Analysis

  • max time kernel
    61s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 20:16

General

  • Target

    6954c36274ad765c185ab71f57d89c1162e78043f17b783da58dc8015b230378.exe

  • Size

    533KB

  • MD5

    b7038c32c9433168c0d4cfb3c710677a

  • SHA1

    b80411e515c8b716186f95db2f58290f91857603

  • SHA256

    6954c36274ad765c185ab71f57d89c1162e78043f17b783da58dc8015b230378

  • SHA512

    a5c2f25a2e2c1bf3da75e2294f047505deeab5e3e6da373970af5e7b74502943922133aa9075fa900743d062d9968bad881d5dd294536794b4d9f0255c0f0234

  • SSDEEP

    12288:/Mrmy9054tFP1wAnYRtCdam1b5DA3ObErxQ72Vl126h0SW:Vyv9zYRSVDBbp72VlU

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6954c36274ad765c185ab71f57d89c1162e78043f17b783da58dc8015b230378.exe
    "C:\Users\Admin\AppData\Local\Temp\6954c36274ad765c185ab71f57d89c1162e78043f17b783da58dc8015b230378.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zier0496.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zier0496.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3980
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr404712.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr404712.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4872
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku595833.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku595833.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:244
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 244 -s 1352
          4⤵
          • Program crash
          PID:2348
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr448244.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr448244.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3512
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 244 -ip 244
    1⤵
      PID:4384

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr448244.exe
      Filesize

      175KB

      MD5

      55cdea1e46ff445f1eba8971f44ebf36

      SHA1

      442a975b2d5775ee28c2504c753b8456cbdf5373

      SHA256

      4134b7b62bfcb90df5244a2eaeff2b8320af26c594a3ba5b8737dc2981354b6e

      SHA512

      dd21515dd5dfd327cfd29c5ea91ba6c171f0ae98937c3b81295686c891d3354b28ec6c2e7184c6b67e18bfc235a475b63453767325fce06c020ed186cd05f1a8

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr448244.exe
      Filesize

      175KB

      MD5

      55cdea1e46ff445f1eba8971f44ebf36

      SHA1

      442a975b2d5775ee28c2504c753b8456cbdf5373

      SHA256

      4134b7b62bfcb90df5244a2eaeff2b8320af26c594a3ba5b8737dc2981354b6e

      SHA512

      dd21515dd5dfd327cfd29c5ea91ba6c171f0ae98937c3b81295686c891d3354b28ec6c2e7184c6b67e18bfc235a475b63453767325fce06c020ed186cd05f1a8

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zier0496.exe
      Filesize

      392KB

      MD5

      1b07504a15a9e14af29606bd6f9cb967

      SHA1

      9e97015c694151e8cbb91ad43e12ab3c4957f9e4

      SHA256

      4b1073153c73ab049fb85e052ad86cc396b57831d2c2335872f01dedc5c55a49

      SHA512

      8764a8d533bd002e05a91589af264b81a2a37c335c5f5a6cb3de96f48ada6f60213e1bacd6959794c469aa1ae2841224a355819d05f252ebfe68973f8bb2abd7

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zier0496.exe
      Filesize

      392KB

      MD5

      1b07504a15a9e14af29606bd6f9cb967

      SHA1

      9e97015c694151e8cbb91ad43e12ab3c4957f9e4

      SHA256

      4b1073153c73ab049fb85e052ad86cc396b57831d2c2335872f01dedc5c55a49

      SHA512

      8764a8d533bd002e05a91589af264b81a2a37c335c5f5a6cb3de96f48ada6f60213e1bacd6959794c469aa1ae2841224a355819d05f252ebfe68973f8bb2abd7

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr404712.exe
      Filesize

      11KB

      MD5

      8b46ba626d8a3e20e9c53b413961e103

      SHA1

      158f0d5485b7f3d7e12e833adafe2a64cf4a90c1

      SHA256

      96e4aec5d0a3e557025afbb33aa66263502d1a0f7b8b497f99d9686831612a32

      SHA512

      68af38ca01c310190789869645a79f22fd5931a707b54a2e33c697f5590da6714e2b1158ca37751432f8fc7d6d85a30e363199c3e8cd3c011e39c985f1e90314

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr404712.exe
      Filesize

      11KB

      MD5

      8b46ba626d8a3e20e9c53b413961e103

      SHA1

      158f0d5485b7f3d7e12e833adafe2a64cf4a90c1

      SHA256

      96e4aec5d0a3e557025afbb33aa66263502d1a0f7b8b497f99d9686831612a32

      SHA512

      68af38ca01c310190789869645a79f22fd5931a707b54a2e33c697f5590da6714e2b1158ca37751432f8fc7d6d85a30e363199c3e8cd3c011e39c985f1e90314

