Analysis

  • max time kernel
    61s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/04/2023, 07:10

General

  • Target

    2216f6e577b1b90ae5ccb1c55c1c5c46e49ece65129d9cbf0dfbb9cbb90a5a19.exe

  • Size

    522KB

  • MD5

    9cc1547a3d632f9d401a9af912e5d165

  • SHA1

    f493131418dc87f3d2fdd4552a8ba21da9a35945

  • SHA256

    2216f6e577b1b90ae5ccb1c55c1c5c46e49ece65129d9cbf0dfbb9cbb90a5a19

  • SHA512

    379a893ad9655c0066b7e0e6c677829ec616608d0c11e1fc7dfbf33953acc3eaf5734e83d1244aa076f4a1061b4d6104bebf946615f425db9b7d1fcbba8ef3ea

  • SSDEEP

    6144:KTy+bnr+7p0yN90QEdvLK7/6DHoKyn9p/6iLv1Ham7J5Fim5wbyqygvSkt0etzHh:VMrLy90bvCgoXZ6m3weUtV1cH10ukZ

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 36 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2216f6e577b1b90ae5ccb1c55c1c5c46e49ece65129d9cbf0dfbb9cbb90a5a19.exe
    "C:\Users\Admin\AppData\Local\Temp\2216f6e577b1b90ae5ccb1c55c1c5c46e49ece65129d9cbf0dfbb9cbb90a5a19.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3820
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEf1716.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEf1716.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3196
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr302732.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr302732.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1156
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku046494.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku046494.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2672
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 1352
          4⤵
          • Program crash
          PID:2636
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr893517.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr893517.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4396
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2672 -ip 2672
    1⤵
      PID:1360

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr893517.exe

      Filesize

      176KB

      MD5

      6baad8d5c4059a2aca4d8553352ca2d4

      SHA1

      bcd1e6ef1e0ddb110769dcafae855eb2d61140da

      SHA256

      7b2b7dcbac8c053cd7af9c1999f5736f4671e33cca8ddff7eee018970ffec3cf

      SHA512

      f07c2a4dbaad419521dad527ea78759eebb3cd2852dbca9bd48c3bc11b03cb5080f5e600020f170276696bd66b71992033f39a6c533512ca52929637f127f901

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr893517.exe

      Filesize

      176KB

      MD5

      6baad8d5c4059a2aca4d8553352ca2d4

      SHA1

      bcd1e6ef1e0ddb110769dcafae855eb2d61140da

      SHA256

      7b2b7dcbac8c053cd7af9c1999f5736f4671e33cca8ddff7eee018970ffec3cf

      SHA512

      f07c2a4dbaad419521dad527ea78759eebb3cd2852dbca9bd48c3bc11b03cb5080f5e600020f170276696bd66b71992033f39a6c533512ca52929637f127f901

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEf1716.exe

      Filesize

      380KB

      MD5

      33094dbe87a9a9884333081e2574b034

      SHA1

      b323ffc1087ffe320c9119d3512d6f07c0e5f178

      SHA256

      90c35ba7f4087536d650b8e1eeec73c3c32b29ef46ec219765fd820008b96636

      SHA512

      7fe1fd06872e90c77a7048aabdf499a66dcfd294bc602c77469cdb7f0a1121c1c5b702868b75d5dce613b7ae0ae5ff7b1bfc1b290c4ff1633ba3513c8edc1611

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEf1716.exe

      Filesize

      380KB

      MD5

      33094dbe87a9a9884333081e2574b034

      SHA1

      b323ffc1087ffe320c9119d3512d6f07c0e5f178

      SHA256

      90c35ba7f4087536d650b8e1eeec73c3c32b29ef46ec219765fd820008b96636

      SHA512

      7fe1fd06872e90c77a7048aabdf499a66dcfd294bc602c77469cdb7f0a1121c1c5b702868b75d5dce613b7ae0ae5ff7b1bfc1b290c4ff1633ba3513c8edc1611

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr302732.exe

      Filesize

      14KB

      MD5

      6f7ba4ee8a7658cd039ce1c05c055b09

      SHA1

      a3cb06ee1ebf66ee2e597a3720a0b1c6b3f91579

      SHA256

      79c7d2049222ad8bef394f9762ef8cbb237ca8f99354807926e1335f5bec37d5

      SHA512

      8872e4754fbfe514d8e659a7923b03e9060d390216bd203df45e71d777169b8fd085239645b6efc45b2b3425cc3054b98cb971244037881e6533354bb95b8f8a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr302732.exe

