Analysis

  • max time kernel
    124s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 00:39

General

  • Target

    419689707668eaa46f34329665adda1152cf1915ab31011ee56aab19f821413d.exe

  • Size

    666KB

  • MD5

    8a8f95767aab6dd3c4bb21aac62a8d6d

  • SHA1

    bf818df9deb40d1e58f6dfb7e2828917d18be9ed

  • SHA256

    419689707668eaa46f34329665adda1152cf1915ab31011ee56aab19f821413d

  • SHA512

    b49f3d22f959f76c6d05359967435b5c1742d275bbd95d5901e3bf98db3a57a89ddfbdb2a2edac3c0c53ddb87a2c5fd3866d5e3608bb3549170dbb80ef0fc7a8

  • SSDEEP

    12288:dMrIy90j02AGnYiMgunvzGqq+EhVVEHlnrUMlJ/wXquWKZZC81Dc:ZymTqTvzGHREHdrDNw3WgC81Dc

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\419689707668eaa46f34329665adda1152cf1915ab31011ee56aab19f821413d.exe
    "C:\Users\Admin\AppData\Local\Temp\419689707668eaa46f34329665adda1152cf1915ab31011ee56aab19f821413d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1280
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un856047.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un856047.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4440
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9429.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9429.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2128
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 1080
          4⤵
          • Program crash
          PID:996
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0304.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0304.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4772
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4772 -s 1888
          4⤵
          • Program crash
          PID:1340
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si710102.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si710102.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3472
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2128 -ip 2128
    1⤵
      PID:4048
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4772 -ip 4772
      1⤵
        PID:5044

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si710102.exe

        Filesize

        176KB

        MD5

        d96856a35df79031d8d3bf6ee06fa807

        SHA1

        89788145081a0fd0f8bc363bef31e49ef69ff26f

        SHA256

        a2bfa8ddc8d9b822a18821840a72766d4a8344a5fddc5717ace376f94421f6e0

        SHA512

        0e017a23f6e9a4a69b671d12960f1e5b99a8a7c254ed4222bee4dc298621670dd8da1d8d214c11d37f5733ca2cf4b8d00ef4fa7738641364f55e590124f51a9a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si710102.exe

        Filesize

        176KB

        MD5

        d96856a35df79031d8d3bf6ee06fa807

        SHA1

        89788145081a0fd0f8bc363bef31e49ef69ff26f

        SHA256

        a2bfa8ddc8d9b822a18821840a72766d4a8344a5fddc5717ace376f94421f6e0

        SHA512

        0e017a23f6e9a4a69b671d12960f1e5b99a8a7c254ed4222bee4dc298621670dd8da1d8d214c11d37f5733ca2cf4b8d00ef4fa7738641364f55e590124f51a9a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un856047.exe

        Filesize

        524KB

        MD5

        5c07e2636881ed50808f3f8c5251abae

        SHA1

        0f87c70fb13cd97821fc89de869134168546c055

        SHA256

        df715286f9f9e9b28f73e333ae6bebbb55678694efa8357ea747ef0ad5fe769d

        SHA512

        e3282c3262f97da9a5e806b4fc7e01c286bf8a8c5364a7549429413bf8114d5978aa0bd94683622f78123c3cfccbf0ec418a30359c930387b77069e20204f1f0

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un856047.exe

        Filesize

        524KB

        MD5

        5c07e2636881ed50808f3f8c5251abae

        SHA1

        0f87c70fb13cd97821fc89de869134168546c055

        SHA256

        df715286f9f9e9b28f73e333ae6bebbb55678694efa8357ea747ef0ad5fe769d

        SHA512

        e3282c3262f97da9a5e806b4fc7e01c286bf8a8c5364a7549429413bf8114d5978aa0bd94683622f78123c3cfccbf0ec418a30359c930387b77069e20204f1f0

