Analysis

  • max time kernel
    56s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 21:35

General

  • Target

    5e2704950c35b9eda147c06c3e64fe50f6c7398b23152554d73a40f21e0f09e2.exe

  • Size

    522KB

  • MD5

    fe1c27f23545f548b5d8fdb161ec63aa

  • SHA1

    b8f217c270974112801d4ca373010388d6beec43

  • SHA256

    5e2704950c35b9eda147c06c3e64fe50f6c7398b23152554d73a40f21e0f09e2

  • SHA512

    5b58c8966276ed02507eb568dfab014dfcb270a9c130c228dcd1a6c1dce5992e47c9c001e5e62e13365da5ce6c20040496a2b3a007867ff8a931df82b1fd4382

  • SSDEEP

    12288:3Mrqy90tIz+qDVOPe4R7WPJXZ8ZV44vzWiw6RvXKvX+j7RaT:hyEJqDVOPRh6GZG46iMekT

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e2704950c35b9eda147c06c3e64fe50f6c7398b23152554d73a40f21e0f09e2.exe
    "C:\Users\Admin\AppData\Local\Temp\5e2704950c35b9eda147c06c3e64fe50f6c7398b23152554d73a40f21e0f09e2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4976
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPs3161.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPs3161.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2608
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr002803.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr002803.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2612
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku618670.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku618670.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2076
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2076 -s 1356
          4⤵
          • Program crash
          PID:4164
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr943570.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr943570.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1324
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2076 -ip 2076
    1⤵
      PID:1660

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr943570.exe
      Filesize

      175KB

      MD5

      aedb79d4fb30cd17610bf2f7d36f8b73

      SHA1

      7690f9abe09d60c1ba53cfa3410fa500aa3d30bb

      SHA256

      db9aba06a07e07b4c52c4b9a6118020e3d968c8422a354423f5de3f0d23022fa

      SHA512

      8fc21d28c4b1b85f0800408e36cfd784692b82687421da2ded1cedd678e38a9cf1072f42607f0ec34d79f619fdae09eb7b88deec0f4026bb0e443b631c181556

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr943570.exe
      Filesize

      175KB

      MD5

      aedb79d4fb30cd17610bf2f7d36f8b73

      SHA1

      7690f9abe09d60c1ba53cfa3410fa500aa3d30bb

      SHA256

      db9aba06a07e07b4c52c4b9a6118020e3d968c8422a354423f5de3f0d23022fa

      SHA512

      8fc21d28c4b1b85f0800408e36cfd784692b82687421da2ded1cedd678e38a9cf1072f42607f0ec34d79f619fdae09eb7b88deec0f4026bb0e443b631c181556

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPs3161.exe
      Filesize

      380KB

      MD5

      2f9daf33d6dc42b9be9a73311e8f96a5

      SHA1

      ca67494a9eb12da64753221383c09e8e711e4e65

      SHA256

      0fb431b8dbae899682633b7336fd922e2aeaaf84381032d8bbb92d575e846168

      SHA512

      77c62eb01fa61669e8aed018de4220a09293508d2bfb75bd22b76c7ea44a53c88cb77c6cf57f6b5608a47e6b6cadb5fb526c3012b2bd3379fd8d75edc73b4214

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPs3161.exe
      Filesize

      380KB

      MD5

      2f9daf33d6dc42b9be9a73311e8f96a5

      SHA1

      ca67494a9eb12da64753221383c09e8e711e4e65

      SHA256

      0fb431b8dbae899682633b7336fd922e2aeaaf84381032d8bbb92d575e846168

      SHA512

      77c62eb01fa61669e8aed018de4220a09293508d2bfb75bd22b76c7ea44a53c88cb77c6cf57f6b5608a47e6b6cadb5fb526c3012b2bd3379fd8d75edc73b4214

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr002803.exe
      Filesize

      15KB

      MD5

      8ea6140d624386ff01ff5264be4c3349

      SHA1

      57e79a4a831d3684780343b0fbf45d5b6bf71045

      SHA256

      f136e4a5f28d9b0261819ff0a5349a2c65b19609601de38ee92b8cf7dca0cbc5

      SHA512

      f278a8120a95b1ff71f37880abf4b59c64566c19475d250f681caefe46d44fb145030b4fe57f49200bc6dadf47f6a11fd45119941f641ed089262c7fdb4ec199

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr002803.exe
      Filesize

      15KB

      MD5

      8ea6140d624386ff01ff5264be4c3349

      SHA1

      57e79a4a831d3684780343b0fbf45d5b6bf71045

      SHA256

      f136e4a5f28d9b0261819ff0a5349a2c65b19609601de38ee92b8cf7dca0cbc5

      SHA512

      f278a8120a95b1ff71f37880abf4b59c64566c19475d250f681caefe46d44fb145030b4fe57f49200bc6dadf47f6a11fd45119941f641ed089262c7fdb4ec199

