Analysis

  • max time kernel
    84s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/04/2023, 22:22

General

  • Target

    de0dac16e4382d84405a995ce4a70acfac8df7573d2eeb6fc6569c015e6b5ad0.exe

  • Size

    537KB

  • MD5

    4c348f1f0f90032f1197fe28900ba4d9

  • SHA1

    d2e8440287ec80a376dea7a81b6a92d3e4e6ec76

  • SHA256

    de0dac16e4382d84405a995ce4a70acfac8df7573d2eeb6fc6569c015e6b5ad0

  • SHA512

    1c0390b938269c4110f5e4cdfe7c32db051e7439aa9560a8ef360a34e13bbf5cbba9e7025f7cfa070c5fac0356093ffb3f2f9e61f40bcb9f3fa7de7d14be038c

  • SSDEEP

    12288:HMrqy90wIE0mQfjHBbjG9ErUE2HiwFh5aC7yfeq5eGuP:Zy0GarACwFh5aXe+eGuP

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\de0dac16e4382d84405a995ce4a70acfac8df7573d2eeb6fc6569c015e6b5ad0.exe
    "C:\Users\Admin\AppData\Local\Temp\de0dac16e4382d84405a995ce4a70acfac8df7573d2eeb6fc6569c015e6b5ad0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4488
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwn6168.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwn6168.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4808
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr741358.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr741358.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2072
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku156372.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku156372.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1944
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 1676
          4⤵
          • Program crash
          PID:4400
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr343115.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr343115.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4168
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1944 -ip 1944
    1⤵
      PID:3372

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr343115.exe

      Filesize

      176KB

      MD5

      c5bea3cb9ae0ec252172715570e93754

      SHA1

      c0f9f61bf1cd628a3b4cf3fd3cbbee84f35120a0

      SHA256

      82d5382800ad6ba39384d522261508ce5dab00d8a3a0f67cd5e6dfe89bfd450b

      SHA512

      a504aef1c35e1b307a09467aca8f4c8c2405e3a12eb075442bfc396776423277d10369d00397380d3c4c86ecb94c8f8d6525c1ec4500734760ddde1523b086ee

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr343115.exe

      Filesize

      176KB

      MD5

      c5bea3cb9ae0ec252172715570e93754

      SHA1

      c0f9f61bf1cd628a3b4cf3fd3cbbee84f35120a0

      SHA256

      82d5382800ad6ba39384d522261508ce5dab00d8a3a0f67cd5e6dfe89bfd450b

      SHA512

      a504aef1c35e1b307a09467aca8f4c8c2405e3a12eb075442bfc396776423277d10369d00397380d3c4c86ecb94c8f8d6525c1ec4500734760ddde1523b086ee

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwn6168.exe

      Filesize

      395KB

      MD5

      c8cc9c4857fa56d826be6a5758bbb8ed

      SHA1

      f6eecfda4a281a038add244ba98dc9a48e80503e

      SHA256

      4163fff7fc184367a6df14db2f27f63e53ac29df97a982eca701711b09524a9d

      SHA512

      d8deb897ec3f538724d9fe5f3080eb5935ad949aade7f406dd267167decb2cdd8aee2c455cbbbc9ced917d20a74d9aaa3f412bd088631099988c2b4e34d3bc77

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwn6168.exe

      Filesize

      395KB

      MD5

      c8cc9c4857fa56d826be6a5758bbb8ed

      SHA1

      f6eecfda4a281a038add244ba98dc9a48e80503e

      SHA256

      4163fff7fc184367a6df14db2f27f63e53ac29df97a982eca701711b09524a9d

      SHA512

      d8deb897ec3f538724d9fe5f3080eb5935ad949aade7f406dd267167decb2cdd8aee2c455cbbbc9ced917d20a74d9aaa3f412bd088631099988c2b4e34d3bc77

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr741358.exe

      Filesize

      13KB

      MD5

      f4bcb47aa79c1c53b7b7cb6d11162c3e

      SHA1

      4af59c279a1ce866ad0ef2c1d7ce6443d00b6888

      SHA256

      ade808d8e73b809471e7fabbcd06abb86aa445ab0dbca62a4997ba6fd30183cd

      SHA512

      483163056ab2a2f2b1d2a71d038db702ba0a6b828f70ca9b293d5d4ec50a3a535772e302cb3d7f0bc9e1343812d46ea0630a77692f40bcf18f2cd6df44292c6d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr741358.exe

