Analysis

  • max time kernel
    75s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 20:04

General

  • Target

    c01c2092fb5b18d3cc95ac044ddfcc9ee7d2d22279faaf7ee87a06d8e78c75e0.exe

  • Size

    533KB

  • MD5

    883eaea58e30f8698c5cf55f4aa2c147

  • SHA1

    de1dcb7115e37a657c35d2ba240e360204b14e89

  • SHA256

    c01c2092fb5b18d3cc95ac044ddfcc9ee7d2d22279faaf7ee87a06d8e78c75e0

  • SHA512

    a6a4ff9e3bfe0d3b047e72dca521e805db3f86c7eea915cbfce252297353f4fb5fda5e8418577c687bb9db6be1bc60c5d3febd4deb572882f27c96f58985b524

  • SSDEEP

    12288:XMrsy90SLFA6F5q8m1eOM5DJRaQOZLKCObRrJWGrK4L:7yz1P5BNyVCbx

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c01c2092fb5b18d3cc95ac044ddfcc9ee7d2d22279faaf7ee87a06d8e78c75e0.exe
    "C:\Users\Admin\AppData\Local\Temp\c01c2092fb5b18d3cc95ac044ddfcc9ee7d2d22279faaf7ee87a06d8e78c75e0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:448
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAv7473.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAv7473.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4688
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr978195.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr978195.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4148
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku278193.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku278193.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3332
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 1356
          4⤵
          • Program crash
          PID:4408
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr239842.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr239842.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4460
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3332 -ip 3332
    1⤵
      PID:4368

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr239842.exe
      Filesize

      175KB

      MD5

      b8be60cb8e3de97e8e9eb423faa8135b

      SHA1

      f32d1bd7e5f8f3fea43f31fd5bf82ca014c8d5de

      SHA256

      9598b5032197a3e9dc240fc42f5436474386cca5866e1bed517a4377cd8963fb

      SHA512

      51f8a056c597447f02923591412a3d63cc078e6d37fe706312968ce4d749171195444e1507e0b2dfc65e1df3674fdfa4c266475de3de3f7d305d40802283791c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr239842.exe
      Filesize

      175KB

      MD5

      b8be60cb8e3de97e8e9eb423faa8135b

      SHA1

      f32d1bd7e5f8f3fea43f31fd5bf82ca014c8d5de

      SHA256

      9598b5032197a3e9dc240fc42f5436474386cca5866e1bed517a4377cd8963fb

      SHA512

      51f8a056c597447f02923591412a3d63cc078e6d37fe706312968ce4d749171195444e1507e0b2dfc65e1df3674fdfa4c266475de3de3f7d305d40802283791c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAv7473.exe
      Filesize

      392KB

      MD5

      6155001b550f7b35d12301dc65b4dd15

      SHA1

      3ec15827aff7b5f0025ec9ca3371452abd8dd1db

      SHA256

      ffe547f65c2cc0a4257c3a1650ceeac8b7849009094e8443b4c8bd25c3f05e7d

      SHA512

      9486ea584848956d6574e9b389c14d1a49c257488b7241035b9a8b37ba7c97bc52802340b53286cefe5badc289ee2833fbc01cca4abc5cd5a1d5be94f00043e4

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAv7473.exe
      Filesize

      392KB

      MD5

      6155001b550f7b35d12301dc65b4dd15

      SHA1

      3ec15827aff7b5f0025ec9ca3371452abd8dd1db

      SHA256

      ffe547f65c2cc0a4257c3a1650ceeac8b7849009094e8443b4c8bd25c3f05e7d

      SHA512

      9486ea584848956d6574e9b389c14d1a49c257488b7241035b9a8b37ba7c97bc52802340b53286cefe5badc289ee2833fbc01cca4abc5cd5a1d5be94f00043e4

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr978195.exe
      Filesize

      11KB

      MD5

      b9c8a8930f218e2fbc4a7eaf4019776a

      SHA1

      000144594de0103a18542609a2d6721a81f47657

      SHA256

      da8d8d4b7f3b2637f501ba6c7f78864459152f2bb374b91d0e09bdf16c7df745

      SHA512

      0cdda4ee7dad82f5e4a342638cf5a2e6eda9457d3fd2b2d44496d2ad94c331b489b929f7b0a0658b6d6165fbad3b6f7b93cd26c624b6d6521b423a4e465cb14e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr978195.exe
      Filesize

