Analysis

  • max time kernel
    124s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-04-2023 13:07

General

  • Target

    cc2e2a0a1d31dfa7806ae7e6bf1f788c6e405afb7f5ca0b2894d6e26b13e8788.exe

  • Size

    667KB

  • MD5

    746b6bff0626e6a55beb7b30caba3987

  • SHA1

    ea0633c72cf82ffdbcc68ba4971c908390a6c58b

  • SHA256

    cc2e2a0a1d31dfa7806ae7e6bf1f788c6e405afb7f5ca0b2894d6e26b13e8788

  • SHA512

    bf5df3305e6722b2062d0fc738606461a799c69eb0ba1818d5c1fabe4ae6fb5f40431fcd03fd1add722feaea1d26cbf1e0fe8e7e1075caa16846c16bdd21e1de

  • SSDEEP

    12288:vMrJy90d+A3h6tlKG/7g587pNw373qHKWgrfcpL8LaDHFr:yyrAaKOE5yJBpLRDHl

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cc2e2a0a1d31dfa7806ae7e6bf1f788c6e405afb7f5ca0b2894d6e26b13e8788.exe
    "C:\Users\Admin\AppData\Local\Temp\cc2e2a0a1d31dfa7806ae7e6bf1f788c6e405afb7f5ca0b2894d6e26b13e8788.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1344
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un870253.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un870253.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4172
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7954.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7954.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3500
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3500 -s 1084
          4⤵
          • Program crash
          PID:996
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2436.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2436.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4772
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 1772
          4⤵
          • Program crash
          PID:4832
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si150693.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si150693.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4812
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 3500 -ip 3500
    1⤵
      PID:4048
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4772 -ip 4772
      1⤵
        PID:2700

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si150693.exe

        Filesize

        175KB

        MD5

        e98cdb826bead04850b2d60711154ab2

        SHA1

        f7527fb3ebf403cf4057f5c04571c7285fb35851

        SHA256

        0413cabbc99d55695d1850a6da81214b7ede02e066532ab0de386aa5d0403c47

        SHA512

        7b64f0018c723d42043a06bdd57d6c0e06367b256d2fc3643263233677674afc6ed74938791775218e94b243438ed9422032adc8eca2dc43294dd4467ad54aef

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si150693.exe

        Filesize

        175KB

        MD5

        e98cdb826bead04850b2d60711154ab2

        SHA1

        f7527fb3ebf403cf4057f5c04571c7285fb35851

        SHA256

        0413cabbc99d55695d1850a6da81214b7ede02e066532ab0de386aa5d0403c47

        SHA512

        7b64f0018c723d42043a06bdd57d6c0e06367b256d2fc3643263233677674afc6ed74938791775218e94b243438ed9422032adc8eca2dc43294dd4467ad54aef

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un870253.exe

        Filesize

        525KB

        MD5

        8353f704ffe66ffc9f6a1ce8419ce46a

        SHA1

        bace9997b2e63e7643cdd0f79c2101d04759a36a

        SHA256

        8dab71db761a0222ae09ac74eaeecb21fe7a3cc8ff6e35801f281cd5cad960e1

        SHA512

        f316ea844d0caa3a6c07eb846a37c873b68cb295fe886d21c244b8a4c2c9b1797121228e0d1761c92232ce2b469d5e614d6f3fb1f7eeb3dd6cb03bb95c8c8506

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un870253.exe

        Filesize

        525KB

        MD5

        8353f704ffe66ffc9f6a1ce8419ce46a

        SHA1

        bace9997b2e63e7643cdd0f79c2101d04759a36a

        SHA256

        8dab71db761a0222ae09ac74eaeecb21fe7a3cc8ff6e35801f281cd5cad960e1

        SHA512

        f316ea844d0caa3a6c07eb846a37c873b68cb295fe886d21c244b8a4c2c9b1797121228e0d1761c92232ce2b469d5e614d6f3fb1f7eeb3dd6cb03bb95c8c8506

