Analysis

  • max time kernel
    134s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 17:33

General

  • Target

    081a28f4c11c4450683091bb37239834ea6ffa0a62e8583d7a2d0679f68aa6ab.exe

  • Size

    672KB

  • MD5

    60543a19e34e7b2ce364f08a7ec315e5

  • SHA1

    1e76ec2e4d6bc6f710a1306c532c9f6b99c15d02

  • SHA256

    081a28f4c11c4450683091bb37239834ea6ffa0a62e8583d7a2d0679f68aa6ab

  • SHA512

    a831b6c28e3a3ee874d6977ec31eeaf87989c3215665df606b09041979d1120c51d7053e87f703c337d2aa7ad6d0df5e26416557806a965202b3f441fef786ed

  • SSDEEP

    12288:CMrmy90Pq9qnhqCoA19OwiS7/faKoYPQP4mWfKp1somev+Yv7rdpsa8vI:4yujnRoAKwVnqeUpKo+MdSa8A

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\081a28f4c11c4450683091bb37239834ea6ffa0a62e8583d7a2d0679f68aa6ab.exe
    "C:\Users\Admin\AppData\Local\Temp\081a28f4c11c4450683091bb37239834ea6ffa0a62e8583d7a2d0679f68aa6ab.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4280
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un201103.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un201103.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1184
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7588.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7588.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1180
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1180 -s 1096
          4⤵
          • Program crash
          PID:2112
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9016.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9016.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4236
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 1348
          4⤵
          • Program crash
          PID:3240
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si952773.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si952773.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3908
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1180 -ip 1180
    1⤵
      PID:1508
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4236 -ip 4236
      1⤵
        PID:712

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si952773.exe
        Filesize

        175KB

        MD5

        3cedd6cd61a7aac29bd96962016bd4ac

        SHA1

        e2b4fa280911117529ddb272dfc19d121d21b1a5

        SHA256

        7674aa9d23d62c9f16a7cd4c8079a801d59e078b8f8f9f7a4b0807530404ff50

        SHA512

        c223e79e3c0a3ca4c6d70b1f4ffaad5499213d8edc7354da63586491243eb92c83fd1f4d63da76e2fac90d9e815c72dba4a6bd0dfdde210656dfa22439fa9a18

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si952773.exe
        Filesize

        175KB

        MD5

        3cedd6cd61a7aac29bd96962016bd4ac

        SHA1

        e2b4fa280911117529ddb272dfc19d121d21b1a5

        SHA256

        7674aa9d23d62c9f16a7cd4c8079a801d59e078b8f8f9f7a4b0807530404ff50

        SHA512

        c223e79e3c0a3ca4c6d70b1f4ffaad5499213d8edc7354da63586491243eb92c83fd1f4d63da76e2fac90d9e815c72dba4a6bd0dfdde210656dfa22439fa9a18

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un201103.exe
        Filesize

        530KB

        MD5

        c3f238ba0f4fed6e4771f36bcd540043

        SHA1

        ed4fff7fcd253539c1692da53763abd854e0906d

        SHA256

        aaadca450a95624f3078102300db75509aa239959f9f805c0ea8779a00aec864

        SHA512

        2ab7ea975dca9c0cf2e5ec34f6adddc13b327a6b6044c39971cc8fae35e64fc1e6dbc3c14d92ad740747446779e4fe320857e71aa3b142f36a5e8eee4b41cd64

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un201103.exe
        Filesize

        530KB

        MD5

        c3f238ba0f4fed6e4771f36bcd540043

        SHA1

        ed4fff7fcd253539c1692da53763abd854e0906d

        SHA256

        aaadca450a95624f3078102300db75509aa239959f9f805c0ea8779a00aec864

        SHA512

        2ab7ea975dca9c0cf2e5ec34f6adddc13b327a6b6044c39971cc8fae35e64fc1e6dbc3c14d92ad740747446779e4fe320857e71aa3b142f36a5e8eee4b41cd64

