Analysis

  • max time kernel
    56s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 19:46

General

  • Target

    d093ca69279f103dc61f4da19359f5f973b885d2523c633981e33025199ccbbb.exe

  • Size

    672KB

  • MD5

    34535c92aa52450feef025eec1757d82

  • SHA1

    197e5357b9e33b9553729ecedaa51008a94c6197

  • SHA256

    d093ca69279f103dc61f4da19359f5f973b885d2523c633981e33025199ccbbb

  • SHA512

    4f740f69b41d4b4e96b108082bc9e78e8bcd16328fad79be81d281754023b92bb9b038cce16937c4d067d2436c2858efb9c979c659654eafb2f8815f3ee3bd1b

  • SSDEEP

    12288:IOMr8y9014ZmfDhO/tccTM1lEW9R5bJ+oVArY6KUC6ObprZmhJ4aCO7:VyI1DhO/t7M8OnE0ArepbbQe67

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d093ca69279f103dc61f4da19359f5f973b885d2523c633981e33025199ccbbb.exe
    "C:\Users\Admin\AppData\Local\Temp\d093ca69279f103dc61f4da19359f5f973b885d2523c633981e33025199ccbbb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un340640.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un340640.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4800
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6130.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6130.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4804
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 1084
          4⤵
          • Program crash
          PID:3300
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2233.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2233.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4468
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 1336
          4⤵
          • Program crash
          PID:1648
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si285908.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si285908.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3516
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4804 -ip 4804
    1⤵
      PID:2596
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4468 -ip 4468
      1⤵
        PID:3800

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si285908.exe
        Filesize

        175KB

        MD5

        34e5a7191102fabb414fb596c7a3acdd

        SHA1

        c0a22106e4b26adca927e51334e58a1c6b0bf9fd

        SHA256

        e6a3cc04f5c2fb39acfa874a7190053ac154df7f7207206aac4885464467e5c9

        SHA512

        5b6df410bd89e5f770b4d4fbadb5fbd8e81dd31347a249996b5481e234a5ed519cea1111f70422381dd3152f1eb9be4abe21887efadbed5624d3f4c519bcd68e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si285908.exe
        Filesize

        175KB

        MD5

        34e5a7191102fabb414fb596c7a3acdd

        SHA1

        c0a22106e4b26adca927e51334e58a1c6b0bf9fd

        SHA256

        e6a3cc04f5c2fb39acfa874a7190053ac154df7f7207206aac4885464467e5c9

        SHA512

        5b6df410bd89e5f770b4d4fbadb5fbd8e81dd31347a249996b5481e234a5ed519cea1111f70422381dd3152f1eb9be4abe21887efadbed5624d3f4c519bcd68e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un340640.exe
        Filesize

        530KB

        MD5

        a886de9501d80c41b8f457f7ac20b750

        SHA1

        ba6bf16d7f0af88229b2852ce18085fb78fa0fed

        SHA256

        118a302bf04404fc719770f8f2b56348a04c138a4d0060aa1719976888dac7da

        SHA512

        3d43884b592aaa0722bd220dddcccf9f3b0339c798d18c1473c7db2e8ee563b51dfbe62cacc18196ce9693e5cdf895549531c0b1dd25d8f7f0051c40999404f0

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un340640.exe
        Filesize

        530KB

        MD5

        a886de9501d80c41b8f457f7ac20b750

        SHA1

        ba6bf16d7f0af88229b2852ce18085fb78fa0fed

        SHA256

        118a302bf04404fc719770f8f2b56348a04c138a4d0060aa1719976888dac7da

        SHA512

        3d43884b592aaa0722bd220dddcccf9f3b0339c798d18c1473c7db2e8ee563b51dfbe62cacc18196ce9693e5cdf895549531c0b1dd25d8f7f0051c40999404f0

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6130.exe
        Filesize

        260KB

        MD5

        8dbf48596bf39088e8ef8d9102d16216

        SHA1

        817a3770c58a9590c81dab5a421012f88be94f3f

        SHA256

        f3139e19d273cfee1b66bcd847fd58546e475e48e08efd302351439eec6df5d9

        SHA512

        c98f22624d19025e79a862c62a42ba67d994630f0a0253953c05ea39e064109912b9d983b97153e278328d3e1f3cf66936a219f3f8e1782b0742446308e0fcca

