Analysis

  • max time kernel
    78s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 19:55

General

  • Target

    82a4d161335ba9fd00c04be94939650019faf1f8721330214eb72e51ca91b5df.exe

  • Size

    534KB

  • MD5

    c6562263ee8cd816c9d615603f7c296a

  • SHA1

    b160f0032b3bf49b49553ed86ca3471d74a5609f

  • SHA256

    82a4d161335ba9fd00c04be94939650019faf1f8721330214eb72e51ca91b5df

  • SHA512

    5adb89e1eed106140f870a74528ac061d683f02688ec6df1da344483661f24a8f957dcc63452a2d97f68c22633ffbdd399aec34f5d9c6b62204df864c1837bde

  • SSDEEP

    12288:rMrGy90iWpwOOpotRkz2pBlTuWObWrl5MocWSOLB9AgI:ByRWaGG6pBlTuby58OLjAgI

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\82a4d161335ba9fd00c04be94939650019faf1f8721330214eb72e51ca91b5df.exe
    "C:\Users\Admin\AppData\Local\Temp\82a4d161335ba9fd00c04be94939650019faf1f8721330214eb72e51ca91b5df.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2712
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXI2990.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXI2990.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3080
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr487648.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr487648.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3240
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku408556.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku408556.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4876
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4876 -s 1600
          4⤵
          • Program crash
          PID:1296
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr820207.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr820207.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1240
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4876 -ip 4876
    1⤵
      PID:1364

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr820207.exe
      Filesize

      175KB

      MD5

      d3dc051258a02af3d98829e9ff0c0143

      SHA1

      b818461f30a50675c93da2691737d9141d72bb0b

      SHA256

      85014a4ccafb6cbf76075495b9116b872a1fb1e268b02a1f2c7cf1d4d3e6635c

      SHA512

      e3f326058d8aa6a0c5825e2257240cd8e784323fb9469c27f2ea2f15e47928a7b54e77a038ce9a16840d11e056843d1dc13969040eab50eaa774e83ab6638d86

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr820207.exe
      Filesize

      175KB

      MD5

      d3dc051258a02af3d98829e9ff0c0143

      SHA1

      b818461f30a50675c93da2691737d9141d72bb0b

      SHA256

      85014a4ccafb6cbf76075495b9116b872a1fb1e268b02a1f2c7cf1d4d3e6635c

      SHA512

      e3f326058d8aa6a0c5825e2257240cd8e784323fb9469c27f2ea2f15e47928a7b54e77a038ce9a16840d11e056843d1dc13969040eab50eaa774e83ab6638d86

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXI2990.exe
      Filesize

      392KB

      MD5

      c6f3fee299a76f9c6f386cbef280db45

      SHA1

      f7cd8175495c955f2d0c45012de31dca0b9aa047

      SHA256

      4c587b87363dcdbaaef47a056ea1aca266a1f67370b8c4686aa21f6b6551186f

      SHA512

      827705cf70b3b3c2375ab63e30cb370c8c7d1bdad08bec38aa86409ca1df05048c99906d0f8d19fc91f8639324eaf57b3d66da4a93eb14cd2e2df638f86977d7

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXI2990.exe
      Filesize

      392KB

      MD5

      c6f3fee299a76f9c6f386cbef280db45

      SHA1

      f7cd8175495c955f2d0c45012de31dca0b9aa047

      SHA256

      4c587b87363dcdbaaef47a056ea1aca266a1f67370b8c4686aa21f6b6551186f

      SHA512

      827705cf70b3b3c2375ab63e30cb370c8c7d1bdad08bec38aa86409ca1df05048c99906d0f8d19fc91f8639324eaf57b3d66da4a93eb14cd2e2df638f86977d7

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr487648.exe
      Filesize

      11KB

      MD5

      66a9fc93c883eb734bfc6c4ad0adbff5

      SHA1

      be33ed53788a0edd411a06384c70e8a53227b38b

      SHA256

      5bdac1e4f625e8dad1a619753ca82fe459572923a1c9eaedfcc6b17c5c95a242

      SHA512

      727451d95da16289125d5b640ba1204be2d2ca5624d3abc0d975356c1b25a4cbc0e9b8d31d406f1bc1bf3b31eaf4f3581a831372cbc82cc79057a1a3f688f162

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr487648.exe
      Filesize

      11KB

      MD5

      66a9fc93c883eb734bfc6c4ad0adbff5

      SHA1

      be33ed53788a0edd411a06384c70e8a53227b38b

      SHA256

      5bdac1e4f625e8dad1a619753ca82fe459572923a1c9eaedfcc6b17c5c95a242

      SHA512

      727451d95da16289125d5b640ba1204be2d2ca5624d3abc0d975356c1b25a4cbc0e9b8d31d406f1bc1bf3b31eaf4f3581a831372cbc82cc79057a1a3f688f162

