Analysis

  • max time kernel
    100s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 19:06

General

  • Target

    c167fbe5018f4d018f634132bf6740c9fe8c66e460ae6bc84eb3c2610fe1908b.exe

  • Size

    534KB

  • MD5

    e9542fbaa6a5788d41be783dc6f9e4e3

  • SHA1

    68d0a121c9ba0dac30d21ee07d8f5f536f0e4c11

  • SHA256

    c167fbe5018f4d018f634132bf6740c9fe8c66e460ae6bc84eb3c2610fe1908b

  • SHA512

    49ca0da61452e5a185c6b53841fb74eb9503712de36034894789c6e7d98bd059b6244cca7624f438f3b9927df3982f03513f67ba5e73b081046a9324670e03dc

  • SSDEEP

    12288:6Mryy90cbaEmSQr8+nybyqvpOCmJU/O6EFDfKL73KFP:cyNlCr7nybpvpO8EJvl

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c167fbe5018f4d018f634132bf6740c9fe8c66e460ae6bc84eb3c2610fe1908b.exe
    "C:\Users\Admin\AppData\Local\Temp\c167fbe5018f4d018f634132bf6740c9fe8c66e460ae6bc84eb3c2610fe1908b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4216
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitz2866.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitz2866.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4612
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr893457.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr893457.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3932
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku251378.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku251378.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4032
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4032 -s 1512
          4⤵
          • Program crash
          PID:4300
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr829446.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr829446.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1748
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4032 -ip 4032
    1⤵
      PID:680

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr829446.exe
      Filesize

      175KB

      MD5

      f0c04caf11f79e1ba4e7f26e404dad3e

      SHA1

      bb0d7ec1cad0bb78a16fda2630b81b6424efa737

      SHA256

      c4ee6354d7ba06971fd546d0e8af49ed85d800ac65da3bc7e558dd5c3be0c7d2

      SHA512

      cba90e59f607fe033f5796d9c2fd729aae65253e41d2aba064d70f5f04bc0dc08bf800ded3714910fedf411fc81661ce116e89adeec250236dbf3f0c070621ab

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr829446.exe
      Filesize

      175KB

      MD5

      f0c04caf11f79e1ba4e7f26e404dad3e

      SHA1

      bb0d7ec1cad0bb78a16fda2630b81b6424efa737

      SHA256

      c4ee6354d7ba06971fd546d0e8af49ed85d800ac65da3bc7e558dd5c3be0c7d2

      SHA512

      cba90e59f607fe033f5796d9c2fd729aae65253e41d2aba064d70f5f04bc0dc08bf800ded3714910fedf411fc81661ce116e89adeec250236dbf3f0c070621ab

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitz2866.exe
      Filesize

      392KB

      MD5

      41257cb5756cc620da4f5e6cad27e910

      SHA1

      c39afcb8441fd9746bf484ff2345cceb6a47ad9b

      SHA256

      d7c51d42349b7eeb16c3555214099737b4f7ea85ca6da50865ccc57b691a8447

      SHA512

      ac2eb42f51a07f582efada786f5cbc4570ae67aca42c350e5d0251143a67731fc790f98cf33cac328c48ba12a67caf83dd3ecac56086b5ee75f5ff12bc30f2c0

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zitz2866.exe
      Filesize

      392KB

      MD5

      41257cb5756cc620da4f5e6cad27e910

      SHA1

      c39afcb8441fd9746bf484ff2345cceb6a47ad9b

      SHA256

      d7c51d42349b7eeb16c3555214099737b4f7ea85ca6da50865ccc57b691a8447

      SHA512

      ac2eb42f51a07f582efada786f5cbc4570ae67aca42c350e5d0251143a67731fc790f98cf33cac328c48ba12a67caf83dd3ecac56086b5ee75f5ff12bc30f2c0

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr893457.exe
      Filesize

      11KB

      MD5

      57fb8354fe120d3b6c3fa59462269eb6

      SHA1

      d1bc2e41359a63822f3c67dfed41f0d6460f8f83

      SHA256

      33d7e50758708b4698980ed69fe20f57b17ec3679111c46e8be6ee3e476a973f

      SHA512

      f2b036d3c9a7ba46bc690569fe0095ca2d49ed37317051c60d32bb7e618469e0bf4c74cf5e7869142b33d897e692068610ec1ccb9ac80653d8ea5db7147554b6

