Analysis

  • max time kernel
    131s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 21:35

General

  • Target

    1491354f3662a03e43525c73bb1e375fc1a3677c4adba1668f236ff40c621a59.exe

  • Size

    658KB

  • MD5

    dcf623a5f0c5272b0cf43f134cfc19f9

  • SHA1

    ba182c4f46149aa970d718de50a97e542a993f58

  • SHA256

    1491354f3662a03e43525c73bb1e375fc1a3677c4adba1668f236ff40c621a59

  • SHA512

    393bb0f6f3c1a6e66c17f1228961c46fe9405a17b81628cc686fd19ec89c5ad33b273f6cd448643551b2bcf812c430730500d77783dfe5eae854713b939d89c4

  • SSDEEP

    12288:wMrry901XbVR0JuRLecyMmztlcDPisS8Lt8gQfCme44wzWKBt8vvHQT:Lyk0JWqcyHtqDPlS8h0KmX45KGQT

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1491354f3662a03e43525c73bb1e375fc1a3677c4adba1668f236ff40c621a59.exe
    "C:\Users\Admin\AppData\Local\Temp\1491354f3662a03e43525c73bb1e375fc1a3677c4adba1668f236ff40c621a59.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4224
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un325506.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un325506.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4188
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8904.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8904.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4752
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4752 -s 1084
          4⤵
          • Program crash
          PID:216
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8966.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8966.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3704
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3704 -s 1696
          4⤵
          • Program crash
          PID:4352
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si162721.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si162721.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4492
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4752 -ip 4752
    1⤵
      PID:264
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 3704 -ip 3704
      1⤵
        PID:4932

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si162721.exe
        Filesize

        175KB

        MD5

        37cbf1373dcd35b39dd9e761c492dec4

        SHA1

        a502778cb0e1cef64b4bcfa85ab823a7ab96ce64

        SHA256

        4e67ef24acc487e44b9a8b63fc37cf469d544b64e1e93a466252c05bb718b3c5

        SHA512

        2c21ba7cc79c8e396933441fcfa67722a49cf13e1ca21773ffe7b03ad48a9d7393ca9f77d82f8affe61ad1728ef07170243a2d5cbcf1aec2a1cdaa7e75d7a227

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si162721.exe
        Filesize

        175KB

        MD5

        37cbf1373dcd35b39dd9e761c492dec4

        SHA1

        a502778cb0e1cef64b4bcfa85ab823a7ab96ce64

        SHA256

        4e67ef24acc487e44b9a8b63fc37cf469d544b64e1e93a466252c05bb718b3c5

        SHA512

        2c21ba7cc79c8e396933441fcfa67722a49cf13e1ca21773ffe7b03ad48a9d7393ca9f77d82f8affe61ad1728ef07170243a2d5cbcf1aec2a1cdaa7e75d7a227

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un325506.exe
        Filesize

        516KB

        MD5

        5391706d3dd896ad63fe03a4f65b9b06

        SHA1

        8f2bf2aa43fc6764c310cfa9959eaea57af30447

        SHA256

        4c2ad8cc981cec2b74dd4242e3d9dae0c16ce41aa9c2d21f82a7bda707045233

        SHA512

        86c3f2d4ac967474fc45001383be30016a28f0734cdf60d44256d4cf11c72eb21bed2e82fa690ca3fdaee9e55666281cc6ca91cf1e43a883db978326dd69d15d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un325506.exe
        Filesize

        516KB

        MD5

        5391706d3dd896ad63fe03a4f65b9b06

        SHA1

        8f2bf2aa43fc6764c310cfa9959eaea57af30447

        SHA256

        4c2ad8cc981cec2b74dd4242e3d9dae0c16ce41aa9c2d21f82a7bda707045233

        SHA512

        86c3f2d4ac967474fc45001383be30016a28f0734cdf60d44256d4cf11c72eb21bed2e82fa690ca3fdaee9e55666281cc6ca91cf1e43a883db978326dd69d15d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8904.exe
        Filesize

