Analysis

  • max time kernel
    95s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/04/2023, 18:33

General

  • Target

    8a1364f48bb113260fa7db73537041f9e0244f5e38afb9407d8ad205d4a0e20d.exe

  • Size

    659KB

  • MD5

    ff30b79ef9841cb9ebe8bd36088a2558

  • SHA1

    f199a515544fc281fc43babe42d1f23a8a702abe

  • SHA256

    8a1364f48bb113260fa7db73537041f9e0244f5e38afb9407d8ad205d4a0e20d

  • SHA512

    9f8837d51cc453e8304a16d9ae6cba588e6592e5b4822d3235f97a9baea3378def20896c05b071f51b5071c6b165b8bb4cab307e4d2f9266da6cbe8d4bc8d4bf

  • SSDEEP

    12288:CMrsy90jnfW2saH/3fEprCPGFcF5b895R+ERZxbidkYOk:iyY+Bm/8pr2Fp81+ERzRYx

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a1364f48bb113260fa7db73537041f9e0244f5e38afb9407d8ad205d4a0e20d.exe
    "C:\Users\Admin\AppData\Local\Temp\8a1364f48bb113260fa7db73537041f9e0244f5e38afb9407d8ad205d4a0e20d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3664
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un461064.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un461064.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:684
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6757.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6757.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2116
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 1092
          4⤵
          • Program crash
          PID:3352
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2839.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2839.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4444
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4444 -s 1352
          4⤵
          • Program crash
          PID:3220
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si864144.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si864144.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2912
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2116 -ip 2116
    1⤵
      PID:5008
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4444 -ip 4444
      1⤵
        PID:4512

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si864144.exe

        Filesize

        175KB

        MD5

        e2e78efc2197c412510301f8957d9b4a

        SHA1

        92ded2a3b2c11d0247e78f86e3b7301e45606642

        SHA256

        45d43b1269fe20d173c50b946991aa0a67d37537df69ecf75bd1d93ead34576b

        SHA512

        ae90b86c568a20ae9558c41e5fd0cc1f832da1930858a0e798b8c9ae87bbacdc9ebd74ef35bd00fbdd30ab40ce083fcfc367ff2d00d3688984bf0e9dab3aff8a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si864144.exe

        Filesize

        175KB

        MD5

        e2e78efc2197c412510301f8957d9b4a

        SHA1

        92ded2a3b2c11d0247e78f86e3b7301e45606642

        SHA256

        45d43b1269fe20d173c50b946991aa0a67d37537df69ecf75bd1d93ead34576b

        SHA512

        ae90b86c568a20ae9558c41e5fd0cc1f832da1930858a0e798b8c9ae87bbacdc9ebd74ef35bd00fbdd30ab40ce083fcfc367ff2d00d3688984bf0e9dab3aff8a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un461064.exe

        Filesize

        517KB

        MD5

        f73d1abcb34d7f502b3dd2b3b3905f52

        SHA1

        9cbd4fc8ad8221aee4afa7546da7fcb2764b0d5a

        SHA256

        a862a0783d734bf7ee4bda813da5e8dfcb26d47ef7127569ed3d4f57cbc879d9

        SHA512

        a1542ff372709b32a1535f241b4e6c643d16d055b715727da5a01bc617914043e04036d01257b734434661dfd35ac5d21060f6418f3e04683d6a43f5a55f33d2

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un461064.exe

        Filesize

        517KB

        MD5

        f73d1abcb34d7f502b3dd2b3b3905f52

        SHA1

        9cbd4fc8ad8221aee4afa7546da7fcb2764b0d5a

        SHA256

        a862a0783d734bf7ee4bda813da5e8dfcb26d47ef7127569ed3d4f57cbc879d9

        SHA512

        a1542ff372709b32a1535f241b4e6c643d16d055b715727da5a01bc617914043e04036d01257b734434661dfd35ac5d21060f6418f3e04683d6a43f5a55f33d2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6757.exe

