        SHA256

        5d2a0326900bdac0f67d4177d0ec0e4986c64c0ca559bc2ac308be678989aa71

        SHA512

        71ed5258a8d87448d7ddbee19a84527280731a94a72af4f030c82959bb6cca3d43862130b26920a4fc5a14dadc64b7654b5af57b0ec716470438d2bb867df9da

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si952110.exe

        Filesize

        175KB

        MD5

        1866a12101e68d6de04b25aca847c59a

        SHA1

        6a9526453ef19fe4dd4470b56687f337d6ed2bcc

        SHA256

        5d2a0326900bdac0f67d4177d0ec0e4986c64c0ca559bc2ac308be678989aa71

        SHA512

        71ed5258a8d87448d7ddbee19a84527280731a94a72af4f030c82959bb6cca3d43862130b26920a4fc5a14dadc64b7654b5af57b0ec716470438d2bb867df9da

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un460634.exe

        Filesize

        555KB

        MD5

        cc5248def23c410ca50e855cc058675a

        SHA1

        2e25ef90ad7749e1035c2ccee614e97418fa0c26

        SHA256

        1e79697513510be03e0b14f6b06d294d9dc36db59f699640fd6f47509e17647f

        SHA512

        6f8c9c9983165a74cae0a737d4e9dce12f67ad526742e5554cda29b9f2ee925ad43100a005cfba4f108fd1bd152591d1d430d7aecad22b89ac36dc9a957b8156

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un460634.exe

        Filesize

        555KB

        MD5

        cc5248def23c410ca50e855cc058675a

        SHA1

        2e25ef90ad7749e1035c2ccee614e97418fa0c26

        SHA256

        1e79697513510be03e0b14f6b06d294d9dc36db59f699640fd6f47509e17647f

        SHA512

        6f8c9c9983165a74cae0a737d4e9dce12f67ad526742e5554cda29b9f2ee925ad43100a005cfba4f108fd1bd152591d1d430d7aecad22b89ac36dc9a957b8156

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7003.exe

        Filesize

        347KB

        MD5

        0929d283b1eaa276d6ba6ee200a5ea7f

        SHA1

        6afc904cd3028889d38a93bf931e174d13b97c8e

        SHA256

        523739e76afe077622fe9ee396277103bf0e64b4512bae5539e57951e07f84c9

        SHA512

        e5c17b5ee8e05d870283066e7a9586d0cf7f1504af224eedabe39b99b99cbec5bf528b71fc151da1b3fb7d7ecc7e54a7175ae347e4b4cca571f0c7a39d00c0d4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7003.exe

        Filesize

        347KB

        MD5

        0929d283b1eaa276d6ba6ee200a5ea7f

        SHA1

        6afc904cd3028889d38a93bf931e174d13b97c8e

        SHA256

        523739e76afe077622fe9ee396277103bf0e64b4512bae5539e57951e07f84c9

        SHA512

        e5c17b5ee8e05d870283066e7a9586d0cf7f1504af224eedabe39b99b99cbec5bf528b71fc151da1b3fb7d7ecc7e54a7175ae347e4b4cca571f0c7a39d00c0d4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4046.exe

        Filesize

        406KB

        MD5

        e6800bc6149513e36bb3e1425f65ff6a

        SHA1

        60c4525c6c57420cff9fa33ac93c3d5ddad54385

        SHA256

        2288cf447c53867db76023ef6e45c9e545d37cfdb3fc4fe90b78ac755adec20f

        SHA512

        6b8462f0107750d1f7d42fb8dfb3d6f32c2060259a56d815f15b70c28ceae721598e34d21d64ff69016e8d2a74ce6c98da87855cdd13477c9c3c414a389dea67

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4046.exe

        Filesize

        406KB

        MD5

        e6800bc6149513e36bb3e1425f65ff6a

        SHA1

        60c4525c6c57420cff9fa33ac93c3d5ddad54385

        SHA256

        2288cf447c53867db76023ef6e45c9e545d37cfdb3fc4fe90b78ac755adec20f

        SHA512

        6b8462f0107750d1f7d42fb8dfb3d6f32c2060259a56d815f15b70c28ceae721598e34d21d64ff69016e8d2a74ce6c98da87855cdd13477c9c3c414a389dea67

      • memory/2780-1102-0x0000000007F80000-0x000000000808A000-memory.dmp

        Filesize

        1.0MB

      • memory/2780-226-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2780-1116-0x000000000A100000-0x000000000A62C000-memory.dmp

        Filesize

        5.2MB

      • memory/2780-1115-0x0000000009F20000-0x000000000A0E2000-memory.dmp

        Filesize

        1.8MB

      • memory/2780-1114-0x0000000007180000-0x0000000007190000-memory.dmp

        Filesize

        64KB

      • memory/2780-209-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2780-1113-0x0000000008C00000-0x0000000008C50000-memory.dmp

