Analysis

  • max time kernel
    138s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 19:43

General

  • Target

    181c7eecda058bb07fd25f43f0c8cc8b48ba46e84fbf6c7c30cc67154f552c23.exe

  • Size

    672KB

  • MD5

    dbaeb44c439bdd7d134863310ecc2e85

  • SHA1

    31e97634bebc342b9dba6b618e053968ece82706

  • SHA256

    181c7eecda058bb07fd25f43f0c8cc8b48ba46e84fbf6c7c30cc67154f552c23

  • SHA512

    b55306bf5fac93bd9b2b573b05a447d48c0bc5d06262cfeeff4cd7f658ef9817fc6c4916b45ebcafb3e5ceffde5f028d17047085aa47746b6895eb683bbc327c

  • SSDEEP

    12288:gMray90REzKkHToBEjq0mhWU4YAs8tenObOrbmKJIp9Y/v:qyPzoBE2SMBoTbybs+H

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\181c7eecda058bb07fd25f43f0c8cc8b48ba46e84fbf6c7c30cc67154f552c23.exe
    "C:\Users\Admin\AppData\Local\Temp\181c7eecda058bb07fd25f43f0c8cc8b48ba46e84fbf6c7c30cc67154f552c23.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4628
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un142896.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un142896.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:324
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3907.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3907.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5012
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5012 -s 1080
          4⤵
          • Program crash
          PID:1140
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8764.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8764.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1724
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 1352
          4⤵
          • Program crash
          PID:3964
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si654613.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si654613.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1424
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5012 -ip 5012
    1⤵
      PID:3940
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1724 -ip 1724
      1⤵
        PID:2460

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si654613.exe
        Filesize

        175KB

        MD5

        81e9743f4bf1c221183e3c28fd2467cb

        SHA1

        672be533590a6acae30532264f0de11b6dd6f678

        SHA256

        693289f00555280065bd08df3c166b090499f803cf5df8f3b275edbc1b896c21

        SHA512

        4b1054fc620cf627efb3193af1bff5fa55e56ba3ebebc40160b764fb30ad68b1fa487b9a77e9ab3983d4902570e2c40e53238b7598f12e5f63712e47b9ba379e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si654613.exe
        Filesize

        175KB

        MD5

        81e9743f4bf1c221183e3c28fd2467cb

        SHA1

        672be533590a6acae30532264f0de11b6dd6f678

        SHA256

        693289f00555280065bd08df3c166b090499f803cf5df8f3b275edbc1b896c21

        SHA512

        4b1054fc620cf627efb3193af1bff5fa55e56ba3ebebc40160b764fb30ad68b1fa487b9a77e9ab3983d4902570e2c40e53238b7598f12e5f63712e47b9ba379e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un142896.exe
        Filesize

        530KB

        MD5

        c886ddf9fc1549de80326d8c57a7378b

        SHA1

        64131c11806bf666dc81d859b995c53cfcc22d4c

        SHA256

        bd029790550a9a75e7e7fbdc0bbbb2d44c84afbd1c652c0b7757356d35958ab0

        SHA512

        22bdb1cd562a8bb1719656ccac811fc0f0ad3fddc6bb2c97e47a26cd220afcd4a091a60db75fb866b906e95cbb21deaf1f03f4d43b8480b09459e7441db96166

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un142896.exe
        Filesize

        530KB

        MD5

        c886ddf9fc1549de80326d8c57a7378b

        SHA1

        64131c11806bf666dc81d859b995c53cfcc22d4c

        SHA256

        bd029790550a9a75e7e7fbdc0bbbb2d44c84afbd1c652c0b7757356d35958ab0

        SHA512

        22bdb1cd562a8bb1719656ccac811fc0f0ad3fddc6bb2c97e47a26cd220afcd4a091a60db75fb866b906e95cbb21deaf1f03f4d43b8480b09459e7441db96166

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3907.exe
        Filesize

        260KB

        MD5

        5f9acbd75e4e20de41c6de3d1224774f

        SHA1

        a82cafddece6e09214dd39118cf2bfe48806cf0c

        SHA256

        7d3f6558b05ff5c69bcc851d51bcbd4e598123777c82987da4b52d1d146ed29d

        SHA512

        4953e93060668eda59235d411d12e04dce1fd9163b918a5c206e2e5c859f692283ffb99a8d996c254ce8e145c0b95997b3710d553a5a3031d3267b801808dc71

