Analysis

  • max time kernel
    141s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 19:36

General

  • Target

    085c604e43094d4122fc1d90d513c6445c758235211118c7fb4ef2344e0daee2.exe

  • Size

    534KB

  • MD5

    bec4c9c4f1f03d5ff50c6b9cdd548071

  • SHA1

    4293545d54ea85e87567c7cb919cb87c1e55d4d3

  • SHA256

    085c604e43094d4122fc1d90d513c6445c758235211118c7fb4ef2344e0daee2

  • SHA512

    a950f97e5fef7dfc6095c14186086834f746c50e53431daf0953b8c73e23e51e9719fda864740745c68c79677a2d8a445a861e1c9760cd435c778f7b532eb7ca

  • SSDEEP

    12288:pMrky90YVB2uBEmF6OmObprBxJ0YVf2l3eI:9ydjBbpf2deI

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\085c604e43094d4122fc1d90d513c6445c758235211118c7fb4ef2344e0daee2.exe
    "C:\Users\Admin\AppData\Local\Temp\085c604e43094d4122fc1d90d513c6445c758235211118c7fb4ef2344e0daee2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:452
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEV7492.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEV7492.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4772
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr941047.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr941047.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4216
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku396189.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku396189.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3996
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3996 -s 1352
          4⤵
          • Program crash
          PID:1896
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr670733.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr670733.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4148
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3996 -ip 3996
    1⤵
      PID:5052
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe start wuauserv
      1⤵
      • Launches sc.exe
      PID:1476

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr670733.exe
      Filesize

      175KB

      MD5

      0accd8931ea4727fde0fb88c312aec3f

      SHA1

      d4981c2a5e3b2103c9cd8935975b5903ac447127

      SHA256

      8ce8e777f4dd94be7f0d91f5d60512e2c3f01b7bcb151c80d3db7ece34e9be68

      SHA512

      d4ba068055e54f03e7e6eb715eebbdf71b9ac586cf4e510fd4a29a0909236d986bdb5202922e0159f1a32872bb938518cae6ed9201b97db044ba4bc11e97cb5e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr670733.exe
      Filesize

      175KB

      MD5

      0accd8931ea4727fde0fb88c312aec3f

      SHA1

      d4981c2a5e3b2103c9cd8935975b5903ac447127

      SHA256

      8ce8e777f4dd94be7f0d91f5d60512e2c3f01b7bcb151c80d3db7ece34e9be68

      SHA512

      d4ba068055e54f03e7e6eb715eebbdf71b9ac586cf4e510fd4a29a0909236d986bdb5202922e0159f1a32872bb938518cae6ed9201b97db044ba4bc11e97cb5e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEV7492.exe
      Filesize

      392KB

      MD5

      aa4c3a7a998951e26071977a4984d3dd

      SHA1

      d53078ba0f40dc0f4514b3c3ddb0c9cb247278c9

      SHA256

      b45e5aa793451d37c21e899d8fd028d86884c0d8ade94ce242c98941b2c6fd91

      SHA512

      09f07f7691c48cacbf321e285cba5563aea5c8effe7850540c09cc5caf1a21a6c403819c7a06ca9baa50e998c6b81c699c22fed2215e10b97b17879907b1fbfa

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEV7492.exe
      Filesize

      392KB

      MD5

      aa4c3a7a998951e26071977a4984d3dd

      SHA1

      d53078ba0f40dc0f4514b3c3ddb0c9cb247278c9

      SHA256

      b45e5aa793451d37c21e899d8fd028d86884c0d8ade94ce242c98941b2c6fd91

      SHA512

      09f07f7691c48cacbf321e285cba5563aea5c8effe7850540c09cc5caf1a21a6c403819c7a06ca9baa50e998c6b81c699c22fed2215e10b97b17879907b1fbfa

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr941047.exe
      Filesize

      11KB

      MD5

      817b8fd52c65af45a2a8c422d055d532

      SHA1

      e8204336f5c8ecd2e3c0ff32b6f4a52cdef8d70c

      SHA256

      655fe5a470d9092f10056b63276ed320c54d9a1fbd723c38e58887c706260b25

      SHA512

      fb0fc0f269614041f855352a55cf9856b8d254ccd31d5a4176872c6ea359e8786c35186ec9a111d8c6da806dc9dcc72f0f9171ffc101474b1eca7cec52ed0a14

