Analysis

  • max time kernel
    112s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 21:59

General

  • Target

    31ad382e213e5d66b9ccdcd5b457763990af065ab7141f0d9e8e4952b0d1da6e.exe

  • Size

    659KB

  • MD5

    0da5a0fc4ad00a860e777bb73770cee9

  • SHA1

    b57540efb160aa5d37699cdf0bb919147036381d

  • SHA256

    31ad382e213e5d66b9ccdcd5b457763990af065ab7141f0d9e8e4952b0d1da6e

  • SHA512

    1f275b5f0552805c4656853a3c6245708eba025c365ae9b6efcc1b5d3a4f8baa7e23241f68b8364754e4d25b0e98c814141bfb5e3278b021f7947a9e8c9f649b

  • SSDEEP

    12288:IMr2y90FfPPzt6/40pbY/oj7y8T4ere3JlNt59/rwZZiCXa7ft/ju2MJ:eyKfPbUDO87y3TlNt5RqZjXgBE

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 16 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\31ad382e213e5d66b9ccdcd5b457763990af065ab7141f0d9e8e4952b0d1da6e.exe
    "C:\Users\Admin\AppData\Local\Temp\31ad382e213e5d66b9ccdcd5b457763990af065ab7141f0d9e8e4952b0d1da6e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4272
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un408399.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un408399.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3568
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5294.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5294.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4780
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4780 -s 1080
          4⤵
          • Program crash
          PID:3952
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3116.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3116.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2016
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 1864
          4⤵
          • Program crash
          PID:3096
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si487329.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si487329.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2552
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4780 -ip 4780
    1⤵
      PID:3740
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 576 -p 2016 -ip 2016
      1⤵
        PID:2672

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si487329.exe
        Filesize

        175KB

        MD5

        8ea8fbd3361ac12fc0a1325198de2c4c

        SHA1

        793bd1ed426027f2806ad9c83425c1be5200fc8e

        SHA256

        9f9e624b1252940cc16fb96d70ac8cfb7a56d47494c073a995548912385015aa

        SHA512

        786cf752b22d922bea3e0765256ebfe20ec9106b3321a9e30e3d1ab9ff6fa8ef2966ccdbe4bc397c011064639cbecfd6c2d658762f217a8e18b6e00c1e40156b

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si487329.exe
        Filesize

        175KB

        MD5

        8ea8fbd3361ac12fc0a1325198de2c4c

        SHA1

        793bd1ed426027f2806ad9c83425c1be5200fc8e

        SHA256

        9f9e624b1252940cc16fb96d70ac8cfb7a56d47494c073a995548912385015aa

        SHA512

        786cf752b22d922bea3e0765256ebfe20ec9106b3321a9e30e3d1ab9ff6fa8ef2966ccdbe4bc397c011064639cbecfd6c2d658762f217a8e18b6e00c1e40156b

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un408399.exe
        Filesize

        517KB

        MD5

        e34f28dce574df4497846150840b5f87

        SHA1

        7ea23dce83591ed2f5393db7aeb4c0f1ba18e22f

        SHA256

        11437fec59964b7d35f06393d1345c5a860a34904b00bb4f1a55fa8cef21af5d

        SHA512

        43fd9542b85a18892fb9b4cd7d69b8d1d0fad8609d7a84e10598d2330a4c6b19446c269576fa114d40c82eecdb2c4e15b503a57ddaa5f721af380feabab9afa0

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un408399.exe
        Filesize

        517KB

        MD5

        e34f28dce574df4497846150840b5f87

        SHA1

        7ea23dce83591ed2f5393db7aeb4c0f1ba18e22f

        SHA256

        11437fec59964b7d35f06393d1345c5a860a34904b00bb4f1a55fa8cef21af5d

        SHA512

        43fd9542b85a18892fb9b4cd7d69b8d1d0fad8609d7a84e10598d2330a4c6b19446c269576fa114d40c82eecdb2c4e15b503a57ddaa5f721af380feabab9afa0

