Analysis

  • max time kernel
    84s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-04-2023 10:50

General

  • Target

    3ecc1274304fb26f291c35512c46c07f72a9f4c0ee80639cccb78793291c5271.exe

  • Size

    659KB

  • MD5

    bffe31ecf6e34ee9f50c76213ecf3a75

  • SHA1

    f0699ffedfc6bd0288bb02dcdd66f1c5dfbde43a

  • SHA256

    3ecc1274304fb26f291c35512c46c07f72a9f4c0ee80639cccb78793291c5271

  • SHA512

    346fb873752c290cc0ae1f8c610efba8327e5c01824193956f400c39ef01693e7ab2b4df87ab56a83e743ba3fa8de80af89ffeef02a6db5f8d29ab8ab2797c8f

  • SSDEEP

    12288:YMriy90mahAOEg9bjSCJty4eK66XaR5YFslR32PifvER:ay69fSzA7X0WFxPiK

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3ecc1274304fb26f291c35512c46c07f72a9f4c0ee80639cccb78793291c5271.exe
    "C:\Users\Admin\AppData\Local\Temp\3ecc1274304fb26f291c35512c46c07f72a9f4c0ee80639cccb78793291c5271.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4356
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un435970.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un435970.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2516
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0097.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0097.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1912
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1912 -s 1080
          4⤵
          • Program crash
          PID:3780
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6135.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6135.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1956
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 1328
          4⤵
          • Program crash
          PID:4648
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si122237.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si122237.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3216
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1912 -ip 1912
    1⤵
      PID:492
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 1956 -ip 1956
      1⤵
        PID:4420

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si122237.exe

        Filesize

        177KB

        MD5

        64c372f989043a4957033bfaecb71f4d

        SHA1

        59906cdd94f6903fd4967e546549a54999bd3d8d

        SHA256

        10b19ecb3e932d336a380e715e8a040974d72496dc294502e21a6d382289de88

        SHA512

        d017ad78748ff271bd51c2f809f1a4525b621a15a4ccaebd2f0952f37d8d39288589e390197c8f800170420c5e935e796d60be977b156844c51122040f3cfb7a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si122237.exe

        Filesize

        177KB

        MD5

        64c372f989043a4957033bfaecb71f4d

        SHA1

        59906cdd94f6903fd4967e546549a54999bd3d8d

        SHA256

        10b19ecb3e932d336a380e715e8a040974d72496dc294502e21a6d382289de88

        SHA512

        d017ad78748ff271bd51c2f809f1a4525b621a15a4ccaebd2f0952f37d8d39288589e390197c8f800170420c5e935e796d60be977b156844c51122040f3cfb7a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un435970.exe

        Filesize

        518KB

        MD5

        e0267888e669cc758e1ac41ba9644e24

        SHA1

        7c6abd631dc74e1fad9d2670a62e7540c616cf25

        SHA256

        427333ecfa422d53463dedf970ab251c442cfe47dd9673002afd411bbeb2c51c

        SHA512

        35e63fbb4295a7779a1b3c847a28c865e7c19e4d08d7f1311f24dbcc9a43877ee881dd6f2957344a1394078691d0d8d17cbc7ef3fbaec8455d25a8349c10c4da

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un435970.exe

        Filesize

        518KB

        MD5

        e0267888e669cc758e1ac41ba9644e24

        SHA1

        7c6abd631dc74e1fad9d2670a62e7540c616cf25

        SHA256

        427333ecfa422d53463dedf970ab251c442cfe47dd9673002afd411bbeb2c51c

        SHA512

        35e63fbb4295a7779a1b3c847a28c865e7c19e4d08d7f1311f24dbcc9a43877ee881dd6f2957344a1394078691d0d8d17cbc7ef3fbaec8455d25a8349c10c4da

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0097.exe

        Filesize

        295KB

        MD5

        ef1b609fac0f6d7cd5126b0f59d003f0

        SHA1

        7a14d3f17e0d194430aa9228ad9628e6296b777c

        SHA256

        56a50560d48fa87af84bab6929422f6a650678e7caefb249e317a0d4194d9785

        SHA512

        ff8038dfdcc020ff92c581f356bba327065d79e4e181aa9577b4297f7afb55200876064cee6befe42c130aabeff7d98caa96afe058903a1ed900839919e9e366

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0097.exe

        Filesize

        295KB

        MD5

        ef1b609fac0f6d7cd5126b0f59d003f0

        SHA1

        7a14d3f17e0d194430aa9228ad9628e6296b777c

        SHA256

        56a50560d48fa87af84bab6929422f6a650678e7caefb249e317a0d4194d9785

        SHA512

        ff8038dfdcc020ff92c581f356bba327065d79e4e181aa9577b4297f7afb55200876064cee6befe42c130aabeff7d98caa96afe058903a1ed900839919e9e366

