Analysis

  • max time kernel
    148s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31/03/2023, 21:15

General

  • Target

    b1b29e637c1de8d6046bdc27b6c62fcb33063fa88a9fa557687a3391a21d7ce6.exe

  • Size

    672KB

  • MD5

    5e9501ed5b50a99cd6908fd7996f82a3

  • SHA1

    1b4d691179998d89a046ab578d2b91b9f9678d7f

  • SHA256

    b1b29e637c1de8d6046bdc27b6c62fcb33063fa88a9fa557687a3391a21d7ce6

  • SHA512

    dc3bcb01734f1d787713c3d7073783a0e9e7743747b89ddfd6dd8bb4f27b136037eb5845947918c87d81156273ed9c15b9bd3ccc74bf88bc4b81c8f7c027413c

  • SSDEEP

    12288:bMrDy90NFMQGNHTHtNnXIUT4jznp1GzT3Lq31QcNk4uB:IyoMd9THvYUTIznp1GzT3G36qk4E

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1b29e637c1de8d6046bdc27b6c62fcb33063fa88a9fa557687a3391a21d7ce6.exe
    "C:\Users\Admin\AppData\Local\Temp\b1b29e637c1de8d6046bdc27b6c62fcb33063fa88a9fa557687a3391a21d7ce6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:984
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un973763.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un973763.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3360
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3204.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3204.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4756
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4756 -s 1080
          4⤵
          • Program crash
          PID:4596
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5382.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5382.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3656
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 1804
          4⤵
          • Program crash
          PID:4812
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si948091.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si948091.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4208
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4756 -ip 4756
    1⤵
      PID:752
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 3656 -ip 3656
      1⤵
        PID:1840
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:768

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si948091.exe

        Filesize

        175KB

        MD5

        8ea8fbd3361ac12fc0a1325198de2c4c

        SHA1

        793bd1ed426027f2806ad9c83425c1be5200fc8e

        SHA256

        9f9e624b1252940cc16fb96d70ac8cfb7a56d47494c073a995548912385015aa

        SHA512

        786cf752b22d922bea3e0765256ebfe20ec9106b3321a9e30e3d1ab9ff6fa8ef2966ccdbe4bc397c011064639cbecfd6c2d658762f217a8e18b6e00c1e40156b

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si948091.exe

        Filesize

        175KB

        MD5

        8ea8fbd3361ac12fc0a1325198de2c4c

        SHA1

        793bd1ed426027f2806ad9c83425c1be5200fc8e

        SHA256

        9f9e624b1252940cc16fb96d70ac8cfb7a56d47494c073a995548912385015aa

        SHA512

        786cf752b22d922bea3e0765256ebfe20ec9106b3321a9e30e3d1ab9ff6fa8ef2966ccdbe4bc397c011064639cbecfd6c2d658762f217a8e18b6e00c1e40156b

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un973763.exe

        Filesize

        530KB

        MD5

        edd221e1bf2a05cc0c45d214b00aea33

        SHA1

        9cc49bbfaeaab26499a0fcd0380469d6d824d682

        SHA256

        0ddb2ba63cb426ec876c1b9ae88f05b96fdc09d73b1b9936b45b293727748824

        SHA512

        fc0118977a2da264e17961acab8b1b3ada7281b3070dc99e3c04ec24e06833f74b2573cf8c664fe23f36a32df4e72ee38642217f930af29c92320e6e25e7db74

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un973763.exe

        Filesize

        530KB

        MD5

        edd221e1bf2a05cc0c45d214b00aea33

        SHA1

        9cc49bbfaeaab26499a0fcd0380469d6d824d682

        SHA256

        0ddb2ba63cb426ec876c1b9ae88f05b96fdc09d73b1b9936b45b293727748824

        SHA512

        fc0118977a2da264e17961acab8b1b3ada7281b3070dc99e3c04ec24e06833f74b2573cf8c664fe23f36a32df4e72ee38642217f930af29c92320e6e25e7db74

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3204.exe

        Filesize

        301KB

        MD5

        5aa5aeb1a27b561627972a298d895d9c

        SHA1

        3e743182cefa7cc8558f0a3e1c25ad1d8a487e75

        SHA256

        a9e85a476f791985cb26fa8655844d05e2ff33575e8025cec49be667bbb98f62

        SHA512

        02af0465aaf9aab74d9c814e7c286a720974dc8d144df0b4342dcc1c8558276a41ccf4f8b2094e4facd35cce8d7fd2a10c178de3a8e4b0b41396de06184f27fb