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5294.exe
        Filesize

        237KB

        MD5

        b31bc9102c58ed1ea6772e3256172f31

        SHA1

        790dd26472b3ab6d64ca9d879fc9cb680e06602e

        SHA256

        a7b333242bbe35f81b756fafd286a422601fd50efd7ef7bb3bb697ae81ff75ec

        SHA512

        259401e5b28ddefd08fa207b3a1512033573aecd117539ec332fe86f21b03ab8b2bb44e699af17d09b6f0f2414686f68a6bfbe539b315b6f3b669179bb4532fb

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5294.exe
        Filesize

        237KB

        MD5

        b31bc9102c58ed1ea6772e3256172f31

        SHA1

        790dd26472b3ab6d64ca9d879fc9cb680e06602e

        SHA256

        a7b333242bbe35f81b756fafd286a422601fd50efd7ef7bb3bb697ae81ff75ec

        SHA512

        259401e5b28ddefd08fa207b3a1512033573aecd117539ec332fe86f21b03ab8b2bb44e699af17d09b6f0f2414686f68a6bfbe539b315b6f3b669179bb4532fb

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3116.exe
        Filesize

        295KB

        MD5

        f10c7fa9223ed8e0e2b503c1418e54aa

        SHA1

        9ed4d29665b67fbae28c716acd244c9ed08ad013

        SHA256

        486498f8adbc7e9baef7b8735ea9f3ef1340ea214ad493ea79255996b91207aa

        SHA512

        e2f00eaefad22904df361de942edcc99fc2454db39afd3074ee2398f398b2deca2bba865c6237eefc3f412b80138b8ce6ea0a5fe6a123e443197e87f157d616d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3116.exe
        Filesize

        295KB

        MD5

        f10c7fa9223ed8e0e2b503c1418e54aa

        SHA1

        9ed4d29665b67fbae28c716acd244c9ed08ad013

        SHA256

        486498f8adbc7e9baef7b8735ea9f3ef1340ea214ad493ea79255996b91207aa

        SHA512

        e2f00eaefad22904df361de942edcc99fc2454db39afd3074ee2398f398b2deca2bba865c6237eefc3f412b80138b8ce6ea0a5fe6a123e443197e87f157d616d

      • memory/2016-228-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/2016-1108-0x0000000005150000-0x0000000005768000-memory.dmp
        Filesize

        6.1MB

      • memory/2016-1121-0x0000000006870000-0x0000000006D9C000-memory.dmp
        Filesize

        5.2MB

      • memory/2016-1120-0x00000000066A0000-0x0000000006862000-memory.dmp
        Filesize

        1.8MB

      • memory/2016-1119-0x00000000064E0000-0x0000000006530000-memory.dmp
        Filesize

        320KB

      • memory/2016-1118-0x0000000006450000-0x00000000064C6000-memory.dmp
        Filesize

        472KB

      • memory/2016-1117-0x0000000005ED0000-0x0000000005F36000-memory.dmp
        Filesize

        408KB

      • memory/2016-1116-0x0000000005E30000-0x0000000005EC2000-memory.dmp
        Filesize

        584KB

      • memory/2016-1114-0x0000000004B90000-0x0000000004BA0000-memory.dmp
        Filesize

        64KB

      • memory/2016-1112-0x00000000058C0000-0x00000000058FC000-memory.dmp
        Filesize

        240KB

      • memory/2016-1111-0x00000000058A0000-0x00000000058B2000-memory.dmp
        Filesize

        72KB

      • memory/2016-1110-0x0000000004B90000-0x0000000004BA0000-memory.dmp
        Filesize

        64KB

      • memory/2016-1109-0x0000000005770000-0x000000000587A000-memory.dmp
        Filesize

        1.0MB

      • memory/2016-1107-0x0000000004B90000-0x0000000004BA0000-memory.dmp
        Filesize

        64KB

      • memory/2016-1106-0x0000000004B90000-0x0000000004BA0000-memory.dmp
        Filesize

        64KB

      • memory/2016-226-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/2016-224-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/2016-222-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/2016-220-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/2016-218-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/2016-216-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/2016-214-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/2016-212-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/2016-210-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/2016-195-0x0000000000740000-0x000000000078B000-memory.dmp
        Filesize

