Analysis

  • max time kernel
    76s
  • max time network
    139s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 20:08

General

  • Target

    d985466811dc7942757fe5849162fbc9f30d9d84137345527dff5fb2471988ed.exe

  • Size

    534KB

  • MD5

    d4c2c6b586669d226cecfcec00bea072

  • SHA1

    5f9ed08a332b9736b5b978444c1990fc4d35f4d0

  • SHA256

    d985466811dc7942757fe5849162fbc9f30d9d84137345527dff5fb2471988ed

  • SHA512

    fc0a4505079a2e7ee9ca1450fb9c1dcb62a202e36db04d1c5bc99e57687279520d38e119e9a933494873994ef0c8172a3ab6b8c825d88c1aa7d79c1a99b90b4d

  • SSDEEP

    12288:JMrGy90NhpeMrPZ9A1KfzTUoXxrOb7rgkkT1yoWF826:Dy4hpee3AbrK1yo28N

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d985466811dc7942757fe5849162fbc9f30d9d84137345527dff5fb2471988ed.exe
    "C:\Users\Admin\AppData\Local\Temp\d985466811dc7942757fe5849162fbc9f30d9d84137345527dff5fb2471988ed.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziSr1183.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziSr1183.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2024
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr607472.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr607472.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:800
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku208186.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku208186.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4212
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4212 -s 1912
          4⤵
          • Program crash
          PID:1752
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr574464.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr574464.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4916
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4212 -ip 4212
    1⤵
      PID:908

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr574464.exe
      Filesize

      175KB

      MD5

      19d80666e40d4ca3f3ab0aaa163f8b36

      SHA1

      276d661cfd98d641929944a5f3fef571546c25c7

      SHA256

      2f08ddd7cb69fff0fd36118d27f4a6a5c2fd3422b9d2fb5729b91df4c94e6db4

      SHA512

      e3353eee80350633d66e4231443ee9c25c549fd4b6629e2698bedf69f7cbe4c6a8078569967de311560f2d749ee47c1083ae5cd0418a131c7f381fedd649a8d1

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr574464.exe
      Filesize

      175KB

      MD5

      19d80666e40d4ca3f3ab0aaa163f8b36

      SHA1

      276d661cfd98d641929944a5f3fef571546c25c7

      SHA256

      2f08ddd7cb69fff0fd36118d27f4a6a5c2fd3422b9d2fb5729b91df4c94e6db4

      SHA512

      e3353eee80350633d66e4231443ee9c25c549fd4b6629e2698bedf69f7cbe4c6a8078569967de311560f2d749ee47c1083ae5cd0418a131c7f381fedd649a8d1

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziSr1183.exe
      Filesize

      392KB

      MD5

      263354a849b43b9c603c15030845e400

      SHA1

      bde3c94faf0149e90cd2bb93407a63b885b8e53d

      SHA256

      ef821c85e81b7c8f44e69339ecc509579c0017aa2e113ed7a7d4d4408e1fb9c6

      SHA512

      93f1cb776f5ff971329143484248af6883a89276a8882868c78bc36e80bd529223ac4928a8b0df1796cc639c3d9c31faf41af63a0ec7d916e8db6d714d5568d2

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziSr1183.exe
      Filesize

      392KB

      MD5

      263354a849b43b9c603c15030845e400

      SHA1

      bde3c94faf0149e90cd2bb93407a63b885b8e53d

      SHA256

      ef821c85e81b7c8f44e69339ecc509579c0017aa2e113ed7a7d4d4408e1fb9c6

      SHA512

      93f1cb776f5ff971329143484248af6883a89276a8882868c78bc36e80bd529223ac4928a8b0df1796cc639c3d9c31faf41af63a0ec7d916e8db6d714d5568d2

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr607472.exe
      Filesize

      11KB

      MD5

      370a5f9feececce967e07e696a29238a

      SHA1

      a3c659b18794097c5e75a943da265ea688da07d0

      SHA256

      a4c8f95325ddfffcb17a5d6b70dbfe9ca24c664a00e109183681cd731cf01391

      SHA512

      66ab5be12d5a91fd7e3664662b5b4c424b3706eb14bc3c1f302f2272fdc3f014e7b192502a1e094ab20c25987a28cfc67dd7daaa19b723d111a2c0d58b8f2607

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr607472.exe
      Filesize

      11KB

      MD5

      370a5f9feececce967e07e696a29238a

      SHA1

      a3c659b18794097c5e75a943da265ea688da07d0

      SHA256

      a4c8f95325ddfffcb17a5d6b70dbfe9ca24c664a00e109183681cd731cf01391

      SHA512

      66ab5be12d5a91fd7e3664662b5b4c424b3706eb14bc3c1f302f2272fdc3f014e7b192502a1e094ab20c25987a28cfc67dd7daaa19b723d111a2c0d58b8f2607

