Analysis

  • max time kernel
    97s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-04-2023 15:07

General

  • Target

    cda6e4c98c0a31af44cb1f4b17b283a0136e933dd8dc1db1780fbc919078bea6.exe

  • Size

    658KB

  • MD5

    722a5b6efe86c3476be96c06248f8923

  • SHA1

    e054cd8b81453ac93820feb15fa73d61f9875248

  • SHA256

    cda6e4c98c0a31af44cb1f4b17b283a0136e933dd8dc1db1780fbc919078bea6

  • SHA512

    c4bf5ef112624d55f90b9cb5ae3d15db3b96b4722d64a180309c4c3ba7eb81085dca3ca3a04884ace8dd72cb94fd8abda5d57b38a8ad1bb9ecce18f51cb7fb0c

  • SSDEEP

    12288:4MrEy90TKRuMrHSs/63Tvth2IexntjStXE/Kj6QoqBiVLIx3fl:cy7uMbSs/6DP2ZtjMDGQDALIj

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cda6e4c98c0a31af44cb1f4b17b283a0136e933dd8dc1db1780fbc919078bea6.exe
    "C:\Users\Admin\AppData\Local\Temp\cda6e4c98c0a31af44cb1f4b17b283a0136e933dd8dc1db1780fbc919078bea6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4480
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un107569.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un107569.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1480
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5728.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5728.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4364
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4364 -s 1084
          4⤵
          • Program crash
          PID:3924
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1201.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1201.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2352
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2352 -s 1932
          4⤵
          • Program crash
          PID:2196
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si502601.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si502601.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3764
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 4364 -ip 4364
    1⤵
      PID:968
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2352 -ip 2352
      1⤵
        PID:3876

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si502601.exe

        Filesize

        175KB

        MD5

        41e84310cd9215d6f423071d1de1e002

        SHA1

        bb4a33717f8dca26095cae1588528c9da9b29bb4

        SHA256

        c3dcd55ae30d66bdf7838b1c06e1a5513b961e958e11a37477c81893028c6409

        SHA512

        d9ff555b586e5c47b08d8b840d02dd5ae92773777a20c54ffd7d2b6187ff992f1028602a1bf0c7d94b33c86b621c6bd20d1630cd860c1d6cb1391ffcd5472b47

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si502601.exe

        Filesize

        175KB

        MD5

        41e84310cd9215d6f423071d1de1e002

        SHA1

        bb4a33717f8dca26095cae1588528c9da9b29bb4

        SHA256

        c3dcd55ae30d66bdf7838b1c06e1a5513b961e958e11a37477c81893028c6409

        SHA512

        d9ff555b586e5c47b08d8b840d02dd5ae92773777a20c54ffd7d2b6187ff992f1028602a1bf0c7d94b33c86b621c6bd20d1630cd860c1d6cb1391ffcd5472b47

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un107569.exe

        Filesize

        516KB

        MD5

        5ab547bf9c025ad6a624b2f66704cfbb

        SHA1

        caa7b197e8cdd1722f8733404d46bab6c71ea7ab

        SHA256

        4486d1247a97eb49738cc171ee2db3a7a26ed6b3b247499c77ea63ac05fa616f

        SHA512

        7d5e209b87c3a4e82115df060102ae85a934cfc694f506199488d32127fb243e8b3f060015ce02e7061ef8e237e51401355ccdfb555d1028e0e9c63c6134d9ef

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un107569.exe

        Filesize

        516KB

        MD5

        5ab547bf9c025ad6a624b2f66704cfbb

        SHA1

        caa7b197e8cdd1722f8733404d46bab6c71ea7ab

        SHA256

        4486d1247a97eb49738cc171ee2db3a7a26ed6b3b247499c77ea63ac05fa616f

        SHA512

        7d5e209b87c3a4e82115df060102ae85a934cfc694f506199488d32127fb243e8b3f060015ce02e7061ef8e237e51401355ccdfb555d1028e0e9c63c6134d9ef

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5728.exe

        Filesize

        295KB

        MD5

        39b28290590cd474e3613ea34ea40602

        SHA1

        439f95c72ad8d9a950face01e22310f3bbb155fe

        SHA256

        1a25ef2ae2ed8add04b36eb84b80e13eaa0fbcd27c03403e567dc59042d2ed40

        SHA512

        c04c69cdd139ce3660d312a3ff5a8b898209577c4f52c68f698a171ba975551ac832901712ae4b5439aa54cdcab4743711962cc3194c7a2f54d2f1e30e98d81c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5728.exe

        Filesize

        295KB

        MD5

        39b28290590cd474e3613ea34ea40602

        SHA1

        439f95c72ad8d9a950face01e22310f3bbb155fe

        SHA256

        1a25ef2ae2ed8add04b36eb84b80e13eaa0fbcd27c03403e567dc59042d2ed40

        SHA512

        c04c69cdd139ce3660d312a3ff5a8b898209577c4f52c68f698a171ba975551ac832901712ae4b5439aa54cdcab4743711962cc3194c7a2f54d2f1e30e98d81c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1201.exe

        Filesize

        354KB

        MD5

        c5be154fde5f4e305575b09dae13dc18

        SHA1

        c38ac7d52a0ba7bac6a69eacdd6cf8bcc065e431

        SHA256

        9776c048ea3b13c6006da6dbc3f9d15118ba5dd6a80c5ea5d82ad9baac37dde6

        SHA512

        4a88d189042fb41c6bd5ae20941c16939c5d72e6f761ba0437a665a4216492166dbedda7d96c36950840fd1886173ebf784abc758b4175e12e71ab5a02efd97d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1201.exe

        Filesize

        354KB

        MD5

        c5be154fde5f4e305575b09dae13dc18

        SHA1

        c38ac7d52a0ba7bac6a69eacdd6cf8bcc065e431

        SHA256

        9776c048ea3b13c6006da6dbc3f9d15118ba5dd6a80c5ea5d82ad9baac37dde6

        SHA512

        4a88d189042fb41c6bd5ae20941c16939c5d72e6f761ba0437a665a4216492166dbedda7d96c36950840fd1886173ebf784abc758b4175e12e71ab5a02efd97d

