Analysis

  • max time kernel
    124s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/04/2023, 20:36

General

  • Target

    19a0fb4fdbcfd9f3097242120529b80f4b6c3e07a06652126305e8c659cbaf79.exe

  • Size

    536KB

  • MD5

    42e850809c3ea61f97af4dda73cd9cd3

  • SHA1

    a9304367bf5d8654e50815255315810fb8b46f2a

  • SHA256

    19a0fb4fdbcfd9f3097242120529b80f4b6c3e07a06652126305e8c659cbaf79

  • SHA512

    fa642414b43c05fb838705cee64dc233f9da3456d53b9ccb160ab86ec54ce1a41917d04fd61978fc95ee1f6cb9951f9aa635f0e012c647de63b85d157e98d8bc

  • SSDEEP

    12288:zMrly90Jso2AZ6eKJPpflW1qNazY2XgL3NO7s9q0+NOR:Oyssob6dbNaPgzNms4Ne

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19a0fb4fdbcfd9f3097242120529b80f4b6c3e07a06652126305e8c659cbaf79.exe
    "C:\Users\Admin\AppData\Local\Temp\19a0fb4fdbcfd9f3097242120529b80f4b6c3e07a06652126305e8c659cbaf79.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieZ7631.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieZ7631.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4380
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr650061.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr650061.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1296
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku965238.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku965238.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2968
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 1336
          4⤵
          • Program crash
          PID:3648
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr333713.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr333713.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1680
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2968 -ip 2968
    1⤵
      PID:3988
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe start wuauserv
      1⤵
      • Launches sc.exe
      PID:4240

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr333713.exe

            Filesize

            175KB

            MD5

            59b323cde584cd2fc555448b6f58461a

            SHA1

            ad62d7ef9bf4f56019820ee4a2cf89e399234424

            SHA256

            6f18ae1fdbba398a201dc80234135278ddbec1c8a6e45d4822e209fc05868113

            SHA512

            f793969f41bbfd1d29e5e89a37a0eb45def575c07abc75035b70739cfacb25ca0f0928ce56cf55be6ed487a488cf95dc280aa569417974fb2f50f4855f6e848e

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr333713.exe

            Filesize

            175KB

            MD5

            59b323cde584cd2fc555448b6f58461a

            SHA1

            ad62d7ef9bf4f56019820ee4a2cf89e399234424

            SHA256

            6f18ae1fdbba398a201dc80234135278ddbec1c8a6e45d4822e209fc05868113

            SHA512

            f793969f41bbfd1d29e5e89a37a0eb45def575c07abc75035b70739cfacb25ca0f0928ce56cf55be6ed487a488cf95dc280aa569417974fb2f50f4855f6e848e

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieZ7631.exe

            Filesize

            394KB

            MD5

            4b15f758ecf17c843145d61beaec71f1

            SHA1

            f46522835748dacd9ccd313c0592d7231e705176

            SHA256

            e4cc2b6e7315c56c93412c9cc4080977c4693b0391d7458cfb355f5c47c262ee

            SHA512

            2627a3a938cbf0a332eec216a60b128d15ab0ac3e47aa75e04eefe608241e054c9023bfb47e9408f76ecf9eddd23351d0462f7774349513087c0f0b1aedb8ad6

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieZ7631.exe

            Filesize

            394KB

            MD5

            4b15f758ecf17c843145d61beaec71f1

            SHA1

            f46522835748dacd9ccd313c0592d7231e705176

            SHA256

            e4cc2b6e7315c56c93412c9cc4080977c4693b0391d7458cfb355f5c47c262ee

            SHA512

            2627a3a938cbf0a332eec216a60b128d15ab0ac3e47aa75e04eefe608241e054c9023bfb47e9408f76ecf9eddd23351d0462f7774349513087c0f0b1aedb8ad6

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr650061.exe

            Filesize

            13KB

            MD5

            74b4cd2879e230c46212c672b90c8dd7

            SHA1

            75b9a2a056e185f5279fa3a6687382a67b5e4e54

            SHA256

            cf58a20bed8654fc2c19bcf25f7d8d83571cd20265038e5152bde780ce137cba

            SHA512

            fb5a30964f477f07eda412c1fe7fba21856c4292ec13b8ce499faef8169471e4bebd8d8d1b0528ad6a17f7520efbf7630b5c73876eb4ac375801fe7a22d4c57f

