Analysis

  • max time kernel
    61s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 20:07

General

  • Target

    a9ec357c61e66523b2b1b94823f4ba2badb709e65e53c3b17b9d7aba80994513.exe

  • Size

    533KB

  • MD5

    4f9819a8794e661c6b99834ab13d7241

  • SHA1

    ec83bc38ead74600b5dfcf76c888308bc286d3d3

  • SHA256

    a9ec357c61e66523b2b1b94823f4ba2badb709e65e53c3b17b9d7aba80994513

  • SHA512

    b31a1bb817fc386c03835b769292d9ea09bc959e4221751f379c2bd552db1a71cb689937d71f017b568ef61e907992ca90515e0b152339709b52564a14735fad

  • SSDEEP

    12288:FMrWy90Vu1LnKJMmmJWWUe2Bej8j8aObVreUz7SZEP:byXLhmxJpIJbnaEP

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9ec357c61e66523b2b1b94823f4ba2badb709e65e53c3b17b9d7aba80994513.exe
    "C:\Users\Admin\AppData\Local\Temp\a9ec357c61e66523b2b1b94823f4ba2badb709e65e53c3b17b9d7aba80994513.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1000
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicU7818.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicU7818.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1996
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr436735.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr436735.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2156
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku872385.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku872385.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1944
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 1728
          4⤵
          • Program crash
          PID:4964
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr679822.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr679822.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2224
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1944 -ip 1944
    1⤵
      PID:4924

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr679822.exe
      Filesize

      175KB

      MD5

      317432ac22547442916b73abb1ac9391

      SHA1

      a295c636369212933ce7244d93c7e54e09a0c74e

      SHA256

      df113e106c9028deb76daac9b6672a11a525f82e48859bb66acc5b00103efcba

      SHA512

      6c6f21b2312402ec24bd4a3dd9ad1addca52abb4579fff9f0e94dff6efbc275a11c3d345528d62cb46ed999306e2590ce42278a8a51467b824d0561b4462d06e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr679822.exe
      Filesize

      175KB

      MD5

      317432ac22547442916b73abb1ac9391

      SHA1

      a295c636369212933ce7244d93c7e54e09a0c74e

      SHA256

      df113e106c9028deb76daac9b6672a11a525f82e48859bb66acc5b00103efcba

      SHA512

      6c6f21b2312402ec24bd4a3dd9ad1addca52abb4579fff9f0e94dff6efbc275a11c3d345528d62cb46ed999306e2590ce42278a8a51467b824d0561b4462d06e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicU7818.exe
      Filesize

      391KB

      MD5

      1eae177be08301af0010495b7ab35a13

      SHA1

      5a3caeebc57e158dd4f887393f3d2e85c2bcf590

      SHA256

      0d1ee508392b504d343bc60d4e9882198d617f77ebabca519c08bb829b6504bf

      SHA512

      c0a26542a7a3caea1e87c9965a81c04ed0e40df0423f1f1c684db2a342db3ab366a2c01f0bdbf199b415306b8ffe1ee68087623877f4eb7055858d7d0be8c8b6

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicU7818.exe
      Filesize

      391KB

      MD5

      1eae177be08301af0010495b7ab35a13

      SHA1

      5a3caeebc57e158dd4f887393f3d2e85c2bcf590

      SHA256

      0d1ee508392b504d343bc60d4e9882198d617f77ebabca519c08bb829b6504bf

      SHA512

      c0a26542a7a3caea1e87c9965a81c04ed0e40df0423f1f1c684db2a342db3ab366a2c01f0bdbf199b415306b8ffe1ee68087623877f4eb7055858d7d0be8c8b6

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr436735.exe
      Filesize

      11KB

      MD5

      68a62fb3dd65f9531f7ca2f3d5087874

      SHA1

      8f1407831b9a5ddaca84ca3517d321d1f6ffd595

      SHA256

      19d0707c0ba4781db3ed1f0a719f0d5f686ca252d738a8a833e1f1667a8a6686

      SHA512

      a6f88a7564795573031d9718a5129046f55126b3fc909a62dad6abc8e22f1b3ef28edff904bbfd9e95e9e33a3aef97aea6a7e2b6b2d7f5f2684e53f6eebbabff

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr436735.exe
      Filesize

      11KB

      MD5

      68a62fb3dd65f9531f7ca2f3d5087874

      SHA1

      8f1407831b9a5ddaca84ca3517d321d1f6ffd595

      SHA256

      19d0707c0ba4781db3ed1f0a719f0d5f686ca252d738a8a833e1f1667a8a6686

      SHA512

      a6f88a7564795573031d9718a5129046f55126b3fc909a62dad6abc8e22f1b3ef28edff904bbfd9e95e9e33a3aef97aea6a7e2b6b2d7f5f2684e53f6eebbabff

