Analysis

  • max time kernel
    94s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-03-2023 20:41

General

  • Target

    ce09aeeda262fed5bd7fa3d8cafc48cbd1f9bd7b822edcf37ba33da5824069cc.exe

  • Size

    534KB

  • MD5

    27092ffafd2edc0b5e2142399984b12b

  • SHA1

    293123385c019faf1d13ae531182b58c48145fa5

  • SHA256

    ce09aeeda262fed5bd7fa3d8cafc48cbd1f9bd7b822edcf37ba33da5824069cc

  • SHA512

    7994ce64e681ac2363c0bbf5329763e6762874ae38200d9983bd567c6cd08fdcade548d4e436386846ab17739686c9998fc8ef662a36e9fe30595228d68e1fba

  • SSDEEP

    12288:wMr6y90scz3kbcAaCCls2KX0aTw3LqqxQxA2cCkwu:ayigcAfcsZTw3G8W7iwu

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce09aeeda262fed5bd7fa3d8cafc48cbd1f9bd7b822edcf37ba33da5824069cc.exe
    "C:\Users\Admin\AppData\Local\Temp\ce09aeeda262fed5bd7fa3d8cafc48cbd1f9bd7b822edcf37ba33da5824069cc.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4136
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKS5897.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKS5897.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3620
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr371015.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr371015.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4880
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku110391.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku110391.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1832
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1832 -s 1820
          4⤵
          • Program crash
          PID:2544
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr097956.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr097956.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2428
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1832 -ip 1832
    1⤵
      PID:4320

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr097956.exe
      Filesize

      175KB

      MD5

      e8ca704b849acaf34f9bf7e0fa43438e

      SHA1

      b1a70904185fd879a874323686ba78e04ce78008

      SHA256

      1edf9b52e42cb03a7b4d925cfde3b9ec8809c16170026030de3840560a68e15b

      SHA512

      8cb8296747fd87e262d46be2b453327a1c242442695d88d72280188883be115ccdf20a52e63ebc1285c936b6a6733b96b56a22a9c683131d330ea3ae2bc5b76f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr097956.exe
      Filesize

      175KB

      MD5

      e8ca704b849acaf34f9bf7e0fa43438e

      SHA1

      b1a70904185fd879a874323686ba78e04ce78008

      SHA256

      1edf9b52e42cb03a7b4d925cfde3b9ec8809c16170026030de3840560a68e15b

      SHA512

      8cb8296747fd87e262d46be2b453327a1c242442695d88d72280188883be115ccdf20a52e63ebc1285c936b6a6733b96b56a22a9c683131d330ea3ae2bc5b76f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKS5897.exe
      Filesize

      392KB

      MD5

      3e377fa1aab2488d6169805b69f8e053

      SHA1

      30f44255e62f0712f2caa9ecc894ae4726e7e673

      SHA256

      6b02935d39dd4ce448cc39aff44b01e9c469506362a015854877d5356a11725c

      SHA512

      eb9c1c70dbd444b4ae0b7bdc2ad80b4d20909f052c72ed8ea94bd9bf18211f5fe6193c951a3dbdb936e7fc74c4843e77756b0cb33d6003ff78a967df00ca9123

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKS5897.exe
      Filesize

      392KB

      MD5

      3e377fa1aab2488d6169805b69f8e053

      SHA1

      30f44255e62f0712f2caa9ecc894ae4726e7e673

      SHA256

      6b02935d39dd4ce448cc39aff44b01e9c469506362a015854877d5356a11725c

      SHA512

      eb9c1c70dbd444b4ae0b7bdc2ad80b4d20909f052c72ed8ea94bd9bf18211f5fe6193c951a3dbdb936e7fc74c4843e77756b0cb33d6003ff78a967df00ca9123

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr371015.exe
      Filesize

      11KB

      MD5

      88d58132426cf2cf52e8bac1e8aa2d44

      SHA1

      26678c1188dcdfefa51e73558be941cbb11dacb7

      SHA256

      fa4f92a48c18f4479f2a3ef5ec32c8cf2780bf5cb7cbf2f21ca1435478498de9

      SHA512

      0f09820750a27a28aa94714ed82b1c653fa05fb5b699e72ff041e1604724688e12887f2270c2285d2ed5bebf008fda710c5b94a23c50203b32f2c60cfa685cb5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr371015.exe
      Filesize

      11KB

      MD5

      88d58132426cf2cf52e8bac1e8aa2d44

      SHA1

      26678c1188dcdfefa51e73558be941cbb11dacb7

      SHA256

      fa4f92a48c18f4479f2a3ef5ec32c8cf2780bf5cb7cbf2f21ca1435478498de9

      SHA512

      0f09820750a27a28aa94714ed82b1c653fa05fb5b699e72ff041e1604724688e12887f2270c2285d2ed5bebf008fda710c5b94a23c50203b32f2c60cfa685cb5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku110391.exe
      Filesize

