Analysis

  • max time kernel
    90s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 03:45

General

  • Target

    8587c68666dde7cded546a0707fdc98446e790f64ee893a14d04868716b2301b.exe

  • Size

    666KB

  • MD5

    be074f58ad108656f2c23b4efbe3cd7f

  • SHA1

    af3eda63e68dd0874ba412d9186db1fa353de729

  • SHA256

    8587c68666dde7cded546a0707fdc98446e790f64ee893a14d04868716b2301b

  • SHA512

    9fe82beca0aceaf6cc3adaa3082b70c52ec95ebbff576cc8757be17be035abd45cc7831b8405552576d2847735fc3faaa2ac7db560e5c7561ecafaba7b7cc2d1

  • SSDEEP

    12288:LMrhy90ytASS6aW9rnX1r20CSn3aBWn8DrUUFK/wKpKGHHkTfWx:ey+7JsrdrXqBe8Drj0wSKeHT

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8587c68666dde7cded546a0707fdc98446e790f64ee893a14d04868716b2301b.exe
    "C:\Users\Admin\AppData\Local\Temp\8587c68666dde7cded546a0707fdc98446e790f64ee893a14d04868716b2301b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4488
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un781868.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un781868.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2672
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4997.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4997.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2660
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 1084
          4⤵
          • Program crash
          PID:3924
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9011.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9011.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1564
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 1348
          4⤵
          • Program crash
          PID:2152
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si181075.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si181075.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3856
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 2660 -ip 2660
    1⤵
      PID:460
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1564 -ip 1564
      1⤵
        PID:2896

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si181075.exe

        Filesize

        176KB

        MD5

        84784fa906ec990f84721e300ef7778c

        SHA1

        7580614349547a99b77582e81b1d11eb90d5b15c

        SHA256

        79fbf5449a257eabf3342bd14f5882cf2997e41f742099c0deff47de214a0d9d

        SHA512

        45ad51091359c0317296bd993a24b5b2d5bf741b9f48ea83f47723d8e11495098096963e700d9cadbfbc45364f3c08d9236a34e577902a37dfa161d52e135d2d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si181075.exe

        Filesize

        176KB

        MD5

        84784fa906ec990f84721e300ef7778c

        SHA1

        7580614349547a99b77582e81b1d11eb90d5b15c

        SHA256

        79fbf5449a257eabf3342bd14f5882cf2997e41f742099c0deff47de214a0d9d

        SHA512

        45ad51091359c0317296bd993a24b5b2d5bf741b9f48ea83f47723d8e11495098096963e700d9cadbfbc45364f3c08d9236a34e577902a37dfa161d52e135d2d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un781868.exe

        Filesize

        524KB

        MD5

        fe9b68aab5c5575ee293ed6e1a1ae55f

        SHA1

        7cde8d701cff05f800dbf39397e7cd68e53f8eaf

        SHA256

        f29f5b9f6b159e49d521f70e6dc90a7b8dda43ef4e5eac9e9f4b289017100a71

        SHA512

        e105771082fb4dd2789a62d85ae4ea0bd9a50cc8d290a0a657eddd259f06af25f1eb8eee082b3e0a4569e52b387116412472b43fd9d41997e181e1143899d218

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un781868.exe

        Filesize

        524KB

        MD5

        fe9b68aab5c5575ee293ed6e1a1ae55f

        SHA1

        7cde8d701cff05f800dbf39397e7cd68e53f8eaf

        SHA256

        f29f5b9f6b159e49d521f70e6dc90a7b8dda43ef4e5eac9e9f4b289017100a71

        SHA512

        e105771082fb4dd2789a62d85ae4ea0bd9a50cc8d290a0a657eddd259f06af25f1eb8eee082b3e0a4569e52b387116412472b43fd9d41997e181e1143899d218

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4997.exe

        Filesize

        294KB

        MD5

        663a71c19dd4a0355e54a46d42b65448

        SHA1

        b646dec054f85e0d86855efd18fae1157815ae97

        SHA256

        0fa049e51f73bccb5029a3d68baafcc4503108ee55933ca9a02e1cb289defe77

        SHA512

        87f817705c6ff35fba44f9662aeebc60461f3a5e3c0cc02019d5155cf17dacc9e0f82d5eac081b584a0e5b25541da63976a35cda4dc88ff0393858f81d89c0d1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4997.exe

        Filesize

        294KB

        MD5

        663a71c19dd4a0355e54a46d42b65448

        SHA1

        b646dec054f85e0d86855efd18fae1157815ae97

        SHA256

        0fa049e51f73bccb5029a3d68baafcc4503108ee55933ca9a02e1cb289defe77

        SHA512

        87f817705c6ff35fba44f9662aeebc60461f3a5e3c0cc02019d5155cf17dacc9e0f82d5eac081b584a0e5b25541da63976a35cda4dc88ff0393858f81d89c0d1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9011.exe

