Analysis

  • max time kernel
    108s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/04/2023, 08:35

General

  • Target

    2ccdc71187b339c7ca55ee2501d25f550e99dccaef62662757b208825b46f4b1.exe

  • Size

    522KB

  • MD5

    53fbc2751e6611d18efded55ac3c3804

  • SHA1

    62367f6fed66f0adb97ca18619ccf43076aa3678

  • SHA256

    2ccdc71187b339c7ca55ee2501d25f550e99dccaef62662757b208825b46f4b1

  • SHA512

    1f9d2535a79c80be610a8b8221a3c85e1cef7a1df723c7212afb550ef8f03922393c4dd28b86047cd643607955b0b2b479714cbd886257230516c9f79f035673

  • SSDEEP

    12288:zMrly90suGKRC+YP51+zTU686qAemEO1SYGC:2yaGXh1+z386qAe3ObV

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ccdc71187b339c7ca55ee2501d25f550e99dccaef62662757b208825b46f4b1.exe
    "C:\Users\Admin\AppData\Local\Temp\2ccdc71187b339c7ca55ee2501d25f550e99dccaef62662757b208825b46f4b1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1504
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZN1564.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZN1564.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1728
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr975757.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr975757.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2292
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku298058.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku298058.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1192
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1192 -s 1368
          4⤵
          • Program crash
          PID:4032
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr881833.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr881833.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:960
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 1192 -ip 1192
    1⤵
      PID:1736

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr881833.exe

            Filesize

            176KB

            MD5

            b5e6b5915cd0bde5f0f9f7e8438c9eba

            SHA1

            5192e8d7887cfcf67d76199badf2934bf1ab8a66

            SHA256

            3d4c4fece928de6813d9674194f908349a6e85b52c111f81b2c82f632b402a9b

            SHA512

            e20c3f8de21a156a746ce9c5988c3895fbab0c6e5f741587d2654c290ac6324a7ede00cd70a30a2ee1142f5af64c8fe5a38c65a63597f0dbc261c3d9ae34119b

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr881833.exe

            Filesize

            176KB

            MD5

            b5e6b5915cd0bde5f0f9f7e8438c9eba

            SHA1

            5192e8d7887cfcf67d76199badf2934bf1ab8a66

            SHA256

            3d4c4fece928de6813d9674194f908349a6e85b52c111f81b2c82f632b402a9b

            SHA512

            e20c3f8de21a156a746ce9c5988c3895fbab0c6e5f741587d2654c290ac6324a7ede00cd70a30a2ee1142f5af64c8fe5a38c65a63597f0dbc261c3d9ae34119b

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZN1564.exe

            Filesize

            380KB

            MD5

            006fda800a82929d349b0a484fc5a455

            SHA1

            578c31dc78fe0d9d06170cf50dce0f509b772b7d

            SHA256

            d98ca56a4cda669a9fc7ea328f9b062ba23f46ad23f19d3c4bd1ce2e4d1ab1a9

            SHA512

            00d761a32db258b76c633f8f8d723995baf1eb8eb8b2195ae0b9ea41740ecb2e0899188b9d4efba89ac6ee329b0dfae5f31af0da895e8bc5dcf7c8e124e29536

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZN1564.exe

            Filesize

            380KB

            MD5

            006fda800a82929d349b0a484fc5a455

            SHA1

            578c31dc78fe0d9d06170cf50dce0f509b772b7d

            SHA256

            d98ca56a4cda669a9fc7ea328f9b062ba23f46ad23f19d3c4bd1ce2e4d1ab1a9

            SHA512

            00d761a32db258b76c633f8f8d723995baf1eb8eb8b2195ae0b9ea41740ecb2e0899188b9d4efba89ac6ee329b0dfae5f31af0da895e8bc5dcf7c8e124e29536

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr975757.exe

            Filesize

            14KB

            MD5

            8a0e91f881d7915ea828c39d8523b105

            SHA1

            a8bdaba5103fbc9e592d9d30d490c67691040533

            SHA256

            fe752edba0ea1b68d746d9d751d1bfb2c4838f389ab4d9076b469f1226785a7a

            SHA512

            60a156e0dc7ddb2941c83ef28cb752390dd5ddd9a9be8c43184bb7ae15e7bafe21d74f4bd909088d2cbd952422ab54d31918f975c996de5a1028ab2ea42f3e14

