Analysis

  • max time kernel
    62s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 13:05

General

  • Target

    f8fd734f553585ef13b8c6fc7d8f94923a85a21bd6418d6713291b1c7489a9f4.exe

  • Size

    658KB

  • MD5

    28f5f6b8a4df2e2fe862a445e33ad6c9

  • SHA1

    4dcd112fe818f398f728cb9290ef3962764ebb54

  • SHA256

    f8fd734f553585ef13b8c6fc7d8f94923a85a21bd6418d6713291b1c7489a9f4

  • SHA512

    5efcf8e4bcc90a43825d35e90ba3308756f199cb10c188329df8d48071d1fb9ca75c219cd8cff3d741e1bd26c888641c824a87e28314ce13afd4c8b27636a057

  • SSDEEP

    12288:EMr0y90kgRWHeQNjDna/2+9ohU8KSUE+YdmuKjpi0zeRQgQfO8Rmw:IyzgcnX2BRnDYQzfO88w

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f8fd734f553585ef13b8c6fc7d8f94923a85a21bd6418d6713291b1c7489a9f4.exe
    "C:\Users\Admin\AppData\Local\Temp\f8fd734f553585ef13b8c6fc7d8f94923a85a21bd6418d6713291b1c7489a9f4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3356
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un487599.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un487599.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:768
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3535.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3535.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:464
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 464 -s 1080
          4⤵
          • Program crash
          PID:4284
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6467.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6467.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2096
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 1788
          4⤵
          • Program crash
          PID:1692
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si016780.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si016780.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4864
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 464 -ip 464
    1⤵
      PID:4732
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2096 -ip 2096
      1⤵
        PID:5028

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si016780.exe

        Filesize

        175KB

        MD5

        bb6d43fa4ebafe62b98ec4dea4ff49d9

        SHA1

        d8188e664ac977f59d3ec26589e3cf67b1fab23b

        SHA256

        1d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89

        SHA512

        679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si016780.exe

        Filesize

        175KB

        MD5

        bb6d43fa4ebafe62b98ec4dea4ff49d9

        SHA1

        d8188e664ac977f59d3ec26589e3cf67b1fab23b

        SHA256

        1d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89

        SHA512

        679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un487599.exe

        Filesize

        516KB

        MD5

        b5c98343763d867a45d8247976e5adc5

        SHA1

        efb1cfa6fb866fc804fa142600d433b6e09b88f7

        SHA256

        3b40a96810aecefcefc0f8fe93785c159fc92187c2387a028ca3180472acd09a

        SHA512

        2a8deb60e057db3f8e24562c20257f86159414208361164e7beb6711d9c9e08ee43e540e016d4f64bfd2e8a772873da76177da82bfd5d18e813bb5148e0ae317

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un487599.exe

        Filesize

        516KB

        MD5

        b5c98343763d867a45d8247976e5adc5

        SHA1

        efb1cfa6fb866fc804fa142600d433b6e09b88f7

        SHA256

        3b40a96810aecefcefc0f8fe93785c159fc92187c2387a028ca3180472acd09a

        SHA512

        2a8deb60e057db3f8e24562c20257f86159414208361164e7beb6711d9c9e08ee43e540e016d4f64bfd2e8a772873da76177da82bfd5d18e813bb5148e0ae317

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3535.exe

        Filesize

        236KB

        MD5

        dd214f0146307b7c81d36e3914c946b0

        SHA1

        b1f37b01765a9f92f1118f431789f9eee5959499

        SHA256

        ffb561781c62aede090817fd47713808e556a6c7546c333af9f0abe9b59222a7

        SHA512

        2dc2f57943a013fda755e3ccf2488e7e9fd94e3e295ce40480b96561f7a5be72d2eb43825a628f3c8ba0073d05b3e89167071f366aac9a675077ecaca293fed8

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3535.exe

        Filesize

        236KB

        MD5

        dd214f0146307b7c81d36e3914c946b0

        SHA1

        b1f37b01765a9f92f1118f431789f9eee5959499

        SHA256

        ffb561781c62aede090817fd47713808e556a6c7546c333af9f0abe9b59222a7

        SHA512

        2dc2f57943a013fda755e3ccf2488e7e9fd94e3e295ce40480b96561f7a5be72d2eb43825a628f3c8ba0073d05b3e89167071f366aac9a675077ecaca293fed8

