Analysis

  • max time kernel
    135s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 05:54

General

  • Target

    85eef5c44cc9644b81ef787c219a2109b60604189f8306ae97cd361f2da01765.exe

  • Size

    659KB

  • MD5

    fa08e0cd871c6dab49620f3909afe5f9

  • SHA1

    76c259e12925039069197df74014ab270a10bd33

  • SHA256

    85eef5c44cc9644b81ef787c219a2109b60604189f8306ae97cd361f2da01765

  • SHA512

    ad47a573aab9a54b343b7ef98067de1eb46e284bd3a519770582c1059e895e0187087c36431056424e96f83c10b4ac25fd227d8935919e741967e9e768d60aa8

  • SSDEEP

    12288:oMrIy90q1MJGG+udJaHU32WjJraNYqdBdDtOQ5yghXw+9Cq/x:wy/uJcGwQzONYqxDtOQZX/J

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85eef5c44cc9644b81ef787c219a2109b60604189f8306ae97cd361f2da01765.exe
    "C:\Users\Admin\AppData\Local\Temp\85eef5c44cc9644b81ef787c219a2109b60604189f8306ae97cd361f2da01765.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3776
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un535485.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un535485.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1920
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0883.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0883.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1684
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 1092
          4⤵
          • Program crash
          PID:180
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1020.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1020.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:324
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 324 -s 1328
          4⤵
          • Program crash
          PID:1852
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si954836.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si954836.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1336
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1684 -ip 1684
    1⤵
      PID:2856
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 324 -ip 324
      1⤵
        PID:4752

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si954836.exe

        Filesize

        176KB

        MD5

        616fb13a99ae040d141d385ee927019e

        SHA1

        73010864f0d02024c6104be88921b24b16bb5e3e

        SHA256

        d03dc4517ef69de08e0d7001806a4fb43b773c9aa748e03ea2d218f79143ace3

        SHA512

        5c7bd37dca00e3bd51e12830d34bdc16a2bc7a1511b23c9be656d91d14886aedbf1357d5574f695724ea3daa74aa5d90385526022d15ef655041b5145f24819e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si954836.exe

        Filesize

        176KB

        MD5

        616fb13a99ae040d141d385ee927019e

        SHA1

        73010864f0d02024c6104be88921b24b16bb5e3e

        SHA256

        d03dc4517ef69de08e0d7001806a4fb43b773c9aa748e03ea2d218f79143ace3

        SHA512

        5c7bd37dca00e3bd51e12830d34bdc16a2bc7a1511b23c9be656d91d14886aedbf1357d5574f695724ea3daa74aa5d90385526022d15ef655041b5145f24819e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un535485.exe

        Filesize

        517KB

        MD5

        fff84b3667df07a42092ad1520803f5b

        SHA1

        059081f27ff0eed94599f2544d8722c13fb96749

        SHA256

        dc6e43979beaa1bac459c4cfb29b652457d4cde18a41acfa161a190394108b5a

        SHA512

        068a455f880c27db7b1cceefcc3b73863cfcf5fcb7c9d274b0fcd23a6b7350ef672f080952a85ad1e2203b6b7c7b38f02fbdf12a36a837e03b6de87ddaeb9cf5

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un535485.exe

        Filesize

        517KB

        MD5

        fff84b3667df07a42092ad1520803f5b

        SHA1

        059081f27ff0eed94599f2544d8722c13fb96749

        SHA256

        dc6e43979beaa1bac459c4cfb29b652457d4cde18a41acfa161a190394108b5a

        SHA512

        068a455f880c27db7b1cceefcc3b73863cfcf5fcb7c9d274b0fcd23a6b7350ef672f080952a85ad1e2203b6b7c7b38f02fbdf12a36a837e03b6de87ddaeb9cf5

