Analysis

  • max time kernel
    97s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 20:18

General

  • Target

    c0fe8aa839c806cf3079b1516cd217638238fd6778944e9f792fe0e9b3cd3b5e.exe

  • Size

    672KB

  • MD5

    8ece5999d57ae464fe9509227f132bfc

  • SHA1

    b0cf71dfbcc4a39702dc29a1eecc975b10eb1e9f

  • SHA256

    c0fe8aa839c806cf3079b1516cd217638238fd6778944e9f792fe0e9b3cd3b5e

  • SHA512

    7266f9cbc6537acab49567c7786294eb239de5c1ce680ca298e89e68ed01ecee6e6d257e0492f185241b71ed2dc6a41eda388cf0325dc36790fba88e8a6e0fe9

  • SSDEEP

    12288:8MrPy90RJbzf3KWTcZXirPlkW9RjSiJ+oTgeOciQnQTYimULqE8kXZDBUAgm0:DyeJbb3KWT6OCOFJEpwiQnQTYimUGE7q

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0fe8aa839c806cf3079b1516cd217638238fd6778944e9f792fe0e9b3cd3b5e.exe
    "C:\Users\Admin\AppData\Local\Temp\c0fe8aa839c806cf3079b1516cd217638238fd6778944e9f792fe0e9b3cd3b5e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un733890.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un733890.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1188
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9517.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9517.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3664
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3664 -s 1080
          4⤵
          • Program crash
          PID:3040
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7801.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7801.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1736
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 1348
          4⤵
          • Program crash
          PID:2308
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si435865.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si435865.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3096
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3664 -ip 3664
    1⤵
      PID:1876
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1736 -ip 1736
      1⤵
        PID:4344

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si435865.exe
        Filesize

        175KB

        MD5

        4b411dd84f555ec1f611ea2025a29d1d

        SHA1

        f36a9b77d84ace20e880c625b0b797a04c88d5d0

        SHA256

        fbf09d99756182753858bd216ae910c7d94b94c39f060d79d9827645e5d4e6c7

        SHA512

        c971aa4676a459101cde17525fb7c7c185486b9c18299246a0c01b4fdb188395341f96f90b8cef43ddd2db0f6b82d0587dbf8061cf567fea8e7c0a91502f7e9f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si435865.exe
        Filesize

        175KB

        MD5

        4b411dd84f555ec1f611ea2025a29d1d

        SHA1

        f36a9b77d84ace20e880c625b0b797a04c88d5d0

        SHA256

        fbf09d99756182753858bd216ae910c7d94b94c39f060d79d9827645e5d4e6c7

        SHA512

        c971aa4676a459101cde17525fb7c7c185486b9c18299246a0c01b4fdb188395341f96f90b8cef43ddd2db0f6b82d0587dbf8061cf567fea8e7c0a91502f7e9f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un733890.exe
        Filesize

        531KB

        MD5

        a97e5524ad4da59b3ed78eb3639ffb04

        SHA1

        6a02d6a21540f8a40d67009218fad11e7a182ee9

        SHA256

        f5c633b3eb6fcc0401c153549396f92c48df6274e12477c1848e3e79cb19ba59

        SHA512

        3a4caf68115f2d305e54cf027b66a6741e0e2b1cbb4917da46f4266d641d7e0a4ea84d8f0124659cd7de59ec6c70c22a1f5e043f3fdbca63207c4d8b94ce2b74

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un733890.exe
        Filesize

        531KB

        MD5

        a97e5524ad4da59b3ed78eb3639ffb04

        SHA1

        6a02d6a21540f8a40d67009218fad11e7a182ee9

        SHA256

        f5c633b3eb6fcc0401c153549396f92c48df6274e12477c1848e3e79cb19ba59

        SHA512

        3a4caf68115f2d305e54cf027b66a6741e0e2b1cbb4917da46f4266d641d7e0a4ea84d8f0124659cd7de59ec6c70c22a1f5e043f3fdbca63207c4d8b94ce2b74

