Analysis

  • max time kernel
    110s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 21:30

General

  • Target

    f7f59d80179f31ed9a0ca38fb3bf287b550334ffc53dd7378ce54f92f1124877.exe

  • Size

    522KB

  • MD5

    89b2536b8e36c1ed6eb49cc5629a14ff

  • SHA1

    47ca497446b33ad7469218270a03521bf2fb551f

  • SHA256

    f7f59d80179f31ed9a0ca38fb3bf287b550334ffc53dd7378ce54f92f1124877

  • SHA512

    f4dbfda6b284a075d8484eaa82c91fede8031a6b7c20aa5869d652772c97f1272d2c0cae32cbd5e8c454caa488578b7b2190984e21857be453a1b724b2ef7fc0

  • SSDEEP

    12288:LMrNy90B/lxDo8Xg/3GYsec8Yn4GWzWVwFSv732hu1K:WyujDoEg/GDetY4GPVxhw

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7f59d80179f31ed9a0ca38fb3bf287b550334ffc53dd7378ce54f92f1124877.exe
    "C:\Users\Admin\AppData\Local\Temp\f7f59d80179f31ed9a0ca38fb3bf287b550334ffc53dd7378ce54f92f1124877.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4624
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziip6154.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziip6154.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4788
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr337334.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr337334.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5068
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku499885.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku499885.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:688
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 688 -s 1344
          4⤵
          • Program crash
          PID:4528
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr657561.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr657561.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:60
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 688 -ip 688
    1⤵
      PID:4704

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr657561.exe
      Filesize

      175KB

      MD5

      b7d2d1a5a0cd2ab1ee11383e3df5438f

      SHA1

      3381868fe3e0f2324ae91f38cb2a0185309f1ea4

      SHA256

      61016f59f2e80d28ff0a1bbd57ae644c9f4743014bb0795ceffe7072cd08731b

      SHA512

      17f245f11431c64fdc91be590eb9070705793391a25179f8fbf09b5b7e7fb6c154826fe96ff11de6d4c448ce1fad791147acc28f090edab21cac47bfb5e7f5f3

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr657561.exe
      Filesize

      175KB

      MD5

      b7d2d1a5a0cd2ab1ee11383e3df5438f

      SHA1

      3381868fe3e0f2324ae91f38cb2a0185309f1ea4

      SHA256

      61016f59f2e80d28ff0a1bbd57ae644c9f4743014bb0795ceffe7072cd08731b

      SHA512

      17f245f11431c64fdc91be590eb9070705793391a25179f8fbf09b5b7e7fb6c154826fe96ff11de6d4c448ce1fad791147acc28f090edab21cac47bfb5e7f5f3

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziip6154.exe
      Filesize

      380KB

      MD5

      1ab53b2fd3e3ffdb52b1f122459fcce7

      SHA1

      cc673a06870c58ba658ad38c0290e834cab3dea2

      SHA256

      4a6b62a6b8bd6110df705b9eab6effe49f4dbc3d7b63994d71c7cb1f8a35f000

      SHA512

      8e9330c759d811d034e8ae8417c55eb9ace015daf5c1168a34e034f21e260d9bfdb4471fda90fae0f16d9840c336c839170a3b92f57c1b1fdb61d254e8a11871

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziip6154.exe
      Filesize

      380KB

      MD5

      1ab53b2fd3e3ffdb52b1f122459fcce7

      SHA1

      cc673a06870c58ba658ad38c0290e834cab3dea2

      SHA256

      4a6b62a6b8bd6110df705b9eab6effe49f4dbc3d7b63994d71c7cb1f8a35f000

      SHA512

      8e9330c759d811d034e8ae8417c55eb9ace015daf5c1168a34e034f21e260d9bfdb4471fda90fae0f16d9840c336c839170a3b92f57c1b1fdb61d254e8a11871

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr337334.exe
      Filesize

      15KB

      MD5

      5cde7ecec51a8bd4f66b9927c7476f3f

      SHA1

      5439d11b4e3c5041c5478b1e181f66a54dfae3cd

      SHA256

      2c06178a5a00b316fd1b723f93bb6e7de74026168c85017982bf86425188d851

      SHA512

      ab5c28d9267232342450073c748c5fbbce4983b5e0d7a9d53667ef1220d3bfc3e4429d8a9920ea87a9385bfdfff87a63d74594cb450f78529ee58c9bac321d80

