Analysis

  • max time kernel
    85s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 19:52

General

  • Target

    46812c8cea9a451c3e5a1b92390c9c3829e79ed944268d53ed2140e40ab78d94.exe

  • Size

    674KB

  • MD5

    80a97cea0db96168cc1795ad347cf60d

  • SHA1

    b414acacd956a1f8023760b45d3b6fb39991ab5c

  • SHA256

    46812c8cea9a451c3e5a1b92390c9c3829e79ed944268d53ed2140e40ab78d94

  • SHA512

    c22caf2016da4fe460cc0429e1e4dde8a94170fb8a9da52aca4bde53669816697045d5a84c0b17b0577d66c41331dd4cfdd150451003756b4d301a25941318d3

  • SSDEEP

    12288:uMriy90fwt2+RKJDT0clcYUq1Rv6LCXzoB2YPJvnjxObhromrDTdMLwex:Yy8wt28WT0cB3vAKfYPSbueDTeLbx

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\46812c8cea9a451c3e5a1b92390c9c3829e79ed944268d53ed2140e40ab78d94.exe
    "C:\Users\Admin\AppData\Local\Temp\46812c8cea9a451c3e5a1b92390c9c3829e79ed944268d53ed2140e40ab78d94.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4152
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un691838.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un691838.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1260
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0892.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0892.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5028
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5028 -s 1080
          4⤵
          • Program crash
          PID:4076
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1036.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1036.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1404
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1404 -s 1384
          4⤵
          • Program crash
          PID:1048
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si578395.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si578395.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:8
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5028 -ip 5028
    1⤵
      PID:2096
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 1404 -ip 1404
      1⤵
        PID:5032

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si578395.exe
        Filesize

        175KB

        MD5

        fdecfa3560cae7d802a572d0aa896b7e

        SHA1

        3f1a86406e52f054db8156395533660d3353897c

        SHA256

        c6697d11fafe77828e1674b34e93177338f8bfbfdf4e275c6278e9809194396f

        SHA512

        045f9769c46bee64400f48a37d93c29282079e863b5a1f5714b3df8fd51dec03a70357b304438d212db4832a49d5786df29722d1eba863290c649376df418240

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si578395.exe
        Filesize

        175KB

        MD5

        fdecfa3560cae7d802a572d0aa896b7e

        SHA1

        3f1a86406e52f054db8156395533660d3353897c

        SHA256

        c6697d11fafe77828e1674b34e93177338f8bfbfdf4e275c6278e9809194396f

        SHA512

        045f9769c46bee64400f48a37d93c29282079e863b5a1f5714b3df8fd51dec03a70357b304438d212db4832a49d5786df29722d1eba863290c649376df418240

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un691838.exe
        Filesize

        531KB

        MD5

        2ba83baaf2fae1e100a80f51477da6ab

        SHA1

        1b5bb4edb04153b9633cdef7d015c36d6fab5399

        SHA256

        d59bf40edfd4fd5544a51d6a1475fad61130dd2b64c90933b37541fbd9ccdb55

        SHA512

        8649caeada7cc67ed74b44b370edd0bc457b27e91777359eef0efeebbc4163f6c436dec153134769b907a72105bea1f49b58aafb3a961fabd5d1803b4aa99197

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un691838.exe
        Filesize

        531KB

        MD5

        2ba83baaf2fae1e100a80f51477da6ab

        SHA1

        1b5bb4edb04153b9633cdef7d015c36d6fab5399

        SHA256

        d59bf40edfd4fd5544a51d6a1475fad61130dd2b64c90933b37541fbd9ccdb55

        SHA512

        8649caeada7cc67ed74b44b370edd0bc457b27e91777359eef0efeebbc4163f6c436dec153134769b907a72105bea1f49b58aafb3a961fabd5d1803b4aa99197

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0892.exe
        Filesize

        260KB

        MD5

        f79ad0eab48a68795ffd72e2dd6c5f4a

        SHA1

        2603cd13479a3620cb469602020b9404f39c6a2c

        SHA256

        9d40a65f281e2ed0c4ed84990c707bb3b0b3ad470987038375e52e3051c3b302

        SHA512

        be2dea47999c7596f8876f9e3b3a064ef5b13f96137c80e7cf8a83096a5b49988fdf74d43ff18db963aaef45b1f434fe222d08663359ebc5944ab03a9eceaa6a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0892.exe
        Filesize

