Analysis

  • max time kernel
    150s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/04/2023, 00:58

General

  • Target

    57d0a66d8a8c72bd80223313d242301c8aaa9157f6295223e925134d88e51584.exe

  • Size

    530KB

  • MD5

    328e6128c7d083a8b95308f694d5998f

  • SHA1

    a244298b52d2b06a2d6e6f252719483b924b1ce1

  • SHA256

    57d0a66d8a8c72bd80223313d242301c8aaa9157f6295223e925134d88e51584

  • SHA512

    5339a5665a9a544d7391ee0079344dd22d32bb40f4d3185bcc7408045b4c2619e54e497c9a9a65c1f5b1e89e5338502fa50768fa9b32ba278314deb328436041

  • SSDEEP

    12288:SMrgy90LnUAoRXYhyUcuf5KXa/oI402FuXbF:GynXY5AbJ0XXZ

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\57d0a66d8a8c72bd80223313d242301c8aaa9157f6295223e925134d88e51584.exe
    "C:\Users\Admin\AppData\Local\Temp\57d0a66d8a8c72bd80223313d242301c8aaa9157f6295223e925134d88e51584.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziyu3086.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziyu3086.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4024
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr110597.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr110597.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1264
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku416855.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku416855.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3976
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3976 -s 1464
          4⤵
          • Program crash
          PID:1968
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr861440.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr861440.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5084
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3976 -ip 3976
    1⤵
      PID:1068
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe start wuauserv
      1⤵
      • Launches sc.exe
      PID:436

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr861440.exe

            Filesize

            176KB

            MD5

            305eedee10e85c03011037fc39bbe922

            SHA1

            d195b166f2f661b24388fbfb30fbe06e8ef32006

            SHA256

            bfcd1315edfc05c06918ccf87a7153255cfe1c6b4e36ea033b47bd1de67965ac

            SHA512

            12d3828f68cea79a4d4d06076dc2e83a433f4d25fb46fcf48491ad36e65e61a5c300c6e0d5314460b1894a0d2f745f73e1ae926641276fee49557ee6e1a8c3fd

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr861440.exe

            Filesize

            176KB

            MD5

            305eedee10e85c03011037fc39bbe922

            SHA1

            d195b166f2f661b24388fbfb30fbe06e8ef32006

            SHA256

            bfcd1315edfc05c06918ccf87a7153255cfe1c6b4e36ea033b47bd1de67965ac

            SHA512

            12d3828f68cea79a4d4d06076dc2e83a433f4d25fb46fcf48491ad36e65e61a5c300c6e0d5314460b1894a0d2f745f73e1ae926641276fee49557ee6e1a8c3fd

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziyu3086.exe

            Filesize

            388KB

            MD5

            24b89777bbb6c4ccf79438943f7ea184

            SHA1

            c7dfd9f17ffa95fd423c19c38fc2b25bb4a3551a

            SHA256

            138016f91f1132652f4fa371c73534236f877618d5375bd66b260f76303bb6d4

            SHA512

            63dc0a7a6d9c6933dff5fbd533c2c5d186e542d0e24a0559d891f5bffd82b4b4f5c05a117f7b1448f81727712f8569f7f2e9cbda66c594b38b743c9b9c595b4f

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziyu3086.exe

            Filesize

            388KB

            MD5

            24b89777bbb6c4ccf79438943f7ea184

            SHA1

            c7dfd9f17ffa95fd423c19c38fc2b25bb4a3551a

            SHA256

            138016f91f1132652f4fa371c73534236f877618d5375bd66b260f76303bb6d4

            SHA512

            63dc0a7a6d9c6933dff5fbd533c2c5d186e542d0e24a0559d891f5bffd82b4b4f5c05a117f7b1448f81727712f8569f7f2e9cbda66c594b38b743c9b9c595b4f

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr110597.exe

            Filesize

            12KB

            MD5

            6011b3e4c57b5469011aa444617729be

            SHA1

            4e41e2865bcb32e7e89f03f48ed9b6866bdbc776

            SHA256

            ecce9ba68e667200976332686d037b7f2ca645a3a75cddd6fe884c21c472a610

            SHA512

            770c3b09ac466dfb528c8deb0977d41640dfb637de7bf8ebff183ea37853cb16b637702a731d36b3ca2a3373e7ecf73f036aa5fdf8bd1a55be7c5e2970fa30e4

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr110597.exe

            Filesize

            12KB

            MD5

            6011b3e4c57b5469011aa444617729be

            SHA1

            4e41e2865bcb32e7e89f03f48ed9b6866bdbc776

            SHA256

            ecce9ba68e667200976332686d037b7f2ca645a3a75cddd6fe884c21c472a610

            SHA512

            770c3b09ac466dfb528c8deb0977d41640dfb637de7bf8ebff183ea37853cb16b637702a731d36b3ca2a3373e7ecf73f036aa5fdf8bd1a55be7c5e2970fa30e4

