Analysis

  • max time kernel
    135s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-04-2023 10:07

General

  • Target

    17be8e36667a6b5163bcf45fb6a5289ee669add910feb8a180a26063815c3ecf.exe

  • Size

    660KB

  • MD5

    47b51987632907f91e2b3ef9452e2963

  • SHA1

    beea885438091ed2e68ef08577b7c9039f462c9d

  • SHA256

    17be8e36667a6b5163bcf45fb6a5289ee669add910feb8a180a26063815c3ecf

  • SHA512

    a54e9c1053ff0a4bdb89b4b132a1bde9805002c61446e7fa5248b164a998f73c212b56fdbc03e925bf7c82b277f9347acb441ab201b060f3b0007e6df2d4ab2a

  • SSDEEP

    12288:VMrIy90LqLSKYLFb2Z9qVGY2LI2Ry3/zlWFOlRXaYVbifhVFS:xylnAVGY/vzlWFzY1iJV0

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17be8e36667a6b5163bcf45fb6a5289ee669add910feb8a180a26063815c3ecf.exe
    "C:\Users\Admin\AppData\Local\Temp\17be8e36667a6b5163bcf45fb6a5289ee669add910feb8a180a26063815c3ecf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3724
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un394472.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un394472.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:848
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9696.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9696.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1368
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 1080
          4⤵
          • Program crash
          PID:1928
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0394.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0394.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2184
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 1748
          4⤵
          • Program crash
          PID:5096
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si781735.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si781735.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5012
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1368 -ip 1368
    1⤵
      PID:4004
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 568 -p 2184 -ip 2184
      1⤵
        PID:4700
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:4868

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si781735.exe

        Filesize

        177KB

        MD5

        3179bfabc592a9822429d6e7513140b8

        SHA1

        4228ca0c77edd7ea4fe8d5b7edda3d5395c26ff4

        SHA256

        19d3ff22fb19c5e1c424546733c6ee2ac788750ea58647a2f9d6778e7208f6ae

        SHA512

        a76790637d425741056ae24542d0143323c0a6cbe3c8dbcb064a5cf501085af50382a406b2a7995492a4339e89e46abacbc7fe4c554d0a4d56803f18ef54c372

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si781735.exe

        Filesize

        177KB

        MD5

        3179bfabc592a9822429d6e7513140b8

        SHA1

        4228ca0c77edd7ea4fe8d5b7edda3d5395c26ff4

        SHA256

        19d3ff22fb19c5e1c424546733c6ee2ac788750ea58647a2f9d6778e7208f6ae

        SHA512

        a76790637d425741056ae24542d0143323c0a6cbe3c8dbcb064a5cf501085af50382a406b2a7995492a4339e89e46abacbc7fe4c554d0a4d56803f18ef54c372

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un394472.exe

        Filesize

        518KB

        MD5

        418b147e9c8276d8453e7676cf86e357

        SHA1

        eafd922f7c168e308fd5cc9a1660c90a5ac8d785

        SHA256

        6de7049d1d3cfe849c3760cf83cd1ddf06fa547af0a7fe72ab4327205998f4cc

        SHA512

        7f2cb80a03862e7b0246132cd50aa178c2d3499d7addabd7b8360fa9b5d5554adef5e48b48a6363380665fd10b87aca9ea05906e05b42ce0d7cb6d3d8e52b28e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un394472.exe

        Filesize

        518KB

        MD5

        418b147e9c8276d8453e7676cf86e357

        SHA1

        eafd922f7c168e308fd5cc9a1660c90a5ac8d785

        SHA256

        6de7049d1d3cfe849c3760cf83cd1ddf06fa547af0a7fe72ab4327205998f4cc

        SHA512

        7f2cb80a03862e7b0246132cd50aa178c2d3499d7addabd7b8360fa9b5d5554adef5e48b48a6363380665fd10b87aca9ea05906e05b42ce0d7cb6d3d8e52b28e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9696.exe

        Filesize

        295KB

        MD5

        33a31138026298df824dc80565688958

        SHA1

        9e607a46eaf08fb1c7679fff66984e1976172427

        SHA256

        f8cac3ad6c0e5ba8de183ffd7dba30bc8b1eab25f46c35127ecf4900752e6639

        SHA512

        369b2c9108536b6f036df6d3d7dbb6fdc4918122b4da81057af44140533e545dcf171a7f160352818c60660dec70eeb1797c4218eb4d356e8674f394514c04d0

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9696.exe

        Filesize

        295KB

        MD5

        33a31138026298df824dc80565688958

        SHA1

        9e607a46eaf08fb1c7679fff66984e1976172427

        SHA256

        f8cac3ad6c0e5ba8de183ffd7dba30bc8b1eab25f46c35127ecf4900752e6639

        SHA512

        369b2c9108536b6f036df6d3d7dbb6fdc4918122b4da81057af44140533e545dcf171a7f160352818c60660dec70eeb1797c4218eb4d356e8674f394514c04d0

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0394.exe

        Filesize

        353KB

        MD5

        213005c91dca76114ed203ef17367915

        SHA1

        751e51d845b34abb3ff8dabb65b4d8d9116a15f6

        SHA256

        bfb35db7dbdd77dd5d7e5ea3179398b5ac9a1f0b5b39a6f9f8c36affc5a95763

        SHA512

        dc7f4759de2ec559ff6a1467437bcdfdd7b00efd350d75c92920899fb039898a8360f4308f1e31496bc0e12bbee0368f435829125325bdf6bb9f388b65f874e6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0394.exe

