Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 20:21

General

  • Target

    23d9058fef5cafaf94083a72396e531fae254bed2a8e8dfe178189015639cb01.exe

  • Size

    533KB

  • MD5

    887712555f3f6fe7a2941c0a95486a38

  • SHA1

    99a77c6e3602b4f2f005775ad935d7eca1b2eff8

  • SHA256

    23d9058fef5cafaf94083a72396e531fae254bed2a8e8dfe178189015639cb01

  • SHA512

    99ae6beccf5103ec86f661289b152775546619c4ae9e7557b4dab553b38472a35143d4e6d3c43e7f56b2c7b91addedadd1c729a904311b42bf7efad820c62b73

  • SSDEEP

    12288:hMrYy90jcIXwcP6Eld6Hxg3LqXUVq2aMW:xyccBw6Rg3G5MW

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23d9058fef5cafaf94083a72396e531fae254bed2a8e8dfe178189015639cb01.exe
    "C:\Users\Admin\AppData\Local\Temp\23d9058fef5cafaf94083a72396e531fae254bed2a8e8dfe178189015639cb01.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3116
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipn3860.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipn3860.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1692
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr433839.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr433839.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2728
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku286319.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku286319.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4824
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4824 -s 1336
          4⤵
          • Program crash
          PID:2748
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr624613.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr624613.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2932
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4824 -ip 4824
    1⤵
      PID:2396

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr624613.exe
      Filesize

      175KB

      MD5

      ae9797c456535d7493ae3918603a2c19

      SHA1

      9db12e90bab014e02d1adb02cd27a346d4714e36

      SHA256

      cbc6d58bae9a37c18b039b12fc47d53a309f75566fef0020b0217b30f518693e

      SHA512

      839d5927777aa29bfc7446fa8863452fdf8d06d0bdb10f895a89d8818a0a2ba4d304e32f298d4f6a3a9ee066d3e26709591d05b945438a307624884b9b261b5f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr624613.exe
      Filesize

      175KB

      MD5

      ae9797c456535d7493ae3918603a2c19

      SHA1

      9db12e90bab014e02d1adb02cd27a346d4714e36

      SHA256

      cbc6d58bae9a37c18b039b12fc47d53a309f75566fef0020b0217b30f518693e

      SHA512

      839d5927777aa29bfc7446fa8863452fdf8d06d0bdb10f895a89d8818a0a2ba4d304e32f298d4f6a3a9ee066d3e26709591d05b945438a307624884b9b261b5f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipn3860.exe
      Filesize

      391KB

      MD5

      f3131202683bff5e2f1bc8ad7e7f3db9

      SHA1

      a26fc9603e7a9b2a41670806f9f3d7e1bb798139

      SHA256

      152242f73c270c74be915e8e4b0dad34cc59c5605b446fdca26aabcdbbfaf545

      SHA512

      82b35c8c93b5a590f5459fdeb54e758c459126d23bd06d6d5df042792e150acb1b3cc0a2080ff82d8524e0a041dffd1ec60a3489b0ce345a1777958996012107

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zipn3860.exe
      Filesize

      391KB

      MD5

      f3131202683bff5e2f1bc8ad7e7f3db9

      SHA1

      a26fc9603e7a9b2a41670806f9f3d7e1bb798139

      SHA256

      152242f73c270c74be915e8e4b0dad34cc59c5605b446fdca26aabcdbbfaf545

      SHA512

      82b35c8c93b5a590f5459fdeb54e758c459126d23bd06d6d5df042792e150acb1b3cc0a2080ff82d8524e0a041dffd1ec60a3489b0ce345a1777958996012107

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr433839.exe
      Filesize

      11KB

      MD5

      6f3d82ba66b148340aaed46b2583e1d9

      SHA1

      531bca927a9375e1a0addcdb2fde53b52de5c24d

      SHA256

      816e9cec678fe3557dbb774e91184c35ba80eb5f7a9530350b5bd22013939b92

      SHA512

      801b34bbba36019b8da07cd4136e1ea0a9b034b43cd2e3d6cf86d1a10c522b3fe84062883ec21bdbe56ffe4650b6f45f02ea7dadfdf6589d19031b315d14b93e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr433839.exe
      Filesize

      11KB

      MD5

      6f3d82ba66b148340aaed46b2583e1d9

      SHA1

      531bca927a9375e1a0addcdb2fde53b52de5c24d

      SHA256

      816e9cec678fe3557dbb774e91184c35ba80eb5f7a9530350b5bd22013939b92

      SHA512

      801b34bbba36019b8da07cd4136e1ea0a9b034b43cd2e3d6cf86d1a10c522b3fe84062883ec21bdbe56ffe4650b6f45f02ea7dadfdf6589d19031b315d14b93e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku286319.exe
      Filesize