        260KB

        MD5

        f79ad0eab48a68795ffd72e2dd6c5f4a

        SHA1

        2603cd13479a3620cb469602020b9404f39c6a2c

        SHA256

        9d40a65f281e2ed0c4ed84990c707bb3b0b3ad470987038375e52e3051c3b302

        SHA512

        be2dea47999c7596f8876f9e3b3a064ef5b13f96137c80e7cf8a83096a5b49988fdf74d43ff18db963aaef45b1f434fe222d08663359ebc5944ab03a9eceaa6a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1036.exe
        Filesize

        318KB

        MD5

        9953bf1ab8ab3d938dde43256ab3993d

        SHA1

        0b33a3470a2cc58ec69e2b6c7babcdfce9a84b58

        SHA256

        c3f4c50083c1cb88bc2a65c53fd48b6712a0007fd7b1fb88fd4cc9c4a4d6ad40

        SHA512

        9ffc4fad25d61cd13a2e058e1199ad8c87ae164afb0ef7239c9eb265177bbfe65a307da46cfaa91f3930e662d35ab1fb202ab2d4087d8ba20adf73ee23715b66

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1036.exe
        Filesize

        318KB

        MD5

        9953bf1ab8ab3d938dde43256ab3993d

        SHA1

        0b33a3470a2cc58ec69e2b6c7babcdfce9a84b58

        SHA256

        c3f4c50083c1cb88bc2a65c53fd48b6712a0007fd7b1fb88fd4cc9c4a4d6ad40

        SHA512

        9ffc4fad25d61cd13a2e058e1199ad8c87ae164afb0ef7239c9eb265177bbfe65a307da46cfaa91f3930e662d35ab1fb202ab2d4087d8ba20adf73ee23715b66

      • memory/8-1124-0x0000000005310000-0x0000000005320000-memory.dmp
        Filesize

        64KB

      • memory/8-1123-0x0000000005310000-0x0000000005320000-memory.dmp
        Filesize

        64KB

      • memory/8-1122-0x0000000000A70000-0x0000000000AA2000-memory.dmp
        Filesize

        200KB

      • memory/1404-1102-0x0000000004CC0000-0x0000000004CD2000-memory.dmp
        Filesize

        72KB

      • memory/1404-1105-0x0000000005BB0000-0x0000000005C42000-memory.dmp
        Filesize

        584KB

      • memory/1404-1115-0x0000000006870000-0x0000000006D9C000-memory.dmp
        Filesize

        5.2MB

      • memory/1404-1114-0x00000000066A0000-0x0000000006862000-memory.dmp
        Filesize

        1.8MB

      • memory/1404-1113-0x0000000004CF0000-0x0000000004D00000-memory.dmp
        Filesize

        64KB

      • memory/1404-1112-0x0000000006540000-0x0000000006590000-memory.dmp
        Filesize

        320KB

      • memory/1404-1111-0x00000000064B0000-0x0000000006526000-memory.dmp
        Filesize

        472KB

      • memory/1404-1110-0x0000000004CF0000-0x0000000004D00000-memory.dmp
        Filesize

        64KB

      • memory/1404-1109-0x0000000004CF0000-0x0000000004D00000-memory.dmp
        Filesize

        64KB

      • memory/1404-1108-0x0000000004CF0000-0x0000000004D00000-memory.dmp
        Filesize

        64KB

      • memory/1404-1106-0x0000000005C50000-0x0000000005CB6000-memory.dmp
        Filesize

        408KB

      • memory/1404-1104-0x0000000004CF0000-0x0000000004D00000-memory.dmp
        Filesize

        64KB

      • memory/1404-1103-0x00000000058D0000-0x000000000590C000-memory.dmp
        Filesize

        240KB

      • memory/1404-1101-0x0000000004B80000-0x0000000004C8A000-memory.dmp
        Filesize