        Filesize

        353KB

        MD5

        213005c91dca76114ed203ef17367915

        SHA1

        751e51d845b34abb3ff8dabb65b4d8d9116a15f6

        SHA256

        bfb35db7dbdd77dd5d7e5ea3179398b5ac9a1f0b5b39a6f9f8c36affc5a95763

        SHA512

        dc7f4759de2ec559ff6a1467437bcdfdd7b00efd350d75c92920899fb039898a8360f4308f1e31496bc0e12bbee0368f435829125325bdf6bb9f388b65f874e6

      • memory/1368-148-0x0000000000880000-0x00000000008AD000-memory.dmp

        Filesize

        180KB

      • memory/1368-149-0x0000000004FC0000-0x0000000004FD0000-memory.dmp

        Filesize

        64KB

      • memory/1368-150-0x0000000004FD0000-0x0000000005574000-memory.dmp

        Filesize

        5.6MB

      • memory/1368-152-0x0000000002900000-0x0000000002912000-memory.dmp

        Filesize

        72KB

      • memory/1368-151-0x0000000002900000-0x0000000002912000-memory.dmp

        Filesize

        72KB

      • memory/1368-154-0x0000000002900000-0x0000000002912000-memory.dmp

        Filesize

        72KB

      • memory/1368-156-0x0000000002900000-0x0000000002912000-memory.dmp

        Filesize

        72KB

      • memory/1368-158-0x0000000002900000-0x0000000002912000-memory.dmp

        Filesize

        72KB

      • memory/1368-160-0x0000000002900000-0x0000000002912000-memory.dmp

        Filesize

        72KB

      • memory/1368-164-0x0000000002900000-0x0000000002912000-memory.dmp

        Filesize

        72KB

      • memory/1368-162-0x0000000002900000-0x0000000002912000-memory.dmp

        Filesize

        72KB

      • memory/1368-166-0x0000000002900000-0x0000000002912000-memory.dmp

        Filesize

        72KB

      • memory/1368-168-0x0000000002900000-0x0000000002912000-memory.dmp

        Filesize

        72KB

      • memory/1368-170-0x0000000002900000-0x0000000002912000-memory.dmp

        Filesize

        72KB

      • memory/1368-172-0x0000000002900000-0x0000000002912000-memory.dmp

        Filesize

        72KB

      • memory/1368-174-0x0000000002900000-0x0000000002912000-memory.dmp

        Filesize

        72KB

      • memory/1368-176-0x0000000002900000-0x0000000002912000-memory.dmp

        Filesize

        72KB

      • memory/1368-178-0x0000000002900000-0x0000000002912000-memory.dmp

        Filesize

        72KB

      • memory/1368-179-0x0000000004FC0000-0x0000000004FD0000-memory.dmp

        Filesize

        64KB

      • memory/1368-180-0x0000000004FC0000-0x0000000004FD0000-memory.dmp

        Filesize

        64KB

      • memory/1368-181-0x0000000000400000-0x00000000007FE000-memory.dmp

        Filesize

        4.0MB

      • memory/1368-182-0x0000000004FC0000-0x0000000004FD0000-memory.dmp

        Filesize

        64KB

      • memory/1368-184-0x0000000004FC0000-0x0000000004FD0000-memory.dmp

        Filesize

        64KB

      • memory/1368-185-0x0000000004FC0000-0x0000000004FD0000-memory.dmp

        Filesize

        64KB

      • memory/1368-186-0x0000000000400000-0x00000000007FE000-memory.dmp

        Filesize

        4.0MB

      • memory/2184-192-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/2184-191-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/2184-194-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/2184-196-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/2184-198-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/2184-200-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/2184-202-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/2184-204-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/2184-207-0x0000000002460000-0x00000000024AB000-memory.dmp

        Filesize

        300KB

      • memory/2184-209-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/2184-210-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/2184-206-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/2184-211-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/2184-213-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/2184-214-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/2184-216-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/2184-218-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/2184-220-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/2184-222-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/2184-224-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/2184-226-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/2184-228-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/2184-1101-0x0000000005550000-0x0000000005B68000-memory.dmp

        Filesize

        6.1MB

      • memory/2184-1102-0x0000000005BF0000-0x0000000005CFA000-memory.dmp

        Filesize

        1.0MB

      • memory/2184-1103-0x0000000005D30000-0x0000000005D42000-memory.dmp

        Filesize

        72KB

      • memory/2184-1104-0x0000000005D50000-0x0000000005D8C000-memory.dmp

        Filesize

        240KB

      • memory/2184-1105-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/2184-1106-0x0000000006040000-0x00000000060A6000-memory.dmp

        Filesize

        408KB

      • memory/2184-1107-0x0000000006700000-0x0000000006792000-memory.dmp

        Filesize

        584KB

      • memory/2184-1109-0x0000000006C40000-0x0000000006E02000-memory.dmp

        Filesize

        1.8MB

      • memory/2184-1110-0x0000000006E20000-0x000000000734C000-memory.dmp

        Filesize

        5.2MB

      • memory/2184-1112-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/2184-1111-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/2184-1113-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/2184-1114-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/2184-1115-0x00000000075C0000-0x0000000007636000-memory.dmp

        Filesize

        472KB

      • memory/2184-1116-0x0000000007650000-0x00000000076A0000-memory.dmp

        Filesize

        320KB

      • memory/5012-1122-0x0000000000010000-0x0000000000042000-memory.dmp

        Filesize

        200KB

      • memory/5012-1123-0x0000000004A70000-0x0000000004A80000-memory.dmp

        Filesize

        64KB