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku595833.exe
      Filesize

      318KB

      MD5

      fc43636494f408a9f2fa9cb365cc4c6e

      SHA1

      8c87394edaf3ba192b0fa586c5b150a754c8bf93

      SHA256

      bc4948dfa63ced2a8309d6ace204546da8c05a84ea3f06ef7b611cd447f386d0

      SHA512

      a5d882cb3723411508a4be6f86c727532f23e5ce9cf171fbc87d1fdc6a9c3d9adf35b673c3a01188e232d76a2e52e9b90e1009ac9bb6402e1fb42f09d9c831f9

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku595833.exe
      Filesize

      318KB

      MD5

      fc43636494f408a9f2fa9cb365cc4c6e

      SHA1

      8c87394edaf3ba192b0fa586c5b150a754c8bf93

      SHA256

      bc4948dfa63ced2a8309d6ace204546da8c05a84ea3f06ef7b611cd447f386d0

      SHA512

      a5d882cb3723411508a4be6f86c727532f23e5ce9cf171fbc87d1fdc6a9c3d9adf35b673c3a01188e232d76a2e52e9b90e1009ac9bb6402e1fb42f09d9c831f9

    • memory/244-153-0x0000000004A90000-0x0000000005034000-memory.dmp
      Filesize

      5.6MB

    • memory/244-154-0x00000000006A0000-0x00000000006EB000-memory.dmp
      Filesize

      300KB

    • memory/244-156-0x0000000002470000-0x0000000002480000-memory.dmp
      Filesize

      64KB

    • memory/244-155-0x0000000002470000-0x0000000002480000-memory.dmp
      Filesize

      64KB

    • memory/244-157-0x0000000002470000-0x0000000002480000-memory.dmp
      Filesize

      64KB

    • memory/244-158-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-161-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-163-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-159-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-165-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-167-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-169-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-173-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-171-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-175-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-179-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-177-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-181-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-183-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-185-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-187-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-189-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-191-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-193-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-195-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-197-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-199-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-201-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-203-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-205-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-207-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-209-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-211-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-213-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-215-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-217-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-219-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-221-0x0000000005040000-0x000000000507F000-memory.dmp
      Filesize

      252KB

    • memory/244-1064-0x00000000050C0000-0x00000000056D8000-memory.dmp
      Filesize

      6.1MB

    • memory/244-1065-0x0000000005760000-0x000000000586A000-memory.dmp
      Filesize

      1.0MB

    • memory/244-1066-0x00000000058A0000-0x00000000058B2000-memory.dmp
      Filesize

      72KB

    • memory/244-1067-0x0000000002470000-0x0000000002480000-memory.dmp
      Filesize

      64KB

    • memory/244-1068-0x00000000058C0000-0x00000000058FC000-memory.dmp
      Filesize

      240KB

    • memory/244-1070-0x0000000002470000-0x0000000002480000-memory.dmp
      Filesize

      64KB

    • memory/244-1071-0x0000000002470000-0x0000000002480000-memory.dmp
      Filesize

      64KB

    • memory/244-1072-0x0000000005BB0000-0x0000000005C42000-memory.dmp
      Filesize

      584KB

    • memory/244-1073-0x0000000005C50000-0x0000000005CB6000-memory.dmp
      Filesize

      408KB

    • memory/244-1074-0x0000000006370000-0x0000000006532000-memory.dmp
      Filesize

      1.8MB

    • memory/244-1075-0x0000000006550000-0x0000000006A7C000-memory.dmp
      Filesize

      5.2MB

    • memory/244-1076-0x0000000006BA0000-0x0000000006C16000-memory.dmp
      Filesize

      472KB

    • memory/244-1077-0x0000000006C40000-0x0000000006C90000-memory.dmp
      Filesize

      320KB

    • memory/244-1078-0x0000000002470000-0x0000000002480000-memory.dmp
      Filesize

      64KB

    • memory/3512-1084-0x0000000000610000-0x0000000000642000-memory.dmp
      Filesize

      200KB

    • memory/3512-1085-0x0000000004F40000-0x0000000004F50000-memory.dmp
      Filesize

      64KB

    • memory/4872-147-0x0000000000CF0000-0x0000000000CFA000-memory.dmp
      Filesize

      40KB