        300KB

      • memory/2016-196-0x0000000004B90000-0x0000000004BA0000-memory.dmp
        Filesize

        64KB

      • memory/2016-197-0x0000000004B90000-0x0000000004BA0000-memory.dmp
        Filesize

        64KB

      • memory/2016-198-0x0000000004B90000-0x0000000004BA0000-memory.dmp
        Filesize

        64KB

      • memory/2016-199-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/2016-200-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/2016-202-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/2016-204-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/2016-206-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/2016-208-0x0000000002610000-0x000000000264F000-memory.dmp
        Filesize

        252KB

      • memory/2552-1128-0x0000000000560000-0x0000000000592000-memory.dmp
        Filesize

        200KB

      • memory/2552-1130-0x0000000004EA0000-0x0000000004EB0000-memory.dmp
        Filesize

        64KB

      • memory/2552-1129-0x0000000004EA0000-0x0000000004EB0000-memory.dmp
        Filesize

        64KB

      • memory/4780-172-0x0000000002400000-0x0000000002412000-memory.dmp
        Filesize

        72KB

      • memory/4780-168-0x0000000002400000-0x0000000002412000-memory.dmp
        Filesize

        72KB

      • memory/4780-183-0x0000000004E20000-0x0000000004E30000-memory.dmp
        Filesize

        64KB

      • memory/4780-182-0x0000000000600000-0x000000000062D000-memory.dmp
        Filesize

        180KB

      • memory/4780-181-0x0000000000400000-0x00000000004A9000-memory.dmp
        Filesize

        676KB

      • memory/4780-180-0x0000000002400000-0x0000000002412000-memory.dmp
        Filesize

        72KB

      • memory/4780-150-0x0000000004E30000-0x00000000053D4000-memory.dmp
        Filesize

        5.6MB

      • memory/4780-178-0x0000000002400000-0x0000000002412000-memory.dmp
        Filesize

        72KB

      • memory/4780-176-0x0000000002400000-0x0000000002412000-memory.dmp
        Filesize

        72KB

      • memory/4780-153-0x0000000002400000-0x0000000002412000-memory.dmp
        Filesize

        72KB

      • memory/4780-174-0x0000000002400000-0x0000000002412000-memory.dmp
        Filesize

        72KB

      • memory/4780-151-0x0000000004E20000-0x0000000004E30000-memory.dmp
        Filesize

        64KB

      • memory/4780-170-0x0000000002400000-0x0000000002412000-memory.dmp
        Filesize

        72KB

      • memory/4780-184-0x0000000004E20000-0x0000000004E30000-memory.dmp
        Filesize

        64KB

      • memory/4780-166-0x0000000002400000-0x0000000002412000-memory.dmp
        Filesize

        72KB

      • memory/4780-164-0x0000000002400000-0x0000000002412000-memory.dmp
        Filesize

        72KB

      • memory/4780-162-0x0000000002400000-0x0000000002412000-memory.dmp
        Filesize

        72KB

      • memory/4780-160-0x0000000002400000-0x0000000002412000-memory.dmp
        Filesize

        72KB

      • memory/4780-158-0x0000000002400000-0x0000000002412000-memory.dmp
        Filesize

        72KB

      • memory/4780-156-0x0000000002400000-0x0000000002412000-memory.dmp
        Filesize

        72KB

      • memory/4780-154-0x0000000002400000-0x0000000002412000-memory.dmp
        Filesize

        72KB

      • memory/4780-149-0x0000000004E20000-0x0000000004E30000-memory.dmp
        Filesize

        64KB

      • memory/4780-148-0x0000000000600000-0x000000000062D000-memory.dmp
        Filesize

        180KB

      • memory/4780-185-0x0000000004E20000-0x0000000004E30000-memory.dmp
        Filesize

        64KB

      • memory/4780-187-0x0000000000400000-0x00000000004A9000-memory.dmp
        Filesize

        676KB

      • memory/4780-152-0x0000000004E20000-0x0000000004E30000-memory.dmp
        Filesize

        64KB