Analysis

  • max time kernel
    149s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 19:04

General

  • Target

    cdff3471c086e7f8de28b07e073695e35a0cb164b3f84a39d51896f2f130ba69.exe

  • Size

    672KB

  • MD5

    99217ad71d80ff24d6aec8fd9afd4649

  • SHA1

    c45112566f0ad91daf683505020625b3238f5486

  • SHA256

    cdff3471c086e7f8de28b07e073695e35a0cb164b3f84a39d51896f2f130ba69

  • SHA512

    2c147072dd430dc9a1c4003c91a7df73125c504854e1a55b76cbd59ebffba53e0db208efbae2dad336c2789433c3e77329d570bcec3ac0cc59825ee4a795b820

  • SSDEEP

    12288:HMrry90l/DtmWs9xzNJNVMQyYMMsVOOQ8/9D//OOr+8SoKQzLgIN1zSX:kyitmDj7MQyYBsE6r+hKf+X

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cdff3471c086e7f8de28b07e073695e35a0cb164b3f84a39d51896f2f130ba69.exe
    "C:\Users\Admin\AppData\Local\Temp\cdff3471c086e7f8de28b07e073695e35a0cb164b3f84a39d51896f2f130ba69.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4932
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un610097.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un610097.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4040
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3689.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3689.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4236
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4236 -s 1044
          4⤵
          • Program crash
          PID:2272
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9203.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9203.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1436
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1436 -s 1672
          4⤵
          • Program crash
          PID:3004
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si272909.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si272909.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1596
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4236 -ip 4236
    1⤵
      PID:992
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 1436 -ip 1436
      1⤵
        PID:2748
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:1792

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si272909.exe
        Filesize

        175KB

        MD5

        e23b9002ff8625fa07b932a6ab389de5

        SHA1

        6261734867ddcd13af6f1ec185f934561da217c4

        SHA256

        25a204149837998411941c0ae9ee8dd2cef3fd2db6f3e147a797ffb03f2568ef

        SHA512

        a581acfbd9e6591c7af363c4342e00842b9302481fcd88db30d10eeeb926c0fe09add3d4a7b8b604a86ff709c1c968a8d0827531758c3eaeff546f171d0ce4fc

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si272909.exe
        Filesize

        175KB

        MD5

        e23b9002ff8625fa07b932a6ab389de5

        SHA1

        6261734867ddcd13af6f1ec185f934561da217c4

        SHA256

        25a204149837998411941c0ae9ee8dd2cef3fd2db6f3e147a797ffb03f2568ef

        SHA512

        a581acfbd9e6591c7af363c4342e00842b9302481fcd88db30d10eeeb926c0fe09add3d4a7b8b604a86ff709c1c968a8d0827531758c3eaeff546f171d0ce4fc

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un610097.exe
        Filesize

        530KB

        MD5

        f29d9dad767a8c7a6aeee65789856119

        SHA1

        f57bcf9d97b7c7a0e167512075a16015285c8d38

        SHA256

        185cf7b630f776f65320c526319c79dc2e955dea615529a50188fc11a9a069c3

        SHA512

        a4190f28d2c644b52758250e7bc01280aa2a16aee9f7b6e4ca283d140e3dfc507a1eabe2038292e18526a40ba6ab902b64368dced626d114bfb1d010a5c9438e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un610097.exe
        Filesize

        530KB

        MD5

        f29d9dad767a8c7a6aeee65789856119

        SHA1

        f57bcf9d97b7c7a0e167512075a16015285c8d38

        SHA256

        185cf7b630f776f65320c526319c79dc2e955dea615529a50188fc11a9a069c3

        SHA512

        a4190f28d2c644b52758250e7bc01280aa2a16aee9f7b6e4ca283d140e3dfc507a1eabe2038292e18526a40ba6ab902b64368dced626d114bfb1d010a5c9438e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3689.exe
        Filesize

