Analysis

  • max time kernel
    156s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 22:15

General

  • Target

    7d32d7daac67140a7d874c63e07ecb5f4349cc45d2c81623b8dc029e53f6f120.exe

  • Size

    522KB

  • MD5

    0e2f9647b0d388f7050b3bd76f17e2c7

  • SHA1

    97224b787d5f02d23cd7982b36f02a3c1669435b

  • SHA256

    7d32d7daac67140a7d874c63e07ecb5f4349cc45d2c81623b8dc029e53f6f120

  • SHA512

    f66abd7e08d8fddab07826ba61e08ebf2c4986fdd95deee46126b43b2e249918f56a5ae7e8d301b56846a4c122f68643908aef4ac3c410f488f24f0ec1644772

  • SSDEEP

    12288:iMrSy90YM88BEmtrwXuhCqJRUd1swwd2M:AyrM8gwuYqnUdFwd3

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d32d7daac67140a7d874c63e07ecb5f4349cc45d2c81623b8dc029e53f6f120.exe
    "C:\Users\Admin\AppData\Local\Temp\7d32d7daac67140a7d874c63e07ecb5f4349cc45d2c81623b8dc029e53f6f120.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2680
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGk6167.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGk6167.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:480
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr593904.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr593904.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1988
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku979680.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku979680.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4868
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4868 -s 1280
          4⤵
          • Program crash
          PID:3580
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr349327.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr349327.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4976
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4868 -ip 4868
    1⤵
      PID:2168

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr349327.exe
      Filesize

      175KB

      MD5

      ceb00d2dd7ba432c109a24c3283a430e

      SHA1

      1887f5397484742a5a21c80e3ef544a17df0ea6d

      SHA256

      165117a05d297f77aa70d02a74611f80cef5bec9bb3b71f18fb984266edb016b

      SHA512

      94db967d9fc377868d023331a398c3f07e21a5be51a0be14eb567adba97947881e882a93f1eaee21153cbcf3354fa8fe923a422c4f8724e61f0c13f2be77d5c2

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr349327.exe
      Filesize

      175KB

      MD5

      ceb00d2dd7ba432c109a24c3283a430e

      SHA1

      1887f5397484742a5a21c80e3ef544a17df0ea6d

      SHA256

      165117a05d297f77aa70d02a74611f80cef5bec9bb3b71f18fb984266edb016b

      SHA512

      94db967d9fc377868d023331a398c3f07e21a5be51a0be14eb567adba97947881e882a93f1eaee21153cbcf3354fa8fe923a422c4f8724e61f0c13f2be77d5c2

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGk6167.exe
      Filesize

      380KB

      MD5

      9a28e5ab7126e20cb4259d21a11b6fc6

      SHA1

      c57d1856b8de2468865a5db73357863fde91a474

      SHA256

      ab72e11ec49ff0192b09023b76ac89bd02e241bb5b1fe7cee10bb2bdf36c01c7

      SHA512

      25b19c0287ee8e6b3c567b2a3c73030757bef59b313382caa4ff7605d645bdfb0dcc07ffbd1580e0702d590a5282b78dabdad7a2f04e4ff145a3a75a452c0833

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGk6167.exe
      Filesize

      380KB

      MD5

      9a28e5ab7126e20cb4259d21a11b6fc6

      SHA1

      c57d1856b8de2468865a5db73357863fde91a474

      SHA256

      ab72e11ec49ff0192b09023b76ac89bd02e241bb5b1fe7cee10bb2bdf36c01c7

      SHA512

      25b19c0287ee8e6b3c567b2a3c73030757bef59b313382caa4ff7605d645bdfb0dcc07ffbd1580e0702d590a5282b78dabdad7a2f04e4ff145a3a75a452c0833

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr593904.exe
      Filesize

      15KB

      MD5

      113f7b74c81f5b703a3eda02e974b7be

      SHA1

      0c30292c23049158a7a1438661ca3bbe1eb00079

      SHA256

      0211702a99c570b8f4ab04c39971d10796c83a1c9c9f3737a1e467fda98dddf5

      SHA512

      9994c06e926959ced36c06aa34601f1a50486cdfa7fc7c36b3cf03e19d1aba856b45d26b467288c27dce82f906a29934ee6b1243d4dcba54e8ca3f8f1ce9c637