      Filesize

      14KB

      MD5

      6f7ba4ee8a7658cd039ce1c05c055b09

      SHA1

      a3cb06ee1ebf66ee2e597a3720a0b1c6b3f91579

      SHA256

      79c7d2049222ad8bef394f9762ef8cbb237ca8f99354807926e1335f5bec37d5

      SHA512

      8872e4754fbfe514d8e659a7923b03e9060d390216bd203df45e71d777169b8fd085239645b6efc45b2b3425cc3054b98cb971244037881e6533354bb95b8f8a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku046494.exe

      Filesize

      295KB

      MD5

      32695ae256c9e7be0fc90c739ee561f3

      SHA1

      538e5cb42ac4b338bd55f2667324a54a7b24a19f

      SHA256

      4ac42498e4d1797a357630d642eb2036f67a730e37a99b05ae8a1ff50469e734

      SHA512

      c0f1686472e598f8023f25379012cba630da9abbe8e690a328125eaa4714f14c161ede765352b82c6fdfad50e14c3fcbb7d85ee4f66f5430ba161c23b67c70dd

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku046494.exe

      Filesize

      295KB

      MD5

      32695ae256c9e7be0fc90c739ee561f3

      SHA1

      538e5cb42ac4b338bd55f2667324a54a7b24a19f

      SHA256

      4ac42498e4d1797a357630d642eb2036f67a730e37a99b05ae8a1ff50469e734

      SHA512

      c0f1686472e598f8023f25379012cba630da9abbe8e690a328125eaa4714f14c161ede765352b82c6fdfad50e14c3fcbb7d85ee4f66f5430ba161c23b67c70dd

    • memory/1156-147-0x0000000000B00000-0x0000000000B0A000-memory.dmp

      Filesize

      40KB

    • memory/2672-153-0x0000000002130000-0x000000000217B000-memory.dmp

      Filesize

      300KB

    • memory/2672-154-0x0000000004CD0000-0x0000000005274000-memory.dmp

      Filesize

      5.6MB

    • memory/2672-155-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-156-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-158-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-160-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-162-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-166-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-164-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-168-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-170-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-172-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-174-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-176-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-178-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

      Filesize

      64KB

    • memory/2672-180-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

      Filesize

      64KB

    • memory/2672-179-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-182-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

      Filesize

      64KB

    • memory/2672-183-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-185-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-187-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-189-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-191-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-193-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-195-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-197-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-199-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-201-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-203-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-205-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-207-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-209-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-211-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-213-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-215-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-217-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-219-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-221-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/2672-1064-0x0000000005280000-0x0000000005898000-memory.dmp

      Filesize

      6.1MB

    • memory/2672-1065-0x00000000058A0000-0x00000000059AA000-memory.dmp

      Filesize

      1.0MB

    • memory/2672-1066-0x00000000059E0000-0x00000000059F2000-memory.dmp

      Filesize

      72KB

    • memory/2672-1067-0x0000000005A00000-0x0000000005A3C000-memory.dmp

      Filesize

      240KB

    • memory/2672-1068-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

      Filesize

      64KB

    • memory/2672-1070-0x0000000005CF0000-0x0000000005D82000-memory.dmp

      Filesize

      584KB

    • memory/2672-1071-0x0000000005D90000-0x0000000005DF6000-memory.dmp

      Filesize

      408KB

    • memory/2672-1072-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

      Filesize

      64KB

    • memory/2672-1073-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

      Filesize

      64KB

    • memory/2672-1074-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

      Filesize

      64KB

    • memory/2672-1075-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

      Filesize

      64KB

    • memory/2672-1076-0x00000000066F0000-0x0000000006766000-memory.dmp

      Filesize

      472KB

    • memory/2672-1077-0x0000000006790000-0x00000000067E0000-memory.dmp

      Filesize

      320KB

    • memory/2672-1078-0x0000000006810000-0x00000000069D2000-memory.dmp

      Filesize

      1.8MB

    • memory/2672-1079-0x00000000069E0000-0x0000000006F0C000-memory.dmp

      Filesize

      5.2MB

    • memory/4396-1085-0x0000000000010000-0x0000000000042000-memory.dmp

      Filesize

      200KB

    • memory/4396-1086-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

      Filesize

      64KB