Analysis

  • max time kernel
    61s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 07:53

General

  • Target

    7981bddcef9c90c3853c5891c8ccb3c12a9a6eed3c4fe8ed6eb1064bc926cb7e.exe

  • Size

    660KB

  • MD5

    4b9282bd69cd221f579c04727949c43f

  • SHA1

    d0faaa58aefa30180bb8076fc68611606f34c954

  • SHA256

    7981bddcef9c90c3853c5891c8ccb3c12a9a6eed3c4fe8ed6eb1064bc926cb7e

  • SHA512

    2a33c13db3809ca5d06a3fb575040e7cdabc52d0126d5c41aa07abe701374b345a61e8fe67bcd5f3886097f1bc0ea238dc2fd9bde0747fd62b5085aa3cf0581f

  • SSDEEP

    12288:0MrSy90nuJScNO7GJUIKU1Ei5PsG+NyJ+36P6qnTmcoQMFl9:+yl0G0I5mi5EG+wJK6P6qnThkFl9

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7981bddcef9c90c3853c5891c8ccb3c12a9a6eed3c4fe8ed6eb1064bc926cb7e.exe
    "C:\Users\Admin\AppData\Local\Temp\7981bddcef9c90c3853c5891c8ccb3c12a9a6eed3c4fe8ed6eb1064bc926cb7e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2612
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un541869.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un541869.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2540
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9460.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9460.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3964
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3964 -s 1004
          4⤵
          • Program crash
          PID:3912
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0059.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0059.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1984
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 1364
          4⤵
          • Program crash
          PID:836
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si694212.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si694212.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3828
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3964 -ip 3964
    1⤵
      PID:432
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 1984 -ip 1984
      1⤵
        PID:3512

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si694212.exe

        Filesize

        176KB

        MD5

        42b6a36f78e5bfa3950464eb9687d749

        SHA1

        b9fab6597bba3bd4056825d87a9d2219f4d2b6dd

        SHA256

        324341608d62be8b2c23884b15cdf287b0235b3e593cabbc5228f5a95dd4e278

        SHA512

        367397b93f7ac32d165b7c0a5618fc678af994fa2918d03520051f6d4f692180c2c085a070d8538d6b0ee4c2378d38625f38f3b4a3b822c312998b29fa5d7dc0

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si694212.exe

        Filesize

        176KB

        MD5

        42b6a36f78e5bfa3950464eb9687d749

        SHA1

        b9fab6597bba3bd4056825d87a9d2219f4d2b6dd

        SHA256

        324341608d62be8b2c23884b15cdf287b0235b3e593cabbc5228f5a95dd4e278

        SHA512

        367397b93f7ac32d165b7c0a5618fc678af994fa2918d03520051f6d4f692180c2c085a070d8538d6b0ee4c2378d38625f38f3b4a3b822c312998b29fa5d7dc0

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un541869.exe

        Filesize

        518KB

        MD5

        a7666184f76f9bcff8a898c4fc357a5b

        SHA1

        74ba1e57da6a6605ee4032433133aeab20702e0b

        SHA256

        9899b1299232a4b28a7fb8f633c933f82d50513adbfd21b9d83846f6336b740c

        SHA512

        10d0deb161fa2d1e2bdc3c46b0ad347f44ec4475f018e6c096aac2909faacd7d221f60f9e42872dd82e985c5eae3226d793959c933c718d57dc7ac0bafafa069

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un541869.exe

        Filesize

        518KB

        MD5

        a7666184f76f9bcff8a898c4fc357a5b

        SHA1

        74ba1e57da6a6605ee4032433133aeab20702e0b

        SHA256

        9899b1299232a4b28a7fb8f633c933f82d50513adbfd21b9d83846f6336b740c

        SHA512

        10d0deb161fa2d1e2bdc3c46b0ad347f44ec4475f018e6c096aac2909faacd7d221f60f9e42872dd82e985c5eae3226d793959c933c718d57dc7ac0bafafa069

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9460.exe

        Filesize

        276KB

        MD5

        9535fc54abefc474928641ecc829bac6

        SHA1

        41e41c8b197d7d0cda64e185b3d8a6f5aa5833c9

        SHA256

        657917f3a7fe7ef43171448e691740509b528693de0f7e8340a9dd48da8fc62e

        SHA512

        bc68c36db419b284c2728857a08818f8bc165d6a2dda583601aa0aa6f895db78ac8198221a42b0f7704fe8829fa8a51b8257297b0c93fee1d14ebff042b1d100

