Analysis

  • max time kernel
    99s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 20:06

General

  • Target

    5b3073deb9b1815b8cc7f1575daeaed85b619fccea9931bd8cf8613ddedcf6d3.exe

  • Size

    673KB

  • MD5

    dbb2319a463d7e164aaa66e4c4b05734

  • SHA1

    38a823c7c2461d3a2049cbeb74b5b099942d66d9

  • SHA256

    5b3073deb9b1815b8cc7f1575daeaed85b619fccea9931bd8cf8613ddedcf6d3

  • SHA512

    0aa246ec5ddcf3f27064d27b0a225fc2fb8bfd9eea034055b94f219e581143d93944e0e0c79a3bbb948972d4104f9e6fafc1f7f13f617d0571f499de961834b7

  • SSDEEP

    12288:FMrwy90cQAXDL+sjKXmPyOilw0wo2r1wEx89/POb9rjmNLs8iHZRps6:xyWATLhjKXQydnS7jbdcLj29

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b3073deb9b1815b8cc7f1575daeaed85b619fccea9931bd8cf8613ddedcf6d3.exe
    "C:\Users\Admin\AppData\Local\Temp\5b3073deb9b1815b8cc7f1575daeaed85b619fccea9931bd8cf8613ddedcf6d3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1448
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un818558.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un818558.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4272
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3668.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3668.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:652
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 1084
          4⤵
          • Program crash
          PID:4124
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8955.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8955.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4080
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4080 -s 1328
          4⤵
          • Program crash
          PID:3820
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si222448.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si222448.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1016
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 652 -ip 652
    1⤵
      PID:3636
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4080 -ip 4080
      1⤵
        PID:2776

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si222448.exe
        Filesize

        175KB

        MD5

        67af42ad00d250816cc5d83d0fa1c258

        SHA1

        20e7eaf91db8a63cf7764fbd5a36d28920b99f94

        SHA256

        07e59946241e43dacd0cb4188efcf2bd769377e1cc43d2a30a5b32b21fcee627

        SHA512

        4ed333443ac434f603c2e027300b1536b47f8000d2e5da89e22c1fc96fa75e6086a5edbffa60e4577f4800076cfa7b49a12978a18899990e420d7cf95e3e8da2

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si222448.exe
        Filesize

        175KB

        MD5

        67af42ad00d250816cc5d83d0fa1c258

        SHA1

        20e7eaf91db8a63cf7764fbd5a36d28920b99f94

        SHA256

        07e59946241e43dacd0cb4188efcf2bd769377e1cc43d2a30a5b32b21fcee627

        SHA512

        4ed333443ac434f603c2e027300b1536b47f8000d2e5da89e22c1fc96fa75e6086a5edbffa60e4577f4800076cfa7b49a12978a18899990e420d7cf95e3e8da2

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un818558.exe
        Filesize

        531KB

        MD5

        bd88634124256a498f549f5646d217cc

        SHA1

        defb92698f66471b2e9703949203e846412c4cf7

        SHA256

        c1b2cfcdaf7488c7277e4757ca47320436eec1bca67e5e14e8d1f0a78fb9d81b

        SHA512

        c16b202cfe462e8a96639ee5a33cf0b6092b559cb86e8f4a93150e537093250fe9b12f4a92d20a76228bbddbc91d31aa9e0be225248ca98c17c2b59f100c5ef4

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un818558.exe
        Filesize

        531KB

        MD5

        bd88634124256a498f549f5646d217cc

        SHA1

        defb92698f66471b2e9703949203e846412c4cf7

        SHA256

        c1b2cfcdaf7488c7277e4757ca47320436eec1bca67e5e14e8d1f0a78fb9d81b

        SHA512

        c16b202cfe462e8a96639ee5a33cf0b6092b559cb86e8f4a93150e537093250fe9b12f4a92d20a76228bbddbc91d31aa9e0be225248ca98c17c2b59f100c5ef4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3668.exe
        Filesize