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr893457.exe
      Filesize

      11KB

      MD5

      57fb8354fe120d3b6c3fa59462269eb6

      SHA1

      d1bc2e41359a63822f3c67dfed41f0d6460f8f83

      SHA256

      33d7e50758708b4698980ed69fe20f57b17ec3679111c46e8be6ee3e476a973f

      SHA512

      f2b036d3c9a7ba46bc690569fe0095ca2d49ed37317051c60d32bb7e618469e0bf4c74cf5e7869142b33d897e692068610ec1ccb9ac80653d8ea5db7147554b6

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku251378.exe
      Filesize

      318KB

      MD5

      614578df3f908f94970cac4cff491772

      SHA1

      e9dcd48d731d103cf4d148ebc33facacf2767e39

      SHA256

      8ee67431b7b0a1072c7865ac75aab349feb6bd7d4127cfa234255794738663bd

      SHA512

      596c7d3b94dd7cd08764b654f518ef8056dc9bae6b2565c4e08f1758d5ab0904d57c3c9c95ac87dc64819512907a823a6b77375cb272e75b778ea079fad92d13

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku251378.exe
      Filesize

      318KB

      MD5

      614578df3f908f94970cac4cff491772

      SHA1

      e9dcd48d731d103cf4d148ebc33facacf2767e39

      SHA256

      8ee67431b7b0a1072c7865ac75aab349feb6bd7d4127cfa234255794738663bd

      SHA512

      596c7d3b94dd7cd08764b654f518ef8056dc9bae6b2565c4e08f1758d5ab0904d57c3c9c95ac87dc64819512907a823a6b77375cb272e75b778ea079fad92d13

    • memory/1748-1084-0x0000000000680000-0x00000000006B2000-memory.dmp
      Filesize

      200KB

    • memory/1748-1085-0x0000000004FE0000-0x0000000004FF0000-memory.dmp
      Filesize

      64KB

    • memory/3932-147-0x00000000004D0000-0x00000000004DA000-memory.dmp
      Filesize

      40KB

    • memory/4032-188-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-200-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-156-0x0000000004AF0000-0x0000000004B00000-memory.dmp
      Filesize

      64KB

    • memory/4032-157-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-158-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-160-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-162-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-166-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-164-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-168-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-170-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-172-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-174-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-176-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-178-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-180-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-182-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-184-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-186-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-154-0x0000000000610000-0x000000000065B000-memory.dmp
      Filesize

      300KB

    • memory/4032-190-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-192-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-194-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-196-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-198-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-155-0x0000000004AF0000-0x0000000004B00000-memory.dmp
      Filesize

      64KB

    • memory/4032-202-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-204-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-206-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-208-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-210-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-212-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-214-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-216-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-218-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-220-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/4032-1063-0x0000000005200000-0x0000000005818000-memory.dmp
      Filesize

      6.1MB

    • memory/4032-1064-0x00000000058A0000-0x00000000059AA000-memory.dmp
      Filesize

      1.0MB

    • memory/4032-1065-0x00000000059E0000-0x00000000059F2000-memory.dmp
      Filesize

      72KB

    • memory/4032-1066-0x0000000005A00000-0x0000000005A3C000-memory.dmp
      Filesize

      240KB

    • memory/4032-1067-0x0000000004AF0000-0x0000000004B00000-memory.dmp
      Filesize

      64KB

    • memory/4032-1069-0x0000000004AF0000-0x0000000004B00000-memory.dmp
      Filesize

      64KB

    • memory/4032-1070-0x0000000004AF0000-0x0000000004B00000-memory.dmp
      Filesize

      64KB

    • memory/4032-1071-0x0000000005CF0000-0x0000000005D56000-memory.dmp
      Filesize

      408KB

    • memory/4032-1072-0x00000000064A0000-0x0000000006532000-memory.dmp
      Filesize

      584KB

    • memory/4032-1073-0x0000000004AF0000-0x0000000004B00000-memory.dmp
      Filesize

      64KB

    • memory/4032-1074-0x00000000066F0000-0x00000000068B2000-memory.dmp
      Filesize

      1.8MB

    • memory/4032-153-0x0000000004B00000-0x00000000050A4000-memory.dmp
      Filesize

      5.6MB

    • memory/4032-1075-0x00000000068D0000-0x0000000006DFC000-memory.dmp
      Filesize

      5.2MB

    • memory/4032-1076-0x0000000006F50000-0x0000000006FC6000-memory.dmp
      Filesize

      472KB

    • memory/4032-1077-0x0000000006FD0000-0x0000000007020000-memory.dmp
      Filesize

      320KB