Analysis

  • max time kernel
    138s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/04/2023, 05:06

General

  • Target

    e6002ff7fa6f5a484aadd2066da813cede3ae390e0e7908bfb6bf30e95baf3c4.exe

  • Size

    673KB

  • MD5

    fa0fdee85b903f91092e9b23b47b7af0

  • SHA1

    f9c10726069537c6084e4e2a5354229a30b8510d

  • SHA256

    e6002ff7fa6f5a484aadd2066da813cede3ae390e0e7908bfb6bf30e95baf3c4

  • SHA512

    cdc1d55fb0b73bcc415e8054bfd3713560b686c0b6687c84e7a7e91d7ae26045b225fd516ee37b7ebf29895a5c466a407f24abba3af87d9b4b416b1fc7f73471

  • SSDEEP

    12288:hMroy90+xOdSqxmly1Yy+w8LJdod0H2v1buW3dBFnYq:xy1xOgqklAr+wy2vZuYpnYq

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e6002ff7fa6f5a484aadd2066da813cede3ae390e0e7908bfb6bf30e95baf3c4.exe
    "C:\Users\Admin\AppData\Local\Temp\e6002ff7fa6f5a484aadd2066da813cede3ae390e0e7908bfb6bf30e95baf3c4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4480
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un157183.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un157183.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1480
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7903.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7903.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:380
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 380 -s 1080
          4⤵
          • Program crash
          PID:4244
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1598.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1598.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1752
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 1540
          4⤵
          • Program crash
          PID:3224
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si860436.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si860436.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2388
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 380 -ip 380
    1⤵
      PID:5084
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 1752 -ip 1752
      1⤵
        PID:2256
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:2540

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si860436.exe

              Filesize

              176KB

              MD5

              0d4d61139872101176a45947fee79341

              SHA1

              849db89d8de90f58386ab16ca2aabb0201528904

              SHA256

              72bd3d41e334a257c4e850ae403bfda1880fe1b7754ad4006409d7bb925b30f6

              SHA512

              1f23b2d50949f5aa2156321092237be661ea454301c390e002f432fd3c1591e641b7bb4a77fff2a1ae8fc03a5e55dabfbc1d154e9e0f629e038895676f08a048

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si860436.exe

              Filesize

              176KB

              MD5

              0d4d61139872101176a45947fee79341

              SHA1

              849db89d8de90f58386ab16ca2aabb0201528904

              SHA256

              72bd3d41e334a257c4e850ae403bfda1880fe1b7754ad4006409d7bb925b30f6

              SHA512

              1f23b2d50949f5aa2156321092237be661ea454301c390e002f432fd3c1591e641b7bb4a77fff2a1ae8fc03a5e55dabfbc1d154e9e0f629e038895676f08a048

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un157183.exe

              Filesize

              531KB

              MD5

              0ef8b0aabb95afe15d405bbb0d3e45ed

              SHA1

              9eb898d283c2b2f31d8ba30641eaf244a72e9074

              SHA256

              59b8ecbfe4f74e97a4c9140a462fc871c7463174a9b6b66a3f7e4c9caddffa8d

              SHA512

              427c9dcb569fa4808e5086573ff48d9547d3250f87259ea209ee23c9e017281edbf205a1587b9bf93a925062cc1c278605ca4e4316820980c84e7a13eb1c7e4e

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un157183.exe

              Filesize

              531KB

              MD5

              0ef8b0aabb95afe15d405bbb0d3e45ed

              SHA1

              9eb898d283c2b2f31d8ba30641eaf244a72e9074

              SHA256

              59b8ecbfe4f74e97a4c9140a462fc871c7463174a9b6b66a3f7e4c9caddffa8d

              SHA512

              427c9dcb569fa4808e5086573ff48d9547d3250f87259ea209ee23c9e017281edbf205a1587b9bf93a925062cc1c278605ca4e4316820980c84e7a13eb1c7e4e

