Analysis

  • max time kernel
    90s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-04-2023 08:17

General

  • Target

    fccd582c44ab331ecb2051eb1b2d113ab4ffb00388d1ff7e2ed07af1d4ff4925.exe

  • Size

    660KB

  • MD5

    1ba6a1b0915311c4e862f47ab7f2a71b

  • SHA1

    bb00f8b88f45a95987a1c1353318dbcda77db1b8

  • SHA256

    fccd582c44ab331ecb2051eb1b2d113ab4ffb00388d1ff7e2ed07af1d4ff4925

  • SHA512

    3e03c4a027e3cd53bddf923a5d6914b9d2fe63fbec250df3b0c349b490d2783e71d47fe886281258b343205d8451bd24c9117aff93ca511dbfdae68585beb0dc

  • SSDEEP

    12288:zMr0y904glusmcqhVv4lI7bFwlR610V0ifpoY+YfV2KQ:TywlEr7bFz02ieY+YdQ

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fccd582c44ab331ecb2051eb1b2d113ab4ffb00388d1ff7e2ed07af1d4ff4925.exe
    "C:\Users\Admin\AppData\Local\Temp\fccd582c44ab331ecb2051eb1b2d113ab4ffb00388d1ff7e2ed07af1d4ff4925.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4908
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un116874.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un116874.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1720
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9050.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9050.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4568
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4568 -s 1084
          4⤵
          • Program crash
          PID:4768
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4212.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4212.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4480
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4480 -s 1348
          4⤵
          • Program crash
          PID:4484
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si078485.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si078485.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2820
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 4568 -ip 4568
    1⤵
      PID:424
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 4480 -ip 4480
      1⤵
        PID:2568

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si078485.exe

        Filesize

        176KB

        MD5

        38a34534234e9df1e7bc495765f8816b

        SHA1

        9cdc80a19b50320ad0403576935611376ce30c68

        SHA256

        f32d5d36978cca36d3d4659aac82a42fdf00e49d8dd6d637c3ea10c5a6a5ef97

        SHA512

        07c4303c3b9754ab165ecb3f122f5e2bfa0520d859a503a94779f31a1d19ccbac2a82e5873f8a227bedbd4c0facc58f9b2efea1d278ac408abf3c421a9f3b2a9

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si078485.exe

        Filesize

        176KB

        MD5

        38a34534234e9df1e7bc495765f8816b

        SHA1

        9cdc80a19b50320ad0403576935611376ce30c68

        SHA256

        f32d5d36978cca36d3d4659aac82a42fdf00e49d8dd6d637c3ea10c5a6a5ef97

        SHA512

        07c4303c3b9754ab165ecb3f122f5e2bfa0520d859a503a94779f31a1d19ccbac2a82e5873f8a227bedbd4c0facc58f9b2efea1d278ac408abf3c421a9f3b2a9

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un116874.exe

        Filesize

        518KB

        MD5

        0c04af9baf085725714c1896a13bd619

        SHA1

        d69787a0855b43e424d62a734ea3e940d9ae415b

        SHA256

        746caa3882f592ce6cf83a38978c6e9e57974dfc6a051c5c425e675e37596239

        SHA512

        17962c0e21dc0b0be0a3357b54bf6eb8ac0fe0e58020b1c086f240654550ed94fc7d01512505d86dd3ab72b2f9796c24fc03799773f21c48d9c472bb543d7a52

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un116874.exe

        Filesize

        518KB

        MD5

        0c04af9baf085725714c1896a13bd619

        SHA1

        d69787a0855b43e424d62a734ea3e940d9ae415b

        SHA256

        746caa3882f592ce6cf83a38978c6e9e57974dfc6a051c5c425e675e37596239

        SHA512

        17962c0e21dc0b0be0a3357b54bf6eb8ac0fe0e58020b1c086f240654550ed94fc7d01512505d86dd3ab72b2f9796c24fc03799773f21c48d9c472bb543d7a52

