Analysis

  • max time kernel
    91s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 19:49

General

  • Target

    fb39016d028464bf277db075198c210d4468caa8ea72a9fdff033790565dd2a8.exe

  • Size

    673KB

  • MD5

    51e5e3596af59c7158466f9a86e0f2e6

  • SHA1

    33b1f014398128e2242ecb111386e5e82025ca4a

  • SHA256

    fb39016d028464bf277db075198c210d4468caa8ea72a9fdff033790565dd2a8

  • SHA512

    cb289f5fbb0da169f600139f820fa470dde296ba3a3bf39a84c24f74d51b2ab935c429c7d4c0a84bf80c083615d86ac48d29091c2734f9399154eb9689a7c4a9

  • SSDEEP

    12288:qMr6y90+NQ2ZB0LMM+/+ZmndxkKl8W9RjciJ+ofse2GTp872tJObSrWmKl+lBTqH:sysyDR/+ZmdxkLOFLEh7upibbzlBqw

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb39016d028464bf277db075198c210d4468caa8ea72a9fdff033790565dd2a8.exe
    "C:\Users\Admin\AppData\Local\Temp\fb39016d028464bf277db075198c210d4468caa8ea72a9fdff033790565dd2a8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4360
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un222285.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un222285.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1988
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4497.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4497.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:740
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 1080
          4⤵
          • Program crash
          PID:2156
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9469.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9469.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4412
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 1820
          4⤵
          • Program crash
          PID:2388
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si989310.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si989310.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3700
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 740 -ip 740
    1⤵
      PID:2752
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4412 -ip 4412
      1⤵
        PID:4628

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si989310.exe
        Filesize

        175KB

        MD5

        92036d341ec542251d04279c35987004

        SHA1

        06f3c01f11603c4ea8c3b37352a1aaf7e9ccb814

        SHA256

        bdc6333aa660b06102e0693dea3cc50e08c51efb67ddea48e13f67b5b731c9d6

        SHA512

        32e95b83f2f1b6530b345726fd43ef23d21fcc5cc06ab198d61ca92a36f2891fa952f778ab7ec87aa0d284a6f8daf68a6dae8761de3ee629df0048cdfa0226e3

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si989310.exe
        Filesize

        175KB

        MD5

        92036d341ec542251d04279c35987004

        SHA1

        06f3c01f11603c4ea8c3b37352a1aaf7e9ccb814

        SHA256

        bdc6333aa660b06102e0693dea3cc50e08c51efb67ddea48e13f67b5b731c9d6

        SHA512

        32e95b83f2f1b6530b345726fd43ef23d21fcc5cc06ab198d61ca92a36f2891fa952f778ab7ec87aa0d284a6f8daf68a6dae8761de3ee629df0048cdfa0226e3

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un222285.exe
        Filesize

        530KB

        MD5

        b00356e71c23da3db8f84ca3f9ad0b34

        SHA1

        0d628bca49fb4b258ad009b4afde0d7a67d03f31

        SHA256

        3f95da1ee4dfd86f05018ce85fd16a59189aa6a5b404236d47966872e414ce61

        SHA512

        e80f94e68a2eeedc1e10839e79b74319f1714e405579f30fce83e49656f5c6ade36fe72a8b98725e4a956b5df566d690a820f9cc358e11f86792bac381e9a78a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un222285.exe
        Filesize

        530KB

        MD5

        b00356e71c23da3db8f84ca3f9ad0b34

        SHA1

        0d628bca49fb4b258ad009b4afde0d7a67d03f31

        SHA256

        3f95da1ee4dfd86f05018ce85fd16a59189aa6a5b404236d47966872e414ce61

        SHA512

        e80f94e68a2eeedc1e10839e79b74319f1714e405579f30fce83e49656f5c6ade36fe72a8b98725e4a956b5df566d690a820f9cc358e11f86792bac381e9a78a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4497.exe
        Filesize

        260KB

        MD5

        e0886221c4fe55164641f1cbfb119140

        SHA1

        80ccc411b0c3a82d3a43ce56959902a2fd7c9346

        SHA256

        f4c4c9e1f52347d1564963a87b18ec8c781011cf5db29d1e353e7f6056e67c7b

        SHA512

        ddb55db14eaf6a1be40d32bf571884b210f59928629f6f51acba39a500d34a37ad90d932411802cdcd398ca02d3dfc5063329727ee8a67bb705916bfe25a198e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4497.exe
        Filesize

