Analysis

  • max time kernel
    162s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 18:57

General

  • Target

    8a8c1813425751504c9c3d26ef48a632fff51bac39b6168bcf061cc9316f57d4.exe

  • Size

    672KB

  • MD5

    f81427d510f2077ff5d2ad4ce3ad79e7

  • SHA1

    642148b9e67539027bec0d97a4095e5b07a4ff3f

  • SHA256

    8a8c1813425751504c9c3d26ef48a632fff51bac39b6168bcf061cc9316f57d4

  • SHA512

    2301454e7cedfaa03afa37971850539c16359b64b83b97df99c5815bbcfd592e9c21b78ce258cd660c7092e1fb42df5f653a03d83dce4b3d84865faf46f63d2f

  • SSDEEP

    12288:JMrzy90RkWWhjngnMDM9yDFM+39r+p6dcD//O/A+8SVWet:+ykhWluMDM9yDShgA+hBt

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a8c1813425751504c9c3d26ef48a632fff51bac39b6168bcf061cc9316f57d4.exe
    "C:\Users\Admin\AppData\Local\Temp\8a8c1813425751504c9c3d26ef48a632fff51bac39b6168bcf061cc9316f57d4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un569904.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un569904.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:688
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5616.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5616.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1268
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1268 -s 1080
          4⤵
          • Program crash
          PID:796
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5914.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5914.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3848
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3848 -s 1140
          4⤵
          • Program crash
          PID:3180
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si065778.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si065778.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1348
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1268 -ip 1268
    1⤵
      PID:2220
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3848 -ip 3848
      1⤵
        PID:3692

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si065778.exe
        Filesize

        175KB

        MD5

        53b29bf6cd15a89725f155024d266ad5

        SHA1

        4c47fdf61f41d2067062f1c5b95534684c4213d7

        SHA256

        264b42e06856ac6c4820deb9a6bdffb071a95927b2f55664c78c9c92655c7fbe

        SHA512

        d25ab8c437d70d19947725cdbe7b883d9c6e610c9d3b3f61da9ac34648162942ed99bb8e1b93f02ca60eb120b640bde20b13e4c74edb0ed3a28d66858c7f52cf

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si065778.exe
        Filesize

        175KB

        MD5

        53b29bf6cd15a89725f155024d266ad5

        SHA1

        4c47fdf61f41d2067062f1c5b95534684c4213d7

        SHA256

        264b42e06856ac6c4820deb9a6bdffb071a95927b2f55664c78c9c92655c7fbe

        SHA512

        d25ab8c437d70d19947725cdbe7b883d9c6e610c9d3b3f61da9ac34648162942ed99bb8e1b93f02ca60eb120b640bde20b13e4c74edb0ed3a28d66858c7f52cf

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un569904.exe
        Filesize

        530KB

        MD5

        566a26e3da7da44d83e2831d3d896389

        SHA1

        2d2d3f827e4007c5849a8a051b9d390cf8e5023c

        SHA256

        0ec48ac844b16565af8cf04ae691b2bdd209dc4c716f8b2b6fc72163bdfb29f0

        SHA512

        3a3f88fd7f25992c9e79036d8daedc77119bfd909da9da0c8d70401dd0804c2ae05dda53456e6f99395c1aba6ca9a123483101415ca32da794a56eed177c721a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un569904.exe
        Filesize

        530KB

        MD5

        566a26e3da7da44d83e2831d3d896389

        SHA1

        2d2d3f827e4007c5849a8a051b9d390cf8e5023c

        SHA256

        0ec48ac844b16565af8cf04ae691b2bdd209dc4c716f8b2b6fc72163bdfb29f0

        SHA512

        3a3f88fd7f25992c9e79036d8daedc77119bfd909da9da0c8d70401dd0804c2ae05dda53456e6f99395c1aba6ca9a123483101415ca32da794a56eed177c721a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5616.exe
        Filesize

