Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 22:25

General

  • Target

    08751fee8c278d4c4c5053c68789ebdb5ee122b02bcc2e01a79cceed525cae3b.exe

  • Size

    659KB

  • MD5

    a657df4b93e9f9f0111c502c6c616f15

  • SHA1

    645410101283c490ccdce36f1e2917390df65116

  • SHA256

    08751fee8c278d4c4c5053c68789ebdb5ee122b02bcc2e01a79cceed525cae3b

  • SHA512

    27ba25f6b596918332bfb4eb0bbbb3169dff0e511b9bbd7d922141cd1aca6ca7f2040382918796ce236613c98635953dd05463b46f4c738564d9ecab5685c9b7

  • SSDEEP

    12288:YMrOy90GKuRbKajr2I//nnFaRk6s/5t4Btt59LrwJ7gCdA8ft/juNhWfI0A:GyfKuRbdr2I/PFsVC5tctt5hu7td9B0T

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08751fee8c278d4c4c5053c68789ebdb5ee122b02bcc2e01a79cceed525cae3b.exe
    "C:\Users\Admin\AppData\Local\Temp\08751fee8c278d4c4c5053c68789ebdb5ee122b02bcc2e01a79cceed525cae3b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un520148.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un520148.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4596
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5901.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5901.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1712
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1712 -s 1080
          4⤵
          • Program crash
          PID:116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5485.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5485.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3780
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3780 -s 1336
          4⤵
          • Program crash
          PID:2032
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si491519.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si491519.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:904
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1712 -ip 1712
    1⤵
      PID:3336
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3780 -ip 3780
      1⤵
        PID:4592

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si491519.exe
        Filesize

        175KB

        MD5

        6becd50771fc96920335fde52f880b50

        SHA1

        796494f2a0e6c49ee2d1034d7c68142b7bd3751b

        SHA256

        ef650c343d801663e2e76f0534834e3b762c2033ff5a7ffa10aa4bf296b3b1e9

        SHA512

        ba2fe8fdb52b6a87a5b782ff4c939dce970f9da7bbfe92839283dd76b0e0f9db41303192e2349bd8e96d80d06eaf35000d77a4ba663f045bb13f7adce28c0515

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si491519.exe
        Filesize

        175KB

        MD5

        6becd50771fc96920335fde52f880b50

        SHA1

        796494f2a0e6c49ee2d1034d7c68142b7bd3751b

        SHA256

        ef650c343d801663e2e76f0534834e3b762c2033ff5a7ffa10aa4bf296b3b1e9

        SHA512

        ba2fe8fdb52b6a87a5b782ff4c939dce970f9da7bbfe92839283dd76b0e0f9db41303192e2349bd8e96d80d06eaf35000d77a4ba663f045bb13f7adce28c0515

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un520148.exe
        Filesize

        517KB

        MD5

        d8a629cd0b0cad3347647192bdc8d1dc

        SHA1

        9602d0c78accbf0f8fcf6f3fc8641d5e2aa647b0

        SHA256

        cfac8bc7b01d92ed46cf5a6c5808b6e0d68a82429e382882b489af2fd5e27bbb

        SHA512

        df89d561dff13b2346bc6a568d25f22c188a17664004765ce38aea370a5b874d7486c06fff79fb2eacf0c6d256cbe91402ae80c5ea5a7cc580eaa1b666185a40

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un520148.exe
        Filesize

        517KB

        MD5

        d8a629cd0b0cad3347647192bdc8d1dc

        SHA1

        9602d0c78accbf0f8fcf6f3fc8641d5e2aa647b0

        SHA256

        cfac8bc7b01d92ed46cf5a6c5808b6e0d68a82429e382882b489af2fd5e27bbb

        SHA512

        df89d561dff13b2346bc6a568d25f22c188a17664004765ce38aea370a5b874d7486c06fff79fb2eacf0c6d256cbe91402ae80c5ea5a7cc580eaa1b666185a40