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6467.exe

        Filesize

        294KB

        MD5

        c39a2eb1497d355522763bbd4ebce5d8

        SHA1

        8bae64f63df8ecdd89b00b0bb6368d72cbedc6f0

        SHA256

        9ec1440bd760af09a91149d97bc4c7cf6873b47727e772ee31d1b603bb1e027c

        SHA512

        a22e70f7abd78e43bd6ef028fe57abec4c40b3b02b3723a32192742e3264f7e8b63f290f777097fcc85978c47869ed08943e23c3362171c67d6ad5cd4e8b67ac

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6467.exe

        Filesize

        294KB

        MD5

        c39a2eb1497d355522763bbd4ebce5d8

        SHA1

        8bae64f63df8ecdd89b00b0bb6368d72cbedc6f0

        SHA256

        9ec1440bd760af09a91149d97bc4c7cf6873b47727e772ee31d1b603bb1e027c

        SHA512

        a22e70f7abd78e43bd6ef028fe57abec4c40b3b02b3723a32192742e3264f7e8b63f290f777097fcc85978c47869ed08943e23c3362171c67d6ad5cd4e8b67ac

      • memory/464-148-0x0000000004B70000-0x0000000005114000-memory.dmp

        Filesize

        5.6MB

      • memory/464-149-0x00000000005F0000-0x000000000061D000-memory.dmp

        Filesize

        180KB

      • memory/464-150-0x0000000004B60000-0x0000000004B70000-memory.dmp

        Filesize

        64KB

      • memory/464-151-0x0000000004B60000-0x0000000004B70000-memory.dmp

        Filesize

        64KB

      • memory/464-152-0x0000000004B60000-0x0000000004B70000-memory.dmp

        Filesize

        64KB

      • memory/464-153-0x0000000005120000-0x0000000005132000-memory.dmp

        Filesize

        72KB

      • memory/464-154-0x0000000005120000-0x0000000005132000-memory.dmp

        Filesize

        72KB

      • memory/464-156-0x0000000005120000-0x0000000005132000-memory.dmp

        Filesize

        72KB

      • memory/464-158-0x0000000005120000-0x0000000005132000-memory.dmp

        Filesize

        72KB

      • memory/464-160-0x0000000005120000-0x0000000005132000-memory.dmp

        Filesize

        72KB

      • memory/464-162-0x0000000005120000-0x0000000005132000-memory.dmp

        Filesize

        72KB

      • memory/464-164-0x0000000005120000-0x0000000005132000-memory.dmp

        Filesize

        72KB

      • memory/464-166-0x0000000005120000-0x0000000005132000-memory.dmp

        Filesize

        72KB

      • memory/464-168-0x0000000005120000-0x0000000005132000-memory.dmp

        Filesize

        72KB

      • memory/464-170-0x0000000005120000-0x0000000005132000-memory.dmp

        Filesize

        72KB

      • memory/464-172-0x0000000005120000-0x0000000005132000-memory.dmp

        Filesize

        72KB

      • memory/464-174-0x0000000005120000-0x0000000005132000-memory.dmp

        Filesize

        72KB

      • memory/464-176-0x0000000005120000-0x0000000005132000-memory.dmp

        Filesize

        72KB

      • memory/464-178-0x0000000005120000-0x0000000005132000-memory.dmp

        Filesize

        72KB

      • memory/464-180-0x0000000005120000-0x0000000005132000-memory.dmp

        Filesize

        72KB

      • memory/464-181-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/464-182-0x0000000004B60000-0x0000000004B70000-memory.dmp

        Filesize

        64KB

      • memory/464-183-0x0000000004B60000-0x0000000004B70000-memory.dmp

        Filesize

        64KB

      • memory/464-184-0x0000000004B60000-0x0000000004B70000-memory.dmp

        Filesize

        64KB

      • memory/464-186-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/2096-192-0x0000000004A70000-0x0000000004AAF000-memory.dmp

