Analysis

  • max time kernel
    58s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-04-2023 23:46

General

  • Target

    ea458ee18a2398d7c459f2cb53b18889ae805079552776a72c1be7723a0382f7.exe

  • Size

    659KB

  • MD5

    9d9995d9c0bde0a8f979768e144e8b3a

  • SHA1

    3383bdae6c823b4bfe76b50be4652165267d5b5e

  • SHA256

    ea458ee18a2398d7c459f2cb53b18889ae805079552776a72c1be7723a0382f7

  • SHA512

    253f6240af60d7b945188244969c1492a4f5200fcf7ae9edb2cff683f0dbf9cdd6f741e678cbf057072bd99c3d6ff5f4707e755b40d54ce1fce7ff7c1d1c099e

  • SSDEEP

    12288:UMrGy90XC6atN/49T/Q2vaWrvcayzp1fyS1oof5KOa/QmOt3vxxTTMR:6ysC6af/42IaIcayzyS1ZAQmONv7Tm

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea458ee18a2398d7c459f2cb53b18889ae805079552776a72c1be7723a0382f7.exe
    "C:\Users\Admin\AppData\Local\Temp\ea458ee18a2398d7c459f2cb53b18889ae805079552776a72c1be7723a0382f7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3364
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un855974.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un855974.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4346.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4346.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2376
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 1080
          4⤵
          • Program crash
          PID:3740
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8068.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8068.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5040
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 1352
          4⤵
          • Program crash
          PID:1332
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si599004.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si599004.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4380
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2376 -ip 2376
    1⤵
      PID:4320
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 5040 -ip 5040
      1⤵
        PID:2684

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si599004.exe

        Filesize

        176KB

        MD5

        efb02807e0a5766c8e73de36c71a502c

        SHA1

        9d01d2f5e7e68360c7069a6e1030f3a4a5d1b5b7

        SHA256

        a29c67bf9eb5d59fc8158f0017aae2f8114f03fb5c1310131c80c0f8d3c6bb86

        SHA512

        7c67b5d14e2e11d13304729f4d18d5af1f0f88ab2cbc921e30751bb0c45902c5daefceb3b1f026970aa143d1118a37ae8c20d8c47a487dc5fe3d0d2af8f97b77

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si599004.exe

        Filesize

        176KB

        MD5

        efb02807e0a5766c8e73de36c71a502c

        SHA1

        9d01d2f5e7e68360c7069a6e1030f3a4a5d1b5b7

        SHA256

        a29c67bf9eb5d59fc8158f0017aae2f8114f03fb5c1310131c80c0f8d3c6bb86

        SHA512

        7c67b5d14e2e11d13304729f4d18d5af1f0f88ab2cbc921e30751bb0c45902c5daefceb3b1f026970aa143d1118a37ae8c20d8c47a487dc5fe3d0d2af8f97b77

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un855974.exe

        Filesize

        518KB

        MD5

        f6d51eb01ae0b24ab04a5eabdf00941f

        SHA1

        f5e4bb48f7bab2a2108ced17d1ea98ed0dd100d5

        SHA256

        c7b8360b0eff77742ada182c9be9d4a42d3d1e5811384fa3b7068049decc7cb3

        SHA512

        e06dcb168a72038f821d923fad8f8c302f89fff943d7cafe56f88bb6c06b7bda257f8df59aee6464999e9ca6cc2751e4a82b1afdbaaa85eed5ceca76c0ab95cb

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un855974.exe

        Filesize

        518KB

        MD5

        f6d51eb01ae0b24ab04a5eabdf00941f

        SHA1

        f5e4bb48f7bab2a2108ced17d1ea98ed0dd100d5

        SHA256

        c7b8360b0eff77742ada182c9be9d4a42d3d1e5811384fa3b7068049decc7cb3

        SHA512

        e06dcb168a72038f821d923fad8f8c302f89fff943d7cafe56f88bb6c06b7bda257f8df59aee6464999e9ca6cc2751e4a82b1afdbaaa85eed5ceca76c0ab95cb

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4346.exe

        Filesize

        376KB

        MD5

        1d6df3e7899a7b1649ce1df3267e2c04

        SHA1

        899e906e0dc41d93dbc0d705c37c2154d45f9aa2

        SHA256

        8d847f7f4e2ecb7eeb6506dc24b8145ac7158edde2743de32716edb8870b76aa

        SHA512

        a606348dfede6f24ad954b31ccb2189d5f8a705eada5b78953bdc6b55f75f62b8cc4736244d294123cd8641aeb3fe922871069137b2918d7e531d37d89b9b102

