Analysis

  • max time kernel
    135s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/04/2023, 06:05

General

  • Target

    d1b47c276cb6c99b93f29b8faf346acbc597c78217744fc48a7d46168f4dcde7.exe

  • Size

    659KB

  • MD5

    268ec66481a58170e82b7e394204bee3

  • SHA1

    f54bc672aa79fa721593fe62e9c370481fa8c6c0

  • SHA256

    d1b47c276cb6c99b93f29b8faf346acbc597c78217744fc48a7d46168f4dcde7

  • SHA512

    81d4edf9ab91bee24a4f5f8bb7c3059d5fb9d7f4808d646121a68880c63bc4551c2638d9b763834429f838a204fa71ac469e294bf6a8214672aa5229dbe621f6

  • SSDEEP

    12288:CMrgy90Q3aLyggRCmafhXpE+0NcKEl6e9Q996GmmIA:GyduyXRJafhX+ZNcKFagD9

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1b47c276cb6c99b93f29b8faf346acbc597c78217744fc48a7d46168f4dcde7.exe
    "C:\Users\Admin\AppData\Local\Temp\d1b47c276cb6c99b93f29b8faf346acbc597c78217744fc48a7d46168f4dcde7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un279967.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un279967.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2336
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6440.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6440.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4932
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4932 -s 1100
          4⤵
          • Program crash
          PID:3928
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6797.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6797.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4992
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 1348
          4⤵
          • Program crash
          PID:1620
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si007923.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si007923.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5016
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4932 -ip 4932
    1⤵
      PID:1716
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4992 -ip 4992
      1⤵
        PID:1528

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si007923.exe

        Filesize

        176KB

        MD5

        72229c24c4118bf3c5e30acbd08e165a

        SHA1

        aa347e4493e2a6c7d1e48e73182eca5e47d22fac

        SHA256

        f8d20bbac51439befcf6d0850ad1d27bc14cda5180d69b42ca93421d845bbbe4

        SHA512

        c25a2541e4cc52f236d1956febf99f8f4d349a3fcc2968a01dfa53d0d641aff4aa56f9ae45f3a08be36a6169b6e7ca6636b8a9bc5028a1c7d2cccd168fb73649

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si007923.exe

        Filesize

        176KB

        MD5

        72229c24c4118bf3c5e30acbd08e165a

        SHA1

        aa347e4493e2a6c7d1e48e73182eca5e47d22fac

        SHA256

        f8d20bbac51439befcf6d0850ad1d27bc14cda5180d69b42ca93421d845bbbe4

        SHA512

        c25a2541e4cc52f236d1956febf99f8f4d349a3fcc2968a01dfa53d0d641aff4aa56f9ae45f3a08be36a6169b6e7ca6636b8a9bc5028a1c7d2cccd168fb73649

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un279967.exe

        Filesize

        517KB

        MD5

        b5eb2889739ca301d05112de8c61abbc

        SHA1

        1ec44c400f061eb75266e511dd2c5b30c99af362

        SHA256

        b3c2a2d474181cfb0c63e3aef472a8803fe01dae8000b9b254f291f12fa4123a

        SHA512

        c55aae275ac3281a0e36c8f30a653866b517d4ae5b0d8197ed4172bc33d219f79913f6293f3a7a0ae7cbc43c83598c8ebfb212c6b7a2710805250239ac42d68e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un279967.exe

        Filesize

        517KB

        MD5

        b5eb2889739ca301d05112de8c61abbc

        SHA1

        1ec44c400f061eb75266e511dd2c5b30c99af362

        SHA256

        b3c2a2d474181cfb0c63e3aef472a8803fe01dae8000b9b254f291f12fa4123a

        SHA512

        c55aae275ac3281a0e36c8f30a653866b517d4ae5b0d8197ed4172bc33d219f79913f6293f3a7a0ae7cbc43c83598c8ebfb212c6b7a2710805250239ac42d68e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6440.exe