        235KB

        MD5

        1bed560f496225fcee85d7fd1c5b8f9d

        SHA1

        0d9ee435d8f23e9b62e585d6fe1b33c15e1cd060

        SHA256

        3f902af375032fa7a969b1bfb604c31c67ee1a8d15c2c6d20b8a1647afddadc3

        SHA512

        7bb398aac6578c3bf9c68dea4b5dcd3870c5a6a118004b4b7de4d09a1846d6e2799e55ecc888a681a052b36642173c46c32da5fff0142de7b6845b8e314466cd

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8904.exe
        Filesize

        235KB

        MD5

        1bed560f496225fcee85d7fd1c5b8f9d

        SHA1

        0d9ee435d8f23e9b62e585d6fe1b33c15e1cd060

        SHA256

        3f902af375032fa7a969b1bfb604c31c67ee1a8d15c2c6d20b8a1647afddadc3

        SHA512

        7bb398aac6578c3bf9c68dea4b5dcd3870c5a6a118004b4b7de4d09a1846d6e2799e55ecc888a681a052b36642173c46c32da5fff0142de7b6845b8e314466cd

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8966.exe
        Filesize

        294KB

        MD5

        bb4fa4f9a3120c95404290864ac34ca2

        SHA1

        94d528966f957d901391ae812c6da7bca22a078f

        SHA256

        973e103e51d754d00a2c814a943aba6a0b4c468579615bbe2e224d8956e80406

        SHA512

        9f278b70011abd111a0d4750b7e3c911d1bb52cc338cf0264ac14d1e219b5076693e1455a82e1db520c3bbde307be6ae9e2294295a92d8aaefd42a0fe15127c9

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8966.exe
        Filesize

        294KB

        MD5

        bb4fa4f9a3120c95404290864ac34ca2

        SHA1

        94d528966f957d901391ae812c6da7bca22a078f

        SHA256

        973e103e51d754d00a2c814a943aba6a0b4c468579615bbe2e224d8956e80406

        SHA512

        9f278b70011abd111a0d4750b7e3c911d1bb52cc338cf0264ac14d1e219b5076693e1455a82e1db520c3bbde307be6ae9e2294295a92d8aaefd42a0fe15127c9

      • memory/3704-371-0x0000000000840000-0x0000000000850000-memory.dmp
        Filesize

        64KB

      • memory/3704-1102-0x00000000058A0000-0x00000000058B2000-memory.dmp
        Filesize

        72KB

      • memory/3704-1114-0x00000000068B0000-0x0000000006DDC000-memory.dmp
        Filesize

        5.2MB

      • memory/3704-1113-0x0000000006690000-0x0000000006852000-memory.dmp
        Filesize

        1.8MB

      • memory/3704-1112-0x0000000000840000-0x0000000000850000-memory.dmp
        Filesize

        64KB

      • memory/3704-1111-0x00000000064E0000-0x0000000006530000-memory.dmp
        Filesize

        320KB

      • memory/3704-1110-0x0000000006450000-0x00000000064C6000-memory.dmp
        Filesize

        472KB

      • memory/3704-1109-0x0000000000840000-0x0000000000850000-memory.dmp
        Filesize

        64KB

      • memory/3704-1108-0x0000000000840000-0x0000000000850000-memory.dmp
        Filesize

        64KB

      • memory/3704-1107-0x0000000006270000-0x0000000006302000-memory.dmp
        Filesize

        584KB

      • memory/3704-1106-0x0000000005BB0000-0x0000000005C16000-memory.dmp
        Filesize

        408KB

      • memory/3704-1104-0x0000000000840000-0x0000000000850000-memory.dmp
        Filesize

        64KB

      • memory/3704-1103-0x00000000058C0000-0x00000000058FC000-memory.dmp
        Filesize

        240KB

      • memory/3704-1101-0x0000000005760000-0x000000000586A000-memory.dmp
        Filesize

        1.0MB

      • memory/3704-1100-0x00000000050C0000-0x00000000056D8000-memory.dmp
        Filesize

