Analysis

  • max time kernel
    74s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/04/2023, 01:43

General

  • Target

    3d199f43500685e0567b9754ebd2e9f2fd7282abbd539584eba8906eae4de164.exe

  • Size

    538KB

  • MD5

    d36d939a079863da976a56bc1f29f100

  • SHA1

    1dda82455a309ee82bd4ce5b5a94486b40863052

  • SHA256

    3d199f43500685e0567b9754ebd2e9f2fd7282abbd539584eba8906eae4de164

  • SHA512

    b02e401ca724c704c69ab11aad9a10c5df3aadd5c6bb52b89c9edbe2adcc2aeb4fdd2cb9da9c701477ed0cdeed7e6cbc0a505960c0f20dbce696d6147376d1cc

  • SSDEEP

    12288:+Mr5y90EoPeSwkf/6CjVX1aEb/UHvH6w0PWT/BIbSe6Pm:DyYxP36CjR1H/qawF/SblZ

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d199f43500685e0567b9754ebd2e9f2fd7282abbd539584eba8906eae4de164.exe
    "C:\Users\Admin\AppData\Local\Temp\3d199f43500685e0567b9754ebd2e9f2fd7282abbd539584eba8906eae4de164.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4260
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziva8651.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziva8651.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1592
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr937140.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr937140.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4228
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku121268.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku121268.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5112
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5112 -s 1544
          4⤵
          • Program crash
          PID:1500
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr137113.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr137113.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4748
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 5112 -ip 5112
    1⤵
      PID:4684

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr137113.exe

            Filesize

            176KB

            MD5

            96d75f711737fe6dbfe9932f93345935

            SHA1

            998a207949cb370ba73979eb43be9e67c56fd41c

            SHA256

            8aef99d47ec30367274feca3a004eb79bbc462d6a55c009ef6ebd9fbca8d7902

            SHA512

            8c8edc5cc659af30933dc76670beaf526821a1e5987e0b81ffb53d6044d8af660720aed158acf61dce24be3406a4f3287e8fbcfc61d855ab357a6d08e36d8346

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr137113.exe

            Filesize

            176KB

            MD5

            96d75f711737fe6dbfe9932f93345935

            SHA1

            998a207949cb370ba73979eb43be9e67c56fd41c

            SHA256

            8aef99d47ec30367274feca3a004eb79bbc462d6a55c009ef6ebd9fbca8d7902

            SHA512

            8c8edc5cc659af30933dc76670beaf526821a1e5987e0b81ffb53d6044d8af660720aed158acf61dce24be3406a4f3287e8fbcfc61d855ab357a6d08e36d8346

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziva8651.exe

            Filesize

            395KB

            MD5

            b317df4bf0383f02930255650fad5a0e

            SHA1

            16433c5786b95b0bedb2581104a6be5a0860d2bd

            SHA256

            eec49a98cbf0e01d3b0d89b3a1a00613c81c507df646720228782038a771af21

            SHA512

            d8e010e64672aec30f029739d6cbf905da8ff01773058a0728388665078ddce6fe6f58476ae0c985a9d6867640a1d6dfc3c2ea2352a15a39dc21b1b22dd9fd49

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziva8651.exe

            Filesize

            395KB

            MD5

            b317df4bf0383f02930255650fad5a0e

            SHA1

            16433c5786b95b0bedb2581104a6be5a0860d2bd

            SHA256

            eec49a98cbf0e01d3b0d89b3a1a00613c81c507df646720228782038a771af21

            SHA512

            d8e010e64672aec30f029739d6cbf905da8ff01773058a0728388665078ddce6fe6f58476ae0c985a9d6867640a1d6dfc3c2ea2352a15a39dc21b1b22dd9fd49

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr937140.exe

            Filesize

            14KB

            MD5

            cdc21ff27371bbeea7aea0bead8ef3f1

            SHA1

            e0203ccfd24979dddff009a73a903b7a1fd53cec

            SHA256

            c4d90f1b640a3009c44109bd324213fa6a6b8e4699814145c980eaea743e5295

            SHA512

            2d2a5fc40d1b96060f7b54ef63ad5814cdd009525949211592a7984f20a0923353450e0507c6000d891836ca91c0fb91a144490991e82131fe55aff116a2910f

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr937140.exe

            Filesize

            14KB

            MD5

            cdc21ff27371bbeea7aea0bead8ef3f1

            SHA1

            e0203ccfd24979dddff009a73a903b7a1fd53cec

            SHA256

            c4d90f1b640a3009c44109bd324213fa6a6b8e4699814145c980eaea743e5295

            SHA512

            2d2a5fc40d1b96060f7b54ef63ad5814cdd009525949211592a7984f20a0923353450e0507c6000d891836ca91c0fb91a144490991e82131fe55aff116a2910f

