Analysis

  • max time kernel
    138s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 19:55

General

  • Target

    96b8c86203e22656becbb454c9f13c5e5d3e51634573b110528b971516231740.exe

  • Size

    672KB

  • MD5

    9123d7403b3ada69ae47973043a907be

  • SHA1

    7ae5b7ec55c14a174c7839c9ce549817d293d0ed

  • SHA256

    96b8c86203e22656becbb454c9f13c5e5d3e51634573b110528b971516231740

  • SHA512

    13cce457f299b34350b0173b46d5cdbf3d64da820bdee76f23213c2b28e5ad062e1dc6d9e114584559841d8996d3d6962dcdeaf5aa59dc37e279f4bb056eadee

  • SSDEEP

    12288:aMr1y90ioIy8VU8EDhqLulU+W4kdZgSdBTOblrlmHzBd:7yJo3PDhfuDL8b/+b

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\96b8c86203e22656becbb454c9f13c5e5d3e51634573b110528b971516231740.exe
    "C:\Users\Admin\AppData\Local\Temp\96b8c86203e22656becbb454c9f13c5e5d3e51634573b110528b971516231740.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2932
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un567133.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un567133.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:620
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6460.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6460.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:852
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 1084
          4⤵
          • Program crash
          PID:1728
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3629.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3629.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:448
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 1328
          4⤵
          • Program crash
          PID:3524
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si873573.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si873573.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3584
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 852 -ip 852
    1⤵
      PID:228
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 448 -ip 448
      1⤵
        PID:1236
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:2572

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si873573.exe
        Filesize

        175KB

        MD5

        74932296ad43422703cba856a91f8385

        SHA1

        f0e3f219de75596c0d35ee3f7f631f8c6fc50589

        SHA256

        e8bb83f676681048ff90e833c71db3ae6805db04e6412d5d5cfb815940d3ab5f

        SHA512

        4f041bb3c1b5b5583b3a0293a9e1dd0cada0bbac2f01c271bb7518ec3839b77f2a3e1f382426013d8abb1974e38d669dd0d84eb08a201776643c91896827c543

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si873573.exe
        Filesize

        175KB

        MD5

        74932296ad43422703cba856a91f8385

        SHA1

        f0e3f219de75596c0d35ee3f7f631f8c6fc50589

        SHA256

        e8bb83f676681048ff90e833c71db3ae6805db04e6412d5d5cfb815940d3ab5f

        SHA512

        4f041bb3c1b5b5583b3a0293a9e1dd0cada0bbac2f01c271bb7518ec3839b77f2a3e1f382426013d8abb1974e38d669dd0d84eb08a201776643c91896827c543

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un567133.exe
        Filesize

        530KB

        MD5

        f644f78467b6c8008514465955693d3a

        SHA1

        5dc2a43044e630def3c70eb383ebe998fe6bcec7

        SHA256

        a16bd256669922431b97325f47fcb5d2d7e5fc70031925e744aae560646bfcdb

        SHA512

        09d62f94389a61f6a799454c6b70e432f37c7358e681a62ebfcea9779fa0502a9333cfebd5bcc0a748daaab63f82f552e57c47d3da928bd331c229cf5a2d3d4e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un567133.exe
        Filesize

        530KB

        MD5

        f644f78467b6c8008514465955693d3a

        SHA1

        5dc2a43044e630def3c70eb383ebe998fe6bcec7

        SHA256

        a16bd256669922431b97325f47fcb5d2d7e5fc70031925e744aae560646bfcdb

        SHA512

        09d62f94389a61f6a799454c6b70e432f37c7358e681a62ebfcea9779fa0502a9333cfebd5bcc0a748daaab63f82f552e57c47d3da928bd331c229cf5a2d3d4e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6460.exe
        Filesize

