Analysis

  • max time kernel
    126s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 17:55

General

  • Target

    77da563d2dc3c777917984b47a13d508d51b453efd7b2bf32c71edda345db371.exe

  • Size

    672KB

  • MD5

    2c01b7e4f4cb25b210ab58f6a4cf9c91

  • SHA1

    779314f6375fc147cf52396a76044c8e7073bc10

  • SHA256

    77da563d2dc3c777917984b47a13d508d51b453efd7b2bf32c71edda345db371

  • SHA512

    1400370e18b5a31725b163f42ccb6b90607de333f20913574912c74395407b2b684c2376ad92a6c40d8b4d2384a228cfbf163ddee287b776afe22b98816c019f

  • SSDEEP

    12288:UMr9y90fsLy4lfAcvfwsmcaBdvpwBJ7f9H+ul2RpomqY+YllUCpAzLK+:Byvy4J/J2R+fg7o3enWXX

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\77da563d2dc3c777917984b47a13d508d51b453efd7b2bf32c71edda345db371.exe
    "C:\Users\Admin\AppData\Local\Temp\77da563d2dc3c777917984b47a13d508d51b453efd7b2bf32c71edda345db371.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4396
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un095217.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un095217.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:220
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8514.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8514.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4000
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 1080
          4⤵
          • Program crash
          PID:1660
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6463.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6463.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4420
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 1636
          4⤵
          • Program crash
          PID:4204
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si611070.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si611070.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4980
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4000 -ip 4000
    1⤵
      PID:3836
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4420 -ip 4420
      1⤵
        PID:4112

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si611070.exe

        Filesize

        175KB

        MD5

        a00d3fc1e149d4154a1027a1b9c1715c

        SHA1

        c5deb25c31e3ed147dcd724a1aa861e0c29d1529

        SHA256

        a7b2bb2c16f597f2eeb653fa69aafca304fd3d814f791818c2e11485add10cea

        SHA512

        6f40fdd46ac8dd2060de5db59fb9ca081bdfe309726e172f2ed0a1ced9a2ccc07f2dfdfc4cb671d7c456bf3557b6f595968375a61e2ded4c776045543801a79b

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si611070.exe

        Filesize

        175KB

        MD5

        a00d3fc1e149d4154a1027a1b9c1715c

        SHA1

        c5deb25c31e3ed147dcd724a1aa861e0c29d1529

        SHA256

        a7b2bb2c16f597f2eeb653fa69aafca304fd3d814f791818c2e11485add10cea

        SHA512

        6f40fdd46ac8dd2060de5db59fb9ca081bdfe309726e172f2ed0a1ced9a2ccc07f2dfdfc4cb671d7c456bf3557b6f595968375a61e2ded4c776045543801a79b

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un095217.exe

        Filesize

        530KB

        MD5

        f5327717e7b34eec5cc21a53a5e44002

        SHA1

        360bfce2ceb024b9346dc9163d710100c84748c7

        SHA256

        f73b2e91be26790a3c775253c4bb171d943739cd2a22d139baa9a7a45b93449f

        SHA512

        6ef91e8d46e0c2b6a5ab6fe9d2e93d22391bc6dbfa2721d680b047568350dd30e4043e22e15c24679233fca4116a37fe47ba4f6dabfc26cc51bd53446a65c9a5

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un095217.exe

        Filesize

        530KB

        MD5

        f5327717e7b34eec5cc21a53a5e44002

        SHA1

        360bfce2ceb024b9346dc9163d710100c84748c7

        SHA256

        f73b2e91be26790a3c775253c4bb171d943739cd2a22d139baa9a7a45b93449f

        SHA512

        6ef91e8d46e0c2b6a5ab6fe9d2e93d22391bc6dbfa2721d680b047568350dd30e4043e22e15c24679233fca4116a37fe47ba4f6dabfc26cc51bd53446a65c9a5

