Analysis

  • max time kernel
    62s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 13:48

General

  • Target

    ef9d50ff1372778e8fa6ef76978cddd454da11abe3e0183b1525494921534e86.exe

  • Size

    659KB

  • MD5

    ebf78f10f286c370b5af52326c8fea53

  • SHA1

    fb1d5b688d0feb8e5b21e343cc4a50c813c2980e

  • SHA256

    ef9d50ff1372778e8fa6ef76978cddd454da11abe3e0183b1525494921534e86

  • SHA512

    89d13cad7d35b839c76ae154db7d2317404a6b4e2c05bb0fa0d0d279b60da0d85ba183113b368f1e84f10da7139f130da0767febc30de3e7909a519487f568a8

  • SSDEEP

    12288:dMrsy90Sd/VXewgvmJU7cB2IVN88Zebhh9ohUKhGc10wZXTUB/RqgbiFJvxThS:1yF/FevvMUZITDebhKPf10iYBJqAiFJq

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef9d50ff1372778e8fa6ef76978cddd454da11abe3e0183b1525494921534e86.exe
    "C:\Users\Admin\AppData\Local\Temp\ef9d50ff1372778e8fa6ef76978cddd454da11abe3e0183b1525494921534e86.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un734897.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un734897.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:704
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4814.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4814.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4124
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 1080
          4⤵
          • Program crash
          PID:996
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1258.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1258.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4256
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4256 -s 1760
          4⤵
          • Program crash
          PID:1480
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si354674.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si354674.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:740
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4124 -ip 4124
    1⤵
      PID:1036
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4256 -ip 4256
      1⤵
        PID:5056

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si354674.exe

        Filesize

        175KB

        MD5

        bb6d43fa4ebafe62b98ec4dea4ff49d9

        SHA1

        d8188e664ac977f59d3ec26589e3cf67b1fab23b

        SHA256

        1d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89

        SHA512

        679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si354674.exe

        Filesize

        175KB

        MD5

        bb6d43fa4ebafe62b98ec4dea4ff49d9

        SHA1

        d8188e664ac977f59d3ec26589e3cf67b1fab23b

        SHA256

        1d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89

        SHA512

        679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un734897.exe

        Filesize

        516KB

        MD5

        1d4bb67197d3d8fa87e97f7523781b82

        SHA1

        038b5e2a1b87b118585c280086d64ce28d49cc59

        SHA256

        e0846d5f38b68e2331a2379351784737c39e6d4ba7e19f88bdcf11b7f195f857

        SHA512

        9742c84cc62229fbe52fdff87aaeaa8a28ee019185deee3f8b1903a572d2a516da386fc917b479e98d195d7fac19ed6f9fc24960907a1df18745bae3c95e5068

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un734897.exe

        Filesize

        516KB

        MD5

        1d4bb67197d3d8fa87e97f7523781b82

        SHA1

        038b5e2a1b87b118585c280086d64ce28d49cc59

        SHA256

        e0846d5f38b68e2331a2379351784737c39e6d4ba7e19f88bdcf11b7f195f857

        SHA512

        9742c84cc62229fbe52fdff87aaeaa8a28ee019185deee3f8b1903a572d2a516da386fc917b479e98d195d7fac19ed6f9fc24960907a1df18745bae3c95e5068

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4814.exe

        Filesize

        236KB

        MD5

        2ffa98cf23d791ea229a4d9d0c573de7

        SHA1

        a82cece6aeb485e94fa9ddcbeef4441965b037e1

        SHA256

        b8b88b19a3b66043a65d3338507b93e8e362c74123fb288f9e759f214ce4f53b

        SHA512

        1d92ec9a1ee4ddb775b74e28033f753916a887fdf7e30217424822c81cbbbfefa2a9c3e949ffabb8ef003ec4ba74f6aec5c9b13ddd540a92353e4944fd8e2afc

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4814.exe

        Filesize

        236KB

        MD5

        2ffa98cf23d791ea229a4d9d0c573de7

        SHA1

        a82cece6aeb485e94fa9ddcbeef4441965b037e1

        SHA256

        b8b88b19a3b66043a65d3338507b93e8e362c74123fb288f9e759f214ce4f53b

        SHA512

        1d92ec9a1ee4ddb775b74e28033f753916a887fdf7e30217424822c81cbbbfefa2a9c3e949ffabb8ef003ec4ba74f6aec5c9b13ddd540a92353e4944fd8e2afc

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1258.exe

        Filesize

        294KB

        MD5

        3eb272d1477ca3e0cb493ec10a9574dc

        SHA1

        c0afb1edf2cbc5f58113f2b8bd812431c4f29395

        SHA256

        e18b3ef8908b3462a5e733ed0d1d00239b83d3df519efc4f66dafbacbacb44e0

        SHA512

        506f2837d490dc334fbea2a03dc8ea377a978b3b4c949eca5cc83aa3e0f262b2a58b4a0fa6055da9f62a42871071f6abd32c548b65fe7a2d033dd2c91e232520