        Filesize

        320KB

      • memory/2780-1112-0x0000000008B80000-0x0000000008BF6000-memory.dmp

        Filesize

        472KB

      • memory/2780-1111-0x0000000007180000-0x0000000007190000-memory.dmp

        Filesize

        64KB

      • memory/2780-1110-0x0000000007180000-0x0000000007190000-memory.dmp

        Filesize

        64KB

      • memory/2780-1109-0x0000000007180000-0x0000000007190000-memory.dmp

        Filesize

        64KB

      • memory/2780-1108-0x0000000008470000-0x00000000084D6000-memory.dmp

        Filesize

        408KB

      • memory/2780-1107-0x00000000083D0000-0x0000000008462000-memory.dmp

        Filesize

        584KB

      • memory/2780-210-0x0000000007180000-0x0000000007190000-memory.dmp

        Filesize

        64KB

      • memory/2780-1105-0x0000000007180000-0x0000000007190000-memory.dmp

        Filesize

        64KB

      • memory/2780-1104-0x00000000080E0000-0x000000000811C000-memory.dmp

        Filesize

        240KB

      • memory/2780-1103-0x00000000080C0000-0x00000000080D2000-memory.dmp

        Filesize

        72KB

      • memory/2780-1101-0x00000000078E0000-0x0000000007EF8000-memory.dmp

        Filesize

        6.1MB

      • memory/2780-228-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2780-216-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2780-224-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2780-222-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2780-220-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2780-192-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2780-191-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2780-208-0x0000000002C70000-0x0000000002CBB000-memory.dmp

        Filesize

        300KB

      • memory/2780-196-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2780-198-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2780-200-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2780-202-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2780-204-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2780-206-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2780-218-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2780-214-0x0000000007180000-0x0000000007190000-memory.dmp

        Filesize

        64KB

      • memory/2780-194-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2780-213-0x0000000007740000-0x000000000777F000-memory.dmp

        Filesize

        252KB

      • memory/2780-212-0x0000000007180000-0x0000000007190000-memory.dmp

        Filesize

        64KB

      • memory/3648-182-0x0000000007210000-0x0000000007220000-memory.dmp

        Filesize

        64KB

      • memory/3648-178-0x0000000007210000-0x0000000007220000-memory.dmp

        Filesize

        64KB

      • memory/3648-163-0x0000000007100000-0x0000000007112000-memory.dmp

        Filesize

        72KB

      • memory/3648-151-0x0000000007100000-0x0000000007112000-memory.dmp

        Filesize

        72KB

      • memory/3648-153-0x0000000007100000-0x0000000007112000-memory.dmp

        Filesize

        72KB

      • memory/3648-186-0x0000000000400000-0x0000000002B84000-memory.dmp

        Filesize

        39.5MB

      • memory/3648-184-0x0000000007210000-0x0000000007220000-memory.dmp

        Filesize

        64KB

      • memory/3648-183-0x0000000007210000-0x0000000007220000-memory.dmp

        Filesize

        64KB

      • memory/3648-155-0x0000000007100000-0x0000000007112000-memory.dmp

        Filesize

        72KB

      • memory/3648-150-0x0000000007100000-0x0000000007112000-memory.dmp

        Filesize

        72KB

      • memory/3648-181-0x0000000000400000-0x0000000002B84000-memory.dmp

        Filesize

        39.5MB

      • memory/3648-180-0x0000000007210000-0x0000000007220000-memory.dmp

        Filesize

        64KB

      • memory/3648-179-0x0000000007210000-0x0000000007220000-memory.dmp

        Filesize

        64KB

      • memory/3648-177-0x0000000007100000-0x0000000007112000-memory.dmp

        Filesize

        72KB

      • memory/3648-175-0x0000000007100000-0x0000000007112000-memory.dmp

        Filesize

        72KB

      • memory/3648-173-0x0000000007100000-0x0000000007112000-memory.dmp

        Filesize

        72KB

      • memory/3648-171-0x0000000007100000-0x0000000007112000-memory.dmp

        Filesize

        72KB

      • memory/3648-169-0x0000000007100000-0x0000000007112000-memory.dmp

        Filesize

        72KB

      • memory/3648-167-0x0000000007100000-0x0000000007112000-memory.dmp

        Filesize

        72KB

      • memory/3648-165-0x0000000007100000-0x0000000007112000-memory.dmp

        Filesize

        72KB

      • memory/3648-161-0x0000000007100000-0x0000000007112000-memory.dmp

        Filesize

        72KB

      • memory/3648-159-0x0000000007100000-0x0000000007112000-memory.dmp

        Filesize

        72KB

      • memory/3648-157-0x0000000007100000-0x0000000007112000-memory.dmp

        Filesize

        72KB

      • memory/3648-149-0x0000000007220000-0x00000000077C4000-memory.dmp

        Filesize

        5.6MB

      • memory/3648-148-0x0000000002B90000-0x0000000002BBD000-memory.dmp

        Filesize

        180KB

      • memory/4064-1124-0x0000000000B80000-0x0000000000BB2000-memory.dmp

        Filesize

        200KB

      • memory/4064-1125-0x0000000005430000-0x0000000005440000-memory.dmp

        Filesize

        64KB

      • memory/4064-1126-0x0000000005430000-0x0000000005440000-memory.dmp

        Filesize

        64KB