Analysis

  • max time kernel
    92s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/04/2023, 14:30

General

  • Target

    a1dacf0c90bf46a1d3c7f00c841e49cf27f672dd5351e77cd0ddb24f315515d4.exe

  • Size

    667KB

  • MD5

    a5fa0f248837ecdae38267650942c3a7

  • SHA1

    110df14099313d48e3d130fb19fd669ca460037f

  • SHA256

    a1dacf0c90bf46a1d3c7f00c841e49cf27f672dd5351e77cd0ddb24f315515d4

  • SHA512

    7d674868c5f164f02caefc5deba029a396187601c9135f71c4d8251b51edfce5b239009b4eeb4dd20b0532526c8c36b0ed167a6f095315f55dc80feec919aa82

  • SSDEEP

    12288:MMrOy90LA7vVYQk75RELxJpHfwpw/q8HWQm1izH01qT3H:SyvpOPELxJdfywSiWn82I3

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a1dacf0c90bf46a1d3c7f00c841e49cf27f672dd5351e77cd0ddb24f315515d4.exe
    "C:\Users\Admin\AppData\Local\Temp\a1dacf0c90bf46a1d3c7f00c841e49cf27f672dd5351e77cd0ddb24f315515d4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4132
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un702074.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un702074.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1248
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1859.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1859.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:852
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 1084
          4⤵
          • Program crash
          PID:3832
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1145.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1145.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3972
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3972 -s 1140
          4⤵
          • Program crash
          PID:1000
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si605887.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si605887.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2932
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 852 -ip 852
    1⤵
      PID:3160
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3972 -ip 3972
      1⤵
        PID:1152

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si605887.exe

              Filesize

              175KB

              MD5

              8a26c9a847b78a00df32a639a9c45699

              SHA1

              a924b91157bb820c987aa1073689ad8b3b3db3d5

              SHA256

              50619a7fa79dbbd64152ee7a58a43fa3934746b1d62636f3930ee98446ae97fe

              SHA512

              15e3709b4028e5b6b49496b9d4ac86eaeb3c6fe962e0711c789f6c1192d7414a6e107ee90e71b5e92a76bb933de33ff2c1df714bc7cf7be178e5316892ae5ad4

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si605887.exe

              Filesize

              175KB

              MD5

              8a26c9a847b78a00df32a639a9c45699

              SHA1

              a924b91157bb820c987aa1073689ad8b3b3db3d5

              SHA256

              50619a7fa79dbbd64152ee7a58a43fa3934746b1d62636f3930ee98446ae97fe

              SHA512

              15e3709b4028e5b6b49496b9d4ac86eaeb3c6fe962e0711c789f6c1192d7414a6e107ee90e71b5e92a76bb933de33ff2c1df714bc7cf7be178e5316892ae5ad4

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un702074.exe

              Filesize

              525KB

              MD5

              edfac9ddd81b50a4c8f243c3092cc4ff

              SHA1

              f6a7519dd412a99e506f2a6623c44c428ed220ce

              SHA256

              c0f4b9009563c87255db63f935c319fb4dd3e3f20ba4123d09bbd343ac517764

              SHA512

              3696bf02669a2174086cb79ea332dca699b7482cece87eb77c3ee66556aaff51756a7f61484b7b4c2c5ac0196fdc5ebf994099eaaf702b9710a40614d40bfa3e

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un702074.exe

              Filesize

              525KB

              MD5

              edfac9ddd81b50a4c8f243c3092cc4ff

              SHA1

              f6a7519dd412a99e506f2a6623c44c428ed220ce

              SHA256

              c0f4b9009563c87255db63f935c319fb4dd3e3f20ba4123d09bbd343ac517764

              SHA512

              3696bf02669a2174086cb79ea332dca699b7482cece87eb77c3ee66556aaff51756a7f61484b7b4c2c5ac0196fdc5ebf994099eaaf702b9710a40614d40bfa3e

