Analysis

  • max time kernel
    49s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 21:44

General

  • Target

    2229fa6507d3c910f80ffdf6d83cefe82baf903d59c29855a83e3e36122ce140.exe

  • Size

    658KB

  • MD5

    fc1a0a89c9c0c043a269e2cd2ac1db8f

  • SHA1

    4092b305a6ca52c669b5c85c201eb241e68c8a72

  • SHA256

    2229fa6507d3c910f80ffdf6d83cefe82baf903d59c29855a83e3e36122ce140

  • SHA512

    b5306343444a7c88404cee84426b6269b89f2318443e2a4e0015adcf600d838545a7be8e9b2151b057053a88ef595891992e944ef78af4dd0b4b644ab951d7a5

  • SSDEEP

    12288:oMrIy9020prO8PC9PIujlQsGagtZe/GBP44UzWKdE8vBOm:wy9uvs7WsVgKeBQ49K5

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2229fa6507d3c910f80ffdf6d83cefe82baf903d59c29855a83e3e36122ce140.exe
    "C:\Users\Admin\AppData\Local\Temp\2229fa6507d3c910f80ffdf6d83cefe82baf903d59c29855a83e3e36122ce140.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un416341.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un416341.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2196
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8059.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8059.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:64
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 64 -s 1088
          4⤵
          • Program crash
          PID:2920
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6386.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6386.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2660
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 1328
          4⤵
          • Program crash
          PID:2092
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si284033.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si284033.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1564
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 64 -ip 64
    1⤵
      PID:180
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2660 -ip 2660
      1⤵
        PID:3136

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si284033.exe
        Filesize

        175KB

        MD5

        8539f630cbca59e36d390798328eed3b

        SHA1

        237e6b3328a0648218cae4ab0d6ae018987ee55b

        SHA256

        67c72dbcd5df3bbaa5eca78f30250fe58682626021b99bfa6c9a217472233478

        SHA512

        6ca7255f920e591b6c2e266e5842a07ae99cc04523ab993d536c7130c8ac5784d3ff8946964582930153d714f62582622f7822b3686ab154013ccb7711ae713c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si284033.exe
        Filesize

        175KB

        MD5

        8539f630cbca59e36d390798328eed3b

        SHA1

        237e6b3328a0648218cae4ab0d6ae018987ee55b

        SHA256

        67c72dbcd5df3bbaa5eca78f30250fe58682626021b99bfa6c9a217472233478

        SHA512

        6ca7255f920e591b6c2e266e5842a07ae99cc04523ab993d536c7130c8ac5784d3ff8946964582930153d714f62582622f7822b3686ab154013ccb7711ae713c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un416341.exe
        Filesize

        516KB

        MD5

        8eb7e2729841dac23138cead358899f9

        SHA1

        e01f1d82351f3a02e56e962d97a0cda8bce77be3

        SHA256

        fbddc737d082e3accb6e6724855f95fa8548643e1a64f562d2610b3b774fe38e

        SHA512

        5a71f16a7e00bfbf20d18a8877ef01b173b9b2ad115c55cf6eadd7812a777bfebf338b1c1c5b330e67e47c0cd6dcacd0bb6de32ee24cfba4ea6aab68d6769079

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un416341.exe
        Filesize

        516KB

        MD5

        8eb7e2729841dac23138cead358899f9

        SHA1

        e01f1d82351f3a02e56e962d97a0cda8bce77be3

        SHA256

        fbddc737d082e3accb6e6724855f95fa8548643e1a64f562d2610b3b774fe38e

        SHA512

        5a71f16a7e00bfbf20d18a8877ef01b173b9b2ad115c55cf6eadd7812a777bfebf338b1c1c5b330e67e47c0cd6dcacd0bb6de32ee24cfba4ea6aab68d6769079

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8059.exe
        Filesize

        235KB

        MD5

        232fc9291ac4f84c9c73be009710bb53

        SHA1

        2ff6427f19aab0988e072715a88451b6538edb28

        SHA256

        7e1d82e9591ddb21d4aa459dd127bd3e5ab4764789b6a131a06a7a6e25d5bd7a

        SHA512

        536f99ac0d5f52d833d0280b636faf15290266a7d28c379251d6330ae805516174e8c71b33bab7d280c7bc4ebbe643f0435071527b5dae5af31669dd10f5076c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8059.exe
        Filesize

