Analysis

  • max time kernel
    52s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-04-2023 18:36

General

  • Target

    69b1410050bc115458337944820769a53584e489ace943ee2b31681b27bd8aa7.exe

  • Size

    536KB

  • MD5

    8fb7b911562b540492026906b9ef692c

  • SHA1

    fceaaf098555b472fdefd453bef50e8ddd05daf1

  • SHA256

    69b1410050bc115458337944820769a53584e489ace943ee2b31681b27bd8aa7

  • SHA512

    2172fa5a602597024d4fb0b56d2fe5fe353a165b87bccfd245b89a5c07e5fe2607cfc29840032be9a5920db4a51e2a7465e7deb9d32dde0e5f920d9816d79f8a

  • SSDEEP

    12288:kMr2y90yuwms7cMAKoetUW1SkbeNzzMD9aLx98tO:SyLAriaNzAa9F

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\69b1410050bc115458337944820769a53584e489ace943ee2b31681b27bd8aa7.exe
    "C:\Users\Admin\AppData\Local\Temp\69b1410050bc115458337944820769a53584e489ace943ee2b31681b27bd8aa7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDy0730.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDy0730.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3004
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr806477.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr806477.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4392
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku890830.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku890830.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:936
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 936 -s 1340
          4⤵
          • Program crash
          PID:4828
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr284081.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr284081.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3260
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 936 -ip 936
    1⤵
      PID:4752

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr284081.exe

      Filesize

      175KB

      MD5

      662480f6b807184cc21d0b344903156d

      SHA1

      8bd5dfe9de380efe4353662b53bdabf5b1066a23

      SHA256

      44af06be3e9fbb6225fcdb92e7186936c39fb3ea675c84e09239f416fe6fccf1

      SHA512

      923caac19239e984b00928e13c6bbfc095f83db22aefbad1d3dea6ba365efe249bfc22305d4673e083d2d8451ea969395df9dc67b980e2dbe5858866f86b77e3

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr284081.exe

      Filesize

      175KB

      MD5

      662480f6b807184cc21d0b344903156d

      SHA1

      8bd5dfe9de380efe4353662b53bdabf5b1066a23

      SHA256

      44af06be3e9fbb6225fcdb92e7186936c39fb3ea675c84e09239f416fe6fccf1

      SHA512

      923caac19239e984b00928e13c6bbfc095f83db22aefbad1d3dea6ba365efe249bfc22305d4673e083d2d8451ea969395df9dc67b980e2dbe5858866f86b77e3

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDy0730.exe

      Filesize

      394KB

      MD5

      5665653ec1e47603d76321cff86de867

      SHA1

      9316cf4cd53c48fa4e0aec250d875de1db252a6d

      SHA256

      34dce8f47dc3a61460b3a1c9dd6951d6599ecf099b255bb0570a2800618dd381

      SHA512

      45045afa950d347d93f9c04df1632a1c21fae164b585a8e101a6d8f9a6f4e6b4ceb178c8b384beb4b2f8cc569ec1d815648bf12582e72c0de2f3500f77014862

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDy0730.exe

      Filesize

      394KB

      MD5

      5665653ec1e47603d76321cff86de867

      SHA1

      9316cf4cd53c48fa4e0aec250d875de1db252a6d

      SHA256

      34dce8f47dc3a61460b3a1c9dd6951d6599ecf099b255bb0570a2800618dd381

      SHA512

      45045afa950d347d93f9c04df1632a1c21fae164b585a8e101a6d8f9a6f4e6b4ceb178c8b384beb4b2f8cc569ec1d815648bf12582e72c0de2f3500f77014862

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr806477.exe

      Filesize

      13KB

      MD5

      23feba37eaf9c9ef651bf766db1d8bcf

      SHA1

      3e28f31611c32a871a9d4306a4c6aa813a551ffd

      SHA256

      f0fb4b3143d50fd629a27fbd04a9500d7c99f1ff9d2516c177b241aa4f657a5f

      SHA512

      cf1f604ae78fa7253cfabd86075eb030a23cf9a0aa556e8e8dbd95248e8755704a19c7a33367a32e72a1805e3a723fd07b9f761c3338f31d2f176c0aa38217e4

