Analysis

  • max time kernel
    82s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 21:41

General

  • Target

    e4fe88f514322177a2910b2772267b199d8c1db1839465e596c6565f4ceee912.exe

  • Size

    521KB

  • MD5

    f8d8599f4771dd76d044b3903a447637

  • SHA1

    dfd7e9655f05ab38d1ff423664fb596d4691cda4

  • SHA256

    e4fe88f514322177a2910b2772267b199d8c1db1839465e596c6565f4ceee912

  • SHA512

    e97e13ec25508e987efa050a697657c46405696d7ecbfcc4a4421399c6975380738991faf4afa2cd0afab34127cba9d7da633f4a3302af9921a3e0615105cf5f

  • SSDEEP

    12288:QMruy90ISCJzqj5XFIq/nfTrJVP8K7449zW3R9Oe7mAV:uybadqq70Kk4A3R9OeH

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4fe88f514322177a2910b2772267b199d8c1db1839465e596c6565f4ceee912.exe
    "C:\Users\Admin\AppData\Local\Temp\e4fe88f514322177a2910b2772267b199d8c1db1839465e596c6565f4ceee912.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3920
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixH8476.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixH8476.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3060
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr785904.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr785904.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5080
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku476756.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku476756.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:112
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 112 -s 1672
          4⤵
          • Program crash
          PID:5100
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr000164.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr000164.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4396
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 112 -ip 112
    1⤵
      PID:4300

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr000164.exe

      Filesize

      175KB

      MD5

      e6433dce4b18da2cc90faada22cb1d50

      SHA1

      cca62e812ca5b8e650b3a88a1b3ecc9007400d7c

      SHA256

      24637c4d1bde940d0b28a70d738172bae9e37c51dd8608bc13f9413c12242de3

      SHA512

      13cdd2a00b4e895d99e9f10c8095cab2682096915af528804dc0cccb36c40b5973899bdde6e8a3c22ef2e25d7f4d898fa93a329d1c08c36db2a7f94425505ea1

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr000164.exe

      Filesize

      175KB

      MD5

      e6433dce4b18da2cc90faada22cb1d50

      SHA1

      cca62e812ca5b8e650b3a88a1b3ecc9007400d7c

      SHA256

      24637c4d1bde940d0b28a70d738172bae9e37c51dd8608bc13f9413c12242de3

      SHA512

      13cdd2a00b4e895d99e9f10c8095cab2682096915af528804dc0cccb36c40b5973899bdde6e8a3c22ef2e25d7f4d898fa93a329d1c08c36db2a7f94425505ea1

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixH8476.exe

      Filesize

      379KB

      MD5

      f4029cf68018709a48529fcf0343987b

      SHA1

      9921a3d11c8379dedda9c81098aac45e2accce21

      SHA256

      cf7a413c67e4e0640a62151ad563436a58ec8599515a537f39b5bc3f6f0e52af

      SHA512

      14e1a441384d5457609bbdf8a47d31c40f2e455dbd484965e807d6c4a0cdba84d090c91bd4b39e0ea9bf7a87bf093453ae8df701eb2720b951244878aaf5d8de

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zixH8476.exe

      Filesize

      379KB

      MD5

      f4029cf68018709a48529fcf0343987b

      SHA1

      9921a3d11c8379dedda9c81098aac45e2accce21

      SHA256

      cf7a413c67e4e0640a62151ad563436a58ec8599515a537f39b5bc3f6f0e52af

      SHA512

      14e1a441384d5457609bbdf8a47d31c40f2e455dbd484965e807d6c4a0cdba84d090c91bd4b39e0ea9bf7a87bf093453ae8df701eb2720b951244878aaf5d8de

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr785904.exe

      Filesize

      15KB

      MD5

      27e4a495b2168b2964127f58501fe3b9

      SHA1

      1f1c8861dfdc021455975c5d20b3c081548b5c7b

      SHA256

      092acbb0e785cb3e61448150e2cd0986a165ddb6f40497b095134957513a491f

      SHA512

      0e60a80b6d9b95b88dcefb3110836b12b81b5192ee626904e30453f4b3a5812d295b88ebdaed41564fe4eac01edd4fad33d89c54d20da8248e0209fcddb4ef53

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr785904.exe

      Filesize

      15KB

      MD5

      27e4a495b2168b2964127f58501fe3b9

      SHA1

      1f1c8861dfdc021455975c5d20b3c081548b5c7b

      SHA256

      092acbb0e785cb3e61448150e2cd0986a165ddb6f40497b095134957513a491f

      SHA512

      0e60a80b6d9b95b88dcefb3110836b12b81b5192ee626904e30453f4b3a5812d295b88ebdaed41564fe4eac01edd4fad33d89c54d20da8248e0209fcddb4ef53