        Filesize

        376KB

        MD5

        8b7f9e2075d93055265d5bf37e06280a

        SHA1

        2187b95f04c6d12e69e261302e94c94fd1384001

        SHA256

        13137e0b984bc7802abfe1c0489a37e13857f59a9cfa3372b6bb30b07723ecae

        SHA512

        381acccb8f8c1ee9c722691562f12a98f339b3736b25feb8ab6435bb5fd8bdf765fd16a7d2fa1b0d309a7321c18504803e7216ddbf99d955637819e286a2451d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6440.exe

        Filesize

        376KB

        MD5

        8b7f9e2075d93055265d5bf37e06280a

        SHA1

        2187b95f04c6d12e69e261302e94c94fd1384001

        SHA256

        13137e0b984bc7802abfe1c0489a37e13857f59a9cfa3372b6bb30b07723ecae

        SHA512

        381acccb8f8c1ee9c722691562f12a98f339b3736b25feb8ab6435bb5fd8bdf765fd16a7d2fa1b0d309a7321c18504803e7216ddbf99d955637819e286a2451d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6797.exe

        Filesize

        434KB

        MD5

        00cf3c19d026fd7b5973455b703cceb9

        SHA1

        b5ca2578a7f4cadba13715830175143804e812bb

        SHA256

        8119f94832e68f83cbf39cda1b3522ccdac2b1d4b2f5a6f5582a6061c1bd4062

        SHA512

        243e5d3d581d11aa9fbcaa8cc6c0b85849c27642af5aa30547f7b83246216568fa15708a565b0d9e6b41fdbc8fba687a7b32f4a9021c83a2f5f8c9345f2e56ea

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6797.exe

        Filesize

        434KB

        MD5

        00cf3c19d026fd7b5973455b703cceb9

        SHA1

        b5ca2578a7f4cadba13715830175143804e812bb

        SHA256

        8119f94832e68f83cbf39cda1b3522ccdac2b1d4b2f5a6f5582a6061c1bd4062

        SHA512

        243e5d3d581d11aa9fbcaa8cc6c0b85849c27642af5aa30547f7b83246216568fa15708a565b0d9e6b41fdbc8fba687a7b32f4a9021c83a2f5f8c9345f2e56ea