        260KB

        MD5

        e0886221c4fe55164641f1cbfb119140

        SHA1

        80ccc411b0c3a82d3a43ce56959902a2fd7c9346

        SHA256

        f4c4c9e1f52347d1564963a87b18ec8c781011cf5db29d1e353e7f6056e67c7b

        SHA512

        ddb55db14eaf6a1be40d32bf571884b210f59928629f6f51acba39a500d34a37ad90d932411802cdcd398ca02d3dfc5063329727ee8a67bb705916bfe25a198e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9469.exe
        Filesize

        318KB

        MD5

        b0d88166e755969f294b36e6d2b1329b

        SHA1

        cf48446fce3f7d8a1f979afa36f571265adeaaa6

        SHA256

        922fca647d8b32e9e41c17c813c765d003e06ceed3de52fb728a21991a8c6ccd

        SHA512

        b467864976bf8e5c0ee39ce02a07da7f184eb8f17ef1a098aa55c60a5fd657d91e9e5aebfd8e5008cd7739487dfa81ac750ef0a0e70c2e7f67272a6cb4722c52

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9469.exe
        Filesize

        318KB

        MD5

        b0d88166e755969f294b36e6d2b1329b

        SHA1

        cf48446fce3f7d8a1f979afa36f571265adeaaa6

        SHA256

        922fca647d8b32e9e41c17c813c765d003e06ceed3de52fb728a21991a8c6ccd

        SHA512

        b467864976bf8e5c0ee39ce02a07da7f184eb8f17ef1a098aa55c60a5fd657d91e9e5aebfd8e5008cd7739487dfa81ac750ef0a0e70c2e7f67272a6cb4722c52

      • memory/740-148-0x0000000004C20000-0x00000000051C4000-memory.dmp
        Filesize

        5.6MB

      • memory/740-150-0x0000000004C10000-0x0000000004C20000-memory.dmp
        Filesize

        64KB

      • memory/740-152-0x0000000004C10000-0x0000000004C20000-memory.dmp
        Filesize

        64KB

      • memory/740-151-0x0000000004C10000-0x0000000004C20000-memory.dmp
        Filesize

        64KB

      • memory/740-149-0x0000000000570000-0x000000000059D000-memory.dmp
        Filesize

        180KB

      • memory/740-153-0x00000000023C0000-0x00000000023D2000-memory.dmp
        Filesize

        72KB

      • memory/740-154-0x00000000023C0000-0x00000000023D2000-memory.dmp
        Filesize

        72KB

      • memory/740-156-0x00000000023C0000-0x00000000023D2000-memory.dmp
        Filesize

        72KB

      • memory/740-158-0x00000000023C0000-0x00000000023D2000-memory.dmp
        Filesize

        72KB

      • memory/740-160-0x00000000023C0000-0x00000000023D2000-memory.dmp
        Filesize

        72KB

      • memory/740-162-0x00000000023C0000-0x00000000023D2000-memory.dmp
        Filesize

        72KB

      • memory/740-164-0x00000000023C0000-0x00000000023D2000-memory.dmp
        Filesize

        72KB

      • memory/740-166-0x00000000023C0000-0x00000000023D2000-memory.dmp
        Filesize

        72KB

      • memory/740-168-0x00000000023C0000-0x00000000023D2000-memory.dmp
        Filesize

        72KB

      • memory/740-170-0x00000000023C0000-0x00000000023D2000-memory.dmp
        Filesize

        72KB

      • memory/740-172-0x00000000023C0000-0x00000000023D2000-memory.dmp
        Filesize

        72KB

      • memory/740-174-0x00000000023C0000-0x00000000023D2000-memory.dmp
        Filesize

        72KB

      • memory/740-176-0x00000000023C0000-0x00000000023D2000-memory.dmp
        Filesize

        72KB

      • memory/740-178-0x00000000023C0000-0x00000000023D2000-memory.dmp
        Filesize

        72KB

      • memory/740-180-0x00000000023C0000-0x00000000023D2000-memory.dmp
        Filesize

        72KB

      • memory/740-181-0x0000000000400000-0x00000000004B1000-memory.dmp
        Filesize

        708KB

      • memory/740-182-0x0000000004C10000-0x0000000004C20000-memory.dmp
        Filesize

        64KB

      • memory/740-183-0x0000000004C10000-0x0000000004C20000-memory.dmp
        Filesize

        64KB

      • memory/740-184-0x0000000004C10000-0x0000000004C20000-memory.dmp
        Filesize