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0883.exe

        Filesize

        237KB

        MD5

        8a172b473d64e638c74fde8535322d1e

        SHA1

        ad0c316865d3b203dcb0bf797879d63cadfc368c

        SHA256

        f68891fdf64f6f0f0a7eb0cda3f7a6d4c1dfe77f3b9066aa26f64c88ed6c39b2

        SHA512

        9347b0aa536a451e7c95cff3434b4efcab7bc2ddf045dcee62672c72e9431d534a50ef8553e46279cb12b5791a053097516736974ab4c55a2a675c5d9f095d77

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0883.exe

        Filesize

        237KB

        MD5

        8a172b473d64e638c74fde8535322d1e

        SHA1

        ad0c316865d3b203dcb0bf797879d63cadfc368c

        SHA256

        f68891fdf64f6f0f0a7eb0cda3f7a6d4c1dfe77f3b9066aa26f64c88ed6c39b2

        SHA512

        9347b0aa536a451e7c95cff3434b4efcab7bc2ddf045dcee62672c72e9431d534a50ef8553e46279cb12b5791a053097516736974ab4c55a2a675c5d9f095d77

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1020.exe

        Filesize

        295KB

        MD5

        8390a93ca79cfd09313be870f1e00828

        SHA1

        632bb27a85f48822fe9a6cf99afd6c22db14c9ba

        SHA256

        48ab5491db40d3bace69a79cab169c6cb4183a71d02de42718d48791565f47c4

        SHA512

        9d2637809150b25e994985f8c6cfd77abb09a19512f9267a2f937ea943abeb9c421fe52d8e173ef06ef5716c295e282a5f242edb9bc03c6d4ac9306482478f77

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1020.exe

        Filesize

        295KB

        MD5

        8390a93ca79cfd09313be870f1e00828

        SHA1

        632bb27a85f48822fe9a6cf99afd6c22db14c9ba

        SHA256

        48ab5491db40d3bace69a79cab169c6cb4183a71d02de42718d48791565f47c4

        SHA512

        9d2637809150b25e994985f8c6cfd77abb09a19512f9267a2f937ea943abeb9c421fe52d8e173ef06ef5716c295e282a5f242edb9bc03c6d4ac9306482478f77

