Analysis

  • max time kernel
    80s
  • max time network
    110s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 21:58

General

  • Target

    f9a5739bae5c927c450f2fa26ad9c2a0b0d4ebd43c18acee6426407c639e8aa8.exe

  • Size

    522KB

  • MD5

    4389120d51abecac873d6bb2ec9bff3d

  • SHA1

    761f8193592d3dd212dba0641bd1e4d1be48bbbf

  • SHA256

    f9a5739bae5c927c450f2fa26ad9c2a0b0d4ebd43c18acee6426407c639e8aa8

  • SHA512

    186a8497cc5e98e4d2cb844b8a61983acbfba5696e02af10aac1aa5747f27c6598092c5fe7c1c9ae960b2b00dbd3c036a12b3dbe8f4de381cfbd51309444f3a6

  • SSDEEP

    6144:Kuy+bnr+Lp0yN90QE/iUr2qq5AvfcwCYVGTMuP6v76W3rABXDK3203hCWqHlzbY0:yMrvy90baPn8IP6vVrwX0hCLJUZWhv

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f9a5739bae5c927c450f2fa26ad9c2a0b0d4ebd43c18acee6426407c639e8aa8.exe
    "C:\Users\Admin\AppData\Local\Temp\f9a5739bae5c927c450f2fa26ad9c2a0b0d4ebd43c18acee6426407c639e8aa8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1172
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziFZ7678.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziFZ7678.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:884
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr955165.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr955165.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4736
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku885299.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku885299.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2652
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 1348
          4⤵
          • Program crash
          PID:1220
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr675828.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr675828.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2396
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2652 -ip 2652
    1⤵
      PID:5000

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr675828.exe

      Filesize

      175KB

      MD5

      b41d456c70f3f60f21dbb87fc524474f

      SHA1

      8327b3662770ea2d0a4b089895aa0ee1563faad1

      SHA256

      5e22e01f1efec0a8cc7a96bcfcf232965cf47ab4d75b02cc0c7dfdf3772ae962

      SHA512

      b4d4fce72cbb70606aad4af5d073f094567a790f019fd48efa6fa3c806bc6aaa1ea88554d494e1934f55c11534c0e2cab6bd1ed38d91ba940350d372e7f32e78

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr675828.exe

      Filesize

      175KB

      MD5

      b41d456c70f3f60f21dbb87fc524474f

      SHA1

      8327b3662770ea2d0a4b089895aa0ee1563faad1

      SHA256

      5e22e01f1efec0a8cc7a96bcfcf232965cf47ab4d75b02cc0c7dfdf3772ae962

      SHA512

      b4d4fce72cbb70606aad4af5d073f094567a790f019fd48efa6fa3c806bc6aaa1ea88554d494e1934f55c11534c0e2cab6bd1ed38d91ba940350d372e7f32e78

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziFZ7678.exe

      Filesize

      380KB

      MD5

      48cc0f5cd3df90322cc828111b895872

      SHA1

      e164ed51d3b8395e53fda352565403df3af5c89a

      SHA256

      f7f555f54e5056a603aae23e46d66e20dd5f13574c24c1996b5db1e1858e8862

      SHA512

      0fa262994f57d769643ed6ba69f4976c9d47c731bb9fd07bd9c086d1c30246c2585cfe124e6ad310120f470582b490b84240bfcf12718afc13ade882b6d4aa87

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziFZ7678.exe

      Filesize

      380KB

      MD5

      48cc0f5cd3df90322cc828111b895872

      SHA1

      e164ed51d3b8395e53fda352565403df3af5c89a

      SHA256

      f7f555f54e5056a603aae23e46d66e20dd5f13574c24c1996b5db1e1858e8862

      SHA512

      0fa262994f57d769643ed6ba69f4976c9d47c731bb9fd07bd9c086d1c30246c2585cfe124e6ad310120f470582b490b84240bfcf12718afc13ade882b6d4aa87

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr955165.exe

      Filesize

      15KB

      MD5

      1b5602a04d65a22caa156af1d74ef14b

      SHA1

      336610a6873f0ca33c74c53502ed9f56f19c6fc3

      SHA256

      e89f670be816e4693712c9caa6a086591b3ff2e50b2f84cf5fc84c457957aa9b

      SHA512

      603318de7163cbf8a35bdfe0c2eda49b9d8e7eb4e05ca7bf1f709203c823d65e3aef23ad588eae89536bf640b417048d4d4001d1ffa244f6ffd8786e0e309eb8

