Analysis

  • max time kernel
    88s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 21:55

General

  • Target

    b5e7994a8e5d271d363f8087259401d813b6c7f1ac78f05a6694c7b01eee0a41.exe

  • Size

    659KB

  • MD5

    33d4020b09563bd82ee8abf5b76d1560

  • SHA1

    fa5cebacdf301a8b7cfe2dc9a03807c6bd67b9bc

  • SHA256

    b5e7994a8e5d271d363f8087259401d813b6c7f1ac78f05a6694c7b01eee0a41

  • SHA512

    5eb2adfe75544ea876bebd1ed27a399b51665306a941fd1690964c59df2139b49ca56016042855f4e6b63a35aafd0dc1a7092bd85494bca21ace5b168a801bbb

  • SSDEEP

    12288:IMriy90JU30vm4zyzvWW+8T4e/PBTELFt59/rwJZNCXAVft/juC4j1:qygO0vm44ve3U4Zt5RuZUXyBrI1

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b5e7994a8e5d271d363f8087259401d813b6c7f1ac78f05a6694c7b01eee0a41.exe
    "C:\Users\Admin\AppData\Local\Temp\b5e7994a8e5d271d363f8087259401d813b6c7f1ac78f05a6694c7b01eee0a41.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3032
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un932477.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un932477.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1220
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1582.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1582.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4464
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 1080
          4⤵
          • Program crash
          PID:4320
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4835.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4835.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3108
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3108 -s 1772
          4⤵
          • Program crash
          PID:4824
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si125915.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si125915.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4220
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4464 -ip 4464
    1⤵
      PID:228
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3108 -ip 3108
      1⤵
        PID:3124

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si125915.exe

        Filesize

        175KB

        MD5

        5a5dbe01464b7306820ab09c0144aecb

        SHA1

        bbb20ee17b81912877d0e989c303d549e401d5a5

        SHA256

        5c8d9c6ad9741872250ba219748019d4a198d3346f4115d14bf2b56c57a1f44e

        SHA512

        09d2c9e7e390ac23b17b7e4e32ece8914a8f1f5451133713a3126c2673864c51da0345e9a9179724329299af20dc5b300e593daffd4c94517e7786005a0efbab

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si125915.exe

        Filesize

        175KB

        MD5

        5a5dbe01464b7306820ab09c0144aecb

        SHA1

        bbb20ee17b81912877d0e989c303d549e401d5a5

        SHA256

        5c8d9c6ad9741872250ba219748019d4a198d3346f4115d14bf2b56c57a1f44e

        SHA512

        09d2c9e7e390ac23b17b7e4e32ece8914a8f1f5451133713a3126c2673864c51da0345e9a9179724329299af20dc5b300e593daffd4c94517e7786005a0efbab

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un932477.exe

        Filesize

        517KB

        MD5

        24053b6e5a48d79e78f8bb0021fde4f1

        SHA1

        4b411fc846d264908eddd2b1c1744c0def6d7664

        SHA256

        f5b45bdf3a4b48f09ccfdff623f733e9b6d31d1831f84a10e020144a3959150d

        SHA512

        ca852bfacff8093edd35cd64624a0f875e925e8908515293c41d6d126f1e51d8db5459ce5019a1517b0cf07f52c2c8c04023b92c503384e36097747ba7d74f19

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un932477.exe

        Filesize

        517KB

        MD5

        24053b6e5a48d79e78f8bb0021fde4f1

        SHA1

        4b411fc846d264908eddd2b1c1744c0def6d7664

        SHA256

        f5b45bdf3a4b48f09ccfdff623f733e9b6d31d1831f84a10e020144a3959150d

        SHA512

        ca852bfacff8093edd35cd64624a0f875e925e8908515293c41d6d126f1e51d8db5459ce5019a1517b0cf07f52c2c8c04023b92c503384e36097747ba7d74f19

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1582.exe

        Filesize

        237KB

        MD5

        f61cb1c8d08aaef7049922e6a207bc2d

        SHA1

        0168194911ae6f9cf3b98df9cfcfa41748d93a91

        SHA256

        d535b6c1da20879b712066accf63cd0824617d0e9b4803bcd4869ba2563d339c

        SHA512

        29f30bd708042a4f4659e11d0bb1d586c690acae06b9305cb7ce05852b0563a1904315359dc681a46d50cda8e2081e2106ee848e78f8ff055bdb7e55a1a739b3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1582.exe

