Analysis

  • max time kernel
    106s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 20:36

General

  • Target

    a3c63b1cc031828d599b88885d9d478019160b0adf562708e4e4fb02c25f2a76.exe

  • Size

    672KB

  • MD5

    b0a778c4786b2d1c9088083511341891

  • SHA1

    024df8178116ec1f0388799d4424865a23d1c276

  • SHA256

    a3c63b1cc031828d599b88885d9d478019160b0adf562708e4e4fb02c25f2a76

  • SHA512

    d7245194717b927e84637e055562af301e4e92728bfcd71d15df25766721dbc52b4d7a9d908c43324218fd945038dfe56136310ab62ca7553a5f6e6693f48685

  • SSDEEP

    12288:qMr4y90WxWGn6CxHaS/83pnqDfmoHWS8dS4K3LqLYUnY:GyrYG6CJaS/OnqbmoHwPK3GLHY

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3c63b1cc031828d599b88885d9d478019160b0adf562708e4e4fb02c25f2a76.exe
    "C:\Users\Admin\AppData\Local\Temp\a3c63b1cc031828d599b88885d9d478019160b0adf562708e4e4fb02c25f2a76.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4556
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un919316.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un919316.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4320
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6132.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6132.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1684
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 1080
          4⤵
          • Program crash
          PID:1816
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1558.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1558.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2500
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2500 -s 1104
          4⤵
          • Program crash
          PID:4872
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si470475.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si470475.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1660
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1684 -ip 1684
    1⤵
      PID:4204
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 2500 -ip 2500
      1⤵
        PID:4176

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si470475.exe
        Filesize

        175KB

        MD5

        ab1a2efe6cd425e61774c3621a1bc373

        SHA1

        981a6d54f8fc5f5256859e8c2a4e3d885b7ea65e

        SHA256

        13610a72b747b944f85a4f9fe3a5c7f1affae844babfb82a0948140b1902caf3

        SHA512

        d73ad79c22dd5e07a2de7b08eb00d7a6286895eb8f00cf11c9b877c16c9b251bc6eec79269287796958907cb894b9bf3cdc292c46cf8e1a056d02362aa3c8316

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si470475.exe
        Filesize

        175KB

        MD5

        ab1a2efe6cd425e61774c3621a1bc373

        SHA1

        981a6d54f8fc5f5256859e8c2a4e3d885b7ea65e

        SHA256

        13610a72b747b944f85a4f9fe3a5c7f1affae844babfb82a0948140b1902caf3

        SHA512

        d73ad79c22dd5e07a2de7b08eb00d7a6286895eb8f00cf11c9b877c16c9b251bc6eec79269287796958907cb894b9bf3cdc292c46cf8e1a056d02362aa3c8316

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un919316.exe
        Filesize

        530KB

        MD5

        78b9c475580cf360b8b4e955d708e2e5

        SHA1

        f2929b4430230fa064830503edfa6e72e7d15914

        SHA256

        1f08f2c5c077be0ce3e633371f9130ea321ceabc48bd72076399b763cc452f5b

        SHA512

        9a37602eb0356c7791dcdeb146dd869e83554cd0e2b78149c4a84513acfdfcf4f6377f93e901e998040c70ee4900e7076b2fc3b26cf79d4cd9f3beb1fd044306

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un919316.exe
        Filesize

        530KB

        MD5

        78b9c475580cf360b8b4e955d708e2e5

        SHA1

        f2929b4430230fa064830503edfa6e72e7d15914

        SHA256

        1f08f2c5c077be0ce3e633371f9130ea321ceabc48bd72076399b763cc452f5b

        SHA512

        9a37602eb0356c7791dcdeb146dd869e83554cd0e2b78149c4a84513acfdfcf4f6377f93e901e998040c70ee4900e7076b2fc3b26cf79d4cd9f3beb1fd044306

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6132.exe
        Filesize

        301KB

        MD5

        1e05985df2d44d3c5e707df9a394c35c

        SHA1

        a7e0209edc3e4506536f37c32f53f99fe8ac32a3

        SHA256

        2caebfe9ac0bffdffa2b79edb2989a1ffa301cfebccbcd8233e03313dfedbd0c

        SHA512

        6285fe1588a33222daa2b732c7175d0042d4de797b1000276bb5b7b2de4395576ee0ced59a9c3170c8674a5ae41b3dc272a15e9b6a69c18e7f530951be3782f6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6132.exe
        Filesize

