Analysis

  • max time kernel
    73s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 18:50

General

  • Target

    c7410e282766047e29fb13aacc7a1d9b64d53c7d1b21688b21ddc1a1245f9c65.exe

  • Size

    672KB

  • MD5

    b04607a555d74241c07cca2ea7d00a38

  • SHA1

    f8f1d2c6ab2cbb23ffe93c330a4d6d56142b95ea

  • SHA256

    c7410e282766047e29fb13aacc7a1d9b64d53c7d1b21688b21ddc1a1245f9c65

  • SHA512

    60a387bcd30bb8d063ccdc7166e6f6cf525f07a1f40811313841448a290b739605c2bb39c07b89d0efa87b090b4010dace2b206f2097006758066244775a605e

  • SSDEEP

    12288:+Mr2y902Tm0qWFfezkiBOva0Bvtl3gfJrlLRvomHZ+Y+gTepcgfWFR:UyZTm0qW93y2tFOJToRZHerFR

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c7410e282766047e29fb13aacc7a1d9b64d53c7d1b21688b21ddc1a1245f9c65.exe
    "C:\Users\Admin\AppData\Local\Temp\c7410e282766047e29fb13aacc7a1d9b64d53c7d1b21688b21ddc1a1245f9c65.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2588
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un005820.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un005820.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3812
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7574.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7574.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1536
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1536 -s 1016
          4⤵
          • Program crash
          PID:4516
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6334.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6334.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4448
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4448 -s 1348
          4⤵
          • Program crash
          PID:3208
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si178107.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si178107.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1264
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1536 -ip 1536
    1⤵
      PID:3432
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4448 -ip 4448
      1⤵
        PID:2236

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si178107.exe
        Filesize

        175KB

        MD5

        2402645dede6df928dbbf3b81022d70d

        SHA1

        328e6276540226298811b0252aa42f691760f272

        SHA256

        0aed50e901d419fa0f195774b83b6dc384715eb2cd83a92a94e1aae0e624d5b4

        SHA512

        5db0b6fe01112623948ec74218f7d5cadd91220bf09954699f9d6b098caeda6659093157d8cc42559b476bac114820e3fbf7205d55b457d548ef65aba9437a69

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si178107.exe
        Filesize

        175KB

        MD5

        2402645dede6df928dbbf3b81022d70d

        SHA1

        328e6276540226298811b0252aa42f691760f272

        SHA256

        0aed50e901d419fa0f195774b83b6dc384715eb2cd83a92a94e1aae0e624d5b4

        SHA512

        5db0b6fe01112623948ec74218f7d5cadd91220bf09954699f9d6b098caeda6659093157d8cc42559b476bac114820e3fbf7205d55b457d548ef65aba9437a69

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un005820.exe
        Filesize

        530KB

        MD5

        37a164a63bc92f518600ec43f29ee20a

        SHA1

        e572e964bd964f5eddf4dbcf36ab63000f3c4fea

        SHA256

        5eefc059024f6a75110781234f86d49cc2821074f4b1c229622d0060cd4951f0

        SHA512

        d23441db75a7057633aeb540a156841876358a68737d1a0218ca7d893d9f456f2de40f2a30880cc08670e9d7a14337c23528376c14d8bfc5542f868c89a0724b

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un005820.exe
        Filesize

        530KB

        MD5

        37a164a63bc92f518600ec43f29ee20a

        SHA1

        e572e964bd964f5eddf4dbcf36ab63000f3c4fea

        SHA256

        5eefc059024f6a75110781234f86d49cc2821074f4b1c229622d0060cd4951f0

        SHA512

        d23441db75a7057633aeb540a156841876358a68737d1a0218ca7d893d9f456f2de40f2a30880cc08670e9d7a14337c23528376c14d8bfc5542f868c89a0724b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7574.exe
        Filesize

        259KB

        MD5

        ebcd987b0e1ab4c25da396cdb381b82a

        SHA1

        47c13658dd990867386189becd661854a562667d

        SHA256

        8a18185da9fc218719dfd595938c1f773145977a1b216f6a8a0f3e5ebe4d09e0

        SHA512

        ead39e7a527f69902168dcf7003fbd99ded2e8b965b169d87f43f70845b653d46d37b1130e70edfaf77fe3cca4a1d49481c26efec35b47233002899a90f26bf3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7574.exe
        Filesize