        260KB

        MD5

        b2dc87e6c5c6343e3fa9e039d20184eb

        SHA1

        8eb3ea18dcbc06738625b00e1bdd5c860612f036

        SHA256

        4ec95fe5e4888e23ccbc75d8f3f98992bdd5a4f58555c701224f859a900dafd6

        SHA512

        f3adfb45bf36f7e82ddece40276e4f3bca6dae6bf01e2d03a77462bc494c0e75feb3abd8fb12d03abdcd107e1fc7db1cdb98c23bbf12d2f0b50c81597621bd83

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3668.exe
        Filesize

        260KB

        MD5

        b2dc87e6c5c6343e3fa9e039d20184eb

        SHA1

        8eb3ea18dcbc06738625b00e1bdd5c860612f036

        SHA256

        4ec95fe5e4888e23ccbc75d8f3f98992bdd5a4f58555c701224f859a900dafd6

        SHA512

        f3adfb45bf36f7e82ddece40276e4f3bca6dae6bf01e2d03a77462bc494c0e75feb3abd8fb12d03abdcd107e1fc7db1cdb98c23bbf12d2f0b50c81597621bd83

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8955.exe
        Filesize

        318KB

        MD5

        31fb0402082e54ab611f2ebcb7b24827

        SHA1

        f2e3f6ba83bd978496110e9edd5643d6913acaa6

        SHA256

        e8f7f9420c1446d35ea1ecce4855e650177ed7ecbfb9514471d914b6274f70ee

        SHA512

        8db1cbed9720140902927ad707bb091afdb7f67d1225e517e6ead5f452fec573cabf138f79106387e3fec341dbbec270c1af8586f1db0e5f8a5da7127f560ecb

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8955.exe
        Filesize

        318KB

        MD5

        31fb0402082e54ab611f2ebcb7b24827

        SHA1

        f2e3f6ba83bd978496110e9edd5643d6913acaa6

        SHA256

        e8f7f9420c1446d35ea1ecce4855e650177ed7ecbfb9514471d914b6274f70ee

        SHA512

        8db1cbed9720140902927ad707bb091afdb7f67d1225e517e6ead5f452fec573cabf138f79106387e3fec341dbbec270c1af8586f1db0e5f8a5da7127f560ecb

      • memory/652-158-0x00000000025E0000-0x00000000025F2000-memory.dmp
        Filesize

        72KB

      • memory/652-168-0x00000000025E0000-0x00000000025F2000-memory.dmp
        Filesize

        72KB

      • memory/652-151-0x0000000004C70000-0x0000000004C80000-memory.dmp
        Filesize

        64KB

      • memory/652-152-0x0000000004C70000-0x0000000004C80000-memory.dmp
        Filesize

        64KB

      • memory/652-150-0x0000000004C70000-0x0000000004C80000-memory.dmp
        Filesize

        64KB

      • memory/652-153-0x00000000025E0000-0x00000000025F2000-memory.dmp
        Filesize

        72KB

      • memory/652-154-0x00000000025E0000-0x00000000025F2000-memory.dmp
        Filesize

        72KB

      • memory/652-156-0x00000000025E0000-0x00000000025F2000-memory.dmp
        Filesize

        72KB

      • memory/652-148-0x0000000004C80000-0x0000000005224000-memory.dmp
        Filesize

        5.6MB

      • memory/652-160-0x00000000025E0000-0x00000000025F2000-memory.dmp
        Filesize

        72KB

      • memory/652-162-0x00000000025E0000-0x00000000025F2000-memory.dmp
        Filesize

        72KB

      • memory/652-164-0x00000000025E0000-0x00000000025F2000-memory.dmp
        Filesize

        72KB

      • memory/652-166-0x00000000025E0000-0x00000000025F2000-memory.dmp
        Filesize

        72KB

      • memory/652-149-0x0000000000610000-0x000000000063D000-memory.dmp
        Filesize

        180KB

      • memory/652-170-0x00000000025E0000-0x00000000025F2000-memory.dmp
        Filesize