        260KB

        MD5

        e682702f68abced36365c9111e1a2ded

        SHA1

        33a71475b668788b828f4f66137837fd7492149f

        SHA256

        9a5beb5554af4dd0c7ea438a76e60a4bb35318d2e477f3707360d6f2cdb4a13a

        SHA512

        20035aaaeda1ef83e8625baedaf486358b8b358284e74a10de4c7d7b62f37adc759f58550cfe2b0a9a4f2d60cbc9ca791db9c0b66be185ae819f0bed39be4f2f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6460.exe
        Filesize

        260KB

        MD5

        e682702f68abced36365c9111e1a2ded

        SHA1

        33a71475b668788b828f4f66137837fd7492149f

        SHA256

        9a5beb5554af4dd0c7ea438a76e60a4bb35318d2e477f3707360d6f2cdb4a13a

        SHA512

        20035aaaeda1ef83e8625baedaf486358b8b358284e74a10de4c7d7b62f37adc759f58550cfe2b0a9a4f2d60cbc9ca791db9c0b66be185ae819f0bed39be4f2f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3629.exe
        Filesize

        318KB

        MD5

        dc42fba3523fe40ff65592c4d900c203

        SHA1

        ad41c51fd73c29c7402dac8efa424afdba7a3867

        SHA256

        e68366ef643776ca97dbf77d7e1bf53aa52d2b053fef86ac3757a73012c49877

        SHA512

        5ee5d6ec4c9a596f7547ca0c3c40c69accc2200e103431a19d1d9babf87c70383aad3ee4b684b273992f1f95274b885bfea4668d7905979d9058d2c6609aebc3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3629.exe
        Filesize

        318KB

        MD5

        dc42fba3523fe40ff65592c4d900c203

        SHA1

        ad41c51fd73c29c7402dac8efa424afdba7a3867

        SHA256

        e68366ef643776ca97dbf77d7e1bf53aa52d2b053fef86ac3757a73012c49877

        SHA512

        5ee5d6ec4c9a596f7547ca0c3c40c69accc2200e103431a19d1d9babf87c70383aad3ee4b684b273992f1f95274b885bfea4668d7905979d9058d2c6609aebc3

      • memory/448-1102-0x0000000005780000-0x000000000588A000-memory.dmp
        Filesize

        1.0MB

      • memory/448-381-0x0000000004BA0000-0x0000000004BB0000-memory.dmp
        Filesize

        64KB

      • memory/448-1116-0x0000000006A80000-0x0000000006FAC000-memory.dmp
        Filesize

        5.2MB

      • memory/448-1115-0x0000000004BA0000-0x0000000004BB0000-memory.dmp
        Filesize

        64KB

      • memory/448-1114-0x0000000006690000-0x0000000006852000-memory.dmp
        Filesize

        1.8MB

      • memory/448-208-0x0000000002530000-0x000000000256F000-memory.dmp
        Filesize

        252KB

      • memory/448-1113-0x0000000004BA0000-0x0000000004BB0000-memory.dmp
        Filesize

        64KB

      • memory/448-1112-0x0000000004BA0000-0x0000000004BB0000-memory.dmp
        Filesize

        64KB

      • memory/448-1111-0x0000000004BA0000-0x0000000004BB0000-memory.dmp
        Filesize

        64KB

      • memory/448-1109-0x00000000063E0000-0x0000000006430000-memory.dmp
        Filesize

        320KB

      • memory/448-1108-0x0000000006350000-0x00000000063C6000-memory.dmp
        Filesize

        472KB

      • memory/448-1107-0x0000000005C50000-0x0000000005CB6000-memory.dmp
        Filesize

        408KB

      • memory/448-1106-0x0000000005BB0000-0x0000000005C42000-memory.dmp
        Filesize

        584KB

      • memory/448-210-0x0000000002530000-0x000000000256F000-memory.dmp
        Filesize

        252KB

      • memory/448-1105-0x0000000004BA0000-0x0000000004BB0000-memory.dmp
        Filesize

        64KB

      • memory/448-1104-0x00000000058C0000-0x00000000058FC000-memory.dmp
        Filesize

        240KB

      • memory/448-1103-0x00000000058A0000-0x00000000058B2000-memory.dmp
        Filesize

        72KB

      • memory/448-1101-0x0000000005160000-0x0000000005778000-memory.dmp
        Filesize