        259KB

        MD5

        ebcd987b0e1ab4c25da396cdb381b82a

        SHA1

        47c13658dd990867386189becd661854a562667d

        SHA256

        8a18185da9fc218719dfd595938c1f773145977a1b216f6a8a0f3e5ebe4d09e0

        SHA512

        ead39e7a527f69902168dcf7003fbd99ded2e8b965b169d87f43f70845b653d46d37b1130e70edfaf77fe3cca4a1d49481c26efec35b47233002899a90f26bf3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6334.exe
        Filesize

        318KB

        MD5

        c2ac0d2b33fb37812fb506641eee3507

        SHA1

        583bcb94c87fe29630da330ff6bd7ec73c035364

        SHA256

        558e3a39984dbe2fadc7415f458c6b34a37e9a2f4261e7fd3aafc2995a3f1933

        SHA512

        7ec2508dc7b78010ae2063deffe65cf0f5e08168d719883c00150f8ff9959c297ff99ad628c185407d2694b93607a0fc5f6fe8f31e8147b2681c2f2087ab811c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6334.exe
        Filesize

        318KB

        MD5

        c2ac0d2b33fb37812fb506641eee3507

        SHA1

        583bcb94c87fe29630da330ff6bd7ec73c035364

        SHA256

        558e3a39984dbe2fadc7415f458c6b34a37e9a2f4261e7fd3aafc2995a3f1933

        SHA512

        7ec2508dc7b78010ae2063deffe65cf0f5e08168d719883c00150f8ff9959c297ff99ad628c185407d2694b93607a0fc5f6fe8f31e8147b2681c2f2087ab811c

      • memory/1264-1121-0x00000000009D0000-0x0000000000A02000-memory.dmp
        Filesize

        200KB

      • memory/1264-1122-0x0000000005320000-0x0000000005330000-memory.dmp
        Filesize

        64KB

      • memory/1536-157-0x0000000002600000-0x0000000002612000-memory.dmp
        Filesize

        72KB

      • memory/1536-167-0x0000000002600000-0x0000000002612000-memory.dmp
        Filesize

        72KB

      • memory/1536-151-0x0000000002630000-0x0000000002640000-memory.dmp
        Filesize

        64KB

      • memory/1536-152-0x0000000002600000-0x0000000002612000-memory.dmp
        Filesize

        72KB

      • memory/1536-153-0x0000000002600000-0x0000000002612000-memory.dmp
        Filesize

        72KB

      • memory/1536-155-0x0000000002600000-0x0000000002612000-memory.dmp
        Filesize

        72KB

      • memory/1536-149-0x0000000000640000-0x000000000066D000-memory.dmp
        Filesize

        180KB

      • memory/1536-159-0x0000000002600000-0x0000000002612000-memory.dmp
        Filesize

        72KB

      • memory/1536-161-0x0000000002600000-0x0000000002612000-memory.dmp
        Filesize

        72KB

      • memory/1536-163-0x0000000002600000-0x0000000002612000-memory.dmp
        Filesize

        72KB

      • memory/1536-165-0x0000000002600000-0x0000000002612000-memory.dmp
        Filesize

        72KB

      • memory/1536-150-0x0000000002630000-0x0000000002640000-memory.dmp
        Filesize

        64KB

      • memory/1536-169-0x0000000002600000-0x0000000002612000-memory.dmp
        Filesize

        72KB

      • memory/1536-171-0x0000000002600000-0x0000000002612000-memory.dmp
        Filesize

        72KB

      • memory/1536-173-0x0000000002600000-0x0000000002612000-memory.dmp
        Filesize

        72KB

      • memory/1536-175-0x0000000002600000-0x0000000002612000-memory.dmp
        Filesize

        72KB

      • memory/1536-177-0x0000000002600000-0x0000000002612000-memory.dmp
        Filesize

        72KB

      • memory/1536-179-0x0000000002600000-0x0000000002612000-memory.dmp
        Filesize

        72KB

      • memory/1536-180-0x0000000000400000-0x00000000004B1000-memory.dmp
        Filesize

        708KB

      • memory/1536-181-0x0000000002630000-0x0000000002640000-memory.dmp
        Filesize

        64KB

      • memory/1536-182-0x0000000002630000-0x0000000002640000-memory.dmp
        Filesize