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9460.exe

        Filesize

        276KB

        MD5

        9535fc54abefc474928641ecc829bac6

        SHA1

        41e41c8b197d7d0cda64e185b3d8a6f5aa5833c9

        SHA256

        657917f3a7fe7ef43171448e691740509b528693de0f7e8340a9dd48da8fc62e

        SHA512

        bc68c36db419b284c2728857a08818f8bc165d6a2dda583601aa0aa6f895db78ac8198221a42b0f7704fe8829fa8a51b8257297b0c93fee1d14ebff042b1d100

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0059.exe

        Filesize

        295KB

        MD5

        0ec2569cdb2ba896be7cb248eea039b6

        SHA1

        634fb6ef53c51c01282d03dadd1205d3dab68e0f

        SHA256

        e81e8996977824da66fb1d2a96b44d93ce2cf8a0deb646b20c737c1ebe93e1d5

        SHA512

        1e4e9b0a4f947633d310b0c07abcb33013f938d9b60501e485f7e9ddcf1216f254e6adb281b49bcfb18df6e0d550d09274c14dc52079dec220832bd3b45383f3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0059.exe

        Filesize

        295KB

        MD5

        0ec2569cdb2ba896be7cb248eea039b6

        SHA1

        634fb6ef53c51c01282d03dadd1205d3dab68e0f

        SHA256

        e81e8996977824da66fb1d2a96b44d93ce2cf8a0deb646b20c737c1ebe93e1d5

        SHA512

        1e4e9b0a4f947633d310b0c07abcb33013f938d9b60501e485f7e9ddcf1216f254e6adb281b49bcfb18df6e0d550d09274c14dc52079dec220832bd3b45383f3

