Analysis

  • max time kernel
    62s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/04/2023, 20:05

General

  • Target

    c13880381ff25876cfbea91100b0e3720b0d690a8574114f9ef5cb286e0346ab.exe

  • Size

    665KB

  • MD5

    f7a4ef36bbd97df6b30e4fda34eb491e

  • SHA1

    08c022b217ff4b517c4712dc9eebafa728084dd5

  • SHA256

    c13880381ff25876cfbea91100b0e3720b0d690a8574114f9ef5cb286e0346ab

  • SHA512

    e23d006e37e0a51957da9c220eec875244954013de7fb48402ff440f53975efd06df8fffa07ef3f791a1084f5966847c644ce0244c6b2b45cdc2cc2f61d2c29f

  • SSDEEP

    12288:/Mryy90n/NI7hBgWDAJQFUJotv2nRUVVwt7NXbww14LCjCV9Z4:dyw/KhRMJNJotviRU0lNXP4/4

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c13880381ff25876cfbea91100b0e3720b0d690a8574114f9ef5cb286e0346ab.exe
    "C:\Users\Admin\AppData\Local\Temp\c13880381ff25876cfbea91100b0e3720b0d690a8574114f9ef5cb286e0346ab.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un642260.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un642260.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3512
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9569.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9569.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3516
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3516 -s 1080
          4⤵
          • Program crash
          PID:220
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4728.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4728.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2092
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2092 -s 1736
          4⤵
          • Program crash
          PID:1632
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si836350.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si836350.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4352
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3516 -ip 3516
    1⤵
      PID:3852
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 2092 -ip 2092
      1⤵
        PID:1452

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si836350.exe

        Filesize

        175KB

        MD5

        04eabdbd4ee614625e71c2a777a2528b

        SHA1

        d54d9376e22582ff7d659c5cb3dff06e3f6a5806

        SHA256

        8520407da475f10e3e1ea5079fe76a111c829ec62d43f53fc34915abf312cf83

        SHA512

        8f277e864f3b059bdaf721ddb35df24bcbadc751c1b0f970488c8d16d35485633ed910c62ced8bffa1f12b12e525278f1eb6ed90df258d16b55f076d967eea65

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si836350.exe

        Filesize

        175KB

        MD5

        04eabdbd4ee614625e71c2a777a2528b

        SHA1

        d54d9376e22582ff7d659c5cb3dff06e3f6a5806

        SHA256

        8520407da475f10e3e1ea5079fe76a111c829ec62d43f53fc34915abf312cf83

        SHA512

        8f277e864f3b059bdaf721ddb35df24bcbadc751c1b0f970488c8d16d35485633ed910c62ced8bffa1f12b12e525278f1eb6ed90df258d16b55f076d967eea65

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un642260.exe

        Filesize

        523KB

        MD5

        577b237c4e831a9af366cc0a061be83e

        SHA1

        6514f01a9942f78e30d7e249eb72fbb6d951d370

        SHA256

        9dedbe523626c2dfde094341f2db48006f9d595c6ba166229e0fa2983ca37001

        SHA512

        d1a00ba98ddc23376a1a6eca97d11e95db3bc71ed8d636a0bf75242a4774b0ad952502f3c247a6a318f84a8f4888a717e9d0a64a44353ab41aafe4f797143628

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un642260.exe

        Filesize

        523KB

        MD5

        577b237c4e831a9af366cc0a061be83e

        SHA1

        6514f01a9942f78e30d7e249eb72fbb6d951d370

        SHA256

        9dedbe523626c2dfde094341f2db48006f9d595c6ba166229e0fa2983ca37001

        SHA512

        d1a00ba98ddc23376a1a6eca97d11e95db3bc71ed8d636a0bf75242a4774b0ad952502f3c247a6a318f84a8f4888a717e9d0a64a44353ab41aafe4f797143628