        Filesize

        295KB

        MD5

        c5e37682da56303fa4ba5f498f4bf506

        SHA1

        5cc882bd14b85027e5b0e153ed345024ea14df82

        SHA256

        d11e44b2442bbb7bad441b0e437cad5ecf9875c4bd2822d5c7370750a7bb451c

        SHA512

        2bd4ba53208c2364ba6bd956ad9811a420ed681271fbfbd59882aff413fd9bb379fb0f43eaa3f3fa196942a02b6a88c63ac845a50f845e568c845979b8c3524b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6757.exe

        Filesize

        295KB

        MD5

        c5e37682da56303fa4ba5f498f4bf506

        SHA1

        5cc882bd14b85027e5b0e153ed345024ea14df82

        SHA256

        d11e44b2442bbb7bad441b0e437cad5ecf9875c4bd2822d5c7370750a7bb451c

        SHA512

        2bd4ba53208c2364ba6bd956ad9811a420ed681271fbfbd59882aff413fd9bb379fb0f43eaa3f3fa196942a02b6a88c63ac845a50f845e568c845979b8c3524b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2839.exe

        Filesize

        354KB

        MD5

        99592a108fb204dec38c366d8e7ecfb5

        SHA1

        f334b36c7e46ebad2fca20436f128c2c90b1d39a

        SHA256

        4d61d4a53ec0abafc16c51228bc1f890e76c28dc7b30edc399ab93d9c6f8758f

        SHA512

        4574d56535ab0d4ae2445ff2e34de616211e1374888992e8faffa6b52a2eea125e48b8da5165ca8e9d1d2cca081d3cda799e1044ff5bbaa768676befc2a268a5

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2839.exe

        Filesize

        354KB

        MD5

        99592a108fb204dec38c366d8e7ecfb5

        SHA1

        f334b36c7e46ebad2fca20436f128c2c90b1d39a

        SHA256

        4d61d4a53ec0abafc16c51228bc1f890e76c28dc7b30edc399ab93d9c6f8758f

        SHA512

        4574d56535ab0d4ae2445ff2e34de616211e1374888992e8faffa6b52a2eea125e48b8da5165ca8e9d1d2cca081d3cda799e1044ff5bbaa768676befc2a268a5

