Analysis

  • max time kernel
    62s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/04/2023, 06:44

General

  • Target

    7d36d06b0e4bda913d8181628cf9e8c6642fd59705010a2af2a047971715093b.exe

  • Size

    530KB

  • MD5

    b83545dbf659017b4b90a8c55320b912

  • SHA1

    ee31c72d28c58cc78472448d84cbb2db806e7cce

  • SHA256

    7d36d06b0e4bda913d8181628cf9e8c6642fd59705010a2af2a047971715093b

  • SHA512

    6fa96ef741de79fa92cca80dfec2366f86bc87f944a1d2332b7b87a86f25235749b04cfc77aaa807f141d8ea366194675378c67d95bd684e8f9c200b5cf3f560

  • SSDEEP

    12288:DMrSy906Vn8ApR3bCh/4VEwu0me+6ucjW+ogi:py/8Ap9bCN4V9vmDcGgi

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d36d06b0e4bda913d8181628cf9e8c6642fd59705010a2af2a047971715093b.exe
    "C:\Users\Admin\AppData\Local\Temp\7d36d06b0e4bda913d8181628cf9e8c6642fd59705010a2af2a047971715093b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWW0803.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWW0803.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4500
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr324877.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr324877.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1156
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku336969.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku336969.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3696
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3696 -s 1344
          4⤵
          • Program crash
          PID:908
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr391795.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr391795.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2108
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3696 -ip 3696
    1⤵
      PID:4956

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr391795.exe

            Filesize

            176KB

            MD5

            f0a9978a1252d2528c4dfbc127d4df80

            SHA1

            d86d08c8063bbf39b91d3f5681333dc941ce99a3

            SHA256

            9992fad60e8da19984007355d54ab29b8244b5cc86bea8664672c13f7ff61be9

            SHA512

            20915c240818415aac9e5432edb7d2b6e4f17d6c58f73afb6c241cd9d94ec37aadb27154e066be74dded4aaae80f21fff39264944f29551077248f91f7d695ea

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr391795.exe

            Filesize

            176KB

            MD5

            f0a9978a1252d2528c4dfbc127d4df80

            SHA1

            d86d08c8063bbf39b91d3f5681333dc941ce99a3

            SHA256

            9992fad60e8da19984007355d54ab29b8244b5cc86bea8664672c13f7ff61be9

            SHA512

            20915c240818415aac9e5432edb7d2b6e4f17d6c58f73afb6c241cd9d94ec37aadb27154e066be74dded4aaae80f21fff39264944f29551077248f91f7d695ea

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWW0803.exe

            Filesize

            388KB

            MD5

            401696862f093fb0f480ad602f4276aa

            SHA1

            a5ec5b59a4e0ef7a67a64938108b721f851ccf21

            SHA256

            e7f51c3a27db9ccf1b5bf5698672276984aae83d8e5a4517341a66f11914ab12

            SHA512

            32358e28e25e974d3f6ed2c38d855a59c7b4083363d374514f63f7c81febb5ca58b77bf3601659e70f6258137661d388ecc39a4e373dde9d62a8562432d61d65

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWW0803.exe

            Filesize

            388KB

            MD5

            401696862f093fb0f480ad602f4276aa

            SHA1

            a5ec5b59a4e0ef7a67a64938108b721f851ccf21

            SHA256

            e7f51c3a27db9ccf1b5bf5698672276984aae83d8e5a4517341a66f11914ab12

            SHA512

            32358e28e25e974d3f6ed2c38d855a59c7b4083363d374514f63f7c81febb5ca58b77bf3601659e70f6258137661d388ecc39a4e373dde9d62a8562432d61d65

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr324877.exe

            Filesize

            12KB

            MD5

            0d363598d1ee18fe7dca64cdc424f46b

            SHA1

            5d08e58de9a46a2383f5ce4a52ff9de36fce4474

            SHA256

            449495b8d8b6a5cdb59b0ef8d4702319ad950766e7feab322f5dd1ec6c3565ab

            SHA512

            f263f7e67e7e19280d267db1754e16e314d4426681501bbe2ec752e034ab77f78cc6fab1afe99cb3dda9bd1893be6dc0c1310dd29aac9dfc64074e16d4b97d3e

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr324877.exe

            Filesize

            12KB

            MD5

            0d363598d1ee18fe7dca64cdc424f46b

            SHA1

            5d08e58de9a46a2383f5ce4a52ff9de36fce4474

            SHA256

            449495b8d8b6a5cdb59b0ef8d4702319ad950766e7feab322f5dd1ec6c3565ab

            SHA512

            f263f7e67e7e19280d267db1754e16e314d4426681501bbe2ec752e034ab77f78cc6fab1afe99cb3dda9bd1893be6dc0c1310dd29aac9dfc64074e16d4b97d3e