        259KB

        MD5

        a2f1b451902a0d5d84367a632351f86f

        SHA1

        a00cec58770c716b89aa334f513bf16658b6b37f

        SHA256

        09572a8736bf6402ad9397ebe9cad0ada8c39b886b570d49b5457f9a2c304e1c

        SHA512

        f4e3133c43560f39a08d0f4f354ae08c6933cadd359a30894a88ddbcbc3ec6916921413536883903070d46aa9573dbeba11f065c4679dcd7a7a6825c42934213

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3689.exe
        Filesize

        259KB

        MD5

        a2f1b451902a0d5d84367a632351f86f

        SHA1

        a00cec58770c716b89aa334f513bf16658b6b37f

        SHA256

        09572a8736bf6402ad9397ebe9cad0ada8c39b886b570d49b5457f9a2c304e1c

        SHA512

        f4e3133c43560f39a08d0f4f354ae08c6933cadd359a30894a88ddbcbc3ec6916921413536883903070d46aa9573dbeba11f065c4679dcd7a7a6825c42934213

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9203.exe
        Filesize

        318KB

        MD5

        6b94497c7ea29aef5967f1b1c615e0d0

        SHA1

        eb3ea45540baddd3bb768f7ae43e8a8efb1fdc91

        SHA256

        5f49d3163d287cadfe49462e31e39c6b921de40808bd3a9d6a57e6537775b6a5

        SHA512

        83d560d8dce5cc5f396643e31fe5ac6a3ad633b23d134cfdf602580c1cf01f1a5016bf62e1daee6fc4d561ddf02ec68602032aa7ec6d9e389b398774659ef5d6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9203.exe
        Filesize

        318KB

        MD5

        6b94497c7ea29aef5967f1b1c615e0d0

        SHA1

        eb3ea45540baddd3bb768f7ae43e8a8efb1fdc91

        SHA256

        5f49d3163d287cadfe49462e31e39c6b921de40808bd3a9d6a57e6537775b6a5

        SHA512

        83d560d8dce5cc5f396643e31fe5ac6a3ad633b23d134cfdf602580c1cf01f1a5016bf62e1daee6fc4d561ddf02ec68602032aa7ec6d9e389b398774659ef5d6

      • memory/1436-1099-0x00000000052F0000-0x0000000005908000-memory.dmp
        Filesize

        6.1MB

      • memory/1436-1102-0x0000000005A20000-0x0000000005A5C000-memory.dmp
        Filesize

        240KB

      • memory/1436-1114-0x0000000006BE0000-0x000000000710C000-memory.dmp
        Filesize

        5.2MB

      • memory/1436-1113-0x0000000006810000-0x00000000069D2000-memory.dmp
        Filesize

        1.8MB

      • memory/1436-1112-0x0000000006790000-0x00000000067E0000-memory.dmp
        Filesize

        320KB

      • memory/1436-1111-0x00000000066F0000-0x0000000006766000-memory.dmp
        Filesize

        472KB

      • memory/1436-1110-0x0000000004D30000-0x0000000004D40000-memory.dmp
        Filesize

        64KB

      • memory/1436-1109-0x0000000004D30000-0x0000000004D40000-memory.dmp
        Filesize

        64KB

      • memory/1436-1108-0x0000000004D30000-0x0000000004D40000-memory.dmp
        Filesize

        64KB

      • memory/1436-1107-0x0000000004D30000-0x0000000004D40000-memory.dmp
        Filesize

        64KB

      • memory/1436-1105-0x0000000005D90000-0x0000000005DF6000-memory.dmp
        Filesize

        408KB

      • memory/1436-1104-0x0000000005CF0000-0x0000000005D82000-memory.dmp
        Filesize

        584KB

      • memory/1436-1103-0x0000000004D30000-0x0000000004D40000-memory.dmp
        Filesize

        64KB

      • memory/1436-1101-0x00000000028A0000-0x00000000028B2000-memory.dmp
        Filesize