      • memory/2116-148-0x0000000007350000-0x00000000078F4000-memory.dmp

        Filesize

        5.6MB

      • memory/2116-149-0x00000000047E0000-0x000000000480D000-memory.dmp

        Filesize

        180KB

      • memory/2116-151-0x0000000007340000-0x0000000007350000-memory.dmp

        Filesize

        64KB

      • memory/2116-150-0x0000000007340000-0x0000000007350000-memory.dmp

        Filesize

        64KB

      • memory/2116-152-0x0000000007340000-0x0000000007350000-memory.dmp

        Filesize

        64KB

      • memory/2116-153-0x0000000004A90000-0x0000000004AA2000-memory.dmp

        Filesize

        72KB

      • memory/2116-154-0x0000000004A90000-0x0000000004AA2000-memory.dmp

        Filesize

        72KB

      • memory/2116-156-0x0000000004A90000-0x0000000004AA2000-memory.dmp

        Filesize

        72KB

      • memory/2116-158-0x0000000004A90000-0x0000000004AA2000-memory.dmp

        Filesize

        72KB

      • memory/2116-160-0x0000000004A90000-0x0000000004AA2000-memory.dmp

        Filesize

        72KB

      • memory/2116-162-0x0000000004A90000-0x0000000004AA2000-memory.dmp

        Filesize

        72KB

      • memory/2116-164-0x0000000004A90000-0x0000000004AA2000-memory.dmp

        Filesize

        72KB

      • memory/2116-166-0x0000000004A90000-0x0000000004AA2000-memory.dmp

        Filesize

        72KB

      • memory/2116-168-0x0000000004A90000-0x0000000004AA2000-memory.dmp

        Filesize

        72KB

      • memory/2116-170-0x0000000004A90000-0x0000000004AA2000-memory.dmp

        Filesize

        72KB

      • memory/2116-172-0x0000000004A90000-0x0000000004AA2000-memory.dmp

        Filesize

        72KB

      • memory/2116-174-0x0000000004A90000-0x0000000004AA2000-memory.dmp

        Filesize

        72KB

      • memory/2116-176-0x0000000004A90000-0x0000000004AA2000-memory.dmp

        Filesize

        72KB

      • memory/2116-178-0x0000000004A90000-0x0000000004AA2000-memory.dmp

        Filesize

        72KB

      • memory/2116-180-0x0000000004A90000-0x0000000004AA2000-memory.dmp

        Filesize

        72KB

      • memory/2116-181-0x0000000000400000-0x0000000002B78000-memory.dmp

        Filesize

        39.5MB

      • memory/2116-182-0x0000000007340000-0x0000000007350000-memory.dmp

        Filesize

        64KB

      • memory/2116-183-0x0000000007340000-0x0000000007350000-memory.dmp

        Filesize

        64KB

      • memory/2116-184-0x0000000007340000-0x0000000007350000-memory.dmp

        Filesize

        64KB

      • memory/2116-186-0x0000000000400000-0x0000000002B78000-memory.dmp

        Filesize

        39.5MB

      • memory/2912-1123-0x00000000009D0000-0x0000000000A02000-memory.dmp

        Filesize

        200KB

      • memory/2912-1125-0x0000000005250000-0x0000000005260000-memory.dmp

        Filesize

        64KB

      • memory/2912-1124-0x0000000005250000-0x0000000005260000-memory.dmp

        Filesize

        64KB

      • memory/4444-194-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/4444-228-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/4444-198-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/4444-200-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/4444-202-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/4444-204-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/4444-206-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/4444-208-0x0000000002D10000-0x0000000002D5B000-memory.dmp

        Filesize

        300KB

      • memory/4444-210-0x0000000007370000-0x0000000007380000-memory.dmp

        Filesize

        64KB

      • memory/4444-209-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/4444-212-0x0000000007370000-0x0000000007380000-memory.dmp

        Filesize

        64KB

      • memory/4444-214-0x0000000007370000-0x0000000007380000-memory.dmp

        Filesize

        64KB

      • memory/4444-213-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/4444-216-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/4444-218-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/4444-220-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/4444-222-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/4444-224-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/4444-226-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/4444-196-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/4444-1101-0x0000000007930000-0x0000000007F48000-memory.dmp

        Filesize

        6.1MB

      • memory/4444-1102-0x0000000007F70000-0x000000000807A000-memory.dmp

        Filesize

        1.0MB

      • memory/4444-1103-0x00000000080B0000-0x00000000080C2000-memory.dmp

        Filesize

        72KB

      • memory/4444-1104-0x0000000008110000-0x000000000814C000-memory.dmp

        Filesize

        240KB

      • memory/4444-1105-0x0000000007370000-0x0000000007380000-memory.dmp

        Filesize

        64KB

      • memory/4444-1107-0x00000000083C0000-0x0000000008452000-memory.dmp

        Filesize

        584KB

      • memory/4444-1108-0x0000000008460000-0x00000000084C6000-memory.dmp

        Filesize

        408KB

      • memory/4444-1109-0x0000000007370000-0x0000000007380000-memory.dmp

        Filesize

        64KB

      • memory/4444-1110-0x0000000007370000-0x0000000007380000-memory.dmp

        Filesize

        64KB

      • memory/4444-1111-0x0000000007370000-0x0000000007380000-memory.dmp

        Filesize

        64KB

      • memory/4444-1112-0x0000000008C60000-0x0000000008CD6000-memory.dmp

        Filesize

        472KB

      • memory/4444-1113-0x0000000008CF0000-0x0000000008D40000-memory.dmp

        Filesize

        320KB

      • memory/4444-192-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/4444-191-0x0000000007190000-0x00000000071CF000-memory.dmp

        Filesize

        252KB

      • memory/4444-1114-0x0000000007370000-0x0000000007380000-memory.dmp

        Filesize

        64KB

      • memory/4444-1116-0x000000000A050000-0x000000000A212000-memory.dmp

        Filesize

        1.8MB

      • memory/4444-1117-0x000000000A220000-0x000000000A74C000-memory.dmp

        Filesize

        5.2MB