        Filesize

        237KB

        MD5

        f61cb1c8d08aaef7049922e6a207bc2d

        SHA1

        0168194911ae6f9cf3b98df9cfcfa41748d93a91

        SHA256

        d535b6c1da20879b712066accf63cd0824617d0e9b4803bcd4869ba2563d339c

        SHA512

        29f30bd708042a4f4659e11d0bb1d586c690acae06b9305cb7ce05852b0563a1904315359dc681a46d50cda8e2081e2106ee848e78f8ff055bdb7e55a1a739b3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4835.exe

        Filesize

        295KB

        MD5

        f655f59757be61f2521f9dd9cae522cd

        SHA1

        c86ce0b1be80588e855b6fd7b681e3e7110f3cc9

        SHA256

        d3c54dc4f0f8d1817f9318b2eea2805c91b0cd1f7a75da721e05b9a0e396367e

        SHA512

        85bf5778183745650cae52d7d774b77900d30483b81823b9da772435dd29b9452438e5311c8f3d27ec8b96542daeb00e07e4df813176cfe1f3c64a53593695ca

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4835.exe

        Filesize

        295KB

        MD5

        f655f59757be61f2521f9dd9cae522cd

        SHA1

        c86ce0b1be80588e855b6fd7b681e3e7110f3cc9

        SHA256

        d3c54dc4f0f8d1817f9318b2eea2805c91b0cd1f7a75da721e05b9a0e396367e

        SHA512

        85bf5778183745650cae52d7d774b77900d30483b81823b9da772435dd29b9452438e5311c8f3d27ec8b96542daeb00e07e4df813176cfe1f3c64a53593695ca