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9569.exe

        Filesize

        294KB

        MD5

        77d36f30531f6159e2c5bfe86c880dd9

        SHA1

        df3cc3e9a4f2fbd8422e46869fff2837951ca27c

        SHA256

        120864ba3d4b79f6bc4ea8dcd3db4a1711b7028e3a0587ecb690387ffe30e2bd

        SHA512

        c357873905a5b8fdbbedd63666cdb80f61f6e6a6dbc0de91d84e251f3dd8b7fd2fd2845ee26df4c565ae0861ac75cb3c5afba64fc58129940632db86461f2766

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9569.exe

        Filesize

        294KB

        MD5

        77d36f30531f6159e2c5bfe86c880dd9

        SHA1

        df3cc3e9a4f2fbd8422e46869fff2837951ca27c

        SHA256

        120864ba3d4b79f6bc4ea8dcd3db4a1711b7028e3a0587ecb690387ffe30e2bd

        SHA512

        c357873905a5b8fdbbedd63666cdb80f61f6e6a6dbc0de91d84e251f3dd8b7fd2fd2845ee26df4c565ae0861ac75cb3c5afba64fc58129940632db86461f2766

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4728.exe

        Filesize

        353KB

        MD5

        1e0a836483da5634d14261d5a4b6b71c

        SHA1

        e38cafe65f3ea7fe6618934e098f706821dabc1e

        SHA256

        bbea3d87d3010ff611d429379c84640257dd4be3079e52750476438c304e9ae5

        SHA512

        ac9eb46ec1287bb5214d1f37c011dbc047bacdbdf56449dccabc3f3f1100b48046253f7ee6ce1d9d844bc795df075cbd959824fb09a3a759886916b36a4039c1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4728.exe

        Filesize

        353KB

        MD5

        1e0a836483da5634d14261d5a4b6b71c

        SHA1

        e38cafe65f3ea7fe6618934e098f706821dabc1e

        SHA256

        bbea3d87d3010ff611d429379c84640257dd4be3079e52750476438c304e9ae5

        SHA512

        ac9eb46ec1287bb5214d1f37c011dbc047bacdbdf56449dccabc3f3f1100b48046253f7ee6ce1d9d844bc795df075cbd959824fb09a3a759886916b36a4039c1

