Analysis

  • max time kernel
    98s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/04/2023, 20:30

General

  • Target

    f7ecaaffda929930f9f0273353099c3ae067f01e811ed0ab0ae7bcecf5f85d4f.exe

  • Size

    529KB

  • MD5

    ce5b57b56db09c7a9c43cfe461106be3

  • SHA1

    65053c3a049e0b30297d3d5722fb86fa1b1e3872

  • SHA256

    f7ecaaffda929930f9f0273353099c3ae067f01e811ed0ab0ae7bcecf5f85d4f

  • SHA512

    a70cbfcee6cbaf6e92209738dccc9f5513ab6b37ad0e67ba5f58cfa8e5708f76fbfded8b5108dbbfc8b63b7d3646f3381d40aa9eb6961d3b5ea83574ef595b2a

  • SSDEEP

    12288:eMriy90CFAqggZ2+dLNnHsCE8sx2BQJfbHDXB:YyRCsXdyCE8yxx

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7ecaaffda929930f9f0273353099c3ae067f01e811ed0ab0ae7bcecf5f85d4f.exe
    "C:\Users\Admin\AppData\Local\Temp\f7ecaaffda929930f9f0273353099c3ae067f01e811ed0ab0ae7bcecf5f85d4f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3812
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidq2419.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidq2419.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1804
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr402128.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr402128.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1952
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku624044.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku624044.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3952
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3952 -s 1344
          4⤵
          • Program crash
          PID:3788
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr275048.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr275048.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4376
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3952 -ip 3952
    1⤵
      PID:5108

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr275048.exe

            Filesize

            175KB

            MD5

            ed3e63a2373e5ada4f97cdab46063086

            SHA1

            13ccc05b257f7337a5ac1ffd4c0a558e10007608

            SHA256

            f66499bc7db078b25f4854dde0886687f87aab4ef6164bd962c472d8d2c12c3e

            SHA512

            c230ea689f5992c53a7b7eaf4976d9c9bb73bb302e545c40f7a82d17c3072f27f167e1c9525c574af584f66a73c41cf1dc6819442a00e8a354b548b42cd2cf86

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr275048.exe

            Filesize

            175KB

            MD5

            ed3e63a2373e5ada4f97cdab46063086

            SHA1

            13ccc05b257f7337a5ac1ffd4c0a558e10007608

            SHA256

            f66499bc7db078b25f4854dde0886687f87aab4ef6164bd962c472d8d2c12c3e

            SHA512

            c230ea689f5992c53a7b7eaf4976d9c9bb73bb302e545c40f7a82d17c3072f27f167e1c9525c574af584f66a73c41cf1dc6819442a00e8a354b548b42cd2cf86

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidq2419.exe

            Filesize

            387KB

            MD5

            eb37e5a9d013a263cb97c64d0e743ebb

            SHA1

            ac499baf52d337819323dddcd5253fe3bab3508e

            SHA256

            0b6725c624d1e8533c1b07901480f15a159aa19fd59b82205e82653a3e613b20

            SHA512

            9c9c45daef0d41e7b117c6a2f2e8ba91ca57bcd4485d9dadec1bba2cf141d263b214b0f829e7a99510e35d990e4a27d69f9eaf4049af2e97776b3d1a6db11db8

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidq2419.exe

            Filesize

            387KB

            MD5

            eb37e5a9d013a263cb97c64d0e743ebb

            SHA1

            ac499baf52d337819323dddcd5253fe3bab3508e

            SHA256

            0b6725c624d1e8533c1b07901480f15a159aa19fd59b82205e82653a3e613b20

            SHA512

            9c9c45daef0d41e7b117c6a2f2e8ba91ca57bcd4485d9dadec1bba2cf141d263b214b0f829e7a99510e35d990e4a27d69f9eaf4049af2e97776b3d1a6db11db8

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr402128.exe

            Filesize

            11KB

            MD5

            61b99ad96e943ccb4429281d694a988a

            SHA1

            791b39e3ffcc45d8843c022f048fb08ee6cada66

            SHA256

            9816d4d80893c78eb35701a0b96d2650e0c571f63dad55ea6f421c7a544cfbdd

            SHA512

            c4302d03593e4aaccb6b59a5e49980da755898e7a99b0b376114b60b6ce45aecfc41c2e18bc9c63ae807b0b3b53beacbb2a797b1580ac3e259e20d106fcb9e78