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1859.exe

              Filesize

              295KB

              MD5

              550fea48f76c5fb463d50c7966bcd0d0

              SHA1

              3607ea25490f69635ecadf9a0b9706efd68aaa1c

              SHA256

              ac6c85025df648cb91c270cb595036476d46af78294a082bf73e4a93c4de922e

              SHA512

              9844bc91c1e56111a2c79b750c8dd636d0128dfc6615cc2804daf6d7a27b79a966d0bedd5234bb35c038dd380e09c51d8764d6fdec82457ba200202d80c6bb5a

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1859.exe

              Filesize

              295KB

              MD5

              550fea48f76c5fb463d50c7966bcd0d0

              SHA1

              3607ea25490f69635ecadf9a0b9706efd68aaa1c

              SHA256

              ac6c85025df648cb91c270cb595036476d46af78294a082bf73e4a93c4de922e

              SHA512

              9844bc91c1e56111a2c79b750c8dd636d0128dfc6615cc2804daf6d7a27b79a966d0bedd5234bb35c038dd380e09c51d8764d6fdec82457ba200202d80c6bb5a

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1145.exe

              Filesize

              353KB

              MD5

              f4f9c9c2b2cd9f7308a827fb33d28a56

              SHA1

              f4c0ce80998113e3e65ee39cb7559ba065e00974

              SHA256

              f0060df9d635260c04bc7c9283452616e38b3655083e812275475e66f9f0663a

              SHA512

              1ba4b812365f8f42fe54d82e201a4914975eafade9342e337229c855df2e9808dd016c09652984a9b162c1f19aa72c742c7292a0675a76da4f4427a8a632069e

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1145.exe

              Filesize

              353KB

              MD5

              f4f9c9c2b2cd9f7308a827fb33d28a56

              SHA1

              f4c0ce80998113e3e65ee39cb7559ba065e00974

              SHA256

              f0060df9d635260c04bc7c9283452616e38b3655083e812275475e66f9f0663a

              SHA512

              1ba4b812365f8f42fe54d82e201a4914975eafade9342e337229c855df2e9808dd016c09652984a9b162c1f19aa72c742c7292a0675a76da4f4427a8a632069e