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8514.exe

        Filesize

        259KB

        MD5

        8050f3ffddbf5543e7aa9f6c02886c8f

        SHA1

        f2783ea0cd2748a4b362b736f71d7b8dc44c68d8

        SHA256

        222dcfca1968657073012f41e0a651f52ca73253ea18c98233a363e3ce5ae6d9

        SHA512

        ab103290ead66f6bd66e970ce6888f147cf6885c07988b392a87e42bc97128814e915055aa3b6ebeb788866877ac8353b86d935b0f5bb87c56333c621315975a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8514.exe

        Filesize

        259KB

        MD5

        8050f3ffddbf5543e7aa9f6c02886c8f

        SHA1

        f2783ea0cd2748a4b362b736f71d7b8dc44c68d8

        SHA256

        222dcfca1968657073012f41e0a651f52ca73253ea18c98233a363e3ce5ae6d9

        SHA512

        ab103290ead66f6bd66e970ce6888f147cf6885c07988b392a87e42bc97128814e915055aa3b6ebeb788866877ac8353b86d935b0f5bb87c56333c621315975a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6463.exe

        Filesize

        318KB

        MD5

        73465532fc7ca027eba69a808ac93d04

        SHA1

        b5ebc34891fd699a0bd83474b782afa11759025d

        SHA256

        b47d4970f726dad8fdfde1ffcfdce2c615dae0042ec1daffb9d195545665016d

        SHA512

        82ecfb45ebdf6dc97d4b54d7eb810abfb2c5e4f24fa9cd9a0493b5994149bb5dbc39aafbdebacc9628d838ace23cc357f76f7ff1c4a0a4bf465a78ac94c932ba

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6463.exe

        Filesize

        318KB

        MD5

        73465532fc7ca027eba69a808ac93d04

        SHA1

        b5ebc34891fd699a0bd83474b782afa11759025d

        SHA256

        b47d4970f726dad8fdfde1ffcfdce2c615dae0042ec1daffb9d195545665016d

        SHA512

        82ecfb45ebdf6dc97d4b54d7eb810abfb2c5e4f24fa9cd9a0493b5994149bb5dbc39aafbdebacc9628d838ace23cc357f76f7ff1c4a0a4bf465a78ac94c932ba

      • memory/4000-148-0x0000000000720000-0x000000000074D000-memory.dmp

        Filesize

        180KB

      • memory/4000-149-0x0000000004C30000-0x00000000051D4000-memory.dmp

        Filesize

        5.6MB

      • memory/4000-150-0x0000000002290000-0x00000000022A0000-memory.dmp

        Filesize

        64KB

      • memory/4000-151-0x0000000002290000-0x00000000022A0000-memory.dmp

        Filesize

        64KB

      • memory/4000-152-0x0000000002290000-0x00000000022A0000-memory.dmp

        Filesize

        64KB

      • memory/4000-153-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4000-154-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4000-156-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4000-158-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4000-160-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4000-162-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4000-164-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4000-166-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4000-168-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4000-170-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4000-172-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4000-174-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4000-176-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4000-178-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4000-180-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4000-181-0x0000000000400000-0x00000000004B1000-memory.dmp