      • memory/2352-1102-0x0000000007F70000-0x000000000807A000-memory.dmp

        Filesize

        1.0MB

      • memory/2352-1101-0x0000000007910000-0x0000000007F28000-memory.dmp

        Filesize

        6.1MB

      • memory/2352-214-0x0000000004E30000-0x0000000004E6F000-memory.dmp

        Filesize

        252KB

      • memory/2352-216-0x0000000004E30000-0x0000000004E6F000-memory.dmp

        Filesize

        252KB

      • memory/2352-201-0x0000000007350000-0x0000000007360000-memory.dmp

        Filesize

        64KB

      • memory/2352-203-0x0000000007350000-0x0000000007360000-memory.dmp

        Filesize

        64KB

      • memory/2352-1115-0x0000000008EE0000-0x00000000090A2000-memory.dmp

        Filesize

        1.8MB

      • memory/2352-1114-0x0000000007350000-0x0000000007360000-memory.dmp

        Filesize

        64KB

      • memory/2352-1113-0x0000000007350000-0x0000000007360000-memory.dmp

        Filesize

        64KB

      • memory/2352-1112-0x0000000007350000-0x0000000007360000-memory.dmp

        Filesize

        64KB

      • memory/2352-204-0x0000000004E30000-0x0000000004E6F000-memory.dmp

        Filesize

        252KB

      • memory/2352-1111-0x0000000008CF0000-0x0000000008D40000-memory.dmp

        Filesize

        320KB

      • memory/2352-1110-0x0000000008C60000-0x0000000008CD6000-memory.dmp

        Filesize

        472KB

      • memory/2352-1109-0x0000000004720000-0x000000000476B000-memory.dmp

        Filesize

        300KB

      • memory/2352-1108-0x0000000008A70000-0x0000000008B02000-memory.dmp

        Filesize

        584KB

      • memory/2352-1107-0x00000000083C0000-0x0000000008426000-memory.dmp

        Filesize

        408KB

      • memory/2352-1105-0x0000000007350000-0x0000000007360000-memory.dmp

        Filesize

        64KB

      • memory/2352-1104-0x00000000080D0000-0x000000000810C000-memory.dmp

        Filesize

        240KB

      • memory/2352-1103-0x00000000080B0000-0x00000000080C2000-memory.dmp

        Filesize

        72KB

      • memory/2352-218-0x0000000004E30000-0x0000000004E6F000-memory.dmp

        Filesize

        252KB

      • memory/2352-228-0x0000000004E30000-0x0000000004E6F000-memory.dmp

        Filesize

        252KB

      • memory/2352-226-0x0000000004E30000-0x0000000004E6F000-memory.dmp

        Filesize

        252KB

      • memory/2352-224-0x0000000004E30000-0x0000000004E6F000-memory.dmp

        Filesize

        252KB

      • memory/2352-191-0x0000000004720000-0x000000000476B000-memory.dmp

        Filesize

        300KB

      • memory/2352-192-0x0000000004E30000-0x0000000004E6F000-memory.dmp

        Filesize

        252KB

      • memory/2352-193-0x0000000004E30000-0x0000000004E6F000-memory.dmp

        Filesize

        252KB

      • memory/2352-195-0x0000000004E30000-0x0000000004E6F000-memory.dmp

        Filesize

        252KB

      • memory/2352-197-0x0000000004E30000-0x0000000004E6F000-memory.dmp

        Filesize

        252KB

      • memory/2352-199-0x0000000007350000-0x0000000007360000-memory.dmp

        Filesize

        64KB

      • memory/2352-200-0x0000000004E30000-0x0000000004E6F000-memory.dmp

        Filesize

        252KB

      • memory/2352-222-0x0000000004E30000-0x0000000004E6F000-memory.dmp

        Filesize

        252KB

      • memory/2352-1116-0x00000000090B0000-0x00000000095DC000-memory.dmp

        Filesize

        5.2MB

      • memory/2352-220-0x0000000004E30000-0x0000000004E6F000-memory.dmp

        Filesize

        252KB

      • memory/2352-206-0x0000000004E30000-0x0000000004E6F000-memory.dmp

        Filesize

        252KB

      • memory/2352-208-0x0000000004E30000-0x0000000004E6F000-memory.dmp

        Filesize

        252KB

      • memory/2352-210-0x0000000004E30000-0x0000000004E6F000-memory.dmp

        Filesize

        252KB

      • memory/2352-212-0x0000000004E30000-0x0000000004E6F000-memory.dmp

        Filesize

        252KB

      • memory/3764-1122-0x0000000000B90000-0x0000000000BC2000-memory.dmp

        Filesize

        200KB

      • memory/3764-1123-0x00000000054A0000-0x00000000054B0000-memory.dmp

        Filesize

        64KB

      • memory/4364-181-0x0000000000400000-0x0000000002B78000-memory.dmp

        Filesize

        39.5MB

      • memory/4364-170-0x0000000004B80000-0x0000000004B92000-memory.dmp

        Filesize

        72KB

      • memory/4364-148-0x0000000007180000-0x0000000007724000-memory.dmp

        Filesize

        5.6MB

      • memory/4364-152-0x0000000004BF0000-0x0000000004C00000-memory.dmp

        Filesize

        64KB

      • memory/4364-151-0x0000000004BF0000-0x0000000004C00000-memory.dmp

        Filesize

        64KB

      • memory/4364-186-0x0000000000400000-0x0000000002B78000-memory.dmp

        Filesize

        39.5MB

      • memory/4364-185-0x0000000004BF0000-0x0000000004C00000-memory.dmp

        Filesize

        64KB

      • memory/4364-150-0x0000000004BF0000-0x0000000004C00000-memory.dmp

        Filesize

        64KB

      • memory/4364-182-0x0000000004BF0000-0x0000000004C00000-memory.dmp

        Filesize

        64KB

      • memory/4364-183-0x0000000004BF0000-0x0000000004C00000-memory.dmp

        Filesize

        64KB

      • memory/4364-153-0x0000000004B80000-0x0000000004B92000-memory.dmp

        Filesize

        72KB

      • memory/4364-180-0x0000000004B80000-0x0000000004B92000-memory.dmp

        Filesize

        72KB

      • memory/4364-178-0x0000000004B80000-0x0000000004B92000-memory.dmp

        Filesize

        72KB

      • memory/4364-176-0x0000000004B80000-0x0000000004B92000-memory.dmp

        Filesize

        72KB

      • memory/4364-174-0x0000000004B80000-0x0000000004B92000-memory.dmp

        Filesize

        72KB

      • memory/4364-172-0x0000000004B80000-0x0000000004B92000-memory.dmp

        Filesize

        72KB

      • memory/4364-168-0x0000000004B80000-0x0000000004B92000-memory.dmp

        Filesize

        72KB

      • memory/4364-166-0x0000000004B80000-0x0000000004B92000-memory.dmp

        Filesize

        72KB

      • memory/4364-164-0x0000000004B80000-0x0000000004B92000-memory.dmp

        Filesize

        72KB

      • memory/4364-162-0x0000000004B80000-0x0000000004B92000-memory.dmp

        Filesize

        72KB

      • memory/4364-160-0x0000000004B80000-0x0000000004B92000-memory.dmp

        Filesize

        72KB

      • memory/4364-149-0x00000000047C0000-0x00000000047ED000-memory.dmp

        Filesize

        180KB

      • memory/4364-158-0x0000000004B80000-0x0000000004B92000-memory.dmp

        Filesize

        72KB

      • memory/4364-156-0x0000000004B80000-0x0000000004B92000-memory.dmp

        Filesize

        72KB

      • memory/4364-154-0x0000000004B80000-0x0000000004B92000-memory.dmp

        Filesize

        72KB