Analysis

  • max time kernel
    99s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 20:30

General

  • Target

    16d000b851603ad4e7e63095b9a825391d77fd92758a980237144a900ac78c24.exe

  • Size

    533KB

  • MD5

    17412e6beae179322389f4eeb97c4c35

  • SHA1

    5fe77abe6420fbb2ff034a014dda3b0991bb1c1e

  • SHA256

    16d000b851603ad4e7e63095b9a825391d77fd92758a980237144a900ac78c24

  • SHA512

    7cfd44a2419f16055ae27d84ba4534651a4701d2bcbae8dd64b375ed969022bc2acbb343a84f0046c075b6e6d2089a58dd472f99ea2350f3df7372f1aca85627

  • SSDEEP

    12288:SMrSy90Yb/yfMRECR0d7hiELPB75+qZ3LqQTH3ESZqv+y:8y9TTKd7jzj+qZ3GOXEky

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16d000b851603ad4e7e63095b9a825391d77fd92758a980237144a900ac78c24.exe
    "C:\Users\Admin\AppData\Local\Temp\16d000b851603ad4e7e63095b9a825391d77fd92758a980237144a900ac78c24.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1520
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKu5043.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKu5043.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4972
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr744546.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr744546.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1656
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku641959.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku641959.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4800
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 1536
          4⤵
          • Program crash
          PID:4236
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr841779.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr841779.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4532
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4800 -ip 4800
    1⤵
      PID:1924

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr841779.exe
      Filesize

      175KB

      MD5

      57d9305216508ce34c9bada6569ea7db

      SHA1

      294738f2d1d02df1088a4216b3915529dcc71791

      SHA256

      175168d81f13920b08c1627a327fc45abbdd93597a01f1c3521ae7d2a77204c1

      SHA512

      1558cbf67d0bce63eb1376d03985e2cc58f2af2f1248f9eb16ee176ef904f3d37179b1219fd4ba106fb303f501fe45f2e05a2944cb401306d8b1ce3b20d0348b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr841779.exe
      Filesize

      175KB

      MD5

      57d9305216508ce34c9bada6569ea7db

      SHA1

      294738f2d1d02df1088a4216b3915529dcc71791

      SHA256

      175168d81f13920b08c1627a327fc45abbdd93597a01f1c3521ae7d2a77204c1

      SHA512

      1558cbf67d0bce63eb1376d03985e2cc58f2af2f1248f9eb16ee176ef904f3d37179b1219fd4ba106fb303f501fe45f2e05a2944cb401306d8b1ce3b20d0348b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKu5043.exe
      Filesize

      392KB

      MD5

      608e8c3c1ee2e32b328c5d070212a201

      SHA1

      90f5b6d78ed9c51b197927d4c3b7c727e75719d1

      SHA256

      e4bbf37787d15b2b2ed5643923cc3e0dec3f69154f5a6d7f9757782d7ff8266e

      SHA512

      73fb6ef25a9ebae7df561b360f639b5f1b9a76c481651a326098fc9d3566bea15b39b8c0b4326f3b1dd887c6f6399c3cae45e7eaf852cbf7ffe0d92f8d3fe2cd

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKu5043.exe
      Filesize

      392KB

      MD5

      608e8c3c1ee2e32b328c5d070212a201

      SHA1

      90f5b6d78ed9c51b197927d4c3b7c727e75719d1

      SHA256

      e4bbf37787d15b2b2ed5643923cc3e0dec3f69154f5a6d7f9757782d7ff8266e

      SHA512

      73fb6ef25a9ebae7df561b360f639b5f1b9a76c481651a326098fc9d3566bea15b39b8c0b4326f3b1dd887c6f6399c3cae45e7eaf852cbf7ffe0d92f8d3fe2cd

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr744546.exe
      Filesize

      11KB

      MD5

      b4fad69b4c4ea06898ff4ebe62a47774

      SHA1

      1e9ff57670b3c273f4f9ea5724069f45d9076466

      SHA256

      79e1e0f95060ab0ee3afb8d7b3b52a2ec7d4852e19f24aa4b62f136a612e8a00

      SHA512

      5c20ad4f9ea3cea367f1028075f6479e048ea245e5641934187df9815b40dab677ed8d27d15d263aeb0cbd4350d9210f54857f7934fa504f312aef26ce671530

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr744546.exe
      Filesize

      11KB

      MD5

      b4fad69b4c4ea06898ff4ebe62a47774

      SHA1

      1e9ff57670b3c273f4f9ea5724069f45d9076466

      SHA256

      79e1e0f95060ab0ee3afb8d7b3b52a2ec7d4852e19f24aa4b62f136a612e8a00

      SHA512

      5c20ad4f9ea3cea367f1028075f6479e048ea245e5641934187df9815b40dab677ed8d27d15d263aeb0cbd4350d9210f54857f7934fa504f312aef26ce671530