        6.1MB

      • memory/448-380-0x0000000004BA0000-0x0000000004BB0000-memory.dmp
        Filesize

        64KB

      • memory/448-216-0x0000000002530000-0x000000000256F000-memory.dmp
        Filesize

        252KB

      • memory/448-378-0x0000000004BA0000-0x0000000004BB0000-memory.dmp
        Filesize

        64KB

      • memory/448-377-0x00000000007B0000-0x00000000007FB000-memory.dmp
        Filesize

        300KB

      • memory/448-224-0x0000000002530000-0x000000000256F000-memory.dmp
        Filesize

        252KB

      • memory/448-191-0x0000000002530000-0x000000000256F000-memory.dmp
        Filesize

        252KB

      • memory/448-192-0x0000000002530000-0x000000000256F000-memory.dmp
        Filesize

        252KB

      • memory/448-212-0x0000000002530000-0x000000000256F000-memory.dmp
        Filesize

        252KB

      • memory/448-196-0x0000000002530000-0x000000000256F000-memory.dmp
        Filesize

        252KB

      • memory/448-198-0x0000000002530000-0x000000000256F000-memory.dmp
        Filesize

        252KB

      • memory/448-200-0x0000000002530000-0x000000000256F000-memory.dmp
        Filesize

        252KB

      • memory/448-202-0x0000000002530000-0x000000000256F000-memory.dmp
        Filesize

        252KB

      • memory/448-204-0x0000000002530000-0x000000000256F000-memory.dmp
        Filesize

        252KB

      • memory/448-206-0x0000000002530000-0x000000000256F000-memory.dmp
        Filesize

        252KB

      • memory/448-222-0x0000000002530000-0x000000000256F000-memory.dmp
        Filesize

        252KB

      • memory/448-220-0x0000000002530000-0x000000000256F000-memory.dmp
        Filesize

        252KB

      • memory/448-194-0x0000000002530000-0x000000000256F000-memory.dmp
        Filesize

        252KB

      • memory/448-214-0x0000000002530000-0x000000000256F000-memory.dmp
        Filesize

        252KB

      • memory/448-218-0x0000000002530000-0x000000000256F000-memory.dmp
        Filesize

        252KB

      • memory/852-182-0x0000000004A90000-0x0000000004AA0000-memory.dmp
        Filesize

        64KB

      • memory/852-176-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/852-162-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/852-151-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/852-153-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/852-186-0x0000000000400000-0x00000000004B1000-memory.dmp
        Filesize

        708KB

      • memory/852-184-0x0000000004A90000-0x0000000004AA0000-memory.dmp
        Filesize

        64KB

      • memory/852-183-0x0000000004A90000-0x0000000004AA0000-memory.dmp
        Filesize

        64KB

      • memory/852-154-0x0000000004A90000-0x0000000004AA0000-memory.dmp
        Filesize

        64KB

      • memory/852-150-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/852-181-0x0000000000400000-0x00000000004B1000-memory.dmp
        Filesize

        708KB

      • memory/852-180-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/852-178-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/852-174-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/852-172-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/852-170-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/852-168-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/852-166-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/852-164-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/852-156-0x0000000004A90000-0x0000000004AA0000-memory.dmp
        Filesize

        64KB

      • memory/852-157-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/852-158-0x0000000004A90000-0x0000000004AA0000-memory.dmp
        Filesize

        64KB

      • memory/852-160-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/852-149-0x0000000004AA0000-0x0000000005044000-memory.dmp
        Filesize

        5.6MB

      • memory/852-148-0x0000000000630000-0x000000000065D000-memory.dmp
        Filesize

        180KB

      • memory/3584-1122-0x0000000000690000-0x00000000006C2000-memory.dmp
        Filesize

        200KB

      • memory/3584-1123-0x0000000005300000-0x0000000005310000-memory.dmp
        Filesize

        64KB

      • memory/3584-1124-0x0000000005300000-0x0000000005310000-memory.dmp
        Filesize

        64KB