Analysis

  • max time kernel
    60s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/04/2023, 23:01

General

  • Target

    fbc2841b5802640b50287bb50eb7dad767d86e746f9843292c414e996a812cfa.exe

  • Size

    530KB

  • MD5

    31d9b4f28f11337f9a582e317ec07ac4

  • SHA1

    bbf881e49d61adc607d6c1279d3dfb378581c1e9

  • SHA256

    fbc2841b5802640b50287bb50eb7dad767d86e746f9843292c414e996a812cfa

  • SHA512

    3b215f61824230e14bd8716b95b7b5c1b326e377e66c75488052253e208199ba17eb3cf8eb584b7fd7061f22ad890d1fdcb30452cb9e302c8e5f1f4e107fef88

  • SSDEEP

    12288:nMrOy90/9cbdXV5m16m8asK8G0i/wf5KXa/3mOj00zNkS:py62b0n8BWkA0mDgSS

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fbc2841b5802640b50287bb50eb7dad767d86e746f9843292c414e996a812cfa.exe
    "C:\Users\Admin\AppData\Local\Temp\fbc2841b5802640b50287bb50eb7dad767d86e746f9843292c414e996a812cfa.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3480
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQm6127.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQm6127.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3588
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr593563.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr593563.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2200
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku106675.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku106675.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4348
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4348 -s 1348
          4⤵
          • Program crash
          PID:3356
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr409156.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr409156.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1964
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4348 -ip 4348
    1⤵
      PID:2068

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr409156.exe

      Filesize

      176KB

      MD5

      e6b3c5d2fbe1164faa24f5cf38e9a600

      SHA1

      c3c20a7352b563a78bfe21741a7dae4f8c0e0421

      SHA256

      8a67d7e98bf2316de20601a3da9fbb3d040d9b03766127343849f7611e002f6b

      SHA512

      da06e83fed8ba4650a9f611c628702e45c6289656b8d6449842e80d982c2bcf47e42e892b0a573166deaef7393beaf2fe208d02830e5e837b42d375d3ec67aa3

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr409156.exe

      Filesize

      176KB

      MD5

      e6b3c5d2fbe1164faa24f5cf38e9a600

      SHA1

      c3c20a7352b563a78bfe21741a7dae4f8c0e0421

      SHA256

      8a67d7e98bf2316de20601a3da9fbb3d040d9b03766127343849f7611e002f6b

      SHA512

      da06e83fed8ba4650a9f611c628702e45c6289656b8d6449842e80d982c2bcf47e42e892b0a573166deaef7393beaf2fe208d02830e5e837b42d375d3ec67aa3

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQm6127.exe

      Filesize

      388KB

      MD5

      71f010634628d11fe0791bfd7709af3b

      SHA1

      2768e91519f1cd02cbed0f935d3d42a9c643af35

      SHA256

      9cf1891bad0e3f290c31e6e9120532a23454a0f1b54d5b302a0e4498fd58132b

      SHA512

      81ffb0e3f6c7f6fdab835105f078d928d6a2bc624884bd4ab42dc4abd81ba50b4368f92ae017cc4d3f55b2747dd26b7d5b4ca788feff95823b568c00355e6ab0

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQm6127.exe

      Filesize

      388KB

      MD5

      71f010634628d11fe0791bfd7709af3b

      SHA1

      2768e91519f1cd02cbed0f935d3d42a9c643af35

      SHA256

      9cf1891bad0e3f290c31e6e9120532a23454a0f1b54d5b302a0e4498fd58132b

      SHA512

      81ffb0e3f6c7f6fdab835105f078d928d6a2bc624884bd4ab42dc4abd81ba50b4368f92ae017cc4d3f55b2747dd26b7d5b4ca788feff95823b568c00355e6ab0

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr593563.exe

      Filesize

      11KB

      MD5

      c03596ec3b9b4fed22cb5ef9c2503328

      SHA1

      039c09401e37443b110ef54bb60c6a6179e515ae

      SHA256

      3c58815269669ab9f7f7045a8da546a0af5320124a811d5a5b5cf064fa2df902

      SHA512

      5783cc3b61cad0a40182eff16c08d0f0fed9f8563c6bd83f1a2a025a49911daca9b2835cc2afab60d64544f5cd07b8c362564155a458645e4ed183c1b686abad

