Analysis

  • max time kernel
    145s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 19:39

General

  • Target

    d9d554444739fae0454f68ee810a9615855f2c36bf0bde24d87aeda2138f905d.exe

  • Size

    663KB

  • MD5

    87974105794b1562c1ef76300ab079d4

  • SHA1

    bfe728d430bc7f580cdd6f717e9c6d13769962b9

  • SHA256

    d9d554444739fae0454f68ee810a9615855f2c36bf0bde24d87aeda2138f905d

  • SHA512

    745fc9754c9085d2dd922de4d9d491aac70d1f7bac3a2f62a71f69218a4a003287e9610ff667e9039baa7724739564aa597a6392f546780e6424104c883cc56c

  • SSDEEP

    12288:eMr2y90vqIj6Qw6HLJfeJSldjdq+nep7lAyys0Lh8OpaKGO44DzWK5OGdKo9LDVt:EysqIj6WLFeYHjd7e3Lp0Vr3Gn4+K5vT

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9d554444739fae0454f68ee810a9615855f2c36bf0bde24d87aeda2138f905d.exe
    "C:\Users\Admin\AppData\Local\Temp\d9d554444739fae0454f68ee810a9615855f2c36bf0bde24d87aeda2138f905d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un994217.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un994217.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1468
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2105.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2105.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4004
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4004 -s 1080
          4⤵
          • Program crash
          PID:4992
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5827.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5827.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3720
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4004 -ip 4004
    1⤵
      PID:4640

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un994217.exe

      Filesize

      521KB

      MD5

      d6ad29d12232f47d868acce6a43c3a1d

      SHA1

      a882e6d88bac1c1a15474e47e4de14fcb2f24086

      SHA256

      95544c2bc450d40d3012add77166e2e7d4fa5ac0e8c3d64985254a1f38afe04a

      SHA512

      5d1870449f935368ab7f09699ce6c2d93fcc8d683d60cc2d8919a3114e72e50da67283ad567bbc13e77fa42c57339f2511f439d61687b5dc275e0d6747b70829

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un994217.exe

      Filesize

      521KB

      MD5

      d6ad29d12232f47d868acce6a43c3a1d

      SHA1

      a882e6d88bac1c1a15474e47e4de14fcb2f24086

      SHA256

      95544c2bc450d40d3012add77166e2e7d4fa5ac0e8c3d64985254a1f38afe04a

      SHA512

      5d1870449f935368ab7f09699ce6c2d93fcc8d683d60cc2d8919a3114e72e50da67283ad567bbc13e77fa42c57339f2511f439d61687b5dc275e0d6747b70829

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2105.exe

      Filesize

      236KB

      MD5

      a235d42623ee51812293c961aeefcfe0

      SHA1

      e6d7164cdf81bf16e6f1ea7b03d0d4dd0df09dba

      SHA256

      2bb39a3926ca5f24b341d2ffb92bca5070be22090c3d38439cbccaa200282eb1

      SHA512

      ae4ae991787ef107d086ff5107a9ca5c86af840185e720052624b53f15655fcd7dfa4580bf23561655a960ad13c5f1bcb5e408ee863bd14016c3660e69ebe2ee

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2105.exe

      Filesize

      236KB

      MD5

      a235d42623ee51812293c961aeefcfe0

      SHA1

      e6d7164cdf81bf16e6f1ea7b03d0d4dd0df09dba

      SHA256

      2bb39a3926ca5f24b341d2ffb92bca5070be22090c3d38439cbccaa200282eb1

      SHA512

      ae4ae991787ef107d086ff5107a9ca5c86af840185e720052624b53f15655fcd7dfa4580bf23561655a960ad13c5f1bcb5e408ee863bd14016c3660e69ebe2ee

