Analysis

  • max time kernel
    58s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-04-2023 04:15

General

  • Target

    59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd.exe

  • Size

    534KB

  • MD5

    4cccd2d13c5f3b787b3d92f61d827eb4

  • SHA1

    270c3e061d718b10a63bcf53d3136cc2522d9ca9

  • SHA256

    59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd

  • SHA512

    c00f851446754500af0ec68ed53188df1960da58f4775f903d723e3e15b924fdb9f06a9a2c9e2440cece37d078965a2a47945e0729dcd90cce6bca4e64ad4035

  • SSDEEP

    12288:PMr/y90k/ajz0ZSH5rSPRPz6bKWY2rhZXJnbKp6:4yn/ajnwPzyK/2Vb86

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd.exe
    "C:\Users\Admin\AppData\Local\Temp\59436861c59f8334504d2d2c69497b4a757fd2583f0fe8371d3d70eac2b0e5fd.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:864
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zirM6966.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zirM6966.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2792
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr456218.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr456218.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:396
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku106547.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku106547.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4436
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 1492
          4⤵
          • Program crash
          PID:528
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr883572.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr883572.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4108
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4436 -ip 4436
    1⤵
      PID:2212

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr883572.exe

      Filesize

      176KB

      MD5

      e6b3c5d2fbe1164faa24f5cf38e9a600

      SHA1

      c3c20a7352b563a78bfe21741a7dae4f8c0e0421

      SHA256

      8a67d7e98bf2316de20601a3da9fbb3d040d9b03766127343849f7611e002f6b

      SHA512

      da06e83fed8ba4650a9f611c628702e45c6289656b8d6449842e80d982c2bcf47e42e892b0a573166deaef7393beaf2fe208d02830e5e837b42d375d3ec67aa3

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr883572.exe

      Filesize

      176KB

      MD5

      e6b3c5d2fbe1164faa24f5cf38e9a600

      SHA1

      c3c20a7352b563a78bfe21741a7dae4f8c0e0421

      SHA256

      8a67d7e98bf2316de20601a3da9fbb3d040d9b03766127343849f7611e002f6b

      SHA512

      da06e83fed8ba4650a9f611c628702e45c6289656b8d6449842e80d982c2bcf47e42e892b0a573166deaef7393beaf2fe208d02830e5e837b42d375d3ec67aa3

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zirM6966.exe

      Filesize

      392KB

      MD5

      e0dff0e465db1d21c6a29278fd95eaa7

      SHA1

      9a4350bafa95a7c361b2f9a44d5affb85f9ff4e7

      SHA256

      8166019e222c62b813d089e831a597def6efbf920ac0bb6e7ffafc27763e0560

      SHA512

      85decfe57eb0076c0959d2c9fa95514a3d164c9eea1ca4443cab96d4191d946b64db010d31fb0ee54f26faf3439c8869a8c6bf332ae3422d07ce7c9f48812824

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zirM6966.exe

      Filesize

      392KB

      MD5

      e0dff0e465db1d21c6a29278fd95eaa7

      SHA1

      9a4350bafa95a7c361b2f9a44d5affb85f9ff4e7

      SHA256

      8166019e222c62b813d089e831a597def6efbf920ac0bb6e7ffafc27763e0560

      SHA512

      85decfe57eb0076c0959d2c9fa95514a3d164c9eea1ca4443cab96d4191d946b64db010d31fb0ee54f26faf3439c8869a8c6bf332ae3422d07ce7c9f48812824

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr456218.exe

      Filesize

      12KB

      MD5

      d8f0ca8a6cc5d2cb5aa392135886795a

      SHA1

      c9e6e2c8b3986e237886c2670e8e68d5dc6b1973

      SHA256

      def0c9212749f519413f713756d71973b13eb580804d1e0d3e9d301a1e471458

      SHA512

      3d8dd513e586b99b81b79780c43fa9c9a2c995d8eabccbfcb51db36be526fc920e0a69697a25eb5e2d616ff79f30d2fa11e70a49f6fd95434d8f15b877d64591

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr456218.exe

      Filesize

      12KB

      MD5

      d8f0ca8a6cc5d2cb5aa392135886795a

      SHA1

      c9e6e2c8b3986e237886c2670e8e68d5dc6b1973

      SHA256

      def0c9212749f519413f713756d71973b13eb580804d1e0d3e9d301a1e471458

      SHA512

      3d8dd513e586b99b81b79780c43fa9c9a2c995d8eabccbfcb51db36be526fc920e0a69697a25eb5e2d616ff79f30d2fa11e70a49f6fd95434d8f15b877d64591