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku121268.exe

            Filesize

            352KB

            MD5

            447055db7c874a76b9d37898560d95dc

            SHA1

            98b362ac1366f00fea00491689e8cd0b3d3baa25

            SHA256

            f232e54e79e0eda7723ed0793fd6a53a99fc1f1003450a946b427b93161a3195

            SHA512

            40504d14feb399a1896e268c4438fc10ff74ffc034bcb4c78bce4ad40f129bada90a2a175b25c4e1c0e285df8a2818929ac798768b3dd5c126b17850981f8f3d

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku121268.exe

            Filesize

            352KB

            MD5

            447055db7c874a76b9d37898560d95dc

            SHA1

            98b362ac1366f00fea00491689e8cd0b3d3baa25

            SHA256

            f232e54e79e0eda7723ed0793fd6a53a99fc1f1003450a946b427b93161a3195

            SHA512

            40504d14feb399a1896e268c4438fc10ff74ffc034bcb4c78bce4ad40f129bada90a2a175b25c4e1c0e285df8a2818929ac798768b3dd5c126b17850981f8f3d

          • memory/4228-147-0x0000000000860000-0x000000000086A000-memory.dmp

            Filesize

            40KB

          • memory/4748-1085-0x0000000000280000-0x00000000002B2000-memory.dmp

            Filesize

            200KB

          • memory/4748-1086-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

            Filesize

            64KB

          • memory/5112-191-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-203-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-156-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-158-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-160-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-162-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-163-0x00000000025B0000-0x00000000025C0000-memory.dmp

            Filesize

            64KB

          • memory/5112-164-0x00000000025B0000-0x00000000025C0000-memory.dmp

            Filesize

            64KB

          • memory/5112-166-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-168-0x00000000025B0000-0x00000000025C0000-memory.dmp

            Filesize

            64KB

          • memory/5112-171-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-169-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-173-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-175-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-177-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-179-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-181-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-183-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-185-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-187-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-189-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-154-0x0000000004D70000-0x0000000005314000-memory.dmp

            Filesize

            5.6MB

          • memory/5112-193-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-195-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-197-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-199-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-201-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-155-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-205-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-207-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-209-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-211-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-213-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-215-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-217-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-219-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-221-0x0000000005370000-0x00000000053AF000-memory.dmp

            Filesize

            252KB

          • memory/5112-1064-0x0000000005410000-0x0000000005A28000-memory.dmp

            Filesize

            6.1MB

          • memory/5112-1065-0x0000000005AB0000-0x0000000005BBA000-memory.dmp

            Filesize

            1.0MB

          • memory/5112-1066-0x0000000005BF0000-0x0000000005C02000-memory.dmp

            Filesize

            72KB

          • memory/5112-1067-0x0000000005C10000-0x0000000005C4C000-memory.dmp

            Filesize

            240KB

          • memory/5112-1068-0x00000000025B0000-0x00000000025C0000-memory.dmp

            Filesize

            64KB

          • memory/5112-1070-0x0000000005F00000-0x0000000005F92000-memory.dmp

            Filesize

            584KB

          • memory/5112-1071-0x0000000005FA0000-0x0000000006006000-memory.dmp

            Filesize

            408KB

          • memory/5112-1072-0x00000000025B0000-0x00000000025C0000-memory.dmp

            Filesize

            64KB

          • memory/5112-1073-0x00000000025B0000-0x00000000025C0000-memory.dmp

            Filesize

            64KB

          • memory/5112-1074-0x00000000025B0000-0x00000000025C0000-memory.dmp

            Filesize

            64KB

          • memory/5112-1075-0x00000000067D0000-0x0000000006992000-memory.dmp

            Filesize

            1.8MB

          • memory/5112-1076-0x00000000069A0000-0x0000000006ECC000-memory.dmp

            Filesize

            5.2MB

          • memory/5112-153-0x0000000000C00000-0x0000000000C4B000-memory.dmp

            Filesize

            300KB

          • memory/5112-1077-0x00000000025B0000-0x00000000025C0000-memory.dmp

            Filesize

            64KB

          • memory/5112-1078-0x0000000007140000-0x00000000071B6000-memory.dmp

            Filesize

            472KB

          • memory/5112-1079-0x00000000071D0000-0x0000000007220000-memory.dmp

            Filesize

            320KB