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6130.exe
        Filesize

        260KB

        MD5

        8dbf48596bf39088e8ef8d9102d16216

        SHA1

        817a3770c58a9590c81dab5a421012f88be94f3f

        SHA256

        f3139e19d273cfee1b66bcd847fd58546e475e48e08efd302351439eec6df5d9

        SHA512

        c98f22624d19025e79a862c62a42ba67d994630f0a0253953c05ea39e064109912b9d983b97153e278328d3e1f3cf66936a219f3f8e1782b0742446308e0fcca

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2233.exe
        Filesize

        318KB

        MD5

        16dfa81b5098e3e0e2065cefca3f8dc0

        SHA1

        fe45f556503f2896bc0b2d7a0e46195b77ad8896

        SHA256

        59149f544bae4dab0704d5dfa8c82a06ce35c22ea02bdf79519e5b370fd26d31

        SHA512

        42d6ce0c8ad968c375ee6a3b2a06b65ea1d5edda2887dd5f2208aac780c290fdcb89c2b6f03ba59d6d839b5ad5abaad861e6ec5bd41884c76fa0bd90ca941c78

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2233.exe
        Filesize

        318KB

        MD5

        16dfa81b5098e3e0e2065cefca3f8dc0

        SHA1

        fe45f556503f2896bc0b2d7a0e46195b77ad8896

        SHA256

        59149f544bae4dab0704d5dfa8c82a06ce35c22ea02bdf79519e5b370fd26d31

        SHA512

        42d6ce0c8ad968c375ee6a3b2a06b65ea1d5edda2887dd5f2208aac780c290fdcb89c2b6f03ba59d6d839b5ad5abaad861e6ec5bd41884c76fa0bd90ca941c78

      • memory/3516-1123-0x00000000053E0000-0x00000000053F0000-memory.dmp
        Filesize

        64KB

      • memory/3516-1122-0x0000000000AE0000-0x0000000000B12000-memory.dmp
        Filesize

        200KB

      • memory/4468-1102-0x0000000005760000-0x000000000586A000-memory.dmp
        Filesize

        1.0MB

      • memory/4468-1104-0x00000000058C0000-0x00000000058FC000-memory.dmp
        Filesize

        240KB

      • memory/4468-1116-0x0000000006AA0000-0x0000000006FCC000-memory.dmp
        Filesize

        5.2MB

      • memory/4468-1115-0x00000000068D0000-0x0000000006A92000-memory.dmp
        Filesize

        1.8MB

      • memory/4468-1114-0x0000000004B20000-0x0000000004B30000-memory.dmp
        Filesize

        64KB

      • memory/4468-1113-0x00000000064F0000-0x0000000006540000-memory.dmp
        Filesize

        320KB

      • memory/4468-1112-0x0000000006450000-0x00000000064C6000-memory.dmp
        Filesize

        472KB

      • memory/4468-1111-0x0000000004B20000-0x0000000004B30000-memory.dmp
        Filesize

        64KB

      • memory/4468-1110-0x0000000004B20000-0x0000000004B30000-memory.dmp
        Filesize

        64KB

      • memory/4468-1109-0x0000000004B20000-0x0000000004B30000-memory.dmp
        Filesize

        64KB

      • memory/4468-1107-0x0000000005C50000-0x0000000005CB6000-memory.dmp
        Filesize

        408KB

      • memory/4468-1106-0x0000000005BB0000-0x0000000005C42000-memory.dmp
        Filesize

        584KB

      • memory/4468-1105-0x0000000004B20000-0x0000000004B30000-memory.dmp
        Filesize

        64KB

      • memory/4468-1103-0x00000000058A0000-0x00000000058B2000-memory.dmp
        Filesize

        72KB

      • memory/4468-1101-0x00000000050E0000-0x00000000056F8000-memory.dmp
        Filesize

        6.1MB

      • memory/4468-228-0x0000000004A60000-0x0000000004A9F000-memory.dmp
        Filesize

