Analysis

  • max time kernel
    101s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 19:38

General

  • Target

    4d39d3ea20034bcf66e46c66cdadc711bf141129051410376f4c0653e6ef3d85.exe

  • Size

    672KB

  • MD5

    c71af969e12e95e8a59dfb0b9181e898

  • SHA1

    9f7ed344ae29c06bae075a0bf442737ab5debbc8

  • SHA256

    4d39d3ea20034bcf66e46c66cdadc711bf141129051410376f4c0653e6ef3d85

  • SHA512

    1bb3a65eea2827543713d446bf43e8ec3c4f729ec7ec93209f67aedcd5d0a744ca95d52dca1a536ee22042355b9c67d782fc316490d9c958382a5c85a92c7518

  • SSDEEP

    12288:EMrLy90iCrqXyrhMkG/nQEgph3i8SbOb2r4mq47aNn:HyDCrL8O3iWbXbzR

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d39d3ea20034bcf66e46c66cdadc711bf141129051410376f4c0653e6ef3d85.exe
    "C:\Users\Admin\AppData\Local\Temp\4d39d3ea20034bcf66e46c66cdadc711bf141129051410376f4c0653e6ef3d85.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4672
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un528901.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un528901.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4768
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4494.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4494.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1340
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1340 -s 1084
          4⤵
          • Program crash
          PID:2524
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2330.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2330.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4792
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 1340
          4⤵
          • Program crash
          PID:2728
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si913239.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si913239.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5012
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1340 -ip 1340
    1⤵
      PID:3560
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4792 -ip 4792
      1⤵
        PID:4432

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si913239.exe
        Filesize

        175KB

        MD5

        8bf09cec6f0799a089b4bb4029b35f64

        SHA1

        0c6a97a18daf14849d6f6c28e0225e860e1455f8

        SHA256

        d8a279d1a5bfbd09e00933abde819249504df0316fd9f4b3876a5d7344095302

        SHA512

        58289e6082eb92281dfdb01744ad0738df07e41872e238638ebf51304043067a0599f24d6102cefc42a8531e467d6cfcd6342274ad498c903cf039299ef2d5d7

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si913239.exe
        Filesize

        175KB

        MD5

        8bf09cec6f0799a089b4bb4029b35f64

        SHA1

        0c6a97a18daf14849d6f6c28e0225e860e1455f8

        SHA256

        d8a279d1a5bfbd09e00933abde819249504df0316fd9f4b3876a5d7344095302

        SHA512

        58289e6082eb92281dfdb01744ad0738df07e41872e238638ebf51304043067a0599f24d6102cefc42a8531e467d6cfcd6342274ad498c903cf039299ef2d5d7

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un528901.exe
        Filesize

        530KB

        MD5

        e326555ace77887acb1bcd5bb1759d5f

        SHA1

        62c7434ce6fd6bc78cb747b319f5451dab791103

        SHA256

        070f87bf3c9029dbd933dc3d531b01c304bb12e88f4732e4f87b73e9d6d330cf

        SHA512

        cb17572ac116692d8b0d14e0ea4bfbf50b5cad90ae83de869d2b051eab41376c706099a0d3e62abe728a4f780bd3f9eefe15505f07cd587fd3c08e2588d7ff3e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un528901.exe
        Filesize

        530KB

        MD5

        e326555ace77887acb1bcd5bb1759d5f

        SHA1

        62c7434ce6fd6bc78cb747b319f5451dab791103

        SHA256

        070f87bf3c9029dbd933dc3d531b01c304bb12e88f4732e4f87b73e9d6d330cf

        SHA512

        cb17572ac116692d8b0d14e0ea4bfbf50b5cad90ae83de869d2b051eab41376c706099a0d3e62abe728a4f780bd3f9eefe15505f07cd587fd3c08e2588d7ff3e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4494.exe
        Filesize