      359KB

      MD5

      5d8f9a06975a09b0a8891965432c0287

      SHA1

      586a49f8fdfe70bc3eabff5ad444dbe3aef87d5e

      SHA256

      daf1470decc44a6d3cf79f3c233d4b0d3b1881aa99e7c8dd39921d7a84cbeb82

      SHA512

      b47e6b7347a36272f987b1ff2b48511d8fad39d3f941c741c95d7616b7d7983c19c2581bd9d2dc8e992f3afbd048e77f4e0eb154dc08b47d951f68bc17a2d0f0

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku110391.exe
      Filesize

      359KB

      MD5

      5d8f9a06975a09b0a8891965432c0287

      SHA1

      586a49f8fdfe70bc3eabff5ad444dbe3aef87d5e

      SHA256

      daf1470decc44a6d3cf79f3c233d4b0d3b1881aa99e7c8dd39921d7a84cbeb82

      SHA512

      b47e6b7347a36272f987b1ff2b48511d8fad39d3f941c741c95d7616b7d7983c19c2581bd9d2dc8e992f3afbd048e77f4e0eb154dc08b47d951f68bc17a2d0f0

    • memory/1832-153-0x0000000003770000-0x00000000037BB000-memory.dmp
      Filesize

      300KB

    • memory/1832-154-0x00000000061B0000-0x00000000061C0000-memory.dmp
      Filesize

      64KB

    • memory/1832-155-0x00000000061B0000-0x00000000061C0000-memory.dmp
      Filesize

      64KB

    • memory/1832-156-0x00000000061B0000-0x00000000061C0000-memory.dmp
      Filesize

      64KB

    • memory/1832-157-0x00000000061C0000-0x0000000006764000-memory.dmp
      Filesize

      5.6MB

    • memory/1832-158-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-159-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-161-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-163-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-165-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-167-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-169-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-171-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-173-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-175-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-177-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-179-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-181-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-183-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-185-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-187-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-191-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-189-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-193-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-195-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-197-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-199-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-201-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-203-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-205-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-207-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-209-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-211-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-213-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-215-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-217-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-219-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-221-0x00000000060B0000-0x00000000060EF000-memory.dmp
      Filesize

      252KB

    • memory/1832-1064-0x0000000006870000-0x0000000006E88000-memory.dmp
      Filesize

      6.1MB

    • memory/1832-1065-0x0000000006EE0000-0x0000000006FEA000-memory.dmp
      Filesize

      1.0MB

    • memory/1832-1066-0x0000000007020000-0x0000000007032000-memory.dmp
      Filesize

      72KB

    • memory/1832-1067-0x0000000007040000-0x000000000707C000-memory.dmp
      Filesize

      240KB

    • memory/1832-1068-0x00000000061B0000-0x00000000061C0000-memory.dmp
      Filesize

      64KB

    • memory/1832-1070-0x00000000061B0000-0x00000000061C0000-memory.dmp
      Filesize

      64KB

    • memory/1832-1071-0x00000000061B0000-0x00000000061C0000-memory.dmp
      Filesize

      64KB

    • memory/1832-1072-0x00000000061B0000-0x00000000061C0000-memory.dmp
      Filesize

      64KB

    • memory/1832-1073-0x0000000007330000-0x00000000073C2000-memory.dmp
      Filesize

      584KB

    • memory/1832-1074-0x00000000073D0000-0x0000000007436000-memory.dmp
      Filesize

      408KB

    • memory/1832-1075-0x0000000007AF0000-0x0000000007CB2000-memory.dmp
      Filesize

      1.8MB

    • memory/1832-1076-0x0000000007CD0000-0x00000000081FC000-memory.dmp
      Filesize

      5.2MB

    • memory/1832-1077-0x0000000008320000-0x0000000008396000-memory.dmp
      Filesize

      472KB

    • memory/1832-1078-0x00000000083C0000-0x0000000008410000-memory.dmp
      Filesize

      320KB

    • memory/1832-1079-0x00000000061B0000-0x00000000061C0000-memory.dmp
      Filesize

      64KB

    • memory/2428-1086-0x0000000000660000-0x0000000000692000-memory.dmp
      Filesize

      200KB

    • memory/2428-1087-0x0000000004F20000-0x0000000004F30000-memory.dmp
      Filesize

      64KB

    • memory/4880-147-0x0000000000C50000-0x0000000000C5A000-memory.dmp
      Filesize

      40KB