        Filesize

        352KB

        MD5

        1b902a520f9726f7215b0450f9c97fe7

        SHA1

        3233515f8e7fb59f1d76dd69040499aaa986172c

        SHA256

        f04ddb14633d420799bd7578544b6b2f256121fb470153b5f0e74da2e32308a0

        SHA512

        45bad1fea0d2dfbe3acb377a96bc7d17edbffecef7f74d8b8af9fd3e3440e7c48ca60137b911c376e7e30725c58188d329e128d67d8ea758bff458a9754866e4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9011.exe

        Filesize

        352KB

        MD5

        1b902a520f9726f7215b0450f9c97fe7

        SHA1

        3233515f8e7fb59f1d76dd69040499aaa986172c

        SHA256

        f04ddb14633d420799bd7578544b6b2f256121fb470153b5f0e74da2e32308a0

        SHA512

        45bad1fea0d2dfbe3acb377a96bc7d17edbffecef7f74d8b8af9fd3e3440e7c48ca60137b911c376e7e30725c58188d329e128d67d8ea758bff458a9754866e4

      • memory/1564-448-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/1564-1102-0x0000000005D30000-0x0000000005D42000-memory.dmp

        Filesize

        72KB

      • memory/1564-1115-0x0000000006D30000-0x000000000725C000-memory.dmp

        Filesize

        5.2MB

      • memory/1564-1114-0x0000000006B60000-0x0000000006D22000-memory.dmp

        Filesize

        1.8MB

      • memory/1564-1113-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/1564-1112-0x0000000006AD0000-0x0000000006B20000-memory.dmp

        Filesize

        320KB

      • memory/1564-1111-0x0000000006A40000-0x0000000006AB6000-memory.dmp

        Filesize

        472KB

      • memory/1564-1110-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/1564-1109-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/1564-1108-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/1564-1107-0x00000000060E0000-0x0000000006146000-memory.dmp

        Filesize

        408KB

      • memory/1564-1105-0x0000000006040000-0x00000000060D2000-memory.dmp

        Filesize

        584KB

      • memory/1564-1104-0x0000000005D50000-0x0000000005D8C000-memory.dmp

        Filesize

        240KB

      • memory/1564-1103-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/1564-1101-0x0000000005BF0000-0x0000000005CFA000-memory.dmp

        Filesize

        1.0MB

      • memory/1564-1100-0x00000000055D0000-0x0000000005BE8000-memory.dmp

        Filesize

        6.1MB

      • memory/1564-446-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/1564-445-0x00000000024B0000-0x00000000024FB000-memory.dmp

        Filesize

        300KB

      • memory/1564-224-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/1564-222-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/1564-220-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/1564-218-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/1564-216-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/1564-192-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/1564-194-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/1564-191-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/1564-196-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/1564-198-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/1564-200-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/1564-202-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/1564-204-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/1564-206-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/1564-208-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/1564-210-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/1564-212-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/1564-214-0x0000000004DB0000-0x0000000004DEF000-memory.dmp

        Filesize

        252KB

      • memory/2660-174-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2660-160-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2660-152-0x0000000004F50000-0x0000000004F60000-memory.dmp

        Filesize

        64KB

      • memory/2660-184-0x0000000004F50000-0x0000000004F60000-memory.dmp

        Filesize

        64KB

      • memory/2660-183-0x0000000004F50000-0x0000000004F60000-memory.dmp

        Filesize

        64KB

      • memory/2660-182-0x0000000004F50000-0x0000000004F60000-memory.dmp

        Filesize

        64KB

      • memory/2660-181-0x0000000000400000-0x00000000007FE000-memory.dmp

        Filesize

        4.0MB

      • memory/2660-149-0x0000000000910000-0x000000000093D000-memory.dmp

        Filesize

        180KB

      • memory/2660-180-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2660-178-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2660-153-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2660-176-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2660-186-0x0000000000400000-0x00000000007FE000-memory.dmp

        Filesize

        4.0MB

      • memory/2660-172-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2660-156-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2660-168-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2660-166-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2660-164-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2660-162-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2660-151-0x0000000004F50000-0x0000000004F60000-memory.dmp

        Filesize

        64KB

      • memory/2660-158-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2660-170-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2660-154-0x0000000004D90000-0x0000000004DA2000-memory.dmp

        Filesize

        72KB

      • memory/2660-150-0x0000000004F50000-0x0000000004F60000-memory.dmp

        Filesize

        64KB

      • memory/2660-148-0x0000000004F60000-0x0000000005504000-memory.dmp

        Filesize

        5.6MB

      • memory/3856-1121-0x0000000000550000-0x0000000000582000-memory.dmp

        Filesize

        200KB

      • memory/3856-1122-0x0000000005160000-0x0000000005170000-memory.dmp

        Filesize

        64KB