        260KB

        MD5

        6becaadf7a1a18982270ce3d1390e37a

        SHA1

        acbe774bfc13f8ebfa71fd3f473a618195e028cd

        SHA256

        1a1bac7d029c2177dfd78688686875144b791d4a1f0f719e6a3c54b1583099a8

        SHA512

        835a29be8b374076879c1fc41c244a56988893d133c41aaa3e0cb9dd1b50ee9be31e78e8cd0328b5e3f3b3919ba732672e419f6f3c664391fea089be490237de

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4494.exe
        Filesize

        260KB

        MD5

        6becaadf7a1a18982270ce3d1390e37a

        SHA1

        acbe774bfc13f8ebfa71fd3f473a618195e028cd

        SHA256

        1a1bac7d029c2177dfd78688686875144b791d4a1f0f719e6a3c54b1583099a8

        SHA512

        835a29be8b374076879c1fc41c244a56988893d133c41aaa3e0cb9dd1b50ee9be31e78e8cd0328b5e3f3b3919ba732672e419f6f3c664391fea089be490237de

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2330.exe
        Filesize

        318KB

        MD5

        77e3e55caff7210ed79061a6af9a836d

        SHA1

        300784b44012eb00e609e0b62cb081c510e2755c

        SHA256

        735277e227fb21401e4502bca5915f92354e5d18d0603745a5e43b15f3b90328

        SHA512

        d597c8b118d49a2d7c56701bff8fc2ab94b2a2f659bda740b2cc9af88126d9e8e9741d91a348ca93d2f0b8857620beb8270d384afbf4ee24a1ee6d47a5ea0c14

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2330.exe
        Filesize

        318KB

        MD5

        77e3e55caff7210ed79061a6af9a836d

        SHA1

        300784b44012eb00e609e0b62cb081c510e2755c

        SHA256

        735277e227fb21401e4502bca5915f92354e5d18d0603745a5e43b15f3b90328

        SHA512

        d597c8b118d49a2d7c56701bff8fc2ab94b2a2f659bda740b2cc9af88126d9e8e9741d91a348ca93d2f0b8857620beb8270d384afbf4ee24a1ee6d47a5ea0c14

      • memory/1340-148-0x0000000004D50000-0x00000000052F4000-memory.dmp
        Filesize

        5.6MB

      • memory/1340-149-0x00000000024C0000-0x00000000024D2000-memory.dmp
        Filesize

        72KB

      • memory/1340-150-0x00000000024C0000-0x00000000024D2000-memory.dmp
        Filesize

        72KB

      • memory/1340-152-0x00000000024C0000-0x00000000024D2000-memory.dmp
        Filesize

        72KB

      • memory/1340-154-0x00000000024C0000-0x00000000024D2000-memory.dmp
        Filesize

        72KB

      • memory/1340-156-0x00000000024C0000-0x00000000024D2000-memory.dmp
        Filesize

        72KB

      • memory/1340-158-0x00000000024C0000-0x00000000024D2000-memory.dmp
        Filesize

        72KB

      • memory/1340-160-0x00000000024C0000-0x00000000024D2000-memory.dmp
        Filesize

        72KB

      • memory/1340-163-0x00000000024C0000-0x00000000024D2000-memory.dmp
        Filesize

        72KB

      • memory/1340-162-0x0000000000660000-0x000000000068D000-memory.dmp
        Filesize

        180KB

      • memory/1340-164-0x0000000004D40000-0x0000000004D50000-memory.dmp
        Filesize

        64KB

      • memory/1340-167-0x00000000024C0000-0x00000000024D2000-memory.dmp
        Filesize

        72KB

      • memory/1340-166-0x0000000004D40000-0x0000000004D50000-memory.dmp
        Filesize

        64KB

      • memory/1340-170-0x00000000024C0000-0x00000000024D2000-memory.dmp
        Filesize

        72KB

      • memory/1340-168-0x0000000004D40000-0x0000000004D50000-memory.dmp
        Filesize

        64KB

      • memory/1340-172-0x00000000024C0000-0x00000000024D2000-memory.dmp
        Filesize

        72KB

      • memory/1340-174-0x00000000024C0000-0x00000000024D2000-memory.dmp
        Filesize