      359KB

      MD5

      ce3e552055f22b5076a8111fb588eb25

      SHA1

      6605753b6c300db2941f30c69088175abba907e4

      SHA256

      0aba0a10e50db1362bfbb1a1d9c1997c0b0e8aa7530cbb6d95a6aab25efe20ca

      SHA512

      047d1a6eda1416c45d2ef27a8f0f055609626227365145b41a5bbf2db6c775ea00816cfe9626ba8717f96ce9deec45902eea649b70b88893ae7fbb14708e68f7

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku286319.exe
      Filesize

      359KB

      MD5

      ce3e552055f22b5076a8111fb588eb25

      SHA1

      6605753b6c300db2941f30c69088175abba907e4

      SHA256

      0aba0a10e50db1362bfbb1a1d9c1997c0b0e8aa7530cbb6d95a6aab25efe20ca

      SHA512

      047d1a6eda1416c45d2ef27a8f0f055609626227365145b41a5bbf2db6c775ea00816cfe9626ba8717f96ce9deec45902eea649b70b88893ae7fbb14708e68f7

    • memory/2728-147-0x0000000000D80000-0x0000000000D8A000-memory.dmp
      Filesize

      40KB

    • memory/2932-1085-0x0000000000440000-0x0000000000472000-memory.dmp
      Filesize

      200KB

    • memory/2932-1086-0x0000000004D40000-0x0000000004D50000-memory.dmp
      Filesize

      64KB

    • memory/4824-189-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-203-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-155-0x00000000062B0000-0x00000000062C0000-memory.dmp
      Filesize

      64KB

    • memory/4824-156-0x00000000062B0000-0x00000000062C0000-memory.dmp
      Filesize

      64KB

    • memory/4824-157-0x00000000062B0000-0x00000000062C0000-memory.dmp
      Filesize

      64KB

    • memory/4824-158-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-159-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-161-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-163-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-165-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-167-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-169-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-171-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-173-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-175-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-177-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-179-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-181-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-183-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-185-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-187-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-153-0x00000000062C0000-0x0000000006864000-memory.dmp
      Filesize

      5.6MB

    • memory/4824-191-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-193-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-195-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-197-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-199-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-154-0x0000000001C50000-0x0000000001C9B000-memory.dmp
      Filesize

      300KB

    • memory/4824-201-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-205-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-207-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-209-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-211-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-213-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-215-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-217-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-219-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-221-0x0000000006100000-0x000000000613F000-memory.dmp
      Filesize

      252KB

    • memory/4824-1064-0x0000000006870000-0x0000000006E88000-memory.dmp
      Filesize

      6.1MB

    • memory/4824-1065-0x0000000006E90000-0x0000000006F9A000-memory.dmp
      Filesize

      1.0MB

    • memory/4824-1067-0x00000000062B0000-0x00000000062C0000-memory.dmp
      Filesize

      64KB

    • memory/4824-1066-0x00000000061F0000-0x0000000006202000-memory.dmp
      Filesize

      72KB

    • memory/4824-1068-0x0000000006210000-0x000000000624C000-memory.dmp
      Filesize

      240KB

    • memory/4824-1070-0x00000000071F0000-0x0000000007256000-memory.dmp
      Filesize

      408KB

    • memory/4824-1071-0x00000000062B0000-0x00000000062C0000-memory.dmp
      Filesize

      64KB

    • memory/4824-1072-0x00000000062B0000-0x00000000062C0000-memory.dmp
      Filesize

      64KB

    • memory/4824-1073-0x00000000062B0000-0x00000000062C0000-memory.dmp
      Filesize

      64KB

    • memory/4824-1074-0x0000000007A00000-0x0000000007A92000-memory.dmp
      Filesize

      584KB

    • memory/4824-1075-0x0000000007AD0000-0x0000000007B46000-memory.dmp
      Filesize

      472KB

    • memory/4824-1076-0x0000000007B60000-0x0000000007BB0000-memory.dmp
      Filesize

      320KB

    • memory/4824-1077-0x0000000007CD0000-0x0000000007E92000-memory.dmp
      Filesize

      1.8MB

    • memory/4824-1078-0x0000000007EB0000-0x00000000083DC000-memory.dmp
      Filesize

      5.2MB

    • memory/4824-1079-0x00000000062B0000-0x00000000062C0000-memory.dmp
      Filesize

      64KB