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr975757.exe

            Filesize

            14KB

            MD5

            8a0e91f881d7915ea828c39d8523b105

            SHA1

            a8bdaba5103fbc9e592d9d30d490c67691040533

            SHA256

            fe752edba0ea1b68d746d9d751d1bfb2c4838f389ab4d9076b469f1226785a7a

            SHA512

            60a156e0dc7ddb2941c83ef28cb752390dd5ddd9a9be8c43184bb7ae15e7bafe21d74f4bd909088d2cbd952422ab54d31918f975c996de5a1028ab2ea42f3e14

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku298058.exe

            Filesize

            295KB

            MD5

            124a1083fec32b6a3849cd58f6b49f7a

            SHA1

            12c89b3eefc6905f09a64535ec920ec3f1567923

            SHA256

            16322a5f77a33606cfb2b96c8dc7bf4de4d9f73a3e4d16ab3894d478d0ee4e02

            SHA512

            d843d53a1fb02a3ae0f230325a10081024bc0d978e246c5da77a6784623307b94265fed90a34843690e23c5fa699fd5429de5a8513ea42872abbdf7ecd941273

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku298058.exe

            Filesize

            295KB

            MD5

            124a1083fec32b6a3849cd58f6b49f7a

            SHA1

            12c89b3eefc6905f09a64535ec920ec3f1567923

            SHA256

            16322a5f77a33606cfb2b96c8dc7bf4de4d9f73a3e4d16ab3894d478d0ee4e02

            SHA512

            d843d53a1fb02a3ae0f230325a10081024bc0d978e246c5da77a6784623307b94265fed90a34843690e23c5fa699fd5429de5a8513ea42872abbdf7ecd941273

          • memory/960-1084-0x0000000000C30000-0x0000000000C62000-memory.dmp

            Filesize

            200KB

          • memory/960-1085-0x00000000056B0000-0x00000000056C0000-memory.dmp

            Filesize

            64KB

          • memory/1192-191-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-207-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-156-0x0000000004B10000-0x0000000004B20000-memory.dmp

            Filesize

            64KB

          • memory/1192-155-0x0000000004B10000-0x0000000004B20000-memory.dmp

            Filesize

            64KB

          • memory/1192-157-0x0000000004B10000-0x0000000004B20000-memory.dmp

            Filesize

            64KB

          • memory/1192-158-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-159-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-161-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-169-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-167-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-171-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-165-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-173-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-179-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-177-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-175-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-181-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-163-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-189-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-193-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-153-0x0000000004B20000-0x00000000050C4000-memory.dmp

            Filesize

            5.6MB

          • memory/1192-195-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-197-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-199-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-187-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-201-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-185-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-154-0x0000000000610000-0x000000000065B000-memory.dmp

            Filesize

            300KB

          • memory/1192-209-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-205-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-203-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-183-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-217-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-219-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-215-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-221-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-213-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-211-0x0000000004A80000-0x0000000004ABF000-memory.dmp

            Filesize

            252KB

          • memory/1192-1064-0x00000000050D0000-0x00000000056E8000-memory.dmp

            Filesize

            6.1MB

          • memory/1192-1065-0x0000000005760000-0x000000000586A000-memory.dmp

            Filesize

            1.0MB

          • memory/1192-1066-0x00000000058A0000-0x00000000058B2000-memory.dmp

            Filesize

            72KB

          • memory/1192-1067-0x00000000058C0000-0x00000000058FC000-memory.dmp

            Filesize

            240KB

          • memory/1192-1068-0x0000000004B10000-0x0000000004B20000-memory.dmp

            Filesize

            64KB

          • memory/1192-1070-0x0000000004B10000-0x0000000004B20000-memory.dmp

            Filesize

            64KB

          • memory/1192-1071-0x0000000004B10000-0x0000000004B20000-memory.dmp

            Filesize

            64KB

          • memory/1192-1072-0x0000000004B10000-0x0000000004B20000-memory.dmp

            Filesize

            64KB

          • memory/1192-1073-0x0000000005BB0000-0x0000000005C42000-memory.dmp

            Filesize

            584KB

          • memory/1192-1074-0x0000000005C50000-0x0000000005CB6000-memory.dmp

            Filesize

            408KB

          • memory/1192-1075-0x0000000006350000-0x00000000063C6000-memory.dmp

            Filesize

            472KB

          • memory/1192-1076-0x00000000063E0000-0x0000000006430000-memory.dmp

            Filesize

            320KB

          • memory/1192-1077-0x0000000006450000-0x0000000006612000-memory.dmp

            Filesize

            1.8MB

          • memory/1192-1078-0x0000000006630000-0x0000000006B5C000-memory.dmp

            Filesize

            5.2MB

          • memory/2292-147-0x0000000000640000-0x000000000064A000-memory.dmp

            Filesize

            40KB