Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/04/2023, 00:19

General

  • Target

    2048e72b0659aa296e88afcb779c7eb0d01b852b044a7b0a20e28409ddce5f46.exe

  • Size

    537KB

  • MD5

    47203462b8f1f56f7e1de6abcd22d0e7

  • SHA1

    b1cc46124a83e0879f7e6a0ce262135ad8adab71

  • SHA256

    2048e72b0659aa296e88afcb779c7eb0d01b852b044a7b0a20e28409ddce5f46

  • SHA512

    1c312d7e1bc48c8142fb630d22268815cbfaf89b01cd79d17b64d8117501361e0ad0d9aa8c8bc2adb9d82a254d77ff5a0ebef2c3181e7ac1fc49398aa4a7e9b9

  • SSDEEP

    12288:9MrEy90S6YtL2yFaMxNBZQDYeePU2VH+wF35EgJNnd:Nyv24aukZePRewDdd

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2048e72b0659aa296e88afcb779c7eb0d01b852b044a7b0a20e28409ddce5f46.exe
    "C:\Users\Admin\AppData\Local\Temp\2048e72b0659aa296e88afcb779c7eb0d01b852b044a7b0a20e28409ddce5f46.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4824
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigr9343.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigr9343.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4612
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr281794.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr281794.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2776
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku787004.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku787004.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1796
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1796 -s 1740
          4⤵
          • Program crash
          PID:4784
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr960713.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr960713.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2096
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 1796 -ip 1796
    1⤵
      PID:2196

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr960713.exe

      Filesize

      176KB

      MD5

      6741a6a51eac401261d32a57b274d999

      SHA1

      26cdbb55f4d38334649c787a4c19840b934ab1da

      SHA256

      73f7acb8687a2a29ca070b0c6e85a43668898629ce55c6b2688c31795a17e416

      SHA512

      e5ef170a063da017163e230dd0b3cf1d5c80bd5c96a0b4e9d44c07c4172678ca34f0934542ca0c6ce13321d2545c69b5b9dd88464acf4106657f7725f920dc68

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr960713.exe

      Filesize

      176KB

      MD5

      6741a6a51eac401261d32a57b274d999

      SHA1

      26cdbb55f4d38334649c787a4c19840b934ab1da

      SHA256

      73f7acb8687a2a29ca070b0c6e85a43668898629ce55c6b2688c31795a17e416

      SHA512

      e5ef170a063da017163e230dd0b3cf1d5c80bd5c96a0b4e9d44c07c4172678ca34f0934542ca0c6ce13321d2545c69b5b9dd88464acf4106657f7725f920dc68

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigr9343.exe

      Filesize

      395KB

      MD5

      d9165300c3647e0ffb4170de4a52f522

      SHA1

      e5c793ad95e2d44fb239758c8e721f1aa4ad87b6

      SHA256

      ce1359bd77566ff70f7bb85cc946b9c26ba633238813f5db3a8abdc721f1aff0

      SHA512

      25f93ac11a04ebf956e8fde946db191862fe7821981a7390482ac4a8c38a3c61883a1b29f8046d345cb10ef4e71ef252d4e6a21e7b277d2b5ca73eab116edd77

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigr9343.exe

      Filesize

      395KB

      MD5

      d9165300c3647e0ffb4170de4a52f522

      SHA1

      e5c793ad95e2d44fb239758c8e721f1aa4ad87b6

      SHA256

      ce1359bd77566ff70f7bb85cc946b9c26ba633238813f5db3a8abdc721f1aff0

      SHA512

      25f93ac11a04ebf956e8fde946db191862fe7821981a7390482ac4a8c38a3c61883a1b29f8046d345cb10ef4e71ef252d4e6a21e7b277d2b5ca73eab116edd77

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr281794.exe

      Filesize

      14KB

      MD5

      0004a80a16bd499e3515dcf3313f809c

      SHA1

      cc78c81de536c8212c2d3ec5ff831b374d658ace

      SHA256

      b2199beff7de2e0aeca84d7e8168ed6ff6d109530961998e2fd0c845e03764b7

      SHA512

      ac0b56972e159bf50c57371e3576bb76e037929ff62594f3982c000924f9545adfcb041347f3aba3d477a37cfcc7440d27a88866da4eec940c1ca5f212b22adc