        252KB

      • memory/4468-226-0x0000000004A60000-0x0000000004A9F000-memory.dmp
        Filesize

        252KB

      • memory/4468-224-0x0000000004A60000-0x0000000004A9F000-memory.dmp
        Filesize

        252KB

      • memory/4468-222-0x0000000004A60000-0x0000000004A9F000-memory.dmp
        Filesize

        252KB

      • memory/4468-220-0x0000000004A60000-0x0000000004A9F000-memory.dmp
        Filesize

        252KB

      • memory/4468-218-0x0000000004A60000-0x0000000004A9F000-memory.dmp
        Filesize

        252KB

      • memory/4468-191-0x00000000020D0000-0x000000000211B000-memory.dmp
        Filesize

        300KB

      • memory/4468-195-0x0000000004A60000-0x0000000004A9F000-memory.dmp
        Filesize

        252KB

      • memory/4468-196-0x0000000004B20000-0x0000000004B30000-memory.dmp
        Filesize

        64KB

      • memory/4468-194-0x0000000004B20000-0x0000000004B30000-memory.dmp
        Filesize

        64KB

      • memory/4468-193-0x0000000004A60000-0x0000000004A9F000-memory.dmp
        Filesize

        252KB

      • memory/4468-192-0x0000000004B20000-0x0000000004B30000-memory.dmp
        Filesize

        64KB

      • memory/4468-198-0x0000000004A60000-0x0000000004A9F000-memory.dmp
        Filesize

        252KB

      • memory/4468-200-0x0000000004A60000-0x0000000004A9F000-memory.dmp
        Filesize

        252KB

      • memory/4468-202-0x0000000004A60000-0x0000000004A9F000-memory.dmp
        Filesize

        252KB

      • memory/4468-204-0x0000000004A60000-0x0000000004A9F000-memory.dmp
        Filesize

        252KB

      • memory/4468-206-0x0000000004A60000-0x0000000004A9F000-memory.dmp
        Filesize

        252KB

      • memory/4468-208-0x0000000004A60000-0x0000000004A9F000-memory.dmp
        Filesize

        252KB

      • memory/4468-210-0x0000000004A60000-0x0000000004A9F000-memory.dmp
        Filesize

        252KB

      • memory/4468-212-0x0000000004A60000-0x0000000004A9F000-memory.dmp
        Filesize

        252KB

      • memory/4468-214-0x0000000004A60000-0x0000000004A9F000-memory.dmp
        Filesize

        252KB

      • memory/4468-216-0x0000000004A60000-0x0000000004A9F000-memory.dmp
        Filesize

        252KB

      • memory/4804-174-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/4804-183-0x0000000004AB0000-0x0000000004AC0000-memory.dmp
        Filesize

        64KB

      • memory/4804-153-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/4804-184-0x0000000004AB0000-0x0000000004AC0000-memory.dmp
        Filesize

        64KB

      • memory/4804-172-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/4804-182-0x0000000004AB0000-0x0000000004AC0000-memory.dmp
        Filesize

        64KB

      • memory/4804-181-0x0000000000400000-0x00000000004B1000-memory.dmp
        Filesize

        708KB

      • memory/4804-170-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/4804-180-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/4804-156-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/4804-178-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/4804-176-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/4804-186-0x0000000000400000-0x00000000004B1000-memory.dmp
        Filesize

        708KB

      • memory/4804-154-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/4804-152-0x0000000004AB0000-0x0000000004AC0000-memory.dmp
        Filesize

        64KB

      • memory/4804-168-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/4804-166-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/4804-164-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/4804-162-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/4804-160-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/4804-158-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/4804-151-0x0000000004AB0000-0x0000000004AC0000-memory.dmp
        Filesize

        64KB

      • memory/4804-150-0x0000000004AB0000-0x0000000004AC0000-memory.dmp
        Filesize

        64KB

      • memory/4804-149-0x0000000002120000-0x000000000214D000-memory.dmp
        Filesize

        180KB

      • memory/4804-148-0x0000000004AC0000-0x0000000005064000-memory.dmp
        Filesize

        5.6MB