Analysis

  • max time kernel
    77s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 19:24

General

  • Target

    d2792d886db75b7e52386697950aa367f9bba1f3b0c5a20b8cef723bf942b955.exe

  • Size

    674KB

  • MD5

    ac8938770b8acd1a61f7c40c6d5bdf46

  • SHA1

    7be9e516ed176387aa0e3b301b0506f6ec969189

  • SHA256

    d2792d886db75b7e52386697950aa367f9bba1f3b0c5a20b8cef723bf942b955

  • SHA512

    212b41227ecafc0b5ef023bec9afa8d9202d48d266ac6ef5a7f780057406926a92d41fc110818f581a61b487afbe48292d67531039dae5b1b63a9ccf77ee3027

  • SSDEEP

    12288:3Mrzy90p+UyjxpSma2RHV1N9m5EHlCgFG/pedaObirQmLAIFaGlUJqn:0ykVeJa011N9AEHYgFpfbTmAIm2

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d2792d886db75b7e52386697950aa367f9bba1f3b0c5a20b8cef723bf942b955.exe
    "C:\Users\Admin\AppData\Local\Temp\d2792d886db75b7e52386697950aa367f9bba1f3b0c5a20b8cef723bf942b955.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4432
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un907825.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un907825.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4268
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8793.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8793.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4164
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4164 -s 1080
          4⤵
          • Program crash
          PID:376
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5146.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5146.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:100
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 100 -s 1540
          4⤵
          • Program crash
          PID:4876
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si039919.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si039919.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4840
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 4164 -ip 4164
    1⤵
      PID:5036
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 100 -ip 100
      1⤵
        PID:5072

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si039919.exe
        Filesize

        175KB

        MD5

        55d3c8d73eb0b22fafde5ddba108e56c

        SHA1

        87e45459aa6cad9824b4cd0c07ba2743d22ff6a0

        SHA256

        7c5c106c47865c5478a989cac8f0cc87d24e0cbec33043696a15b8e8cde787f7

        SHA512

        e36b415b9909cfc6ea6e2d5d84e13ffba860b573f354721588b055095af1064d87b9f0a4b9e184ee842a48240f89c637045252f147886d348086ada81ad99d5e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si039919.exe
        Filesize

        175KB

        MD5

        55d3c8d73eb0b22fafde5ddba108e56c

        SHA1

        87e45459aa6cad9824b4cd0c07ba2743d22ff6a0

        SHA256

        7c5c106c47865c5478a989cac8f0cc87d24e0cbec33043696a15b8e8cde787f7

        SHA512

        e36b415b9909cfc6ea6e2d5d84e13ffba860b573f354721588b055095af1064d87b9f0a4b9e184ee842a48240f89c637045252f147886d348086ada81ad99d5e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un907825.exe
        Filesize

        531KB

        MD5

        fe5f856f624569e84176b595545b64f9

        SHA1

        ce1d2abfe95f9ecf8ee79fad9a0f22737fcc84e9

        SHA256

        a447e8857563a900e806a2aad65d1ca22b82a2e88bd71497e3e25f68b4ee0fb0

        SHA512

        1e667cf770bdce5df59a06ec67b8f785a275cbfd4c84b493ac775006e423a309e3acb3b2f616344501be206f6c52ec0fd8ba8c0ee614dfbca8c3709176802681

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un907825.exe
        Filesize

        531KB

        MD5

        fe5f856f624569e84176b595545b64f9

        SHA1

        ce1d2abfe95f9ecf8ee79fad9a0f22737fcc84e9

        SHA256

        a447e8857563a900e806a2aad65d1ca22b82a2e88bd71497e3e25f68b4ee0fb0

        SHA512

        1e667cf770bdce5df59a06ec67b8f785a275cbfd4c84b493ac775006e423a309e3acb3b2f616344501be206f6c52ec0fd8ba8c0ee614dfbca8c3709176802681

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8793.exe
        Filesize

        260KB

        MD5

        9c847bdfcedf23deff7887a8ebc37a60

        SHA1

        ffd6244fbfbb385cb9687ef0b3c2c46c3000681f

        SHA256

        9fa800319c99934ac7b625d861415723506bf8d301469621fb0c247b6dde0aab

        SHA512

        7123f011d9c0dca09d41d1742f00526a8e5d1223f20f7fd53ef2d68475f6f1187f41cf6513d8fd6d23f5aec3236570e42f71ef613c74a573311407307908a0c8