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr593563.exe

      Filesize

      11KB

      MD5

      c03596ec3b9b4fed22cb5ef9c2503328

      SHA1

      039c09401e37443b110ef54bb60c6a6179e515ae

      SHA256

      3c58815269669ab9f7f7045a8da546a0af5320124a811d5a5b5cf064fa2df902

      SHA512

      5783cc3b61cad0a40182eff16c08d0f0fed9f8563c6bd83f1a2a025a49911daca9b2835cc2afab60d64544f5cd07b8c362564155a458645e4ed183c1b686abad

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku106675.exe

      Filesize

      434KB

      MD5

      2a0be5d63db9e4853bab7ac74e810aa2

      SHA1

      68990a7b8747f3cc2461cadf795dbb922c30fb83

      SHA256

      dadac54c761fa20c1bcd5ec250cdbc3fb4ba4ee321e1c4cb91ffefe212c41280

      SHA512

      746f524bf428ea733960d8cac9a061ce8c24d9bf26b3f967118700271759f21c4b951f973f42e5f3db7c37c9e8a181eb4b93805a37c86c03cc4bada22a9e007f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku106675.exe

      Filesize

      434KB

      MD5

      2a0be5d63db9e4853bab7ac74e810aa2

      SHA1

      68990a7b8747f3cc2461cadf795dbb922c30fb83

      SHA256

      dadac54c761fa20c1bcd5ec250cdbc3fb4ba4ee321e1c4cb91ffefe212c41280

      SHA512

      746f524bf428ea733960d8cac9a061ce8c24d9bf26b3f967118700271759f21c4b951f973f42e5f3db7c37c9e8a181eb4b93805a37c86c03cc4bada22a9e007f

    • memory/1964-1085-0x0000000000F90000-0x0000000000FC2000-memory.dmp

      Filesize

      200KB

    • memory/1964-1087-0x0000000005BB0000-0x0000000005BC0000-memory.dmp

      Filesize

      64KB

    • memory/1964-1086-0x0000000005BB0000-0x0000000005BC0000-memory.dmp

      Filesize

      64KB

    • memory/2200-147-0x00000000006F0000-0x00000000006FA000-memory.dmp

      Filesize

      40KB

    • memory/4348-191-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-201-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-157-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

      Filesize

      64KB

    • memory/4348-158-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-159-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-161-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-163-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-165-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-167-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-169-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-171-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-173-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-175-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-177-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-179-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-181-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-183-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-185-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-187-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-189-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-155-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

      Filesize

      64KB

    • memory/4348-193-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-195-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-197-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-199-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-156-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

      Filesize

      64KB

    • memory/4348-203-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-205-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-207-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-209-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-211-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-213-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-215-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-221-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-219-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-217-0x0000000002540000-0x000000000257F000-memory.dmp

      Filesize

      252KB

    • memory/4348-1064-0x0000000005360000-0x0000000005978000-memory.dmp

      Filesize

      6.1MB

    • memory/4348-1065-0x00000000059A0000-0x0000000005AAA000-memory.dmp

      Filesize

      1.0MB

    • memory/4348-1066-0x0000000005AE0000-0x0000000005AF2000-memory.dmp

      Filesize

      72KB

    • memory/4348-1067-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

      Filesize

      64KB

    • memory/4348-1068-0x0000000005B00000-0x0000000005B3C000-memory.dmp

      Filesize

      240KB

    • memory/4348-1070-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

      Filesize

      64KB

    • memory/4348-1071-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

      Filesize

      64KB

    • memory/4348-1072-0x0000000005DF0000-0x0000000005E82000-memory.dmp

      Filesize

      584KB

    • memory/4348-1073-0x0000000005E90000-0x0000000005EF6000-memory.dmp

      Filesize

      408KB

    • memory/4348-1074-0x00000000065C0000-0x0000000006782000-memory.dmp

      Filesize

      1.8MB

    • memory/4348-1075-0x0000000006790000-0x0000000006CBC000-memory.dmp

      Filesize

      5.2MB

    • memory/4348-154-0x0000000000790000-0x00000000007DB000-memory.dmp

      Filesize

      300KB

    • memory/4348-153-0x0000000004DB0000-0x0000000005354000-memory.dmp

      Filesize

      5.6MB

    • memory/4348-1076-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

      Filesize

      64KB

    • memory/4348-1078-0x0000000007040000-0x00000000070B6000-memory.dmp

      Filesize

      472KB

    • memory/4348-1079-0x00000000070C0000-0x0000000007110000-memory.dmp

      Filesize

      320KB