      • memory/2092-481-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

        Filesize

        64KB

      • memory/2092-1102-0x0000000005D30000-0x0000000005D42000-memory.dmp

        Filesize

        72KB

      • memory/2092-1114-0x0000000006BF0000-0x000000000711C000-memory.dmp

        Filesize

        5.2MB

      • memory/2092-1113-0x0000000006A20000-0x0000000006BE2000-memory.dmp

        Filesize

        1.8MB

      • memory/2092-1112-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

        Filesize

        64KB

      • memory/2092-1111-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

        Filesize

        64KB

      • memory/2092-1110-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

        Filesize

        64KB

      • memory/2092-1109-0x0000000006870000-0x00000000068C0000-memory.dmp

        Filesize

        320KB

      • memory/2092-1107-0x00000000067E0000-0x0000000006856000-memory.dmp

        Filesize

        472KB

      • memory/2092-1106-0x0000000006700000-0x0000000006792000-memory.dmp

        Filesize

        584KB

      • memory/2092-1105-0x0000000006040000-0x00000000060A6000-memory.dmp

        Filesize

        408KB

      • memory/2092-1104-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

        Filesize

        64KB

      • memory/2092-1103-0x0000000005D50000-0x0000000005D8C000-memory.dmp

        Filesize

        240KB

      • memory/2092-1101-0x0000000005BF0000-0x0000000005CFA000-memory.dmp

        Filesize

        1.0MB

      • memory/2092-1100-0x00000000055A0000-0x0000000005BB8000-memory.dmp

        Filesize

        6.1MB

      • memory/2092-479-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

        Filesize

        64KB

      • memory/2092-478-0x0000000000990000-0x00000000009DB000-memory.dmp

        Filesize

        300KB

      • memory/2092-224-0x0000000004E00000-0x0000000004E3F000-memory.dmp

        Filesize

        252KB

      • memory/2092-222-0x0000000004E00000-0x0000000004E3F000-memory.dmp

        Filesize

        252KB

      • memory/2092-220-0x0000000004E00000-0x0000000004E3F000-memory.dmp

        Filesize

        252KB

      • memory/2092-218-0x0000000004E00000-0x0000000004E3F000-memory.dmp

        Filesize

        252KB

      • memory/2092-216-0x0000000004E00000-0x0000000004E3F000-memory.dmp

        Filesize

        252KB

      • memory/2092-214-0x0000000004E00000-0x0000000004E3F000-memory.dmp

        Filesize

        252KB

      • memory/2092-191-0x0000000004E00000-0x0000000004E3F000-memory.dmp

        Filesize

        252KB

      • memory/2092-192-0x0000000004E00000-0x0000000004E3F000-memory.dmp

        Filesize

        252KB

      • memory/2092-194-0x0000000004E00000-0x0000000004E3F000-memory.dmp

        Filesize

        252KB

      • memory/2092-196-0x0000000004E00000-0x0000000004E3F000-memory.dmp

        Filesize

        252KB

      • memory/2092-198-0x0000000004E00000-0x0000000004E3F000-memory.dmp

        Filesize

        252KB

      • memory/2092-200-0x0000000004E00000-0x0000000004E3F000-memory.dmp

        Filesize

        252KB

      • memory/2092-202-0x0000000004E00000-0x0000000004E3F000-memory.dmp

        Filesize

        252KB

      • memory/2092-204-0x0000000004E00000-0x0000000004E3F000-memory.dmp

        Filesize

        252KB

      • memory/2092-206-0x0000000004E00000-0x0000000004E3F000-memory.dmp

        Filesize

        252KB

      • memory/2092-208-0x0000000004E00000-0x0000000004E3F000-memory.dmp

        Filesize

        252KB

      • memory/2092-210-0x0000000004E00000-0x0000000004E3F000-memory.dmp

        Filesize

        252KB

      • memory/2092-212-0x0000000004E00000-0x0000000004E3F000-memory.dmp

        Filesize

        252KB

      • memory/3516-177-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3516-148-0x0000000000970000-0x000000000099D000-memory.dmp

        Filesize

        180KB

      • memory/3516-186-0x0000000000400000-0x00000000007FE000-memory.dmp

        Filesize

        4.0MB

      • memory/3516-185-0x0000000002690000-0x00000000026A0000-memory.dmp

        Filesize

        64KB

      • memory/3516-184-0x0000000002690000-0x00000000026A0000-memory.dmp

        Filesize

        64KB

      • memory/3516-183-0x0000000002690000-0x00000000026A0000-memory.dmp

        Filesize

        64KB

      • memory/3516-181-0x0000000000400000-0x00000000007FE000-memory.dmp

        Filesize

        4.0MB

      • memory/3516-180-0x0000000002690000-0x00000000026A0000-memory.dmp

        Filesize

        64KB

      • memory/3516-150-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3516-179-0x0000000002690000-0x00000000026A0000-memory.dmp

        Filesize

        64KB

      • memory/3516-178-0x0000000002690000-0x00000000026A0000-memory.dmp

        Filesize

        64KB

      • memory/3516-173-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3516-153-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3516-151-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3516-155-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3516-171-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3516-169-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3516-167-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3516-165-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3516-163-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3516-161-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3516-159-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3516-157-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/3516-149-0x0000000004E10000-0x00000000053B4000-memory.dmp

        Filesize

        5.6MB

      • memory/3516-175-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/4352-1120-0x00000000000F0000-0x0000000000122000-memory.dmp

        Filesize

        200KB

      • memory/4352-1121-0x0000000004A50000-0x0000000004A60000-memory.dmp

        Filesize

        64KB