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr650061.exe

            Filesize

            13KB

            MD5

            74b4cd2879e230c46212c672b90c8dd7

            SHA1

            75b9a2a056e185f5279fa3a6687382a67b5e4e54

            SHA256

            cf58a20bed8654fc2c19bcf25f7d8d83571cd20265038e5152bde780ce137cba

            SHA512

            fb5a30964f477f07eda412c1fe7fba21856c4292ec13b8ce499faef8169471e4bebd8d8d1b0528ad6a17f7520efbf7630b5c73876eb4ac375801fe7a22d4c57f

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku965238.exe

            Filesize

            353KB

            MD5

            81243b9da40bd368a977aa0cccfc4a0d

            SHA1

            3ae76af94d8bc49262bd916f27d0c912468ef60e

            SHA256

            2ca250f30c19fb3a6bbf567a3de7fa2b5e00194bd4fc4a2a9515c547934bb77e

            SHA512

            f1437ad835632a6d970893a67287ee519951707d7631e42cb824c02a2fcb6b09f004800ecaf972e6fecd2e2aef769d2df9d7e926adc55ab8d42b2890e0892129

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku965238.exe

            Filesize

            353KB

            MD5

            81243b9da40bd368a977aa0cccfc4a0d

            SHA1

            3ae76af94d8bc49262bd916f27d0c912468ef60e

            SHA256

            2ca250f30c19fb3a6bbf567a3de7fa2b5e00194bd4fc4a2a9515c547934bb77e

            SHA512

            f1437ad835632a6d970893a67287ee519951707d7631e42cb824c02a2fcb6b09f004800ecaf972e6fecd2e2aef769d2df9d7e926adc55ab8d42b2890e0892129

          • memory/1296-147-0x0000000000FC0000-0x0000000000FCA000-memory.dmp

            Filesize

            40KB

          • memory/1680-1082-0x0000000000B90000-0x0000000000BC2000-memory.dmp

            Filesize

            200KB

          • memory/1680-1083-0x0000000005420000-0x0000000005430000-memory.dmp

            Filesize

            64KB

          • memory/2968-186-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-198-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-155-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

            Filesize

            64KB

          • memory/2968-156-0x0000000004DE0000-0x0000000005384000-memory.dmp

            Filesize

            5.6MB

          • memory/2968-158-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-157-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-160-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-164-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-162-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-166-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-168-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-170-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-172-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-174-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-176-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-178-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-180-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-182-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-184-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-153-0x0000000002440000-0x000000000248B000-memory.dmp

            Filesize

            300KB

          • memory/2968-188-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-190-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-192-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-194-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-196-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-154-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

            Filesize

            64KB

          • memory/2968-200-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-202-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-204-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-206-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-208-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-210-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-212-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-214-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-216-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-218-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-220-0x0000000005390000-0x00000000053CF000-memory.dmp

            Filesize

            252KB

          • memory/2968-1063-0x0000000005550000-0x0000000005B68000-memory.dmp

            Filesize

            6.1MB

          • memory/2968-1064-0x0000000005BF0000-0x0000000005CFA000-memory.dmp

            Filesize

            1.0MB

          • memory/2968-1065-0x0000000005D30000-0x0000000005D42000-memory.dmp

            Filesize

            72KB

          • memory/2968-1066-0x0000000005D50000-0x0000000005D8C000-memory.dmp

            Filesize

            240KB

          • memory/2968-1067-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

            Filesize

            64KB

          • memory/2968-1069-0x0000000006040000-0x00000000060A6000-memory.dmp

            Filesize

            408KB

          • memory/2968-1070-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

            Filesize

            64KB

          • memory/2968-1071-0x0000000006810000-0x00000000068A2000-memory.dmp

            Filesize

            584KB

          • memory/2968-1072-0x0000000006900000-0x0000000006AC2000-memory.dmp

            Filesize

            1.8MB

          • memory/2968-1073-0x0000000006AD0000-0x0000000006FFC000-memory.dmp

            Filesize

            5.2MB

          • memory/2968-1074-0x0000000007150000-0x00000000071C6000-memory.dmp

            Filesize

            472KB

          • memory/2968-1075-0x00000000071D0000-0x0000000007220000-memory.dmp

            Filesize

            320KB

          • memory/2968-1076-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

            Filesize

            64KB