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7954.exe

        Filesize

        295KB

        MD5

        a6421505ab6c0c2f813c5a8f879d1206

        SHA1

        2be1d89f658a14eb70000e81a306cb496c2cf783

        SHA256

        1bf8c1ba54b71bf5518ec0e2930bb27a70ffd61d05181d4fa2052ff9162b4cde

        SHA512

        a451cf430b34c70b659b157dd37c69e06e8294320f07948088d14056d69169786422d0ed4dbc3851d9b59f4375cc5b51f23bfb475f17f0aed36b1da6fb32a836

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7954.exe

        Filesize

        295KB

        MD5

        a6421505ab6c0c2f813c5a8f879d1206

        SHA1

        2be1d89f658a14eb70000e81a306cb496c2cf783

        SHA256

        1bf8c1ba54b71bf5518ec0e2930bb27a70ffd61d05181d4fa2052ff9162b4cde

        SHA512

        a451cf430b34c70b659b157dd37c69e06e8294320f07948088d14056d69169786422d0ed4dbc3851d9b59f4375cc5b51f23bfb475f17f0aed36b1da6fb32a836

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2436.exe

        Filesize

        353KB

        MD5

        20841dcc90c6e884f14945626628b6d8

        SHA1

        8052a9698f1c92a6f5ba7a7ecb99c99046499c80

        SHA256

        e332167fd9bc71cc47d931961b01123bcaf5df0f4f1d9e7e1d753913b9fdecff

        SHA512

        53d2ea93244e37e087f6671f0a6169adbe4f055b241bfd9739cc6974b2ab51d18396f1ca537a47eb64193aaff546b374a5da06df7f8797f1db899c9ac0d3d542

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2436.exe

        Filesize

        353KB

        MD5

        20841dcc90c6e884f14945626628b6d8

        SHA1

        8052a9698f1c92a6f5ba7a7ecb99c99046499c80

        SHA256

        e332167fd9bc71cc47d931961b01123bcaf5df0f4f1d9e7e1d753913b9fdecff

        SHA512

        53d2ea93244e37e087f6671f0a6169adbe4f055b241bfd9739cc6974b2ab51d18396f1ca537a47eb64193aaff546b374a5da06df7f8797f1db899c9ac0d3d542