        235KB

        MD5

        232fc9291ac4f84c9c73be009710bb53

        SHA1

        2ff6427f19aab0988e072715a88451b6538edb28

        SHA256

        7e1d82e9591ddb21d4aa459dd127bd3e5ab4764789b6a131a06a7a6e25d5bd7a

        SHA512

        536f99ac0d5f52d833d0280b636faf15290266a7d28c379251d6330ae805516174e8c71b33bab7d280c7bc4ebbe643f0435071527b5dae5af31669dd10f5076c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6386.exe
        Filesize

        294KB

        MD5

        a7219de101bb9996f0d4273d87ec83cc

        SHA1

        a68a90d5cf6ce1fe9b017f522b2af6fac5861026

        SHA256

        df77a2596a212a2351d28289965df9343e567693367a8d3035f2b041e0977585

        SHA512

        9200deb64fc4b6b17db94a54cff39dbde327544ed6d714b5e21c7fc44d3cd8c68e9948cdfbde424d308450643fc38c3f419ea43990e11afd896f41982c899216

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6386.exe
        Filesize

        294KB

        MD5

        a7219de101bb9996f0d4273d87ec83cc

        SHA1

        a68a90d5cf6ce1fe9b017f522b2af6fac5861026

        SHA256

        df77a2596a212a2351d28289965df9343e567693367a8d3035f2b041e0977585

        SHA512

        9200deb64fc4b6b17db94a54cff39dbde327544ed6d714b5e21c7fc44d3cd8c68e9948cdfbde424d308450643fc38c3f419ea43990e11afd896f41982c899216

      • memory/64-148-0x0000000004C30000-0x00000000051D4000-memory.dmp
        Filesize

        5.6MB

      • memory/64-149-0x0000000000610000-0x000000000063D000-memory.dmp
        Filesize

        180KB

      • memory/64-150-0x0000000004C20000-0x0000000004C30000-memory.dmp
        Filesize

        64KB

      • memory/64-151-0x0000000004C20000-0x0000000004C30000-memory.dmp
        Filesize

        64KB

      • memory/64-152-0x0000000004C20000-0x0000000004C30000-memory.dmp
        Filesize

        64KB

      • memory/64-153-0x0000000002520000-0x0000000002532000-memory.dmp
        Filesize

        72KB

      • memory/64-154-0x0000000002520000-0x0000000002532000-memory.dmp
        Filesize

        72KB

      • memory/64-156-0x0000000002520000-0x0000000002532000-memory.dmp
        Filesize

        72KB

      • memory/64-158-0x0000000002520000-0x0000000002532000-memory.dmp
        Filesize

        72KB

      • memory/64-160-0x0000000002520000-0x0000000002532000-memory.dmp
        Filesize

        72KB

      • memory/64-164-0x0000000002520000-0x0000000002532000-memory.dmp
        Filesize

        72KB

      • memory/64-162-0x0000000002520000-0x0000000002532000-memory.dmp
        Filesize

        72KB

      • memory/64-172-0x0000000002520000-0x0000000002532000-memory.dmp
        Filesize

        72KB

      • memory/64-174-0x0000000002520000-0x0000000002532000-memory.dmp
        Filesize

        72KB

      • memory/64-178-0x0000000002520000-0x0000000002532000-memory.dmp
        Filesize

        72KB

      • memory/64-176-0x0000000002520000-0x0000000002532000-memory.dmp
        Filesize

        72KB

      • memory/64-180-0x0000000002520000-0x0000000002532000-memory.dmp
        Filesize

        72KB

      • memory/64-170-0x0000000002520000-0x0000000002532000-memory.dmp
        Filesize

        72KB

      • memory/64-168-0x0000000002520000-0x0000000002532000-memory.dmp
        Filesize

        72KB

      • memory/64-166-0x0000000002520000-0x0000000002532000-memory.dmp
        Filesize

        72KB

      • memory/64-181-0x0000000000400000-0x00000000004A9000-memory.dmp
        Filesize

        676KB

      • memory/64-182-0x0000000004C20000-0x0000000004C30000-memory.dmp
        Filesize

        64KB

      • memory/64-183-0x0000000004C20000-0x0000000004C30000-memory.dmp
        Filesize

        64KB

      • memory/64-184-0x0000000004C20000-0x0000000004C30000-memory.dmp
        Filesize

        64KB

      • memory/64-186-0x0000000000400000-0x00000000004A9000-memory.dmp
        Filesize

        676KB

      • memory/1564-1123-0x0000000000A40000-0x0000000000A72000-memory.dmp
        Filesize

        200KB

      • memory/1564-1124-0x00000000056D0000-0x00000000056E0000-memory.dmp
        Filesize