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9517.exe
        Filesize

        260KB

        MD5

        880bfb003944832aa82b2b85cc4b591b

        SHA1

        4df674d0c385197f5c12ce7cb76ed0a7048be33f

        SHA256

        96a23ac4c4fbf84362da7c2d8d18bf15a73fbe26e91e7eb69a4337b49be9c932

        SHA512

        41bd743c8298a96a4f60e52af7c4f8d998629aab0924ef647871773a5d425070ae26cac51ca822ccb961437eb9e388e35521cbbe722c4706999875124d3224f0

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9517.exe
        Filesize

        260KB

        MD5

        880bfb003944832aa82b2b85cc4b591b

        SHA1

        4df674d0c385197f5c12ce7cb76ed0a7048be33f

        SHA256

        96a23ac4c4fbf84362da7c2d8d18bf15a73fbe26e91e7eb69a4337b49be9c932

        SHA512

        41bd743c8298a96a4f60e52af7c4f8d998629aab0924ef647871773a5d425070ae26cac51ca822ccb961437eb9e388e35521cbbe722c4706999875124d3224f0

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7801.exe
        Filesize

        359KB

        MD5

        7b4c5e148d1308f7390f19325c8ce0c7

        SHA1

        bbb1e41747e38729764e304e7d51562a9a9ca433

        SHA256

        d942b75d9c5c65d7a21c1711a5846701633a289e4a08f601f61e4c375fcd2958

        SHA512

        84b3e8ef6dba0067acdc99337adfa77748b3a79b87021a4eb042a66325c11ab7c6961201ac95e8a66a922537e5a644eeff6c62fb67b8f4305640dabac6996f8f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7801.exe
        Filesize

        359KB

        MD5

        7b4c5e148d1308f7390f19325c8ce0c7

        SHA1

        bbb1e41747e38729764e304e7d51562a9a9ca433

        SHA256

        d942b75d9c5c65d7a21c1711a5846701633a289e4a08f601f61e4c375fcd2958

        SHA512

        84b3e8ef6dba0067acdc99337adfa77748b3a79b87021a4eb042a66325c11ab7c6961201ac95e8a66a922537e5a644eeff6c62fb67b8f4305640dabac6996f8f

      • memory/1736-1099-0x00000000068B0000-0x0000000006EC8000-memory.dmp
        Filesize

        6.1MB

      • memory/1736-1102-0x0000000007040000-0x000000000707C000-memory.dmp
        Filesize

        240KB

      • memory/1736-1114-0x0000000008030000-0x000000000855C000-memory.dmp
        Filesize

        5.2MB

      • memory/1736-1113-0x0000000007E50000-0x0000000008012000-memory.dmp
        Filesize

        1.8MB

      • memory/1736-1112-0x00000000061F0000-0x0000000006200000-memory.dmp
        Filesize

        64KB

      • memory/1736-1111-0x00000000061F0000-0x0000000006200000-memory.dmp
        Filesize

        64KB

      • memory/1736-1110-0x00000000061F0000-0x0000000006200000-memory.dmp
        Filesize

        64KB

      • memory/1736-1109-0x00000000061F0000-0x0000000006200000-memory.dmp
        Filesize

        64KB

      • memory/1736-1108-0x0000000007B60000-0x0000000007BB0000-memory.dmp
        Filesize

        320KB

      • memory/1736-1107-0x0000000007AC0000-0x0000000007B36000-memory.dmp
        Filesize

        472KB

      • memory/1736-1106-0x00000000073D0000-0x0000000007436000-memory.dmp
        Filesize

        408KB

      • memory/1736-1105-0x0000000007330000-0x00000000073C2000-memory.dmp
        Filesize

        584KB

      • memory/1736-1103-0x00000000061F0000-0x0000000006200000-memory.dmp
        Filesize

        64KB

      • memory/1736-1101-0x0000000007020000-0x0000000007032000-memory.dmp
        Filesize

        72KB

      • memory/1736-1100-0x0000000006EE0000-0x0000000006FEA000-memory.dmp
        Filesize

        1.0MB

      • memory/1736-247-0x00000000061F0000-0x0000000006200000-memory.dmp
        Filesize