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr593904.exe
      Filesize

      15KB

      MD5

      113f7b74c81f5b703a3eda02e974b7be

      SHA1

      0c30292c23049158a7a1438661ca3bbe1eb00079

      SHA256

      0211702a99c570b8f4ab04c39971d10796c83a1c9c9f3737a1e467fda98dddf5

      SHA512

      9994c06e926959ced36c06aa34601f1a50486cdfa7fc7c36b3cf03e19d1aba856b45d26b467288c27dce82f906a29934ee6b1243d4dcba54e8ca3f8f1ce9c637

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku979680.exe
      Filesize

      295KB

      MD5

      cf06b6e3ff537e48dba81dadc982c487

      SHA1

      3851b9af734ff39ba8e6c621b91d2d4a6f9f18e5

      SHA256

      3de84bb53434f4c6a20579a8706d50332a511077f8163d4c24c809167aaf523e

      SHA512

      eb74635c276e0cd4d55e8324bb5ed2d97c79f17508905f83608da8e2beba5650430c3edcad218c8a91a59c71348f3c084a7dc5a8cf99c1c6d022b20b1699d91b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku979680.exe
      Filesize

      295KB

      MD5

      cf06b6e3ff537e48dba81dadc982c487

      SHA1

      3851b9af734ff39ba8e6c621b91d2d4a6f9f18e5

      SHA256

      3de84bb53434f4c6a20579a8706d50332a511077f8163d4c24c809167aaf523e

      SHA512

      eb74635c276e0cd4d55e8324bb5ed2d97c79f17508905f83608da8e2beba5650430c3edcad218c8a91a59c71348f3c084a7dc5a8cf99c1c6d022b20b1699d91b

    • memory/1988-147-0x00000000002D0000-0x00000000002DA000-memory.dmp
      Filesize

      40KB

    • memory/4868-153-0x0000000004C90000-0x0000000005234000-memory.dmp
      Filesize

      5.6MB

    • memory/4868-154-0x0000000000740000-0x000000000078B000-memory.dmp
      Filesize

      300KB

    • memory/4868-156-0x0000000004C80000-0x0000000004C90000-memory.dmp
      Filesize

      64KB

    • memory/4868-155-0x0000000004C80000-0x0000000004C90000-memory.dmp
      Filesize

      64KB

    • memory/4868-157-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-158-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-160-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-162-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-164-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-166-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-168-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-170-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-172-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-174-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-176-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-178-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-180-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-182-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-184-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-186-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-188-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-190-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-192-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-194-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-196-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-198-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-200-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-202-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-204-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-206-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-208-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-210-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-212-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-214-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-216-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-218-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-220-0x0000000002620000-0x000000000265F000-memory.dmp
      Filesize

      252KB

    • memory/4868-1063-0x0000000005240000-0x0000000005858000-memory.dmp
      Filesize

      6.1MB

    • memory/4868-1064-0x00000000058A0000-0x00000000059AA000-memory.dmp
      Filesize

      1.0MB

    • memory/4868-1065-0x00000000059E0000-0x00000000059F2000-memory.dmp
      Filesize

      72KB

    • memory/4868-1066-0x0000000005A00000-0x0000000005A3C000-memory.dmp
      Filesize

      240KB

    • memory/4868-1067-0x0000000004C80000-0x0000000004C90000-memory.dmp
      Filesize

      64KB

    • memory/4868-1069-0x0000000005CF0000-0x0000000005D56000-memory.dmp
      Filesize

      408KB

    • memory/4868-1070-0x0000000004C80000-0x0000000004C90000-memory.dmp
      Filesize

      64KB

    • memory/4868-1071-0x0000000004C80000-0x0000000004C90000-memory.dmp
      Filesize

      64KB

    • memory/4868-1072-0x00000000064F0000-0x0000000006582000-memory.dmp
      Filesize

      584KB

    • memory/4868-1073-0x0000000004C80000-0x0000000004C90000-memory.dmp
      Filesize

      64KB

    • memory/4868-1074-0x0000000006A30000-0x0000000006BF2000-memory.dmp
      Filesize

      1.8MB

    • memory/4868-1075-0x0000000006C10000-0x000000000713C000-memory.dmp
      Filesize

      5.2MB

    • memory/4868-1076-0x0000000007280000-0x00000000072F6000-memory.dmp
      Filesize

      472KB

    • memory/4868-1077-0x0000000007300000-0x0000000007350000-memory.dmp
      Filesize

      320KB

    • memory/4976-1083-0x0000000000D10000-0x0000000000D42000-memory.dmp
      Filesize

      200KB

    • memory/4976-1084-0x00000000058E0000-0x00000000058F0000-memory.dmp
      Filesize

      64KB