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3204.exe

        Filesize

        301KB

        MD5

        5aa5aeb1a27b561627972a298d895d9c

        SHA1

        3e743182cefa7cc8558f0a3e1c25ad1d8a487e75

        SHA256

        a9e85a476f791985cb26fa8655844d05e2ff33575e8025cec49be667bbb98f62

        SHA512

        02af0465aaf9aab74d9c814e7c286a720974dc8d144df0b4342dcc1c8558276a41ccf4f8b2094e4facd35cce8d7fd2a10c178de3a8e4b0b41396de06184f27fb

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5382.exe

        Filesize

        359KB

        MD5

        27de010e28626853a8358d50500c6e21

        SHA1

        eefb3eab3db9aace3976e6815fff31941e25d648

        SHA256

        9daef93220fd5376717f18e8d47b8a1bbad9098c949e2e1a93f3884303e5c834

        SHA512

        50e341a52c09f5d2454842760baceee0611e306c1ba7885082c9af0ff7ccaf405e89963a5c9055369f333bbe9879872a24290075e8ae39edb05a904b962c8173

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5382.exe

        Filesize

        359KB

        MD5

        27de010e28626853a8358d50500c6e21

        SHA1

        eefb3eab3db9aace3976e6815fff31941e25d648

        SHA256

        9daef93220fd5376717f18e8d47b8a1bbad9098c949e2e1a93f3884303e5c834

        SHA512

        50e341a52c09f5d2454842760baceee0611e306c1ba7885082c9af0ff7ccaf405e89963a5c9055369f333bbe9879872a24290075e8ae39edb05a904b962c8173