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7903.exe

              Filesize

              260KB

              MD5

              c72453831ba10412d066ec44e0bd99a4

              SHA1

              d789ceeba7f1e09dc2612b41d3e60a0c7fdea206

              SHA256

              d0a43365b2bb9a79253d5db7ce431444b3b6080fc7958b1e1cbf772baabd1af0

              SHA512

              9550a823dd088e49279bf863a3ec615e62dc3332231ad81dd8b2cdb437c777038f42f8c551a4703aa352048f9eaf113051a4ac5679c43f60a5ab29b733f8feb5

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7903.exe

              Filesize

              260KB

              MD5

              c72453831ba10412d066ec44e0bd99a4

              SHA1

              d789ceeba7f1e09dc2612b41d3e60a0c7fdea206

              SHA256

              d0a43365b2bb9a79253d5db7ce431444b3b6080fc7958b1e1cbf772baabd1af0

              SHA512

              9550a823dd088e49279bf863a3ec615e62dc3332231ad81dd8b2cdb437c777038f42f8c551a4703aa352048f9eaf113051a4ac5679c43f60a5ab29b733f8feb5

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1598.exe

              Filesize

              319KB

              MD5

              bdfde190d629a122887baafb6e502882

              SHA1

              3117e6c9318df8ffc275e27a0743031810f1c257

              SHA256

              e6ecacde47c13d54b20e87022e7b2f8e29207d9a1199e3b45b349d04251fd02f

              SHA512

              3c27ade4bc0e1ab38e823e2f4e2de181704fb3ec6ba2215d8a76970919e4a3aa29a7542649900d7f466b520a759061ea4c067a446225c448b6f6b43f0a667b04

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1598.exe

              Filesize

              319KB

              MD5

              bdfde190d629a122887baafb6e502882

              SHA1

              3117e6c9318df8ffc275e27a0743031810f1c257

              SHA256

              e6ecacde47c13d54b20e87022e7b2f8e29207d9a1199e3b45b349d04251fd02f

              SHA512

              3c27ade4bc0e1ab38e823e2f4e2de181704fb3ec6ba2215d8a76970919e4a3aa29a7542649900d7f466b520a759061ea4c067a446225c448b6f6b43f0a667b04

            • memory/380-148-0x0000000004B60000-0x0000000005104000-memory.dmp

              Filesize

              5.6MB

            • memory/380-149-0x0000000000520000-0x000000000054D000-memory.dmp

              Filesize

              180KB

            • memory/380-152-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/380-151-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/380-150-0x0000000004B50000-0x0000000004B60000-memory.dmp

              Filesize

              64KB

            • memory/380-153-0x0000000004B50000-0x0000000004B60000-memory.dmp

              Filesize

              64KB

            • memory/380-155-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/380-157-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/380-159-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/380-161-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/380-163-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/380-165-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/380-167-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/380-169-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/380-171-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/380-173-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/380-175-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/380-177-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/380-179-0x0000000004A20000-0x0000000004A32000-memory.dmp