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku476756.exe

      Filesize

      294KB

      MD5

      1321c634e7eeee5734bed3850cef99a9

      SHA1

      e9a665a99a6816a928675a95339d8017ee78eb33

      SHA256

      2dbd1a21be1100b2846df51948a229c9a7cd1dccabd8af20194e774d1df95bfd

      SHA512

      41171b663b8a7f87f7bcb6a350e0da07f1db2de7f0a233d30d308eff7037fa47e5df26662aab066f6358e104abfbb26ae3c3ab2ff31b331cc2afa38b9ddca281

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku476756.exe

      Filesize

      294KB

      MD5

      1321c634e7eeee5734bed3850cef99a9

      SHA1

      e9a665a99a6816a928675a95339d8017ee78eb33

      SHA256

      2dbd1a21be1100b2846df51948a229c9a7cd1dccabd8af20194e774d1df95bfd

      SHA512

      41171b663b8a7f87f7bcb6a350e0da07f1db2de7f0a233d30d308eff7037fa47e5df26662aab066f6358e104abfbb26ae3c3ab2ff31b331cc2afa38b9ddca281

    • memory/112-154-0x0000000002110000-0x000000000215B000-memory.dmp

      Filesize

      300KB

    • memory/112-155-0x0000000002560000-0x0000000002570000-memory.dmp

      Filesize

      64KB

    • memory/112-156-0x0000000004A20000-0x0000000004FC4000-memory.dmp

      Filesize

      5.6MB

    • memory/112-157-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-158-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-160-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-162-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-164-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-166-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-168-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-170-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-172-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-174-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-176-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-179-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-178-0x0000000002560000-0x0000000002570000-memory.dmp

      Filesize

      64KB

    • memory/112-182-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-180-0x0000000002560000-0x0000000002570000-memory.dmp

      Filesize

      64KB

    • memory/112-184-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-186-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-188-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-190-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-192-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-194-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-196-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-198-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-200-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-202-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-204-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-206-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-208-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-212-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-210-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-214-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-218-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-216-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-220-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-222-0x0000000005020000-0x000000000505F000-memory.dmp

      Filesize

      252KB

    • memory/112-1065-0x0000000005200000-0x0000000005818000-memory.dmp

      Filesize

      6.1MB

    • memory/112-1066-0x00000000058A0000-0x00000000059AA000-memory.dmp

      Filesize

      1.0MB

    • memory/112-1067-0x00000000059E0000-0x00000000059F2000-memory.dmp

      Filesize

      72KB

    • memory/112-1068-0x0000000005A40000-0x0000000005A7C000-memory.dmp

      Filesize

      240KB

    • memory/112-1069-0x0000000002560000-0x0000000002570000-memory.dmp

      Filesize

      64KB

    • memory/112-1071-0x0000000002560000-0x0000000002570000-memory.dmp

      Filesize

      64KB

    • memory/112-1072-0x0000000002560000-0x0000000002570000-memory.dmp

      Filesize

      64KB

    • memory/112-1073-0x0000000005CF0000-0x0000000005D82000-memory.dmp

      Filesize

      584KB

    • memory/112-1074-0x0000000005D90000-0x0000000005DF6000-memory.dmp

      Filesize

      408KB

    • memory/112-1075-0x0000000002560000-0x0000000002570000-memory.dmp

      Filesize

      64KB

    • memory/112-1076-0x0000000007760000-0x0000000007922000-memory.dmp

      Filesize

      1.8MB

    • memory/112-1077-0x0000000007940000-0x0000000007E6C000-memory.dmp

      Filesize

      5.2MB

    • memory/112-1079-0x0000000002360000-0x00000000023D6000-memory.dmp

      Filesize

      472KB

    • memory/112-1080-0x0000000007FB0000-0x0000000008000000-memory.dmp

      Filesize

      320KB

    • memory/4396-1086-0x0000000000B90000-0x0000000000BC2000-memory.dmp

      Filesize

      200KB

    • memory/4396-1087-0x00000000057F0000-0x0000000005800000-memory.dmp

      Filesize

      64KB

    • memory/4396-1088-0x00000000057F0000-0x0000000005800000-memory.dmp

      Filesize

      64KB

    • memory/5080-147-0x0000000000180000-0x000000000018A000-memory.dmp

      Filesize

      40KB