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8793.exe
        Filesize

        260KB

        MD5

        9c847bdfcedf23deff7887a8ebc37a60

        SHA1

        ffd6244fbfbb385cb9687ef0b3c2c46c3000681f

        SHA256

        9fa800319c99934ac7b625d861415723506bf8d301469621fb0c247b6dde0aab

        SHA512

        7123f011d9c0dca09d41d1742f00526a8e5d1223f20f7fd53ef2d68475f6f1187f41cf6513d8fd6d23f5aec3236570e42f71ef613c74a573311407307908a0c8

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5146.exe
        Filesize

        318KB

        MD5

        4a91ab80821fa2c9801dc6e6aa8dbf36

        SHA1

        fe342a3c861c81ecb953b640229431a32bf8e33c

        SHA256

        8924155a66771ef4f7c57478262d4e0d3f22117319b88e08d0b272671cfba7f6

        SHA512

        349665143d33f1299e984a76fc633861967af840d03d3537b4451e40f1f8320d2b6b396e931773e8edf719e9c7add035531c37b9320e0fa145c206992fe0a091

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5146.exe
        Filesize

        318KB

        MD5

        4a91ab80821fa2c9801dc6e6aa8dbf36

        SHA1

        fe342a3c861c81ecb953b640229431a32bf8e33c

        SHA256

        8924155a66771ef4f7c57478262d4e0d3f22117319b88e08d0b272671cfba7f6

        SHA512

        349665143d33f1299e984a76fc633861967af840d03d3537b4451e40f1f8320d2b6b396e931773e8edf719e9c7add035531c37b9320e0fa145c206992fe0a091

      • memory/100-1102-0x00000000058D0000-0x00000000059DA000-memory.dmp
        Filesize

        1.0MB

      • memory/100-226-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
        Filesize

        252KB

      • memory/100-203-0x0000000004BF0000-0x0000000004C00000-memory.dmp
        Filesize

        64KB

      • memory/100-200-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
        Filesize

        252KB

      • memory/100-1115-0x0000000006E00000-0x0000000006E76000-memory.dmp
        Filesize

        472KB

      • memory/100-1114-0x0000000004BF0000-0x0000000004C00000-memory.dmp
        Filesize

        64KB

      • memory/100-1113-0x0000000004BF0000-0x0000000004C00000-memory.dmp
        Filesize

        64KB

      • memory/100-1112-0x0000000004BF0000-0x0000000004C00000-memory.dmp
        Filesize

        64KB

      • memory/100-1111-0x0000000004BF0000-0x0000000004C00000-memory.dmp
        Filesize

        64KB

      • memory/100-1110-0x0000000006680000-0x0000000006BAC000-memory.dmp
        Filesize

        5.2MB

      • memory/100-204-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
        Filesize

        252KB

      • memory/100-1109-0x00000000064B0000-0x0000000006672000-memory.dmp
        Filesize

        1.8MB

      • memory/100-1108-0x00000000063B0000-0x0000000006442000-memory.dmp
        Filesize

        584KB

      • memory/100-1106-0x0000000005CF0000-0x0000000005D56000-memory.dmp
        Filesize

        408KB

      • memory/100-1105-0x0000000004BF0000-0x0000000004C00000-memory.dmp
        Filesize

        64KB

      • memory/100-1104-0x0000000005A00000-0x0000000005A3C000-memory.dmp
        Filesize

        240KB

      • memory/100-1103-0x00000000059E0000-0x00000000059F2000-memory.dmp
        Filesize

        72KB

      • memory/100-1101-0x00000000052B0000-0x00000000058C8000-memory.dmp
        Filesize

        6.1MB

      • memory/100-228-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
        Filesize

        252KB

      • memory/100-214-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
        Filesize

        252KB

      • memory/100-224-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
        Filesize

        252KB

      • memory/100-222-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
        Filesize

        252KB

      • memory/100-220-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
        Filesize

        252KB

      • memory/100-192-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
        Filesize

        252KB

      • memory/100-191-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
        Filesize

