Analysis

  • max time kernel
    76s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 08:20

General

  • Target

    10560114082a4ad73efbd6fd854da77962bd60bf80a80112f1cdf2793c11f9bd.exe

  • Size

    661KB

  • MD5

    b52c6b390bcc2680758827a8cae3be3d

  • SHA1

    1296a37b6c88e076a1d8656518778d29cab741bd

  • SHA256

    10560114082a4ad73efbd6fd854da77962bd60bf80a80112f1cdf2793c11f9bd

  • SHA512

    629eae9d986c87dce91a138aadf97c0b86aab8905fd35c656f3e6f08de34e3a8cf422d425196004d84486abf29e675d1f7a167b71946bca3e1b929c252479979

  • SSDEEP

    12288:yMrCy90evTToXvU6C4vsA5PsGNSYGbL6cR6ltfmg8QMc8u:8yWvUGsA5EGNSbv6cR6ltft4A

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\10560114082a4ad73efbd6fd854da77962bd60bf80a80112f1cdf2793c11f9bd.exe
    "C:\Users\Admin\AppData\Local\Temp\10560114082a4ad73efbd6fd854da77962bd60bf80a80112f1cdf2793c11f9bd.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1252
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un553397.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un553397.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4820
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4482.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4482.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1244
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1244 -s 1084
          4⤵
          • Program crash
          PID:4424
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5351.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5351.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1520
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 1340
          4⤵
          • Program crash
          PID:2352
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si002072.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si002072.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1036
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1244 -ip 1244
    1⤵
      PID:2152
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1520 -ip 1520
      1⤵
        PID:400

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si002072.exe

        Filesize

        176KB

        MD5

        cfe35bc88370c3e95421d39724d5a75a

        SHA1

        e74b6d72aeaf69fd35520f0f3a1ceb83878f433e

        SHA256

        8cb18485b196eef471cdbedece358fcf17c6e64b2d17bba08dec2fc31081497f

        SHA512

        392345a8da6393501a4734d871db4eb4b9a5d5ef246448f325ea144a5042756c178c47d91d8001bdfde990d688b9c09501f2221cf38a8389c8cbb5ebd4c66e82

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si002072.exe

        Filesize

        176KB

        MD5

        cfe35bc88370c3e95421d39724d5a75a

        SHA1

        e74b6d72aeaf69fd35520f0f3a1ceb83878f433e

        SHA256

        8cb18485b196eef471cdbedece358fcf17c6e64b2d17bba08dec2fc31081497f

        SHA512

        392345a8da6393501a4734d871db4eb4b9a5d5ef246448f325ea144a5042756c178c47d91d8001bdfde990d688b9c09501f2221cf38a8389c8cbb5ebd4c66e82

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un553397.exe

        Filesize

        518KB

        MD5

        40457ea9797c6cad42de556a17ae9178

        SHA1

        130d982f99c39c3d126f3f468e3ac26f70427bb5

        SHA256

        658f55a10cf0016b3899e786f732a0454ec915cd19881fda685ae1db874615cd

        SHA512

        313b27485927bbd134dd20e22a12668a6986bd0c777f04e66efa71efe7b2c44e96dcf3c1cc5911913e9b2ad5c5a366d9e92fd550fe8d5856899a24e9e4cb8217

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un553397.exe

        Filesize

        518KB

        MD5

        40457ea9797c6cad42de556a17ae9178

        SHA1

        130d982f99c39c3d126f3f468e3ac26f70427bb5

        SHA256

        658f55a10cf0016b3899e786f732a0454ec915cd19881fda685ae1db874615cd

        SHA512

        313b27485927bbd134dd20e22a12668a6986bd0c777f04e66efa71efe7b2c44e96dcf3c1cc5911913e9b2ad5c5a366d9e92fd550fe8d5856899a24e9e4cb8217

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4482.exe

        Filesize

        276KB

        MD5

        65e2b9b0a298e1a4195a161c3c2f013c

        SHA1

        365cd3d65aaeb71f41d02653c61d2b8bd17889bc

        SHA256

        b57741087f2339b4b0a198bfe58817d98df97624ac1c117d2fae402eb5b86d70

        SHA512

        d9f986099f2b150911fb9b709e3fc7fed04d49793feee0f588e16846c5f783c28c48c871db1979ff66962d28bfa62ed77014e8542ee8cf048940eebb03e8b737

