Analysis

  • max time kernel
    63s
  • max time network
    74s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 21:56

General

  • Target

    000bec8de0ae1948d1e67e804d03001de815f09341452f82d4d231dddb67955c.exe

  • Size

    522KB

  • MD5

    4abeeec82b57adbe2cdc75a5be24b021

  • SHA1

    054538c63fc3e1913393d5f57106030016d561e3

  • SHA256

    000bec8de0ae1948d1e67e804d03001de815f09341452f82d4d231dddb67955c

  • SHA512

    c0409ad16eb62ab91266b858241f2399a63e2120b10a16b14b680231ac6a19f3ccb741a01a306547631b7b243e79ac58ddb417c5ecd23fcb238d3e164c10834c

  • SSDEEP

    12288:gMrpy90/qt7yoF7xq4iyYrwmhhC/JhuSSKL:5yiCq4iyYhhY/CSpL

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\000bec8de0ae1948d1e67e804d03001de815f09341452f82d4d231dddb67955c.exe
    "C:\Users\Admin\AppData\Local\Temp\000bec8de0ae1948d1e67e804d03001de815f09341452f82d4d231dddb67955c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5040
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziiY6581.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziiY6581.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4292
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr334443.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr334443.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1048
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku750932.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku750932.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3960
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3960 -s 1356
          4⤵
          • Program crash
          PID:1324
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr169810.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr169810.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2904
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3960 -ip 3960
    1⤵
      PID:3488

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr169810.exe
      Filesize

      175KB

      MD5

      abdfa0f8b83e066a07127b83079bc8d1

      SHA1

      40f67319644037b2416cf5dfcce729d0fa3e3f35

      SHA256

      793409e3dd9a8b1685c8002d3868cdac8af07aec5a518b8f3ff0526ae56f1838

      SHA512

      069bbe440e607bc47254a1fa4312033e76e9e7cf90e9ca260130a6e04f8619336d5891b38b74fd827420f52a69e19710553f8d316173953240eb89484a879272

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr169810.exe
      Filesize

      175KB

      MD5

      abdfa0f8b83e066a07127b83079bc8d1

      SHA1

      40f67319644037b2416cf5dfcce729d0fa3e3f35

      SHA256

      793409e3dd9a8b1685c8002d3868cdac8af07aec5a518b8f3ff0526ae56f1838

      SHA512

      069bbe440e607bc47254a1fa4312033e76e9e7cf90e9ca260130a6e04f8619336d5891b38b74fd827420f52a69e19710553f8d316173953240eb89484a879272

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziiY6581.exe
      Filesize

      380KB

      MD5

      2dfb630eaf2d45cc22479810d639091e

      SHA1

      456c348442cbaf8c81c99104f0d0db1a46a4a679

      SHA256

      5e3c49e4051c1029d95ad22f88cc13cbf5888c11c034a6bf8fd6e72f5fd5aeba

      SHA512

      8a034617ca98d32c96c234de30d174e11962d9c1ecec408c4c4bf920a76740d38568c809c6786d400eb4dbd94fe88f809747b2ecee388b69f08b9adf8f40eccc

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziiY6581.exe
      Filesize

      380KB

      MD5

      2dfb630eaf2d45cc22479810d639091e

      SHA1

      456c348442cbaf8c81c99104f0d0db1a46a4a679

      SHA256

      5e3c49e4051c1029d95ad22f88cc13cbf5888c11c034a6bf8fd6e72f5fd5aeba

      SHA512

      8a034617ca98d32c96c234de30d174e11962d9c1ecec408c4c4bf920a76740d38568c809c6786d400eb4dbd94fe88f809747b2ecee388b69f08b9adf8f40eccc

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr334443.exe
      Filesize

      15KB

      MD5

      ed09f295e79d49136d095b44b32ec38b

      SHA1

      6036c22d4756d1c84f0134443da61673e8c69b6c

      SHA256

      d0f28a87ab8d3b73257cf213b7e94ed9e55ba29bdbf00d993e19e844925826b8

      SHA512

      bda27de35b4a4cdecbbe6cc4d4d9778f90438b7c45660f882002e2a3284266cc7f9495049d75fcb67cfa13d8c7b2a16e1b3391ca0d27a52644c313cabe844167

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr334443.exe
      Filesize

      15KB

      MD5

      ed09f295e79d49136d095b44b32ec38b

      SHA1

      6036c22d4756d1c84f0134443da61673e8c69b6c

      SHA256

      d0f28a87ab8d3b73257cf213b7e94ed9e55ba29bdbf00d993e19e844925826b8

      SHA512

      bda27de35b4a4cdecbbe6cc4d4d9778f90438b7c45660f882002e2a3284266cc7f9495049d75fcb67cfa13d8c7b2a16e1b3391ca0d27a52644c313cabe844167