        6.1MB

      • memory/3704-369-0x0000000000840000-0x0000000000850000-memory.dmp
        Filesize

        64KB

      • memory/3704-367-0x0000000000770000-0x00000000007BB000-memory.dmp
        Filesize

        300KB

      • memory/3704-224-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/3704-222-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/3704-220-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/3704-218-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/3704-216-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/3704-214-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/3704-191-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/3704-192-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/3704-194-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/3704-196-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/3704-198-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/3704-200-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/3704-202-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/3704-204-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/3704-206-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/3704-208-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/3704-210-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/3704-212-0x0000000002570000-0x00000000025AF000-memory.dmp
        Filesize

        252KB

      • memory/4492-1120-0x0000000000150000-0x0000000000182000-memory.dmp
        Filesize

        200KB

      • memory/4492-1123-0x00000000049E0000-0x00000000049F0000-memory.dmp
        Filesize

        64KB

      • memory/4492-1121-0x00000000049E0000-0x00000000049F0000-memory.dmp
        Filesize

        64KB

      • memory/4752-172-0x00000000023A0000-0x00000000023B2000-memory.dmp
        Filesize

        72KB

      • memory/4752-168-0x00000000023A0000-0x00000000023B2000-memory.dmp
        Filesize

        72KB

      • memory/4752-182-0x0000000004C90000-0x0000000004CA0000-memory.dmp
        Filesize

        64KB

      • memory/4752-181-0x0000000000400000-0x00000000004A9000-memory.dmp
        Filesize

        676KB

      • memory/4752-176-0x0000000004C90000-0x0000000004CA0000-memory.dmp
        Filesize

        64KB

      • memory/4752-150-0x0000000004CA0000-0x0000000005244000-memory.dmp
        Filesize

        5.6MB

      • memory/4752-180-0x00000000023A0000-0x00000000023B2000-memory.dmp
        Filesize

        72KB

      • memory/4752-178-0x0000000004C90000-0x0000000004CA0000-memory.dmp
        Filesize

        64KB

      • memory/4752-154-0x00000000023A0000-0x00000000023B2000-memory.dmp
        Filesize

        72KB

      • memory/4752-177-0x00000000023A0000-0x00000000023B2000-memory.dmp
        Filesize

        72KB

      • memory/4752-174-0x00000000023A0000-0x00000000023B2000-memory.dmp
        Filesize

        72KB

      • memory/4752-151-0x00000000023A0000-0x00000000023B2000-memory.dmp
        Filesize

        72KB

      • memory/4752-170-0x00000000023A0000-0x00000000023B2000-memory.dmp
        Filesize

        72KB

      • memory/4752-184-0x0000000004C90000-0x0000000004CA0000-memory.dmp
        Filesize

        64KB

      • memory/4752-166-0x00000000023A0000-0x00000000023B2000-memory.dmp
        Filesize

        72KB

      • memory/4752-164-0x00000000023A0000-0x00000000023B2000-memory.dmp
        Filesize

        72KB

      • memory/4752-162-0x00000000023A0000-0x00000000023B2000-memory.dmp
        Filesize

        72KB

      • memory/4752-160-0x00000000023A0000-0x00000000023B2000-memory.dmp
        Filesize

        72KB

      • memory/4752-158-0x00000000023A0000-0x00000000023B2000-memory.dmp
        Filesize

        72KB

      • memory/4752-156-0x00000000023A0000-0x00000000023B2000-memory.dmp
        Filesize

        72KB

      • memory/4752-149-0x0000000004C90000-0x0000000004CA0000-memory.dmp
        Filesize

        64KB

      • memory/4752-148-0x0000000000530000-0x000000000055D000-memory.dmp
        Filesize

        180KB

      • memory/4752-185-0x0000000004C90000-0x0000000004CA0000-memory.dmp
        Filesize

        64KB

      • memory/4752-186-0x0000000000400000-0x00000000004A9000-memory.dmp
        Filesize

        676KB

      • memory/4752-152-0x00000000023A0000-0x00000000023B2000-memory.dmp
        Filesize

        72KB