Analysis

  • max time kernel
    96s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 21:26

General

  • Target

    1bfea0e0caab53f706840cd291cdb7399c9115a2d237bf30ad3ed79ad9efd439.exe

  • Size

    522KB

  • MD5

    5cca3c33c85645d285d2e4aa77151770

  • SHA1

    5a97be06f28dfb0009f5fc542206ad5edb14252b

  • SHA256

    1bfea0e0caab53f706840cd291cdb7399c9115a2d237bf30ad3ed79ad9efd439

  • SHA512

    5669fc67f6012be8b87e2e1acd3857dbda1c0fdd3f123bf1b4ebfc48413fee73c50f1ea5a2b119b2f854007fdf6ccab73640c7518427ee1ec45bf936df3e5e37

  • SSDEEP

    12288:FMrfy90XDTeBefzQoQX4M1hTEnHeZR8s34hQzWRwjUv+cG:qyUCYfEoQXDTE+EsohZR+cG

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1bfea0e0caab53f706840cd291cdb7399c9115a2d237bf30ad3ed79ad9efd439.exe
    "C:\Users\Admin\AppData\Local\Temp\1bfea0e0caab53f706840cd291cdb7399c9115a2d237bf30ad3ed79ad9efd439.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGA6350.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGA6350.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4840
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr468844.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr468844.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1652
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku986365.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku986365.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1804
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1804 -s 1352
          4⤵
          • Program crash
          PID:840
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr076853.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr076853.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4332
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1804 -ip 1804
    1⤵
      PID:4936

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr076853.exe

      Filesize

      175KB

      MD5

      efa370cacd287d7a84a64bd56208475c

      SHA1

      4ad8d948901b05d2be16fc6b93a5d1dbddf97612

      SHA256

      d211e6eb8810f4f9b16f2c1ca8f03622394d20128f389ce9b20e58d9bde71ae8

      SHA512

      f854249da4bed654dfe84aa013975a8eb74a0082334213d5a8487f442d1b4cd2185aa3b1d30c1fae250d3d9b96a2283148e977e0e1e77701353706276982c2d6

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr076853.exe

      Filesize

      175KB

      MD5

      efa370cacd287d7a84a64bd56208475c

      SHA1

      4ad8d948901b05d2be16fc6b93a5d1dbddf97612

      SHA256

      d211e6eb8810f4f9b16f2c1ca8f03622394d20128f389ce9b20e58d9bde71ae8

      SHA512

      f854249da4bed654dfe84aa013975a8eb74a0082334213d5a8487f442d1b4cd2185aa3b1d30c1fae250d3d9b96a2283148e977e0e1e77701353706276982c2d6

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGA6350.exe

      Filesize

      380KB

      MD5

      89064fde819cc76ad5c423073944e6f9

      SHA1

      e955894bb60157965c67c11e875407d1562458b1

      SHA256

      a8d927f0d32891aeb8c4823950580360f740ba4f6fce4e9a1e3ad61d91ce0267

      SHA512

      6ea23209b42a927f9108bde7c06ee3146c57a888bdc3f10cda21757346a1028c5a7e0a9fac61bf53c79d162883f4f811a0fd6e97fdbb384de9e952040b9a5171

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziGA6350.exe

      Filesize

      380KB

      MD5

      89064fde819cc76ad5c423073944e6f9

      SHA1

      e955894bb60157965c67c11e875407d1562458b1

      SHA256

      a8d927f0d32891aeb8c4823950580360f740ba4f6fce4e9a1e3ad61d91ce0267

      SHA512

      6ea23209b42a927f9108bde7c06ee3146c57a888bdc3f10cda21757346a1028c5a7e0a9fac61bf53c79d162883f4f811a0fd6e97fdbb384de9e952040b9a5171

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr468844.exe

      Filesize

      15KB

      MD5

      f81f6b37983d6bfe10d495426bbb284e

      SHA1

      1da43285b753b8fc6c774356912f460dd50c66d1

      SHA256

      222f17dd178bfc4e249088016e38b9c9779d291077d144609cd67dc5b93c3693

      SHA512

      71be4d8b99eac30cae8d80c6f6ecddabdf6334c391688119006c5dbca5855f2008df13a52714d71f7e37494166fe771bb5215b4a5e76fc818eff0f552c197032

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr468844.exe

      Filesize

      15KB

      MD5

      f81f6b37983d6bfe10d495426bbb284e

      SHA1

      1da43285b753b8fc6c774356912f460dd50c66d1

      SHA256

      222f17dd178bfc4e249088016e38b9c9779d291077d144609cd67dc5b93c3693

      SHA512

      71be4d8b99eac30cae8d80c6f6ecddabdf6334c391688119006c5dbca5855f2008df13a52714d71f7e37494166fe771bb5215b4a5e76fc818eff0f552c197032