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3907.exe
        Filesize

        260KB

        MD5

        5f9acbd75e4e20de41c6de3d1224774f

        SHA1

        a82cafddece6e09214dd39118cf2bfe48806cf0c

        SHA256

        7d3f6558b05ff5c69bcc851d51bcbd4e598123777c82987da4b52d1d146ed29d

        SHA512

        4953e93060668eda59235d411d12e04dce1fd9163b918a5c206e2e5c859f692283ffb99a8d996c254ce8e145c0b95997b3710d553a5a3031d3267b801808dc71

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8764.exe
        Filesize

        318KB

        MD5

        a351bfd4cb42dde576bc0a6e2675d492

        SHA1

        9f9afca882ddaa05cc63a36bef6bad1cbe30f058

        SHA256

        02c5f4d63664e3448ab72cd5fa15409afbbeed1caa9c4e1768f827aace869dd9

        SHA512

        c985924cabee8c77cf930439ffb1aead2a1518ba94fe9d88089389a1040355f40c865e3115ea6ac13d1e5717ec7be4e1e246f675711265d719d8a77d0dc044ae

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8764.exe
        Filesize

        318KB

        MD5

        a351bfd4cb42dde576bc0a6e2675d492

        SHA1

        9f9afca882ddaa05cc63a36bef6bad1cbe30f058

        SHA256

        02c5f4d63664e3448ab72cd5fa15409afbbeed1caa9c4e1768f827aace869dd9

        SHA512

        c985924cabee8c77cf930439ffb1aead2a1518ba94fe9d88089389a1040355f40c865e3115ea6ac13d1e5717ec7be4e1e246f675711265d719d8a77d0dc044ae

      • memory/1424-1122-0x0000000005750000-0x0000000005760000-memory.dmp
        Filesize

        64KB

      • memory/1424-1121-0x0000000000E50000-0x0000000000E82000-memory.dmp
        Filesize

        200KB

      • memory/1724-227-0x0000000002740000-0x000000000277F000-memory.dmp
        Filesize

        252KB

      • memory/1724-1104-0x0000000002590000-0x00000000025A0000-memory.dmp
        Filesize

        64KB

      • memory/1724-1115-0x0000000002590000-0x00000000025A0000-memory.dmp
        Filesize

        64KB

      • memory/1724-1114-0x0000000008010000-0x0000000008060000-memory.dmp
        Filesize

        320KB

      • memory/1724-1113-0x0000000007F80000-0x0000000007FF6000-memory.dmp
        Filesize

        472KB

      • memory/1724-1112-0x0000000006650000-0x0000000006B7C000-memory.dmp
        Filesize

        5.2MB

      • memory/1724-1111-0x0000000006470000-0x0000000006632000-memory.dmp
        Filesize

        1.8MB

      • memory/1724-1110-0x0000000002590000-0x00000000025A0000-memory.dmp
        Filesize

        64KB

      • memory/1724-1109-0x0000000002590000-0x00000000025A0000-memory.dmp
        Filesize

        64KB

      • memory/1724-1108-0x0000000002590000-0x00000000025A0000-memory.dmp
        Filesize

        64KB

      • memory/1724-1107-0x0000000005C50000-0x0000000005CB6000-memory.dmp
        Filesize

        408KB

      • memory/1724-1106-0x0000000005BB0000-0x0000000005C42000-memory.dmp
        Filesize

        584KB

      • memory/1724-1103-0x00000000058C0000-0x00000000058FC000-memory.dmp
        Filesize

        240KB

      • memory/1724-1102-0x00000000058A0000-0x00000000058B2000-memory.dmp
        Filesize

        72KB

      • memory/1724-1101-0x0000000005760000-0x000000000586A000-memory.dmp
        Filesize

        1.0MB

      • memory/1724-1100-0x0000000005100000-0x0000000005718000-memory.dmp
        Filesize

        6.1MB

      • memory/1724-225-0x0000000002740000-0x000000000277F000-memory.dmp
        Filesize

        252KB

      • memory/1724-219-0x0000000002590000-0x00000000025A0000-memory.dmp
        Filesize

        64KB

      • memory/1724-223-0x0000000002740000-0x000000000277F000-memory.dmp
        Filesize

        252KB

      • memory/1724-221-0x0000000002590000-0x00000000025A0000-memory.dmp
        Filesize

        64KB

      • memory/1724-220-0x0000000002740000-0x000000000277F000-memory.dmp
        Filesize

        252KB

      • memory/1724-191-0x0000000002740000-0x000000000277F000-memory.dmp
        Filesize

        252KB

      • memory/1724-192-0x0000000002740000-0x000000000277F000-memory.dmp
        Filesize