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4346.exe

        Filesize

        376KB

        MD5

        1d6df3e7899a7b1649ce1df3267e2c04

        SHA1

        899e906e0dc41d93dbc0d705c37c2154d45f9aa2

        SHA256

        8d847f7f4e2ecb7eeb6506dc24b8145ac7158edde2743de32716edb8870b76aa

        SHA512

        a606348dfede6f24ad954b31ccb2189d5f8a705eada5b78953bdc6b55f75f62b8cc4736244d294123cd8641aeb3fe922871069137b2918d7e531d37d89b9b102

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8068.exe

        Filesize

        434KB

        MD5

        8405d7effc9e9a07322812c2b246a2ca

        SHA1

        5757fb3008841228e43fe857d966bf64f20e3aab

        SHA256

        a989702d6e8c09fcf569e4c672d5c3e3d954fec6557d040f028f79d778a82cd2

        SHA512

        f9e680fa2ea29075548897f6bf81c259b0141ede66dee30ee48c83d3730f14d1fc16020d7934e7352e253c013a661bf7984e56e55f2a4738f8b81543285622c3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8068.exe

        Filesize

        434KB

        MD5

        8405d7effc9e9a07322812c2b246a2ca

        SHA1

        5757fb3008841228e43fe857d966bf64f20e3aab

        SHA256

        a989702d6e8c09fcf569e4c672d5c3e3d954fec6557d040f028f79d778a82cd2

        SHA512

        f9e680fa2ea29075548897f6bf81c259b0141ede66dee30ee48c83d3730f14d1fc16020d7934e7352e253c013a661bf7984e56e55f2a4738f8b81543285622c3

