Analysis

  • max time kernel
    61s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/04/2023, 03:14

General

  • Target

    261c49f0fa159dbdfe53d00786d7421348e79f88a6726a160c8a1ef04ab5c114.exe

  • Size

    534KB

  • MD5

    660f1f541b900fff4a1d5a8dbab43b20

  • SHA1

    285938ef84bb1068f988d95c2fd2a62c8235abe0

  • SHA256

    261c49f0fa159dbdfe53d00786d7421348e79f88a6726a160c8a1ef04ab5c114

  • SHA512

    05e3a221d5f77317a426ea42a408ffddd3130e89d46393366ea73993310826a2643e8a17515a1aa3aacd200f78b286f4c6e8a09bf27d746f9548b6bf435738d8

  • SSDEEP

    12288:0Mrfy90byM5cOx8EGSVcYOu6LmvbDaNc5jZC5B4UTR:LyicfiVcupTDqojsTR

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\261c49f0fa159dbdfe53d00786d7421348e79f88a6726a160c8a1ef04ab5c114.exe
    "C:\Users\Admin\AppData\Local\Temp\261c49f0fa159dbdfe53d00786d7421348e79f88a6726a160c8a1ef04ab5c114.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDR3246.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDR3246.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4136
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr667059.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr667059.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4736
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku851076.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku851076.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:232
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 232 -s 1336
          4⤵
          • Program crash
          PID:4432
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr871316.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr871316.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1872
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 232 -ip 232
    1⤵
      PID:4216

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr871316.exe

            Filesize

            176KB

            MD5

            33fa7c5e7e94f7ca5dd59b0a493f8606

            SHA1

            b725ab3900a0506cce44236b27a1f1393b87b7d7

            SHA256

            306b1997e9389ca958c967f6dbde09bd85989bafb4c85b9a22f557ec1358a060

            SHA512

            098b467d6c3212104108d0164cd86d0b4092f1fda8938f07df804c1b993ba3a11f983c9df261614f5accf572bd4a43a0e8db64987b857e5d8f5c46f044bf5b03

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr871316.exe

            Filesize

            176KB

            MD5

            33fa7c5e7e94f7ca5dd59b0a493f8606

            SHA1

            b725ab3900a0506cce44236b27a1f1393b87b7d7

            SHA256

            306b1997e9389ca958c967f6dbde09bd85989bafb4c85b9a22f557ec1358a060

            SHA512

            098b467d6c3212104108d0164cd86d0b4092f1fda8938f07df804c1b993ba3a11f983c9df261614f5accf572bd4a43a0e8db64987b857e5d8f5c46f044bf5b03

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDR3246.exe

            Filesize

            392KB

            MD5

            ead02747983740add10fda58f7c378b9

            SHA1

            815ac8a8c86055c537ccb9ab4d713139a8219386

            SHA256

            49389679771c966583e2ce00c9644acf550d3330ab06047bd54262386919f753

            SHA512

            8348da523010e5f80edc18f1c5d6469d0c41663d062cce8e4639d2cee61c5434e6ff11829fe52f267860b57028b3b3332a8ccec342bc6511568773265bcb4823

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDR3246.exe

            Filesize

            392KB

            MD5

            ead02747983740add10fda58f7c378b9

            SHA1

            815ac8a8c86055c537ccb9ab4d713139a8219386

            SHA256

            49389679771c966583e2ce00c9644acf550d3330ab06047bd54262386919f753

            SHA512

            8348da523010e5f80edc18f1c5d6469d0c41663d062cce8e4639d2cee61c5434e6ff11829fe52f267860b57028b3b3332a8ccec342bc6511568773265bcb4823

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr667059.exe

            Filesize

            12KB

            MD5

            eefade2259e5eccead278c81d6acbd06

            SHA1

            38c9e026b32d2f2e38f5c310cdcd1fc590c82982

            SHA256

            851c7eb2dcd7c7f810547c28a737814a161d947bb72de7898c16e1bbac4efe34

            SHA512

            c4d8174af35eeb9589bc916478dd432f46b295393400b682441fd97e145db7c7b8a5922556e97c9515a7efca50d422dc758c52655a9c155d67d4b294ac0ab5d3

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr667059.exe

            Filesize

            12KB

            MD5

            eefade2259e5eccead278c81d6acbd06

            SHA1

            38c9e026b32d2f2e38f5c310cdcd1fc590c82982

            SHA256

            851c7eb2dcd7c7f810547c28a737814a161d947bb72de7898c16e1bbac4efe34

            SHA512

            c4d8174af35eeb9589bc916478dd432f46b295393400b682441fd97e145db7c7b8a5922556e97c9515a7efca50d422dc758c52655a9c155d67d4b294ac0ab5d3