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku986365.exe

      Filesize

      294KB

      MD5

      6d429446a01f910417cd979b1e422d31

      SHA1

      78e3f4303a1680e8fe497d2fda64fe15008816cd

      SHA256

      6774f45ca8db4fab0d806ed62252fe4ccd7e909c8f923df75ce1ecd185a97236

      SHA512

      06b5f3939b2b189a3abd806084b02c47c12bd45bb19dbe40a88685eeb739c46931f28a7151f774497f3759dbdf342ac7ddb31eed14fde24eee3ba14f4c9f8a17

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku986365.exe

      Filesize

      294KB

      MD5

      6d429446a01f910417cd979b1e422d31

      SHA1

      78e3f4303a1680e8fe497d2fda64fe15008816cd

      SHA256

      6774f45ca8db4fab0d806ed62252fe4ccd7e909c8f923df75ce1ecd185a97236

      SHA512

      06b5f3939b2b189a3abd806084b02c47c12bd45bb19dbe40a88685eeb739c46931f28a7151f774497f3759dbdf342ac7ddb31eed14fde24eee3ba14f4c9f8a17

    • memory/1652-147-0x0000000000140000-0x000000000014A000-memory.dmp

      Filesize

      40KB

    • memory/1804-153-0x0000000000720000-0x000000000076B000-memory.dmp

      Filesize

      300KB

    • memory/1804-154-0x0000000004C70000-0x0000000005214000-memory.dmp

      Filesize

      5.6MB

    • memory/1804-155-0x0000000004C60000-0x0000000004C70000-memory.dmp

      Filesize

      64KB

    • memory/1804-156-0x0000000004C60000-0x0000000004C70000-memory.dmp

      Filesize

      64KB

    • memory/1804-157-0x0000000004C60000-0x0000000004C70000-memory.dmp

      Filesize

      64KB

    • memory/1804-159-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-161-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-158-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-163-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-165-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-167-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-169-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-171-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-173-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-175-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-177-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-179-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-181-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-183-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-185-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-191-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-189-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-187-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-193-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-195-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-197-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-199-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-201-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-203-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-205-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-207-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-209-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-211-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-213-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-215-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-217-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-219-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-221-0x0000000002790000-0x00000000027CF000-memory.dmp

      Filesize

      252KB

    • memory/1804-1064-0x0000000005220000-0x0000000005838000-memory.dmp

      Filesize

      6.1MB

    • memory/1804-1065-0x0000000005840000-0x000000000594A000-memory.dmp

      Filesize

      1.0MB

    • memory/1804-1066-0x0000000004BB0000-0x0000000004BC2000-memory.dmp

      Filesize

      72KB

    • memory/1804-1067-0x0000000004C60000-0x0000000004C70000-memory.dmp

      Filesize

      64KB

    • memory/1804-1068-0x0000000004BD0000-0x0000000004C0C000-memory.dmp

      Filesize

      240KB

    • memory/1804-1070-0x0000000004C60000-0x0000000004C70000-memory.dmp

      Filesize

      64KB

    • memory/1804-1071-0x0000000004C60000-0x0000000004C70000-memory.dmp

      Filesize

      64KB

    • memory/1804-1072-0x0000000004C60000-0x0000000004C70000-memory.dmp

      Filesize

      64KB

    • memory/1804-1073-0x0000000005BB0000-0x0000000005C42000-memory.dmp

      Filesize

      584KB

    • memory/1804-1074-0x0000000005C50000-0x0000000005CB6000-memory.dmp

      Filesize

      408KB

    • memory/1804-1075-0x0000000006340000-0x00000000063B6000-memory.dmp

      Filesize

      472KB

    • memory/1804-1076-0x00000000063E0000-0x0000000006430000-memory.dmp

      Filesize

      320KB

    • memory/1804-1077-0x0000000006450000-0x0000000006612000-memory.dmp

      Filesize

      1.8MB

    • memory/1804-1078-0x0000000006630000-0x0000000006B5C000-memory.dmp

      Filesize

      5.2MB

    • memory/1804-1079-0x0000000004C60000-0x0000000004C70000-memory.dmp

      Filesize

      64KB

    • memory/4332-1086-0x0000000000D00000-0x0000000000D32000-memory.dmp

      Filesize

      200KB

    • memory/4332-1087-0x0000000005610000-0x0000000005620000-memory.dmp

      Filesize

      64KB

    • memory/4332-1088-0x0000000005610000-0x0000000005620000-memory.dmp

      Filesize

      64KB