        72KB

      • memory/1436-1100-0x0000000005910000-0x0000000005A1A000-memory.dmp
        Filesize

        1.0MB

      • memory/1436-226-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/1436-224-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/1436-222-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/1436-220-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/1436-216-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/1436-218-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/1436-189-0x0000000000640000-0x000000000068B000-memory.dmp
        Filesize

        300KB

      • memory/1436-191-0x0000000004D30000-0x0000000004D40000-memory.dmp
        Filesize

        64KB

      • memory/1436-190-0x0000000004D30000-0x0000000004D40000-memory.dmp
        Filesize

        64KB

      • memory/1436-192-0x0000000004D30000-0x0000000004D40000-memory.dmp
        Filesize

        64KB

      • memory/1436-193-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/1436-194-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/1436-196-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/1436-198-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/1436-202-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/1436-200-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/1436-204-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/1436-206-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/1436-208-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/1436-210-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/1436-212-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/1436-214-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/1596-1120-0x00000000004A0000-0x00000000004D2000-memory.dmp
        Filesize

        200KB

      • memory/1596-1121-0x0000000005060000-0x0000000005070000-memory.dmp
        Filesize

        64KB

      • memory/4236-170-0x00000000023C0000-0x00000000023D2000-memory.dmp
        Filesize

        72KB

      • memory/4236-149-0x0000000000500000-0x000000000052D000-memory.dmp
        Filesize

        180KB

      • memory/4236-151-0x00000000023B0000-0x00000000023C0000-memory.dmp
        Filesize

        64KB

      • memory/4236-180-0x00000000023C0000-0x00000000023D2000-memory.dmp
        Filesize

        72KB

      • memory/4236-152-0x00000000023C0000-0x00000000023D2000-memory.dmp
        Filesize

        72KB

      • memory/4236-178-0x00000000023C0000-0x00000000023D2000-memory.dmp
        Filesize

        72KB

      • memory/4236-176-0x00000000023C0000-0x00000000023D2000-memory.dmp
        Filesize

        72KB

      • memory/4236-155-0x00000000023B0000-0x00000000023C0000-memory.dmp
        Filesize

        64KB

      • memory/4236-174-0x00000000023C0000-0x00000000023D2000-memory.dmp
        Filesize

        72KB

      • memory/4236-166-0x00000000023C0000-0x00000000023D2000-memory.dmp
        Filesize

        72KB

      • memory/4236-181-0x0000000000400000-0x00000000004B1000-memory.dmp
        Filesize

        708KB

      • memory/4236-182-0x00000000023B0000-0x00000000023C0000-memory.dmp
        Filesize

        64KB

      • memory/4236-172-0x00000000023C0000-0x00000000023D2000-memory.dmp
        Filesize

        72KB

      • memory/4236-164-0x00000000023C0000-0x00000000023D2000-memory.dmp
        Filesize

        72KB

      • memory/4236-162-0x00000000023C0000-0x00000000023D2000-memory.dmp
        Filesize

        72KB

      • memory/4236-160-0x00000000023C0000-0x00000000023D2000-memory.dmp
        Filesize

        72KB

      • memory/4236-158-0x00000000023C0000-0x00000000023D2000-memory.dmp
        Filesize

        72KB

      • memory/4236-156-0x00000000023C0000-0x00000000023D2000-memory.dmp
        Filesize

        72KB

      • memory/4236-153-0x00000000023B0000-0x00000000023C0000-memory.dmp
        Filesize

        64KB

      • memory/4236-150-0x00000000023C0000-0x00000000023D2000-memory.dmp
        Filesize

        72KB

      • memory/4236-148-0x0000000004B80000-0x0000000005124000-memory.dmp
        Filesize

        5.6MB

      • memory/4236-184-0x0000000000400000-0x00000000004B1000-memory.dmp
        Filesize

        708KB

      • memory/4236-168-0x00000000023C0000-0x00000000023D2000-memory.dmp
        Filesize

        72KB