Analysis

  • max time kernel
    99s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/03/2023, 22:18

General

  • Target

    123f8f01936ff48aac68aba4441a8827d2eecaa74773fdb03b66bc36406f89aa.exe

  • Size

    672KB

  • MD5

    e0fcb048c9383fcad21d12a9a3e68a5d

  • SHA1

    a094ba2d50a8c1c8981b859c1a0e7036997baaec

  • SHA256

    123f8f01936ff48aac68aba4441a8827d2eecaa74773fdb03b66bc36406f89aa

  • SHA512

    161334a902078979781b86f9d14e75eab513b282ae4450739629c6b94bc6f069fcec678bd6061896fb599c54c2a6120743d506acfec5f1d5ef4226c102892a06

  • SSDEEP

    12288:VMr6y90bSHmFb5cM16UtSm3z1lf0Ewiyy04mzyjOds1GTZch:PyTHmZ6UtX3z1lfNyy04mzOsqGTSh

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\123f8f01936ff48aac68aba4441a8827d2eecaa74773fdb03b66bc36406f89aa.exe
    "C:\Users\Admin\AppData\Local\Temp\123f8f01936ff48aac68aba4441a8827d2eecaa74773fdb03b66bc36406f89aa.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un631125.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un631125.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2444
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0581.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0581.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3248
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 1080
          4⤵
          • Program crash
          PID:4000
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6412.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6412.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1960
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 1340
          4⤵
          • Program crash
          PID:4380
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si845125.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si845125.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1188
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3248 -ip 3248
    1⤵
      PID:4868
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1960 -ip 1960
      1⤵
        PID:3180

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si845125.exe

        Filesize

        175KB

        MD5

        4d4e21b60404280913a824e3ae6a1dea

        SHA1

        d50a42dfab7f06b560f301624af50056ae9f5514

        SHA256

        b46011388066e1b0c5510193d804f5a847cbca83bfa7047da8cb81b06424ba46

        SHA512

        53d26317ace7f7c44d084d34b84bf0b9964c455f72b0493a1aef7c22b64e97dfe369365ccc1029dabccf4db5b34ae5dcd0d7c205d72ce243221f25d38b8d8bdc

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si845125.exe

        Filesize

        175KB

        MD5

        4d4e21b60404280913a824e3ae6a1dea

        SHA1

        d50a42dfab7f06b560f301624af50056ae9f5514

        SHA256

        b46011388066e1b0c5510193d804f5a847cbca83bfa7047da8cb81b06424ba46

        SHA512

        53d26317ace7f7c44d084d34b84bf0b9964c455f72b0493a1aef7c22b64e97dfe369365ccc1029dabccf4db5b34ae5dcd0d7c205d72ce243221f25d38b8d8bdc

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un631125.exe

        Filesize

        530KB

        MD5

        1d8b67220f73bd47c61847cce8418acf

        SHA1

        26fe8b2b0db5b096a73bd52e48083d841d89b997

        SHA256

        54c51a703a3897e82b41b3ec7d01bfce39b6518c83ff61d73fd87fd08d9b352a

        SHA512

        be5f93e98c0a9e2f37713dd6e1aa14ee5fc89405985a524046f400963b19133d02bd6a649c16140f335746310a0fc6d35290b60c086e5701eb6fde554265bc94

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un631125.exe

        Filesize

        530KB

        MD5

        1d8b67220f73bd47c61847cce8418acf

        SHA1

        26fe8b2b0db5b096a73bd52e48083d841d89b997

        SHA256

        54c51a703a3897e82b41b3ec7d01bfce39b6518c83ff61d73fd87fd08d9b352a

        SHA512

        be5f93e98c0a9e2f37713dd6e1aa14ee5fc89405985a524046f400963b19133d02bd6a649c16140f335746310a0fc6d35290b60c086e5701eb6fde554265bc94