        259KB

        MD5

        3e205245b5adb03d4a7d97575d24fc8d

        SHA1

        e240dc6586a203afcc14fe558d0a1cc77a61d80d

        SHA256

        4b1b69a09f592b9523791712b7c3cbd573d815ea0ecf9f28851c5eefe8a4c834

        SHA512

        aa6d443fef5ed5e950f96f5805a05700e9b7103e52e8b56356c8baa94855b4e09aa27396241a84ac56ff3b9e0a4fb83882de941774f3e5652fc6b9e83fd7422e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5616.exe
        Filesize

        259KB

        MD5

        3e205245b5adb03d4a7d97575d24fc8d

        SHA1

        e240dc6586a203afcc14fe558d0a1cc77a61d80d

        SHA256

        4b1b69a09f592b9523791712b7c3cbd573d815ea0ecf9f28851c5eefe8a4c834

        SHA512

        aa6d443fef5ed5e950f96f5805a05700e9b7103e52e8b56356c8baa94855b4e09aa27396241a84ac56ff3b9e0a4fb83882de941774f3e5652fc6b9e83fd7422e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5914.exe
        Filesize

        318KB

        MD5

        0b516ccd87529f009d82148b0458eb5e

        SHA1

        83c1b79efa636f91ea9d8bb3527cda9271a959c3

        SHA256

        3837a3fa640c79c3eb46965b66fb2d312a4f7902745bc55891bcf2155f0cb4d2

        SHA512

        a797c1ae321b0e56f96c1113141227ac7f2f5c68d29815d531135bb413985bbb61bdda1dadf226659359f9ade0df56e96bda6744571d4a9f299e0bb7034f7186

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5914.exe
        Filesize

        318KB

        MD5

        0b516ccd87529f009d82148b0458eb5e

        SHA1

        83c1b79efa636f91ea9d8bb3527cda9271a959c3

        SHA256

        3837a3fa640c79c3eb46965b66fb2d312a4f7902745bc55891bcf2155f0cb4d2

        SHA512

        a797c1ae321b0e56f96c1113141227ac7f2f5c68d29815d531135bb413985bbb61bdda1dadf226659359f9ade0df56e96bda6744571d4a9f299e0bb7034f7186

      • memory/1268-163-0x00000000024D0000-0x00000000024E2000-memory.dmp
        Filesize

        72KB

      • memory/1268-165-0x0000000004CB0000-0x0000000004CC0000-memory.dmp
        Filesize

        64KB

      • memory/1268-150-0x00000000024D0000-0x00000000024E2000-memory.dmp
        Filesize

        72KB

      • memory/1268-151-0x00000000024D0000-0x00000000024E2000-memory.dmp
        Filesize

        72KB

      • memory/1268-155-0x00000000024D0000-0x00000000024E2000-memory.dmp
        Filesize

        72KB

      • memory/1268-153-0x00000000024D0000-0x00000000024E2000-memory.dmp
        Filesize

        72KB

      • memory/1268-157-0x00000000024D0000-0x00000000024E2000-memory.dmp
        Filesize

        72KB

      • memory/1268-159-0x00000000024D0000-0x00000000024E2000-memory.dmp
        Filesize

        72KB

      • memory/1268-161-0x00000000024D0000-0x00000000024E2000-memory.dmp
        Filesize

        72KB

      • memory/1268-164-0x0000000004CB0000-0x0000000004CC0000-memory.dmp
        Filesize

        64KB

      • memory/1268-148-0x0000000000630000-0x000000000065D000-memory.dmp
        Filesize

        180KB

      • memory/1268-168-0x0000000004CB0000-0x0000000004CC0000-memory.dmp
        Filesize

        64KB

      • memory/1268-167-0x00000000024D0000-0x00000000024E2000-memory.dmp
        Filesize

        72KB

      • memory/1268-149-0x0000000004CC0000-0x0000000005264000-memory.dmp
        Filesize

        5.6MB

      • memory/1268-170-0x00000000024D0000-0x00000000024E2000-memory.dmp
        Filesize

        72KB

      • memory/1268-172-0x00000000024D0000-0x00000000024E2000-memory.dmp
        Filesize

