Analysis

  • max time kernel
    66s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/04/2023, 11:37

General

  • Target

    2eb11189852830973b3f16242f300c9a477c8a2a40c2ef5e852d0be7b3873e35.exe

  • Size

    667KB

  • MD5

    401998a2b7d0cae3b61cc78cc1fc0424

  • SHA1

    75c264bf8c07f86659b9a13f56c5a5749859efe5

  • SHA256

    2eb11189852830973b3f16242f300c9a477c8a2a40c2ef5e852d0be7b3873e35

  • SHA512

    5575153406526701ceecf9be5678a8485a7511462e30bc2490355987072e5b539b6d4b05cf957aa47f44e4602dd6957ae976e85949498e5493bec89c7a184210

  • SSDEEP

    12288:hMrpy90zisCIB8leCsMLUv9HD+gOZUN037Mq9vZmAGtlqYmLFMipc73JRz1UWRa2:EyAzCI2lpBcCZtvAlD7z73LGX2

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2eb11189852830973b3f16242f300c9a477c8a2a40c2ef5e852d0be7b3873e35.exe
    "C:\Users\Admin\AppData\Local\Temp\2eb11189852830973b3f16242f300c9a477c8a2a40c2ef5e852d0be7b3873e35.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3888
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un328142.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un328142.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1148
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8906.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8906.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1564
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 1080
          4⤵
          • Program crash
          PID:4304
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2795.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2795.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2244
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2244 -s 1364
          4⤵
          • Program crash
          PID:4660
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si196935.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si196935.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5000
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1564 -ip 1564
    1⤵
      PID:3028
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 2244 -ip 2244
      1⤵
        PID:3288

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si196935.exe

        Filesize

        177KB

        MD5

        a5fa004c5e421a70c7cfcba374b13925

        SHA1

        5c3452859b123932f6f683871c1c3fe60d2e8457

        SHA256

        a67ffbaaed909b450a3bc9b4f344d2997e3ef3f05da6f49af81818444876fe46

        SHA512

        aa1bd6e5fc20577d0782448b90a32a26d4665f00a938504a2762de6e756a0eba240d2ddf97816ca95e9f323bfd45626b8001fd5a01a54a522a481f206d8544a2

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si196935.exe

        Filesize

        177KB

        MD5

        a5fa004c5e421a70c7cfcba374b13925

        SHA1

        5c3452859b123932f6f683871c1c3fe60d2e8457

        SHA256

        a67ffbaaed909b450a3bc9b4f344d2997e3ef3f05da6f49af81818444876fe46

        SHA512

        aa1bd6e5fc20577d0782448b90a32a26d4665f00a938504a2762de6e756a0eba240d2ddf97816ca95e9f323bfd45626b8001fd5a01a54a522a481f206d8544a2

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un328142.exe

        Filesize

        525KB

        MD5

        eced55ce71d16ba35cc64e58eff7f716

        SHA1

        3208ea58c597c6f423e6539f99be916e912fb7f7

        SHA256

        1a2731b45f531f23891a2d4c87506160051fb512903f04c39e26b24861653531

        SHA512

        069973a4c6f33db733b7a84d1682e10b1e25a93d0da16fa5b61535b630b57220d93bf942813eb23e6a50d119d762eb74cc85651b30e37a11d3785170e3d35326

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un328142.exe

        Filesize

        525KB

        MD5

        eced55ce71d16ba35cc64e58eff7f716

        SHA1

        3208ea58c597c6f423e6539f99be916e912fb7f7

        SHA256

        1a2731b45f531f23891a2d4c87506160051fb512903f04c39e26b24861653531

        SHA512

        069973a4c6f33db733b7a84d1682e10b1e25a93d0da16fa5b61535b630b57220d93bf942813eb23e6a50d119d762eb74cc85651b30e37a11d3785170e3d35326

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8906.exe

        Filesize

        295KB

        MD5

        52872329d755b627ef27ab9c31efd7b6

        SHA1

        fe3de8b8efb1768595d0784a2dfcf49317041fbb

        SHA256

        aefb7cdb5e937caf241cd27d7c4f9bea0202f77f4d2a332a60b970be99e23ecb

        SHA512

        9fb935ee737d607fa0e5861348973d0886c882e0d4c925c02f7d1186867fbd097c9f2141eae2805fb7b976af418ed91cedad704fd53bfef8a5b2f91ef3d4b4a6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8906.exe

        Filesize

        295KB

        MD5

        52872329d755b627ef27ab9c31efd7b6

        SHA1

        fe3de8b8efb1768595d0784a2dfcf49317041fbb

        SHA256

        aefb7cdb5e937caf241cd27d7c4f9bea0202f77f4d2a332a60b970be99e23ecb

        SHA512

        9fb935ee737d607fa0e5861348973d0886c882e0d4c925c02f7d1186867fbd097c9f2141eae2805fb7b976af418ed91cedad704fd53bfef8a5b2f91ef3d4b4a6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2795.exe

        Filesize

        353KB

        MD5

        e9c512a30f112e19958ce5198f0d1d5e

        SHA1

        905e1d955eebec22d913f38b49022b684b270883

        SHA256

        f09c656d3de521e2d3af3a5ebef006782199847a6b19635e80bcb1127eee7126

        SHA512

        a5ff9f79e651725e99d3c83a0543bba210b5592333fab3302bbc36468856c15705b1640af359aa08225c75a8a2b58b70804b835a18e05ec29783f2816ed54681

