Analysis

  • max time kernel
    63s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2023, 17:43

General

  • Target

    bfe2cde2314995af5578e1f9560a02005a6028128b94b1c4fe646dfe048ae87b.exe

  • Size

    697KB

  • MD5

    5c973d896cd79f2f815126371799050b

  • SHA1

    8f252014e29d31d82024dd940c5c24853c8441b7

  • SHA256

    bfe2cde2314995af5578e1f9560a02005a6028128b94b1c4fe646dfe048ae87b

  • SHA512

    de0835cb983e7239d6ad4111c612d0736d37686d49d50fc86fcb38f71d46c3d92bffad03f6d637d7f161e763c0a06910341e2c188c4687f7e88a7511b21d4d89

  • SSDEEP

    12288:LMrhy907hv0+jqPfJvdgbXsU9SOZNkxbB0eHXJ3k5QbgKSpfpXx:WyGvTjqPfAzf2Txd0npf9x

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

muse

C2

176.113.115.145:4125

Attributes
  • auth_value

    b91988a63a24940038d9262827a5320c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bfe2cde2314995af5578e1f9560a02005a6028128b94b1c4fe646dfe048ae87b.exe
    "C:\Users\Admin\AppData\Local\Temp\bfe2cde2314995af5578e1f9560a02005a6028128b94b1c4fe646dfe048ae87b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un434895.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un434895.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8890.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8890.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1500
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1500 -s 1084
          4⤵
          • Program crash
          PID:5096
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5544.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5544.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2312
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 1832
          4⤵
          • Program crash
          PID:3824
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si461190.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si461190.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4148
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1500 -ip 1500
    1⤵
      PID:772
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2312 -ip 2312
      1⤵
        PID:1272

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si461190.exe

              Filesize

              175KB

              MD5

              95ab81ebea445cbf4bd37362d5306aa3

              SHA1

              56683114fc72e894a4546eefd8305abf3f8f23fe

              SHA256

              5a41e6269187b98846e3745b668f24ff11f52f4a6822f4fc1475816149eb8efb

              SHA512

              ebd948a9992e37666979221dbce4e02cb38d40fb4cd6d6f39cb6c223d9d8f8770171599e875d4082b346a21b17ce419232731c14d872865a37c86fcb04b6d0f3

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si461190.exe

              Filesize

              175KB

              MD5

              95ab81ebea445cbf4bd37362d5306aa3

              SHA1

              56683114fc72e894a4546eefd8305abf3f8f23fe

              SHA256

              5a41e6269187b98846e3745b668f24ff11f52f4a6822f4fc1475816149eb8efb

              SHA512

              ebd948a9992e37666979221dbce4e02cb38d40fb4cd6d6f39cb6c223d9d8f8770171599e875d4082b346a21b17ce419232731c14d872865a37c86fcb04b6d0f3

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un434895.exe

              Filesize

              555KB

              MD5

              9bd107ee7371667e383e63ac71fc286b

              SHA1

              2c6dff10d6e2c575d73a395914e341e01d7c1eb8

              SHA256

              64c0d243c6c56939596cffae70fcc122ebe5d489933167ea9080cd86ad594c86

              SHA512

              c78091bf9d93e17f60610680bc6b71c7fed88758fb8bc378c0ee8b391e16b9c7529e3f39f17dc424e4d2f235cd966aefb528f31afcb7e90e2be70aa0911af696

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un434895.exe

              Filesize

              555KB

              MD5

              9bd107ee7371667e383e63ac71fc286b

              SHA1

              2c6dff10d6e2c575d73a395914e341e01d7c1eb8

              SHA256

              64c0d243c6c56939596cffae70fcc122ebe5d489933167ea9080cd86ad594c86

              SHA512

              c78091bf9d93e17f60610680bc6b71c7fed88758fb8bc378c0ee8b391e16b9c7529e3f39f17dc424e4d2f235cd966aefb528f31afcb7e90e2be70aa0911af696

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8890.exe

              Filesize

              348KB

              MD5

              50802132a7e4842390ce0414133a5f13

              SHA1

              efc2b3c58c104cdf21772a3b4ce9fb945d6bb4a6

              SHA256

              8abb8831093245a84eb7547c76095a69dce91cd791455fb1c4a015b6d6eef0f3

              SHA512

              e7f3378ef4cc113c33c5bcb35d7516768d575eae634f2f625dadd712de2bdcb8c105daa303c2165f57ae9f20dae2d3401685deb5350d42b92b8578bb6b67e54d

