Analysis

  • max time kernel
    75s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 19:59

General

  • Target

    099817bec909bf51938cd617fabfa7edc6927e52bbc6a67e27a5fe701a0fffbc.exe

  • Size

    534KB

  • MD5

    3b9b03307fabde5c308e0f6c95558887

  • SHA1

    524e2493253deed98b075adc6f3551f496d64f92

  • SHA256

    099817bec909bf51938cd617fabfa7edc6927e52bbc6a67e27a5fe701a0fffbc

  • SHA512

    02948b08ab972954b8c25d51dc95916e8ecfb860906a17aba67a92ca74c44167580e7ec8006d7c0f965037927522d02c2875f600d3b4b79e9b67c9d16e221182

  • SSDEEP

    12288:kMr1y90E2qvLfz/QxGJBj4IvWObtrlBd0gDzr92I/09Bi:By7LL/QEJfbDr04Z2I/Ik

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\099817bec909bf51938cd617fabfa7edc6927e52bbc6a67e27a5fe701a0fffbc.exe
    "C:\Users\Admin\AppData\Local\Temp\099817bec909bf51938cd617fabfa7edc6927e52bbc6a67e27a5fe701a0fffbc.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4600
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuC0090.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuC0090.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1908
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr548050.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr548050.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1788
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku918166.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku918166.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2800
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2800 -s 1540
          4⤵
          • Program crash
          PID:180
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr239996.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr239996.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1672
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2800 -ip 2800
    1⤵
      PID:3092

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr239996.exe
      Filesize

      175KB

      MD5

      320ed9a07da95271730c1208187f92b7

      SHA1

      540d7cf11521bf862f6efe15edf266b953c72645

      SHA256

      491103d3490142133d1b05d920300d16c833afdf795f86efc34ae40b3b9e32af

      SHA512

      2190f25e73d7c6e4a76ae312d142fa1382e920661aff4d2440b638703af5c8d2b2ae65b6d3f09258b7587ed0218375edc6335c609cb511abac6738c9086654d4

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr239996.exe
      Filesize

      175KB

      MD5

      320ed9a07da95271730c1208187f92b7

      SHA1

      540d7cf11521bf862f6efe15edf266b953c72645

      SHA256

      491103d3490142133d1b05d920300d16c833afdf795f86efc34ae40b3b9e32af

      SHA512

      2190f25e73d7c6e4a76ae312d142fa1382e920661aff4d2440b638703af5c8d2b2ae65b6d3f09258b7587ed0218375edc6335c609cb511abac6738c9086654d4

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuC0090.exe
      Filesize

      392KB

      MD5

      2fdf60765d431370c0e221b47945dfd0

      SHA1

      3df1b9f83552e998503a5daee537bef00bc1c909

      SHA256

      946ebc977e561e52944fde9deb498efaa13be335545140308d74319921f517bc

      SHA512

      a7d683ab05e25d21845fef48e3fa69b28efaea5bc71edcc49070279620e2e718bb706dc5a04668ff55e5219254a00ab62f28209f7805f90fa576f5f6ebea026f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziuC0090.exe
      Filesize

      392KB

      MD5

      2fdf60765d431370c0e221b47945dfd0

      SHA1

      3df1b9f83552e998503a5daee537bef00bc1c909

      SHA256

      946ebc977e561e52944fde9deb498efaa13be335545140308d74319921f517bc

      SHA512

      a7d683ab05e25d21845fef48e3fa69b28efaea5bc71edcc49070279620e2e718bb706dc5a04668ff55e5219254a00ab62f28209f7805f90fa576f5f6ebea026f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr548050.exe
      Filesize

      11KB

      MD5

      e8ce8f79cd6b77821269a3be231d2fc3

      SHA1

      93bd2f9caadf6032a08507cb762eacb1b2418a65

      SHA256

      bea8405f25864b6365de517cf54f217179c9c4e385cc26432f536936f11d6639

      SHA512

      58bddf4b04f9f40474c26f6b4796922296648103bb2245fa3357dc4e1284a1afa72480bd8863aaa6c0a5b9b4bca9094fcac7fd297a6007f72a449e8233c661ab

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr548050.exe
      Filesize

      11KB

      MD5

      e8ce8f79cd6b77821269a3be231d2fc3

      SHA1

      93bd2f9caadf6032a08507cb762eacb1b2418a65

      SHA256

      bea8405f25864b6365de517cf54f217179c9c4e385cc26432f536936f11d6639

      SHA512

      58bddf4b04f9f40474c26f6b4796922296648103bb2245fa3357dc4e1284a1afa72480bd8863aaa6c0a5b9b4bca9094fcac7fd297a6007f72a449e8233c661ab