      • memory/2376-148-0x0000000004BD0000-0x0000000005174000-memory.dmp

        Filesize

        5.6MB

      • memory/2376-149-0x0000000000720000-0x000000000074D000-memory.dmp

        Filesize

        180KB

      • memory/2376-150-0x0000000002640000-0x0000000002650000-memory.dmp

        Filesize

        64KB

      • memory/2376-152-0x00000000025B0000-0x00000000025C2000-memory.dmp

        Filesize

        72KB

      • memory/2376-151-0x00000000025B0000-0x00000000025C2000-memory.dmp

        Filesize

        72KB

      • memory/2376-154-0x00000000025B0000-0x00000000025C2000-memory.dmp

        Filesize

        72KB

      • memory/2376-156-0x00000000025B0000-0x00000000025C2000-memory.dmp

        Filesize

        72KB

      • memory/2376-158-0x00000000025B0000-0x00000000025C2000-memory.dmp

        Filesize

        72KB

      • memory/2376-160-0x00000000025B0000-0x00000000025C2000-memory.dmp

        Filesize

        72KB

      • memory/2376-162-0x00000000025B0000-0x00000000025C2000-memory.dmp

        Filesize

        72KB

      • memory/2376-164-0x00000000025B0000-0x00000000025C2000-memory.dmp

        Filesize

        72KB

      • memory/2376-166-0x00000000025B0000-0x00000000025C2000-memory.dmp

        Filesize

        72KB

      • memory/2376-168-0x00000000025B0000-0x00000000025C2000-memory.dmp

        Filesize

        72KB

      • memory/2376-170-0x00000000025B0000-0x00000000025C2000-memory.dmp

        Filesize

        72KB

      • memory/2376-172-0x00000000025B0000-0x00000000025C2000-memory.dmp

        Filesize

        72KB

      • memory/2376-174-0x00000000025B0000-0x00000000025C2000-memory.dmp

        Filesize

        72KB

      • memory/2376-176-0x00000000025B0000-0x00000000025C2000-memory.dmp

        Filesize

        72KB

      • memory/2376-178-0x00000000025B0000-0x00000000025C2000-memory.dmp

        Filesize

        72KB

      • memory/2376-179-0x0000000000400000-0x00000000005A3000-memory.dmp

        Filesize

        1.6MB

      • memory/2376-180-0x0000000002640000-0x0000000002650000-memory.dmp

        Filesize

        64KB

      • memory/2376-181-0x0000000002640000-0x0000000002650000-memory.dmp

        Filesize

        64KB

      • memory/2376-182-0x0000000002640000-0x0000000002650000-memory.dmp

        Filesize

        64KB

      • memory/2376-184-0x0000000000400000-0x00000000005A3000-memory.dmp

        Filesize

        1.6MB

      • memory/4380-1122-0x0000000004F80000-0x0000000004F90000-memory.dmp

        Filesize

        64KB

      • memory/4380-1121-0x0000000004F80000-0x0000000004F90000-memory.dmp

        Filesize

        64KB

      • memory/4380-1120-0x0000000000360000-0x0000000000392000-memory.dmp

        Filesize

        200KB

      • memory/5040-194-0x0000000005140000-0x000000000517F000-memory.dmp

        Filesize

        252KB

      • memory/5040-1099-0x0000000005300000-0x0000000005918000-memory.dmp

        Filesize

        6.1MB

      • memory/5040-198-0x0000000005140000-0x000000000517F000-memory.dmp

        Filesize

        252KB

      • memory/5040-200-0x0000000005140000-0x000000000517F000-memory.dmp

        Filesize

        252KB

      • memory/5040-202-0x0000000005140000-0x000000000517F000-memory.dmp

        Filesize

        252KB

      • memory/5040-204-0x0000000005140000-0x000000000517F000-memory.dmp

        Filesize

        252KB

      • memory/5040-206-0x0000000005140000-0x000000000517F000-memory.dmp

        Filesize

        252KB

      • memory/5040-207-0x0000000000710000-0x000000000075B000-memory.dmp

        Filesize

        300KB

      • memory/5040-210-0x0000000005140000-0x000000000517F000-memory.dmp

        Filesize

        252KB

      • memory/5040-211-0x00000000026D0000-0x00000000026E0000-memory.dmp

        Filesize

        64KB

      • memory/5040-209-0x00000000026D0000-0x00000000026E0000-memory.dmp

        Filesize

        64KB

      • memory/5040-213-0x00000000026D0000-0x00000000026E0000-memory.dmp

        Filesize

        64KB

      • memory/5040-214-0x0000000005140000-0x000000000517F000-memory.dmp

        Filesize

        252KB

      • memory/5040-216-0x0000000005140000-0x000000000517F000-memory.dmp

        Filesize

        252KB

      • memory/5040-218-0x0000000005140000-0x000000000517F000-memory.dmp

        Filesize

        252KB

      • memory/5040-220-0x0000000005140000-0x000000000517F000-memory.dmp

        Filesize

        252KB

      • memory/5040-222-0x0000000005140000-0x000000000517F000-memory.dmp

        Filesize

        252KB

      • memory/5040-224-0x0000000005140000-0x000000000517F000-memory.dmp

        Filesize

        252KB

      • memory/5040-226-0x0000000005140000-0x000000000517F000-memory.dmp

        Filesize

        252KB

      • memory/5040-196-0x0000000005140000-0x000000000517F000-memory.dmp

        Filesize

        252KB

      • memory/5040-1100-0x00000000059A0000-0x0000000005AAA000-memory.dmp

        Filesize

        1.0MB

      • memory/5040-1101-0x0000000005AE0000-0x0000000005AF2000-memory.dmp

        Filesize

        72KB

      • memory/5040-1102-0x0000000005B00000-0x0000000005B3C000-memory.dmp

        Filesize

        240KB

      • memory/5040-1103-0x00000000026D0000-0x00000000026E0000-memory.dmp

        Filesize

        64KB

      • memory/5040-1104-0x0000000005DF0000-0x0000000005E82000-memory.dmp

        Filesize

        584KB

      • memory/5040-1105-0x0000000005E90000-0x0000000005EF6000-memory.dmp

        Filesize

        408KB

      • memory/5040-1107-0x0000000006580000-0x00000000065F6000-memory.dmp

        Filesize

        472KB

      • memory/5040-1108-0x0000000006620000-0x0000000006670000-memory.dmp

        Filesize

        320KB

      • memory/5040-1109-0x0000000006690000-0x0000000006852000-memory.dmp

        Filesize

        1.8MB

      • memory/5040-1110-0x00000000026D0000-0x00000000026E0000-memory.dmp

        Filesize

        64KB

      • memory/5040-1111-0x00000000026D0000-0x00000000026E0000-memory.dmp

        Filesize

        64KB

      • memory/5040-1112-0x00000000026D0000-0x00000000026E0000-memory.dmp

        Filesize

        64KB

      • memory/5040-190-0x0000000005140000-0x000000000517F000-memory.dmp

        Filesize

        252KB

      • memory/5040-192-0x0000000005140000-0x000000000517F000-memory.dmp

        Filesize

        252KB

      • memory/5040-189-0x0000000005140000-0x000000000517F000-memory.dmp

        Filesize

        252KB

      • memory/5040-1113-0x0000000006870000-0x0000000006D9C000-memory.dmp

        Filesize

        5.2MB

      • memory/5040-1114-0x00000000026D0000-0x00000000026E0000-memory.dmp

        Filesize

        64KB