Analysis

  • max time kernel
    124s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 20:34

General

  • Target

    64b722950ce4ee093309b66729b56a8402faf7efda7de8bb3f1c04aaf4504dcf.exe

  • Size

    533KB

  • MD5

    df91abf78e8011c425ee87ffda099ecf

  • SHA1

    6732a0b313d238251370f54ff9bb9fd8083132ed

  • SHA256

    64b722950ce4ee093309b66729b56a8402faf7efda7de8bb3f1c04aaf4504dcf

  • SHA512

    6b1cad7bb8258e4d7e3107d39063c7e1a8028882f8c9d56b39fc2c61a68dd6c95376b19688589d5533c04dd6faf827c43cdb03175c606c3e38d1f5c16b58f177

  • SSDEEP

    12288:yMrOy900dKsiedYXjnSusJl7HaRDzWzBYwK3Lqt2eQ6nzRCG:IyBsLGYznSuEludzNwK3Gt2eJzRCG

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\64b722950ce4ee093309b66729b56a8402faf7efda7de8bb3f1c04aaf4504dcf.exe
    "C:\Users\Admin\AppData\Local\Temp\64b722950ce4ee093309b66729b56a8402faf7efda7de8bb3f1c04aaf4504dcf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4448
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zikV2487.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zikV2487.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1448
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr710235.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr710235.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2128
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku628396.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku628396.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:116
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 116 -s 1900
          4⤵
          • Program crash
          PID:3820
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr260058.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr260058.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2908
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 116 -ip 116
    1⤵
      PID:4744

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr260058.exe
      Filesize

      175KB

      MD5

      17918356f985217bfc8c5f196f4bf201

      SHA1

      60d12066125f703670258e503e184b0df8bde229

      SHA256

      fd3393b5d446fcd335ed134fb171b41cb9dbe8bef975bb6fed72a577688573f5

      SHA512

      8af5e587dda4cc47125f43546b5337533d17cc33010974ebc72eedd884852533ee4ac9d06a95db31a6fd38f228977961ca6e1f1a18d7ebcbb558a6edcaa79f27

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr260058.exe
      Filesize

      175KB

      MD5

      17918356f985217bfc8c5f196f4bf201

      SHA1

      60d12066125f703670258e503e184b0df8bde229

      SHA256

      fd3393b5d446fcd335ed134fb171b41cb9dbe8bef975bb6fed72a577688573f5

      SHA512

      8af5e587dda4cc47125f43546b5337533d17cc33010974ebc72eedd884852533ee4ac9d06a95db31a6fd38f228977961ca6e1f1a18d7ebcbb558a6edcaa79f27

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zikV2487.exe
      Filesize

      391KB

      MD5

      1be90ce03b39fd86d57b8159bbb64786

      SHA1

      9796c0105e8c89817db6326fb031455d90067d0f

      SHA256

      b78ea1c6f2fe7deca0009c5b8ad995fe417be75ac7e13b368f7a7061bf8800c1

      SHA512

      ac7c1fb857d40a34be02ab9be54ad62189d67873483cb0527a3a21f111517ab1210789d9b0d00a3776cb6e371d43db43b1452ecd3d970059f839b4c8fbc6ccc8

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zikV2487.exe
      Filesize

      391KB

      MD5

      1be90ce03b39fd86d57b8159bbb64786

      SHA1

      9796c0105e8c89817db6326fb031455d90067d0f

      SHA256

      b78ea1c6f2fe7deca0009c5b8ad995fe417be75ac7e13b368f7a7061bf8800c1

      SHA512

      ac7c1fb857d40a34be02ab9be54ad62189d67873483cb0527a3a21f111517ab1210789d9b0d00a3776cb6e371d43db43b1452ecd3d970059f839b4c8fbc6ccc8

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr710235.exe
      Filesize

      11KB

      MD5

      52be802c6b06a586dc2e8a4fccc6d075

      SHA1

      76904ad8f17c83d0cc1233407540b6b331ba0284

      SHA256

      0fcb74c81aba859b155329895f2e8485ead4404ac9ccc8e182da55d8702abe02

      SHA512

      152413ee88e7f0cce9b7f1b163bfd9ceb78b3c14041a3cea1a5fac9e9408f17cc3b9f1e49b6b817b24b91faa3626ee4a03fd35ee8bbef55d79599fc191098959

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr710235.exe
      Filesize

      11KB

      MD5

      52be802c6b06a586dc2e8a4fccc6d075

      SHA1

      76904ad8f17c83d0cc1233407540b6b331ba0284

      SHA256

      0fcb74c81aba859b155329895f2e8485ead4404ac9ccc8e182da55d8702abe02

      SHA512

      152413ee88e7f0cce9b7f1b163bfd9ceb78b3c14041a3cea1a5fac9e9408f17cc3b9f1e49b6b817b24b91faa3626ee4a03fd35ee8bbef55d79599fc191098959