        64KB

      • memory/1536-183-0x0000000002630000-0x0000000002640000-memory.dmp
        Filesize

        64KB

      • memory/1536-185-0x0000000000400000-0x00000000004B1000-memory.dmp
        Filesize

        708KB

      • memory/1536-148-0x0000000004CB0000-0x0000000005254000-memory.dmp
        Filesize

        5.6MB

      • memory/4448-190-0x0000000002710000-0x000000000274F000-memory.dmp
        Filesize

        252KB

      • memory/4448-225-0x0000000002710000-0x000000000274F000-memory.dmp
        Filesize

        252KB

      • memory/4448-196-0x0000000000650000-0x000000000069B000-memory.dmp
        Filesize

        300KB

      • memory/4448-198-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
        Filesize

        64KB

      • memory/4448-195-0x0000000002710000-0x000000000274F000-memory.dmp
        Filesize

        252KB

      • memory/4448-199-0x0000000002710000-0x000000000274F000-memory.dmp
        Filesize

        252KB

      • memory/4448-202-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
        Filesize

        64KB

      • memory/4448-200-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
        Filesize

        64KB

      • memory/4448-203-0x0000000002710000-0x000000000274F000-memory.dmp
        Filesize

        252KB

      • memory/4448-205-0x0000000002710000-0x000000000274F000-memory.dmp
        Filesize

        252KB

      • memory/4448-207-0x0000000002710000-0x000000000274F000-memory.dmp
        Filesize

        252KB

      • memory/4448-209-0x0000000002710000-0x000000000274F000-memory.dmp
        Filesize

        252KB

      • memory/4448-211-0x0000000002710000-0x000000000274F000-memory.dmp
        Filesize

        252KB

      • memory/4448-213-0x0000000002710000-0x000000000274F000-memory.dmp
        Filesize

        252KB

      • memory/4448-215-0x0000000002710000-0x000000000274F000-memory.dmp
        Filesize

        252KB

      • memory/4448-217-0x0000000002710000-0x000000000274F000-memory.dmp
        Filesize

        252KB

      • memory/4448-219-0x0000000002710000-0x000000000274F000-memory.dmp
        Filesize

        252KB

      • memory/4448-221-0x0000000002710000-0x000000000274F000-memory.dmp
        Filesize

        252KB

      • memory/4448-223-0x0000000002710000-0x000000000274F000-memory.dmp
        Filesize

        252KB

      • memory/4448-193-0x0000000002710000-0x000000000274F000-memory.dmp
        Filesize

        252KB

      • memory/4448-227-0x0000000002710000-0x000000000274F000-memory.dmp
        Filesize

        252KB

      • memory/4448-1100-0x0000000005260000-0x0000000005878000-memory.dmp
        Filesize

        6.1MB

      • memory/4448-1101-0x0000000004B80000-0x0000000004C8A000-memory.dmp
        Filesize

        1.0MB

      • memory/4448-1102-0x00000000058A0000-0x00000000058B2000-memory.dmp
        Filesize

        72KB

      • memory/4448-1103-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
        Filesize

        64KB

      • memory/4448-1104-0x00000000058C0000-0x00000000058FC000-memory.dmp
        Filesize

        240KB

      • memory/4448-1106-0x0000000005BB0000-0x0000000005C42000-memory.dmp
        Filesize

        584KB

      • memory/4448-1107-0x0000000005C50000-0x0000000005CB6000-memory.dmp
        Filesize

        408KB

      • memory/4448-1108-0x0000000006380000-0x0000000006542000-memory.dmp
        Filesize

        1.8MB

      • memory/4448-1109-0x0000000006550000-0x0000000006A7C000-memory.dmp
        Filesize

        5.2MB

      • memory/4448-1110-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
        Filesize

        64KB

      • memory/4448-1111-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
        Filesize

        64KB

      • memory/4448-1112-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
        Filesize

        64KB

      • memory/4448-191-0x0000000002710000-0x000000000274F000-memory.dmp
        Filesize

        252KB

      • memory/4448-1113-0x0000000006CF0000-0x0000000006D66000-memory.dmp
        Filesize

        472KB

      • memory/4448-1114-0x0000000006D70000-0x0000000006DC0000-memory.dmp
        Filesize

        320KB

      • memory/4448-1115-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
        Filesize

        64KB