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9429.exe

        Filesize

        294KB

        MD5

        6aeb99b3d20fb4ffb9ea57ae1c719d7b

        SHA1

        40ff0b7b8e370d1c8c3d81a6ddace78b63ffcfa4

        SHA256

        5afcb7714e0ff5be811d3eaa8d680de8b91e2d80ea801f4e0d2f723fb53bbe17

        SHA512

        f2a69200a56349372ed1d401c6c422add1eb7198f7f96cdca6f6a53372b8080de78f0fa37f4dda1712708e5ddda8bf4a303039c97f4482ba0984b4f66ab0d261

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9429.exe

        Filesize

        294KB

        MD5

        6aeb99b3d20fb4ffb9ea57ae1c719d7b

        SHA1

        40ff0b7b8e370d1c8c3d81a6ddace78b63ffcfa4

        SHA256

        5afcb7714e0ff5be811d3eaa8d680de8b91e2d80ea801f4e0d2f723fb53bbe17

        SHA512

        f2a69200a56349372ed1d401c6c422add1eb7198f7f96cdca6f6a53372b8080de78f0fa37f4dda1712708e5ddda8bf4a303039c97f4482ba0984b4f66ab0d261

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0304.exe

        Filesize

        352KB

        MD5

        16d60f66b98dea2e7eb0f8d1029ebf84

        SHA1

        f298e9e62a5070094476c175c992d964f30d8d7d

        SHA256

        e66291fb1de9a1b17df0ca5eeeb969cfaac4e7bf920970a0d91e8419d408c585

        SHA512

        c4332ded2d7ae789d60b1e5b5113c132a43d54cbd11dc7a4fb86b51f0b6f111e1f2e47e263860b61bd679e1045d1ff1bbe5c0244b20f56181e2d6c2ad5f372a9

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0304.exe

        Filesize

        352KB

        MD5

        16d60f66b98dea2e7eb0f8d1029ebf84

        SHA1

        f298e9e62a5070094476c175c992d964f30d8d7d

        SHA256

        e66291fb1de9a1b17df0ca5eeeb969cfaac4e7bf920970a0d91e8419d408c585

        SHA512

        c4332ded2d7ae789d60b1e5b5113c132a43d54cbd11dc7a4fb86b51f0b6f111e1f2e47e263860b61bd679e1045d1ff1bbe5c0244b20f56181e2d6c2ad5f372a9

      • memory/2128-158-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2128-168-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2128-151-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/2128-150-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/2128-152-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/2128-153-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2128-154-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2128-156-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2128-148-0x0000000004F20000-0x00000000054C4000-memory.dmp

        Filesize

        5.6MB

      • memory/2128-162-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2128-160-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2128-164-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2128-166-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2128-149-0x00000000022F0000-0x000000000231D000-memory.dmp

        Filesize

        180KB

      • memory/2128-170-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2128-172-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2128-174-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2128-176-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2128-178-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2128-180-0x0000000004D70000-0x0000000004D82000-memory.dmp

        Filesize

        72KB

      • memory/2128-181-0x0000000000400000-0x00000000007FE000-memory.dmp

        Filesize

        4.0MB

      • memory/2128-182-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/2128-183-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/2128-184-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/2128-186-0x0000000000400000-0x00000000007FE000-memory.dmp

