Analysis

  • max time kernel
    145s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-04-2023 13:26

General

  • Target

    09caa733c43d16be5979fee6f9601384fc1941ee30228b91593609a00f11aa1a.exe

  • Size

    530KB

  • MD5

    4f78d7be8a762d541b3009a2081d6b4b

  • SHA1

    42e7b786bb13e46887f85f00776e260fce793ed6

  • SHA256

    09caa733c43d16be5979fee6f9601384fc1941ee30228b91593609a00f11aa1a

  • SHA512

    19ed2f394a872ea303d516c717cd7f0660640bb697a927beb93f55312eb1699e2ed7dcc37b4bedf58f78c106e1740d9f0c62eba126c0c99b723eca80e73f0a6a

  • SSDEEP

    12288:BMrly90B9ekISLw2i0/+e1hizx4bd0a8Lo0f/EM1w:My6IEfiLC0aKSh

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\09caa733c43d16be5979fee6f9601384fc1941ee30228b91593609a00f11aa1a.exe
    "C:\Users\Admin\AppData\Local\Temp\09caa733c43d16be5979fee6f9601384fc1941ee30228b91593609a00f11aa1a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4536
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHi8144.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHi8144.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3260
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr613613.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr613613.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2152
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku549608.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku549608.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:244
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 244 -s 2084
          4⤵
          • Program crash
          PID:1324
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr971449.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr971449.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:396
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 244 -ip 244
    1⤵
      PID:5028
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe start wuauserv
      1⤵
      • Launches sc.exe
      PID:2308

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr971449.exe

      Filesize

      175KB

      MD5

      029b360c657d0dee6930a88473976fe6

      SHA1

      00f0c461222eab3a9f080c67389610f6c84b3553

      SHA256

      c3f3f200da83a970cd4d82f03fb29661373e2893d9fe67b24138fba6a982ce2a

      SHA512

      699a43650999a426d5ead653f10f07c0b0229446a9b2f926706fa9376275d872e6376ce4a0daf7d6fe1a9bf04b97024a18b3d3c921fbfe6a0bbd43742f906080

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr971449.exe

      Filesize

      175KB

      MD5

      029b360c657d0dee6930a88473976fe6

      SHA1

      00f0c461222eab3a9f080c67389610f6c84b3553

      SHA256

      c3f3f200da83a970cd4d82f03fb29661373e2893d9fe67b24138fba6a982ce2a

      SHA512

      699a43650999a426d5ead653f10f07c0b0229446a9b2f926706fa9376275d872e6376ce4a0daf7d6fe1a9bf04b97024a18b3d3c921fbfe6a0bbd43742f906080

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHi8144.exe

      Filesize

      388KB

      MD5

      565b33110ae76d5dfebd0d38e2d65049

      SHA1

      4085d2b4f7a51a642b11b201197ac2c69a0cf25e

      SHA256

      f1e6bf2d8e280ce6cc2c21487b6e5ee6e5a35ad34789e26ea5041bc20cec7baf

      SHA512

      55041706a504cd95c1dd2528c61b52e2e395af58df08cc7448c21ce92644185502d51fea4523bce93001cac950aa3ec81103fe3a0591a26e8964e02560e5b92b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHi8144.exe

      Filesize

      388KB

      MD5

      565b33110ae76d5dfebd0d38e2d65049

      SHA1

      4085d2b4f7a51a642b11b201197ac2c69a0cf25e

      SHA256

      f1e6bf2d8e280ce6cc2c21487b6e5ee6e5a35ad34789e26ea5041bc20cec7baf

      SHA512

      55041706a504cd95c1dd2528c61b52e2e395af58df08cc7448c21ce92644185502d51fea4523bce93001cac950aa3ec81103fe3a0591a26e8964e02560e5b92b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr613613.exe

      Filesize

      11KB

      MD5

      caaa69b72a6310930160e8d9afc7dd4e

      SHA1

      41bff04ef8f5721faa638eac999dfd7081f895ca

      SHA256

      a4d2ccd6a0a982b569a8702a7f9fdd5d083dc276f1c325b958df9ed8ced626f6

      SHA512

      2140be6c992250a29160bc8ec2fd1ad684ed251665db3cb9bf8edae2ed3210f28469fa0d6825d59a39c2c3cd7e6e009adeb839d656b91dcc915b6aba23b95321

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr613613.exe

      Filesize

      11KB

      MD5

      caaa69b72a6310930160e8d9afc7dd4e

      SHA1

      41bff04ef8f5721faa638eac999dfd7081f895ca

      SHA256

      a4d2ccd6a0a982b569a8702a7f9fdd5d083dc276f1c325b958df9ed8ced626f6

      SHA512

      2140be6c992250a29160bc8ec2fd1ad684ed251665db3cb9bf8edae2ed3210f28469fa0d6825d59a39c2c3cd7e6e009adeb839d656b91dcc915b6aba23b95321

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku549608.exe

      Filesize

      355KB

      MD5

      3b00b6b7d48d18c90121c46b853479ca

      SHA1

      db02a127688618ed419a910974f2083846adcd72

      SHA256

      4143fb6e8ca52d130b417b28c5cc267007f69d10f4855255f1c8434a1e0949ef

      SHA512

      34651e78134da76221a066ee2ebc7196b55cbc443057668f4b15c00cbc623dd47337cf6eb7f4c7a0caf8465717e0eb4cc9de3bb6cf24a8c1a2a2fa7d4cf14d6e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku549608.exe

      Filesize

      355KB

      MD5

      3b00b6b7d48d18c90121c46b853479ca

      SHA1

      db02a127688618ed419a910974f2083846adcd72

      SHA256

      4143fb6e8ca52d130b417b28c5cc267007f69d10f4855255f1c8434a1e0949ef

      SHA512

      34651e78134da76221a066ee2ebc7196b55cbc443057668f4b15c00cbc623dd47337cf6eb7f4c7a0caf8465717e0eb4cc9de3bb6cf24a8c1a2a2fa7d4cf14d6e

    • memory/244-153-0x00000000047F0000-0x000000000483B000-memory.dmp

      Filesize

      300KB

    • memory/244-154-0x00000000073E0000-0x0000000007984000-memory.dmp

      Filesize

      5.6MB

    • memory/244-155-0x00000000073D0000-0x00000000073E0000-memory.dmp

      Filesize

      64KB

    • memory/244-157-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-159-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-158-0x00000000073D0000-0x00000000073E0000-memory.dmp

      Filesize

      64KB

    • memory/244-156-0x00000000073D0000-0x00000000073E0000-memory.dmp

      Filesize

      64KB

    • memory/244-161-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-163-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-165-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-167-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-169-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-171-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-173-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-175-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-177-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-179-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-181-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-183-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-185-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-187-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-189-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-191-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-193-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-195-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-197-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-199-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-201-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-203-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-205-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-207-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-209-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-211-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-213-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-215-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-217-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-219-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-221-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

      Filesize

      252KB

    • memory/244-1064-0x0000000007990000-0x0000000007FA8000-memory.dmp

      Filesize

      6.1MB

    • memory/244-1065-0x0000000007FB0000-0x00000000080BA000-memory.dmp

      Filesize

      1.0MB

    • memory/244-1066-0x00000000080C0000-0x00000000080D2000-memory.dmp

      Filesize

      72KB

    • memory/244-1067-0x00000000073D0000-0x00000000073E0000-memory.dmp

      Filesize

      64KB

    • memory/244-1068-0x00000000080E0000-0x000000000811C000-memory.dmp

      Filesize

      240KB

    • memory/244-1070-0x00000000083C0000-0x0000000008426000-memory.dmp

      Filesize

      408KB

    • memory/244-1071-0x0000000008A70000-0x0000000008B02000-memory.dmp

      Filesize

      584KB

    • memory/244-1072-0x00000000073D0000-0x00000000073E0000-memory.dmp

      Filesize

      64KB

    • memory/244-1073-0x00000000073D0000-0x00000000073E0000-memory.dmp

      Filesize

      64KB

    • memory/244-1074-0x00000000073D0000-0x00000000073E0000-memory.dmp

      Filesize

      64KB

    • memory/244-1075-0x0000000008DA0000-0x0000000008E16000-memory.dmp

      Filesize

      472KB

    • memory/244-1076-0x0000000008E30000-0x0000000008E80000-memory.dmp

      Filesize

      320KB

    • memory/244-1077-0x00000000073D0000-0x00000000073E0000-memory.dmp

      Filesize

      64KB

    • memory/244-1078-0x00000000090E0000-0x00000000092A2000-memory.dmp

      Filesize

      1.8MB

    • memory/244-1079-0x00000000092B0000-0x00000000097DC000-memory.dmp

      Filesize

      5.2MB

    • memory/396-1086-0x0000000000D50000-0x0000000000D82000-memory.dmp

      Filesize

      200KB

    • memory/396-1087-0x0000000005620000-0x0000000005630000-memory.dmp

      Filesize

      64KB

    • memory/2152-147-0x0000000000640000-0x000000000064A000-memory.dmp

      Filesize

      40KB