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku750932.exe
      Filesize

      295KB

      MD5

      9e3dab71395e96d4bc5df15f6556e90c

      SHA1

      0e7758dab5ddfa026e1875cd73075b530d92a499

      SHA256

      452c15f4a4a3dabb4c32dbbbf0c712044166e505c963a33eca1e9c29c67f1c28

      SHA512

      1613b80b1a7cec25682ff8054208546f532af884b111614f63a93be4e7e26b68238bcc6d76ce24326b9e2442355dc79e58c3de5941f1fbab45eb3a5f357c3fb0

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku750932.exe
      Filesize

      295KB

      MD5

      9e3dab71395e96d4bc5df15f6556e90c

      SHA1

      0e7758dab5ddfa026e1875cd73075b530d92a499

      SHA256

      452c15f4a4a3dabb4c32dbbbf0c712044166e505c963a33eca1e9c29c67f1c28

      SHA512

      1613b80b1a7cec25682ff8054208546f532af884b111614f63a93be4e7e26b68238bcc6d76ce24326b9e2442355dc79e58c3de5941f1fbab45eb3a5f357c3fb0

    • memory/1048-147-0x00000000005F0000-0x00000000005FA000-memory.dmp
      Filesize

      40KB

    • memory/2904-1085-0x00000000001A0000-0x00000000001D2000-memory.dmp
      Filesize

      200KB

    • memory/2904-1086-0x0000000004D20000-0x0000000004D30000-memory.dmp
      Filesize

      64KB

    • memory/2904-1087-0x0000000004D20000-0x0000000004D30000-memory.dmp
      Filesize

      64KB

    • memory/3960-189-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-199-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-156-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-159-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-157-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-161-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-163-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-165-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-167-0x0000000004B30000-0x0000000004B40000-memory.dmp
      Filesize

      64KB

    • memory/3960-169-0x0000000004B30000-0x0000000004B40000-memory.dmp
      Filesize

      64KB

    • memory/3960-168-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-171-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-173-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-175-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-177-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-179-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-181-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-183-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-185-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-187-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-154-0x0000000004B30000-0x0000000004B40000-memory.dmp
      Filesize

      64KB

    • memory/3960-191-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-193-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-195-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-197-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-155-0x0000000004B40000-0x00000000050E4000-memory.dmp
      Filesize

      5.6MB

    • memory/3960-201-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-203-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-205-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-207-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-209-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-211-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-213-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-215-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-217-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-219-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-221-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/3960-1064-0x0000000005200000-0x0000000005818000-memory.dmp
      Filesize

      6.1MB

    • memory/3960-1066-0x00000000058A0000-0x00000000059AA000-memory.dmp
      Filesize

      1.0MB

    • memory/3960-1067-0x00000000059E0000-0x00000000059F2000-memory.dmp
      Filesize

      72KB

    • memory/3960-1068-0x0000000005A00000-0x0000000005A3C000-memory.dmp
      Filesize

      240KB

    • memory/3960-1069-0x0000000004B30000-0x0000000004B40000-memory.dmp
      Filesize

      64KB

    • memory/3960-1070-0x0000000004B30000-0x0000000004B40000-memory.dmp
      Filesize

      64KB

    • memory/3960-1071-0x0000000004B30000-0x0000000004B40000-memory.dmp
      Filesize

      64KB

    • memory/3960-1073-0x0000000005CF0000-0x0000000005D82000-memory.dmp
      Filesize

      584KB

    • memory/3960-1074-0x0000000005D90000-0x0000000005DF6000-memory.dmp
      Filesize

      408KB

    • memory/3960-1075-0x0000000004B30000-0x0000000004B40000-memory.dmp
      Filesize

      64KB

    • memory/3960-153-0x0000000000620000-0x000000000066B000-memory.dmp
      Filesize

      300KB

    • memory/3960-1076-0x0000000007760000-0x0000000007922000-memory.dmp
      Filesize

      1.8MB

    • memory/3960-1077-0x0000000007940000-0x0000000007E6C000-memory.dmp
      Filesize

      5.2MB

    • memory/3960-1078-0x00000000022B0000-0x0000000002326000-memory.dmp
      Filesize

      472KB

    • memory/3960-1079-0x0000000008090000-0x00000000080E0000-memory.dmp
      Filesize

      320KB