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr281794.exe

      Filesize

      14KB

      MD5

      0004a80a16bd499e3515dcf3313f809c

      SHA1

      cc78c81de536c8212c2d3ec5ff831b374d658ace

      SHA256

      b2199beff7de2e0aeca84d7e8168ed6ff6d109530961998e2fd0c845e03764b7

      SHA512

      ac0b56972e159bf50c57371e3576bb76e037929ff62594f3982c000924f9545adfcb041347f3aba3d477a37cfcc7440d27a88866da4eec940c1ca5f212b22adc

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku787004.exe

      Filesize

      352KB

      MD5

      478f8c27d209f5b2e97625b95e8d25a0

      SHA1

      f8b3be90c1894d206d3269b625f81cdf5703cfb3

      SHA256

      b9adb8c4da2bca9d251bd4efd7c5cd0eb5229415b0a4d2d6d03560b92f95a2a5

      SHA512

      63904d45b657ca5dea9ea7f4f9387a39fe678df2ac3045d8e9a57f8bc0ded97f506fd9c84f5da1a3212a9ebff487106b73b52b2ee31a53f0e523c38cad9f4718

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku787004.exe

      Filesize

      352KB

      MD5

      478f8c27d209f5b2e97625b95e8d25a0

      SHA1

      f8b3be90c1894d206d3269b625f81cdf5703cfb3

      SHA256

      b9adb8c4da2bca9d251bd4efd7c5cd0eb5229415b0a4d2d6d03560b92f95a2a5

      SHA512

      63904d45b657ca5dea9ea7f4f9387a39fe678df2ac3045d8e9a57f8bc0ded97f506fd9c84f5da1a3212a9ebff487106b73b52b2ee31a53f0e523c38cad9f4718

    • memory/1796-153-0x0000000004FC0000-0x0000000005564000-memory.dmp

      Filesize

      5.6MB

    • memory/1796-154-0x00000000024C0000-0x000000000250B000-memory.dmp

      Filesize

      300KB

    • memory/1796-156-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

      Filesize

      64KB

    • memory/1796-155-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

      Filesize

      64KB

    • memory/1796-157-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

      Filesize

      64KB

    • memory/1796-158-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-159-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-161-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-163-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-165-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-167-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-169-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-171-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-173-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-175-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-177-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-179-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-181-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-183-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-185-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-187-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-189-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-191-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-193-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-195-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-197-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-199-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-201-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-203-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-205-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-207-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-209-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-211-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-213-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-215-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-217-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-219-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-221-0x0000000002960000-0x000000000299F000-memory.dmp

      Filesize

      252KB

    • memory/1796-1064-0x0000000005570000-0x0000000005B88000-memory.dmp

      Filesize

      6.1MB

    • memory/1796-1065-0x0000000005BF0000-0x0000000005CFA000-memory.dmp

      Filesize

      1.0MB

    • memory/1796-1066-0x0000000005D30000-0x0000000005D42000-memory.dmp

      Filesize

      72KB

    • memory/1796-1067-0x0000000005D50000-0x0000000005D8C000-memory.dmp

      Filesize

      240KB

    • memory/1796-1068-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

      Filesize

      64KB

    • memory/1796-1070-0x0000000006040000-0x00000000060A6000-memory.dmp

      Filesize

      408KB

    • memory/1796-1071-0x0000000006710000-0x00000000067A2000-memory.dmp

      Filesize

      584KB

    • memory/1796-1072-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

      Filesize

      64KB

    • memory/1796-1073-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

      Filesize

      64KB

    • memory/1796-1074-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

      Filesize

      64KB

    • memory/1796-1075-0x0000000006900000-0x0000000006AC2000-memory.dmp

      Filesize

      1.8MB

    • memory/1796-1076-0x0000000006AE0000-0x000000000700C000-memory.dmp

      Filesize

      5.2MB

    • memory/1796-1077-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

      Filesize

      64KB

    • memory/1796-1078-0x0000000008420000-0x0000000008496000-memory.dmp

      Filesize

      472KB

    • memory/1796-1079-0x00000000084A0000-0x00000000084F0000-memory.dmp

      Filesize

      320KB

    • memory/2096-1085-0x0000000000970000-0x00000000009A2000-memory.dmp

      Filesize

      200KB

    • memory/2096-1086-0x0000000005260000-0x0000000005270000-memory.dmp

      Filesize

      64KB

    • memory/2096-1087-0x0000000005260000-0x0000000005270000-memory.dmp

      Filesize

      64KB

    • memory/2776-147-0x00000000000C0000-0x00000000000CA000-memory.dmp

      Filesize

      40KB