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku851076.exe

            Filesize

            319KB

            MD5

            9879930c362e8b330ff5e7bc753f48ce

            SHA1

            37376c69388de4be4316df9b6f892c3c6779d636

            SHA256

            918ee52af17185054e92eb651be219586b87b5f1069fc0004548cdeabe534f21

            SHA512

            833409a03667cf148c75ba9f48bd0fd31a0ed79a927a21ee2b9a20851c4f8186d70d3acbb0bfbf1d90f0e94cbc0a257800e9d28124475afa1244c7a34e3d0fff

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku851076.exe

            Filesize

            319KB

            MD5

            9879930c362e8b330ff5e7bc753f48ce

            SHA1

            37376c69388de4be4316df9b6f892c3c6779d636

            SHA256

            918ee52af17185054e92eb651be219586b87b5f1069fc0004548cdeabe534f21

            SHA512

            833409a03667cf148c75ba9f48bd0fd31a0ed79a927a21ee2b9a20851c4f8186d70d3acbb0bfbf1d90f0e94cbc0a257800e9d28124475afa1244c7a34e3d0fff

          • memory/232-153-0x0000000002160000-0x00000000021AB000-memory.dmp

            Filesize

            300KB

          • memory/232-154-0x0000000004C90000-0x0000000005234000-memory.dmp

            Filesize

            5.6MB

          • memory/232-155-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-158-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-156-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-160-0x0000000004C80000-0x0000000004C90000-memory.dmp

            Filesize

            64KB

          • memory/232-163-0x0000000004C80000-0x0000000004C90000-memory.dmp

            Filesize

            64KB

          • memory/232-161-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-164-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-166-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-168-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-170-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-172-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-174-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-176-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-178-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-180-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-182-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-184-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-188-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-186-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-190-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-192-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-194-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-196-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-198-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-200-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-202-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-204-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-206-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-208-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-210-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-212-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-214-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-216-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-218-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-220-0x0000000002610000-0x000000000264F000-memory.dmp

            Filesize

            252KB

          • memory/232-1063-0x0000000005240000-0x0000000005858000-memory.dmp

            Filesize

            6.1MB

          • memory/232-1064-0x00000000058A0000-0x00000000059AA000-memory.dmp

            Filesize

            1.0MB

          • memory/232-1065-0x00000000059E0000-0x00000000059F2000-memory.dmp

            Filesize

            72KB

          • memory/232-1066-0x0000000005B40000-0x0000000005B7C000-memory.dmp

            Filesize

            240KB

          • memory/232-1067-0x0000000004C80000-0x0000000004C90000-memory.dmp

            Filesize

            64KB

          • memory/232-1069-0x0000000005CF0000-0x0000000005D82000-memory.dmp

            Filesize

            584KB

          • memory/232-1070-0x0000000005D90000-0x0000000005DF6000-memory.dmp

            Filesize

            408KB

          • memory/232-1071-0x0000000004C80000-0x0000000004C90000-memory.dmp

            Filesize

            64KB

          • memory/232-1073-0x0000000004C80000-0x0000000004C90000-memory.dmp

            Filesize

            64KB

          • memory/232-1072-0x0000000004C80000-0x0000000004C90000-memory.dmp

            Filesize

            64KB

          • memory/232-1074-0x0000000004C80000-0x0000000004C90000-memory.dmp

            Filesize

            64KB

          • memory/232-1075-0x00000000066F0000-0x0000000006766000-memory.dmp

            Filesize

            472KB

          • memory/232-1076-0x0000000006790000-0x00000000067E0000-memory.dmp

            Filesize

            320KB

          • memory/232-1077-0x0000000006A10000-0x0000000006BD2000-memory.dmp

            Filesize

            1.8MB

          • memory/232-1078-0x0000000006BE0000-0x000000000710C000-memory.dmp

            Filesize

            5.2MB

          • memory/1872-1084-0x00000000000D0000-0x0000000000102000-memory.dmp

            Filesize

            200KB

          • memory/1872-1085-0x0000000004A00000-0x0000000004A10000-memory.dmp

            Filesize

            64KB

          • memory/4736-147-0x00000000009C0000-0x00000000009CA000-memory.dmp

            Filesize

            40KB