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8890.exe

              Filesize

              348KB

              MD5

              50802132a7e4842390ce0414133a5f13

              SHA1

              efc2b3c58c104cdf21772a3b4ce9fb945d6bb4a6

              SHA256

              8abb8831093245a84eb7547c76095a69dce91cd791455fb1c4a015b6d6eef0f3

              SHA512

              e7f3378ef4cc113c33c5bcb35d7516768d575eae634f2f625dadd712de2bdcb8c105daa303c2165f57ae9f20dae2d3401685deb5350d42b92b8578bb6b67e54d

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5544.exe

              Filesize

              406KB

              MD5

              ec93ad5c4639a2eb1cfb23901ad003f6

              SHA1

              227a1220e471fb32c112e48bdc849588893eaf94

              SHA256

              787b071d554f6c92d43262ed91522bb6b07496bfda01262a234fa83e04ab5797

              SHA512

              97552e95fb9286c513073159e9d1c2af266d8bb70fd0ea941cc6be8f22daf341cafc94e18387e4726bb2ff657de68374a34cce19796f236a8f1ecbb3980d7e63

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5544.exe

              Filesize

              406KB

              MD5

              ec93ad5c4639a2eb1cfb23901ad003f6

              SHA1

              227a1220e471fb32c112e48bdc849588893eaf94

              SHA256

              787b071d554f6c92d43262ed91522bb6b07496bfda01262a234fa83e04ab5797

              SHA512

              97552e95fb9286c513073159e9d1c2af266d8bb70fd0ea941cc6be8f22daf341cafc94e18387e4726bb2ff657de68374a34cce19796f236a8f1ecbb3980d7e63