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku416855.exe

            Filesize

            434KB

            MD5

            1b741d852590967d66bb4b8cadb66188

            SHA1

            d36f998208c6984bec0f8a48c2f52d7b69fa52af

            SHA256

            7d22529a340181e77d8c11fa0e6ae9f8dbd966b4eb12b738354cfe3e49be7607

            SHA512

            75d3778218884fe23ad96edcacbac2ba7c2881cd0a069c34791214e1915d357c8ec61b9887b42261fbf23027c199696ad388aaaf8eb3327cb400d61ef07decd2

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku416855.exe

            Filesize

            434KB

            MD5

            1b741d852590967d66bb4b8cadb66188

            SHA1

            d36f998208c6984bec0f8a48c2f52d7b69fa52af

            SHA256

            7d22529a340181e77d8c11fa0e6ae9f8dbd966b4eb12b738354cfe3e49be7607

            SHA512

            75d3778218884fe23ad96edcacbac2ba7c2881cd0a069c34791214e1915d357c8ec61b9887b42261fbf23027c199696ad388aaaf8eb3327cb400d61ef07decd2

          • memory/1264-147-0x0000000000210000-0x000000000021A000-memory.dmp

            Filesize

            40KB

          • memory/3976-153-0x0000000004D50000-0x00000000052F4000-memory.dmp

            Filesize

            5.6MB

          • memory/3976-155-0x0000000004D40000-0x0000000004D50000-memory.dmp

            Filesize

            64KB

          • memory/3976-154-0x0000000000720000-0x000000000076B000-memory.dmp

            Filesize

            300KB

          • memory/3976-156-0x0000000004D40000-0x0000000004D50000-memory.dmp

            Filesize

            64KB

          • memory/3976-157-0x0000000004D40000-0x0000000004D50000-memory.dmp

            Filesize

            64KB

          • memory/3976-158-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-161-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-159-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-163-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-165-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-167-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-169-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-171-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-173-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-177-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-175-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-179-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-181-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-183-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-185-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-187-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-189-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-191-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-193-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-195-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-197-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-199-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-201-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-203-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-205-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-207-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-209-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-211-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-213-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-215-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-217-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-219-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-221-0x0000000002710000-0x000000000274F000-memory.dmp

            Filesize

            252KB

          • memory/3976-1064-0x0000000005300000-0x0000000005918000-memory.dmp

            Filesize

            6.1MB

          • memory/3976-1065-0x0000000005920000-0x0000000005A2A000-memory.dmp

            Filesize

            1.0MB

          • memory/3976-1066-0x0000000004CB0000-0x0000000004CC2000-memory.dmp

            Filesize

            72KB

          • memory/3976-1067-0x0000000004CD0000-0x0000000004D0C000-memory.dmp

            Filesize

            240KB

          • memory/3976-1068-0x0000000004D40000-0x0000000004D50000-memory.dmp

            Filesize

            64KB

          • memory/3976-1070-0x0000000004D40000-0x0000000004D50000-memory.dmp

            Filesize

            64KB

          • memory/3976-1071-0x0000000004D40000-0x0000000004D50000-memory.dmp

            Filesize

            64KB

          • memory/3976-1072-0x0000000004D40000-0x0000000004D50000-memory.dmp

            Filesize

            64KB

          • memory/3976-1073-0x0000000005CB0000-0x0000000005D16000-memory.dmp

            Filesize

            408KB

          • memory/3976-1074-0x0000000006380000-0x0000000006412000-memory.dmp

            Filesize

            584KB

          • memory/3976-1075-0x0000000004D40000-0x0000000004D50000-memory.dmp

            Filesize

            64KB

          • memory/3976-1076-0x00000000066C0000-0x0000000006736000-memory.dmp

            Filesize

            472KB

          • memory/3976-1077-0x0000000006740000-0x0000000006790000-memory.dmp

            Filesize

            320KB

          • memory/3976-1078-0x00000000067A0000-0x0000000006962000-memory.dmp

            Filesize

            1.8MB

          • memory/3976-1079-0x0000000006980000-0x0000000006EAC000-memory.dmp

            Filesize

            5.2MB

          • memory/5084-1086-0x0000000000690000-0x00000000006C2000-memory.dmp

            Filesize

            200KB

          • memory/5084-1087-0x0000000005290000-0x00000000052A0000-memory.dmp

            Filesize

            64KB

          • memory/5084-1088-0x0000000005290000-0x00000000052A0000-memory.dmp

            Filesize

            64KB