              Filesize

              72KB

            • memory/380-180-0x0000000000400000-0x00000000004B1000-memory.dmp

              Filesize

              708KB

            • memory/380-181-0x0000000004B50000-0x0000000004B60000-memory.dmp

              Filesize

              64KB

            • memory/380-182-0x0000000004B50000-0x0000000004B60000-memory.dmp

              Filesize

              64KB

            • memory/380-183-0x0000000004B50000-0x0000000004B60000-memory.dmp

              Filesize

              64KB

            • memory/380-185-0x0000000000400000-0x00000000004B1000-memory.dmp

              Filesize

              708KB

            • memory/1752-190-0x0000000005040000-0x000000000507F000-memory.dmp

              Filesize

              252KB

            • memory/1752-193-0x0000000005040000-0x000000000507F000-memory.dmp

              Filesize

              252KB

            • memory/1752-191-0x0000000005040000-0x000000000507F000-memory.dmp

              Filesize

              252KB

            • memory/1752-195-0x0000000005040000-0x000000000507F000-memory.dmp

              Filesize

              252KB

            • memory/1752-197-0x0000000005040000-0x000000000507F000-memory.dmp

              Filesize

              252KB

            • memory/1752-199-0x0000000005040000-0x000000000507F000-memory.dmp

              Filesize

              252KB

            • memory/1752-201-0x0000000005040000-0x000000000507F000-memory.dmp

              Filesize

              252KB

            • memory/1752-203-0x0000000005040000-0x000000000507F000-memory.dmp

              Filesize

              252KB

            • memory/1752-205-0x0000000005040000-0x000000000507F000-memory.dmp

              Filesize

              252KB

            • memory/1752-207-0x0000000005040000-0x000000000507F000-memory.dmp

              Filesize

              252KB

            • memory/1752-209-0x0000000005040000-0x000000000507F000-memory.dmp

              Filesize

              252KB

            • memory/1752-211-0x0000000005040000-0x000000000507F000-memory.dmp

              Filesize

              252KB

            • memory/1752-213-0x0000000005040000-0x000000000507F000-memory.dmp

              Filesize

              252KB

            • memory/1752-215-0x0000000005040000-0x000000000507F000-memory.dmp

              Filesize

              252KB

            • memory/1752-217-0x0000000005040000-0x000000000507F000-memory.dmp

              Filesize

              252KB

            • memory/1752-219-0x0000000005040000-0x000000000507F000-memory.dmp

              Filesize

              252KB

            • memory/1752-221-0x0000000005040000-0x000000000507F000-memory.dmp

              Filesize

              252KB

            • memory/1752-223-0x0000000005040000-0x000000000507F000-memory.dmp

              Filesize

              252KB

            • memory/1752-481-0x0000000002140000-0x000000000218B000-memory.dmp

              Filesize

              300KB

            • memory/1752-483-0x0000000002630000-0x0000000002640000-memory.dmp

              Filesize

              64KB

            • memory/1752-485-0x0000000002630000-0x0000000002640000-memory.dmp

              Filesize

              64KB

            • memory/1752-487-0x0000000002630000-0x0000000002640000-memory.dmp

              Filesize

              64KB

            • memory/1752-1100-0x0000000005200000-0x0000000005818000-memory.dmp

              Filesize

              6.1MB

            • memory/1752-1101-0x00000000058A0000-0x00000000059AA000-memory.dmp

              Filesize

              1.0MB

            • memory/1752-1102-0x00000000059E0000-0x00000000059F2000-memory.dmp

              Filesize

              72KB

            • memory/1752-1103-0x0000000005A00000-0x0000000005A3C000-memory.dmp

              Filesize

              240KB

            • memory/1752-1104-0x0000000002630000-0x0000000002640000-memory.dmp

              Filesize

              64KB

            • memory/1752-1105-0x0000000005CF0000-0x0000000005D56000-memory.dmp

              Filesize

              408KB

            • memory/1752-1106-0x00000000063B0000-0x0000000006442000-memory.dmp

              Filesize

              584KB

            • memory/1752-1107-0x00000000064C0000-0x0000000006682000-memory.dmp

              Filesize

              1.8MB

            • memory/1752-1109-0x0000000006690000-0x0000000006BBC000-memory.dmp

              Filesize

              5.2MB

            • memory/1752-1110-0x0000000002630000-0x0000000002640000-memory.dmp

              Filesize

              64KB

            • memory/1752-1112-0x0000000002630000-0x0000000002640000-memory.dmp

              Filesize

              64KB

            • memory/1752-1111-0x0000000002630000-0x0000000002640000-memory.dmp

              Filesize

              64KB

            • memory/1752-1113-0x0000000002630000-0x0000000002640000-memory.dmp

              Filesize

              64KB

            • memory/1752-1114-0x0000000006F40000-0x0000000006FB6000-memory.dmp

              Filesize

              472KB

            • memory/1752-1115-0x0000000006FC0000-0x0000000007010000-memory.dmp

              Filesize

              320KB

            • memory/2388-1121-0x00000000000A0000-0x00000000000D2000-memory.dmp

              Filesize

              200KB

            • memory/2388-1122-0x0000000004C50000-0x0000000004C60000-memory.dmp

              Filesize

              64KB