Analysis

  • max time kernel
    77s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/04/2023, 07:19

General

  • Target

    78619eb8932033ca697c46624fd9fe68e1fc861afd2eb367957c4daf5f0d912a.exe

  • Size

    658KB

  • MD5

    1d7a7962f6a2f725e92f1313721477f0

  • SHA1

    d72bef04603df37727a8bac1168a753192d4051d

  • SHA256

    78619eb8932033ca697c46624fd9fe68e1fc861afd2eb367957c4daf5f0d912a

  • SHA512

    5c91b10437068b174fed4b56e1d1e625206517cf4d0e0f54e748d0b28507f7515a6081736894b17746a3c39e30576c73184838a3b4148326492f3bc0174adc4a

  • SSDEEP

    12288:7Mrsy90J9Tug+pEMMhxC2h4LfEvDYDPobp53cppwAjh+UtU3+:Ty69ivcxC2h4LWgAApZF+EUO

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\78619eb8932033ca697c46624fd9fe68e1fc861afd2eb367957c4daf5f0d912a.exe
    "C:\Users\Admin\AppData\Local\Temp\78619eb8932033ca697c46624fd9fe68e1fc861afd2eb367957c4daf5f0d912a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4112
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un369310.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un369310.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1768
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4036.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4036.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5068
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 1084
          4⤵
          • Program crash
          PID:976
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5962.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5962.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4064
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 2080
          4⤵
          • Program crash
          PID:1256
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si024984.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si024984.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4560
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 5068 -ip 5068
    1⤵
      PID:1460
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4064 -ip 4064
      1⤵
        PID:4912

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si024984.exe

        Filesize

        176KB

        MD5

        65a7981530ae51aeec67dffccc79a3fa

        SHA1

        16f4d5c712f9669928a41ecaf26b9bf020a1a361

        SHA256

        132ae5923f7abcd2044c1b3183ba711e6468a72ca1f44be563846eded7de821e

        SHA512

        0b17204231f3f8203e9e3d8ad05b84c855e2b5deefdea00038ed035e3c554e5877d228da9fde0b93a02b338c0958cd2c5d3a98226b90f1c7bbfe420eecd76cce

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si024984.exe

        Filesize

        176KB

        MD5

        65a7981530ae51aeec67dffccc79a3fa

        SHA1

        16f4d5c712f9669928a41ecaf26b9bf020a1a361

        SHA256

        132ae5923f7abcd2044c1b3183ba711e6468a72ca1f44be563846eded7de821e

        SHA512

        0b17204231f3f8203e9e3d8ad05b84c855e2b5deefdea00038ed035e3c554e5877d228da9fde0b93a02b338c0958cd2c5d3a98226b90f1c7bbfe420eecd76cce

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un369310.exe

        Filesize

        516KB

        MD5

        27c4959e36b7ed3462810c9f71b25514

        SHA1

        b260342abc7660a10b433b2fba27a46a04b5b0fa

        SHA256

        84c0b78c0379bb2e079be3ff793a7a92e7a7874490b3b4e0fbebc1f5fe07847f

        SHA512

        2029f0b9a03ec029686b06a27ed0fc35e08ec59b05b2024f8beff1c260ad71cbf2a345a64c736658f27d61e2a4f36f7966420685be4710e24da87cabcfae6e97

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un369310.exe

        Filesize

        516KB

        MD5

        27c4959e36b7ed3462810c9f71b25514

        SHA1

        b260342abc7660a10b433b2fba27a46a04b5b0fa

        SHA256

        84c0b78c0379bb2e079be3ff793a7a92e7a7874490b3b4e0fbebc1f5fe07847f

        SHA512

        2029f0b9a03ec029686b06a27ed0fc35e08ec59b05b2024f8beff1c260ad71cbf2a345a64c736658f27d61e2a4f36f7966420685be4710e24da87cabcfae6e97

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4036.exe

        Filesize

        283KB

        MD5

        658e8e00a97ad7a1a109082429c44b12

        SHA1

        9d4a2e99de2f67f950b065663599bf2ddd95d4f8

        SHA256

        828f6cde6835585e520e55cbc3f60398d7dcc92b93295277fd9cd7c90d697015

        SHA512

        69bab207b4dd64defde605664f1d3f6f347832b151c21af08670d6b121e4897f67587f885dcd7d89585c2ec2371e452effbbc8efc36ca06fcc2c78ac05d1c859