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku336969.exe

            Filesize

            434KB

            MD5

            7dffc90726dd825ec7bb34eab04c2c34

            SHA1

            f4a9d552adae470da7068e126ef978587c3f0c8b

            SHA256

            ec5f9ecf6c25a4b5722824e8b2b33b461433fcafd88b3cbf13bc771921d8005d

            SHA512

            c8956044708b66a1fadbd830adcbcde7a70ac5e8858d22e6456fd947c1eb793db8a51543ffa174d10b7f714d4a14f9a2379e64ccaf2f8c94702e3152fb9e3448

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku336969.exe

            Filesize

            434KB

            MD5

            7dffc90726dd825ec7bb34eab04c2c34

            SHA1

            f4a9d552adae470da7068e126ef978587c3f0c8b

            SHA256

            ec5f9ecf6c25a4b5722824e8b2b33b461433fcafd88b3cbf13bc771921d8005d

            SHA512

            c8956044708b66a1fadbd830adcbcde7a70ac5e8858d22e6456fd947c1eb793db8a51543ffa174d10b7f714d4a14f9a2379e64ccaf2f8c94702e3152fb9e3448

          • memory/1156-147-0x00000000004D0000-0x00000000004DA000-memory.dmp

            Filesize

            40KB

          • memory/2108-1086-0x0000000000B30000-0x0000000000B62000-memory.dmp

            Filesize

            200KB

          • memory/2108-1087-0x0000000005730000-0x0000000005740000-memory.dmp

            Filesize

            64KB

          • memory/3696-189-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-201-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-155-0x0000000005010000-0x0000000005020000-memory.dmp

            Filesize

            64KB

          • memory/3696-156-0x0000000005010000-0x0000000005020000-memory.dmp

            Filesize

            64KB

          • memory/3696-157-0x0000000005010000-0x0000000005020000-memory.dmp

            Filesize

            64KB

          • memory/3696-158-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-159-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-161-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-163-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-165-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-167-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-169-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-171-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-173-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-175-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-177-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-179-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-181-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-183-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-185-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-187-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-153-0x0000000005020000-0x00000000055C4000-memory.dmp

            Filesize

            5.6MB

          • memory/3696-191-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-193-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-195-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-197-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-199-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-154-0x00000000009D0000-0x0000000000A1B000-memory.dmp

            Filesize

            300KB

          • memory/3696-203-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-205-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-207-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-209-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-211-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-213-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-215-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-217-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-219-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-221-0x00000000028E0000-0x000000000291F000-memory.dmp

            Filesize

            252KB

          • memory/3696-1065-0x0000000005010000-0x0000000005020000-memory.dmp

            Filesize

            64KB

          • memory/3696-1066-0x0000000005010000-0x0000000005020000-memory.dmp

            Filesize

            64KB

          • memory/3696-1067-0x0000000005010000-0x0000000005020000-memory.dmp

            Filesize

            64KB

          • memory/3696-1068-0x00000000055D0000-0x0000000005BE8000-memory.dmp

            Filesize

            6.1MB

          • memory/3696-1069-0x0000000005C10000-0x0000000005D1A000-memory.dmp

            Filesize

            1.0MB

          • memory/3696-1070-0x0000000005D50000-0x0000000005D62000-memory.dmp

            Filesize

            72KB

          • memory/3696-1071-0x0000000005010000-0x0000000005020000-memory.dmp

            Filesize

            64KB

          • memory/3696-1072-0x0000000005D70000-0x0000000005DAC000-memory.dmp

            Filesize

            240KB

          • memory/3696-1073-0x0000000006060000-0x00000000060F2000-memory.dmp

            Filesize

            584KB

          • memory/3696-1074-0x0000000006100000-0x0000000006166000-memory.dmp

            Filesize

            408KB

          • memory/3696-1076-0x0000000006900000-0x0000000006976000-memory.dmp

            Filesize

            472KB

          • memory/3696-1077-0x0000000006990000-0x00000000069E0000-memory.dmp

            Filesize

            320KB

          • memory/3696-1078-0x0000000005010000-0x0000000005020000-memory.dmp

            Filesize

            64KB

          • memory/3696-1079-0x0000000006B50000-0x0000000006D12000-memory.dmp

            Filesize

            1.8MB

          • memory/3696-1080-0x0000000006D20000-0x000000000724C000-memory.dmp

            Filesize

            5.2MB