        72KB

      • memory/1268-174-0x00000000024D0000-0x00000000024E2000-memory.dmp
        Filesize

        72KB

      • memory/1268-176-0x00000000024D0000-0x00000000024E2000-memory.dmp
        Filesize

        72KB

      • memory/1268-178-0x00000000024D0000-0x00000000024E2000-memory.dmp
        Filesize

        72KB

      • memory/1268-180-0x00000000024D0000-0x00000000024E2000-memory.dmp
        Filesize

        72KB

      • memory/1268-181-0x0000000000400000-0x00000000004B1000-memory.dmp
        Filesize

        708KB

      • memory/1268-182-0x0000000000630000-0x000000000065D000-memory.dmp
        Filesize

        180KB

      • memory/1268-183-0x0000000004CB0000-0x0000000004CC0000-memory.dmp
        Filesize

        64KB

      • memory/1268-184-0x0000000004CB0000-0x0000000004CC0000-memory.dmp
        Filesize

        64KB

      • memory/1268-187-0x0000000000400000-0x00000000004B1000-memory.dmp
        Filesize

        708KB

      • memory/1348-1127-0x00000000051A0000-0x00000000051B0000-memory.dmp
        Filesize

        64KB

      • memory/1348-1126-0x00000000051A0000-0x00000000051B0000-memory.dmp
        Filesize

        64KB

      • memory/1348-1125-0x0000000000900000-0x0000000000932000-memory.dmp
        Filesize

        200KB

      • memory/3848-197-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/3848-199-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/3848-201-0x0000000002140000-0x000000000218B000-memory.dmp
        Filesize

        300KB

      • memory/3848-202-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/3848-203-0x0000000004D00000-0x0000000004D10000-memory.dmp
        Filesize

        64KB

      • memory/3848-206-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/3848-205-0x0000000004D00000-0x0000000004D10000-memory.dmp
        Filesize

        64KB

      • memory/3848-209-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/3848-207-0x0000000004D00000-0x0000000004D10000-memory.dmp
        Filesize

        64KB

      • memory/3848-211-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/3848-213-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/3848-215-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/3848-217-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/3848-219-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/3848-221-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/3848-223-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/3848-225-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/3848-227-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/3848-1102-0x00000000052C0000-0x00000000058D8000-memory.dmp
        Filesize

        6.1MB

      • memory/3848-1103-0x0000000004B90000-0x0000000004C9A000-memory.dmp
        Filesize

        1.0MB

      • memory/3848-1104-0x0000000004CC0000-0x0000000004CD2000-memory.dmp
        Filesize

        72KB

      • memory/3848-1105-0x00000000058E0000-0x000000000591C000-memory.dmp
        Filesize

        240KB

      • memory/3848-1106-0x0000000004D00000-0x0000000004D10000-memory.dmp
        Filesize

        64KB

      • memory/3848-1108-0x0000000004D00000-0x0000000004D10000-memory.dmp
        Filesize

        64KB

      • memory/3848-1109-0x0000000004D00000-0x0000000004D10000-memory.dmp
        Filesize

        64KB

      • memory/3848-1110-0x0000000004D00000-0x0000000004D10000-memory.dmp
        Filesize

        64KB

      • memory/3848-1111-0x0000000005BB0000-0x0000000005C42000-memory.dmp
        Filesize

        584KB

      • memory/3848-1112-0x0000000005C50000-0x0000000005CB6000-memory.dmp
        Filesize

        408KB

      • memory/3848-1113-0x00000000064B0000-0x0000000006672000-memory.dmp
        Filesize

        1.8MB

      • memory/3848-1114-0x0000000006680000-0x0000000006BAC000-memory.dmp
        Filesize

        5.2MB

      • memory/3848-1115-0x0000000004D00000-0x0000000004D10000-memory.dmp
        Filesize

        64KB

      • memory/3848-195-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/3848-193-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/3848-192-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/3848-1117-0x0000000002220000-0x0000000002296000-memory.dmp
        Filesize

        472KB

      • memory/3848-1118-0x00000000080B0000-0x0000000008100000-memory.dmp
        Filesize

        320KB