        Filesize

        252KB

      • memory/2096-194-0x0000000004A70000-0x0000000004AAF000-memory.dmp

        Filesize

        252KB

      • memory/2096-191-0x0000000004A70000-0x0000000004AAF000-memory.dmp

        Filesize

        252KB

      • memory/2096-196-0x0000000004A70000-0x0000000004AAF000-memory.dmp

        Filesize

        252KB

      • memory/2096-198-0x0000000004A70000-0x0000000004AAF000-memory.dmp

        Filesize

        252KB

      • memory/2096-200-0x0000000004A70000-0x0000000004AAF000-memory.dmp

        Filesize

        252KB

      • memory/2096-202-0x0000000004A70000-0x0000000004AAF000-memory.dmp

        Filesize

        252KB

      • memory/2096-204-0x0000000004A70000-0x0000000004AAF000-memory.dmp

        Filesize

        252KB

      • memory/2096-206-0x0000000004A70000-0x0000000004AAF000-memory.dmp

        Filesize

        252KB

      • memory/2096-208-0x0000000004A70000-0x0000000004AAF000-memory.dmp

        Filesize

        252KB

      • memory/2096-210-0x0000000004A70000-0x0000000004AAF000-memory.dmp

        Filesize

        252KB

      • memory/2096-212-0x0000000004A70000-0x0000000004AAF000-memory.dmp

        Filesize

        252KB

      • memory/2096-214-0x0000000004A70000-0x0000000004AAF000-memory.dmp

        Filesize

        252KB

      • memory/2096-216-0x0000000004A70000-0x0000000004AAF000-memory.dmp

        Filesize

        252KB

      • memory/2096-218-0x0000000004A70000-0x0000000004AAF000-memory.dmp

        Filesize

        252KB

      • memory/2096-220-0x0000000004A70000-0x0000000004AAF000-memory.dmp

        Filesize

        252KB

      • memory/2096-222-0x0000000004A70000-0x0000000004AAF000-memory.dmp

        Filesize

        252KB

      • memory/2096-224-0x0000000004A70000-0x0000000004AAF000-memory.dmp

        Filesize

        252KB

      • memory/2096-335-0x0000000000670000-0x00000000006BB000-memory.dmp

        Filesize

        300KB

      • memory/2096-337-0x0000000004B90000-0x0000000004BA0000-memory.dmp

        Filesize

        64KB

      • memory/2096-339-0x0000000004B90000-0x0000000004BA0000-memory.dmp

        Filesize

        64KB

      • memory/2096-1100-0x0000000005150000-0x0000000005768000-memory.dmp

        Filesize

        6.1MB

      • memory/2096-1101-0x0000000005770000-0x000000000587A000-memory.dmp

        Filesize

        1.0MB

      • memory/2096-1102-0x00000000058A0000-0x00000000058B2000-memory.dmp

        Filesize

        72KB

      • memory/2096-1103-0x00000000058C0000-0x00000000058FC000-memory.dmp

        Filesize

        240KB

      • memory/2096-1104-0x0000000004B90000-0x0000000004BA0000-memory.dmp

        Filesize

        64KB

      • memory/2096-1105-0x0000000005BB0000-0x0000000005C16000-memory.dmp

        Filesize

        408KB

      • memory/2096-1106-0x0000000006260000-0x00000000062F2000-memory.dmp

        Filesize

        584KB

      • memory/2096-1108-0x0000000004B90000-0x0000000004BA0000-memory.dmp

        Filesize

        64KB

      • memory/2096-1109-0x0000000004B90000-0x0000000004BA0000-memory.dmp

        Filesize

        64KB

      • memory/2096-1110-0x0000000004B90000-0x0000000004BA0000-memory.dmp

        Filesize

        64KB

      • memory/2096-1111-0x00000000066F0000-0x00000000068B2000-memory.dmp

        Filesize

        1.8MB

      • memory/2096-1112-0x00000000068D0000-0x0000000006DFC000-memory.dmp

        Filesize

        5.2MB

      • memory/2096-1113-0x0000000002450000-0x00000000024C6000-memory.dmp

        Filesize

        472KB

      • memory/2096-1114-0x00000000080C0000-0x0000000008110000-memory.dmp

        Filesize

        320KB

      • memory/4864-1121-0x0000000000180000-0x00000000001B2000-memory.dmp

        Filesize

        200KB

      • memory/4864-1122-0x0000000004A90000-0x0000000004AA0000-memory.dmp

        Filesize

        64KB

      • memory/4864-1123-0x0000000004A90000-0x0000000004AA0000-memory.dmp

        Filesize

        64KB