        252KB

      • memory/1724-194-0x0000000002740000-0x000000000277F000-memory.dmp
        Filesize

        252KB

      • memory/1724-196-0x0000000002740000-0x000000000277F000-memory.dmp
        Filesize

        252KB

      • memory/1724-198-0x0000000002740000-0x000000000277F000-memory.dmp
        Filesize

        252KB

      • memory/1724-200-0x0000000002740000-0x000000000277F000-memory.dmp
        Filesize

        252KB

      • memory/1724-202-0x0000000002740000-0x000000000277F000-memory.dmp
        Filesize

        252KB

      • memory/1724-204-0x0000000002740000-0x000000000277F000-memory.dmp
        Filesize

        252KB

      • memory/1724-208-0x0000000002740000-0x000000000277F000-memory.dmp
        Filesize

        252KB

      • memory/1724-206-0x0000000002740000-0x000000000277F000-memory.dmp
        Filesize

        252KB

      • memory/1724-210-0x0000000002740000-0x000000000277F000-memory.dmp
        Filesize

        252KB

      • memory/1724-212-0x0000000002740000-0x000000000277F000-memory.dmp
        Filesize

        252KB

      • memory/1724-214-0x0000000002740000-0x000000000277F000-memory.dmp
        Filesize

        252KB

      • memory/1724-217-0x0000000000650000-0x000000000069B000-memory.dmp
        Filesize

        300KB

      • memory/1724-216-0x0000000002740000-0x000000000277F000-memory.dmp
        Filesize

        252KB

      • memory/5012-153-0x0000000002540000-0x0000000002552000-memory.dmp
        Filesize

        72KB

      • memory/5012-184-0x0000000004BC0000-0x0000000004BD0000-memory.dmp
        Filesize

        64KB

      • memory/5012-159-0x0000000002540000-0x0000000002552000-memory.dmp
        Filesize

        72KB

      • memory/5012-185-0x0000000004BC0000-0x0000000004BD0000-memory.dmp
        Filesize

        64KB

      • memory/5012-155-0x0000000002540000-0x0000000002552000-memory.dmp
        Filesize

        72KB

      • memory/5012-161-0x0000000002540000-0x0000000002552000-memory.dmp
        Filesize

        72KB

      • memory/5012-183-0x0000000004BC0000-0x0000000004BD0000-memory.dmp
        Filesize

        64KB

      • memory/5012-165-0x0000000002540000-0x0000000002552000-memory.dmp
        Filesize

        72KB

      • memory/5012-178-0x0000000004BC0000-0x0000000004BD0000-memory.dmp
        Filesize

        64KB

      • memory/5012-180-0x0000000004BC0000-0x0000000004BD0000-memory.dmp
        Filesize

        64KB

      • memory/5012-157-0x0000000002540000-0x0000000002552000-memory.dmp
        Filesize

        72KB

      • memory/5012-179-0x0000000004BC0000-0x0000000004BD0000-memory.dmp
        Filesize

        64KB

      • memory/5012-186-0x0000000000400000-0x00000000004B1000-memory.dmp
        Filesize

        708KB

      • memory/5012-163-0x0000000002540000-0x0000000002552000-memory.dmp
        Filesize

        72KB

      • memory/5012-181-0x0000000000400000-0x00000000004B1000-memory.dmp
        Filesize

        708KB

      • memory/5012-171-0x0000000002540000-0x0000000002552000-memory.dmp
        Filesize

        72KB

      • memory/5012-175-0x0000000002540000-0x0000000002552000-memory.dmp
        Filesize

        72KB

      • memory/5012-177-0x0000000002540000-0x0000000002552000-memory.dmp
        Filesize

        72KB

      • memory/5012-173-0x0000000002540000-0x0000000002552000-memory.dmp
        Filesize

        72KB

      • memory/5012-169-0x0000000002540000-0x0000000002552000-memory.dmp
        Filesize

        72KB

      • memory/5012-167-0x0000000002540000-0x0000000002552000-memory.dmp
        Filesize

        72KB

      • memory/5012-151-0x0000000002540000-0x0000000002552000-memory.dmp
        Filesize

        72KB

      • memory/5012-150-0x0000000002540000-0x0000000002552000-memory.dmp
        Filesize

        72KB

      • memory/5012-149-0x0000000004BD0000-0x0000000005174000-memory.dmp
        Filesize

        5.6MB

      • memory/5012-148-0x0000000000610000-0x000000000063D000-memory.dmp
        Filesize

        180KB