Analysis

  • max time kernel
    91s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/04/2023, 05:21

General

  • Target

    593282c0b61ad08d14d1a6b33e1083e9b05e970e8f4858d38ef3e50a42e83f33.exe

  • Size

    674KB

  • MD5

    558e822314c4f1f033c0f0b26bab014e

  • SHA1

    9fdb0180af6b46f5d702661f0a7f7fa9e49e67b2

  • SHA256

    593282c0b61ad08d14d1a6b33e1083e9b05e970e8f4858d38ef3e50a42e83f33

  • SHA512

    7ceea6ff11cac315ec64f9ef878913d4c3ac6f0769a12e92285330f6f4587356b9c66a2ccf0f07cb4fd0af885d0cf2632fbc4a7be331f21b71d7d64431f18b6b

  • SSDEEP

    12288:QMrGy90c1Vp3J6emgzFQJAiaA/4nDDD7ex1vuZuXe42x4pbmlaZjA:Gy/3k5gzWyE4a6X42OjA

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\593282c0b61ad08d14d1a6b33e1083e9b05e970e8f4858d38ef3e50a42e83f33.exe
    "C:\Users\Admin\AppData\Local\Temp\593282c0b61ad08d14d1a6b33e1083e9b05e970e8f4858d38ef3e50a42e83f33.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4944
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un904772.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un904772.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4680
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1238.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1238.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4504
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4504 -s 1080
          4⤵
          • Program crash
          PID:4952
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6363.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6363.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4040
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 1092
          4⤵
          • Program crash
          PID:4144
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si839680.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si839680.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1712
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4504 -ip 4504
    1⤵
      PID:864
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4040 -ip 4040
      1⤵
        PID:3364

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si839680.exe

        Filesize

        176KB

        MD5

        4d2a7a55cb45b0d5e8fba3141ad7ccce

        SHA1

        a140fbd253451efa0ef34c0832bd6bdef6fe61fa

        SHA256

        890819d8d09c6c163930a8fea3477263f75cae37e97650bab7551402bdb0e2a2

        SHA512

        0daf7f6e61c7c48bfb8bf5f0ef8f3aaebbad0d2656918cdc7a8c88a3f24b28d22fae8a8ff32b1d2b59b6a3d4e182986d44b040392a2138488464099cae01d72d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si839680.exe

        Filesize

        176KB

        MD5

        4d2a7a55cb45b0d5e8fba3141ad7ccce

        SHA1

        a140fbd253451efa0ef34c0832bd6bdef6fe61fa

        SHA256

        890819d8d09c6c163930a8fea3477263f75cae37e97650bab7551402bdb0e2a2

        SHA512

        0daf7f6e61c7c48bfb8bf5f0ef8f3aaebbad0d2656918cdc7a8c88a3f24b28d22fae8a8ff32b1d2b59b6a3d4e182986d44b040392a2138488464099cae01d72d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un904772.exe

        Filesize

        533KB

        MD5

        0dbc041b0561b414966283cfc4a5410f

        SHA1

        9c6ae099a5d6f4d17c997d5a398653af6d1e3136

        SHA256

        2fec590f230c1eb8a20395d952c2d0025210518e8ee96ac36aca5cc1bf48e39d

        SHA512

        882ae1fc7d3dede38e25a7cb2b86147567f0515004c2193b6285143d354671236e5147d79ff0a1158306845f64f1d5041965dc451d6d2ee8c1a562b48a0db9ee

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un904772.exe

        Filesize

        533KB

        MD5

        0dbc041b0561b414966283cfc4a5410f

        SHA1

        9c6ae099a5d6f4d17c997d5a398653af6d1e3136

        SHA256

        2fec590f230c1eb8a20395d952c2d0025210518e8ee96ac36aca5cc1bf48e39d

        SHA512

        882ae1fc7d3dede38e25a7cb2b86147567f0515004c2193b6285143d354671236e5147d79ff0a1158306845f64f1d5041965dc451d6d2ee8c1a562b48a0db9ee

