Analysis

  • max time kernel
    86s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 21:46

General

  • Target

    e47e2566015e02224191ebaeaa7a284dcd953f1a4968b958125d9e4c91ffb169.exe

  • Size

    522KB

  • MD5

    660a8edde32ba57cdf890c90b49138f1

  • SHA1

    91225f2c163d62cb9974cafd10eeaa72b029fee8

  • SHA256

    e47e2566015e02224191ebaeaa7a284dcd953f1a4968b958125d9e4c91ffb169

  • SHA512

    6b223dc4c9f9aaa5bd7bd2470bb31e9668674b64b232249a045303cea561259c25b2e4c31bc89c33f9353bfe832eac8b5a21f72a0b25e069fefafcadc1b47691

  • SSDEEP

    12288:cMrjy901HRgBRI8Q4xHvCqrwtZhCfJRdmO:fycNJYjyZYfjdf

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e47e2566015e02224191ebaeaa7a284dcd953f1a4968b958125d9e4c91ffb169.exe
    "C:\Users\Admin\AppData\Local\Temp\e47e2566015e02224191ebaeaa7a284dcd953f1a4968b958125d9e4c91ffb169.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1844
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKA6274.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKA6274.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1860
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr385108.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr385108.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4264
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku543399.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku543399.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5052
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5052 -s 1352
          4⤵
          • Program crash
          PID:2280
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr994363.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr994363.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3068
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5052 -ip 5052
    1⤵
      PID:4332

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr994363.exe
      Filesize

      175KB

      MD5

      e296c470a14209b5ed35f67780c9a586

      SHA1

      d7d51ad92212804096ff31781c8a28d969258e28

      SHA256

      e471d6a736b6356705b5273b8db720402bf65fdf32ec5ddc08479d9969da0e62

      SHA512

      376597f830b79326634fbc17fe8d8ef2fb9afddea0f9407d749c1568a851fd9b38c516e2abd212469b2c08f52ed870fe4be079d4ee212e86bb6512f3356effe7

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr994363.exe
      Filesize

      175KB

      MD5

      e296c470a14209b5ed35f67780c9a586

      SHA1

      d7d51ad92212804096ff31781c8a28d969258e28

      SHA256

      e471d6a736b6356705b5273b8db720402bf65fdf32ec5ddc08479d9969da0e62

      SHA512

      376597f830b79326634fbc17fe8d8ef2fb9afddea0f9407d749c1568a851fd9b38c516e2abd212469b2c08f52ed870fe4be079d4ee212e86bb6512f3356effe7

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKA6274.exe
      Filesize

      380KB

      MD5

      a74e0781fc624e369c8f3beb692d000e

      SHA1

      8fb02e653677504cfae064efa72a9e22b5245794

      SHA256

      179fc6f4eb6f57a79b97b055357978e72b781cb804fe0e8432656e36638457ed

      SHA512

      496ffc85636ddba8127c1abac1814e688df44c01b4e7a6533b15783e64dd1d8fd94e2a64fa1a49488b2fec16782754f4f856ad2c8890affffb4111e8594bf0c2

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKA6274.exe
      Filesize

      380KB

      MD5

      a74e0781fc624e369c8f3beb692d000e

      SHA1

      8fb02e653677504cfae064efa72a9e22b5245794

      SHA256

      179fc6f4eb6f57a79b97b055357978e72b781cb804fe0e8432656e36638457ed

      SHA512

      496ffc85636ddba8127c1abac1814e688df44c01b4e7a6533b15783e64dd1d8fd94e2a64fa1a49488b2fec16782754f4f856ad2c8890affffb4111e8594bf0c2

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr385108.exe
      Filesize

      15KB

      MD5

      69c6fa74977064114381d99b789c7ebc

      SHA1

      ea0f80eed6aaa7ea26ec2abf757e84ebe60f94f3

      SHA256

      1a3e19c7aad3ae6df7e9790e275a2cd561ca0a9397ae7a3e52b34737ce577c66

      SHA512

      d22b19984e7918a4eb593f2b8efb4f9e52d1dbf7fb7518f4bb13c93d1bf4123a4a51418650b2fac7a2d24b49f15299d7c38335f33911863542eeb3b9d964ff87

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr385108.exe
      Filesize

      15KB

      MD5

      69c6fa74977064114381d99b789c7ebc

      SHA1

      ea0f80eed6aaa7ea26ec2abf757e84ebe60f94f3

      SHA256

      1a3e19c7aad3ae6df7e9790e275a2cd561ca0a9397ae7a3e52b34737ce577c66

      SHA512

      d22b19984e7918a4eb593f2b8efb4f9e52d1dbf7fb7518f4bb13c93d1bf4123a4a51418650b2fac7a2d24b49f15299d7c38335f33911863542eeb3b9d964ff87