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku208186.exe
      Filesize

      318KB

      MD5

      29f7b1166d6251e31cf3cfad8a1573cc

      SHA1

      a78a70732f911d497aeb9bb0f27c488ae79fbbe9

      SHA256

      04dc21adb245aa4fc99616b0d65ab33ab63fe5da14d262aa250dc3e6f2d5d474

      SHA512

      51996560474576e92bf16c9e252923377cd4fb90e5fed73729e89675fbe9821a48821dc010001e9f14a7724b93abb04d55eaec231bdfaff1f16458b2ef2afef0

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku208186.exe
      Filesize

      318KB

      MD5

      29f7b1166d6251e31cf3cfad8a1573cc

      SHA1

      a78a70732f911d497aeb9bb0f27c488ae79fbbe9

      SHA256

      04dc21adb245aa4fc99616b0d65ab33ab63fe5da14d262aa250dc3e6f2d5d474

      SHA512

      51996560474576e92bf16c9e252923377cd4fb90e5fed73729e89675fbe9821a48821dc010001e9f14a7724b93abb04d55eaec231bdfaff1f16458b2ef2afef0

    • memory/800-147-0x0000000000C40000-0x0000000000C4A000-memory.dmp
      Filesize

      40KB

    • memory/4212-153-0x0000000004AE0000-0x0000000005084000-memory.dmp
      Filesize

      5.6MB

    • memory/4212-154-0x0000000000630000-0x000000000067B000-memory.dmp
      Filesize

      300KB

    • memory/4212-155-0x00000000021E0000-0x00000000021F0000-memory.dmp
      Filesize

      64KB

    • memory/4212-156-0x00000000021E0000-0x00000000021F0000-memory.dmp
      Filesize

      64KB

    • memory/4212-157-0x00000000021E0000-0x00000000021F0000-memory.dmp
      Filesize

      64KB

    • memory/4212-158-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-159-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-161-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-163-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-165-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-167-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-169-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-171-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-173-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-175-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-177-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-179-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-181-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-183-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-185-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-187-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-189-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-191-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-193-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-197-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-195-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-199-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-201-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-203-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-205-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-207-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-209-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-211-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-213-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-215-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-217-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-219-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-221-0x0000000002610000-0x000000000264F000-memory.dmp
      Filesize

      252KB

    • memory/4212-1064-0x00000000050C0000-0x00000000056D8000-memory.dmp
      Filesize

      6.1MB

    • memory/4212-1065-0x0000000005760000-0x000000000586A000-memory.dmp
      Filesize

      1.0MB

    • memory/4212-1066-0x00000000058A0000-0x00000000058B2000-memory.dmp
      Filesize

      72KB

    • memory/4212-1067-0x00000000058C0000-0x00000000058FC000-memory.dmp
      Filesize

      240KB

    • memory/4212-1068-0x00000000021E0000-0x00000000021F0000-memory.dmp
      Filesize

      64KB

    • memory/4212-1070-0x00000000021E0000-0x00000000021F0000-memory.dmp
      Filesize

      64KB

    • memory/4212-1071-0x00000000021E0000-0x00000000021F0000-memory.dmp
      Filesize

      64KB

    • memory/4212-1072-0x00000000021E0000-0x00000000021F0000-memory.dmp
      Filesize

      64KB

    • memory/4212-1073-0x0000000005BB0000-0x0000000005C42000-memory.dmp
      Filesize

      584KB

    • memory/4212-1074-0x0000000005C50000-0x0000000005CB6000-memory.dmp
      Filesize

      408KB

    • memory/4212-1075-0x0000000006450000-0x00000000064C6000-memory.dmp
      Filesize

      472KB

    • memory/4212-1076-0x00000000064E0000-0x0000000006530000-memory.dmp
      Filesize

      320KB

    • memory/4212-1077-0x0000000006560000-0x0000000006722000-memory.dmp
      Filesize

      1.8MB

    • memory/4212-1078-0x0000000006730000-0x0000000006C5C000-memory.dmp
      Filesize

      5.2MB

    • memory/4212-1079-0x00000000021E0000-0x00000000021F0000-memory.dmp
      Filesize

      64KB

    • memory/4916-1086-0x0000000000DB0000-0x0000000000DE2000-memory.dmp
      Filesize

      200KB

    • memory/4916-1087-0x0000000005700000-0x0000000005710000-memory.dmp
      Filesize

      64KB

    • memory/4916-1088-0x0000000005700000-0x0000000005710000-memory.dmp
      Filesize

      64KB