      • memory/1984-1102-0x0000000004B90000-0x0000000004C9A000-memory.dmp

        Filesize

        1.0MB

      • memory/1984-1101-0x0000000005270000-0x0000000005888000-memory.dmp

        Filesize

        6.1MB

      • memory/1984-217-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

        Filesize

        64KB

      • memory/1984-218-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

        Filesize

        64KB

      • memory/1984-204-0x00000000023A0000-0x00000000023DF000-memory.dmp

        Filesize

        252KB

      • memory/1984-206-0x00000000023A0000-0x00000000023DF000-memory.dmp

        Filesize

        252KB

      • memory/1984-1115-0x0000000006630000-0x0000000006B5C000-memory.dmp

        Filesize

        5.2MB

      • memory/1984-1114-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

        Filesize

        64KB

      • memory/1984-1113-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

        Filesize

        64KB

      • memory/1984-1112-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

        Filesize

        64KB

      • memory/1984-208-0x00000000023A0000-0x00000000023DF000-memory.dmp

        Filesize

        252KB

      • memory/1984-1111-0x0000000006460000-0x0000000006622000-memory.dmp

        Filesize

        1.8MB

      • memory/1984-1110-0x00000000063E0000-0x0000000006430000-memory.dmp

        Filesize

        320KB

      • memory/1984-1109-0x0000000006350000-0x00000000063C6000-memory.dmp

        Filesize

        472KB

      • memory/1984-1108-0x0000000005C50000-0x0000000005CB6000-memory.dmp

        Filesize

        408KB

      • memory/1984-1107-0x0000000005BB0000-0x0000000005C42000-memory.dmp

        Filesize

        584KB

      • memory/1984-1105-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

        Filesize

        64KB

      • memory/1984-1104-0x00000000058C0000-0x00000000058FC000-memory.dmp

        Filesize

        240KB

      • memory/1984-1103-0x00000000058A0000-0x00000000058B2000-memory.dmp

        Filesize

        72KB

      • memory/1984-219-0x00000000023A0000-0x00000000023DF000-memory.dmp

        Filesize

        252KB

      • memory/1984-228-0x00000000023A0000-0x00000000023DF000-memory.dmp

        Filesize

        252KB

      • memory/1984-226-0x00000000023A0000-0x00000000023DF000-memory.dmp

        Filesize

        252KB

      • memory/1984-224-0x00000000023A0000-0x00000000023DF000-memory.dmp

        Filesize

        252KB

      • memory/1984-191-0x00000000023A0000-0x00000000023DF000-memory.dmp

        Filesize

        252KB

      • memory/1984-192-0x00000000023A0000-0x00000000023DF000-memory.dmp

        Filesize

        252KB

      • memory/1984-194-0x00000000023A0000-0x00000000023DF000-memory.dmp

        Filesize

        252KB

      • memory/1984-196-0x00000000023A0000-0x00000000023DF000-memory.dmp

        Filesize

        252KB

      • memory/1984-198-0x00000000023A0000-0x00000000023DF000-memory.dmp

        Filesize

        252KB

      • memory/1984-200-0x00000000023A0000-0x00000000023DF000-memory.dmp

        Filesize

        252KB

      • memory/1984-202-0x00000000023A0000-0x00000000023DF000-memory.dmp

        Filesize

        252KB

      • memory/1984-222-0x00000000023A0000-0x00000000023DF000-memory.dmp

        Filesize

        252KB

      • memory/1984-1116-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

        Filesize

        64KB

      • memory/1984-221-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

        Filesize

        64KB

      • memory/1984-210-0x00000000023A0000-0x00000000023DF000-memory.dmp

        Filesize

        252KB

      • memory/1984-212-0x00000000023A0000-0x00000000023DF000-memory.dmp

        Filesize

        252KB

      • memory/1984-215-0x00000000021C0000-0x000000000220B000-memory.dmp

        Filesize

        300KB

      • memory/1984-214-0x00000000023A0000-0x00000000023DF000-memory.dmp

        Filesize

        252KB

      • memory/3828-1122-0x0000000000C00000-0x0000000000C32000-memory.dmp

        Filesize

        200KB

      • memory/3828-1123-0x00000000057F0000-0x0000000005800000-memory.dmp

        Filesize

        64KB

      • memory/3964-181-0x0000000003C60000-0x0000000003C70000-memory.dmp

        Filesize

        64KB

      • memory/3964-172-0x0000000003D10000-0x0000000003D22000-memory.dmp

        Filesize

        72KB

      • memory/3964-148-0x0000000001BF0000-0x0000000001C1D000-memory.dmp

        Filesize

        180KB

      • memory/3964-151-0x0000000003D10000-0x0000000003D22000-memory.dmp

        Filesize

        72KB

      • memory/3964-152-0x0000000003D10000-0x0000000003D22000-memory.dmp

        Filesize

        72KB

      • memory/3964-186-0x0000000000400000-0x0000000001ADC000-memory.dmp

        Filesize

        22.9MB

      • memory/3964-185-0x0000000003C60000-0x0000000003C70000-memory.dmp

        Filesize

        64KB

      • memory/3964-150-0x00000000061D0000-0x0000000006774000-memory.dmp

        Filesize

        5.6MB

      • memory/3964-184-0x0000000003C60000-0x0000000003C70000-memory.dmp

        Filesize

        64KB

      • memory/3964-182-0x0000000000400000-0x0000000001ADC000-memory.dmp

        Filesize

        22.9MB

      • memory/3964-154-0x0000000003D10000-0x0000000003D22000-memory.dmp

        Filesize

        72KB

      • memory/3964-180-0x0000000003C60000-0x0000000003C70000-memory.dmp

        Filesize

        64KB

      • memory/3964-179-0x0000000003C60000-0x0000000003C70000-memory.dmp

        Filesize

        64KB

      • memory/3964-178-0x0000000003D10000-0x0000000003D22000-memory.dmp

        Filesize

        72KB

      • memory/3964-176-0x0000000003D10000-0x0000000003D22000-memory.dmp

        Filesize

        72KB

      • memory/3964-174-0x0000000003D10000-0x0000000003D22000-memory.dmp

        Filesize

        72KB

      • memory/3964-170-0x0000000003D10000-0x0000000003D22000-memory.dmp

        Filesize

        72KB

      • memory/3964-168-0x0000000003D10000-0x0000000003D22000-memory.dmp

        Filesize

        72KB

      • memory/3964-166-0x0000000003D10000-0x0000000003D22000-memory.dmp

        Filesize

        72KB

      • memory/3964-164-0x0000000003D10000-0x0000000003D22000-memory.dmp

        Filesize

        72KB

      • memory/3964-162-0x0000000003D10000-0x0000000003D22000-memory.dmp

        Filesize

        72KB

      • memory/3964-149-0x0000000003C60000-0x0000000003C70000-memory.dmp

        Filesize

        64KB

      • memory/3964-160-0x0000000003D10000-0x0000000003D22000-memory.dmp

        Filesize

        72KB

      • memory/3964-158-0x0000000003D10000-0x0000000003D22000-memory.dmp

        Filesize

        72KB

      • memory/3964-156-0x0000000003D10000-0x0000000003D22000-memory.dmp

        Filesize

        72KB