      • memory/3656-227-0x0000000006660000-0x000000000669F000-memory.dmp

        Filesize

        252KB

      • memory/3656-1102-0x0000000007020000-0x0000000007032000-memory.dmp

        Filesize

        72KB

      • memory/3656-1115-0x0000000003A30000-0x0000000003A40000-memory.dmp

        Filesize

        64KB

      • memory/3656-1114-0x0000000008750000-0x00000000087A0000-memory.dmp

        Filesize

        320KB

      • memory/3656-1113-0x00000000086D0000-0x0000000008746000-memory.dmp

        Filesize

        472KB

      • memory/3656-1112-0x0000000003A30000-0x0000000003A40000-memory.dmp

        Filesize

        64KB

      • memory/3656-1111-0x0000000003A30000-0x0000000003A40000-memory.dmp

        Filesize

        64KB

      • memory/3656-1110-0x0000000003A30000-0x0000000003A40000-memory.dmp

        Filesize

        64KB

      • memory/3656-1109-0x0000000007E10000-0x000000000833C000-memory.dmp

        Filesize

        5.2MB

      • memory/3656-1108-0x0000000007C30000-0x0000000007DF2000-memory.dmp

        Filesize

        1.8MB

      • memory/3656-1107-0x0000000007B20000-0x0000000007BB2000-memory.dmp

        Filesize

        584KB

      • memory/3656-1106-0x0000000007330000-0x0000000007396000-memory.dmp

        Filesize

        408KB

      • memory/3656-1104-0x0000000003A30000-0x0000000003A40000-memory.dmp

        Filesize

        64KB

      • memory/3656-1103-0x0000000007040000-0x000000000707C000-memory.dmp

        Filesize

        240KB

      • memory/3656-1101-0x0000000006EE0000-0x0000000006FEA000-memory.dmp

        Filesize

        1.0MB

      • memory/3656-1100-0x0000000006840000-0x0000000006E58000-memory.dmp

        Filesize

        6.1MB

      • memory/3656-225-0x0000000006660000-0x000000000669F000-memory.dmp

        Filesize

        252KB

      • memory/3656-223-0x0000000006660000-0x000000000669F000-memory.dmp

        Filesize

        252KB

      • memory/3656-221-0x0000000006660000-0x000000000669F000-memory.dmp

        Filesize

        252KB

      • memory/3656-219-0x0000000006660000-0x000000000669F000-memory.dmp

        Filesize

        252KB

      • memory/3656-217-0x0000000006660000-0x000000000669F000-memory.dmp

        Filesize

        252KB

      • memory/3656-213-0x0000000003A30000-0x0000000003A40000-memory.dmp

        Filesize

        64KB

      • memory/3656-215-0x0000000006660000-0x000000000669F000-memory.dmp

        Filesize

        252KB

      • memory/3656-192-0x0000000006660000-0x000000000669F000-memory.dmp

        Filesize

        252KB

      • memory/3656-191-0x0000000006660000-0x000000000669F000-memory.dmp

        Filesize

        252KB

      • memory/3656-194-0x0000000006660000-0x000000000669F000-memory.dmp

        Filesize

        252KB

      • memory/3656-196-0x0000000006660000-0x000000000669F000-memory.dmp

        Filesize

        252KB

      • memory/3656-198-0x0000000006660000-0x000000000669F000-memory.dmp

        Filesize

        252KB

      • memory/3656-200-0x0000000006660000-0x000000000669F000-memory.dmp

        Filesize

        252KB

      • memory/3656-202-0x0000000006660000-0x000000000669F000-memory.dmp

        Filesize

        252KB

      • memory/3656-204-0x0000000006660000-0x000000000669F000-memory.dmp

        Filesize

        252KB

      • memory/3656-206-0x0000000006660000-0x000000000669F000-memory.dmp

        Filesize

        252KB

      • memory/3656-208-0x0000000006660000-0x000000000669F000-memory.dmp

        Filesize

        252KB

      • memory/3656-210-0x0000000006660000-0x000000000669F000-memory.dmp

        Filesize

        252KB

      • memory/3656-211-0x0000000001CB0000-0x0000000001CFB000-memory.dmp

        Filesize

        300KB

      • memory/3656-214-0x0000000003A30000-0x0000000003A40000-memory.dmp

        Filesize

        64KB

      • memory/4208-1121-0x0000000000300000-0x0000000000332000-memory.dmp

        Filesize

        200KB

      • memory/4208-1122-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

        Filesize

        64KB

      • memory/4756-174-0x0000000003A00000-0x0000000003A12000-memory.dmp

        Filesize

        72KB

      • memory/4756-149-0x0000000006420000-0x00000000069C4000-memory.dmp

        Filesize

        5.6MB

      • memory/4756-184-0x00000000039E0000-0x00000000039F0000-memory.dmp

        Filesize

        64KB

      • memory/4756-183-0x00000000039E0000-0x00000000039F0000-memory.dmp

        Filesize

        64KB

      • memory/4756-181-0x0000000000400000-0x0000000001AE3000-memory.dmp

        Filesize

        22.9MB

      • memory/4756-150-0x0000000003A00000-0x0000000003A12000-memory.dmp

        Filesize

        72KB

      • memory/4756-180-0x0000000003A00000-0x0000000003A12000-memory.dmp

        Filesize

        72KB

      • memory/4756-178-0x0000000003A00000-0x0000000003A12000-memory.dmp

        Filesize

        72KB

      • memory/4756-156-0x00000000039E0000-0x00000000039F0000-memory.dmp

        Filesize

        64KB

      • memory/4756-176-0x0000000003A00000-0x0000000003A12000-memory.dmp

        Filesize

        72KB

      • memory/4756-151-0x0000000003A00000-0x0000000003A12000-memory.dmp

        Filesize

        72KB

      • memory/4756-172-0x0000000003A00000-0x0000000003A12000-memory.dmp

        Filesize

        72KB

      • memory/4756-185-0x00000000039E0000-0x00000000039F0000-memory.dmp

        Filesize

        64KB

      • memory/4756-166-0x0000000003A00000-0x0000000003A12000-memory.dmp

        Filesize

        72KB

      • memory/4756-170-0x0000000003A00000-0x0000000003A12000-memory.dmp

        Filesize

        72KB

      • memory/4756-164-0x0000000003A00000-0x0000000003A12000-memory.dmp

        Filesize

        72KB

      • memory/4756-162-0x0000000003A00000-0x0000000003A12000-memory.dmp

        Filesize

        72KB

      • memory/4756-159-0x0000000003A00000-0x0000000003A12000-memory.dmp

        Filesize

        72KB

      • memory/4756-160-0x00000000039E0000-0x00000000039F0000-memory.dmp

        Filesize

        64KB

      • memory/4756-155-0x0000000003A00000-0x0000000003A12000-memory.dmp

        Filesize

        72KB

      • memory/4756-158-0x00000000039E0000-0x00000000039F0000-memory.dmp

        Filesize

        64KB

      • memory/4756-168-0x0000000003A00000-0x0000000003A12000-memory.dmp

        Filesize

        72KB

      • memory/4756-148-0x0000000001B70000-0x0000000001B9D000-memory.dmp

        Filesize

        180KB

      • memory/4756-186-0x0000000000400000-0x0000000001AE3000-memory.dmp

        Filesize

        22.9MB

      • memory/4756-153-0x0000000003A00000-0x0000000003A12000-memory.dmp

        Filesize

        72KB