        252KB

      • memory/100-194-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
        Filesize

        252KB

      • memory/100-196-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
        Filesize

        252KB

      • memory/100-198-0x0000000000610000-0x000000000065B000-memory.dmp
        Filesize

        300KB

      • memory/100-199-0x0000000004BF0000-0x0000000004C00000-memory.dmp
        Filesize

        64KB

      • memory/100-201-0x0000000004BF0000-0x0000000004C00000-memory.dmp
        Filesize

        64KB

      • memory/100-218-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
        Filesize

        252KB

      • memory/100-1116-0x0000000006E80000-0x0000000006ED0000-memory.dmp
        Filesize

        320KB

      • memory/100-216-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
        Filesize

        252KB

      • memory/100-206-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
        Filesize

        252KB

      • memory/100-208-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
        Filesize

        252KB

      • memory/100-210-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
        Filesize

        252KB

      • memory/100-212-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
        Filesize

        252KB

      • memory/4164-181-0x0000000000400000-0x00000000004B1000-memory.dmp
        Filesize

        708KB

      • memory/4164-174-0x00000000026E0000-0x00000000026F2000-memory.dmp
        Filesize

        72KB

      • memory/4164-148-0x0000000004A70000-0x0000000005014000-memory.dmp
        Filesize

        5.6MB

      • memory/4164-152-0x00000000026E0000-0x00000000026F2000-memory.dmp
        Filesize

        72KB

      • memory/4164-154-0x00000000026E0000-0x00000000026F2000-memory.dmp
        Filesize

        72KB

      • memory/4164-186-0x0000000000400000-0x00000000004B1000-memory.dmp
        Filesize

        708KB

      • memory/4164-185-0x00000000026D0000-0x00000000026E0000-memory.dmp
        Filesize

        64KB

      • memory/4164-184-0x00000000026D0000-0x00000000026E0000-memory.dmp
        Filesize

        64KB

      • memory/4164-183-0x00000000026D0000-0x00000000026E0000-memory.dmp
        Filesize

        64KB

      • memory/4164-150-0x00000000026E0000-0x00000000026F2000-memory.dmp
        Filesize

        72KB

      • memory/4164-156-0x00000000026E0000-0x00000000026F2000-memory.dmp
        Filesize

        72KB

      • memory/4164-180-0x00000000026D0000-0x00000000026E0000-memory.dmp
        Filesize

        64KB

      • memory/4164-179-0x00000000026D0000-0x00000000026E0000-memory.dmp
        Filesize

        64KB

      • memory/4164-178-0x00000000026D0000-0x00000000026E0000-memory.dmp
        Filesize

        64KB

      • memory/4164-177-0x0000000000620000-0x000000000064D000-memory.dmp
        Filesize

        180KB

      • memory/4164-176-0x00000000026E0000-0x00000000026F2000-memory.dmp
        Filesize

        72KB

      • memory/4164-172-0x00000000026E0000-0x00000000026F2000-memory.dmp
        Filesize

        72KB

      • memory/4164-170-0x00000000026E0000-0x00000000026F2000-memory.dmp
        Filesize

        72KB

      • memory/4164-168-0x00000000026E0000-0x00000000026F2000-memory.dmp
        Filesize

        72KB

      • memory/4164-164-0x00000000026E0000-0x00000000026F2000-memory.dmp
        Filesize

        72KB

      • memory/4164-166-0x00000000026E0000-0x00000000026F2000-memory.dmp
        Filesize

        72KB

      • memory/4164-162-0x00000000026E0000-0x00000000026F2000-memory.dmp
        Filesize

        72KB

      • memory/4164-160-0x00000000026E0000-0x00000000026F2000-memory.dmp
        Filesize

        72KB

      • memory/4164-149-0x00000000026E0000-0x00000000026F2000-memory.dmp
        Filesize

        72KB

      • memory/4164-158-0x00000000026E0000-0x00000000026F2000-memory.dmp
        Filesize

        72KB

      • memory/4840-1122-0x0000000000D90000-0x0000000000DC2000-memory.dmp
        Filesize

        200KB

      • memory/4840-1123-0x0000000005670000-0x0000000005680000-memory.dmp
        Filesize

        64KB