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku543399.exe
      Filesize

      295KB

      MD5

      831255e8a7463fe13b50281e94153e94

      SHA1

      96b21766b555f1ec1d2091f2b562134973f3348d

      SHA256

      d123d9f0974588e9e8dfb2a29b041471efa4d2bf5aaa6bec65c1d9f5e58dc159

      SHA512

      e02364666b8e89cc169fe658551ed5f371d8d8e70a33106c5847edf1c7d935e74b208cef4c9b3faf733a885148ccf72d3e1a6697f4b6693c8cab4dda8c9e655c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku543399.exe
      Filesize

      295KB

      MD5

      831255e8a7463fe13b50281e94153e94

      SHA1

      96b21766b555f1ec1d2091f2b562134973f3348d

      SHA256

      d123d9f0974588e9e8dfb2a29b041471efa4d2bf5aaa6bec65c1d9f5e58dc159

      SHA512

      e02364666b8e89cc169fe658551ed5f371d8d8e70a33106c5847edf1c7d935e74b208cef4c9b3faf733a885148ccf72d3e1a6697f4b6693c8cab4dda8c9e655c

    • memory/3068-1086-0x00000000005F0000-0x0000000000622000-memory.dmp
      Filesize

      200KB

    • memory/3068-1087-0x0000000004EC0000-0x0000000004ED0000-memory.dmp
      Filesize

      64KB

    • memory/4264-147-0x00000000003D0000-0x00000000003DA000-memory.dmp
      Filesize

      40KB

    • memory/5052-189-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-201-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-155-0x0000000004B60000-0x0000000004B70000-memory.dmp
      Filesize

      64KB

    • memory/5052-156-0x0000000004B70000-0x0000000005114000-memory.dmp
      Filesize

      5.6MB

    • memory/5052-157-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-158-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-160-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-162-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-164-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-166-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-168-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-170-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-172-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-174-0x0000000004B60000-0x0000000004B70000-memory.dmp
      Filesize

      64KB

    • memory/5052-175-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-177-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-179-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-181-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-183-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-185-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-187-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-153-0x0000000002150000-0x000000000219B000-memory.dmp
      Filesize

      300KB

    • memory/5052-191-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-193-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-195-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-197-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-199-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-154-0x0000000004B60000-0x0000000004B70000-memory.dmp
      Filesize

      64KB

    • memory/5052-203-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-205-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-207-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-209-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-211-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-213-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-215-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-217-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-219-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-221-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/5052-1064-0x0000000005220000-0x0000000005838000-memory.dmp
      Filesize

      6.1MB

    • memory/5052-1065-0x00000000058A0000-0x00000000059AA000-memory.dmp
      Filesize

      1.0MB

    • memory/5052-1066-0x00000000059E0000-0x00000000059F2000-memory.dmp
      Filesize

      72KB

    • memory/5052-1067-0x0000000005A00000-0x0000000005A3C000-memory.dmp
      Filesize

      240KB

    • memory/5052-1068-0x0000000004B60000-0x0000000004B70000-memory.dmp
      Filesize

      64KB

    • memory/5052-1070-0x0000000004B60000-0x0000000004B70000-memory.dmp
      Filesize

      64KB

    • memory/5052-1071-0x0000000004B60000-0x0000000004B70000-memory.dmp
      Filesize

      64KB

    • memory/5052-1072-0x0000000004B60000-0x0000000004B70000-memory.dmp
      Filesize

      64KB

    • memory/5052-1073-0x0000000005CF0000-0x0000000005D82000-memory.dmp
      Filesize

      584KB

    • memory/5052-1074-0x0000000005D90000-0x0000000005DF6000-memory.dmp
      Filesize

      408KB

    • memory/5052-1075-0x00000000066F0000-0x00000000068B2000-memory.dmp
      Filesize

      1.8MB

    • memory/5052-1076-0x00000000068D0000-0x0000000006DFC000-memory.dmp
      Filesize

      5.2MB

    • memory/5052-1077-0x0000000004B60000-0x0000000004B70000-memory.dmp
      Filesize

      64KB

    • memory/5052-1078-0x0000000007080000-0x00000000070F6000-memory.dmp
      Filesize

      472KB

    • memory/5052-1079-0x0000000007110000-0x0000000007160000-memory.dmp
      Filesize

      320KB