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku628396.exe
      Filesize

      359KB

      MD5

      54d5a5fe693a10f3b6a6a4f56175a760

      SHA1

      f040718a0766a15f8f696253b6eeca3d0f11e236

      SHA256

      81e8013c8c39182d29a6f623f630acbc7a770cd38c8451e3c35b7fe8aa11b84e

      SHA512

      2c9c61a28002d1856de68aa99ed32b68cf5d1850d05ed2669952e932f892c140a9df6bc8caab9597bf2d1f2291e110f4a98b1b91a0cbb331552aeb0480cf00d7

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku628396.exe
      Filesize

      359KB

      MD5

      54d5a5fe693a10f3b6a6a4f56175a760

      SHA1

      f040718a0766a15f8f696253b6eeca3d0f11e236

      SHA256

      81e8013c8c39182d29a6f623f630acbc7a770cd38c8451e3c35b7fe8aa11b84e

      SHA512

      2c9c61a28002d1856de68aa99ed32b68cf5d1850d05ed2669952e932f892c140a9df6bc8caab9597bf2d1f2291e110f4a98b1b91a0cbb331552aeb0480cf00d7

    • memory/116-153-0x0000000001C50000-0x0000000001C9B000-memory.dmp
      Filesize

      300KB

    • memory/116-154-0x0000000006300000-0x00000000068A4000-memory.dmp
      Filesize

      5.6MB

    • memory/116-155-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-156-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-158-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-160-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-162-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-164-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-166-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-168-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-171-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-172-0x00000000038D0000-0x00000000038E0000-memory.dmp
      Filesize

      64KB

    • memory/116-170-0x00000000038D0000-0x00000000038E0000-memory.dmp
      Filesize

      64KB

    • memory/116-175-0x00000000038D0000-0x00000000038E0000-memory.dmp
      Filesize

      64KB

    • memory/116-177-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-174-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-179-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-181-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-183-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-185-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-187-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-189-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-191-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-193-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-195-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-197-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-199-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-201-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-203-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-205-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-207-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-209-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-211-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-213-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-215-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-217-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-219-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-221-0x0000000003B90000-0x0000000003BCF000-memory.dmp
      Filesize

      252KB

    • memory/116-1064-0x00000000069B0000-0x0000000006FC8000-memory.dmp
      Filesize

      6.1MB

    • memory/116-1065-0x0000000006FD0000-0x00000000070DA000-memory.dmp
      Filesize

      1.0MB

    • memory/116-1066-0x0000000003CE0000-0x0000000003CF2000-memory.dmp
      Filesize

      72KB

    • memory/116-1067-0x0000000003D00000-0x0000000003D3C000-memory.dmp
      Filesize

      240KB

    • memory/116-1068-0x00000000038D0000-0x00000000038E0000-memory.dmp
      Filesize

      64KB

    • memory/116-1070-0x0000000007330000-0x00000000073C2000-memory.dmp
      Filesize

      584KB

    • memory/116-1071-0x00000000073D0000-0x0000000007436000-memory.dmp
      Filesize

      408KB

    • memory/116-1073-0x00000000038D0000-0x00000000038E0000-memory.dmp
      Filesize

      64KB

    • memory/116-1072-0x00000000038D0000-0x00000000038E0000-memory.dmp
      Filesize

      64KB

    • memory/116-1074-0x00000000038D0000-0x00000000038E0000-memory.dmp
      Filesize

      64KB

    • memory/116-1075-0x0000000007D30000-0x0000000007EF2000-memory.dmp
      Filesize

      1.8MB

    • memory/116-1076-0x0000000007F10000-0x000000000843C000-memory.dmp
      Filesize

      5.2MB

    • memory/116-1077-0x00000000038D0000-0x00000000038E0000-memory.dmp
      Filesize

      64KB

    • memory/116-1078-0x00000000086D0000-0x0000000008746000-memory.dmp
      Filesize

      472KB

    • memory/116-1079-0x0000000008750000-0x00000000087A0000-memory.dmp
      Filesize

      320KB

    • memory/2128-147-0x0000000000720000-0x000000000072A000-memory.dmp
      Filesize

      40KB

    • memory/2908-1085-0x0000000000A20000-0x0000000000A52000-memory.dmp
      Filesize

      200KB

    • memory/2908-1086-0x00000000052C0000-0x00000000052D0000-memory.dmp
      Filesize

      64KB