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4482.exe

        Filesize

        276KB

        MD5

        65e2b9b0a298e1a4195a161c3c2f013c

        SHA1

        365cd3d65aaeb71f41d02653c61d2b8bd17889bc

        SHA256

        b57741087f2339b4b0a198bfe58817d98df97624ac1c117d2fae402eb5b86d70

        SHA512

        d9f986099f2b150911fb9b709e3fc7fed04d49793feee0f588e16846c5f783c28c48c871db1979ff66962d28bfa62ed77014e8542ee8cf048940eebb03e8b737

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5351.exe

        Filesize

        295KB

        MD5

        f863c67da2124c89ecca3d55001e2235

        SHA1

        7e6f66c82c9664f7b2b5c56c70f26cc26f3cd25b

        SHA256

        1266834c69ef1d19bd146cf7e5d3e5dfbfbd9f83ac5db76befde4cf057c0a086

        SHA512

        cc0ee86684965d5d0c56340336abbbdf0b328dfd8e8337b3533fb88a7907db894c8b2d8696a72fb8fb96366001f7fd092e840ace38a2d7b25182f433c03fc0ce

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5351.exe

        Filesize

        295KB

        MD5

        f863c67da2124c89ecca3d55001e2235

        SHA1

        7e6f66c82c9664f7b2b5c56c70f26cc26f3cd25b

        SHA256

        1266834c69ef1d19bd146cf7e5d3e5dfbfbd9f83ac5db76befde4cf057c0a086

        SHA512

        cc0ee86684965d5d0c56340336abbbdf0b328dfd8e8337b3533fb88a7907db894c8b2d8696a72fb8fb96366001f7fd092e840ace38a2d7b25182f433c03fc0ce