      • memory/4932-148-0x0000000004F70000-0x0000000005514000-memory.dmp

        Filesize

        5.6MB

      • memory/4932-149-0x0000000002880000-0x0000000002892000-memory.dmp

        Filesize

        72KB

      • memory/4932-150-0x0000000002880000-0x0000000002892000-memory.dmp

        Filesize

        72KB

      • memory/4932-152-0x0000000002880000-0x0000000002892000-memory.dmp

        Filesize

        72KB

      • memory/4932-154-0x0000000002880000-0x0000000002892000-memory.dmp

        Filesize

        72KB

      • memory/4932-156-0x0000000002880000-0x0000000002892000-memory.dmp

        Filesize

        72KB

      • memory/4932-159-0x0000000000970000-0x000000000099D000-memory.dmp

        Filesize

        180KB

      • memory/4932-161-0x0000000004F60000-0x0000000004F70000-memory.dmp

        Filesize

        64KB

      • memory/4932-158-0x0000000002880000-0x0000000002892000-memory.dmp

        Filesize

        72KB

      • memory/4932-163-0x0000000004F60000-0x0000000004F70000-memory.dmp

        Filesize

        64KB

      • memory/4932-162-0x0000000002880000-0x0000000002892000-memory.dmp

        Filesize

        72KB

      • memory/4932-166-0x0000000002880000-0x0000000002892000-memory.dmp

        Filesize

        72KB

      • memory/4932-165-0x0000000004F60000-0x0000000004F70000-memory.dmp

        Filesize

        64KB

      • memory/4932-168-0x0000000002880000-0x0000000002892000-memory.dmp

        Filesize

        72KB

      • memory/4932-170-0x0000000002880000-0x0000000002892000-memory.dmp

        Filesize

        72KB

      • memory/4932-172-0x0000000002880000-0x0000000002892000-memory.dmp

        Filesize

        72KB

      • memory/4932-174-0x0000000002880000-0x0000000002892000-memory.dmp

        Filesize

        72KB

      • memory/4932-176-0x0000000002880000-0x0000000002892000-memory.dmp

        Filesize

        72KB

      • memory/4932-178-0x0000000002880000-0x0000000002892000-memory.dmp

        Filesize

        72KB

      • memory/4932-180-0x0000000002880000-0x0000000002892000-memory.dmp

        Filesize

        72KB

      • memory/4932-181-0x0000000000400000-0x0000000000813000-memory.dmp

        Filesize

        4.1MB

      • memory/4932-182-0x0000000004F60000-0x0000000004F70000-memory.dmp

        Filesize

        64KB

      • memory/4932-183-0x0000000004F60000-0x0000000004F70000-memory.dmp

        Filesize

        64KB

      • memory/4932-184-0x0000000004F60000-0x0000000004F70000-memory.dmp

        Filesize

        64KB

      • memory/4932-186-0x0000000000400000-0x0000000000813000-memory.dmp

        Filesize

        4.1MB

      • memory/4992-191-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/4992-194-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/4992-192-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/4992-196-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/4992-198-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/4992-200-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/4992-202-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/4992-204-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/4992-206-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/4992-208-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/4992-210-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/4992-212-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/4992-214-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/4992-216-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/4992-218-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/4992-220-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/4992-222-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/4992-224-0x0000000002860000-0x000000000289F000-memory.dmp

        Filesize

        252KB

      • memory/4992-379-0x00000000009B0000-0x00000000009FB000-memory.dmp

        Filesize

        300KB

      • memory/4992-381-0x0000000004FF0000-0x0000000005000000-memory.dmp

        Filesize

        64KB

      • memory/4992-383-0x0000000004FF0000-0x0000000005000000-memory.dmp

        Filesize

        64KB

      • memory/4992-1100-0x00000000055B0000-0x0000000005BC8000-memory.dmp

        Filesize

        6.1MB

      • memory/4992-1101-0x0000000005BD0000-0x0000000005CDA000-memory.dmp

        Filesize

        1.0MB

      • memory/4992-1102-0x0000000004F20000-0x0000000004F32000-memory.dmp

        Filesize

        72KB

      • memory/4992-1103-0x0000000004F40000-0x0000000004F7C000-memory.dmp

        Filesize

        240KB

      • memory/4992-1104-0x0000000004FF0000-0x0000000005000000-memory.dmp

        Filesize

        64KB

      • memory/4992-1105-0x0000000005F20000-0x0000000005FB2000-memory.dmp

        Filesize

        584KB

      • memory/4992-1106-0x0000000005FC0000-0x0000000006026000-memory.dmp

        Filesize

        408KB

      • memory/4992-1107-0x00000000066F0000-0x00000000068B2000-memory.dmp

        Filesize

        1.8MB

      • memory/4992-1109-0x00000000068C0000-0x0000000006DEC000-memory.dmp

        Filesize

        5.2MB

      • memory/4992-1110-0x0000000006F00000-0x0000000006F76000-memory.dmp

        Filesize

        472KB

      • memory/4992-1111-0x0000000006FA0000-0x0000000006FF0000-memory.dmp

        Filesize

        320KB

      • memory/4992-1112-0x0000000004FF0000-0x0000000005000000-memory.dmp

        Filesize

        64KB

      • memory/4992-1113-0x0000000004FF0000-0x0000000005000000-memory.dmp

        Filesize

        64KB

      • memory/4992-1114-0x0000000004FF0000-0x0000000005000000-memory.dmp

        Filesize

        64KB

      • memory/4992-1115-0x0000000004FF0000-0x0000000005000000-memory.dmp

        Filesize

        64KB

      • memory/5016-1121-0x0000000000640000-0x0000000000672000-memory.dmp

        Filesize

        200KB

      • memory/5016-1122-0x0000000004F90000-0x0000000004FA0000-memory.dmp

        Filesize

        64KB