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku641959.exe
      Filesize

      359KB

      MD5

      cbf27a5c67e277f4e9ae88c9d2d15f46

      SHA1

      a168f8da0be2fa261dbdd2b65cd7b9a6dfc4b780

      SHA256

      f1e6e72a1d2744effc58885c2cddc4d5a9d281856ff37ddc095ecf625a7077d7

      SHA512

      d54e8d376c9bd9a1c08762ea1e76eddece869cb721f5c2a9f8c7808a0081ffcb727a4081392ec8deb73562d177ab68d66410484cf212b080b7f6d5c27a59c6ce

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku641959.exe
      Filesize

      359KB

      MD5

      cbf27a5c67e277f4e9ae88c9d2d15f46

      SHA1

      a168f8da0be2fa261dbdd2b65cd7b9a6dfc4b780

      SHA256

      f1e6e72a1d2744effc58885c2cddc4d5a9d281856ff37ddc095ecf625a7077d7

      SHA512

      d54e8d376c9bd9a1c08762ea1e76eddece869cb721f5c2a9f8c7808a0081ffcb727a4081392ec8deb73562d177ab68d66410484cf212b080b7f6d5c27a59c6ce

    • memory/1656-147-0x0000000000930000-0x000000000093A000-memory.dmp
      Filesize

      40KB

    • memory/4532-1085-0x0000000000AD0000-0x0000000000B02000-memory.dmp
      Filesize

      200KB

    • memory/4532-1086-0x0000000005380000-0x0000000005390000-memory.dmp
      Filesize

      64KB

    • memory/4800-189-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-197-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-155-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-158-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-156-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-160-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-162-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-164-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-166-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-168-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-170-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-172-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-174-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-176-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-178-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-180-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-181-0x0000000006250000-0x0000000006260000-memory.dmp
      Filesize

      64KB

    • memory/4800-183-0x0000000006250000-0x0000000006260000-memory.dmp
      Filesize

      64KB

    • memory/4800-185-0x0000000006250000-0x0000000006260000-memory.dmp
      Filesize

      64KB

    • memory/4800-184-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-187-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-153-0x0000000001D90000-0x0000000001DDB000-memory.dmp
      Filesize

      300KB

    • memory/4800-191-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-193-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-195-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-199-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-201-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-154-0x0000000006260000-0x0000000006804000-memory.dmp
      Filesize

      5.6MB

    • memory/4800-203-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-205-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-207-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-209-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-211-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-213-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-215-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-217-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-219-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-221-0x0000000003BB0000-0x0000000003BEF000-memory.dmp
      Filesize

      252KB

    • memory/4800-1064-0x0000000006910000-0x0000000006F28000-memory.dmp
      Filesize

      6.1MB

    • memory/4800-1065-0x0000000006F30000-0x000000000703A000-memory.dmp
      Filesize

      1.0MB

    • memory/4800-1066-0x0000000006230000-0x0000000006242000-memory.dmp
      Filesize

      72KB

    • memory/4800-1067-0x0000000006250000-0x0000000006260000-memory.dmp
      Filesize

      64KB

    • memory/4800-1068-0x0000000007040000-0x000000000707C000-memory.dmp
      Filesize

      240KB

    • memory/4800-1070-0x0000000007330000-0x00000000073C2000-memory.dmp
      Filesize

      584KB

    • memory/4800-1071-0x00000000073D0000-0x0000000007436000-memory.dmp
      Filesize

      408KB

    • memory/4800-1072-0x0000000007AF0000-0x0000000007CB2000-memory.dmp
      Filesize

      1.8MB

    • memory/4800-1073-0x0000000007CD0000-0x00000000081FC000-memory.dmp
      Filesize

      5.2MB

    • memory/4800-1074-0x0000000006250000-0x0000000006260000-memory.dmp
      Filesize

      64KB

    • memory/4800-1075-0x0000000006250000-0x0000000006260000-memory.dmp
      Filesize

      64KB

    • memory/4800-1076-0x0000000006250000-0x0000000006260000-memory.dmp
      Filesize

      64KB

    • memory/4800-1077-0x0000000006250000-0x0000000006260000-memory.dmp
      Filesize

      64KB

    • memory/4800-1078-0x0000000008440000-0x00000000084B6000-memory.dmp
      Filesize

      472KB

    • memory/4800-1079-0x00000000084D0000-0x0000000008520000-memory.dmp
      Filesize

      320KB