        Filesize

        708KB

      • memory/4000-182-0x0000000002290000-0x00000000022A0000-memory.dmp

        Filesize

        64KB

      • memory/4000-183-0x0000000002290000-0x00000000022A0000-memory.dmp

        Filesize

        64KB

      • memory/4000-184-0x0000000002290000-0x00000000022A0000-memory.dmp

        Filesize

        64KB

      • memory/4000-186-0x0000000000400000-0x00000000004B1000-memory.dmp

        Filesize

        708KB

      • memory/4420-191-0x0000000000750000-0x000000000079B000-memory.dmp

        Filesize

        300KB

      • memory/4420-192-0x0000000004BF0000-0x0000000004C00000-memory.dmp

        Filesize

        64KB

      • memory/4420-193-0x0000000004BF0000-0x0000000004C00000-memory.dmp

        Filesize

        64KB

      • memory/4420-194-0x0000000004BF0000-0x0000000004C00000-memory.dmp

        Filesize

        64KB

      • memory/4420-195-0x0000000004A90000-0x0000000004ACF000-memory.dmp

        Filesize

        252KB

      • memory/4420-196-0x0000000004A90000-0x0000000004ACF000-memory.dmp

        Filesize

        252KB

      • memory/4420-198-0x0000000004A90000-0x0000000004ACF000-memory.dmp

        Filesize

        252KB

      • memory/4420-200-0x0000000004A90000-0x0000000004ACF000-memory.dmp

        Filesize

        252KB

      • memory/4420-202-0x0000000004A90000-0x0000000004ACF000-memory.dmp

        Filesize

        252KB

      • memory/4420-204-0x0000000004A90000-0x0000000004ACF000-memory.dmp

        Filesize

        252KB

      • memory/4420-206-0x0000000004A90000-0x0000000004ACF000-memory.dmp

        Filesize

        252KB

      • memory/4420-208-0x0000000004A90000-0x0000000004ACF000-memory.dmp

        Filesize

        252KB

      • memory/4420-210-0x0000000004A90000-0x0000000004ACF000-memory.dmp

        Filesize

        252KB

      • memory/4420-212-0x0000000004A90000-0x0000000004ACF000-memory.dmp

        Filesize

        252KB

      • memory/4420-214-0x0000000004A90000-0x0000000004ACF000-memory.dmp

        Filesize

        252KB

      • memory/4420-216-0x0000000004A90000-0x0000000004ACF000-memory.dmp

        Filesize

        252KB

      • memory/4420-218-0x0000000004A90000-0x0000000004ACF000-memory.dmp

        Filesize

        252KB

      • memory/4420-220-0x0000000004A90000-0x0000000004ACF000-memory.dmp

        Filesize

        252KB

      • memory/4420-222-0x0000000004A90000-0x0000000004ACF000-memory.dmp

        Filesize

        252KB

      • memory/4420-224-0x0000000004A90000-0x0000000004ACF000-memory.dmp

        Filesize

        252KB

      • memory/4420-226-0x0000000004A90000-0x0000000004ACF000-memory.dmp

        Filesize

        252KB

      • memory/4420-228-0x0000000004A90000-0x0000000004ACF000-memory.dmp

        Filesize

        252KB

      • memory/4420-1101-0x00000000051B0000-0x00000000057C8000-memory.dmp

        Filesize

        6.1MB

      • memory/4420-1102-0x00000000057D0000-0x00000000058DA000-memory.dmp

        Filesize

        1.0MB

      • memory/4420-1103-0x0000000004BB0000-0x0000000004BC2000-memory.dmp

        Filesize

        72KB

      • memory/4420-1104-0x00000000058E0000-0x000000000591C000-memory.dmp

        Filesize

        240KB

      • memory/4420-1105-0x0000000004BF0000-0x0000000004C00000-memory.dmp

        Filesize

        64KB

      • memory/4420-1107-0x0000000004BF0000-0x0000000004C00000-memory.dmp

        Filesize

        64KB

      • memory/4420-1108-0x0000000004BF0000-0x0000000004C00000-memory.dmp

        Filesize

        64KB

      • memory/4420-1109-0x0000000004BF0000-0x0000000004C00000-memory.dmp

        Filesize

        64KB

      • memory/4420-1110-0x0000000005BB0000-0x0000000005C42000-memory.dmp

        Filesize

        584KB

      • memory/4420-1111-0x0000000005C50000-0x0000000005CB6000-memory.dmp

        Filesize

        408KB

      • memory/4420-1112-0x0000000006370000-0x0000000006532000-memory.dmp

        Filesize

        1.8MB

      • memory/4420-1113-0x0000000006540000-0x0000000006A6C000-memory.dmp

        Filesize

        5.2MB

      • memory/4420-1114-0x0000000004BF0000-0x0000000004C00000-memory.dmp

        Filesize

        64KB

      • memory/4420-1116-0x0000000006E00000-0x0000000006E76000-memory.dmp

        Filesize

        472KB

      • memory/4420-1117-0x0000000006E80000-0x0000000006ED0000-memory.dmp

        Filesize

        320KB

      • memory/4980-1123-0x00000000004A0000-0x00000000004D2000-memory.dmp

        Filesize

        200KB

      • memory/4980-1124-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB

      • memory/4980-1125-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB