Analysis

  • max time kernel
    86s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-04-2023 16:51

General

  • Target

    1d6a271ff33c6f5f78b810e7a4681e45080318cce8186d12a98545f9502cb104.exe

  • Size

    659KB

  • MD5

    91ca0dec126c2a9701c5b7221488fdb1

  • SHA1

    d5d641860b99931fbb3b8cce94bd45343267307e

  • SHA256

    1d6a271ff33c6f5f78b810e7a4681e45080318cce8186d12a98545f9502cb104

  • SHA512

    44fc0cb4dc680d45b882fc3c28bfc34d273fec496058b81a28fe7ea49ad46812a50a9b46b349159d3391db75b77e830d2b4c3599aa4af5f27f08160188f3a81a

  • SSDEEP

    12288:DMrEy90lOomXcA+wnYGDK9xDAclp+CPGCcT7TTes/J/+EAZxd3VopT:ryOEcA5YGjEp+1Tr3/1+EAzdWpT

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d6a271ff33c6f5f78b810e7a4681e45080318cce8186d12a98545f9502cb104.exe
    "C:\Users\Admin\AppData\Local\Temp\1d6a271ff33c6f5f78b810e7a4681e45080318cce8186d12a98545f9502cb104.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2680
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un592151.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un592151.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1604
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2068.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2068.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:648
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 648 -s 1080
          4⤵
          • Program crash
          PID:1364
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0292.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0292.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3304
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3304 -s 1956
          4⤵
          • Program crash
          PID:4068
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si005711.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si005711.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1260
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 648 -ip 648
    1⤵
      PID:2768
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3304 -ip 3304
      1⤵
        PID:2524

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si005711.exe

        Filesize

        175KB

        MD5

        d0b3b243a5aa1eec8c13e6d5512b1a40

        SHA1

        45e47eca15ee2cac5b1ec1dd1fbf44921051a4ed

        SHA256

        990d98d9ed24cd25c99582494738808c113ff2c76ede90726fdd0be835390d7e

        SHA512

        1c6e842cc17b6de8cdb33beb664ecd31bbed00de78683eac28454a226123802441a3a6c7c2e9099bf3d6ef9e9856b998786c1721802d528eab0c10d759443709

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si005711.exe

        Filesize

        175KB

        MD5

        d0b3b243a5aa1eec8c13e6d5512b1a40

        SHA1

        45e47eca15ee2cac5b1ec1dd1fbf44921051a4ed

        SHA256

        990d98d9ed24cd25c99582494738808c113ff2c76ede90726fdd0be835390d7e

        SHA512

        1c6e842cc17b6de8cdb33beb664ecd31bbed00de78683eac28454a226123802441a3a6c7c2e9099bf3d6ef9e9856b998786c1721802d528eab0c10d759443709

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un592151.exe

        Filesize

        517KB

        MD5

        54c579e1f1cb5c288c81bc79a6352a09

        SHA1

        5f51445b1d24b33c41299ec1e90b82a3e0d21fc4

        SHA256

        9ae0fe29a25fa3848a08a70cf41d440cd1b6c8d50a09e00b040cd5fc173e39a8

        SHA512

        4b476cb32ccd8dc76aff00935e26d4f84f038f2869d32769764d51623c7b860d7b1fa4d3ac92f6b2ddb2b4f70261222edf6265678889beeefc606dc6aa841a4c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un592151.exe

        Filesize

        517KB

        MD5

        54c579e1f1cb5c288c81bc79a6352a09

        SHA1

        5f51445b1d24b33c41299ec1e90b82a3e0d21fc4

        SHA256

        9ae0fe29a25fa3848a08a70cf41d440cd1b6c8d50a09e00b040cd5fc173e39a8

        SHA512

        4b476cb32ccd8dc76aff00935e26d4f84f038f2869d32769764d51623c7b860d7b1fa4d3ac92f6b2ddb2b4f70261222edf6265678889beeefc606dc6aa841a4c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2068.exe

        Filesize

        295KB

        MD5

        2236145da14026d5e53fcfbdf3a6bc06

        SHA1

        e1eeae1be6f7e1be3b808a537d3ebf9748594c76

        SHA256

        e526e7b710482cd1687fa631ae1f88a073f0500fdc0853649916738d7b83b727

        SHA512

        16720a68def5255312842d475a7d9ef54505290b7255798cac5c192a0d6eec56396bde3aed7683f85a5c5303451059158d5549a7a520b3f2b3adace181750a0a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2068.exe

        Filesize

        295KB

        MD5

        2236145da14026d5e53fcfbdf3a6bc06

        SHA1

        e1eeae1be6f7e1be3b808a537d3ebf9748594c76

        SHA256

        e526e7b710482cd1687fa631ae1f88a073f0500fdc0853649916738d7b83b727

        SHA512

        16720a68def5255312842d475a7d9ef54505290b7255798cac5c192a0d6eec56396bde3aed7683f85a5c5303451059158d5549a7a520b3f2b3adace181750a0a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0292.exe

        Filesize

        354KB

        MD5

        5ceb321a8803df67eae63007eb07f730

        SHA1

        5574ef7158cb0ee6d23dae0d393b3a3319e70130

        SHA256

        1b853084bc19054729f3093c44da396501c37439a9e2fb6280264f9ff4b22700

        SHA512

        a8a7b7c721ea12e1aa36894c888fd8868463b31ca2322c50cc1c2ac3f57ab432bc9b117fcf35221e75b1614b79af2ce7d7106f1c881d8206a3b485014e440503

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0292.exe

        Filesize

        354KB

        MD5

        5ceb321a8803df67eae63007eb07f730

        SHA1

        5574ef7158cb0ee6d23dae0d393b3a3319e70130

        SHA256

        1b853084bc19054729f3093c44da396501c37439a9e2fb6280264f9ff4b22700

        SHA512

        a8a7b7c721ea12e1aa36894c888fd8868463b31ca2322c50cc1c2ac3f57ab432bc9b117fcf35221e75b1614b79af2ce7d7106f1c881d8206a3b485014e440503

      • memory/648-148-0x0000000007280000-0x0000000007824000-memory.dmp

        Filesize

        5.6MB

      • memory/648-149-0x00000000047B0000-0x00000000047DD000-memory.dmp

        Filesize

        180KB

      • memory/648-150-0x0000000007270000-0x0000000007280000-memory.dmp

        Filesize

        64KB

      • memory/648-151-0x0000000007270000-0x0000000007280000-memory.dmp

        Filesize

        64KB

      • memory/648-152-0x0000000007270000-0x0000000007280000-memory.dmp

        Filesize

        64KB

      • memory/648-153-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/648-154-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/648-156-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/648-158-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/648-160-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/648-162-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/648-164-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/648-166-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/648-168-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/648-178-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/648-176-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/648-174-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/648-172-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/648-170-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/648-180-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/648-181-0x0000000000400000-0x0000000002B78000-memory.dmp