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku618670.exe
      Filesize

      294KB

      MD5

      aa4e68a5d5558ee9d4ce82c2f374b661

      SHA1

      0ba8c5501f6aa08afbc5afe608e6327905fc4239

      SHA256

      f6f4514e6999c3ac56f14deffb6e01e80f4e148b8ea796f346e8b83c25b1a155

      SHA512

      ea42e4a7eae4f6b24d772a67c359e96b51b8604f27346053999e382b33492ea03430607e417a043caa6025a7522ec553be270beb90d242383fbe08ba590c25aa

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku618670.exe
      Filesize

      294KB

      MD5

      aa4e68a5d5558ee9d4ce82c2f374b661

      SHA1

      0ba8c5501f6aa08afbc5afe608e6327905fc4239

      SHA256

      f6f4514e6999c3ac56f14deffb6e01e80f4e148b8ea796f346e8b83c25b1a155

      SHA512

      ea42e4a7eae4f6b24d772a67c359e96b51b8604f27346053999e382b33492ea03430607e417a043caa6025a7522ec553be270beb90d242383fbe08ba590c25aa

    • memory/1324-1085-0x0000000000A20000-0x0000000000A52000-memory.dmp
      Filesize

      200KB

    • memory/1324-1086-0x0000000005300000-0x0000000005310000-memory.dmp
      Filesize

      64KB

    • memory/2076-191-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-201-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-155-0x0000000004DC0000-0x0000000005364000-memory.dmp
      Filesize

      5.6MB

    • memory/2076-156-0x0000000004DB0000-0x0000000004DC0000-memory.dmp
      Filesize

      64KB

    • memory/2076-157-0x0000000004DB0000-0x0000000004DC0000-memory.dmp
      Filesize

      64KB

    • memory/2076-158-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-159-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-161-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-163-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-165-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-167-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-169-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-171-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-173-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-175-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-177-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-179-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-181-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-183-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-185-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-187-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-189-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-153-0x0000000000830000-0x000000000087B000-memory.dmp
      Filesize

      300KB

    • memory/2076-193-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-195-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-197-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-199-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-154-0x0000000004DB0000-0x0000000004DC0000-memory.dmp
      Filesize

      64KB

    • memory/2076-203-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-205-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-207-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-209-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-211-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-213-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-215-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-217-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-219-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-221-0x0000000002600000-0x000000000263F000-memory.dmp
      Filesize

      252KB

    • memory/2076-1064-0x0000000005370000-0x0000000005988000-memory.dmp
      Filesize

      6.1MB

    • memory/2076-1065-0x0000000005990000-0x0000000005A9A000-memory.dmp
      Filesize

      1.0MB

    • memory/2076-1066-0x0000000004CF0000-0x0000000004D02000-memory.dmp
      Filesize

      72KB

    • memory/2076-1067-0x0000000004D10000-0x0000000004D4C000-memory.dmp
      Filesize

      240KB

    • memory/2076-1068-0x0000000004DB0000-0x0000000004DC0000-memory.dmp
      Filesize

      64KB

    • memory/2076-1070-0x0000000004DB0000-0x0000000004DC0000-memory.dmp
      Filesize

      64KB

    • memory/2076-1071-0x0000000004DB0000-0x0000000004DC0000-memory.dmp
      Filesize

      64KB

    • memory/2076-1072-0x0000000004DB0000-0x0000000004DC0000-memory.dmp
      Filesize

      64KB

    • memory/2076-1073-0x0000000005CF0000-0x0000000005D56000-memory.dmp
      Filesize

      408KB

    • memory/2076-1074-0x00000000063B0000-0x0000000006442000-memory.dmp
      Filesize

      584KB

    • memory/2076-1075-0x0000000006700000-0x0000000006776000-memory.dmp
      Filesize

      472KB

    • memory/2076-1076-0x0000000006780000-0x00000000067D0000-memory.dmp
      Filesize

      320KB

    • memory/2076-1077-0x0000000006930000-0x0000000006AF2000-memory.dmp
      Filesize

      1.8MB

    • memory/2076-1078-0x0000000006B00000-0x000000000702C000-memory.dmp
      Filesize

      5.2MB

    • memory/2076-1079-0x0000000004DB0000-0x0000000004DC0000-memory.dmp
      Filesize

      64KB

    • memory/2612-147-0x0000000000840000-0x000000000084A000-memory.dmp
      Filesize

      40KB