        64KB

      • memory/2660-193-0x0000000004C70000-0x0000000004C80000-memory.dmp
        Filesize

        64KB

      • memory/2660-227-0x0000000002540000-0x000000000257F000-memory.dmp
        Filesize

        252KB

      • memory/2660-194-0x0000000002540000-0x000000000257F000-memory.dmp
        Filesize

        252KB

      • memory/2660-195-0x0000000002540000-0x000000000257F000-memory.dmp
        Filesize

        252KB

      • memory/2660-197-0x0000000002540000-0x000000000257F000-memory.dmp
        Filesize

        252KB

      • memory/2660-199-0x0000000002540000-0x000000000257F000-memory.dmp
        Filesize

        252KB

      • memory/2660-201-0x0000000002540000-0x000000000257F000-memory.dmp
        Filesize

        252KB

      • memory/2660-203-0x0000000002540000-0x000000000257F000-memory.dmp
        Filesize

        252KB

      • memory/2660-205-0x0000000002540000-0x000000000257F000-memory.dmp
        Filesize

        252KB

      • memory/2660-207-0x0000000002540000-0x000000000257F000-memory.dmp
        Filesize

        252KB

      • memory/2660-209-0x0000000002540000-0x000000000257F000-memory.dmp
        Filesize

        252KB

      • memory/2660-211-0x0000000002540000-0x000000000257F000-memory.dmp
        Filesize

        252KB

      • memory/2660-213-0x0000000002540000-0x000000000257F000-memory.dmp
        Filesize

        252KB

      • memory/2660-215-0x0000000002540000-0x000000000257F000-memory.dmp
        Filesize

        252KB

      • memory/2660-217-0x0000000002540000-0x000000000257F000-memory.dmp
        Filesize

        252KB

      • memory/2660-219-0x0000000002540000-0x000000000257F000-memory.dmp
        Filesize

        252KB

      • memory/2660-221-0x0000000002540000-0x000000000257F000-memory.dmp
        Filesize

        252KB

      • memory/2660-223-0x0000000002540000-0x000000000257F000-memory.dmp
        Filesize

        252KB

      • memory/2660-225-0x0000000002540000-0x000000000257F000-memory.dmp
        Filesize

        252KB

      • memory/2660-192-0x0000000004C70000-0x0000000004C80000-memory.dmp
        Filesize

        64KB

      • memory/2660-416-0x0000000004C70000-0x0000000004C80000-memory.dmp
        Filesize

        64KB

      • memory/2660-1101-0x0000000005230000-0x0000000005848000-memory.dmp
        Filesize

        6.1MB

      • memory/2660-1102-0x00000000058A0000-0x00000000059AA000-memory.dmp
        Filesize

        1.0MB

      • memory/2660-1103-0x00000000059E0000-0x00000000059F2000-memory.dmp
        Filesize

        72KB

      • memory/2660-1104-0x0000000005A40000-0x0000000005A7C000-memory.dmp
        Filesize

        240KB

      • memory/2660-1105-0x0000000004C70000-0x0000000004C80000-memory.dmp
        Filesize

        64KB

      • memory/2660-1107-0x0000000004C70000-0x0000000004C80000-memory.dmp
        Filesize

        64KB

      • memory/2660-1108-0x0000000004C70000-0x0000000004C80000-memory.dmp
        Filesize

        64KB

      • memory/2660-1109-0x0000000004C70000-0x0000000004C80000-memory.dmp
        Filesize

        64KB

      • memory/2660-1110-0x0000000005CF0000-0x0000000005D56000-memory.dmp
        Filesize

        408KB

      • memory/2660-1111-0x00000000063C0000-0x0000000006452000-memory.dmp
        Filesize

        584KB

      • memory/2660-1112-0x00000000065B0000-0x0000000006772000-memory.dmp
        Filesize

        1.8MB

      • memory/2660-1113-0x0000000004C70000-0x0000000004C80000-memory.dmp
        Filesize

        64KB

      • memory/2660-191-0x0000000000560000-0x00000000005AB000-memory.dmp
        Filesize

        300KB

      • memory/2660-1114-0x0000000006790000-0x0000000006CBC000-memory.dmp
        Filesize

        5.2MB

      • memory/2660-1115-0x0000000006F40000-0x0000000006FB6000-memory.dmp
        Filesize

        472KB

      • memory/2660-1116-0x0000000006FD0000-0x0000000007020000-memory.dmp
        Filesize

        320KB