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5901.exe
        Filesize

        237KB

        MD5

        d7e73c2a71e1f035fb01aec6e59ff804

        SHA1

        2eadf3afcb8dd94fa80f5c7fe140ca10681d3dd1

        SHA256

        54679a85c44379eeab6327c99fff5cade352b165adc8bf5bd26f8889eb95aa20

        SHA512

        4c3bbe4cfd87f51f4e37015da518a13bff3d8e73e03fd86aa2a69d20f18e2cff8b24db3827e56bded4fc08d23ba14e974173b38285441b9a2616b5375f6708b6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5901.exe
        Filesize

        237KB

        MD5

        d7e73c2a71e1f035fb01aec6e59ff804

        SHA1

        2eadf3afcb8dd94fa80f5c7fe140ca10681d3dd1

        SHA256

        54679a85c44379eeab6327c99fff5cade352b165adc8bf5bd26f8889eb95aa20

        SHA512

        4c3bbe4cfd87f51f4e37015da518a13bff3d8e73e03fd86aa2a69d20f18e2cff8b24db3827e56bded4fc08d23ba14e974173b38285441b9a2616b5375f6708b6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5485.exe
        Filesize

        295KB

        MD5

        cb7a2c8417bafc57354a703945321483

        SHA1

        2721a656bd103c8610f83b428b238833c6f0b1a5

        SHA256

        544261fa1ebf55f94f088fbbcb3d6860a966ff431f0521d009a8b6b57979a0fa

        SHA512

        665652cf23211b6025de5aaa472f7c98851b656c9d193594cebda0828fdb957dd3a339982b08674eccc1fbc03454eaa3f41233f66b76d028e66fe07acb5c1ca6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5485.exe
        Filesize

        295KB

        MD5

        cb7a2c8417bafc57354a703945321483

        SHA1

        2721a656bd103c8610f83b428b238833c6f0b1a5

        SHA256

        544261fa1ebf55f94f088fbbcb3d6860a966ff431f0521d009a8b6b57979a0fa

        SHA512

        665652cf23211b6025de5aaa472f7c98851b656c9d193594cebda0828fdb957dd3a339982b08674eccc1fbc03454eaa3f41233f66b76d028e66fe07acb5c1ca6

      • memory/904-1122-0x0000000000F80000-0x0000000000FB2000-memory.dmp
        Filesize

        200KB

      • memory/1712-148-0x0000000004BE0000-0x0000000005184000-memory.dmp
        Filesize

        5.6MB

      • memory/1712-149-0x0000000000730000-0x000000000075D000-memory.dmp
        Filesize

        180KB

      • memory/1712-151-0x0000000002720000-0x0000000002730000-memory.dmp
        Filesize

        64KB

      • memory/1712-150-0x0000000002720000-0x0000000002730000-memory.dmp
        Filesize

        64KB

      • memory/1712-152-0x0000000002720000-0x0000000002730000-memory.dmp
        Filesize

        64KB

      • memory/1712-153-0x0000000002700000-0x0000000002712000-memory.dmp
        Filesize

        72KB

      • memory/1712-154-0x0000000002700000-0x0000000002712000-memory.dmp
        Filesize

        72KB

      • memory/1712-156-0x0000000002700000-0x0000000002712000-memory.dmp
        Filesize

        72KB

      • memory/1712-158-0x0000000002700000-0x0000000002712000-memory.dmp
        Filesize

        72KB

      • memory/1712-160-0x0000000002700000-0x0000000002712000-memory.dmp
        Filesize

        72KB

      • memory/1712-162-0x0000000002700000-0x0000000002712000-memory.dmp
        Filesize

        72KB

      • memory/1712-164-0x0000000002700000-0x0000000002712000-memory.dmp
        Filesize

        72KB

      • memory/1712-166-0x0000000002700000-0x0000000002712000-memory.dmp
        Filesize

        72KB

      • memory/1712-168-0x0000000002700000-0x0000000002712000-memory.dmp
        Filesize