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr806477.exe

      Filesize

      13KB

      MD5

      23feba37eaf9c9ef651bf766db1d8bcf

      SHA1

      3e28f31611c32a871a9d4306a4c6aa813a551ffd

      SHA256

      f0fb4b3143d50fd629a27fbd04a9500d7c99f1ff9d2516c177b241aa4f657a5f

      SHA512

      cf1f604ae78fa7253cfabd86075eb030a23cf9a0aa556e8e8dbd95248e8755704a19c7a33367a32e72a1805e3a723fd07b9f761c3338f31d2f176c0aa38217e4

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku890830.exe

      Filesize

      353KB

      MD5

      c90072605a8cf931f63b5148105ca5a9

      SHA1

      0186e776bc40de563130b99e34e63e5450e8d741

      SHA256

      fea7f7bebebb076577c33f7f6a40b07cce9615889629c2f3c147181538c3d04e

      SHA512

      e575c4f8d42ef4cc8ac6b314a40f091175dba51addab31c2b7569d85c1249196c5a4b442cb7fe2f8fd9caf94c69de8cbd9ccaeed2739c33564b3e162eca2691c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku890830.exe

      Filesize

      353KB

      MD5

      c90072605a8cf931f63b5148105ca5a9

      SHA1

      0186e776bc40de563130b99e34e63e5450e8d741

      SHA256

      fea7f7bebebb076577c33f7f6a40b07cce9615889629c2f3c147181538c3d04e

      SHA512

      e575c4f8d42ef4cc8ac6b314a40f091175dba51addab31c2b7569d85c1249196c5a4b442cb7fe2f8fd9caf94c69de8cbd9ccaeed2739c33564b3e162eca2691c

    • memory/936-154-0x0000000004F60000-0x0000000005504000-memory.dmp

      Filesize

      5.6MB

    • memory/936-155-0x0000000004F50000-0x0000000004F60000-memory.dmp

      Filesize

      64KB

    • memory/936-156-0x0000000004F50000-0x0000000004F60000-memory.dmp

      Filesize

      64KB

    • memory/936-153-0x0000000002440000-0x000000000248B000-memory.dmp

      Filesize

      300KB

    • memory/936-158-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-157-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-160-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-162-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-164-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-166-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-170-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-168-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-172-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-174-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-176-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-178-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-180-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-182-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-184-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-186-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-188-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-190-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-192-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-194-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-196-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-198-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-200-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-204-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-206-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-202-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-208-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-210-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-212-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-214-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-216-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-218-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-220-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

      Filesize

      252KB

    • memory/936-1063-0x0000000005510000-0x0000000005B28000-memory.dmp

      Filesize

      6.1MB

    • memory/936-1064-0x0000000005B30000-0x0000000005C3A000-memory.dmp

      Filesize

      1.0MB

    • memory/936-1065-0x0000000004F00000-0x0000000004F12000-memory.dmp

      Filesize

      72KB

    • memory/936-1066-0x0000000005C40000-0x0000000005C7C000-memory.dmp

      Filesize

      240KB

    • memory/936-1067-0x0000000004F50000-0x0000000004F60000-memory.dmp

      Filesize

      64KB

    • memory/936-1069-0x0000000004F50000-0x0000000004F60000-memory.dmp

      Filesize

      64KB

    • memory/936-1070-0x0000000004F50000-0x0000000004F60000-memory.dmp

      Filesize

      64KB

    • memory/936-1071-0x0000000005F00000-0x0000000005F92000-memory.dmp

      Filesize

      584KB

    • memory/936-1072-0x0000000005FA0000-0x0000000006006000-memory.dmp

      Filesize

      408KB

    • memory/936-1073-0x0000000004F50000-0x0000000004F60000-memory.dmp

      Filesize

      64KB

    • memory/936-1074-0x0000000007BB0000-0x0000000007D72000-memory.dmp

      Filesize

      1.8MB

    • memory/936-1075-0x0000000007D90000-0x00000000082BC000-memory.dmp

      Filesize

      5.2MB

    • memory/936-1076-0x00000000026B0000-0x0000000002726000-memory.dmp

      Filesize

      472KB

    • memory/936-1077-0x00000000083F0000-0x0000000008440000-memory.dmp

      Filesize

      320KB

    • memory/3260-1083-0x0000000000880000-0x00000000008B2000-memory.dmp

      Filesize

      200KB

    • memory/3260-1084-0x00000000054D0000-0x00000000054E0000-memory.dmp

      Filesize

      64KB

    • memory/4392-147-0x0000000000D30000-0x0000000000D3A000-memory.dmp

      Filesize

      40KB