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6135.exe

        Filesize

        353KB

        MD5

        7496d6c3d2fbf92578ee6aeda096db77

        SHA1

        a4d5cdaee7bdcf34844b34177a469fc7ca0f60ad

        SHA256

        7af7f7395229a8e5298dbdd49cfe5089b3f52b4deb387c6c28b7a53933307aa0

        SHA512

        d1bfc106d41b3d843c684869e0664ce10d46f41b7ccd74a250cd60086c15a3e15755ccac699371be3dea920f67388c7d7090b523609e0716ee29ff6ecef4d687

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6135.exe

        Filesize

        353KB

        MD5

        7496d6c3d2fbf92578ee6aeda096db77

        SHA1

        a4d5cdaee7bdcf34844b34177a469fc7ca0f60ad

        SHA256

        7af7f7395229a8e5298dbdd49cfe5089b3f52b4deb387c6c28b7a53933307aa0

        SHA512

        d1bfc106d41b3d843c684869e0664ce10d46f41b7ccd74a250cd60086c15a3e15755ccac699371be3dea920f67388c7d7090b523609e0716ee29ff6ecef4d687

      • memory/1912-151-0x0000000004FE0000-0x0000000005584000-memory.dmp

        Filesize

        5.6MB

      • memory/1912-152-0x00000000008D0000-0x00000000008FD000-memory.dmp

        Filesize

        180KB

      • memory/1912-153-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

        Filesize

        64KB

      • memory/1912-154-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

        Filesize

        64KB

      • memory/1912-155-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

        Filesize

        64KB

      • memory/1912-156-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/1912-157-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/1912-159-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/1912-161-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/1912-163-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/1912-165-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/1912-167-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/1912-169-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/1912-171-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/1912-173-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/1912-175-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/1912-177-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/1912-179-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/1912-181-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/1912-183-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/1912-184-0x0000000000400000-0x00000000007FE000-memory.dmp

        Filesize

        4.0MB

      • memory/1912-185-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

        Filesize

        64KB

      • memory/1912-186-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

        Filesize

        64KB

      • memory/1912-187-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

        Filesize

        64KB

      • memory/1912-189-0x0000000000400000-0x00000000007FE000-memory.dmp

        Filesize

        4.0MB

      • memory/1956-195-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/1956-194-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/1956-197-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/1956-199-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/1956-201-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/1956-203-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/1956-204-0x0000000000970000-0x00000000009BB000-memory.dmp

        Filesize

        300KB

      • memory/1956-206-0x0000000005110000-0x0000000005120000-memory.dmp

        Filesize

        64KB

      • memory/1956-209-0x0000000005110000-0x0000000005120000-memory.dmp

        Filesize

        64KB

      • memory/1956-208-0x0000000005110000-0x0000000005120000-memory.dmp

        Filesize

        64KB

      • memory/1956-207-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/1956-211-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/1956-213-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/1956-215-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/1956-217-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/1956-219-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/1956-221-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/1956-223-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/1956-225-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/1956-227-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/1956-229-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/1956-231-0x0000000002740000-0x000000000277F000-memory.dmp

        Filesize

        252KB

      • memory/1956-1104-0x00000000056D0000-0x0000000005CE8000-memory.dmp

        Filesize

        6.1MB

      • memory/1956-1105-0x0000000004FD0000-0x00000000050DA000-memory.dmp

        Filesize

        1.0MB

      • memory/1956-1106-0x0000000002BB0000-0x0000000002BC2000-memory.dmp

        Filesize

        72KB

      • memory/1956-1107-0x0000000005110000-0x0000000005120000-memory.dmp

        Filesize

        64KB

      • memory/1956-1108-0x0000000002BD0000-0x0000000002C0C000-memory.dmp

        Filesize

        240KB

      • memory/1956-1110-0x0000000005F00000-0x0000000005F66000-memory.dmp

        Filesize

        408KB

      • memory/1956-1111-0x00000000065C0000-0x0000000006652000-memory.dmp

        Filesize

        584KB

      • memory/1956-1112-0x00000000066B0000-0x0000000006726000-memory.dmp

        Filesize

        472KB

      • memory/1956-1113-0x0000000005110000-0x0000000005120000-memory.dmp

        Filesize

        64KB

      • memory/1956-1114-0x0000000005110000-0x0000000005120000-memory.dmp

        Filesize

        64KB

      • memory/1956-1116-0x0000000006730000-0x0000000006780000-memory.dmp

        Filesize

        320KB

      • memory/1956-1115-0x0000000005110000-0x0000000005120000-memory.dmp

        Filesize

        64KB

      • memory/1956-1117-0x00000000067A0000-0x0000000006962000-memory.dmp

        Filesize

        1.8MB

      • memory/1956-1118-0x0000000006970000-0x0000000006E9C000-memory.dmp

        Filesize

        5.2MB

      • memory/1956-1119-0x0000000005110000-0x0000000005120000-memory.dmp

        Filesize

        64KB

      • memory/3216-1125-0x00000000009F0000-0x0000000000A22000-memory.dmp

        Filesize

        200KB

      • memory/3216-1126-0x00000000055D0000-0x00000000055E0000-memory.dmp

        Filesize

        64KB