Analysis

  • max time kernel
    62s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 22:05

General

  • Target

    1d18a630944f11e5eaadebf2423f2ec6a72ece25da90743f40050aef135e63e0.exe

  • Size

    522KB

  • MD5

    44d05720c02bb3ae516216949045ce75

  • SHA1

    54ee590cdc2b26baae8b95fded5bdd89368f04f6

  • SHA256

    1d18a630944f11e5eaadebf2423f2ec6a72ece25da90743f40050aef135e63e0

  • SHA512

    3f64ac7ec7931fc70494a99273efee729abbdd4df4cddd286ba957158809b6c5dddd755d7fb614bde69594dae7fa0ce008cfa276869fad177fdda31f0d84431a

  • SSDEEP

    12288:hMrHy90uH8Y9CkfdTsRl3EbBkhCfJ6zqPfjWpUi:CyOXl36BkYf0mn6Wi

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1d18a630944f11e5eaadebf2423f2ec6a72ece25da90743f40050aef135e63e0.exe
    "C:\Users\Admin\AppData\Local\Temp\1d18a630944f11e5eaadebf2423f2ec6a72ece25da90743f40050aef135e63e0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDy0947.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDy0947.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2056
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr680257.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr680257.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:376
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku685660.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku685660.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4588
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4588 -s 1932
          4⤵
          • Program crash
          PID:4080
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr703178.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr703178.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4516
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4588 -ip 4588
    1⤵
      PID:4208

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr703178.exe
      Filesize

      175KB

      MD5

      babb05b637d137d54e8203a199a28893

      SHA1

      6d86f5996ceb3e4e0ebbb893e14f9d7b6fea136a

      SHA256

      1011cc09d55617f0dc8762054962a717377e6b670d8f0919843a36abf8c9fbba

      SHA512

      79be41dbd0f413ed8a0ebd9b21e2b8db785bf1f0144e688969aef4d2a03ec48cf2605c1ca05c0bf6320f1729c86731f985dabaeb756cf08c1be49bb7ca51ca4f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr703178.exe
      Filesize

      175KB

      MD5

      babb05b637d137d54e8203a199a28893

      SHA1

      6d86f5996ceb3e4e0ebbb893e14f9d7b6fea136a

      SHA256

      1011cc09d55617f0dc8762054962a717377e6b670d8f0919843a36abf8c9fbba

      SHA512

      79be41dbd0f413ed8a0ebd9b21e2b8db785bf1f0144e688969aef4d2a03ec48cf2605c1ca05c0bf6320f1729c86731f985dabaeb756cf08c1be49bb7ca51ca4f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDy0947.exe
      Filesize

      380KB

      MD5

      cb9a88a9d6db7022ac43fd12d33739fb

      SHA1

      64a92e563e96ec5ecbfc1ebe0da9944180baec48

      SHA256

      c35a18cd879ee63fae7ca80a265759a3a88a8e19a6ef16388f6cb64faf5f66c1

      SHA512

      a73102917adf227cbe52e0db08a9672778e15bbfa5072ecb9dff74be968794ffbb780f600673dba56e1c429e8fed48f4753cc1ff74e2e1c8c54f89bcf0174995

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDy0947.exe
      Filesize

      380KB

      MD5

      cb9a88a9d6db7022ac43fd12d33739fb

      SHA1

      64a92e563e96ec5ecbfc1ebe0da9944180baec48

      SHA256

      c35a18cd879ee63fae7ca80a265759a3a88a8e19a6ef16388f6cb64faf5f66c1

      SHA512

      a73102917adf227cbe52e0db08a9672778e15bbfa5072ecb9dff74be968794ffbb780f600673dba56e1c429e8fed48f4753cc1ff74e2e1c8c54f89bcf0174995

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr680257.exe
      Filesize

      15KB

      MD5

      100e643fa26c74de423d4bc6c808c673

      SHA1

      157bba6b45dcf5cca17ad2f86085f79ff03b852a

      SHA256

      56fdfd9f880b9a10d27ad8f62e612886e51a953f7c33ea6ae661ce8aa5c869bd

      SHA512

      a13dfcc2f20cf9f3e5d908af81167ff7852b632658770dafbd6ecea47b694f681cf56d16a1268f4f07e3fe97a43a07fe367a00d4a4c94cb12d687a607013d25d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr680257.exe
      Filesize

      15KB

      MD5

      100e643fa26c74de423d4bc6c808c673

      SHA1

      157bba6b45dcf5cca17ad2f86085f79ff03b852a

      SHA256

      56fdfd9f880b9a10d27ad8f62e612886e51a953f7c33ea6ae661ce8aa5c869bd

      SHA512

      a13dfcc2f20cf9f3e5d908af81167ff7852b632658770dafbd6ecea47b694f681cf56d16a1268f4f07e3fe97a43a07fe367a00d4a4c94cb12d687a607013d25d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku685660.exe
      Filesize

