Analysis

  • max time kernel
    60s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-04-2023 08:42

General

  • Target

    1cb1cc3f8c1936729e447de3ad29377f078a21968ab587b49505a4e798ea7072.exe

  • Size

    530KB

  • MD5

    a92bb26553ce6dcff1d8e5995b42aa29

  • SHA1

    8d52e888fe0aea1af8237691c924622ae673d0fd

  • SHA256

    1cb1cc3f8c1936729e447de3ad29377f078a21968ab587b49505a4e798ea7072

  • SHA512

    18cb41fe1cec7e166c7ffa4ae015e980b3bf61b05860665bf62f63f31c1bbb4094113d43317ce67ca777b1956b292dadbf1e66ba2e6c6094dccce3d92e3b87f4

  • SSDEEP

    12288:iMrgy90qbGLEoX0916PTwn2KF0r0eVOo1SweE8eEGa:2y9GQF9Bn2q0oCOo13H8eDa

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1cb1cc3f8c1936729e447de3ad29377f078a21968ab587b49505a4e798ea7072.exe
    "C:\Users\Admin\AppData\Local\Temp\1cb1cc3f8c1936729e447de3ad29377f078a21968ab587b49505a4e798ea7072.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4456
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPG6497.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPG6497.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3588
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr304071.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr304071.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3380
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku345981.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku345981.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1140
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1140 -s 1348
          4⤵
          • Program crash
          PID:3540
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr932918.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr932918.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:996
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1140 -ip 1140
    1⤵
      PID:3684

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr932918.exe

      Filesize

      176KB

      MD5

      a3c08772a8fb96b9903aada0a81c1ff0

      SHA1

      4c2abbb9a2f43a710b1696749a52f3ff517a16c3

      SHA256

      65ba781f5151f9022b630d3820900e56f61f1ef3e70cbed6a2c2465fb63b51b7

      SHA512

      e076cdceb46e6bea4e55f225563d38051d05206b7b25c7aa0823812917c8f8ad5469d026948c6ca8e41ab98d27ad2bf3b4d91ed247533b9f4b4d0c3e55197948

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr932918.exe

      Filesize

      176KB

      MD5

      a3c08772a8fb96b9903aada0a81c1ff0

      SHA1

      4c2abbb9a2f43a710b1696749a52f3ff517a16c3

      SHA256

      65ba781f5151f9022b630d3820900e56f61f1ef3e70cbed6a2c2465fb63b51b7

      SHA512

      e076cdceb46e6bea4e55f225563d38051d05206b7b25c7aa0823812917c8f8ad5469d026948c6ca8e41ab98d27ad2bf3b4d91ed247533b9f4b4d0c3e55197948

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPG6497.exe

      Filesize

      387KB

      MD5

      3eb1999453e8cc84cc75118d5f7471e5

      SHA1

      3cb85b56145daae3449ec32228c84915bf47f3cd

      SHA256

      eae3361594f85cc75a50667cf47ccf4f8ac1fa297eca044510b919ea7c6ef1b2

      SHA512

      4333c284c17a23c07e6cff969826b4c4207984fc68dbc90055749315e3946aab6ea9a5d5ea0adf573e8486c83a8bca722f18bc3a77fdb3a8adbff25341949828

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPG6497.exe

      Filesize

      387KB

      MD5

      3eb1999453e8cc84cc75118d5f7471e5

      SHA1

      3cb85b56145daae3449ec32228c84915bf47f3cd

      SHA256

      eae3361594f85cc75a50667cf47ccf4f8ac1fa297eca044510b919ea7c6ef1b2

      SHA512

      4333c284c17a23c07e6cff969826b4c4207984fc68dbc90055749315e3946aab6ea9a5d5ea0adf573e8486c83a8bca722f18bc3a77fdb3a8adbff25341949828

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr304071.exe

      Filesize

      12KB

      MD5

      9552977fd866abcde1ab8c7c98e0bc14

      SHA1

      9d8a6f7d4aecc4ae3ed38c5edc8aafc1233a5909

      SHA256

      e488398bb11c2bc5e7fb5ba1bd40d0ec214ba32a0d1011c7f592729d72782b58

      SHA512

      3bbbc07d618cf514cab7bb751705a44c24fe4291d4da59d8084eed1ef194761679b7cb03ed0806c9c571f6b73a458de34a82f96073de27e2923209fbcdf8246a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr304071.exe