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku408556.exe
      Filesize

      318KB

      MD5

      2b3703d89500761e1296aed1d8abd9b5

      SHA1

      a1e9acfb38754d2d729a30edd2239378d570a8ab

      SHA256

      c50c61070037114cf0186bce74c5f7839e8bc9c78aef3166980105e206c14e96

      SHA512

      87ac0910e2db8d4a2877c0b259e631e78b7ef7bf302826f494d228af0dad0d93adbc34b635275cf9cf2276a34c5b3634311a36011af72bb9f141306743d46216

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku408556.exe
      Filesize

      318KB

      MD5

      2b3703d89500761e1296aed1d8abd9b5

      SHA1

      a1e9acfb38754d2d729a30edd2239378d570a8ab

      SHA256

      c50c61070037114cf0186bce74c5f7839e8bc9c78aef3166980105e206c14e96

      SHA512

      87ac0910e2db8d4a2877c0b259e631e78b7ef7bf302826f494d228af0dad0d93adbc34b635275cf9cf2276a34c5b3634311a36011af72bb9f141306743d46216

    • memory/1240-1086-0x0000000000BC0000-0x0000000000BF2000-memory.dmp
      Filesize

      200KB

    • memory/1240-1087-0x0000000005790000-0x00000000057A0000-memory.dmp
      Filesize

      64KB

    • memory/1240-1088-0x0000000005790000-0x00000000057A0000-memory.dmp
      Filesize

      64KB

    • memory/3240-147-0x0000000000F30000-0x0000000000F3A000-memory.dmp
      Filesize

      40KB

    • memory/4876-189-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-203-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-157-0x0000000004C10000-0x0000000004C20000-memory.dmp
      Filesize

      64KB

    • memory/4876-156-0x0000000004C10000-0x0000000004C20000-memory.dmp
      Filesize

      64KB

    • memory/4876-158-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-159-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-161-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-169-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-171-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-173-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-175-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-167-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-165-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-163-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-177-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-179-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-181-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-183-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-185-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-187-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-154-0x0000000000610000-0x000000000065B000-memory.dmp
      Filesize

      300KB

    • memory/4876-191-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-193-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-195-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-197-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-199-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-201-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-155-0x0000000004C10000-0x0000000004C20000-memory.dmp
      Filesize

      64KB

    • memory/4876-205-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-207-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-211-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-209-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-213-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-215-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-217-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-219-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-221-0x0000000002560000-0x000000000259F000-memory.dmp
      Filesize

      252KB

    • memory/4876-1064-0x00000000051D0000-0x00000000057E8000-memory.dmp
      Filesize

      6.1MB

    • memory/4876-1065-0x00000000057F0000-0x00000000058FA000-memory.dmp
      Filesize

      1.0MB

    • memory/4876-1066-0x0000000004BB0000-0x0000000004BC2000-memory.dmp
      Filesize

      72KB

    • memory/4876-1067-0x0000000004BD0000-0x0000000004C0C000-memory.dmp
      Filesize

      240KB

    • memory/4876-1068-0x0000000004C10000-0x0000000004C20000-memory.dmp
      Filesize

      64KB

    • memory/4876-1070-0x0000000004C10000-0x0000000004C20000-memory.dmp
      Filesize

      64KB

    • memory/4876-1071-0x0000000004C10000-0x0000000004C20000-memory.dmp
      Filesize

      64KB

    • memory/4876-1072-0x0000000004C10000-0x0000000004C20000-memory.dmp
      Filesize

      64KB

    • memory/4876-1073-0x0000000005BB0000-0x0000000005C42000-memory.dmp
      Filesize

      584KB

    • memory/4876-1074-0x0000000005C50000-0x0000000005CB6000-memory.dmp
      Filesize

      408KB

    • memory/4876-1075-0x0000000006350000-0x00000000063C6000-memory.dmp
      Filesize

      472KB

    • memory/4876-153-0x0000000004C20000-0x00000000051C4000-memory.dmp
      Filesize

      5.6MB

    • memory/4876-1076-0x00000000063E0000-0x0000000006430000-memory.dmp
      Filesize

      320KB

    • memory/4876-1077-0x0000000004C10000-0x0000000004C20000-memory.dmp
      Filesize

      64KB

    • memory/4876-1078-0x00000000066A0000-0x0000000006862000-memory.dmp
      Filesize

      1.8MB

    • memory/4876-1079-0x0000000006870000-0x0000000006D9C000-memory.dmp
      Filesize

      5.2MB