            • memory/852-148-0x00000000008C0000-0x00000000008ED000-memory.dmp

              Filesize

              180KB

            • memory/852-149-0x0000000004E90000-0x0000000004EA0000-memory.dmp

              Filesize

              64KB

            • memory/852-150-0x0000000004E90000-0x0000000004EA0000-memory.dmp

              Filesize

              64KB

            • memory/852-151-0x0000000004E90000-0x0000000004EA0000-memory.dmp

              Filesize

              64KB

            • memory/852-152-0x0000000004EA0000-0x0000000005444000-memory.dmp

              Filesize

              5.6MB

            • memory/852-153-0x0000000002910000-0x0000000002922000-memory.dmp

              Filesize

              72KB

            • memory/852-154-0x0000000002910000-0x0000000002922000-memory.dmp

              Filesize

              72KB

            • memory/852-156-0x0000000002910000-0x0000000002922000-memory.dmp

              Filesize

              72KB

            • memory/852-158-0x0000000002910000-0x0000000002922000-memory.dmp

              Filesize

              72KB

            • memory/852-160-0x0000000002910000-0x0000000002922000-memory.dmp

              Filesize

              72KB

            • memory/852-162-0x0000000002910000-0x0000000002922000-memory.dmp

              Filesize

              72KB

            • memory/852-164-0x0000000002910000-0x0000000002922000-memory.dmp

              Filesize

              72KB

            • memory/852-166-0x0000000002910000-0x0000000002922000-memory.dmp

              Filesize

              72KB

            • memory/852-168-0x0000000002910000-0x0000000002922000-memory.dmp

              Filesize

              72KB

            • memory/852-170-0x0000000002910000-0x0000000002922000-memory.dmp

              Filesize

              72KB

            • memory/852-172-0x0000000002910000-0x0000000002922000-memory.dmp

              Filesize

              72KB

            • memory/852-174-0x0000000002910000-0x0000000002922000-memory.dmp

              Filesize

              72KB

            • memory/852-176-0x0000000002910000-0x0000000002922000-memory.dmp

              Filesize

              72KB

            • memory/852-178-0x0000000002910000-0x0000000002922000-memory.dmp

              Filesize

              72KB

            • memory/852-180-0x0000000002910000-0x0000000002922000-memory.dmp

              Filesize

              72KB

            • memory/852-181-0x0000000000400000-0x00000000007FE000-memory.dmp

              Filesize

              4.0MB

            • memory/852-182-0x0000000004E90000-0x0000000004EA0000-memory.dmp

              Filesize

              64KB

            • memory/852-184-0x0000000000400000-0x00000000007FE000-memory.dmp

              Filesize

              4.0MB

            • memory/2932-1120-0x0000000000CE0000-0x0000000000D12000-memory.dmp

              Filesize

              200KB

            • memory/2932-1122-0x00000000055F0000-0x0000000005600000-memory.dmp

              Filesize

              64KB

            • memory/2932-1121-0x00000000055F0000-0x0000000005600000-memory.dmp

              Filesize

              64KB

            • memory/3972-192-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

              Filesize

              252KB

            • memory/3972-226-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

              Filesize

              252KB

            • memory/3972-196-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

              Filesize

              252KB

            • memory/3972-193-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

              Filesize

              64KB

            • memory/3972-191-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

              Filesize

              64KB

            • memory/3972-198-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

              Filesize

              252KB

            • memory/3972-200-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

              Filesize

              252KB

            • memory/3972-202-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

              Filesize

              252KB

            • memory/3972-204-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

              Filesize

              252KB

            • memory/3972-206-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

              Filesize

              252KB

            • memory/3972-208-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

              Filesize

              252KB

            • memory/3972-210-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

              Filesize

              252KB

            • memory/3972-212-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

              Filesize

              252KB

            • memory/3972-214-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

              Filesize

              252KB

            • memory/3972-216-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

              Filesize

              252KB

            • memory/3972-218-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

              Filesize

              252KB

            • memory/3972-220-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

              Filesize

              252KB

            • memory/3972-222-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

              Filesize

              252KB

            • memory/3972-224-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

              Filesize

              252KB

            • memory/3972-194-0x0000000004DE0000-0x0000000004E1F000-memory.dmp

              Filesize

              252KB

            • memory/3972-1099-0x0000000005590000-0x0000000005BA8000-memory.dmp

              Filesize

              6.1MB

            • memory/3972-1100-0x0000000005BF0000-0x0000000005CFA000-memory.dmp

              Filesize

              1.0MB

            • memory/3972-1101-0x0000000005D30000-0x0000000005D42000-memory.dmp

              Filesize

              72KB

            • memory/3972-1102-0x0000000005D50000-0x0000000005D8C000-memory.dmp

              Filesize

              240KB

            • memory/3972-1103-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

              Filesize

              64KB

            • memory/3972-1105-0x0000000006040000-0x00000000060A6000-memory.dmp

              Filesize

              408KB

            • memory/3972-1106-0x0000000006700000-0x0000000006792000-memory.dmp

              Filesize

              584KB

            • memory/3972-1107-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

              Filesize

              64KB

            • memory/3972-1108-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

              Filesize

              64KB

            • memory/3972-1109-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

              Filesize

              64KB

            • memory/3972-1110-0x0000000006800000-0x00000000069C2000-memory.dmp

              Filesize

              1.8MB

            • memory/3972-1111-0x00000000069D0000-0x0000000006EFC000-memory.dmp

              Filesize

              5.2MB

            • memory/3972-190-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

              Filesize

              64KB

            • memory/3972-189-0x0000000002330000-0x000000000237B000-memory.dmp

              Filesize

              300KB

            • memory/3972-1112-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

              Filesize

              64KB

            • memory/3972-1113-0x0000000007130000-0x00000000071A6000-memory.dmp

              Filesize

              472KB

            • memory/3972-1114-0x00000000071C0000-0x0000000007210000-memory.dmp

              Filesize

              320KB