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0581.exe

        Filesize

        260KB

        MD5

        b6ae97e7734c03215aec0a87c49e10fd

        SHA1

        e43cfb7a978947497eab40162440c4b5e71d92d4

        SHA256

        df73e875102891492a75be0409eb70c4b83b481e96139cd11e082541f18290fb

        SHA512

        cd8882bc26bda11dc1e5220afd127e69401432da835267a71e1f02e371a8f8cfd600fc6da43f5353e1e63242f31905d8d30e9cd0c54faf20fef0a15f6b02e061

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0581.exe

        Filesize

        260KB

        MD5

        b6ae97e7734c03215aec0a87c49e10fd

        SHA1

        e43cfb7a978947497eab40162440c4b5e71d92d4

        SHA256

        df73e875102891492a75be0409eb70c4b83b481e96139cd11e082541f18290fb

        SHA512

        cd8882bc26bda11dc1e5220afd127e69401432da835267a71e1f02e371a8f8cfd600fc6da43f5353e1e63242f31905d8d30e9cd0c54faf20fef0a15f6b02e061

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6412.exe

        Filesize

        319KB

        MD5

        dc1d6eb3eee8987885dc7e5ef91332a4

        SHA1

        3259a6620a0e863284a260f36ed06b39028615c7

        SHA256

        205b4e147b8cce7d67daa434718430b01f19218a4408d16d66045b4fa5330e30

        SHA512

        e64b8e8b770c09d1936bdf4b51f0fc2f7a729653949a0c6d285b9dae07f5bf842f3ebcc6eafaa7f59c981c279ec8ce1c2b95a620feb073028260ffcafbf3ee6d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6412.exe

        Filesize

        319KB

        MD5

        dc1d6eb3eee8987885dc7e5ef91332a4

        SHA1

        3259a6620a0e863284a260f36ed06b39028615c7

        SHA256

        205b4e147b8cce7d67daa434718430b01f19218a4408d16d66045b4fa5330e30

        SHA512

        e64b8e8b770c09d1936bdf4b51f0fc2f7a729653949a0c6d285b9dae07f5bf842f3ebcc6eafaa7f59c981c279ec8ce1c2b95a620feb073028260ffcafbf3ee6d

      • memory/1188-1127-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/1188-1122-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/1188-1121-0x00000000002B0000-0x00000000002E2000-memory.dmp