      • memory/3108-1099-0x0000000005A00000-0x0000000005A3C000-memory.dmp

        Filesize

        240KB

      • memory/3108-1100-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

        Filesize

        64KB

      • memory/3108-1111-0x00000000069B0000-0x0000000006EDC000-memory.dmp

        Filesize

        5.2MB

      • memory/3108-1110-0x00000000067E0000-0x00000000069A2000-memory.dmp

        Filesize

        1.8MB

      • memory/3108-1109-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

        Filesize

        64KB

      • memory/3108-1108-0x0000000006540000-0x0000000006590000-memory.dmp

        Filesize

        320KB

      • memory/3108-1107-0x00000000064B0000-0x0000000006526000-memory.dmp

        Filesize

        472KB

      • memory/3108-1106-0x0000000005D90000-0x0000000005DF6000-memory.dmp

        Filesize

        408KB

      • memory/3108-1105-0x0000000005CF0000-0x0000000005D82000-memory.dmp

        Filesize

        584KB

      • memory/3108-1104-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

        Filesize

        64KB

      • memory/3108-1103-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

        Filesize

        64KB

      • memory/3108-1102-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

        Filesize

        64KB

      • memory/3108-1098-0x00000000059E0000-0x00000000059F2000-memory.dmp

        Filesize

        72KB

      • memory/3108-1097-0x00000000058A0000-0x00000000059AA000-memory.dmp

        Filesize

        1.0MB

      • memory/3108-1096-0x0000000005270000-0x0000000005888000-memory.dmp

        Filesize

        6.1MB

      • memory/3108-223-0x0000000002520000-0x000000000255F000-memory.dmp

        Filesize

        252KB

      • memory/3108-221-0x0000000002520000-0x000000000255F000-memory.dmp

        Filesize

        252KB

      • memory/3108-219-0x0000000002520000-0x000000000255F000-memory.dmp

        Filesize

        252KB

      • memory/3108-186-0x0000000002520000-0x000000000255F000-memory.dmp

        Filesize

        252KB

      • memory/3108-187-0x0000000002520000-0x000000000255F000-memory.dmp

        Filesize

        252KB

      • memory/3108-189-0x0000000002520000-0x000000000255F000-memory.dmp

        Filesize

        252KB

      • memory/3108-191-0x0000000002520000-0x000000000255F000-memory.dmp

        Filesize

        252KB

      • memory/3108-193-0x0000000002520000-0x000000000255F000-memory.dmp

        Filesize

        252KB

      • memory/3108-195-0x0000000002520000-0x000000000255F000-memory.dmp

        Filesize

        252KB

      • memory/3108-197-0x0000000002520000-0x000000000255F000-memory.dmp

        Filesize

        252KB

      • memory/3108-199-0x0000000002520000-0x000000000255F000-memory.dmp

        Filesize

        252KB

      • memory/3108-201-0x0000000002520000-0x000000000255F000-memory.dmp

        Filesize

        252KB

      • memory/3108-203-0x0000000000640000-0x000000000068B000-memory.dmp

        Filesize

        300KB

      • memory/3108-205-0x0000000002520000-0x000000000255F000-memory.dmp

        Filesize

        252KB

      • memory/3108-204-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

        Filesize

        64KB

      • memory/3108-206-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

        Filesize

        64KB

      • memory/3108-208-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

        Filesize

        64KB

      • memory/3108-211-0x0000000002520000-0x000000000255F000-memory.dmp

        Filesize

        252KB

      • memory/3108-209-0x0000000002520000-0x000000000255F000-memory.dmp

        Filesize

        252KB

      • memory/3108-213-0x0000000002520000-0x000000000255F000-memory.dmp

        Filesize

        252KB

      • memory/3108-215-0x0000000002520000-0x000000000255F000-memory.dmp

        Filesize

        252KB

      • memory/3108-217-0x0000000002520000-0x000000000255F000-memory.dmp

        Filesize

        252KB

      • memory/4220-1117-0x0000000000710000-0x0000000000742000-memory.dmp

        Filesize

        200KB

      • memory/4220-1119-0x0000000005020000-0x0000000005030000-memory.dmp

        Filesize

        64KB

      • memory/4220-1118-0x0000000005020000-0x0000000005030000-memory.dmp

        Filesize

        64KB

      • memory/4464-170-0x00000000027E0000-0x00000000027F2000-memory.dmp

        Filesize

        72KB

      • memory/4464-166-0x00000000027E0000-0x00000000027F2000-memory.dmp

        Filesize

        72KB

      • memory/4464-176-0x00000000027E0000-0x00000000027F2000-memory.dmp

        Filesize

        72KB

      • memory/4464-150-0x0000000004CB0000-0x0000000005254000-memory.dmp

        Filesize

        5.6MB

      • memory/4464-154-0x00000000027E0000-0x00000000027F2000-memory.dmp

        Filesize

        72KB

      • memory/4464-174-0x00000000027E0000-0x00000000027F2000-memory.dmp

        Filesize

        72KB

      • memory/4464-172-0x00000000027E0000-0x00000000027F2000-memory.dmp

        Filesize

        72KB

      • memory/4464-151-0x00000000027E0000-0x00000000027F2000-memory.dmp

        Filesize

        72KB

      • memory/4464-168-0x00000000027E0000-0x00000000027F2000-memory.dmp

        Filesize

        72KB

      • memory/4464-178-0x00000000027E0000-0x00000000027F2000-memory.dmp

        Filesize

        72KB

      • memory/4464-164-0x00000000027E0000-0x00000000027F2000-memory.dmp

        Filesize

        72KB

      • memory/4464-162-0x00000000027E0000-0x00000000027F2000-memory.dmp

        Filesize

        72KB

      • memory/4464-160-0x00000000027E0000-0x00000000027F2000-memory.dmp

        Filesize

        72KB

      • memory/4464-158-0x00000000027E0000-0x00000000027F2000-memory.dmp

        Filesize

        72KB

      • memory/4464-156-0x00000000027E0000-0x00000000027F2000-memory.dmp

        Filesize

        72KB

      • memory/4464-149-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

        Filesize

        64KB

      • memory/4464-148-0x0000000000630000-0x000000000065D000-memory.dmp

        Filesize

        180KB

      • memory/4464-179-0x0000000000400000-0x00000000004A9000-memory.dmp

        Filesize

        676KB

      • memory/4464-181-0x0000000000400000-0x00000000004A9000-memory.dmp

        Filesize

        676KB

      • memory/4464-152-0x00000000027E0000-0x00000000027F2000-memory.dmp

        Filesize

        72KB