      • memory/3500-148-0x0000000004F60000-0x0000000005504000-memory.dmp

        Filesize

        5.6MB

      • memory/3500-149-0x0000000002400000-0x000000000242D000-memory.dmp

        Filesize

        180KB

      • memory/3500-150-0x0000000004F50000-0x0000000004F60000-memory.dmp

        Filesize

        64KB

      • memory/3500-151-0x0000000004F50000-0x0000000004F60000-memory.dmp

        Filesize

        64KB

      • memory/3500-152-0x0000000004F50000-0x0000000004F60000-memory.dmp

        Filesize

        64KB

      • memory/3500-153-0x0000000002900000-0x0000000002912000-memory.dmp

        Filesize

        72KB

      • memory/3500-154-0x0000000002900000-0x0000000002912000-memory.dmp

        Filesize

        72KB

      • memory/3500-156-0x0000000002900000-0x0000000002912000-memory.dmp

        Filesize

        72KB

      • memory/3500-158-0x0000000002900000-0x0000000002912000-memory.dmp

        Filesize

        72KB

      • memory/3500-166-0x0000000002900000-0x0000000002912000-memory.dmp

        Filesize

        72KB

      • memory/3500-164-0x0000000002900000-0x0000000002912000-memory.dmp

        Filesize

        72KB

      • memory/3500-162-0x0000000002900000-0x0000000002912000-memory.dmp

        Filesize

        72KB

      • memory/3500-160-0x0000000002900000-0x0000000002912000-memory.dmp

        Filesize

        72KB

      • memory/3500-168-0x0000000002900000-0x0000000002912000-memory.dmp

        Filesize

        72KB

      • memory/3500-170-0x0000000002900000-0x0000000002912000-memory.dmp

        Filesize

        72KB

      • memory/3500-172-0x0000000002900000-0x0000000002912000-memory.dmp

        Filesize

        72KB

      • memory/3500-174-0x0000000002900000-0x0000000002912000-memory.dmp

        Filesize

        72KB

      • memory/3500-176-0x0000000002900000-0x0000000002912000-memory.dmp

        Filesize

        72KB

      • memory/3500-178-0x0000000002900000-0x0000000002912000-memory.dmp

        Filesize

        72KB

      • memory/3500-180-0x0000000002900000-0x0000000002912000-memory.dmp

        Filesize

        72KB

      • memory/3500-181-0x0000000000400000-0x00000000007FE000-memory.dmp

        Filesize

        4.0MB

      • memory/3500-182-0x0000000004F50000-0x0000000004F60000-memory.dmp

        Filesize

        64KB

      • memory/3500-183-0x0000000004F50000-0x0000000004F60000-memory.dmp

        Filesize

        64KB

      • memory/3500-184-0x0000000004F50000-0x0000000004F60000-memory.dmp

        Filesize

        64KB

      • memory/3500-186-0x0000000000400000-0x00000000007FE000-memory.dmp

        Filesize

        4.0MB

      • memory/4772-192-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4772-191-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4772-194-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4772-196-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4772-198-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4772-200-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4772-202-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4772-204-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4772-206-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4772-208-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4772-210-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4772-212-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4772-214-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4772-216-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4772-218-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4772-220-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4772-222-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4772-224-0x0000000002980000-0x00000000029BF000-memory.dmp

        Filesize

        252KB

      • memory/4772-338-0x0000000002480000-0x00000000024CB000-memory.dmp

        Filesize

        300KB

      • memory/4772-339-0x00000000027D0000-0x00000000027E0000-memory.dmp

        Filesize

        64KB

      • memory/4772-341-0x00000000027D0000-0x00000000027E0000-memory.dmp

        Filesize

        64KB

      • memory/4772-343-0x00000000027D0000-0x00000000027E0000-memory.dmp

        Filesize

        64KB

      • memory/4772-1101-0x0000000005550000-0x0000000005B68000-memory.dmp

        Filesize

        6.1MB

      • memory/4772-1102-0x0000000005BF0000-0x0000000005CFA000-memory.dmp

        Filesize

        1.0MB

      • memory/4772-1103-0x0000000005D30000-0x0000000005D42000-memory.dmp

        Filesize

        72KB

      • memory/4772-1104-0x0000000005D50000-0x0000000005D8C000-memory.dmp

        Filesize

        240KB

      • memory/4772-1105-0x00000000027D0000-0x00000000027E0000-memory.dmp

        Filesize

        64KB

      • memory/4772-1107-0x00000000027D0000-0x00000000027E0000-memory.dmp

        Filesize

        64KB

      • memory/4772-1108-0x00000000027D0000-0x00000000027E0000-memory.dmp

        Filesize

        64KB

      • memory/4772-1109-0x00000000027D0000-0x00000000027E0000-memory.dmp

        Filesize

        64KB

      • memory/4772-1110-0x00000000027D0000-0x00000000027E0000-memory.dmp

        Filesize

        64KB

      • memory/4772-1112-0x0000000006040000-0x00000000060D2000-memory.dmp

        Filesize

        584KB

      • memory/4772-1113-0x00000000060E0000-0x0000000006146000-memory.dmp

        Filesize

        408KB

      • memory/4772-1114-0x0000000006B90000-0x0000000006D52000-memory.dmp

        Filesize

        1.8MB

      • memory/4772-1115-0x0000000006D60000-0x000000000728C000-memory.dmp

        Filesize

        5.2MB

      • memory/4772-1116-0x00000000073B0000-0x0000000007426000-memory.dmp

        Filesize

        472KB

      • memory/4772-1117-0x0000000007450000-0x00000000074A0000-memory.dmp

        Filesize

        320KB

      • memory/4812-1123-0x0000000000A60000-0x0000000000A92000-memory.dmp

        Filesize

        200KB

      • memory/4812-1124-0x00000000052D0000-0x00000000052E0000-memory.dmp

        Filesize

        64KB

      • memory/4812-1125-0x00000000052D0000-0x00000000052E0000-memory.dmp

        Filesize

        64KB