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku918166.exe
      Filesize

      318KB

      MD5

      7b842750a5f430b4ce80f595776ee02b

      SHA1

      daad51ebb91bf0984b4091ac8dc18d30bcd0cae8

      SHA256

      fde30d2b2834df5643b16871ccb96aaa7a7d47e1452192c1a0bc2b5c7fb8767c

      SHA512

      5f86dff188a2e309e59e1da41035e0e2d4eb80e373916da6e44ac9d4f0803968e8c4e7943cbf8534ad453fdadabd60ab7b2df93106ed164de2e1e53a134c61f1

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku918166.exe
      Filesize

      318KB

      MD5

      7b842750a5f430b4ce80f595776ee02b

      SHA1

      daad51ebb91bf0984b4091ac8dc18d30bcd0cae8

      SHA256

      fde30d2b2834df5643b16871ccb96aaa7a7d47e1452192c1a0bc2b5c7fb8767c

      SHA512

      5f86dff188a2e309e59e1da41035e0e2d4eb80e373916da6e44ac9d4f0803968e8c4e7943cbf8534ad453fdadabd60ab7b2df93106ed164de2e1e53a134c61f1

    • memory/1672-1085-0x0000000000570000-0x00000000005A2000-memory.dmp
      Filesize

      200KB

    • memory/1672-1086-0x00000000050F0000-0x0000000005100000-memory.dmp
      Filesize

      64KB

    • memory/1788-147-0x0000000000AF0000-0x0000000000AFA000-memory.dmp
      Filesize

      40KB

    • memory/2800-189-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-201-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-155-0x0000000004C40000-0x0000000004C50000-memory.dmp
      Filesize

      64KB

    • memory/2800-156-0x0000000004C40000-0x0000000004C50000-memory.dmp
      Filesize

      64KB

    • memory/2800-157-0x0000000004C40000-0x0000000004C50000-memory.dmp
      Filesize

      64KB

    • memory/2800-158-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-159-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-161-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-163-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-165-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-167-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-169-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-171-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-173-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-175-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-177-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-179-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-181-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-183-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-185-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-187-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-153-0x0000000002140000-0x000000000218B000-memory.dmp
      Filesize

      300KB

    • memory/2800-191-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-193-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-195-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-197-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-199-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-154-0x0000000004C50000-0x00000000051F4000-memory.dmp
      Filesize

      5.6MB

    • memory/2800-203-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-205-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-207-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-209-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-211-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-213-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-215-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-217-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-219-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-221-0x0000000002630000-0x000000000266F000-memory.dmp
      Filesize

      252KB

    • memory/2800-1064-0x0000000005200000-0x0000000005818000-memory.dmp
      Filesize

      6.1MB

    • memory/2800-1065-0x00000000058A0000-0x00000000059AA000-memory.dmp
      Filesize

      1.0MB

    • memory/2800-1066-0x00000000059E0000-0x00000000059F2000-memory.dmp
      Filesize

      72KB

    • memory/2800-1067-0x0000000005A40000-0x0000000005A7C000-memory.dmp
      Filesize

      240KB

    • memory/2800-1068-0x0000000004C40000-0x0000000004C50000-memory.dmp
      Filesize

      64KB

    • memory/2800-1070-0x0000000005CF0000-0x0000000005D82000-memory.dmp
      Filesize

      584KB

    • memory/2800-1071-0x0000000005D90000-0x0000000005DF6000-memory.dmp
      Filesize

      408KB

    • memory/2800-1072-0x0000000004C40000-0x0000000004C50000-memory.dmp
      Filesize

      64KB

    • memory/2800-1073-0x0000000004C40000-0x0000000004C50000-memory.dmp
      Filesize

      64KB

    • memory/2800-1074-0x0000000004C40000-0x0000000004C50000-memory.dmp
      Filesize

      64KB

    • memory/2800-1075-0x00000000064B0000-0x0000000006672000-memory.dmp
      Filesize

      1.8MB

    • memory/2800-1076-0x0000000006690000-0x0000000006BBC000-memory.dmp
      Filesize

      5.2MB

    • memory/2800-1077-0x0000000004C40000-0x0000000004C50000-memory.dmp
      Filesize

      64KB

    • memory/2800-1078-0x0000000007090000-0x0000000007106000-memory.dmp
      Filesize

      472KB

    • memory/2800-1079-0x0000000007110000-0x0000000007160000-memory.dmp
      Filesize

      320KB