Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 05:18

General

  • Target

    389bc4d7f8228089f40d80c43e0ee050a9c2d0de1d823c6ac24282410b700834.exe

  • Size

    660KB

  • MD5

    f74d1a2bf11255bdde8a51631d1c30f7

  • SHA1

    ed7952128c0f7494f5b67a83947c8099f3ab07a5

  • SHA256

    389bc4d7f8228089f40d80c43e0ee050a9c2d0de1d823c6ac24282410b700834

  • SHA512

    b7f5970a24ac5ba7c8a5bdde87248c638de76b6bdaa17bbacafd7b2791b31f0adcc32ca26ed0931537b35d2ca505a3a99b66b8b7acbf0042e17c5b1130d730fa

  • SSDEEP

    12288:WMrSy90Qk+lTegY7kx0w0PyLHtUL1N2yr2T:AygaY00w0mHtULLHG

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\389bc4d7f8228089f40d80c43e0ee050a9c2d0de1d823c6ac24282410b700834.exe
    "C:\Users\Admin\AppData\Local\Temp\389bc4d7f8228089f40d80c43e0ee050a9c2d0de1d823c6ac24282410b700834.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4112
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un141060.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un141060.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4728
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9351.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9351.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4820
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4820 -s 1080
          4⤵
          • Program crash
          PID:4196
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9681.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9681.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2400
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2400 -s 1352
          4⤵
          • Program crash
          PID:1352
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si174899.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si174899.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:488
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4820 -ip 4820
    1⤵
      PID:2580
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2400 -ip 2400
      1⤵
        PID:4848

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si174899.exe

        Filesize

        176KB

        MD5

        5e3e5593fd68cd5e984a6919ca27ce87

        SHA1

        2ef917bab09a7553e3f78d45b0d223734c2a348c

        SHA256

        998d9d3719a8238c21f044d98766ca8ff13498f7868d379fcbe77cf17902642c

        SHA512

        2c4f964ed33265dd862f91e9583e46557372eb42d0dc1960c88e7a6864d6c78bdcd7011f1acce4a6b8a13f0bd12de71954966887855f86a1725a77f9dcb9e819

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si174899.exe

        Filesize

        176KB

        MD5

        5e3e5593fd68cd5e984a6919ca27ce87

        SHA1

        2ef917bab09a7553e3f78d45b0d223734c2a348c

        SHA256

        998d9d3719a8238c21f044d98766ca8ff13498f7868d379fcbe77cf17902642c

        SHA512

        2c4f964ed33265dd862f91e9583e46557372eb42d0dc1960c88e7a6864d6c78bdcd7011f1acce4a6b8a13f0bd12de71954966887855f86a1725a77f9dcb9e819

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un141060.exe

        Filesize

        518KB

        MD5

        250fb9859aa5acb6cc25cb6a0d16d20e

        SHA1

        4b089aa410e7afc721e50e966218cac77f3070ec

        SHA256

        8a97affb2705ccf77432b89953720a864b369d670d05776784ca0c38c5a8881e

        SHA512

        8c89b8ce8fca3b1ff403da9bf80a30587ca2da1545011194233d08060fb0d1d4f66553061cadc601a3f668361aacd658878846ae8b5cd9797b2e23f34b0dad56

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un141060.exe

        Filesize

        518KB

        MD5

        250fb9859aa5acb6cc25cb6a0d16d20e

        SHA1

        4b089aa410e7afc721e50e966218cac77f3070ec

        SHA256

        8a97affb2705ccf77432b89953720a864b369d670d05776784ca0c38c5a8881e

        SHA512

        8c89b8ce8fca3b1ff403da9bf80a30587ca2da1545011194233d08060fb0d1d4f66553061cadc601a3f668361aacd658878846ae8b5cd9797b2e23f34b0dad56

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9351.exe

        Filesize

        237KB

        MD5

        b93c2ed0f3cb1937bc93e8d7cf70ad8a

        SHA1

        333cca37db559061116bf4f0e157b38f5dcf0dfb

        SHA256

        a86ea44a2ab42796aa7f40dd0ccd742e4243f03633b9b2308e31c8a1e7ea98d8

        SHA512

        31e903b76ddfcce01da91936a280c545f9fc635c8c02c31c4fccea51447aaf4f9b2488871c5c8670cf1343daef8a36fdc0f4e086e11d332f7c3a2ab15f69943b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9351.exe

        Filesize

        237KB

        MD5

        b93c2ed0f3cb1937bc93e8d7cf70ad8a

        SHA1

        333cca37db559061116bf4f0e157b38f5dcf0dfb

        SHA256

        a86ea44a2ab42796aa7f40dd0ccd742e4243f03633b9b2308e31c8a1e7ea98d8

        SHA512

        31e903b76ddfcce01da91936a280c545f9fc635c8c02c31c4fccea51447aaf4f9b2488871c5c8670cf1343daef8a36fdc0f4e086e11d332f7c3a2ab15f69943b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9681.exe

        Filesize

        295KB

        MD5

        d1f032755925ca75fb7aae4052bc33d7

        SHA1

        1d49c69e8e50051aa825902df39870ed0be6059d

        SHA256

        e310754fceb55df776e41b07b58106bec6c809df4cb80e9a9330f775c9d72c28

        SHA512

        b6c6621b405ec198bc5d9eca615c3f074304e4d3eade2238c6f753ba833f90c22e5555bbf27ebebd25adb4a6241e827f2664c011f66edd06192022db5ec4f873

