Analysis

  • max time kernel
    107s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 21:48

General

  • Target

    5188b7d04b8df163746b3bb850e4ed2908fdd657dbfb28fe120d0d4345905417.exe

  • Size

    534KB

  • MD5

    01a6238c96e3c1630a58d61004c7754b

  • SHA1

    4c27d9aa8a0b6bfc00031a736a67586069a2f197

  • SHA256

    5188b7d04b8df163746b3bb850e4ed2908fdd657dbfb28fe120d0d4345905417

  • SHA512

    76428240adef23738ebb831211062b01411a11f90ab412f26bfb4b42b66c0405e29ab716cbaec721b4e9860473e31ae4ea24bf35e6098cf60f64e80e563320d3

  • SSDEEP

    12288:YMr6y90yIP8sihHF7solj2ReCgzMd3Lq8c6MxgEPmLD:CyHDjVNsc2R/KMd3G/ED

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5188b7d04b8df163746b3bb850e4ed2908fdd657dbfb28fe120d0d4345905417.exe
    "C:\Users\Admin\AppData\Local\Temp\5188b7d04b8df163746b3bb850e4ed2908fdd657dbfb28fe120d0d4345905417.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2620
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWR5801.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWR5801.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4316
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr849840.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr849840.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:700
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku449634.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku449634.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3592
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3592 -s 1944
          4⤵
          • Program crash
          PID:4564
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr745131.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr745131.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3720
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3592 -ip 3592
    1⤵
      PID:5012

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr745131.exe
      Filesize

      175KB

      MD5

      bfcc42468db13b656393dbfe68145cd3

      SHA1

      36c955d828f27e21373614578515efdb79a90c8a

      SHA256

      f212921aa299c4a435d0931fc4cce45b91d9d0f7b2a165005f83ad200925ebd7

      SHA512

      13550438fa75a5ac3a6b2cc123ce24594f86c586e9da3f53dcda9ce488e1aa9295f7550771d5ce4f29d458f4eded2d6d09db8bdff4506eb0c0d4a806b27f38be

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr745131.exe
      Filesize

      175KB

      MD5

      bfcc42468db13b656393dbfe68145cd3

      SHA1

      36c955d828f27e21373614578515efdb79a90c8a

      SHA256

      f212921aa299c4a435d0931fc4cce45b91d9d0f7b2a165005f83ad200925ebd7

      SHA512

      13550438fa75a5ac3a6b2cc123ce24594f86c586e9da3f53dcda9ce488e1aa9295f7550771d5ce4f29d458f4eded2d6d09db8bdff4506eb0c0d4a806b27f38be

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWR5801.exe
      Filesize

      391KB

      MD5

      a48367b11174169596309aec48e95892

      SHA1

      f41aa1cbf66d28b62e0df92ab2c1e90557dd23ab

      SHA256

      f8c102d6e5485bdf21c916c31b0adf60216ce9b1d79a38f231624139f686a60a

      SHA512

      1ae741b70fc37459e97d1bb75ffef8eacce29b3af2530a3a1677e343fea4d78018649958a1279fd1b376cef33a55cbe9c98663ee8884c95d20902d3d1edbd95f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWR5801.exe
      Filesize

      391KB

      MD5

      a48367b11174169596309aec48e95892

      SHA1

      f41aa1cbf66d28b62e0df92ab2c1e90557dd23ab

      SHA256

      f8c102d6e5485bdf21c916c31b0adf60216ce9b1d79a38f231624139f686a60a

      SHA512

      1ae741b70fc37459e97d1bb75ffef8eacce29b3af2530a3a1677e343fea4d78018649958a1279fd1b376cef33a55cbe9c98663ee8884c95d20902d3d1edbd95f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr849840.exe
      Filesize

      11KB

      MD5

      5616c30d57f2eea122e08e5ac7faf0d5

      SHA1

      bdcf5bb82f6ef764ce7881e3fe642a16dd320e99

      SHA256

      0db84d3f899af2ba42a24f0cef836ba46ef509b0b533c4682ff4a3e9ef3a4908

      SHA512

      4fc69c9db35fce2418ad004c064f26afe31f7697ba6151ded5fff269d8b510fe95614905e544bb225669722efbff65c154996b350326e85a3ea6ee44df0204c0

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr849840.exe
      Filesize

      11KB

      MD5

      5616c30d57f2eea122e08e5ac7faf0d5

      SHA1

      bdcf5bb82f6ef764ce7881e3fe642a16dd320e99

      SHA256

      0db84d3f899af2ba42a24f0cef836ba46ef509b0b533c4682ff4a3e9ef3a4908

      SHA512

      4fc69c9db35fce2418ad004c064f26afe31f7697ba6151ded5fff269d8b510fe95614905e544bb225669722efbff65c154996b350326e85a3ea6ee44df0204c0