        64KB

      • memory/740-186-0x0000000000400000-0x00000000004B1000-memory.dmp
        Filesize

        708KB

      • memory/3700-1122-0x0000000000750000-0x0000000000782000-memory.dmp
        Filesize

        200KB

      • memory/3700-1124-0x0000000005320000-0x0000000005330000-memory.dmp
        Filesize

        64KB

      • memory/3700-1123-0x0000000005320000-0x0000000005330000-memory.dmp
        Filesize

        64KB

      • memory/4412-191-0x0000000002720000-0x000000000275F000-memory.dmp
        Filesize

        252KB

      • memory/4412-448-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
        Filesize

        64KB

      • memory/4412-198-0x0000000002720000-0x000000000275F000-memory.dmp
        Filesize

        252KB

      • memory/4412-200-0x0000000002720000-0x000000000275F000-memory.dmp
        Filesize

        252KB

      • memory/4412-202-0x0000000002720000-0x000000000275F000-memory.dmp
        Filesize

        252KB

      • memory/4412-204-0x0000000002720000-0x000000000275F000-memory.dmp
        Filesize

        252KB

      • memory/4412-210-0x0000000002720000-0x000000000275F000-memory.dmp
        Filesize

        252KB

      • memory/4412-208-0x0000000002720000-0x000000000275F000-memory.dmp
        Filesize

        252KB

      • memory/4412-212-0x0000000002720000-0x000000000275F000-memory.dmp
        Filesize

        252KB

      • memory/4412-206-0x0000000002720000-0x000000000275F000-memory.dmp
        Filesize

        252KB

      • memory/4412-214-0x0000000002720000-0x000000000275F000-memory.dmp
        Filesize

        252KB

      • memory/4412-216-0x0000000002720000-0x000000000275F000-memory.dmp
        Filesize

        252KB

      • memory/4412-218-0x0000000002720000-0x000000000275F000-memory.dmp
        Filesize

        252KB

      • memory/4412-220-0x0000000002720000-0x000000000275F000-memory.dmp
        Filesize

        252KB

      • memory/4412-222-0x0000000002720000-0x000000000275F000-memory.dmp
        Filesize

        252KB

      • memory/4412-224-0x0000000002720000-0x000000000275F000-memory.dmp
        Filesize

        252KB

      • memory/4412-442-0x0000000000610000-0x000000000065B000-memory.dmp
        Filesize

        300KB

      • memory/4412-444-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
        Filesize

        64KB

      • memory/4412-446-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
        Filesize

        64KB

      • memory/4412-196-0x0000000002720000-0x000000000275F000-memory.dmp
        Filesize

        252KB

      • memory/4412-1101-0x0000000005260000-0x0000000005878000-memory.dmp
        Filesize

        6.1MB

      • memory/4412-1102-0x00000000058A0000-0x00000000059AA000-memory.dmp
        Filesize

        1.0MB

      • memory/4412-1103-0x00000000059E0000-0x00000000059F2000-memory.dmp
        Filesize

        72KB

      • memory/4412-1104-0x0000000005A00000-0x0000000005A3C000-memory.dmp
        Filesize

        240KB

      • memory/4412-1105-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
        Filesize

        64KB

      • memory/4412-1106-0x0000000005CF0000-0x0000000005D82000-memory.dmp
        Filesize

        584KB

      • memory/4412-1107-0x0000000005D90000-0x0000000005DF6000-memory.dmp
        Filesize

        408KB

      • memory/4412-1109-0x00000000065B0000-0x0000000006772000-memory.dmp
        Filesize

        1.8MB

      • memory/4412-1110-0x0000000006790000-0x0000000006CBC000-memory.dmp
        Filesize

        5.2MB

      • memory/4412-1111-0x0000000006DE0000-0x0000000006E56000-memory.dmp
        Filesize

        472KB

      • memory/4412-1112-0x0000000006E80000-0x0000000006ED0000-memory.dmp
        Filesize

        320KB

      • memory/4412-1113-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
        Filesize

        64KB

      • memory/4412-194-0x0000000002720000-0x000000000275F000-memory.dmp
        Filesize

        252KB

      • memory/4412-192-0x0000000002720000-0x000000000275F000-memory.dmp
        Filesize

        252KB

      • memory/4412-1114-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
        Filesize

        64KB

      • memory/4412-1115-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
        Filesize

        64KB

      • memory/4412-1116-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
        Filesize

        64KB