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9050.exe

        Filesize

        295KB

        MD5

        593766a6806e3ab449508ff81e9c445c

        SHA1

        30054605828359582ce41f3d96318d7162911fd6

        SHA256

        d02927fe9fa433415a8b564783390121be35f54854eada5a2bc3dafbe0d7abc4

        SHA512

        41a72b43646a32fb983236bd015f0ea107aa84fcda8cd6e2366a285671e12038effa1044cfdf060eacc54fbddc847950e440b83665fa55379fb5360de7bc57f2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9050.exe

        Filesize

        295KB

        MD5

        593766a6806e3ab449508ff81e9c445c

        SHA1

        30054605828359582ce41f3d96318d7162911fd6

        SHA256

        d02927fe9fa433415a8b564783390121be35f54854eada5a2bc3dafbe0d7abc4

        SHA512

        41a72b43646a32fb983236bd015f0ea107aa84fcda8cd6e2366a285671e12038effa1044cfdf060eacc54fbddc847950e440b83665fa55379fb5360de7bc57f2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4212.exe

        Filesize

        353KB

        MD5

        747ec2d54b6b9b84e4353790bcbfd693

        SHA1

        1612b03961a27ba790b4b006d8ffc0e83e5734c0

        SHA256

        017a80896e8047bf232a3fcb0aecb60f18a18b23583d488abb3500e57012da2c

        SHA512

        51d94bf584d6a21df95d3163e895c167a89336271cef4e118c79fffbda23b7341cd0f526260bb67cc7d87eed1bd079f8d9cc662567a4101711c4e9b5114a8798

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4212.exe

        Filesize

        353KB

        MD5

        747ec2d54b6b9b84e4353790bcbfd693

        SHA1

        1612b03961a27ba790b4b006d8ffc0e83e5734c0

        SHA256

        017a80896e8047bf232a3fcb0aecb60f18a18b23583d488abb3500e57012da2c

        SHA512

        51d94bf584d6a21df95d3163e895c167a89336271cef4e118c79fffbda23b7341cd0f526260bb67cc7d87eed1bd079f8d9cc662567a4101711c4e9b5114a8798