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku106547.exe

      Filesize

      319KB

      MD5

      ec5902c90835381a20bb548fcde9ab30

      SHA1

      ce265ac3fd74a011edbc4b641ddcbdd97e0fc472

      SHA256

      cc45ef6509b33a1e07e7cbfb265bb6ab1e537f5172e6e2722b004157a809e436

      SHA512

      a9707c9a32590f051bdc886951facafee6075078ec3d4cb3d122e481119888f60b975dd466fe1ef7f2108579d0143ed6d040e335a5a4c722dad48d339715ccee

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku106547.exe

      Filesize

      319KB

      MD5

      ec5902c90835381a20bb548fcde9ab30

      SHA1

      ce265ac3fd74a011edbc4b641ddcbdd97e0fc472

      SHA256

      cc45ef6509b33a1e07e7cbfb265bb6ab1e537f5172e6e2722b004157a809e436

      SHA512

      a9707c9a32590f051bdc886951facafee6075078ec3d4cb3d122e481119888f60b975dd466fe1ef7f2108579d0143ed6d040e335a5a4c722dad48d339715ccee

    • memory/396-147-0x0000000000F40000-0x0000000000F4A000-memory.dmp

      Filesize

      40KB

    • memory/4108-1085-0x00000000000F0000-0x0000000000122000-memory.dmp

      Filesize

      200KB

    • memory/4108-1086-0x0000000004D50000-0x0000000004D60000-memory.dmp

      Filesize

      64KB

    • memory/4436-191-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-203-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-155-0x0000000004B50000-0x0000000004B60000-memory.dmp

      Filesize

      64KB

    • memory/4436-157-0x0000000004B50000-0x0000000004B60000-memory.dmp

      Filesize

      64KB

    • memory/4436-158-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-159-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-161-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-163-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-165-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-167-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-169-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-171-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-173-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-175-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-177-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-179-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-181-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-183-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-185-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-187-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-189-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-154-0x0000000004B60000-0x0000000005104000-memory.dmp

      Filesize

      5.6MB

    • memory/4436-193-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-195-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-197-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-199-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-201-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-156-0x0000000004B50000-0x0000000004B60000-memory.dmp

      Filesize

      64KB

    • memory/4436-205-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-207-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-209-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-211-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-213-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-215-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-217-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-219-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-221-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

      Filesize

      252KB

    • memory/4436-1064-0x0000000005250000-0x0000000005868000-memory.dmp

      Filesize

      6.1MB

    • memory/4436-1065-0x00000000058B0000-0x00000000059BA000-memory.dmp

      Filesize

      1.0MB

    • memory/4436-1066-0x00000000059E0000-0x00000000059F2000-memory.dmp

      Filesize

      72KB

    • memory/4436-1067-0x0000000005A00000-0x0000000005A3C000-memory.dmp

      Filesize

      240KB

    • memory/4436-1068-0x0000000004B50000-0x0000000004B60000-memory.dmp

      Filesize

      64KB

    • memory/4436-1070-0x0000000005CF0000-0x0000000005D82000-memory.dmp

      Filesize

      584KB

    • memory/4436-1071-0x0000000004B50000-0x0000000004B60000-memory.dmp

      Filesize

      64KB

    • memory/4436-1072-0x0000000004B50000-0x0000000004B60000-memory.dmp

      Filesize

      64KB

    • memory/4436-1073-0x0000000004B50000-0x0000000004B60000-memory.dmp

      Filesize

      64KB

    • memory/4436-1074-0x0000000005D90000-0x0000000005DF6000-memory.dmp

      Filesize

      408KB

    • memory/4436-1075-0x00000000064B0000-0x0000000006672000-memory.dmp

      Filesize

      1.8MB

    • memory/4436-1076-0x0000000006680000-0x0000000006BAC000-memory.dmp

      Filesize

      5.2MB

    • memory/4436-153-0x0000000000640000-0x000000000068B000-memory.dmp

      Filesize

      300KB

    • memory/4436-1077-0x0000000006CE0000-0x0000000006D56000-memory.dmp

      Filesize

      472KB

    • memory/4436-1078-0x0000000006D70000-0x0000000006DC0000-memory.dmp

      Filesize

      320KB

    • memory/4436-1079-0x0000000004B50000-0x0000000004B60000-memory.dmp

      Filesize

      64KB