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9681.exe

        Filesize

        295KB

        MD5

        d1f032755925ca75fb7aae4052bc33d7

        SHA1

        1d49c69e8e50051aa825902df39870ed0be6059d

        SHA256

        e310754fceb55df776e41b07b58106bec6c809df4cb80e9a9330f775c9d72c28

        SHA512

        b6c6621b405ec198bc5d9eca615c3f074304e4d3eade2238c6f753ba833f90c22e5555bbf27ebebd25adb4a6241e827f2664c011f66edd06192022db5ec4f873

      • memory/488-1123-0x0000000005900000-0x0000000005910000-memory.dmp

        Filesize

        64KB

      • memory/488-1122-0x0000000005900000-0x0000000005910000-memory.dmp

        Filesize

        64KB

      • memory/488-1121-0x0000000000CE0000-0x0000000000D12000-memory.dmp

        Filesize

        200KB

      • memory/2400-1102-0x00000000059E0000-0x00000000059F2000-memory.dmp

        Filesize

        72KB

      • memory/2400-1105-0x0000000005CF0000-0x0000000005D82000-memory.dmp

        Filesize

        584KB

      • memory/2400-1115-0x0000000006FC0000-0x0000000007010000-memory.dmp

        Filesize

        320KB

      • memory/2400-1114-0x0000000006F20000-0x0000000006F96000-memory.dmp

        Filesize

        472KB

      • memory/2400-1113-0x00000000068D0000-0x0000000006DFC000-memory.dmp

        Filesize

        5.2MB

      • memory/2400-1112-0x00000000066F0000-0x00000000068B2000-memory.dmp

        Filesize

        1.8MB

      • memory/2400-1111-0x0000000004B90000-0x0000000004BA0000-memory.dmp

        Filesize

        64KB

      • memory/2400-1110-0x0000000004B90000-0x0000000004BA0000-memory.dmp

        Filesize

        64KB

      • memory/2400-1109-0x0000000004B90000-0x0000000004BA0000-memory.dmp

        Filesize

        64KB

      • memory/2400-1108-0x0000000004B90000-0x0000000004BA0000-memory.dmp

        Filesize

        64KB

      • memory/2400-1106-0x0000000005D90000-0x0000000005DF6000-memory.dmp

        Filesize

        408KB

      • memory/2400-1104-0x0000000005A00000-0x0000000005A3C000-memory.dmp

        Filesize

        240KB

      • memory/2400-1103-0x0000000004B90000-0x0000000004BA0000-memory.dmp

        Filesize

        64KB

      • memory/2400-1101-0x00000000058A0000-0x00000000059AA000-memory.dmp

        Filesize

        1.0MB

      • memory/2400-1100-0x0000000005250000-0x0000000005868000-memory.dmp

        Filesize

        6.1MB

      • memory/2400-467-0x0000000004B90000-0x0000000004BA0000-memory.dmp

        Filesize

        64KB

      • memory/2400-464-0x0000000004B90000-0x0000000004BA0000-memory.dmp

        Filesize

        64KB

      • memory/2400-463-0x0000000002160000-0x00000000021AB000-memory.dmp

        Filesize

        300KB

      • memory/2400-224-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

        Filesize

        252KB

      • memory/2400-222-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

        Filesize

        252KB

      • memory/2400-192-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

        Filesize

        252KB

      • memory/2400-191-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

        Filesize

        252KB

      • memory/2400-194-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

        Filesize

        252KB

      • memory/2400-196-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

        Filesize

        252KB

      • memory/2400-198-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

        Filesize

        252KB

      • memory/2400-200-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

        Filesize

        252KB

      • memory/2400-202-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

        Filesize

        252KB

      • memory/2400-204-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

        Filesize

        252KB

      • memory/2400-206-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

        Filesize

        252KB

      • memory/2400-208-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

        Filesize

        252KB

      • memory/2400-210-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

        Filesize

        252KB

      • memory/2400-212-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

        Filesize

        252KB

      • memory/2400-214-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

        Filesize

        252KB

      • memory/2400-216-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

        Filesize

        252KB

      • memory/2400-218-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

        Filesize

        252KB

      • memory/2400-220-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

        Filesize

        252KB

      • memory/4820-174-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4820-183-0x0000000002240000-0x0000000002250000-memory.dmp

        Filesize

        64KB

      • memory/4820-154-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4820-184-0x0000000002240000-0x0000000002250000-memory.dmp

        Filesize

        64KB

      • memory/4820-172-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4820-182-0x0000000002240000-0x0000000002250000-memory.dmp

        Filesize

        64KB

      • memory/4820-181-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/4820-170-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4820-180-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4820-178-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4820-158-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4820-176-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4820-186-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/4820-156-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4820-153-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4820-168-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4820-166-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4820-164-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4820-162-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4820-160-0x00000000025C0000-0x00000000025D2000-memory.dmp

        Filesize

        72KB

      • memory/4820-152-0x0000000002240000-0x0000000002250000-memory.dmp

        Filesize

        64KB

      • memory/4820-151-0x0000000002240000-0x0000000002250000-memory.dmp

        Filesize

        64KB

      • memory/4820-150-0x0000000002240000-0x0000000002250000-memory.dmp

        Filesize

        64KB

      • memory/4820-149-0x0000000004A70000-0x0000000005014000-memory.dmp

        Filesize

        5.6MB

      • memory/4820-148-0x0000000000640000-0x000000000066D000-memory.dmp

        Filesize

        180KB