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku872385.exe
      Filesize

      318KB

      MD5

      0426bf65cd3330a368acd9e8e80ed8a3

      SHA1

      f1997a27775168861b08970c3dfdd0461eadc38a

      SHA256

      bf6f2993ec77334c9b168fed9e17d95d4f2ce69c6f9e82e513af0196b9ffb1d1

      SHA512

      fd8167497ceacb68120e016bb07c7852bbd91a02b23df15dd14cba9a4375eb87fcd984bae35edfce40ea6eee1de0d15dc417349ec8207246e572c43198df98d5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku872385.exe
      Filesize

      318KB

      MD5

      0426bf65cd3330a368acd9e8e80ed8a3

      SHA1

      f1997a27775168861b08970c3dfdd0461eadc38a

      SHA256

      bf6f2993ec77334c9b168fed9e17d95d4f2ce69c6f9e82e513af0196b9ffb1d1

      SHA512

      fd8167497ceacb68120e016bb07c7852bbd91a02b23df15dd14cba9a4375eb87fcd984bae35edfce40ea6eee1de0d15dc417349ec8207246e572c43198df98d5

    • memory/1944-153-0x0000000002150000-0x000000000219B000-memory.dmp
      Filesize

      300KB

    • memory/1944-154-0x0000000004C00000-0x00000000051A4000-memory.dmp
      Filesize

      5.6MB

    • memory/1944-155-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-156-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-158-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-160-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-162-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-164-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-166-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-168-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-170-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-172-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-174-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-176-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-178-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-181-0x0000000004BF0000-0x0000000004C00000-memory.dmp
      Filesize

      64KB

    • memory/1944-180-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-185-0x0000000004BF0000-0x0000000004C00000-memory.dmp
      Filesize

      64KB

    • memory/1944-184-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-183-0x0000000004BF0000-0x0000000004C00000-memory.dmp
      Filesize

      64KB

    • memory/1944-187-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-189-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-191-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-193-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-195-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-197-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-199-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-201-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-203-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-205-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-207-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-209-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-211-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-213-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-215-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-217-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-219-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-221-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/1944-1064-0x00000000052B0000-0x00000000058C8000-memory.dmp
      Filesize

      6.1MB

    • memory/1944-1065-0x00000000058D0000-0x00000000059DA000-memory.dmp
      Filesize

      1.0MB

    • memory/1944-1066-0x00000000059E0000-0x00000000059F2000-memory.dmp
      Filesize

      72KB

    • memory/1944-1067-0x0000000005B00000-0x0000000005B3C000-memory.dmp
      Filesize

      240KB

    • memory/1944-1068-0x0000000004BF0000-0x0000000004C00000-memory.dmp
      Filesize

      64KB

    • memory/1944-1070-0x0000000005CF0000-0x0000000005D82000-memory.dmp
      Filesize

      584KB

    • memory/1944-1071-0x0000000005D90000-0x0000000005DF6000-memory.dmp
      Filesize

      408KB

    • memory/1944-1072-0x00000000064A0000-0x0000000006516000-memory.dmp
      Filesize

      472KB

    • memory/1944-1073-0x0000000006520000-0x0000000006570000-memory.dmp
      Filesize

      320KB

    • memory/1944-1074-0x0000000004BF0000-0x0000000004C00000-memory.dmp
      Filesize

      64KB

    • memory/1944-1075-0x0000000004BF0000-0x0000000004C00000-memory.dmp
      Filesize

      64KB

    • memory/1944-1076-0x0000000004BF0000-0x0000000004C00000-memory.dmp
      Filesize

      64KB

    • memory/1944-1077-0x0000000006590000-0x0000000006752000-memory.dmp
      Filesize

      1.8MB

    • memory/1944-1078-0x0000000006770000-0x0000000006C9C000-memory.dmp
      Filesize

      5.2MB

    • memory/1944-1079-0x0000000004BF0000-0x0000000004C00000-memory.dmp
      Filesize

      64KB

    • memory/2156-147-0x0000000000A30000-0x0000000000A3A000-memory.dmp
      Filesize

      40KB

    • memory/2224-1085-0x0000000000CA0000-0x0000000000CD2000-memory.dmp
      Filesize

      200KB

    • memory/2224-1086-0x0000000005540000-0x0000000005550000-memory.dmp
      Filesize

      64KB