        1.0MB

      • memory/1404-1100-0x00000000052B0000-0x00000000058C8000-memory.dmp
        Filesize

        6.1MB

      • memory/1404-265-0x0000000004CF0000-0x0000000004D00000-memory.dmp
        Filesize

        64KB

      • memory/1404-267-0x0000000004CF0000-0x0000000004D00000-memory.dmp
        Filesize

        64KB

      • memory/1404-262-0x0000000000610000-0x000000000065B000-memory.dmp
        Filesize

        300KB

      • memory/1404-263-0x0000000004CF0000-0x0000000004D00000-memory.dmp
        Filesize

        64KB

      • memory/1404-190-0x0000000002660000-0x000000000269F000-memory.dmp
        Filesize

        252KB

      • memory/1404-191-0x0000000002660000-0x000000000269F000-memory.dmp
        Filesize

        252KB

      • memory/1404-193-0x0000000002660000-0x000000000269F000-memory.dmp
        Filesize

        252KB

      • memory/1404-195-0x0000000002660000-0x000000000269F000-memory.dmp
        Filesize

        252KB

      • memory/1404-197-0x0000000002660000-0x000000000269F000-memory.dmp
        Filesize

        252KB

      • memory/1404-199-0x0000000002660000-0x000000000269F000-memory.dmp
        Filesize

        252KB

      • memory/1404-201-0x0000000002660000-0x000000000269F000-memory.dmp
        Filesize

        252KB

      • memory/1404-203-0x0000000002660000-0x000000000269F000-memory.dmp
        Filesize

        252KB

      • memory/1404-205-0x0000000002660000-0x000000000269F000-memory.dmp
        Filesize

        252KB

      • memory/1404-207-0x0000000002660000-0x000000000269F000-memory.dmp
        Filesize

        252KB

      • memory/1404-209-0x0000000002660000-0x000000000269F000-memory.dmp
        Filesize

        252KB

      • memory/1404-211-0x0000000002660000-0x000000000269F000-memory.dmp
        Filesize

        252KB

      • memory/1404-213-0x0000000002660000-0x000000000269F000-memory.dmp
        Filesize

        252KB

      • memory/1404-215-0x0000000002660000-0x000000000269F000-memory.dmp
        Filesize

        252KB

      • memory/1404-217-0x0000000002660000-0x000000000269F000-memory.dmp
        Filesize

        252KB

      • memory/1404-219-0x0000000002660000-0x000000000269F000-memory.dmp
        Filesize

        252KB

      • memory/1404-221-0x0000000002660000-0x000000000269F000-memory.dmp
        Filesize

        252KB

      • memory/1404-223-0x0000000002660000-0x000000000269F000-memory.dmp
        Filesize

        252KB

      • memory/5028-173-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/5028-150-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/5028-185-0x0000000000400000-0x00000000004B1000-memory.dmp
        Filesize

        708KB

      • memory/5028-184-0x0000000004AB0000-0x0000000004AC0000-memory.dmp
        Filesize

        64KB

      • memory/5028-183-0x0000000004AB0000-0x0000000004AC0000-memory.dmp
        Filesize

        64KB

      • memory/5028-182-0x0000000004AB0000-0x0000000004AC0000-memory.dmp
        Filesize

        64KB

      • memory/5028-155-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/5028-180-0x0000000000400000-0x00000000004B1000-memory.dmp
        Filesize

        708KB

      • memory/5028-179-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/5028-161-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/5028-148-0x0000000000500000-0x000000000052D000-memory.dmp
        Filesize

        180KB

      • memory/5028-159-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/5028-166-0x0000000004AB0000-0x0000000004AC0000-memory.dmp
        Filesize

        64KB

      • memory/5028-171-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/5028-157-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/5028-165-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/5028-169-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/5028-167-0x0000000004AB0000-0x0000000004AC0000-memory.dmp
        Filesize

        64KB

      • memory/5028-163-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/5028-153-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/5028-151-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/5028-175-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/5028-149-0x0000000004AC0000-0x0000000005064000-memory.dmp
        Filesize

        5.6MB

      • memory/5028-177-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB