Analysis

  • max time kernel
    109s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/04/2023, 02:30

General

  • Target

    3ec5024f9bd950655c77c516ff3e076e9373d6058918712c769cf0a0cc2fd19d.exe

  • Size

    673KB

  • MD5

    0799ed4daeb1ce0a944836bc949ab523

  • SHA1

    ae3073d6282e950cf943861f4a2ff7b34523265f

  • SHA256

    3ec5024f9bd950655c77c516ff3e076e9373d6058918712c769cf0a0cc2fd19d

  • SHA512

    11e8feecafd3f084eb034abbd0826a639dedf55ecf3bb7ae013414481bc0582f6e37d1ff0c5a882e7a982b16b2e3ad6204d084ca2c694ce34c5a75ddd28649fc

  • SSDEEP

    12288:TMrYy90DQ59gn2iZhGe6KNR37UH0yCiZbuWao8kWBk:Dy+QHg2iZhB3uCiduJGWC

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ec5024f9bd950655c77c516ff3e076e9373d6058918712c769cf0a0cc2fd19d.exe
    "C:\Users\Admin\AppData\Local\Temp\3ec5024f9bd950655c77c516ff3e076e9373d6058918712c769cf0a0cc2fd19d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4224
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un114790.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un114790.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4220
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4102.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4102.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1052
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1052 -s 1084
          4⤵
          • Program crash
          PID:3372
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6883.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6883.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4540
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 1348
          4⤵
          • Program crash
          PID:2400
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si020019.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si020019.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4024
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1052 -ip 1052
    1⤵
      PID:3772
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4540 -ip 4540
      1⤵
        PID:4280

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si020019.exe

              Filesize

              176KB

              MD5

              46ddaf6b51fab20041b6a93e0139a96a

              SHA1

              d81aaea546e192b1a0316b7de0b5cbc9250840e0

              SHA256

              343535ed6a9334ffc7d554eeb57848ddbaf673606beb25fabec67c95e399ae8f

              SHA512

              ce855d78359f04e702d834b26ebe1bbed6a36bf36ed3ca02215e239342aed6ba6043b1365e3fb0863e55320d1c21440ea132122d474aa6720ba5ef295dc77b2a

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si020019.exe

              Filesize

              176KB

              MD5

              46ddaf6b51fab20041b6a93e0139a96a

              SHA1

              d81aaea546e192b1a0316b7de0b5cbc9250840e0

              SHA256

              343535ed6a9334ffc7d554eeb57848ddbaf673606beb25fabec67c95e399ae8f

              SHA512

              ce855d78359f04e702d834b26ebe1bbed6a36bf36ed3ca02215e239342aed6ba6043b1365e3fb0863e55320d1c21440ea132122d474aa6720ba5ef295dc77b2a

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un114790.exe

              Filesize

              531KB

              MD5

              b0fa36ed8afa4018b9607fd9c5e011a6

              SHA1

              bd137871b4fdfa36958d18a959d7499713561f52

              SHA256

              262c18f9c7a4ac99e7cec29df18816dc28e43ba3cab7eb97a956bd5f81b5744d

              SHA512

              1d08931e39513c777bd0d7267a2293422da63266d4ddd7751152f622733dfee3b42875e0d04b1b078187068076a310fae7b305e0eab8a4b89fa73cc734d8c93b

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un114790.exe

              Filesize

              531KB

              MD5

              b0fa36ed8afa4018b9607fd9c5e011a6

              SHA1

              bd137871b4fdfa36958d18a959d7499713561f52

              SHA256

              262c18f9c7a4ac99e7cec29df18816dc28e43ba3cab7eb97a956bd5f81b5744d

              SHA512

              1d08931e39513c777bd0d7267a2293422da63266d4ddd7751152f622733dfee3b42875e0d04b1b078187068076a310fae7b305e0eab8a4b89fa73cc734d8c93b

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4102.exe

              Filesize

              260KB

              MD5

              16e2403f7e0bc07cc007f369516ab948

              SHA1

              e388a3fcdf52e7ee257fa630311dc4890baec064

              SHA256

              1dc7241c548658cdc2f20c3fbfae7ce1fc45b9105b482e9bd8c1ec65b144441f

              SHA512

              8124d81ce4b370423b64c83465786e56dc2f2270c0d2709a8f3e1f043e0ebe52707dd5a6fdfbaec4deff9a65c5cc8a1e5f65b35c89d9526a8f6dd94ad09b9e5a

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4102.exe

              Filesize

              260KB

              MD5

              16e2403f7e0bc07cc007f369516ab948

              SHA1

              e388a3fcdf52e7ee257fa630311dc4890baec064

              SHA256

              1dc7241c548658cdc2f20c3fbfae7ce1fc45b9105b482e9bd8c1ec65b144441f

              SHA512

              8124d81ce4b370423b64c83465786e56dc2f2270c0d2709a8f3e1f043e0ebe52707dd5a6fdfbaec4deff9a65c5cc8a1e5f65b35c89d9526a8f6dd94ad09b9e5a

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6883.exe

              Filesize

              319KB

              MD5

              a61eaa5782da55eff175bda3a0ed14c6

              SHA1

              6aecd8cda4ba0db1eeb7604f8be794b554a704c4

              SHA256

              9ca05b5e93784948cbd397d9e75e4d1d3974ac63768411ce7f24eb351201621e

              SHA512

              1bb88dcae6597760c10f1d0a24438a8cee43094b049b03a0a4386be7d0679551070e0562b7f36090b45473d9ddc0647a9ca9aba4e8a353b3e9ab894d699a4731

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6883.exe

              Filesize

              319KB

              MD5

              a61eaa5782da55eff175bda3a0ed14c6

              SHA1

              6aecd8cda4ba0db1eeb7604f8be794b554a704c4

              SHA256

              9ca05b5e93784948cbd397d9e75e4d1d3974ac63768411ce7f24eb351201621e

              SHA512

              1bb88dcae6597760c10f1d0a24438a8cee43094b049b03a0a4386be7d0679551070e0562b7f36090b45473d9ddc0647a9ca9aba4e8a353b3e9ab894d699a4731

            • memory/1052-148-0x00000000020D0000-0x00000000020FD000-memory.dmp

              Filesize

              180KB

            • memory/1052-149-0x0000000004B10000-0x00000000050B4000-memory.dmp

              Filesize

              5.6MB

            • memory/1052-150-0x00000000024D0000-0x00000000024E2000-memory.dmp

              Filesize

              72KB

            • memory/1052-151-0x00000000024D0000-0x00000000024E2000-memory.dmp

              Filesize

              72KB

            • memory/1052-153-0x00000000024D0000-0x00000000024E2000-memory.dmp

              Filesize

              72KB

            • memory/1052-155-0x00000000024D0000-0x00000000024E2000-memory.dmp

              Filesize

              72KB

            • memory/1052-157-0x00000000024D0000-0x00000000024E2000-memory.dmp

              Filesize

              72KB

            • memory/1052-159-0x00000000024D0000-0x00000000024E2000-memory.dmp

              Filesize

              72KB

            • memory/1052-161-0x00000000024D0000-0x00000000024E2000-memory.dmp

              Filesize

              72KB

            • memory/1052-163-0x00000000024D0000-0x00000000024E2000-memory.dmp

              Filesize

              72KB

            • memory/1052-165-0x00000000024D0000-0x00000000024E2000-memory.dmp

              Filesize

              72KB

            • memory/1052-167-0x00000000024D0000-0x00000000024E2000-memory.dmp

              Filesize

              72KB

            • memory/1052-169-0x00000000024D0000-0x00000000024E2000-memory.dmp

              Filesize

              72KB

            • memory/1052-171-0x00000000024D0000-0x00000000024E2000-memory.dmp

              Filesize

              72KB

            • memory/1052-173-0x00000000024D0000-0x00000000024E2000-memory.dmp

              Filesize

              72KB

            • memory/1052-175-0x00000000024D0000-0x00000000024E2000-memory.dmp

              Filesize

              72KB

            • memory/1052-177-0x00000000024D0000-0x00000000024E2000-memory.dmp

              Filesize

              72KB

            • memory/1052-178-0x0000000004B00000-0x0000000004B10000-memory.dmp

              Filesize

              64KB

            • memory/1052-179-0x0000000004B00000-0x0000000004B10000-memory.dmp

              Filesize

              64KB

            • memory/1052-180-0x0000000004B00000-0x0000000004B10000-memory.dmp

              Filesize

              64KB

            • memory/1052-181-0x0000000000400000-0x00000000004B1000-memory.dmp

              Filesize

              708KB

            • memory/1052-183-0x0000000004B00000-0x0000000004B10000-memory.dmp

              Filesize

              64KB

            • memory/1052-184-0x0000000004B00000-0x0000000004B10000-memory.dmp

              Filesize

              64KB

            • memory/1052-185-0x0000000004B00000-0x0000000004B10000-memory.dmp

              Filesize

              64KB

            • memory/1052-186-0x0000000000400000-0x00000000004B1000-memory.dmp

              Filesize

              708KB

            • memory/4024-1122-0x0000000000410000-0x0000000000442000-memory.dmp

              Filesize

              200KB

            • memory/4024-1123-0x0000000004D10000-0x0000000004D20000-memory.dmp

              Filesize

              64KB

            • memory/4540-194-0x00000000024F0000-0x000000000252F000-memory.dmp

              Filesize

              252KB

            • memory/4540-226-0x00000000024F0000-0x000000000252F000-memory.dmp

              Filesize

              252KB

            • memory/4540-197-0x0000000000610000-0x000000000065B000-memory.dmp

              Filesize

              300KB

            • memory/4540-196-0x00000000024F0000-0x000000000252F000-memory.dmp

              Filesize

              252KB

            • memory/4540-199-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

              Filesize

              64KB

            • memory/4540-203-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

              Filesize

              64KB

            • memory/4540-201-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

              Filesize

              64KB

            • memory/4540-200-0x00000000024F0000-0x000000000252F000-memory.dmp

              Filesize

              252KB

            • memory/4540-204-0x00000000024F0000-0x000000000252F000-memory.dmp

              Filesize

              252KB

            • memory/4540-206-0x00000000024F0000-0x000000000252F000-memory.dmp

              Filesize

              252KB

            • memory/4540-208-0x00000000024F0000-0x000000000252F000-memory.dmp

              Filesize

              252KB

            • memory/4540-210-0x00000000024F0000-0x000000000252F000-memory.dmp

              Filesize

              252KB

            • memory/4540-212-0x00000000024F0000-0x000000000252F000-memory.dmp

              Filesize

              252KB

            • memory/4540-214-0x00000000024F0000-0x000000000252F000-memory.dmp

              Filesize

              252KB

            • memory/4540-216-0x00000000024F0000-0x000000000252F000-memory.dmp

              Filesize

              252KB

            • memory/4540-218-0x00000000024F0000-0x000000000252F000-memory.dmp

              Filesize

              252KB

            • memory/4540-220-0x00000000024F0000-0x000000000252F000-memory.dmp

              Filesize

              252KB

            • memory/4540-222-0x00000000024F0000-0x000000000252F000-memory.dmp

              Filesize

              252KB

            • memory/4540-224-0x00000000024F0000-0x000000000252F000-memory.dmp

              Filesize

              252KB

            • memory/4540-192-0x00000000024F0000-0x000000000252F000-memory.dmp

              Filesize

              252KB

            • memory/4540-228-0x00000000024F0000-0x000000000252F000-memory.dmp

              Filesize

              252KB

            • memory/4540-1101-0x0000000005360000-0x0000000005978000-memory.dmp

              Filesize

              6.1MB

            • memory/4540-1102-0x0000000005980000-0x0000000005A8A000-memory.dmp

              Filesize

              1.0MB

            • memory/4540-1103-0x00000000027B0000-0x00000000027C2000-memory.dmp

              Filesize

              72KB

            • memory/4540-1104-0x0000000004D50000-0x0000000004D8C000-memory.dmp

              Filesize

              240KB

            • memory/4540-1105-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

              Filesize

              64KB

            • memory/4540-1106-0x0000000005CF0000-0x0000000005D82000-memory.dmp

              Filesize

              584KB

            • memory/4540-1107-0x0000000005D90000-0x0000000005DF6000-memory.dmp

              Filesize

              408KB

            • memory/4540-1109-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

              Filesize

              64KB

            • memory/4540-1110-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

              Filesize

              64KB

            • memory/4540-1111-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

              Filesize

              64KB

            • memory/4540-1112-0x00000000064C0000-0x0000000006682000-memory.dmp

              Filesize

              1.8MB

            • memory/4540-1113-0x0000000006690000-0x0000000006BBC000-memory.dmp

              Filesize

              5.2MB

            • memory/4540-191-0x00000000024F0000-0x000000000252F000-memory.dmp

              Filesize

              252KB

            • memory/4540-1114-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

              Filesize

              64KB

            • memory/4540-1115-0x0000000006CF0000-0x0000000006D66000-memory.dmp

              Filesize

              472KB

            • memory/4540-1116-0x0000000006D80000-0x0000000006DD0000-memory.dmp

              Filesize

              320KB