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4036.exe

        Filesize

        283KB

        MD5

        658e8e00a97ad7a1a109082429c44b12

        SHA1

        9d4a2e99de2f67f950b065663599bf2ddd95d4f8

        SHA256

        828f6cde6835585e520e55cbc3f60398d7dcc92b93295277fd9cd7c90d697015

        SHA512

        69bab207b4dd64defde605664f1d3f6f347832b151c21af08670d6b121e4897f67587f885dcd7d89585c2ec2371e452effbbc8efc36ca06fcc2c78ac05d1c859

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5962.exe

        Filesize

        342KB

        MD5

        a600060a5246cfb74b7f64ef6c77e8f7

        SHA1

        a0f94b1b14968ed611baad953340691de901cdd3

        SHA256

        044da26562d9dc30a5527f3616e97f4176c6167eeab6e050638c1344a7cbcf2a

        SHA512

        0107b8874c1e63d4ce9bd145e99ea1477337c9c1e5c5c4dca675b5dd6e25dfd73f5850c91d2b1f8766bb38bb19f569aa1ef069b1e57e5f9392e214a4ac473586

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5962.exe

        Filesize

        342KB

        MD5

        a600060a5246cfb74b7f64ef6c77e8f7

        SHA1

        a0f94b1b14968ed611baad953340691de901cdd3

        SHA256

        044da26562d9dc30a5527f3616e97f4176c6167eeab6e050638c1344a7cbcf2a

        SHA512

        0107b8874c1e63d4ce9bd145e99ea1477337c9c1e5c5c4dca675b5dd6e25dfd73f5850c91d2b1f8766bb38bb19f569aa1ef069b1e57e5f9392e214a4ac473586