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr337334.exe
      Filesize

      15KB

      MD5

      5cde7ecec51a8bd4f66b9927c7476f3f

      SHA1

      5439d11b4e3c5041c5478b1e181f66a54dfae3cd

      SHA256

      2c06178a5a00b316fd1b723f93bb6e7de74026168c85017982bf86425188d851

      SHA512

      ab5c28d9267232342450073c748c5fbbce4983b5e0d7a9d53667ef1220d3bfc3e4429d8a9920ea87a9385bfdfff87a63d74594cb450f78529ee58c9bac321d80

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku499885.exe
      Filesize

      294KB

      MD5

      dcb72ecab5f87c11c9cf0df49fc9e876

      SHA1

      3c95345470ed6164d5815027f0a0000ef9c542d6

      SHA256

      609d92e898356d91dd015f79b1d5cc1019217a7c0740e5a2abbdba75c1d9c5c7

      SHA512

      b4860e1e76ff89d1fdfc2be829966210076756810b0fa3e693231ce902d1d8737edcab8bee11f60271fcdb3bc092cff414e86c7ebbd1da73a33b706dca5dd681

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku499885.exe
      Filesize

      294KB

      MD5

      dcb72ecab5f87c11c9cf0df49fc9e876

      SHA1

      3c95345470ed6164d5815027f0a0000ef9c542d6

      SHA256

      609d92e898356d91dd015f79b1d5cc1019217a7c0740e5a2abbdba75c1d9c5c7

      SHA512

      b4860e1e76ff89d1fdfc2be829966210076756810b0fa3e693231ce902d1d8737edcab8bee11f60271fcdb3bc092cff414e86c7ebbd1da73a33b706dca5dd681

    • memory/60-1086-0x0000000000ED0000-0x0000000000F02000-memory.dmp
      Filesize

      200KB

    • memory/60-1087-0x0000000005B10000-0x0000000005B20000-memory.dmp
      Filesize

      64KB

    • memory/688-191-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-201-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-155-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-156-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-158-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-160-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-162-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-166-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-168-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-164-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-170-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-172-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-174-0x00000000025E0000-0x00000000025F0000-memory.dmp
      Filesize

      64KB

    • memory/688-176-0x00000000025E0000-0x00000000025F0000-memory.dmp
      Filesize

      64KB

    • memory/688-178-0x00000000025E0000-0x00000000025F0000-memory.dmp
      Filesize

      64KB

    • memory/688-175-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-179-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-181-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-183-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-185-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-187-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-189-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-153-0x0000000000630000-0x000000000067B000-memory.dmp
      Filesize

      300KB

    • memory/688-193-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-195-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-197-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-199-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-154-0x0000000004C40000-0x00000000051E4000-memory.dmp
      Filesize

      5.6MB

    • memory/688-203-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-205-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-207-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-209-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-211-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-213-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-215-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-217-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-219-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-221-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/688-1064-0x00000000052F0000-0x0000000005908000-memory.dmp
      Filesize

      6.1MB

    • memory/688-1065-0x0000000005910000-0x0000000005A1A000-memory.dmp
      Filesize

      1.0MB

    • memory/688-1066-0x00000000027B0000-0x00000000027C2000-memory.dmp
      Filesize

      72KB

    • memory/688-1067-0x00000000025E0000-0x00000000025F0000-memory.dmp
      Filesize

      64KB

    • memory/688-1068-0x0000000005A20000-0x0000000005A5C000-memory.dmp
      Filesize

      240KB

    • memory/688-1070-0x00000000025E0000-0x00000000025F0000-memory.dmp
      Filesize

      64KB

    • memory/688-1071-0x00000000025E0000-0x00000000025F0000-memory.dmp
      Filesize

      64KB

    • memory/688-1072-0x00000000025E0000-0x00000000025F0000-memory.dmp
      Filesize

      64KB

    • memory/688-1073-0x0000000005CF0000-0x0000000005D82000-memory.dmp
      Filesize

      584KB

    • memory/688-1074-0x0000000005D90000-0x0000000005DF6000-memory.dmp
      Filesize

      408KB

    • memory/688-1075-0x00000000066F0000-0x0000000006766000-memory.dmp
      Filesize

      472KB

    • memory/688-1076-0x0000000006780000-0x00000000067D0000-memory.dmp
      Filesize

      320KB

    • memory/688-1077-0x00000000025E0000-0x00000000025F0000-memory.dmp
      Filesize

      64KB

    • memory/688-1078-0x0000000006810000-0x00000000069D2000-memory.dmp
      Filesize

      1.8MB

    • memory/688-1079-0x00000000069E0000-0x0000000006F0C000-memory.dmp
      Filesize

      5.2MB

    • memory/5068-147-0x0000000000F60000-0x0000000000F6A000-memory.dmp
      Filesize

      40KB