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1238.exe

        Filesize

        376KB

        MD5

        8a78cf7903a4dc4152b1f0d5d78bced2

        SHA1

        87a17f9c9cad2283fabb01ca695adcc4f563d5a5

        SHA256

        7bad83485668b359d589dbfc8a19457cd03a969ddc40a20ecc08a4c0eef62a89

        SHA512

        c1f5c6117b706ea48e0a87fc34c11ff0e4d6f47468c83200e1c0fe1255971708d9795b91837b4a348a5c6972c8d1fd59f60acb73bbd2011d9c1957f3671ecac5

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1238.exe

        Filesize

        376KB

        MD5

        8a78cf7903a4dc4152b1f0d5d78bced2

        SHA1

        87a17f9c9cad2283fabb01ca695adcc4f563d5a5

        SHA256

        7bad83485668b359d589dbfc8a19457cd03a969ddc40a20ecc08a4c0eef62a89

        SHA512

        c1f5c6117b706ea48e0a87fc34c11ff0e4d6f47468c83200e1c0fe1255971708d9795b91837b4a348a5c6972c8d1fd59f60acb73bbd2011d9c1957f3671ecac5

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6363.exe

        Filesize

        435KB

        MD5

        c41aaeae7eda7e75176e14bc66ce5ee5

        SHA1

        c738b92fc2ba455de8c3064572811e0a834e3a82

        SHA256

        2723af96e45e90514bc243b45263ac2205b258f6393f1020de497a619f9c480f

        SHA512

        664130bbd28ec7b3c8d4371ac4d5b0ff6a1556ae21737d5644c0e1e1c33edefd5cf7487b919ea065ef4095abc3cbb4ede3a1cbf6ce8daff9d35fbf5b450c83c5

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6363.exe

        Filesize

        435KB

        MD5

        c41aaeae7eda7e75176e14bc66ce5ee5

        SHA1

        c738b92fc2ba455de8c3064572811e0a834e3a82

        SHA256

        2723af96e45e90514bc243b45263ac2205b258f6393f1020de497a619f9c480f

        SHA512

        664130bbd28ec7b3c8d4371ac4d5b0ff6a1556ae21737d5644c0e1e1c33edefd5cf7487b919ea065ef4095abc3cbb4ede3a1cbf6ce8daff9d35fbf5b450c83c5