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5827.exe

      Filesize

      294KB

      MD5

      42b67742f1376ba4d03a905f0c695a51

      SHA1

      bd9c2a2b8d385afff2b942e5d1fc895cea8a0957

      SHA256

      28bf747568e546df3b613463dd7c93213743dee8f0f9dc63e184d42f4bc77fee

      SHA512

      e8406880d78fa34a8e0b311540230da2c472fa75ac13e9bed837a7d216e8db9fccde95b1d89c17670aa154a633ecee149d1c8657a8f3f3dbf85031db8552f3e2

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5827.exe

      Filesize

      294KB

      MD5

      42b67742f1376ba4d03a905f0c695a51

      SHA1

      bd9c2a2b8d385afff2b942e5d1fc895cea8a0957

      SHA256

      28bf747568e546df3b613463dd7c93213743dee8f0f9dc63e184d42f4bc77fee

      SHA512

      e8406880d78fa34a8e0b311540230da2c472fa75ac13e9bed837a7d216e8db9fccde95b1d89c17670aa154a633ecee149d1c8657a8f3f3dbf85031db8552f3e2

    • memory/3720-322-0x0000000004D50000-0x0000000004D60000-memory.dmp

      Filesize

      64KB

    • memory/3720-324-0x0000000004D50000-0x0000000004D60000-memory.dmp

      Filesize

      64KB

    • memory/3720-200-0x0000000002440000-0x000000000247F000-memory.dmp

      Filesize

      252KB

    • memory/3720-1116-0x00000000069B0000-0x0000000006EDC000-memory.dmp

      Filesize

      5.2MB

    • memory/3720-204-0x0000000002440000-0x000000000247F000-memory.dmp

      Filesize

      252KB

    • memory/3720-1115-0x0000000004D50000-0x0000000004D60000-memory.dmp

      Filesize

      64KB

    • memory/3720-1114-0x00000000067D0000-0x0000000006992000-memory.dmp

      Filesize

      1.8MB

    • memory/3720-1113-0x0000000004D50000-0x0000000004D60000-memory.dmp

      Filesize

      64KB

    • memory/3720-202-0x0000000002440000-0x000000000247F000-memory.dmp

      Filesize

      252KB

    • memory/3720-1111-0x0000000004D50000-0x0000000004D60000-memory.dmp

      Filesize

      64KB

    • memory/3720-1110-0x0000000006620000-0x0000000006670000-memory.dmp

      Filesize

      320KB

    • memory/3720-1109-0x0000000006590000-0x0000000006606000-memory.dmp

      Filesize

      472KB

    • memory/3720-1107-0x00000000064A0000-0x0000000006532000-memory.dmp

      Filesize

      584KB

    • memory/3720-1106-0x0000000005CF0000-0x0000000005D56000-memory.dmp

      Filesize

      408KB

    • memory/3720-1105-0x0000000004D10000-0x0000000004D4C000-memory.dmp

      Filesize

      240KB

    • memory/3720-1104-0x0000000004D50000-0x0000000004D60000-memory.dmp

      Filesize

      64KB

    • memory/3720-1103-0x0000000004CF0000-0x0000000004D02000-memory.dmp

      Filesize

      72KB

    • memory/3720-1102-0x0000000005930000-0x0000000005A3A000-memory.dmp

      Filesize

      1.0MB

    • memory/3720-1101-0x0000000005310000-0x0000000005928000-memory.dmp

      Filesize

      6.1MB

    • memory/3720-214-0x0000000002440000-0x000000000247F000-memory.dmp

      Filesize

      252KB

    • memory/3720-320-0x0000000004D50000-0x0000000004D60000-memory.dmp

      Filesize

      64KB

    • memory/3720-318-0x0000000002140000-0x000000000218B000-memory.dmp

      Filesize

      300KB

    • memory/3720-224-0x0000000002440000-0x000000000247F000-memory.dmp

      Filesize

      252KB

    • memory/3720-222-0x0000000002440000-0x000000000247F000-memory.dmp

      Filesize

      252KB

    • memory/3720-220-0x0000000002440000-0x000000000247F000-memory.dmp

      Filesize

      252KB

    • memory/3720-192-0x0000000002440000-0x000000000247F000-memory.dmp

      Filesize

      252KB

    • memory/3720-191-0x0000000002440000-0x000000000247F000-memory.dmp