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7588.exe
        Filesize

        259KB

        MD5

        5b7f1392fedda9267e0fac9379f72cff

        SHA1

        2a08564194f90c89f50946bb73f8ed0c87f6f0ce

        SHA256

        658bf5c72161a5169d98e9c3391d23bac3f4f19d1601e092ecd0c014c7167942

        SHA512

        158b3fdc68fa58bb83bb1a78a4ae71c64ba68b95cd350487f85da710b5a58a97ae957ca73899975b740c9231b375938a9509baea96f141a072f4304e286eb866

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7588.exe
        Filesize

        259KB

        MD5

        5b7f1392fedda9267e0fac9379f72cff

        SHA1

        2a08564194f90c89f50946bb73f8ed0c87f6f0ce

        SHA256

        658bf5c72161a5169d98e9c3391d23bac3f4f19d1601e092ecd0c014c7167942

        SHA512

        158b3fdc68fa58bb83bb1a78a4ae71c64ba68b95cd350487f85da710b5a58a97ae957ca73899975b740c9231b375938a9509baea96f141a072f4304e286eb866

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9016.exe
        Filesize

        318KB

        MD5

        6a1d73e3a96d111014d0ebd93ca31f92

        SHA1

        47f8942564242ed607101e270c436c5e2460819c

        SHA256

        060bbc4aff477acf12d918843f66e29b8b3f7344156a0386198633b5fbd21082

        SHA512

        426496f1b63a13667c937e328c85907265e2114978ad28a8e7dcba031eb11e94b0a325679ac4a7057c3b65d2d58dea6791e2cede8585c58ed285f7d2c2017543

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9016.exe
        Filesize

        318KB

        MD5

        6a1d73e3a96d111014d0ebd93ca31f92

        SHA1

        47f8942564242ed607101e270c436c5e2460819c

        SHA256

        060bbc4aff477acf12d918843f66e29b8b3f7344156a0386198633b5fbd21082

        SHA512

        426496f1b63a13667c937e328c85907265e2114978ad28a8e7dcba031eb11e94b0a325679ac4a7057c3b65d2d58dea6791e2cede8585c58ed285f7d2c2017543

      • memory/1180-162-0x00000000024B0000-0x00000000024C2000-memory.dmp
        Filesize

        72KB

      • memory/1180-168-0x00000000024B0000-0x00000000024C2000-memory.dmp
        Filesize

        72KB

      • memory/1180-150-0x0000000004DA0000-0x0000000004DB0000-memory.dmp
        Filesize

        64KB

      • memory/1180-151-0x0000000004DA0000-0x0000000004DB0000-memory.dmp
        Filesize

        64KB

      • memory/1180-152-0x0000000004DA0000-0x0000000004DB0000-memory.dmp
        Filesize

        64KB

      • memory/1180-153-0x00000000024B0000-0x00000000024C2000-memory.dmp
        Filesize

        72KB

      • memory/1180-154-0x00000000024B0000-0x00000000024C2000-memory.dmp
        Filesize

        72KB

      • memory/1180-156-0x00000000024B0000-0x00000000024C2000-memory.dmp
        Filesize

        72KB

      • memory/1180-158-0x00000000024B0000-0x00000000024C2000-memory.dmp
        Filesize

        72KB

      • memory/1180-160-0x00000000024B0000-0x00000000024C2000-memory.dmp
        Filesize

        72KB

      • memory/1180-148-0x0000000000640000-0x000000000066D000-memory.dmp
        Filesize

        180KB

      • memory/1180-166-0x00000000024B0000-0x00000000024C2000-memory.dmp
        Filesize

        72KB

      • memory/1180-164-0x00000000024B0000-0x00000000024C2000-memory.dmp
        Filesize

        72KB

      • memory/1180-149-0x0000000004DB0000-0x0000000005354000-memory.dmp
        Filesize

        5.6MB

      • memory/1180-170-0x00000000024B0000-0x00000000024C2000-memory.dmp
        Filesize

        72KB

      • memory/1180-172-0x00000000024B0000-0x00000000024C2000-memory.dmp
        Filesize