        Filesize

        4.0MB

      • memory/3472-1120-0x0000000000D90000-0x0000000000DC2000-memory.dmp

        Filesize

        200KB

      • memory/3472-1121-0x00000000059B0000-0x00000000059C0000-memory.dmp

        Filesize

        64KB

      • memory/4772-192-0x0000000005390000-0x00000000053CF000-memory.dmp

        Filesize

        252KB

      • memory/4772-194-0x0000000005390000-0x00000000053CF000-memory.dmp

        Filesize

        252KB

      • memory/4772-196-0x0000000005390000-0x00000000053CF000-memory.dmp

        Filesize

        252KB

      • memory/4772-200-0x0000000005390000-0x00000000053CF000-memory.dmp

        Filesize

        252KB

      • memory/4772-198-0x0000000005390000-0x00000000053CF000-memory.dmp

        Filesize

        252KB

      • memory/4772-202-0x0000000005390000-0x00000000053CF000-memory.dmp

        Filesize

        252KB

      • memory/4772-204-0x0000000005390000-0x00000000053CF000-memory.dmp

        Filesize

        252KB

      • memory/4772-206-0x0000000005390000-0x00000000053CF000-memory.dmp

        Filesize

        252KB

      • memory/4772-208-0x0000000005390000-0x00000000053CF000-memory.dmp

        Filesize

        252KB

      • memory/4772-210-0x0000000005390000-0x00000000053CF000-memory.dmp

        Filesize

        252KB

      • memory/4772-212-0x0000000005390000-0x00000000053CF000-memory.dmp

        Filesize

        252KB

      • memory/4772-214-0x0000000005390000-0x00000000053CF000-memory.dmp

        Filesize

        252KB

      • memory/4772-216-0x0000000005390000-0x00000000053CF000-memory.dmp

        Filesize

        252KB

      • memory/4772-218-0x0000000005390000-0x00000000053CF000-memory.dmp

        Filesize

        252KB

      • memory/4772-220-0x0000000005390000-0x00000000053CF000-memory.dmp

        Filesize

        252KB

      • memory/4772-222-0x0000000005390000-0x00000000053CF000-memory.dmp

        Filesize

        252KB

      • memory/4772-224-0x0000000005390000-0x00000000053CF000-memory.dmp

        Filesize

        252KB

      • memory/4772-266-0x00000000024C0000-0x000000000250B000-memory.dmp

        Filesize

        300KB

      • memory/4772-268-0x00000000028D0000-0x00000000028E0000-memory.dmp

        Filesize

        64KB

      • memory/4772-270-0x00000000028D0000-0x00000000028E0000-memory.dmp

        Filesize

        64KB

      • memory/4772-1100-0x0000000005550000-0x0000000005B68000-memory.dmp

        Filesize

        6.1MB

      • memory/4772-1101-0x0000000005BF0000-0x0000000005CFA000-memory.dmp

        Filesize

        1.0MB

      • memory/4772-1102-0x0000000005D30000-0x0000000005D42000-memory.dmp

        Filesize

        72KB

      • memory/4772-1103-0x0000000005D50000-0x0000000005D8C000-memory.dmp

        Filesize

        240KB

      • memory/4772-1104-0x00000000028D0000-0x00000000028E0000-memory.dmp

        Filesize

        64KB

      • memory/4772-1105-0x0000000006040000-0x00000000060D2000-memory.dmp

        Filesize

        584KB

      • memory/4772-1106-0x00000000060E0000-0x0000000006146000-memory.dmp

        Filesize

        408KB

      • memory/4772-1108-0x00000000028D0000-0x00000000028E0000-memory.dmp

        Filesize

        64KB

      • memory/4772-1109-0x00000000028D0000-0x00000000028E0000-memory.dmp

        Filesize

        64KB

      • memory/4772-1110-0x0000000006A40000-0x0000000006AB6000-memory.dmp

        Filesize

        472KB

      • memory/4772-1111-0x0000000006AE0000-0x0000000006B30000-memory.dmp

        Filesize

        320KB

      • memory/4772-191-0x0000000005390000-0x00000000053CF000-memory.dmp

        Filesize

        252KB

      • memory/4772-1112-0x00000000028D0000-0x00000000028E0000-memory.dmp

        Filesize

        64KB

      • memory/4772-1113-0x0000000006B60000-0x0000000006D22000-memory.dmp

        Filesize

        1.8MB

      • memory/4772-1114-0x0000000006D30000-0x000000000725C000-memory.dmp

        Filesize

        5.2MB