        Filesize

        39.5MB

      • memory/648-183-0x0000000007270000-0x0000000007280000-memory.dmp

        Filesize

        64KB

      • memory/648-182-0x0000000007270000-0x0000000007280000-memory.dmp

        Filesize

        64KB

      • memory/648-185-0x0000000000400000-0x0000000002B78000-memory.dmp

        Filesize

        39.5MB

      • memory/1260-1121-0x0000000000970000-0x00000000009A2000-memory.dmp

        Filesize

        200KB

      • memory/1260-1122-0x0000000005270000-0x0000000005280000-memory.dmp

        Filesize

        64KB

      • memory/3304-191-0x0000000004D10000-0x0000000004D20000-memory.dmp

        Filesize

        64KB

      • memory/3304-225-0x0000000007770000-0x00000000077AF000-memory.dmp

        Filesize

        252KB

      • memory/3304-193-0x0000000004D10000-0x0000000004D20000-memory.dmp

        Filesize

        64KB

      • memory/3304-197-0x0000000007770000-0x00000000077AF000-memory.dmp

        Filesize

        252KB

      • memory/3304-195-0x0000000004D10000-0x0000000004D20000-memory.dmp

        Filesize

        64KB

      • memory/3304-194-0x0000000007770000-0x00000000077AF000-memory.dmp

        Filesize

        252KB

      • memory/3304-199-0x0000000007770000-0x00000000077AF000-memory.dmp

        Filesize

        252KB

      • memory/3304-201-0x0000000007770000-0x00000000077AF000-memory.dmp

        Filesize

        252KB

      • memory/3304-203-0x0000000007770000-0x00000000077AF000-memory.dmp

        Filesize

        252KB

      • memory/3304-205-0x0000000007770000-0x00000000077AF000-memory.dmp

        Filesize

        252KB

      • memory/3304-207-0x0000000007770000-0x00000000077AF000-memory.dmp

        Filesize

        252KB

      • memory/3304-209-0x0000000007770000-0x00000000077AF000-memory.dmp

        Filesize

        252KB

      • memory/3304-211-0x0000000007770000-0x00000000077AF000-memory.dmp

        Filesize

        252KB

      • memory/3304-213-0x0000000007770000-0x00000000077AF000-memory.dmp

        Filesize

        252KB

      • memory/3304-215-0x0000000007770000-0x00000000077AF000-memory.dmp

        Filesize

        252KB

      • memory/3304-217-0x0000000007770000-0x00000000077AF000-memory.dmp

        Filesize

        252KB

      • memory/3304-219-0x0000000007770000-0x00000000077AF000-memory.dmp

        Filesize

        252KB

      • memory/3304-221-0x0000000007770000-0x00000000077AF000-memory.dmp

        Filesize

        252KB

      • memory/3304-223-0x0000000007770000-0x00000000077AF000-memory.dmp

        Filesize

        252KB

      • memory/3304-192-0x0000000007770000-0x00000000077AF000-memory.dmp

        Filesize

        252KB

      • memory/3304-227-0x0000000007770000-0x00000000077AF000-memory.dmp

        Filesize

        252KB

      • memory/3304-1100-0x00000000077B0000-0x0000000007DC8000-memory.dmp

        Filesize

        6.1MB

      • memory/3304-1101-0x0000000007E30000-0x0000000007F3A000-memory.dmp

        Filesize

        1.0MB

      • memory/3304-1102-0x0000000007F70000-0x0000000007F82000-memory.dmp

        Filesize

        72KB

      • memory/3304-1103-0x0000000007F90000-0x0000000007FCC000-memory.dmp

        Filesize

        240KB

      • memory/3304-1104-0x0000000004D10000-0x0000000004D20000-memory.dmp

        Filesize

        64KB

      • memory/3304-1106-0x0000000004D10000-0x0000000004D20000-memory.dmp

        Filesize

        64KB

      • memory/3304-1107-0x0000000004D10000-0x0000000004D20000-memory.dmp

        Filesize

        64KB

      • memory/3304-1108-0x0000000004D10000-0x0000000004D20000-memory.dmp

        Filesize

        64KB

      • memory/3304-1109-0x0000000008280000-0x0000000008312000-memory.dmp

        Filesize

        584KB

      • memory/3304-1110-0x0000000008320000-0x0000000008386000-memory.dmp

        Filesize

        408KB

      • memory/3304-1111-0x0000000008A50000-0x0000000008C12000-memory.dmp

        Filesize

        1.8MB

      • memory/3304-1112-0x0000000008C20000-0x000000000914C000-memory.dmp

        Filesize

        5.2MB

      • memory/3304-190-0x0000000002E30000-0x0000000002E7B000-memory.dmp

        Filesize

        300KB

      • memory/3304-1113-0x00000000094C0000-0x0000000009536000-memory.dmp

        Filesize

        472KB

      • memory/3304-1114-0x0000000009550000-0x00000000095A0000-memory.dmp

        Filesize

        320KB

      • memory/3304-1115-0x0000000004D10000-0x0000000004D20000-memory.dmp

        Filesize

        64KB