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr402128.exe

            Filesize

            11KB

            MD5

            61b99ad96e943ccb4429281d694a988a

            SHA1

            791b39e3ffcc45d8843c022f048fb08ee6cada66

            SHA256

            9816d4d80893c78eb35701a0b96d2650e0c571f63dad55ea6f421c7a544cfbdd

            SHA512

            c4302d03593e4aaccb6b59a5e49980da755898e7a99b0b376114b60b6ce45aecfc41c2e18bc9c63ae807b0b3b53beacbb2a797b1580ac3e259e20d106fcb9e78

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku624044.exe

            Filesize

            354KB

            MD5

            57cefbea91d472c20601a71e54a105fb

            SHA1

            1a00665d1946f8d2e3df0d87413434510fb103cc

            SHA256

            894d79e415d3ac0a08209b5a3984ee5efcd585b6ce1eda14e8577b3f2bc81946

            SHA512

            06e7e1af6e7f76726bd06ccd3ad5a535ab25a868f88765f5bea7dc5aad65bce70e46ea2916edf8326817fd7c28d52f2e1d37dff0b686115e4284eec36f813426

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku624044.exe

            Filesize

            354KB

            MD5

            57cefbea91d472c20601a71e54a105fb

            SHA1

            1a00665d1946f8d2e3df0d87413434510fb103cc

            SHA256

            894d79e415d3ac0a08209b5a3984ee5efcd585b6ce1eda14e8577b3f2bc81946

            SHA512

            06e7e1af6e7f76726bd06ccd3ad5a535ab25a868f88765f5bea7dc5aad65bce70e46ea2916edf8326817fd7c28d52f2e1d37dff0b686115e4284eec36f813426

          • memory/1952-147-0x0000000000F10000-0x0000000000F1A000-memory.dmp

            Filesize

            40KB

          • memory/3952-153-0x0000000002DF0000-0x0000000002E3B000-memory.dmp

            Filesize

            300KB

          • memory/3952-154-0x0000000007250000-0x00000000077F4000-memory.dmp

            Filesize

            5.6MB

          • memory/3952-155-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-156-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-158-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-160-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-162-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-164-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-166-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-168-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-170-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-172-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-174-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-176-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-178-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-180-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-182-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-184-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-186-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-188-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-190-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-192-0x0000000004B20000-0x0000000004B30000-memory.dmp

            Filesize

            64KB

          • memory/3952-193-0x0000000004B20000-0x0000000004B30000-memory.dmp

            Filesize

            64KB

          • memory/3952-195-0x0000000004B20000-0x0000000004B30000-memory.dmp

            Filesize

            64KB

          • memory/3952-197-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-194-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-199-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-201-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-203-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-205-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-207-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-209-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-211-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-213-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-215-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-217-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-219-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-221-0x0000000004E20000-0x0000000004E5F000-memory.dmp

            Filesize

            252KB

          • memory/3952-1064-0x0000000007800000-0x0000000007E18000-memory.dmp

            Filesize

            6.1MB

          • memory/3952-1065-0x0000000007E30000-0x0000000007F3A000-memory.dmp

            Filesize

            1.0MB

          • memory/3952-1066-0x0000000007F70000-0x0000000007F82000-memory.dmp

            Filesize

            72KB

          • memory/3952-1067-0x0000000007F90000-0x0000000007FCC000-memory.dmp

            Filesize

            240KB

          • memory/3952-1068-0x0000000004B20000-0x0000000004B30000-memory.dmp

            Filesize

            64KB

          • memory/3952-1070-0x0000000008280000-0x0000000008312000-memory.dmp

            Filesize

            584KB

          • memory/3952-1071-0x0000000008320000-0x0000000008386000-memory.dmp

            Filesize

            408KB

          • memory/3952-1072-0x0000000004B20000-0x0000000004B30000-memory.dmp

            Filesize

            64KB

          • memory/3952-1073-0x0000000008A40000-0x0000000008C02000-memory.dmp

            Filesize

            1.8MB

          • memory/3952-1074-0x0000000008C20000-0x000000000914C000-memory.dmp

            Filesize

            5.2MB

          • memory/3952-1075-0x0000000004B20000-0x0000000004B30000-memory.dmp

            Filesize

            64KB

          • memory/3952-1076-0x0000000009380000-0x00000000093F6000-memory.dmp

            Filesize

            472KB

          • memory/3952-1077-0x0000000009410000-0x0000000009460000-memory.dmp

            Filesize

            320KB

          • memory/4376-1084-0x0000000000160000-0x0000000000192000-memory.dmp

            Filesize

            200KB

          • memory/4376-1085-0x0000000004A50000-0x0000000004A60000-memory.dmp

            Filesize

            64KB

          • memory/4376-1086-0x0000000004A50000-0x0000000004A60000-memory.dmp

            Filesize

            64KB