      Filesize

      252KB

    • memory/3720-194-0x0000000002440000-0x000000000247F000-memory.dmp

      Filesize

      252KB

    • memory/3720-196-0x0000000002440000-0x000000000247F000-memory.dmp

      Filesize

      252KB

    • memory/3720-198-0x0000000002440000-0x000000000247F000-memory.dmp

      Filesize

      252KB

    • memory/3720-218-0x0000000002440000-0x000000000247F000-memory.dmp

      Filesize

      252KB

    • memory/3720-1112-0x0000000004D50000-0x0000000004D60000-memory.dmp

      Filesize

      64KB

    • memory/3720-216-0x0000000002440000-0x000000000247F000-memory.dmp

      Filesize

      252KB

    • memory/3720-206-0x0000000002440000-0x000000000247F000-memory.dmp

      Filesize

      252KB

    • memory/3720-208-0x0000000002440000-0x000000000247F000-memory.dmp

      Filesize

      252KB

    • memory/3720-210-0x0000000002440000-0x000000000247F000-memory.dmp

      Filesize

      252KB

    • memory/3720-212-0x0000000002440000-0x000000000247F000-memory.dmp

      Filesize

      252KB

    • memory/4004-178-0x00000000025C0000-0x00000000025D2000-memory.dmp

      Filesize

      72KB

    • memory/4004-154-0x00000000025C0000-0x00000000025D2000-memory.dmp

      Filesize

      72KB

    • memory/4004-151-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

      Filesize

      64KB

    • memory/4004-149-0x00000000004B0000-0x00000000004DD000-memory.dmp

      Filesize

      180KB

    • memory/4004-150-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

      Filesize

      64KB

    • memory/4004-186-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/4004-184-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

      Filesize

      64KB

    • memory/4004-183-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

      Filesize

      64KB

    • memory/4004-148-0x0000000004BC0000-0x0000000005164000-memory.dmp

      Filesize

      5.6MB

    • memory/4004-182-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

      Filesize

      64KB

    • memory/4004-181-0x0000000000400000-0x00000000004A9000-memory.dmp

      Filesize

      676KB

    • memory/4004-180-0x00000000025C0000-0x00000000025D2000-memory.dmp

      Filesize

      72KB

    • memory/4004-152-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

      Filesize

      64KB

    • memory/4004-176-0x00000000025C0000-0x00000000025D2000-memory.dmp

      Filesize

      72KB

    • memory/4004-174-0x00000000025C0000-0x00000000025D2000-memory.dmp

      Filesize

      72KB

    • memory/4004-172-0x00000000025C0000-0x00000000025D2000-memory.dmp

      Filesize

      72KB

    • memory/4004-170-0x00000000025C0000-0x00000000025D2000-memory.dmp

      Filesize

      72KB

    • memory/4004-168-0x00000000025C0000-0x00000000025D2000-memory.dmp

      Filesize

      72KB

    • memory/4004-166-0x00000000025C0000-0x00000000025D2000-memory.dmp

      Filesize

      72KB

    • memory/4004-162-0x00000000025C0000-0x00000000025D2000-memory.dmp

      Filesize

      72KB

    • memory/4004-164-0x00000000025C0000-0x00000000025D2000-memory.dmp

      Filesize

      72KB

    • memory/4004-160-0x00000000025C0000-0x00000000025D2000-memory.dmp

      Filesize

      72KB

    • memory/4004-158-0x00000000025C0000-0x00000000025D2000-memory.dmp

      Filesize

      72KB

    • memory/4004-156-0x00000000025C0000-0x00000000025D2000-memory.dmp

      Filesize

      72KB

    • memory/4004-153-0x00000000025C0000-0x00000000025D2000-memory.dmp

      Filesize

      72KB