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku449634.exe
      Filesize

      359KB

      MD5

      e4f55e6009e89e3e674789c8c4f84729

      SHA1

      408ad91cf4f70cf6aae2c7b5a8e728ed77fc2088

      SHA256

      dc913680353fd94b5acba4c09684ac24af1dce976cd13c991169e5cf6202a12a

      SHA512

      221a89abb6cc40293b0e9abc488d994d81034745153920576e70f2020ce622af5ff391ccc2719d96d0ce1879bd155e05415b8a314a1ae75327a30532058385ac

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku449634.exe
      Filesize

      359KB

      MD5

      e4f55e6009e89e3e674789c8c4f84729

      SHA1

      408ad91cf4f70cf6aae2c7b5a8e728ed77fc2088

      SHA256

      dc913680353fd94b5acba4c09684ac24af1dce976cd13c991169e5cf6202a12a

      SHA512

      221a89abb6cc40293b0e9abc488d994d81034745153920576e70f2020ce622af5ff391ccc2719d96d0ce1879bd155e05415b8a314a1ae75327a30532058385ac

    • memory/700-147-0x0000000000850000-0x000000000085A000-memory.dmp
      Filesize

      40KB

    • memory/3592-153-0x0000000001C70000-0x0000000001CBB000-memory.dmp
      Filesize

      300KB

    • memory/3592-154-0x00000000060A0000-0x0000000006644000-memory.dmp
      Filesize

      5.6MB

    • memory/3592-155-0x0000000003AE0000-0x0000000003AF0000-memory.dmp
      Filesize

      64KB

    • memory/3592-156-0x0000000003AE0000-0x0000000003AF0000-memory.dmp
      Filesize

      64KB

    • memory/3592-157-0x0000000003AE0000-0x0000000003AF0000-memory.dmp
      Filesize

      64KB

    • memory/3592-158-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-159-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-161-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-163-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-165-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-167-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-169-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-171-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-173-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-177-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-175-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-179-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-181-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-183-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-185-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-187-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-189-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-191-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-193-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-195-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-197-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-199-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-201-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-203-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-205-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-207-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-209-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-211-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-213-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-215-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-217-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-219-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-221-0x0000000006660000-0x000000000669F000-memory.dmp
      Filesize

      252KB

    • memory/3592-1064-0x0000000006700000-0x0000000006D18000-memory.dmp
      Filesize

      6.1MB

    • memory/3592-1065-0x0000000006DA0000-0x0000000006EAA000-memory.dmp
      Filesize

      1.0MB

    • memory/3592-1066-0x0000000006EE0000-0x0000000006EF2000-memory.dmp
      Filesize

      72KB

    • memory/3592-1067-0x0000000006F00000-0x0000000006F3C000-memory.dmp
      Filesize

      240KB

    • memory/3592-1068-0x0000000003AE0000-0x0000000003AF0000-memory.dmp
      Filesize

      64KB

    • memory/3592-1070-0x0000000003AE0000-0x0000000003AF0000-memory.dmp
      Filesize

      64KB

    • memory/3592-1071-0x0000000003AE0000-0x0000000003AF0000-memory.dmp
      Filesize

      64KB

    • memory/3592-1072-0x0000000003AE0000-0x0000000003AF0000-memory.dmp
      Filesize

      64KB

    • memory/3592-1073-0x00000000071F0000-0x0000000007256000-memory.dmp
      Filesize

      408KB

    • memory/3592-1074-0x00000000078C0000-0x0000000007952000-memory.dmp
      Filesize

      584KB

    • memory/3592-1075-0x0000000007AB0000-0x0000000007C72000-memory.dmp
      Filesize

      1.8MB

    • memory/3592-1076-0x0000000003AE0000-0x0000000003AF0000-memory.dmp
      Filesize

      64KB

    • memory/3592-1077-0x0000000007C90000-0x00000000081BC000-memory.dmp
      Filesize

      5.2MB

    • memory/3592-1079-0x0000000008440000-0x00000000084B6000-memory.dmp
      Filesize

      472KB

    • memory/3592-1080-0x00000000084C0000-0x0000000008510000-memory.dmp
      Filesize

      320KB

    • memory/3720-1087-0x00000000001A0000-0x00000000001D2000-memory.dmp
      Filesize

      200KB

    • memory/3720-1088-0x0000000004F40000-0x0000000004F50000-memory.dmp
      Filesize

      64KB