      • memory/1036-1122-0x00000000002F0000-0x0000000000322000-memory.dmp

        Filesize

        200KB

      • memory/1036-1123-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

        Filesize

        64KB

      • memory/1244-158-0x0000000003BD0000-0x0000000003BE2000-memory.dmp

        Filesize

        72KB

      • memory/1244-172-0x0000000003BD0000-0x0000000003BE2000-memory.dmp

        Filesize

        72KB

      • memory/1244-151-0x0000000003BD0000-0x0000000003BE2000-memory.dmp

        Filesize

        72KB

      • memory/1244-152-0x0000000003BD0000-0x0000000003BE2000-memory.dmp

        Filesize

        72KB

      • memory/1244-154-0x0000000003BD0000-0x0000000003BE2000-memory.dmp

        Filesize

        72KB

      • memory/1244-156-0x0000000003BD0000-0x0000000003BE2000-memory.dmp

        Filesize

        72KB

      • memory/1244-149-0x00000000062D0000-0x00000000062E0000-memory.dmp

        Filesize

        64KB

      • memory/1244-160-0x0000000003BD0000-0x0000000003BE2000-memory.dmp

        Filesize

        72KB

      • memory/1244-162-0x0000000003BD0000-0x0000000003BE2000-memory.dmp

        Filesize

        72KB

      • memory/1244-164-0x0000000003BD0000-0x0000000003BE2000-memory.dmp

        Filesize

        72KB

      • memory/1244-166-0x0000000003BD0000-0x0000000003BE2000-memory.dmp

        Filesize

        72KB

      • memory/1244-168-0x0000000003BD0000-0x0000000003BE2000-memory.dmp

        Filesize

        72KB

      • memory/1244-170-0x0000000003BD0000-0x0000000003BE2000-memory.dmp

        Filesize

        72KB

      • memory/1244-150-0x00000000062E0000-0x0000000006884000-memory.dmp

        Filesize

        5.6MB

      • memory/1244-174-0x0000000003BD0000-0x0000000003BE2000-memory.dmp

        Filesize

        72KB

      • memory/1244-176-0x0000000003BD0000-0x0000000003BE2000-memory.dmp

        Filesize

        72KB

      • memory/1244-178-0x0000000003BD0000-0x0000000003BE2000-memory.dmp

        Filesize

        72KB

      • memory/1244-179-0x00000000062D0000-0x00000000062E0000-memory.dmp

        Filesize

        64KB

      • memory/1244-180-0x00000000062D0000-0x00000000062E0000-memory.dmp

        Filesize

        64KB

      • memory/1244-181-0x0000000000400000-0x0000000001ADC000-memory.dmp

        Filesize

        22.9MB

      • memory/1244-182-0x00000000062D0000-0x00000000062E0000-memory.dmp

        Filesize

        64KB

      • memory/1244-184-0x00000000062D0000-0x00000000062E0000-memory.dmp

        Filesize

        64KB

      • memory/1244-185-0x00000000062D0000-0x00000000062E0000-memory.dmp

        Filesize

        64KB

      • memory/1244-186-0x0000000000400000-0x0000000001ADC000-memory.dmp

        Filesize

        22.9MB

      • memory/1244-148-0x0000000003710000-0x000000000373D000-memory.dmp

        Filesize

        180KB

      • memory/1520-194-0x0000000002730000-0x000000000276F000-memory.dmp

        Filesize

        252KB

      • memory/1520-226-0x0000000002730000-0x000000000276F000-memory.dmp

        Filesize

        252KB

      • memory/1520-196-0x0000000002730000-0x000000000276F000-memory.dmp

        Filesize

        252KB

      • memory/1520-198-0x0000000002730000-0x000000000276F000-memory.dmp

        Filesize

        252KB

      • memory/1520-201-0x0000000000610000-0x000000000065B000-memory.dmp

        Filesize

        300KB

      • memory/1520-200-0x0000000002730000-0x000000000276F000-memory.dmp

        Filesize

        252KB

      • memory/1520-202-0x0000000002780000-0x0000000002790000-memory.dmp

        Filesize

        64KB

      • memory/1520-204-0x0000000002780000-0x0000000002790000-memory.dmp

        Filesize

        64KB

      • memory/1520-205-0x0000000002730000-0x000000000276F000-memory.dmp

        Filesize

        252KB

      • memory/1520-208-0x0000000002730000-0x000000000276F000-memory.dmp

        Filesize

        252KB

      • memory/1520-210-0x0000000002730000-0x000000000276F000-memory.dmp

        Filesize

        252KB

      • memory/1520-212-0x0000000002730000-0x000000000276F000-memory.dmp

        Filesize

        252KB

      • memory/1520-206-0x0000000002780000-0x0000000002790000-memory.dmp

        Filesize

        64KB

      • memory/1520-214-0x0000000002730000-0x000000000276F000-memory.dmp

        Filesize

        252KB

      • memory/1520-216-0x0000000002730000-0x000000000276F000-memory.dmp

        Filesize

        252KB

      • memory/1520-218-0x0000000002730000-0x000000000276F000-memory.dmp

        Filesize

        252KB

      • memory/1520-220-0x0000000002730000-0x000000000276F000-memory.dmp

        Filesize

        252KB

      • memory/1520-222-0x0000000002730000-0x000000000276F000-memory.dmp

        Filesize

        252KB

      • memory/1520-224-0x0000000002730000-0x000000000276F000-memory.dmp

        Filesize

        252KB

      • memory/1520-192-0x0000000002730000-0x000000000276F000-memory.dmp

        Filesize

        252KB

      • memory/1520-228-0x0000000002730000-0x000000000276F000-memory.dmp

        Filesize

        252KB

      • memory/1520-1101-0x00000000052A0000-0x00000000058B8000-memory.dmp

        Filesize

        6.1MB

      • memory/1520-1102-0x00000000058C0000-0x00000000059CA000-memory.dmp

        Filesize

        1.0MB

      • memory/1520-1103-0x00000000059E0000-0x00000000059F2000-memory.dmp

        Filesize

        72KB

      • memory/1520-1104-0x0000000005A00000-0x0000000005A3C000-memory.dmp

        Filesize

        240KB

      • memory/1520-1105-0x0000000002780000-0x0000000002790000-memory.dmp

        Filesize

        64KB

      • memory/1520-1107-0x0000000005CF0000-0x0000000005D82000-memory.dmp

        Filesize

        584KB

      • memory/1520-1108-0x0000000005D90000-0x0000000005DF6000-memory.dmp

        Filesize

        408KB

      • memory/1520-1109-0x0000000002780000-0x0000000002790000-memory.dmp

        Filesize

        64KB

      • memory/1520-1110-0x0000000002780000-0x0000000002790000-memory.dmp

        Filesize

        64KB

      • memory/1520-1111-0x0000000002780000-0x0000000002790000-memory.dmp

        Filesize

        64KB

      • memory/1520-1112-0x00000000065B0000-0x0000000006772000-memory.dmp

        Filesize

        1.8MB

      • memory/1520-1113-0x0000000006790000-0x0000000006CBC000-memory.dmp

        Filesize

        5.2MB

      • memory/1520-191-0x0000000002730000-0x000000000276F000-memory.dmp

        Filesize

        252KB

      • memory/1520-1114-0x0000000006DE0000-0x0000000006E56000-memory.dmp

        Filesize

        472KB

      • memory/1520-1115-0x0000000006E80000-0x0000000006ED0000-memory.dmp

        Filesize

        320KB

      • memory/1520-1116-0x0000000002780000-0x0000000002790000-memory.dmp

        Filesize

        64KB