        72KB

      • memory/1340-176-0x00000000024C0000-0x00000000024D2000-memory.dmp
        Filesize

        72KB

      • memory/1340-178-0x00000000024C0000-0x00000000024D2000-memory.dmp
        Filesize

        72KB

      • memory/1340-180-0x00000000024C0000-0x00000000024D2000-memory.dmp
        Filesize

        72KB

      • memory/1340-181-0x0000000000400000-0x00000000004B1000-memory.dmp
        Filesize

        708KB

      • memory/1340-183-0x0000000004D40000-0x0000000004D50000-memory.dmp
        Filesize

        64KB

      • memory/1340-184-0x0000000004D40000-0x0000000004D50000-memory.dmp
        Filesize

        64KB

      • memory/1340-185-0x0000000004D40000-0x0000000004D50000-memory.dmp
        Filesize

        64KB

      • memory/1340-186-0x0000000000400000-0x00000000004B1000-memory.dmp
        Filesize

        708KB

      • memory/4792-192-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/4792-191-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/4792-194-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/4792-196-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/4792-198-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/4792-200-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/4792-202-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/4792-204-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/4792-206-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/4792-208-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/4792-210-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/4792-213-0x0000000000620000-0x000000000066B000-memory.dmp
        Filesize

        300KB

      • memory/4792-212-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/4792-214-0x0000000004D90000-0x0000000004DA0000-memory.dmp
        Filesize

        64KB

      • memory/4792-217-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/4792-216-0x0000000004D90000-0x0000000004DA0000-memory.dmp
        Filesize

        64KB

      • memory/4792-219-0x0000000004D90000-0x0000000004DA0000-memory.dmp
        Filesize

        64KB

      • memory/4792-220-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/4792-222-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/4792-224-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/4792-226-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/4792-228-0x0000000002630000-0x000000000266F000-memory.dmp
        Filesize

        252KB

      • memory/4792-1101-0x0000000005350000-0x0000000005968000-memory.dmp
        Filesize

        6.1MB

      • memory/4792-1102-0x0000000004BF0000-0x0000000004CFA000-memory.dmp
        Filesize

        1.0MB

      • memory/4792-1103-0x0000000002860000-0x0000000002872000-memory.dmp
        Filesize

        72KB

      • memory/4792-1104-0x0000000004D00000-0x0000000004D3C000-memory.dmp
        Filesize

        240KB

      • memory/4792-1105-0x0000000004D90000-0x0000000004DA0000-memory.dmp
        Filesize

        64KB

      • memory/4792-1106-0x0000000005BB0000-0x0000000005C42000-memory.dmp
        Filesize

        584KB

      • memory/4792-1107-0x0000000005C50000-0x0000000005CB6000-memory.dmp
        Filesize

        408KB

      • memory/4792-1109-0x0000000006470000-0x0000000006632000-memory.dmp
        Filesize

        1.8MB

      • memory/4792-1110-0x0000000006650000-0x0000000006B7C000-memory.dmp
        Filesize

        5.2MB

      • memory/4792-1111-0x0000000004D90000-0x0000000004DA0000-memory.dmp
        Filesize

        64KB

      • memory/4792-1112-0x0000000004D90000-0x0000000004DA0000-memory.dmp
        Filesize

        64KB

      • memory/4792-1113-0x0000000004D90000-0x0000000004DA0000-memory.dmp
        Filesize

        64KB

      • memory/4792-1114-0x0000000004D90000-0x0000000004DA0000-memory.dmp
        Filesize

        64KB

      • memory/4792-1115-0x0000000006E00000-0x0000000006E76000-memory.dmp
        Filesize

        472KB

      • memory/4792-1116-0x0000000006E80000-0x0000000006ED0000-memory.dmp
        Filesize

        320KB

      • memory/5012-1122-0x0000000000D00000-0x0000000000D32000-memory.dmp
        Filesize

        200KB

      • memory/5012-1123-0x0000000005610000-0x0000000005620000-memory.dmp
        Filesize

        64KB