        72KB

      • memory/1180-174-0x00000000024B0000-0x00000000024C2000-memory.dmp
        Filesize

        72KB

      • memory/1180-176-0x00000000024B0000-0x00000000024C2000-memory.dmp
        Filesize

        72KB

      • memory/1180-178-0x00000000024B0000-0x00000000024C2000-memory.dmp
        Filesize

        72KB

      • memory/1180-180-0x00000000024B0000-0x00000000024C2000-memory.dmp
        Filesize

        72KB

      • memory/1180-181-0x0000000000400000-0x00000000004B1000-memory.dmp
        Filesize

        708KB

      • memory/1180-182-0x0000000004DA0000-0x0000000004DB0000-memory.dmp
        Filesize

        64KB

      • memory/1180-183-0x0000000004DA0000-0x0000000004DB0000-memory.dmp
        Filesize

        64KB

      • memory/1180-184-0x0000000004DA0000-0x0000000004DB0000-memory.dmp
        Filesize

        64KB

      • memory/1180-186-0x0000000000400000-0x00000000004B1000-memory.dmp
        Filesize

        708KB

      • memory/3908-1123-0x0000000000440000-0x0000000000472000-memory.dmp
        Filesize

        200KB

      • memory/3908-1125-0x0000000004D20000-0x0000000004D30000-memory.dmp
        Filesize

        64KB

      • memory/3908-1124-0x0000000004D20000-0x0000000004D30000-memory.dmp
        Filesize

        64KB

      • memory/4236-194-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/4236-196-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/4236-198-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/4236-200-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/4236-202-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/4236-204-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/4236-206-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/4236-208-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/4236-210-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/4236-212-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/4236-214-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/4236-216-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/4236-218-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/4236-222-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/4236-220-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/4236-224-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/4236-441-0x0000000001FE0000-0x000000000202B000-memory.dmp
        Filesize

        300KB

      • memory/4236-442-0x0000000004C70000-0x0000000004C80000-memory.dmp
        Filesize

        64KB

      • memory/4236-444-0x0000000004C70000-0x0000000004C80000-memory.dmp
        Filesize

        64KB

      • memory/4236-1100-0x0000000005230000-0x0000000005848000-memory.dmp
        Filesize

        6.1MB

      • memory/4236-1101-0x0000000005850000-0x000000000595A000-memory.dmp
        Filesize

        1.0MB

      • memory/4236-1102-0x0000000004BB0000-0x0000000004BC2000-memory.dmp
        Filesize

        72KB

      • memory/4236-1103-0x0000000004C70000-0x0000000004C80000-memory.dmp
        Filesize

        64KB

      • memory/4236-1104-0x0000000004BD0000-0x0000000004C0C000-memory.dmp
        Filesize

        240KB

      • memory/4236-1105-0x0000000005BB0000-0x0000000005C42000-memory.dmp
        Filesize

        584KB

      • memory/4236-1106-0x0000000005C50000-0x0000000005CB6000-memory.dmp
        Filesize

        408KB

      • memory/4236-1108-0x0000000004C70000-0x0000000004C80000-memory.dmp
        Filesize

        64KB

      • memory/4236-1109-0x0000000004C70000-0x0000000004C80000-memory.dmp
        Filesize

        64KB

      • memory/4236-1110-0x0000000004C70000-0x0000000004C80000-memory.dmp
        Filesize

        64KB

      • memory/4236-1111-0x0000000004C70000-0x0000000004C80000-memory.dmp
        Filesize

        64KB

      • memory/4236-1113-0x00000000066D0000-0x0000000006746000-memory.dmp
        Filesize

        472KB

      • memory/4236-192-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/4236-191-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/4236-1114-0x0000000006760000-0x00000000067B0000-memory.dmp
        Filesize

        320KB

      • memory/4236-1116-0x0000000007AA0000-0x0000000007C62000-memory.dmp
        Filesize

        1.8MB

      • memory/4236-1117-0x0000000007C70000-0x000000000819C000-memory.dmp
        Filesize

        5.2MB