      • memory/324-295-0x00000000049E0000-0x00000000049F0000-memory.dmp

        Filesize

        64KB

      • memory/324-1102-0x00000000058A0000-0x00000000058B2000-memory.dmp

        Filesize

        72KB

      • memory/324-1115-0x0000000006E80000-0x0000000006ED0000-memory.dmp

        Filesize

        320KB

      • memory/324-1114-0x0000000006DF0000-0x0000000006E66000-memory.dmp

        Filesize

        472KB

      • memory/324-1113-0x00000000049E0000-0x00000000049F0000-memory.dmp

        Filesize

        64KB

      • memory/324-1112-0x0000000006790000-0x0000000006CBC000-memory.dmp

        Filesize

        5.2MB

      • memory/324-1111-0x00000000065B0000-0x0000000006772000-memory.dmp

        Filesize

        1.8MB

      • memory/324-1110-0x00000000049E0000-0x00000000049F0000-memory.dmp

        Filesize

        64KB

      • memory/324-1109-0x00000000049E0000-0x00000000049F0000-memory.dmp

        Filesize

        64KB

      • memory/324-1108-0x00000000049E0000-0x00000000049F0000-memory.dmp

        Filesize

        64KB

      • memory/324-1107-0x0000000006270000-0x0000000006302000-memory.dmp

        Filesize

        584KB

      • memory/324-1105-0x0000000005BB0000-0x0000000005C16000-memory.dmp

        Filesize

        408KB

      • memory/324-1104-0x00000000049E0000-0x00000000049F0000-memory.dmp

        Filesize

        64KB

      • memory/324-1103-0x00000000058C0000-0x00000000058FC000-memory.dmp

        Filesize

        240KB

      • memory/324-1101-0x0000000005760000-0x000000000586A000-memory.dmp

        Filesize

        1.0MB

      • memory/324-1100-0x00000000050C0000-0x00000000056D8000-memory.dmp

        Filesize

        6.1MB

      • memory/324-293-0x00000000049E0000-0x00000000049F0000-memory.dmp

        Filesize

        64KB

      • memory/324-291-0x00000000049E0000-0x00000000049F0000-memory.dmp

        Filesize

        64KB

      • memory/324-289-0x0000000002160000-0x00000000021AB000-memory.dmp

        Filesize

        300KB

      • memory/324-223-0x0000000005020000-0x000000000505F000-memory.dmp

        Filesize

        252KB

      • memory/324-221-0x0000000005020000-0x000000000505F000-memory.dmp

        Filesize

        252KB

      • memory/324-219-0x0000000005020000-0x000000000505F000-memory.dmp

        Filesize

        252KB

      • memory/324-191-0x0000000005020000-0x000000000505F000-memory.dmp

        Filesize

        252KB

      • memory/324-190-0x0000000005020000-0x000000000505F000-memory.dmp

        Filesize

        252KB

      • memory/324-193-0x0000000005020000-0x000000000505F000-memory.dmp

        Filesize

        252KB

      • memory/324-195-0x0000000005020000-0x000000000505F000-memory.dmp

        Filesize

        252KB

      • memory/324-197-0x0000000005020000-0x000000000505F000-memory.dmp

        Filesize

        252KB

      • memory/324-199-0x0000000005020000-0x000000000505F000-memory.dmp

        Filesize

        252KB

      • memory/324-201-0x0000000005020000-0x000000000505F000-memory.dmp

        Filesize

        252KB

      • memory/324-203-0x0000000005020000-0x000000000505F000-memory.dmp

        Filesize

        252KB

      • memory/324-205-0x0000000005020000-0x000000000505F000-memory.dmp

        Filesize

        252KB

      • memory/324-207-0x0000000005020000-0x000000000505F000-memory.dmp

        Filesize

        252KB

      • memory/324-209-0x0000000005020000-0x000000000505F000-memory.dmp

        Filesize

        252KB

      • memory/324-211-0x0000000005020000-0x000000000505F000-memory.dmp

        Filesize

        252KB

      • memory/324-213-0x0000000005020000-0x000000000505F000-memory.dmp

        Filesize

        252KB

      • memory/324-215-0x0000000005020000-0x000000000505F000-memory.dmp

        Filesize

        252KB

      • memory/324-217-0x0000000005020000-0x000000000505F000-memory.dmp

        Filesize

        252KB

      • memory/1336-1121-0x0000000000030000-0x0000000000062000-memory.dmp

        Filesize

        200KB

      • memory/1336-1122-0x0000000004990000-0x00000000049A0000-memory.dmp

        Filesize

        64KB

      • memory/1684-172-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/1684-148-0x0000000000610000-0x000000000063D000-memory.dmp

        Filesize

        180KB

      • memory/1684-182-0x0000000002690000-0x00000000026A0000-memory.dmp

        Filesize

        64KB

      • memory/1684-181-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/1684-150-0x0000000002690000-0x00000000026A0000-memory.dmp

        Filesize

        64KB

      • memory/1684-180-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/1684-178-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/1684-153-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/1684-176-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/1684-174-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/1684-152-0x0000000004C00000-0x00000000051A4000-memory.dmp

        Filesize

        5.6MB

      • memory/1684-183-0x0000000002690000-0x00000000026A0000-memory.dmp

        Filesize

        64KB

      • memory/1684-164-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/1684-166-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/1684-168-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/1684-162-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/1684-160-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/1684-158-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/1684-156-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/1684-154-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/1684-149-0x0000000002690000-0x00000000026A0000-memory.dmp

        Filesize

        64KB

      • memory/1684-170-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/1684-185-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/1684-151-0x0000000002690000-0x00000000026A0000-memory.dmp

        Filesize

        64KB