        72KB

      • memory/1712-170-0x0000000002700000-0x0000000002712000-memory.dmp
        Filesize

        72KB

      • memory/1712-172-0x0000000002700000-0x0000000002712000-memory.dmp
        Filesize

        72KB

      • memory/1712-174-0x0000000002700000-0x0000000002712000-memory.dmp
        Filesize

        72KB

      • memory/1712-176-0x0000000002700000-0x0000000002712000-memory.dmp
        Filesize

        72KB

      • memory/1712-178-0x0000000002700000-0x0000000002712000-memory.dmp
        Filesize

        72KB

      • memory/1712-180-0x0000000002700000-0x0000000002712000-memory.dmp
        Filesize

        72KB

      • memory/1712-181-0x0000000000400000-0x00000000004A9000-memory.dmp
        Filesize

        676KB

      • memory/1712-182-0x0000000002720000-0x0000000002730000-memory.dmp
        Filesize

        64KB

      • memory/1712-183-0x0000000002720000-0x0000000002730000-memory.dmp
        Filesize

        64KB

      • memory/1712-184-0x0000000002720000-0x0000000002730000-memory.dmp
        Filesize

        64KB

      • memory/1712-186-0x0000000000400000-0x00000000004A9000-memory.dmp
        Filesize

        676KB

      • memory/3780-192-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/3780-191-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/3780-194-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/3780-196-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/3780-199-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/3780-198-0x0000000002110000-0x000000000215B000-memory.dmp
        Filesize

        300KB

      • memory/3780-200-0x00000000023C0000-0x00000000023D0000-memory.dmp
        Filesize

        64KB

      • memory/3780-203-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/3780-202-0x00000000023C0000-0x00000000023D0000-memory.dmp
        Filesize

        64KB

      • memory/3780-205-0x00000000023C0000-0x00000000023D0000-memory.dmp
        Filesize

        64KB

      • memory/3780-208-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/3780-206-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/3780-210-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/3780-212-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/3780-214-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/3780-216-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/3780-220-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/3780-218-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/3780-222-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/3780-224-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/3780-226-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/3780-228-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/3780-1101-0x00000000050C0000-0x00000000056D8000-memory.dmp
        Filesize

        6.1MB

      • memory/3780-1102-0x0000000005760000-0x000000000586A000-memory.dmp
        Filesize

        1.0MB

      • memory/3780-1103-0x00000000058A0000-0x00000000058B2000-memory.dmp
        Filesize

        72KB

      • memory/3780-1104-0x00000000023C0000-0x00000000023D0000-memory.dmp
        Filesize

        64KB

      • memory/3780-1105-0x00000000058C0000-0x00000000058FC000-memory.dmp
        Filesize

        240KB

      • memory/3780-1107-0x00000000023C0000-0x00000000023D0000-memory.dmp
        Filesize

        64KB

      • memory/3780-1108-0x00000000023C0000-0x00000000023D0000-memory.dmp
        Filesize

        64KB

      • memory/3780-1109-0x00000000023C0000-0x00000000023D0000-memory.dmp
        Filesize

        64KB

      • memory/3780-1110-0x0000000005BB0000-0x0000000005C42000-memory.dmp
        Filesize

        584KB

      • memory/3780-1111-0x0000000005C50000-0x0000000005CB6000-memory.dmp
        Filesize

        408KB

      • memory/3780-1112-0x0000000006470000-0x0000000006632000-memory.dmp
        Filesize

        1.8MB

      • memory/3780-1113-0x0000000006650000-0x0000000006B7C000-memory.dmp
        Filesize

        5.2MB

      • memory/3780-1114-0x00000000023C0000-0x00000000023D0000-memory.dmp
        Filesize

        64KB

      • memory/3780-1115-0x0000000006CB0000-0x0000000006D26000-memory.dmp
        Filesize

        472KB

      • memory/3780-1116-0x0000000006D40000-0x0000000006D90000-memory.dmp
        Filesize

        320KB