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1258.exe

        Filesize

        294KB

        MD5

        3eb272d1477ca3e0cb493ec10a9574dc

        SHA1

        c0afb1edf2cbc5f58113f2b8bd812431c4f29395

        SHA256

        e18b3ef8908b3462a5e733ed0d1d00239b83d3df519efc4f66dafbacbacb44e0

        SHA512

        506f2837d490dc334fbea2a03dc8ea377a978b3b4c949eca5cc83aa3e0f262b2a58b4a0fa6055da9f62a42871071f6abd32c548b65fe7a2d033dd2c91e232520

      • memory/740-1119-0x0000000000140000-0x0000000000172000-memory.dmp

        Filesize

        200KB

      • memory/740-1120-0x0000000004CF0000-0x0000000004D00000-memory.dmp

        Filesize

        64KB

      • memory/4124-158-0x0000000002480000-0x0000000002492000-memory.dmp

        Filesize

        72KB

      • memory/4124-168-0x0000000002480000-0x0000000002492000-memory.dmp

        Filesize

        72KB

      • memory/4124-151-0x0000000002480000-0x0000000002492000-memory.dmp

        Filesize

        72KB

      • memory/4124-152-0x0000000002480000-0x0000000002492000-memory.dmp

        Filesize

        72KB

      • memory/4124-154-0x0000000002480000-0x0000000002492000-memory.dmp

        Filesize

        72KB

      • memory/4124-156-0x0000000002480000-0x0000000002492000-memory.dmp

        Filesize

        72KB

      • memory/4124-149-0x0000000000640000-0x000000000066D000-memory.dmp

        Filesize

        180KB

      • memory/4124-160-0x0000000002480000-0x0000000002492000-memory.dmp

        Filesize

        72KB

      • memory/4124-162-0x0000000002480000-0x0000000002492000-memory.dmp

        Filesize

        72KB

      • memory/4124-164-0x0000000002480000-0x0000000002492000-memory.dmp

        Filesize

        72KB

      • memory/4124-166-0x0000000002480000-0x0000000002492000-memory.dmp

        Filesize

        72KB

      • memory/4124-150-0x0000000004B40000-0x0000000004B50000-memory.dmp

        Filesize

        64KB

      • memory/4124-170-0x0000000002480000-0x0000000002492000-memory.dmp

        Filesize

        72KB

      • memory/4124-172-0x0000000002480000-0x0000000002492000-memory.dmp

        Filesize

        72KB

      • memory/4124-174-0x0000000002480000-0x0000000002492000-memory.dmp

        Filesize

        72KB

      • memory/4124-176-0x0000000002480000-0x0000000002492000-memory.dmp

        Filesize

        72KB

      • memory/4124-178-0x0000000002480000-0x0000000002492000-memory.dmp

        Filesize

        72KB

      • memory/4124-179-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/4124-180-0x0000000004B40000-0x0000000004B50000-memory.dmp

        Filesize

        64KB

      • memory/4124-181-0x0000000004B40000-0x0000000004B50000-memory.dmp

        Filesize

        64KB

      • memory/4124-182-0x0000000004B40000-0x0000000004B50000-memory.dmp

        Filesize

        64KB

      • memory/4124-184-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/4124-148-0x0000000004B50000-0x00000000050F4000-memory.dmp

        Filesize

        5.6MB

      • memory/4256-191-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

        Filesize

        64KB

      • memory/4256-221-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/4256-192-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/4256-193-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/4256-195-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/4256-197-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/4256-199-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/4256-201-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/4256-203-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/4256-205-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/4256-207-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/4256-209-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/4256-211-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/4256-213-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/4256-215-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/4256-217-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/4256-219-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/4256-189-0x0000000002130000-0x000000000217B000-memory.dmp

        Filesize

        300KB

      • memory/4256-223-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/4256-225-0x0000000004AF0000-0x0000000004B2F000-memory.dmp

        Filesize

        252KB

      • memory/4256-582-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

        Filesize

        64KB

      • memory/4256-1099-0x0000000005270000-0x0000000005888000-memory.dmp

        Filesize

        6.1MB

      • memory/4256-1100-0x00000000058A0000-0x00000000059AA000-memory.dmp

        Filesize

        1.0MB

      • memory/4256-1101-0x00000000059E0000-0x00000000059F2000-memory.dmp

        Filesize

        72KB

      • memory/4256-1102-0x0000000005A00000-0x0000000005A3C000-memory.dmp

        Filesize

        240KB

      • memory/4256-1103-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

        Filesize

        64KB

      • memory/4256-1104-0x0000000005CF0000-0x0000000005D82000-memory.dmp

        Filesize

        584KB

      • memory/4256-1105-0x0000000005D90000-0x0000000005DF6000-memory.dmp

        Filesize

        408KB

      • memory/4256-1107-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

        Filesize

        64KB

      • memory/4256-1108-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

        Filesize

        64KB

      • memory/4256-1109-0x00000000066F0000-0x00000000068B2000-memory.dmp

        Filesize

        1.8MB

      • memory/4256-1110-0x00000000068D0000-0x0000000006DFC000-memory.dmp

        Filesize

        5.2MB

      • memory/4256-190-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

        Filesize

        64KB

      • memory/4256-1111-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

        Filesize

        64KB

      • memory/4256-1112-0x0000000002460000-0x00000000024D6000-memory.dmp

        Filesize

        472KB

      • memory/4256-1113-0x00000000080C0000-0x0000000008110000-memory.dmp

        Filesize

        320KB