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr941047.exe
      Filesize

      11KB

      MD5

      817b8fd52c65af45a2a8c422d055d532

      SHA1

      e8204336f5c8ecd2e3c0ff32b6f4a52cdef8d70c

      SHA256

      655fe5a470d9092f10056b63276ed320c54d9a1fbd723c38e58887c706260b25

      SHA512

      fb0fc0f269614041f855352a55cf9856b8d254ccd31d5a4176872c6ea359e8786c35186ec9a111d8c6da806dc9dcc72f0f9171ffc101474b1eca7cec52ed0a14

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku396189.exe
      Filesize

      318KB

      MD5

      7819e81d599fb2646365d032c73582bd

      SHA1

      fcbf98a9f7049746cc609c3947f3ad91fdf398cf

      SHA256

      d3d60bf238b8f28afb123c408d4c759f7f0a270ad80edc1dcc7b8a9b15b0551a

      SHA512

      afd689ec3009c925f6ea61b560239f91d5412abb3a7058eca67bcb867c93546034269520306938f32842231bb6f42666cc843a3ded8afc1afdbc25688eeb65a1

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku396189.exe
      Filesize

      318KB

      MD5

      7819e81d599fb2646365d032c73582bd

      SHA1

      fcbf98a9f7049746cc609c3947f3ad91fdf398cf

      SHA256

      d3d60bf238b8f28afb123c408d4c759f7f0a270ad80edc1dcc7b8a9b15b0551a

      SHA512

      afd689ec3009c925f6ea61b560239f91d5412abb3a7058eca67bcb867c93546034269520306938f32842231bb6f42666cc843a3ded8afc1afdbc25688eeb65a1

    • memory/3996-153-0x0000000000620000-0x000000000066B000-memory.dmp
      Filesize

      300KB

    • memory/3996-154-0x0000000004CB0000-0x0000000005254000-memory.dmp
      Filesize

      5.6MB

    • memory/3996-155-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
      Filesize

      64KB

    • memory/3996-156-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
      Filesize

      64KB

    • memory/3996-157-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
      Filesize

      64KB

    • memory/3996-158-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-159-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-161-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-163-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-165-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-167-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-169-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-171-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-173-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-175-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-177-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-179-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-181-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-183-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-185-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-187-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-189-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-191-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-193-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-195-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-197-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-199-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-203-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-201-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-205-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-207-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-209-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-211-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-213-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-215-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-217-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-219-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-221-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/3996-1064-0x0000000005260000-0x0000000005878000-memory.dmp
      Filesize

      6.1MB

    • memory/3996-1065-0x00000000058A0000-0x00000000059AA000-memory.dmp
      Filesize

      1.0MB

    • memory/3996-1066-0x00000000059E0000-0x00000000059F2000-memory.dmp
      Filesize

      72KB

    • memory/3996-1067-0x0000000005B00000-0x0000000005B3C000-memory.dmp
      Filesize

      240KB

    • memory/3996-1068-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
      Filesize

      64KB

    • memory/3996-1070-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
      Filesize

      64KB

    • memory/3996-1071-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
      Filesize

      64KB

    • memory/3996-1072-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
      Filesize

      64KB

    • memory/3996-1073-0x0000000005CF0000-0x0000000005D82000-memory.dmp
      Filesize

      584KB

    • memory/3996-1074-0x0000000005D90000-0x0000000005DF6000-memory.dmp
      Filesize

      408KB

    • memory/3996-1075-0x00000000064C0000-0x0000000006682000-memory.dmp
      Filesize

      1.8MB

    • memory/3996-1076-0x0000000006690000-0x0000000006BBC000-memory.dmp
      Filesize

      5.2MB

    • memory/3996-1077-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
      Filesize

      64KB

    • memory/3996-1078-0x0000000007130000-0x00000000071A6000-memory.dmp
      Filesize

      472KB

    • memory/3996-1079-0x00000000071C0000-0x0000000007210000-memory.dmp
      Filesize

      320KB

    • memory/4148-1085-0x00000000005D0000-0x0000000000602000-memory.dmp
      Filesize

      200KB

    • memory/4148-1086-0x0000000005170000-0x0000000005180000-memory.dmp
      Filesize

      64KB

    • memory/4216-147-0x00000000000C0000-0x00000000000CA000-memory.dmp
      Filesize

      40KB