      • memory/2820-1122-0x0000000005160000-0x0000000005170000-memory.dmp

        Filesize

        64KB

      • memory/2820-1121-0x0000000000560000-0x0000000000592000-memory.dmp

        Filesize

        200KB

      • memory/4480-397-0x00000000050D0000-0x00000000050E0000-memory.dmp

        Filesize

        64KB

      • memory/4480-1104-0x0000000002B10000-0x0000000002B4C000-memory.dmp

        Filesize

        240KB

      • memory/4480-1115-0x00000000071D0000-0x0000000007220000-memory.dmp

        Filesize

        320KB

      • memory/4480-1114-0x0000000007150000-0x00000000071C6000-memory.dmp

        Filesize

        472KB

      • memory/4480-1113-0x00000000050D0000-0x00000000050E0000-memory.dmp

        Filesize

        64KB

      • memory/4480-1112-0x00000000050D0000-0x00000000050E0000-memory.dmp

        Filesize

        64KB

      • memory/4480-1111-0x00000000050D0000-0x00000000050E0000-memory.dmp

        Filesize

        64KB

      • memory/4480-1110-0x00000000050D0000-0x00000000050E0000-memory.dmp

        Filesize

        64KB

      • memory/4480-1109-0x00000000069D0000-0x0000000006EFC000-memory.dmp

        Filesize

        5.2MB

      • memory/4480-1108-0x0000000006800000-0x00000000069C2000-memory.dmp

        Filesize

        1.8MB

      • memory/4480-1106-0x00000000060E0000-0x0000000006146000-memory.dmp

        Filesize

        408KB

      • memory/4480-1105-0x0000000006040000-0x00000000060D2000-memory.dmp

        Filesize

        584KB

      • memory/4480-1103-0x00000000050D0000-0x00000000050E0000-memory.dmp

        Filesize

        64KB

      • memory/4480-1102-0x0000000002AF0000-0x0000000002B02000-memory.dmp

        Filesize

        72KB

      • memory/4480-1101-0x0000000005CB0000-0x0000000005DBA000-memory.dmp

        Filesize

        1.0MB

      • memory/4480-1100-0x0000000005690000-0x0000000005CA8000-memory.dmp

        Filesize

        6.1MB

      • memory/4480-395-0x00000000050D0000-0x00000000050E0000-memory.dmp

        Filesize

        64KB

      • memory/4480-393-0x00000000050D0000-0x00000000050E0000-memory.dmp

        Filesize

        64KB

      • memory/4480-392-0x0000000000AA0000-0x0000000000AEB000-memory.dmp

        Filesize

        300KB

      • memory/4480-223-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/4480-191-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/4480-193-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/4480-190-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/4480-195-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/4480-197-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/4480-199-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/4480-201-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/4480-203-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/4480-205-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/4480-207-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/4480-209-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/4480-211-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/4480-213-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/4480-215-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/4480-217-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/4480-219-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/4480-221-0x00000000028B0000-0x00000000028EF000-memory.dmp

        Filesize

        252KB

      • memory/4568-172-0x0000000002800000-0x0000000002812000-memory.dmp

        Filesize

        72KB

      • memory/4568-150-0x0000000002800000-0x0000000002812000-memory.dmp

        Filesize

        72KB

      • memory/4568-185-0x0000000000400000-0x00000000007FE000-memory.dmp

        Filesize

        4.0MB

      • memory/4568-183-0x0000000002820000-0x0000000002830000-memory.dmp

        Filesize

        64KB

      • memory/4568-153-0x0000000002800000-0x0000000002812000-memory.dmp

        Filesize

        72KB

      • memory/4568-182-0x0000000002820000-0x0000000002830000-memory.dmp

        Filesize

        64KB

      • memory/4568-181-0x0000000000400000-0x00000000007FE000-memory.dmp

        Filesize

        4.0MB

      • memory/4568-180-0x0000000002800000-0x0000000002812000-memory.dmp

        Filesize

        72KB

      • memory/4568-178-0x0000000002800000-0x0000000002812000-memory.dmp

        Filesize

        72KB

      • memory/4568-159-0x0000000002800000-0x0000000002812000-memory.dmp

        Filesize

        72KB

      • memory/4568-148-0x0000000000C10000-0x0000000000C3D000-memory.dmp

        Filesize

        180KB

      • memory/4568-160-0x0000000002820000-0x0000000002830000-memory.dmp

        Filesize

        64KB

      • memory/4568-164-0x0000000002800000-0x0000000002812000-memory.dmp

        Filesize

        72KB

      • memory/4568-170-0x0000000002800000-0x0000000002812000-memory.dmp

        Filesize

        72KB

      • memory/4568-158-0x0000000002820000-0x0000000002830000-memory.dmp

        Filesize

        64KB

      • memory/4568-168-0x0000000002800000-0x0000000002812000-memory.dmp

        Filesize

        72KB

      • memory/4568-166-0x0000000002800000-0x0000000002812000-memory.dmp

        Filesize

        72KB

      • memory/4568-162-0x0000000002800000-0x0000000002812000-memory.dmp

        Filesize

        72KB

      • memory/4568-155-0x0000000002800000-0x0000000002812000-memory.dmp

        Filesize

        72KB

      • memory/4568-156-0x0000000002820000-0x0000000002830000-memory.dmp

        Filesize

        64KB

      • memory/4568-151-0x0000000002800000-0x0000000002812000-memory.dmp

        Filesize

        72KB

      • memory/4568-174-0x0000000002800000-0x0000000002812000-memory.dmp

        Filesize

        72KB

      • memory/4568-149-0x0000000004EA0000-0x0000000005444000-memory.dmp

        Filesize

        5.6MB

      • memory/4568-176-0x0000000002800000-0x0000000002812000-memory.dmp

        Filesize

        72KB