        64KB

      • memory/1736-244-0x00000000061F0000-0x0000000006200000-memory.dmp
        Filesize

        64KB

      • memory/1736-243-0x00000000061F0000-0x0000000006200000-memory.dmp
        Filesize

        64KB

      • memory/1736-241-0x0000000001F10000-0x0000000001F5B000-memory.dmp
        Filesize

        300KB

      • memory/1736-222-0x00000000060D0000-0x000000000610F000-memory.dmp
        Filesize

        252KB

      • memory/1736-220-0x00000000060D0000-0x000000000610F000-memory.dmp
        Filesize

        252KB

      • memory/1736-189-0x00000000060D0000-0x000000000610F000-memory.dmp
        Filesize

        252KB

      • memory/1736-190-0x00000000060D0000-0x000000000610F000-memory.dmp
        Filesize

        252KB

      • memory/1736-192-0x00000000060D0000-0x000000000610F000-memory.dmp
        Filesize

        252KB

      • memory/1736-194-0x00000000060D0000-0x000000000610F000-memory.dmp
        Filesize

        252KB

      • memory/1736-196-0x00000000060D0000-0x000000000610F000-memory.dmp
        Filesize

        252KB

      • memory/1736-198-0x00000000060D0000-0x000000000610F000-memory.dmp
        Filesize

        252KB

      • memory/1736-200-0x00000000060D0000-0x000000000610F000-memory.dmp
        Filesize

        252KB

      • memory/1736-202-0x00000000060D0000-0x000000000610F000-memory.dmp
        Filesize

        252KB

      • memory/1736-204-0x00000000060D0000-0x000000000610F000-memory.dmp
        Filesize

        252KB

      • memory/1736-206-0x00000000060D0000-0x000000000610F000-memory.dmp
        Filesize

        252KB

      • memory/1736-208-0x00000000060D0000-0x000000000610F000-memory.dmp
        Filesize

        252KB

      • memory/1736-212-0x00000000060D0000-0x000000000610F000-memory.dmp
        Filesize

        252KB

      • memory/1736-210-0x00000000060D0000-0x000000000610F000-memory.dmp
        Filesize

        252KB

      • memory/1736-214-0x00000000060D0000-0x000000000610F000-memory.dmp
        Filesize

        252KB

      • memory/1736-216-0x00000000060D0000-0x000000000610F000-memory.dmp
        Filesize

        252KB

      • memory/1736-218-0x00000000060D0000-0x000000000610F000-memory.dmp
        Filesize

        252KB

      • memory/3096-1121-0x00000000002D0000-0x0000000000302000-memory.dmp
        Filesize

        200KB

      • memory/3096-1123-0x0000000004F40000-0x0000000004F50000-memory.dmp
        Filesize

        64KB

      • memory/3096-1122-0x0000000004F40000-0x0000000004F50000-memory.dmp
        Filesize

        64KB

      • memory/3664-171-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/3664-167-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/3664-180-0x0000000000400000-0x00000000004B1000-memory.dmp
        Filesize

        708KB

      • memory/3664-150-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/3664-179-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/3664-177-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/3664-158-0x0000000004AD0000-0x0000000004AE0000-memory.dmp
        Filesize

        64KB

      • memory/3664-175-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/3664-173-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/3664-152-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/3664-169-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/3664-181-0x0000000004AD0000-0x0000000004AE0000-memory.dmp
        Filesize

        64KB

      • memory/3664-165-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/3664-163-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/3664-161-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/3664-159-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/3664-155-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/3664-156-0x0000000004AD0000-0x0000000004AE0000-memory.dmp
        Filesize

        64KB

      • memory/3664-149-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/3664-148-0x0000000004AE0000-0x0000000005084000-memory.dmp
        Filesize

        5.6MB

      • memory/3664-182-0x0000000004AD0000-0x0000000004AE0000-memory.dmp
        Filesize

        64KB

      • memory/3664-184-0x0000000000400000-0x00000000004B1000-memory.dmp
        Filesize

        708KB

      • memory/3664-154-0x0000000000820000-0x000000000084D000-memory.dmp
        Filesize

        180KB