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr955165.exe

      Filesize

      15KB

      MD5

      1b5602a04d65a22caa156af1d74ef14b

      SHA1

      336610a6873f0ca33c74c53502ed9f56f19c6fc3

      SHA256

      e89f670be816e4693712c9caa6a086591b3ff2e50b2f84cf5fc84c457957aa9b

      SHA512

      603318de7163cbf8a35bdfe0c2eda49b9d8e7eb4e05ca7bf1f709203c823d65e3aef23ad588eae89536bf640b417048d4d4001d1ffa244f6ffd8786e0e309eb8

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku885299.exe

      Filesize

      295KB

      MD5

      1a5c7155a1b2d2834dcc257d44db0f4b

      SHA1

      3e66ac696919127c70afcfe41658ef21916278b7

      SHA256

      f342791a4f96692944fc9e3bfe8e42dc6913a97f33c766024789c602e3054487

      SHA512

      8df50bc9042453f42f342136d41a99dbb1a714a67452328afcf9689dec26590887fc89109ac0ade88175dffcfb90d26519b280882cfe6c48ffa444761b9a4d39

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku885299.exe

      Filesize

      295KB

      MD5

      1a5c7155a1b2d2834dcc257d44db0f4b

      SHA1

      3e66ac696919127c70afcfe41658ef21916278b7

      SHA256

      f342791a4f96692944fc9e3bfe8e42dc6913a97f33c766024789c602e3054487

      SHA512

      8df50bc9042453f42f342136d41a99dbb1a714a67452328afcf9689dec26590887fc89109ac0ade88175dffcfb90d26519b280882cfe6c48ffa444761b9a4d39

    • memory/2396-1085-0x0000000000F40000-0x0000000000F72000-memory.dmp

      Filesize

      200KB

    • memory/2396-1086-0x0000000005AE0000-0x0000000005AF0000-memory.dmp

      Filesize

      64KB

    • memory/2396-1087-0x0000000005AE0000-0x0000000005AF0000-memory.dmp

      Filesize

      64KB

    • memory/2652-188-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-200-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-156-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-158-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-160-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-161-0x0000000004C90000-0x0000000004CA0000-memory.dmp

      Filesize

      64KB

    • memory/2652-164-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-163-0x0000000004C90000-0x0000000004CA0000-memory.dmp

      Filesize

      64KB

    • memory/2652-166-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-168-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-170-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-172-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-174-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-176-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-178-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-180-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-182-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-184-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-186-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-154-0x0000000004CA0000-0x0000000005244000-memory.dmp

      Filesize

      5.6MB

    • memory/2652-190-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-192-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-194-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-196-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-198-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-155-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-202-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-204-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-206-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-208-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-210-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-212-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-214-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-216-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-218-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-220-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2652-1063-0x0000000005250000-0x0000000005868000-memory.dmp

      Filesize

      6.1MB

    • memory/2652-1064-0x00000000058A0000-0x00000000059AA000-memory.dmp

      Filesize

      1.0MB

    • memory/2652-1065-0x00000000059E0000-0x00000000059F2000-memory.dmp

      Filesize

      72KB

    • memory/2652-1066-0x0000000005A00000-0x0000000005A3C000-memory.dmp

      Filesize

      240KB

    • memory/2652-1067-0x0000000004C90000-0x0000000004CA0000-memory.dmp

      Filesize

      64KB

    • memory/2652-1069-0x0000000004C90000-0x0000000004CA0000-memory.dmp

      Filesize

      64KB

    • memory/2652-1070-0x0000000004C90000-0x0000000004CA0000-memory.dmp

      Filesize

      64KB

    • memory/2652-1071-0x0000000005CF0000-0x0000000005D82000-memory.dmp

      Filesize

      584KB

    • memory/2652-1072-0x0000000005D90000-0x0000000005DF6000-memory.dmp

      Filesize

      408KB

    • memory/2652-1073-0x0000000004C90000-0x0000000004CA0000-memory.dmp

      Filesize

      64KB

    • memory/2652-153-0x00000000009C0000-0x0000000000A0B000-memory.dmp

      Filesize

      300KB

    • memory/2652-1074-0x0000000007760000-0x00000000077D6000-memory.dmp

      Filesize

      472KB

    • memory/2652-1075-0x00000000077F0000-0x0000000007840000-memory.dmp

      Filesize

      320KB

    • memory/2652-1077-0x0000000007960000-0x0000000007B22000-memory.dmp

      Filesize

      1.8MB

    • memory/2652-1078-0x0000000007B30000-0x000000000805C000-memory.dmp

      Filesize

      5.2MB

    • memory/4736-147-0x00000000005D0000-0x00000000005DA000-memory.dmp

      Filesize

      40KB