            • memory/1500-148-0x0000000002B90000-0x0000000002BBD000-memory.dmp

              Filesize

              180KB

            • memory/1500-149-0x0000000007370000-0x0000000007914000-memory.dmp

              Filesize

              5.6MB

            • memory/1500-151-0x0000000004A90000-0x0000000004AA2000-memory.dmp

              Filesize

              72KB

            • memory/1500-150-0x0000000004A90000-0x0000000004AA2000-memory.dmp

              Filesize

              72KB

            • memory/1500-153-0x0000000004A90000-0x0000000004AA2000-memory.dmp

              Filesize

              72KB

            • memory/1500-155-0x0000000004A90000-0x0000000004AA2000-memory.dmp

              Filesize

              72KB

            • memory/1500-157-0x0000000004A90000-0x0000000004AA2000-memory.dmp

              Filesize

              72KB

            • memory/1500-159-0x0000000004A90000-0x0000000004AA2000-memory.dmp

              Filesize

              72KB

            • memory/1500-161-0x0000000004A90000-0x0000000004AA2000-memory.dmp

              Filesize

              72KB

            • memory/1500-163-0x0000000004A90000-0x0000000004AA2000-memory.dmp

              Filesize

              72KB

            • memory/1500-165-0x0000000004A90000-0x0000000004AA2000-memory.dmp

              Filesize

              72KB

            • memory/1500-167-0x0000000004A90000-0x0000000004AA2000-memory.dmp

              Filesize

              72KB

            • memory/1500-169-0x0000000004A90000-0x0000000004AA2000-memory.dmp

              Filesize

              72KB

            • memory/1500-171-0x0000000004A90000-0x0000000004AA2000-memory.dmp

              Filesize

              72KB

            • memory/1500-173-0x0000000004A90000-0x0000000004AA2000-memory.dmp

              Filesize

              72KB

            • memory/1500-175-0x0000000004A90000-0x0000000004AA2000-memory.dmp

              Filesize

              72KB

            • memory/1500-177-0x0000000004A90000-0x0000000004AA2000-memory.dmp

              Filesize

              72KB

            • memory/1500-178-0x0000000007360000-0x0000000007370000-memory.dmp

              Filesize

              64KB

            • memory/1500-179-0x0000000007360000-0x0000000007370000-memory.dmp

              Filesize

              64KB

            • memory/1500-180-0x0000000007360000-0x0000000007370000-memory.dmp

              Filesize

              64KB

            • memory/1500-181-0x0000000000400000-0x0000000002B84000-memory.dmp

              Filesize

              39.5MB

            • memory/1500-183-0x0000000007360000-0x0000000007370000-memory.dmp

              Filesize

              64KB

            • memory/1500-184-0x0000000007360000-0x0000000007370000-memory.dmp

              Filesize

              64KB

            • memory/1500-185-0x0000000007360000-0x0000000007370000-memory.dmp

              Filesize

              64KB

            • memory/1500-186-0x0000000000400000-0x0000000002B84000-memory.dmp

              Filesize

              39.5MB

            • memory/2312-192-0x00000000071C0000-0x00000000071D0000-memory.dmp

              Filesize

              64KB

            • memory/2312-191-0x0000000002C70000-0x0000000002CBB000-memory.dmp

              Filesize

              300KB

            • memory/2312-193-0x00000000071C0000-0x00000000071D0000-memory.dmp

              Filesize

              64KB

            • memory/2312-194-0x0000000007780000-0x00000000077BF000-memory.dmp

              Filesize

              252KB

            • memory/2312-195-0x0000000007780000-0x00000000077BF000-memory.dmp

              Filesize

              252KB

            • memory/2312-197-0x0000000007780000-0x00000000077BF000-memory.dmp

              Filesize

              252KB

            • memory/2312-199-0x0000000007780000-0x00000000077BF000-memory.dmp

              Filesize

              252KB

            • memory/2312-201-0x0000000007780000-0x00000000077BF000-memory.dmp

              Filesize

              252KB

            • memory/2312-203-0x0000000007780000-0x00000000077BF000-memory.dmp

              Filesize

              252KB

            • memory/2312-205-0x0000000007780000-0x00000000077BF000-memory.dmp

              Filesize

              252KB

            • memory/2312-207-0x0000000007780000-0x00000000077BF000-memory.dmp

              Filesize

              252KB

            • memory/2312-209-0x0000000007780000-0x00000000077BF000-memory.dmp

              Filesize

              252KB

            • memory/2312-211-0x0000000007780000-0x00000000077BF000-memory.dmp

              Filesize

              252KB

            • memory/2312-213-0x0000000007780000-0x00000000077BF000-memory.dmp

              Filesize

              252KB

            • memory/2312-215-0x0000000007780000-0x00000000077BF000-memory.dmp

              Filesize

              252KB

            • memory/2312-219-0x0000000007780000-0x00000000077BF000-memory.dmp

              Filesize

              252KB

            • memory/2312-217-0x0000000007780000-0x00000000077BF000-memory.dmp

              Filesize

              252KB

            • memory/2312-221-0x0000000007780000-0x00000000077BF000-memory.dmp

              Filesize

              252KB

            • memory/2312-223-0x0000000007780000-0x00000000077BF000-memory.dmp

              Filesize

              252KB

            • memory/2312-225-0x0000000007780000-0x00000000077BF000-memory.dmp

              Filesize

              252KB

            • memory/2312-227-0x0000000007780000-0x00000000077BF000-memory.dmp

              Filesize

              252KB

            • memory/2312-1100-0x0000000007900000-0x0000000007F18000-memory.dmp

              Filesize

              6.1MB

            • memory/2312-1101-0x0000000007F80000-0x000000000808A000-memory.dmp

              Filesize

              1.0MB

            • memory/2312-1102-0x00000000080C0000-0x00000000080D2000-memory.dmp

              Filesize

              72KB

            • memory/2312-1103-0x00000000080E0000-0x000000000811C000-memory.dmp

              Filesize

              240KB

            • memory/2312-1104-0x00000000071C0000-0x00000000071D0000-memory.dmp

              Filesize

              64KB

            • memory/2312-1106-0x00000000071C0000-0x00000000071D0000-memory.dmp

              Filesize

              64KB

            • memory/2312-1107-0x00000000071C0000-0x00000000071D0000-memory.dmp

              Filesize

              64KB

            • memory/2312-1108-0x00000000083D0000-0x0000000008462000-memory.dmp

              Filesize

              584KB

            • memory/2312-1109-0x0000000008470000-0x00000000084D6000-memory.dmp

              Filesize

              408KB

            • memory/2312-1110-0x0000000008C80000-0x0000000008CF6000-memory.dmp

              Filesize

              472KB

            • memory/2312-1111-0x0000000008D00000-0x0000000008D50000-memory.dmp

              Filesize

              320KB

            • memory/2312-1112-0x0000000008D80000-0x0000000008F42000-memory.dmp

              Filesize

              1.8MB

            • memory/2312-1113-0x0000000008F60000-0x000000000948C000-memory.dmp

              Filesize

              5.2MB

            • memory/2312-1114-0x00000000071C0000-0x00000000071D0000-memory.dmp

              Filesize

              64KB

            • memory/4148-1123-0x0000000000F80000-0x0000000000FB2000-memory.dmp

              Filesize

              200KB

            • memory/4148-1124-0x0000000005810000-0x0000000005820000-memory.dmp

              Filesize

              64KB