        301KB

        MD5

        1e05985df2d44d3c5e707df9a394c35c

        SHA1

        a7e0209edc3e4506536f37c32f53f99fe8ac32a3

        SHA256

        2caebfe9ac0bffdffa2b79edb2989a1ffa301cfebccbcd8233e03313dfedbd0c

        SHA512

        6285fe1588a33222daa2b732c7175d0042d4de797b1000276bb5b7b2de4395576ee0ced59a9c3170c8674a5ae41b3dc272a15e9b6a69c18e7f530951be3782f6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1558.exe
        Filesize

        359KB

        MD5

        e638010a101741e4651cf435274f2a2d

        SHA1

        7d0d4c22359a6c56019f0117e546e570ef177e03

        SHA256

        974afc0f483d230d21cd44b377997c1fcfe22845fbdd79f558336f4b01a8bb69

        SHA512

        91fb3e8ae57d303ca98791ed4c1aa4451848ffa9194369ae5e0874197250522738c033046d5f7621b3b7803b22e6d2cb409d2e0230490cec3809039eabaab3b1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1558.exe
        Filesize

        359KB

        MD5

        e638010a101741e4651cf435274f2a2d

        SHA1

        7d0d4c22359a6c56019f0117e546e570ef177e03

        SHA256

        974afc0f483d230d21cd44b377997c1fcfe22845fbdd79f558336f4b01a8bb69

        SHA512

        91fb3e8ae57d303ca98791ed4c1aa4451848ffa9194369ae5e0874197250522738c033046d5f7621b3b7803b22e6d2cb409d2e0230490cec3809039eabaab3b1

      • memory/1660-1122-0x0000000000510000-0x0000000000542000-memory.dmp
        Filesize

        200KB

      • memory/1660-1123-0x0000000004DD0000-0x0000000004DE0000-memory.dmp
        Filesize

        64KB

      • memory/1684-158-0x0000000003BB0000-0x0000000003BC2000-memory.dmp
        Filesize

        72KB

      • memory/1684-168-0x0000000003BB0000-0x0000000003BC2000-memory.dmp
        Filesize

        72KB

      • memory/1684-151-0x0000000003BB0000-0x0000000003BC2000-memory.dmp
        Filesize

        72KB

      • memory/1684-152-0x0000000003BB0000-0x0000000003BC2000-memory.dmp
        Filesize

        72KB

      • memory/1684-154-0x0000000003BB0000-0x0000000003BC2000-memory.dmp
        Filesize

        72KB

      • memory/1684-156-0x0000000003BB0000-0x0000000003BC2000-memory.dmp
        Filesize

        72KB

      • memory/1684-149-0x0000000003BD0000-0x0000000003BE0000-memory.dmp
        Filesize

        64KB

      • memory/1684-160-0x0000000003BB0000-0x0000000003BC2000-memory.dmp
        Filesize

        72KB

      • memory/1684-162-0x0000000003BB0000-0x0000000003BC2000-memory.dmp
        Filesize

        72KB

      • memory/1684-164-0x0000000003BB0000-0x0000000003BC2000-memory.dmp
        Filesize

        72KB

      • memory/1684-166-0x0000000003BB0000-0x0000000003BC2000-memory.dmp
        Filesize

        72KB

      • memory/1684-150-0x00000000060D0000-0x0000000006674000-memory.dmp
        Filesize

        5.6MB

      • memory/1684-170-0x0000000003BD0000-0x0000000003BE0000-memory.dmp
        Filesize

        64KB

      • memory/1684-172-0x0000000003BD0000-0x0000000003BE0000-memory.dmp
        Filesize

        64KB

      • memory/1684-171-0x0000000003BB0000-0x0000000003BC2000-memory.dmp
        Filesize

        72KB

      • memory/1684-174-0x0000000003BB0000-0x0000000003BC2000-memory.dmp
        Filesize

        72KB

      • memory/1684-176-0x0000000003BB0000-0x0000000003BC2000-memory.dmp
        Filesize

        72KB

      • memory/1684-178-0x0000000003BB0000-0x0000000003BC2000-memory.dmp
        Filesize

        72KB

      • memory/1684-180-0x0000000003BB0000-0x0000000003BC2000-memory.dmp
        Filesize

        72KB

      • memory/1684-181-0x0000000000400000-0x0000000001AE3000-memory.dmp
        Filesize

        22.9MB

      • memory/1684-182-0x0000000003BD0000-0x0000000003BE0000-memory.dmp
        Filesize

        64KB

      • memory/1684-184-0x0000000003BD0000-0x0000000003BE0000-memory.dmp
        Filesize

        64KB

      • memory/1684-185-0x0000000000400000-0x0000000001AE3000-memory.dmp
        Filesize