      295KB

      MD5

      a4380fc8b86efb72352bb6bce7a6b276

      SHA1

      e18e0f5f12613baae655adfad9c6578c9c610255

      SHA256

      2c4fd6cdf294e8147473633b4462bccd0a7fc9d511536d2697a94fc11aca6bad

      SHA512

      92b723725f6e9c3e55c8f2b9684ba08bd5ae97eefdf53bf29bc60a0c2ddda31395ea1b99e7b42d13a6cf91278d0168a039422768e22391b8da8afbec5fae67ff

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku685660.exe
      Filesize

      295KB

      MD5

      a4380fc8b86efb72352bb6bce7a6b276

      SHA1

      e18e0f5f12613baae655adfad9c6578c9c610255

      SHA256

      2c4fd6cdf294e8147473633b4462bccd0a7fc9d511536d2697a94fc11aca6bad

      SHA512

      92b723725f6e9c3e55c8f2b9684ba08bd5ae97eefdf53bf29bc60a0c2ddda31395ea1b99e7b42d13a6cf91278d0168a039422768e22391b8da8afbec5fae67ff

    • memory/376-147-0x0000000000950000-0x000000000095A000-memory.dmp
      Filesize

      40KB

    • memory/4516-1085-0x0000000000660000-0x0000000000692000-memory.dmp
      Filesize

      200KB

    • memory/4516-1086-0x0000000004FD0000-0x0000000004FE0000-memory.dmp
      Filesize

      64KB

    • memory/4516-1087-0x0000000004FD0000-0x0000000004FE0000-memory.dmp
      Filesize

      64KB

    • memory/4588-191-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-199-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-156-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-158-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-160-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-162-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-164-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-166-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-168-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-170-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-172-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-174-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-176-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-178-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-180-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-182-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-184-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-187-0x0000000004B20000-0x0000000004B30000-memory.dmp
      Filesize

      64KB

    • memory/4588-186-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-189-0x0000000004B20000-0x0000000004B30000-memory.dmp
      Filesize

      64KB

    • memory/4588-154-0x0000000004B30000-0x00000000050D4000-memory.dmp
      Filesize

      5.6MB

    • memory/4588-190-0x0000000004B20000-0x0000000004B30000-memory.dmp
      Filesize

      64KB

    • memory/4588-193-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-195-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-197-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-155-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-201-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-203-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-205-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-207-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-209-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-211-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-213-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-215-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-217-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-219-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-221-0x0000000004A70000-0x0000000004AAF000-memory.dmp
      Filesize

      252KB

    • memory/4588-1064-0x0000000005220000-0x0000000005838000-memory.dmp
      Filesize

      6.1MB

    • memory/4588-1065-0x00000000058A0000-0x00000000059AA000-memory.dmp
      Filesize

      1.0MB

    • memory/4588-1066-0x00000000059E0000-0x00000000059F2000-memory.dmp
      Filesize

      72KB

    • memory/4588-1067-0x0000000004B20000-0x0000000004B30000-memory.dmp
      Filesize

      64KB

    • memory/4588-1068-0x0000000005A00000-0x0000000005A3C000-memory.dmp
      Filesize

      240KB

    • memory/4588-1070-0x0000000004B20000-0x0000000004B30000-memory.dmp
      Filesize

      64KB

    • memory/4588-1071-0x0000000004B20000-0x0000000004B30000-memory.dmp
      Filesize

      64KB

    • memory/4588-1072-0x0000000005CF0000-0x0000000005D56000-memory.dmp
      Filesize

      408KB

    • memory/4588-1073-0x00000000063B0000-0x0000000006442000-memory.dmp
      Filesize

      584KB

    • memory/4588-1074-0x0000000006490000-0x0000000006506000-memory.dmp
      Filesize

      472KB

    • memory/4588-153-0x00000000020E0000-0x000000000212B000-memory.dmp
      Filesize

      300KB

    • memory/4588-1075-0x0000000006520000-0x0000000006570000-memory.dmp
      Filesize

      320KB

    • memory/4588-1076-0x0000000004B20000-0x0000000004B30000-memory.dmp
      Filesize

      64KB

    • memory/4588-1078-0x0000000009D20000-0x0000000009EE2000-memory.dmp
      Filesize

      1.8MB

    • memory/4588-1079-0x0000000009EF0000-0x000000000A41C000-memory.dmp
      Filesize

      5.2MB