        72KB

      • memory/652-172-0x00000000025E0000-0x00000000025F2000-memory.dmp
        Filesize

        72KB

      • memory/652-174-0x00000000025E0000-0x00000000025F2000-memory.dmp
        Filesize

        72KB

      • memory/652-176-0x00000000025E0000-0x00000000025F2000-memory.dmp
        Filesize

        72KB

      • memory/652-178-0x00000000025E0000-0x00000000025F2000-memory.dmp
        Filesize

        72KB

      • memory/652-180-0x00000000025E0000-0x00000000025F2000-memory.dmp
        Filesize

        72KB

      • memory/652-181-0x0000000000400000-0x00000000004B1000-memory.dmp
        Filesize

        708KB

      • memory/652-182-0x0000000004C70000-0x0000000004C80000-memory.dmp
        Filesize

        64KB

      • memory/652-183-0x0000000004C70000-0x0000000004C80000-memory.dmp
        Filesize

        64KB

      • memory/652-184-0x0000000004C70000-0x0000000004C80000-memory.dmp
        Filesize

        64KB

      • memory/652-186-0x0000000000400000-0x00000000004B1000-memory.dmp
        Filesize

        708KB

      • memory/1016-1122-0x0000000004A30000-0x0000000004A40000-memory.dmp
        Filesize

        64KB

      • memory/1016-1121-0x00000000000E0000-0x0000000000112000-memory.dmp
        Filesize

        200KB

      • memory/4080-192-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/4080-225-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/4080-199-0x0000000002130000-0x000000000217B000-memory.dmp
        Filesize

        300KB

      • memory/4080-201-0x0000000004C00000-0x0000000004C10000-memory.dmp
        Filesize

        64KB

      • memory/4080-202-0x0000000004C00000-0x0000000004C10000-memory.dmp
        Filesize

        64KB

      • memory/4080-198-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/4080-205-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/4080-207-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/4080-203-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/4080-209-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/4080-211-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/4080-213-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/4080-215-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/4080-217-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/4080-219-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/4080-221-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/4080-223-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/4080-196-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/4080-227-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/4080-1100-0x00000000051C0000-0x00000000057D8000-memory.dmp
        Filesize

        6.1MB

      • memory/4080-1101-0x00000000057E0000-0x00000000058EA000-memory.dmp
        Filesize

        1.0MB

      • memory/4080-1102-0x0000000004BB0000-0x0000000004BC2000-memory.dmp
        Filesize

        72KB

      • memory/4080-1103-0x00000000058F0000-0x000000000592C000-memory.dmp
        Filesize

        240KB

      • memory/4080-1104-0x0000000004C00000-0x0000000004C10000-memory.dmp
        Filesize

        64KB

      • memory/4080-1105-0x0000000005BB0000-0x0000000005C16000-memory.dmp
        Filesize

        408KB

      • memory/4080-1106-0x0000000006280000-0x0000000006312000-memory.dmp
        Filesize

        584KB

      • memory/4080-1108-0x0000000004C00000-0x0000000004C10000-memory.dmp
        Filesize

        64KB

      • memory/4080-1109-0x0000000004C00000-0x0000000004C10000-memory.dmp
        Filesize

        64KB

      • memory/4080-1110-0x0000000004C00000-0x0000000004C10000-memory.dmp
        Filesize

        64KB

      • memory/4080-1111-0x0000000006450000-0x00000000064C6000-memory.dmp
        Filesize

        472KB

      • memory/4080-1112-0x00000000064E0000-0x0000000006530000-memory.dmp
        Filesize

        320KB

      • memory/4080-1113-0x0000000006560000-0x0000000006722000-memory.dmp
        Filesize

        1.8MB

      • memory/4080-194-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/4080-191-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/4080-1114-0x0000000006730000-0x0000000006C5C000-memory.dmp
        Filesize

        5.2MB

      • memory/4080-1115-0x0000000004C00000-0x0000000004C10000-memory.dmp
        Filesize

        64KB