      • memory/1712-1121-0x00000000052A0000-0x00000000052B0000-memory.dmp

        Filesize

        64KB

      • memory/1712-1120-0x0000000000A10000-0x0000000000A42000-memory.dmp

        Filesize

        200KB

      • memory/4040-1099-0x0000000007130000-0x0000000007748000-memory.dmp

        Filesize

        6.1MB

      • memory/4040-1101-0x0000000006B10000-0x0000000006B22000-memory.dmp

        Filesize

        72KB

      • memory/4040-1114-0x00000000087E0000-0x0000000008D0C000-memory.dmp

        Filesize

        5.2MB

      • memory/4040-1113-0x0000000008600000-0x00000000087C2000-memory.dmp

        Filesize

        1.8MB

      • memory/4040-1112-0x0000000006B70000-0x0000000006B80000-memory.dmp

        Filesize

        64KB

      • memory/4040-1111-0x0000000006B70000-0x0000000006B80000-memory.dmp

        Filesize

        64KB

      • memory/4040-1110-0x0000000006B70000-0x0000000006B80000-memory.dmp

        Filesize

        64KB

      • memory/4040-1109-0x0000000006B70000-0x0000000006B80000-memory.dmp

        Filesize

        64KB

      • memory/4040-1107-0x0000000008340000-0x0000000008390000-memory.dmp

        Filesize

        320KB

      • memory/4040-1106-0x00000000082B0000-0x0000000008326000-memory.dmp

        Filesize

        472KB

      • memory/4040-1105-0x00000000081C0000-0x0000000008252000-memory.dmp

        Filesize

        584KB

      • memory/4040-1104-0x0000000007B10000-0x0000000007B76000-memory.dmp

        Filesize

        408KB

      • memory/4040-1103-0x0000000006B70000-0x0000000006B80000-memory.dmp

        Filesize

        64KB

      • memory/4040-1102-0x0000000006B30000-0x0000000006B6C000-memory.dmp

        Filesize

        240KB

      • memory/4040-1100-0x0000000007750000-0x000000000785A000-memory.dmp

        Filesize

        1.0MB

      • memory/4040-226-0x0000000004310000-0x000000000434F000-memory.dmp

        Filesize

        252KB

      • memory/4040-224-0x0000000004310000-0x000000000434F000-memory.dmp

        Filesize

        252KB

      • memory/4040-222-0x0000000004310000-0x000000000434F000-memory.dmp

        Filesize

        252KB

      • memory/4040-220-0x0000000004310000-0x000000000434F000-memory.dmp

        Filesize

        252KB

      • memory/4040-190-0x0000000004310000-0x000000000434F000-memory.dmp

        Filesize

        252KB

      • memory/4040-189-0x0000000004310000-0x000000000434F000-memory.dmp

        Filesize

        252KB

      • memory/4040-192-0x0000000004310000-0x000000000434F000-memory.dmp

        Filesize

        252KB

      • memory/4040-194-0x0000000004310000-0x000000000434F000-memory.dmp

        Filesize

        252KB

      • memory/4040-196-0x0000000004310000-0x000000000434F000-memory.dmp

        Filesize

        252KB

      • memory/4040-199-0x0000000002570000-0x00000000025BB000-memory.dmp

        Filesize

        300KB

      • memory/4040-198-0x0000000004310000-0x000000000434F000-memory.dmp

        Filesize

        252KB

      • memory/4040-201-0x0000000006B70000-0x0000000006B80000-memory.dmp

        Filesize

        64KB

      • memory/4040-203-0x0000000006B70000-0x0000000006B80000-memory.dmp

        Filesize

        64KB

      • memory/4040-205-0x0000000006B70000-0x0000000006B80000-memory.dmp

        Filesize

        64KB

      • memory/4040-206-0x0000000004310000-0x000000000434F000-memory.dmp

        Filesize

        252KB

      • memory/4040-202-0x0000000004310000-0x000000000434F000-memory.dmp

        Filesize

        252KB

      • memory/4040-208-0x0000000004310000-0x000000000434F000-memory.dmp

        Filesize

        252KB

      • memory/4040-210-0x0000000004310000-0x000000000434F000-memory.dmp

        Filesize

        252KB

      • memory/4040-212-0x0000000004310000-0x000000000434F000-memory.dmp

        Filesize

        252KB

      • memory/4040-214-0x0000000004310000-0x000000000434F000-memory.dmp

        Filesize

        252KB

      • memory/4040-216-0x0000000004310000-0x000000000434F000-memory.dmp

        Filesize

        252KB

      • memory/4040-218-0x0000000004310000-0x000000000434F000-memory.dmp

        Filesize

        252KB

      • memory/4504-175-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/4504-179-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/4504-184-0x0000000000400000-0x00000000005A3000-memory.dmp

        Filesize

        1.6MB

      • memory/4504-182-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

        Filesize

        64KB

      • memory/4504-152-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/4504-181-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

        Filesize

        64KB

      • memory/4504-157-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/4504-171-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/4504-173-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/4504-177-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/4504-155-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/4504-153-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/4504-180-0x0000000000400000-0x00000000005A3000-memory.dmp

        Filesize

        1.6MB

      • memory/4504-167-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/4504-169-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/4504-165-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/4504-163-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/4504-161-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/4504-159-0x0000000002700000-0x0000000002712000-memory.dmp

        Filesize

        72KB

      • memory/4504-150-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

        Filesize

        64KB

      • memory/4504-151-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

        Filesize

        64KB

      • memory/4504-149-0x00000000020D0000-0x00000000020FD000-memory.dmp

        Filesize

        180KB

      • memory/4504-148-0x0000000004DD0000-0x0000000005374000-memory.dmp

        Filesize

        5.6MB