        22.9MB

      • memory/1684-148-0x0000000003700000-0x000000000372D000-memory.dmp
        Filesize

        180KB

      • memory/2500-191-0x00000000060C0000-0x00000000060FF000-memory.dmp
        Filesize

        252KB

      • memory/2500-225-0x00000000060C0000-0x00000000060FF000-memory.dmp
        Filesize

        252KB

      • memory/2500-195-0x00000000060C0000-0x00000000060FF000-memory.dmp
        Filesize

        252KB

      • memory/2500-196-0x0000000006110000-0x0000000006120000-memory.dmp
        Filesize

        64KB

      • memory/2500-198-0x0000000006110000-0x0000000006120000-memory.dmp
        Filesize

        64KB

      • memory/2500-194-0x0000000006110000-0x0000000006120000-memory.dmp
        Filesize

        64KB

      • memory/2500-199-0x00000000060C0000-0x00000000060FF000-memory.dmp
        Filesize

        252KB

      • memory/2500-201-0x00000000060C0000-0x00000000060FF000-memory.dmp
        Filesize

        252KB

      • memory/2500-203-0x00000000060C0000-0x00000000060FF000-memory.dmp
        Filesize

        252KB

      • memory/2500-205-0x00000000060C0000-0x00000000060FF000-memory.dmp
        Filesize

        252KB

      • memory/2500-207-0x00000000060C0000-0x00000000060FF000-memory.dmp
        Filesize

        252KB

      • memory/2500-209-0x00000000060C0000-0x00000000060FF000-memory.dmp
        Filesize

        252KB

      • memory/2500-211-0x00000000060C0000-0x00000000060FF000-memory.dmp
        Filesize

        252KB

      • memory/2500-213-0x00000000060C0000-0x00000000060FF000-memory.dmp
        Filesize

        252KB

      • memory/2500-215-0x00000000060C0000-0x00000000060FF000-memory.dmp
        Filesize

        252KB

      • memory/2500-217-0x00000000060C0000-0x00000000060FF000-memory.dmp
        Filesize

        252KB

      • memory/2500-219-0x00000000060C0000-0x00000000060FF000-memory.dmp
        Filesize

        252KB

      • memory/2500-221-0x00000000060C0000-0x00000000060FF000-memory.dmp
        Filesize

        252KB

      • memory/2500-223-0x00000000060C0000-0x00000000060FF000-memory.dmp
        Filesize

        252KB

      • memory/2500-193-0x0000000003730000-0x000000000377B000-memory.dmp
        Filesize

        300KB

      • memory/2500-227-0x00000000060C0000-0x00000000060FF000-memory.dmp
        Filesize

        252KB

      • memory/2500-1100-0x0000000006700000-0x0000000006D18000-memory.dmp
        Filesize

        6.1MB

      • memory/2500-1101-0x0000000006DA0000-0x0000000006EAA000-memory.dmp
        Filesize

        1.0MB

      • memory/2500-1102-0x0000000006EE0000-0x0000000006EF2000-memory.dmp
        Filesize

        72KB

      • memory/2500-1103-0x0000000006F00000-0x0000000006F3C000-memory.dmp
        Filesize

        240KB

      • memory/2500-1104-0x0000000006110000-0x0000000006120000-memory.dmp
        Filesize

        64KB

      • memory/2500-1106-0x00000000071F0000-0x0000000007282000-memory.dmp
        Filesize

        584KB

      • memory/2500-1107-0x0000000007290000-0x00000000072F6000-memory.dmp
        Filesize

        408KB

      • memory/2500-1108-0x0000000006110000-0x0000000006120000-memory.dmp
        Filesize

        64KB

      • memory/2500-1109-0x0000000006110000-0x0000000006120000-memory.dmp
        Filesize

        64KB

      • memory/2500-1110-0x0000000006110000-0x0000000006120000-memory.dmp
        Filesize

        64KB

      • memory/2500-1111-0x0000000007990000-0x0000000007A06000-memory.dmp
        Filesize

        472KB

      • memory/2500-1112-0x0000000007A20000-0x0000000007A70000-memory.dmp
        Filesize

        320KB

      • memory/2500-190-0x00000000060C0000-0x00000000060FF000-memory.dmp
        Filesize

        252KB

      • memory/2500-1113-0x0000000007AA0000-0x0000000007C62000-memory.dmp
        Filesize

        1.8MB

      • memory/2500-1114-0x0000000007C70000-0x000000000819C000-memory.dmp
        Filesize

        5.2MB

      • memory/2500-1115-0x0000000006110000-0x0000000006120000-memory.dmp
        Filesize

        64KB