      11KB

      MD5

      b9c8a8930f218e2fbc4a7eaf4019776a

      SHA1

      000144594de0103a18542609a2d6721a81f47657

      SHA256

      da8d8d4b7f3b2637f501ba6c7f78864459152f2bb374b91d0e09bdf16c7df745

      SHA512

      0cdda4ee7dad82f5e4a342638cf5a2e6eda9457d3fd2b2d44496d2ad94c331b489b929f7b0a0658b6d6165fbad3b6f7b93cd26c624b6d6521b423a4e465cb14e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku278193.exe
      Filesize

      318KB

      MD5

      7ca5b81017be5c2f77371d552c6a28e3

      SHA1

      8d0d6b8d55052b9e98ccd9074e1be019e8fa4ea8

      SHA256

      ea6bcf4f82ad8ee76c415d10647d73c78571c9b63adb36d227fc57b51ece6e74

      SHA512

      fe773f61eef9a9f7482b39f760657c789ff7de17a9c840f77b6f038c1d595b698d852f4d5e96675dcb4ef3c7ecceedc966ea1a4de4a042d3c8500932a4d3e019

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku278193.exe
      Filesize

      318KB

      MD5

      7ca5b81017be5c2f77371d552c6a28e3

      SHA1

      8d0d6b8d55052b9e98ccd9074e1be019e8fa4ea8

      SHA256

      ea6bcf4f82ad8ee76c415d10647d73c78571c9b63adb36d227fc57b51ece6e74

      SHA512

      fe773f61eef9a9f7482b39f760657c789ff7de17a9c840f77b6f038c1d595b698d852f4d5e96675dcb4ef3c7ecceedc966ea1a4de4a042d3c8500932a4d3e019

    • memory/3332-153-0x0000000004B30000-0x00000000050D4000-memory.dmp
      Filesize

      5.6MB

    • memory/3332-154-0x0000000002170000-0x00000000021BB000-memory.dmp
      Filesize

      300KB

    • memory/3332-155-0x0000000004B20000-0x0000000004B30000-memory.dmp
      Filesize

      64KB

    • memory/3332-157-0x0000000004B20000-0x0000000004B30000-memory.dmp
      Filesize

      64KB

    • memory/3332-156-0x0000000004B20000-0x0000000004B30000-memory.dmp
      Filesize

      64KB

    • memory/3332-158-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-161-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-159-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-165-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-163-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-167-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-169-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-173-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-171-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-175-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-177-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-179-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-181-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-183-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-185-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-187-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-189-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-191-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-193-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-195-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-197-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-199-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-201-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-203-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-205-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-207-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-209-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-211-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-213-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-215-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-217-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-219-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-221-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3332-1064-0x0000000005220000-0x0000000005838000-memory.dmp
      Filesize

      6.1MB

    • memory/3332-1065-0x00000000058A0000-0x00000000059AA000-memory.dmp
      Filesize

      1.0MB

    • memory/3332-1066-0x00000000059E0000-0x00000000059F2000-memory.dmp
      Filesize

      72KB

    • memory/3332-1067-0x0000000005A00000-0x0000000005A3C000-memory.dmp
      Filesize

      240KB

    • memory/3332-1068-0x0000000004B20000-0x0000000004B30000-memory.dmp
      Filesize

      64KB

    • memory/3332-1070-0x0000000005CF0000-0x0000000005D82000-memory.dmp
      Filesize

      584KB

    • memory/3332-1071-0x0000000005D90000-0x0000000005DF6000-memory.dmp
      Filesize

      408KB

    • memory/3332-1072-0x0000000004B20000-0x0000000004B30000-memory.dmp
      Filesize

      64KB

    • memory/3332-1073-0x0000000004B20000-0x0000000004B30000-memory.dmp
      Filesize

      64KB

    • memory/3332-1074-0x0000000006590000-0x0000000006606000-memory.dmp
      Filesize

      472KB

    • memory/3332-1075-0x0000000006620000-0x0000000006670000-memory.dmp
      Filesize

      320KB

    • memory/3332-1076-0x0000000004B20000-0x0000000004B30000-memory.dmp
      Filesize

      64KB

    • memory/3332-1077-0x00000000069E0000-0x0000000006BA2000-memory.dmp
      Filesize

      1.8MB

    • memory/3332-1078-0x0000000006BB0000-0x00000000070DC000-memory.dmp
      Filesize

      5.2MB

    • memory/4148-147-0x0000000000C80000-0x0000000000C8A000-memory.dmp
      Filesize

      40KB

    • memory/4460-1084-0x0000000000630000-0x0000000000662000-memory.dmp
      Filesize

      200KB

    • memory/4460-1085-0x00000000052A0000-0x00000000052B0000-memory.dmp
      Filesize

      64KB

    • memory/4460-1086-0x00000000052A0000-0x00000000052B0000-memory.dmp
      Filesize

      64KB