      Filesize

      12KB

      MD5

      9552977fd866abcde1ab8c7c98e0bc14

      SHA1

      9d8a6f7d4aecc4ae3ed38c5edc8aafc1233a5909

      SHA256

      e488398bb11c2bc5e7fb5ba1bd40d0ec214ba32a0d1011c7f592729d72782b58

      SHA512

      3bbbc07d618cf514cab7bb751705a44c24fe4291d4da59d8084eed1ef194761679b7cb03ed0806c9c571f6b73a458de34a82f96073de27e2923209fbcdf8246a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku345981.exe

      Filesize

      353KB

      MD5

      774deaa6216842a2644c9e21c9dca4cc

      SHA1

      39e8d0bfc545624fa4b361207edad0a2a55553e8

      SHA256

      14395b2192441d888ac19975689a20f9fbcf47f0bf9e3cb28e9a605682dc2a6c

      SHA512

      9f152413c3e4b227f7bc6395e2e94656525bd1d45a5e5e0ca5c9a87d54fe3132c7efaae1f75165d22c431289d0bd697e66e2fbfae5c3b1e6ec2876d2d05cf0b5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku345981.exe

      Filesize

      353KB

      MD5

      774deaa6216842a2644c9e21c9dca4cc

      SHA1

      39e8d0bfc545624fa4b361207edad0a2a55553e8

      SHA256

      14395b2192441d888ac19975689a20f9fbcf47f0bf9e3cb28e9a605682dc2a6c

      SHA512

      9f152413c3e4b227f7bc6395e2e94656525bd1d45a5e5e0ca5c9a87d54fe3132c7efaae1f75165d22c431289d0bd697e66e2fbfae5c3b1e6ec2876d2d05cf0b5

    • memory/996-1085-0x00000000003B0000-0x00000000003E2000-memory.dmp

      Filesize

      200KB

    • memory/996-1086-0x0000000004C20000-0x0000000004C30000-memory.dmp

      Filesize

      64KB

    • memory/1140-191-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-201-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-156-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-157-0x0000000002880000-0x0000000002890000-memory.dmp

      Filesize

      64KB

    • memory/1140-159-0x0000000002880000-0x0000000002890000-memory.dmp

      Filesize

      64KB

    • memory/1140-161-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-160-0x0000000002880000-0x0000000002890000-memory.dmp

      Filesize

      64KB

    • memory/1140-155-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-163-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-165-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-167-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-169-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-171-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-173-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-177-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-175-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-179-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-181-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-183-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-185-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-187-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-189-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-153-0x0000000004E40000-0x00000000053E4000-memory.dmp

      Filesize

      5.6MB

    • memory/1140-195-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-193-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-197-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-199-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-154-0x0000000002460000-0x00000000024AB000-memory.dmp

      Filesize

      300KB

    • memory/1140-203-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-205-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-207-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-209-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-211-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-213-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-215-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-217-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-219-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-221-0x0000000002890000-0x00000000028CF000-memory.dmp

      Filesize

      252KB

    • memory/1140-1064-0x0000000005410000-0x0000000005A28000-memory.dmp

      Filesize

      6.1MB

    • memory/1140-1065-0x0000000005AB0000-0x0000000005BBA000-memory.dmp

      Filesize

      1.0MB

    • memory/1140-1066-0x0000000005BF0000-0x0000000005C02000-memory.dmp

      Filesize

      72KB

    • memory/1140-1067-0x0000000002880000-0x0000000002890000-memory.dmp

      Filesize

      64KB

    • memory/1140-1068-0x0000000005C10000-0x0000000005C4C000-memory.dmp

      Filesize

      240KB

    • memory/1140-1070-0x0000000005F00000-0x0000000005F92000-memory.dmp

      Filesize

      584KB

    • memory/1140-1071-0x0000000005FA0000-0x0000000006006000-memory.dmp

      Filesize

      408KB

    • memory/1140-1072-0x0000000002880000-0x0000000002890000-memory.dmp

      Filesize

      64KB

    • memory/1140-1073-0x0000000002880000-0x0000000002890000-memory.dmp

      Filesize

      64KB

    • memory/1140-1074-0x0000000002880000-0x0000000002890000-memory.dmp

      Filesize

      64KB

    • memory/1140-1075-0x00000000066C0000-0x0000000006882000-memory.dmp

      Filesize

      1.8MB

    • memory/1140-1076-0x00000000068A0000-0x0000000006DCC000-memory.dmp

      Filesize

      5.2MB

    • memory/1140-1077-0x0000000002880000-0x0000000002890000-memory.dmp

      Filesize

      64KB

    • memory/1140-1078-0x0000000007160000-0x00000000071D6000-memory.dmp

      Filesize

      472KB

    • memory/1140-1079-0x00000000071E0000-0x0000000007230000-memory.dmp

      Filesize

      320KB

    • memory/3380-147-0x00000000003E0000-0x00000000003EA000-memory.dmp

      Filesize

      40KB