        Filesize

        200KB

      • memory/1960-1102-0x00000000059E0000-0x00000000059F2000-memory.dmp

        Filesize

        72KB

      • memory/1960-1105-0x0000000005CF0000-0x0000000005D82000-memory.dmp

        Filesize

        584KB

      • memory/1960-1115-0x0000000008070000-0x00000000080C0000-memory.dmp

        Filesize

        320KB

      • memory/1960-1114-0x0000000002520000-0x0000000002596000-memory.dmp

        Filesize

        472KB

      • memory/1960-1113-0x0000000002770000-0x0000000002780000-memory.dmp

        Filesize

        64KB

      • memory/1960-1112-0x0000000007930000-0x0000000007E5C000-memory.dmp

        Filesize

        5.2MB

      • memory/1960-1111-0x0000000007760000-0x0000000007922000-memory.dmp

        Filesize

        1.8MB

      • memory/1960-1110-0x0000000002770000-0x0000000002780000-memory.dmp

        Filesize

        64KB

      • memory/1960-1109-0x0000000002770000-0x0000000002780000-memory.dmp

        Filesize

        64KB

      • memory/1960-1108-0x0000000002770000-0x0000000002780000-memory.dmp

        Filesize

        64KB

      • memory/1960-1106-0x0000000005D90000-0x0000000005DF6000-memory.dmp

        Filesize

        408KB

      • memory/1960-1104-0x0000000002770000-0x0000000002780000-memory.dmp

        Filesize

        64KB

      • memory/1960-1103-0x0000000005A00000-0x0000000005A3C000-memory.dmp

        Filesize

        240KB

      • memory/1960-1101-0x00000000058A0000-0x00000000059AA000-memory.dmp

        Filesize

        1.0MB

      • memory/1960-1100-0x0000000005220000-0x0000000005838000-memory.dmp

        Filesize

        6.1MB

      • memory/1960-263-0x0000000002770000-0x0000000002780000-memory.dmp

        Filesize

        64KB

      • memory/1960-267-0x0000000002770000-0x0000000002780000-memory.dmp

        Filesize

        64KB

      • memory/1960-266-0x0000000002770000-0x0000000002780000-memory.dmp

        Filesize

        64KB

      • memory/1960-262-0x0000000000660000-0x00000000006AB000-memory.dmp

        Filesize

        300KB

      • memory/1960-190-0x0000000002780000-0x00000000027BF000-memory.dmp

        Filesize

        252KB

      • memory/1960-191-0x0000000002780000-0x00000000027BF000-memory.dmp

        Filesize

        252KB

      • memory/1960-193-0x0000000002780000-0x00000000027BF000-memory.dmp

        Filesize

        252KB

      • memory/1960-195-0x0000000002780000-0x00000000027BF000-memory.dmp

        Filesize

        252KB

      • memory/1960-197-0x0000000002780000-0x00000000027BF000-memory.dmp

        Filesize

        252KB

      • memory/1960-199-0x0000000002780000-0x00000000027BF000-memory.dmp

        Filesize

        252KB

      • memory/1960-201-0x0000000002780000-0x00000000027BF000-memory.dmp

        Filesize

        252KB

      • memory/1960-203-0x0000000002780000-0x00000000027BF000-memory.dmp

        Filesize

        252KB

      • memory/1960-205-0x0000000002780000-0x00000000027BF000-memory.dmp

        Filesize

        252KB

      • memory/1960-207-0x0000000002780000-0x00000000027BF000-memory.dmp

        Filesize

        252KB

      • memory/1960-209-0x0000000002780000-0x00000000027BF000-memory.dmp

        Filesize

        252KB

      • memory/1960-211-0x0000000002780000-0x00000000027BF000-memory.dmp

        Filesize

        252KB

      • memory/1960-213-0x0000000002780000-0x00000000027BF000-memory.dmp

        Filesize

        252KB

      • memory/1960-219-0x0000000002780000-0x00000000027BF000-memory.dmp

        Filesize

        252KB

      • memory/1960-217-0x0000000002780000-0x00000000027BF000-memory.dmp

        Filesize

        252KB

      • memory/1960-215-0x0000000002780000-0x00000000027BF000-memory.dmp

        Filesize

        252KB

      • memory/1960-221-0x0000000002780000-0x00000000027BF000-memory.dmp

        Filesize

        252KB

      • memory/1960-223-0x0000000002780000-0x00000000027BF000-memory.dmp

        Filesize

        252KB

      • memory/3248-172-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/3248-153-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/3248-185-0x0000000000400000-0x00000000004B1000-memory.dmp

        Filesize

        708KB

      • memory/3248-183-0x00000000025F0000-0x0000000002600000-memory.dmp

        Filesize

        64KB

      • memory/3248-182-0x00000000025F0000-0x0000000002600000-memory.dmp

        Filesize

        64KB

      • memory/3248-181-0x0000000000400000-0x00000000004B1000-memory.dmp

        Filesize

        708KB

      • memory/3248-174-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/3248-180-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/3248-178-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/3248-158-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/3248-156-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/3248-176-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/3248-164-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/3248-170-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/3248-168-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/3248-166-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/3248-154-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/3248-162-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/3248-160-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/3248-152-0x0000000004AB0000-0x0000000005054000-memory.dmp

        Filesize

        5.6MB

      • memory/3248-151-0x00000000025F0000-0x0000000002600000-memory.dmp

        Filesize

        64KB

      • memory/3248-150-0x00000000025F0000-0x0000000002600000-memory.dmp

        Filesize

        64KB

      • memory/3248-149-0x00000000025F0000-0x0000000002600000-memory.dmp

        Filesize

        64KB

      • memory/3248-148-0x0000000000610000-0x000000000063D000-memory.dmp

        Filesize

        180KB