      Filesize

      13KB

      MD5

      f4bcb47aa79c1c53b7b7cb6d11162c3e

      SHA1

      4af59c279a1ce866ad0ef2c1d7ce6443d00b6888

      SHA256

      ade808d8e73b809471e7fabbcd06abb86aa445ab0dbca62a4997ba6fd30183cd

      SHA512

      483163056ab2a2f2b1d2a71d038db702ba0a6b828f70ca9b293d5d4ec50a3a535772e302cb3d7f0bc9e1343812d46ea0630a77692f40bcf18f2cd6df44292c6d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku156372.exe

      Filesize

      352KB

      MD5

      9bcbd7894efef18a3fb8a42c8d833d38

      SHA1

      8375eaa679f021ddc04d7d81f2da32fe4d12d95a

      SHA256

      2a14a4ad61b7fa00e2cedb21d42f6b47faf71d6b2f3a5de34c0dc54af349291a

      SHA512

      89746a9cccdc62bfd43f1e011e8e085f57b458d647b3a16e6f486f57a93505b1988f9623626cdf912e846471496e510da44baad9825ef126a06dac87afba9f95

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku156372.exe

      Filesize

      352KB

      MD5

      9bcbd7894efef18a3fb8a42c8d833d38

      SHA1

      8375eaa679f021ddc04d7d81f2da32fe4d12d95a

      SHA256

      2a14a4ad61b7fa00e2cedb21d42f6b47faf71d6b2f3a5de34c0dc54af349291a

      SHA512

      89746a9cccdc62bfd43f1e011e8e085f57b458d647b3a16e6f486f57a93505b1988f9623626cdf912e846471496e510da44baad9825ef126a06dac87afba9f95

    • memory/1944-153-0x0000000004DC0000-0x0000000005364000-memory.dmp

      Filesize

      5.6MB

    • memory/1944-154-0x0000000002470000-0x00000000024BB000-memory.dmp

      Filesize

      300KB

    • memory/1944-155-0x0000000002760000-0x0000000002770000-memory.dmp

      Filesize

      64KB

    • memory/1944-156-0x0000000002760000-0x0000000002770000-memory.dmp

      Filesize

      64KB

    • memory/1944-157-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-160-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-158-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-162-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-166-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-164-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-168-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-170-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-172-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-174-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-176-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-178-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-182-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-184-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-180-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-186-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-188-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-190-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-192-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-194-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-196-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-198-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-200-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-202-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-204-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-206-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-208-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-210-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-212-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-214-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-216-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-218-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-220-0x00000000053B0000-0x00000000053EF000-memory.dmp

      Filesize

      252KB

    • memory/1944-1063-0x0000000005410000-0x0000000005A28000-memory.dmp

      Filesize

      6.1MB

    • memory/1944-1064-0x0000000005AB0000-0x0000000005BBA000-memory.dmp

      Filesize

      1.0MB

    • memory/1944-1065-0x0000000005BF0000-0x0000000005C02000-memory.dmp

      Filesize

      72KB

    • memory/1944-1066-0x0000000002760000-0x0000000002770000-memory.dmp

      Filesize

      64KB

    • memory/1944-1067-0x0000000005D10000-0x0000000005D4C000-memory.dmp

      Filesize

      240KB

    • memory/1944-1069-0x0000000005F00000-0x0000000005F92000-memory.dmp

      Filesize

      584KB

    • memory/1944-1070-0x0000000005FA0000-0x0000000006006000-memory.dmp

      Filesize

      408KB

    • memory/1944-1071-0x0000000002760000-0x0000000002770000-memory.dmp

      Filesize

      64KB

    • memory/1944-1072-0x0000000002760000-0x0000000002770000-memory.dmp

      Filesize

      64KB

    • memory/1944-1073-0x0000000002760000-0x0000000002770000-memory.dmp

      Filesize

      64KB

    • memory/1944-1074-0x00000000068E0000-0x0000000006956000-memory.dmp

      Filesize

      472KB

    • memory/1944-1075-0x0000000006970000-0x00000000069C0000-memory.dmp

      Filesize

      320KB

    • memory/1944-1076-0x00000000069F0000-0x0000000006BB2000-memory.dmp

      Filesize

      1.8MB

    • memory/1944-1077-0x0000000006DC0000-0x00000000072EC000-memory.dmp

      Filesize

      5.2MB

    • memory/1944-1078-0x0000000002760000-0x0000000002770000-memory.dmp

      Filesize

      64KB

    • memory/2072-147-0x0000000000010000-0x000000000001A000-memory.dmp

      Filesize

      40KB

    • memory/4168-1084-0x0000000000E60000-0x0000000000E92000-memory.dmp

      Filesize

      200KB

    • memory/4168-1085-0x0000000005A90000-0x0000000005AA0000-memory.dmp

      Filesize

      64KB