      • memory/4064-1102-0x0000000007290000-0x000000000739A000-memory.dmp

        Filesize

        1.0MB

      • memory/4064-1105-0x00000000073C0000-0x00000000073FC000-memory.dmp

        Filesize

        240KB

      • memory/4064-1116-0x0000000009150000-0x000000000967C000-memory.dmp

        Filesize

        5.2MB

      • memory/4064-1115-0x0000000007450000-0x0000000007460000-memory.dmp

        Filesize

        64KB

      • memory/4064-1114-0x0000000008F60000-0x0000000009122000-memory.dmp

        Filesize

        1.8MB

      • memory/4064-1113-0x0000000008BF0000-0x0000000008C40000-memory.dmp

        Filesize

        320KB

      • memory/4064-1112-0x0000000008B60000-0x0000000008BD6000-memory.dmp

        Filesize

        472KB

      • memory/4064-1111-0x0000000007450000-0x0000000007460000-memory.dmp

        Filesize

        64KB

      • memory/4064-1110-0x0000000007450000-0x0000000007460000-memory.dmp

        Filesize

        64KB

      • memory/4064-1109-0x0000000007450000-0x0000000007460000-memory.dmp

        Filesize

        64KB

      • memory/4064-1108-0x0000000008320000-0x0000000008386000-memory.dmp

        Filesize

        408KB

      • memory/4064-1107-0x0000000008280000-0x0000000008312000-memory.dmp

        Filesize

        584KB

      • memory/4064-213-0x0000000007450000-0x0000000007460000-memory.dmp

        Filesize

        64KB

      • memory/4064-1104-0x0000000007450000-0x0000000007460000-memory.dmp

        Filesize

        64KB

      • memory/4064-1103-0x00000000073A0000-0x00000000073B2000-memory.dmp

        Filesize

        72KB

      • memory/4064-1101-0x0000000007A10000-0x0000000008028000-memory.dmp

        Filesize

        6.1MB

      • memory/4064-228-0x0000000004A20000-0x0000000004A5F000-memory.dmp

        Filesize

        252KB

      • memory/4064-226-0x0000000004A20000-0x0000000004A5F000-memory.dmp

        Filesize

        252KB

      • memory/4064-224-0x0000000004A20000-0x0000000004A5F000-memory.dmp

        Filesize

        252KB

      • memory/4064-222-0x0000000004A20000-0x0000000004A5F000-memory.dmp

        Filesize

        252KB

      • memory/4064-220-0x0000000004A20000-0x0000000004A5F000-memory.dmp

        Filesize

        252KB

      • memory/4064-218-0x0000000004A20000-0x0000000004A5F000-memory.dmp

        Filesize

        252KB

      • memory/4064-216-0x0000000004A20000-0x0000000004A5F000-memory.dmp

        Filesize

        252KB

      • memory/4064-191-0x0000000004A20000-0x0000000004A5F000-memory.dmp

        Filesize

        252KB

      • memory/4064-192-0x0000000004A20000-0x0000000004A5F000-memory.dmp

        Filesize

        252KB

      • memory/4064-194-0x0000000004A20000-0x0000000004A5F000-memory.dmp

        Filesize

        252KB

      • memory/4064-196-0x0000000004A20000-0x0000000004A5F000-memory.dmp

        Filesize

        252KB

      • memory/4064-198-0x0000000004A20000-0x0000000004A5F000-memory.dmp

        Filesize

        252KB

      • memory/4064-200-0x0000000004A20000-0x0000000004A5F000-memory.dmp

        Filesize

        252KB

      • memory/4064-202-0x0000000004A20000-0x0000000004A5F000-memory.dmp

        Filesize

        252KB

      • memory/4064-204-0x0000000004A20000-0x0000000004A5F000-memory.dmp

        Filesize

        252KB

      • memory/4064-206-0x0000000004A20000-0x0000000004A5F000-memory.dmp

        Filesize

        252KB

      • memory/4064-214-0x0000000004A20000-0x0000000004A5F000-memory.dmp

        Filesize

        252KB

      • memory/4064-210-0x0000000007450000-0x0000000007460000-memory.dmp

        Filesize

        64KB

      • memory/4064-208-0x0000000004720000-0x000000000476B000-memory.dmp

        Filesize

        300KB

      • memory/4064-212-0x0000000007450000-0x0000000007460000-memory.dmp

        Filesize

        64KB

      • memory/4064-209-0x0000000004A20000-0x0000000004A5F000-memory.dmp

        Filesize

        252KB

      • memory/4560-1122-0x0000000000310000-0x0000000000342000-memory.dmp

        Filesize

        200KB

      • memory/4560-1124-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/4560-1123-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/5068-162-0x0000000007110000-0x0000000007122000-memory.dmp

        Filesize

        72KB

      • memory/5068-166-0x0000000007110000-0x0000000007122000-memory.dmp

        Filesize

        72KB

      • memory/5068-183-0x0000000007220000-0x0000000007230000-memory.dmp

        Filesize

        64KB

      • memory/5068-182-0x0000000007220000-0x0000000007230000-memory.dmp

        Filesize

        64KB

      • memory/5068-181-0x0000000000400000-0x0000000002B75000-memory.dmp

        Filesize

        39.5MB

      • memory/5068-180-0x0000000007110000-0x0000000007122000-memory.dmp

        Filesize

        72KB

      • memory/5068-150-0x0000000007220000-0x0000000007230000-memory.dmp

        Filesize

        64KB

      • memory/5068-178-0x0000000007110000-0x0000000007122000-memory.dmp

        Filesize

        72KB

      • memory/5068-176-0x0000000007110000-0x0000000007122000-memory.dmp

        Filesize

        72KB

      • memory/5068-174-0x0000000007110000-0x0000000007122000-memory.dmp

        Filesize

        72KB

      • memory/5068-153-0x0000000007110000-0x0000000007122000-memory.dmp

        Filesize

        72KB

      • memory/5068-168-0x0000000007110000-0x0000000007122000-memory.dmp

        Filesize

        72KB

      • memory/5068-172-0x0000000007110000-0x0000000007122000-memory.dmp

        Filesize

        72KB

      • memory/5068-184-0x0000000007220000-0x0000000007230000-memory.dmp

        Filesize

        64KB

      • memory/5068-164-0x0000000007110000-0x0000000007122000-memory.dmp

        Filesize

        72KB

      • memory/5068-170-0x0000000007110000-0x0000000007122000-memory.dmp

        Filesize

        72KB

      • memory/5068-160-0x0000000007110000-0x0000000007122000-memory.dmp

        Filesize

        72KB

      • memory/5068-158-0x0000000007110000-0x0000000007122000-memory.dmp

        Filesize

        72KB

      • memory/5068-156-0x0000000007110000-0x0000000007122000-memory.dmp

        Filesize

        72KB

      • memory/5068-154-0x0000000007110000-0x0000000007122000-memory.dmp

        Filesize

        72KB

      • memory/5068-149-0x0000000002F50000-0x0000000002F7D000-memory.dmp

        Filesize

        180KB

      • memory/5068-148-0x0000000007230000-0x00000000077D4000-memory.dmp

        Filesize

        5.6MB

      • memory/5068-186-0x0000000000400000-0x0000000002B75000-memory.dmp

        Filesize

        39.5MB

      • memory/5068-152-0x0000000007220000-0x0000000007230000-memory.dmp

        Filesize

        64KB

      • memory/5068-151-0x0000000007220000-0x0000000007230000-memory.dmp

        Filesize

        64KB