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2795.exe

        Filesize

        353KB

        MD5

        e9c512a30f112e19958ce5198f0d1d5e

        SHA1

        905e1d955eebec22d913f38b49022b684b270883

        SHA256

        f09c656d3de521e2d3af3a5ebef006782199847a6b19635e80bcb1127eee7126

        SHA512

        a5ff9f79e651725e99d3c83a0543bba210b5592333fab3302bbc36468856c15705b1640af359aa08225c75a8a2b58b70804b835a18e05ec29783f2816ed54681

      • memory/1564-148-0x0000000004EE0000-0x0000000005484000-memory.dmp

        Filesize

        5.6MB

      • memory/1564-149-0x00000000008C0000-0x00000000008ED000-memory.dmp

        Filesize

        180KB

      • memory/1564-150-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/1564-152-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/1564-151-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/1564-153-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/1564-154-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/1564-156-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/1564-158-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/1564-160-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/1564-162-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/1564-164-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/1564-166-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/1564-168-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/1564-170-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/1564-172-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/1564-174-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/1564-176-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/1564-178-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/1564-180-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/1564-181-0x0000000000400000-0x00000000007FE000-memory.dmp

        Filesize

        4.0MB

      • memory/1564-182-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/1564-183-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/1564-184-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/1564-186-0x0000000000400000-0x00000000007FE000-memory.dmp

        Filesize

        4.0MB

      • memory/2244-191-0x00000000053C0000-0x00000000053FF000-memory.dmp

        Filesize

        252KB

      • memory/2244-192-0x00000000053C0000-0x00000000053FF000-memory.dmp

        Filesize

        252KB

      • memory/2244-194-0x00000000053C0000-0x00000000053FF000-memory.dmp

        Filesize

        252KB

      • memory/2244-196-0x00000000053C0000-0x00000000053FF000-memory.dmp

        Filesize

        252KB

      • memory/2244-198-0x00000000053C0000-0x00000000053FF000-memory.dmp

        Filesize

        252KB

      • memory/2244-200-0x00000000053C0000-0x00000000053FF000-memory.dmp

        Filesize

        252KB

      • memory/2244-202-0x00000000053C0000-0x00000000053FF000-memory.dmp

        Filesize

        252KB

      • memory/2244-204-0x00000000053C0000-0x00000000053FF000-memory.dmp

        Filesize

        252KB

      • memory/2244-206-0x00000000053C0000-0x00000000053FF000-memory.dmp

        Filesize

        252KB

      • memory/2244-208-0x00000000053C0000-0x00000000053FF000-memory.dmp

        Filesize

        252KB

      • memory/2244-210-0x00000000053C0000-0x00000000053FF000-memory.dmp

        Filesize

        252KB

      • memory/2244-212-0x00000000053C0000-0x00000000053FF000-memory.dmp

        Filesize

        252KB

      • memory/2244-214-0x00000000053C0000-0x00000000053FF000-memory.dmp

        Filesize

        252KB

      • memory/2244-216-0x00000000053C0000-0x00000000053FF000-memory.dmp

        Filesize

        252KB

      • memory/2244-218-0x00000000053C0000-0x00000000053FF000-memory.dmp

        Filesize

        252KB

      • memory/2244-220-0x00000000053C0000-0x00000000053FF000-memory.dmp

        Filesize

        252KB

      • memory/2244-222-0x00000000053C0000-0x00000000053FF000-memory.dmp

        Filesize

        252KB

      • memory/2244-224-0x00000000053C0000-0x00000000053FF000-memory.dmp

        Filesize

        252KB

      • memory/2244-282-0x0000000000960000-0x00000000009AB000-memory.dmp

        Filesize

        300KB

      • memory/2244-283-0x0000000002510000-0x0000000002520000-memory.dmp

        Filesize

        64KB

      • memory/2244-286-0x0000000002510000-0x0000000002520000-memory.dmp

        Filesize

        64KB

      • memory/2244-1100-0x0000000005550000-0x0000000005B68000-memory.dmp

        Filesize

        6.1MB

      • memory/2244-1101-0x0000000005BF0000-0x0000000005CFA000-memory.dmp

        Filesize

        1.0MB

      • memory/2244-1102-0x0000000005D30000-0x0000000005D42000-memory.dmp

        Filesize

        72KB

      • memory/2244-1103-0x0000000005D50000-0x0000000005D8C000-memory.dmp

        Filesize

        240KB

      • memory/2244-1104-0x0000000002510000-0x0000000002520000-memory.dmp

        Filesize

        64KB

      • memory/2244-1105-0x0000000006040000-0x00000000060D2000-memory.dmp

        Filesize

        584KB

      • memory/2244-1106-0x00000000060E0000-0x0000000006146000-memory.dmp

        Filesize

        408KB

      • memory/2244-1108-0x00000000067E0000-0x0000000006856000-memory.dmp

        Filesize

        472KB

      • memory/2244-1109-0x0000000006870000-0x00000000068C0000-memory.dmp

        Filesize

        320KB

      • memory/2244-1111-0x0000000002510000-0x0000000002520000-memory.dmp

        Filesize

        64KB

      • memory/2244-1110-0x0000000002510000-0x0000000002520000-memory.dmp

        Filesize

        64KB

      • memory/2244-1112-0x0000000002510000-0x0000000002520000-memory.dmp

        Filesize

        64KB

      • memory/2244-1113-0x0000000002510000-0x0000000002520000-memory.dmp

        Filesize

        64KB

      • memory/2244-1114-0x0000000007E20000-0x0000000007FE2000-memory.dmp

        Filesize

        1.8MB

      • memory/2244-1115-0x0000000007FF0000-0x000000000851C000-memory.dmp

        Filesize

        5.2MB

      • memory/5000-1121-0x0000000000090000-0x00000000000C2000-memory.dmp

        Filesize

        200KB

      • memory/5000-1122-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

        Filesize

        64KB

      • memory/5000-1123-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

        Filesize

        64KB