Analysis

  • max time kernel
    82s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/04/2023, 16:41

General

  • Target

    43a039154f510bc108d55885884e2b80466a01115bdfa18f56eac2e4f95e19a8.exe

  • Size

    522KB

  • MD5

    928460d3fa08993d33b78cfe014662a4

  • SHA1

    653205f6e43076b554f4bdedf8e6e0644e5946b7

  • SHA256

    43a039154f510bc108d55885884e2b80466a01115bdfa18f56eac2e4f95e19a8

  • SHA512

    289bca58652b46398422cef0a11788fb4991182e8bdc229b180c901620b94dea4a5f057d87b090f84150936f13e475ca2036c425c583a4fd914b9abfa02e0c41

  • SSDEEP

    12288:vMrLy90Wb63zkeIM355/5s3R24ssrLi5sr6EGV9O:YyT631p5QR7ss65srqVE

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\43a039154f510bc108d55885884e2b80466a01115bdfa18f56eac2e4f95e19a8.exe
    "C:\Users\Admin\AppData\Local\Temp\43a039154f510bc108d55885884e2b80466a01115bdfa18f56eac2e4f95e19a8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4192
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigA3267.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigA3267.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1688
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr536167.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr536167.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4596
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku403963.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku403963.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:736
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 736 -s 1344
          4⤵
          • Program crash
          PID:940
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr076561.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr076561.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3744
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 736 -ip 736
    1⤵
      PID:3696

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr076561.exe

            Filesize

            175KB

            MD5

            bb6d43fa4ebafe62b98ec4dea4ff49d9

            SHA1

            d8188e664ac977f59d3ec26589e3cf67b1fab23b

            SHA256

            1d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89

            SHA512

            679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr076561.exe

            Filesize

            175KB

            MD5

            bb6d43fa4ebafe62b98ec4dea4ff49d9

            SHA1

            d8188e664ac977f59d3ec26589e3cf67b1fab23b

            SHA256

            1d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89

            SHA512

            679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigA3267.exe

            Filesize

            379KB

            MD5

            c361347c72d77e12b9c0581b895474c1

            SHA1

            0da7fca71cf1dcea4d4764f15d0b0c6ca9edbf54

            SHA256

            a42c1ff840bb3b751fcf88c3defa2d3dde40d04ea5fcf6c068e59416cfd5c4f2

            SHA512

            db25a4f71b087bcf70853aef2678158f75e2e1cf748fa37e6018a2e8b50c11278f3b4bfb8d4b2dd9600b294de196058fd533bcc6da85d0ea25354e320bf8ddd7

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zigA3267.exe

            Filesize

            379KB

            MD5

            c361347c72d77e12b9c0581b895474c1

            SHA1

            0da7fca71cf1dcea4d4764f15d0b0c6ca9edbf54

            SHA256

            a42c1ff840bb3b751fcf88c3defa2d3dde40d04ea5fcf6c068e59416cfd5c4f2

            SHA512

            db25a4f71b087bcf70853aef2678158f75e2e1cf748fa37e6018a2e8b50c11278f3b4bfb8d4b2dd9600b294de196058fd533bcc6da85d0ea25354e320bf8ddd7

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr536167.exe

            Filesize

            15KB

            MD5

            8e97aada86b8e1d413f76fd60d60640d

            SHA1

            35a68e2d6c8f61b93cba0598c4687f8666cb656b

            SHA256

            2d5dfa17606a5680fccac03c5525c445c20e69e3a0267c400af9fd81e6cb5a96

            SHA512

            0e7be97531dc90cf301712074341423cb7a7dee134c41eba0f2493a2de9da840ccb8d37f275dff74c97f7215e7d966045594b8edb20bc1eaa42de79e4c820b73

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr536167.exe

            Filesize

            15KB

            MD5

            8e97aada86b8e1d413f76fd60d60640d

            SHA1

            35a68e2d6c8f61b93cba0598c4687f8666cb656b

            SHA256

            2d5dfa17606a5680fccac03c5525c445c20e69e3a0267c400af9fd81e6cb5a96

            SHA512

            0e7be97531dc90cf301712074341423cb7a7dee134c41eba0f2493a2de9da840ccb8d37f275dff74c97f7215e7d966045594b8edb20bc1eaa42de79e4c820b73

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku403963.exe

            Filesize

            295KB

            MD5

            235cf9b0d2c3791118f8776792c2c82c

            SHA1

            9c7a9e6108978c48f0169d5334a3119c47e6df3d

            SHA256

            d48c1333b7753978d79fd1adab8e664fa0af43c41d59cd9fd3b497b540e0242c

            SHA512

            2eec27c165cbc768c85fa93cb35c1cfaa36dac80bbb833f381a116fbb1d62a2981d99ba167b566a23b640ce8494f08d00962a9d7fd8a8d604590e73c153262eb

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku403963.exe

            Filesize

            295KB

            MD5

            235cf9b0d2c3791118f8776792c2c82c

            SHA1

            9c7a9e6108978c48f0169d5334a3119c47e6df3d

            SHA256

            d48c1333b7753978d79fd1adab8e664fa0af43c41d59cd9fd3b497b540e0242c

            SHA512

            2eec27c165cbc768c85fa93cb35c1cfaa36dac80bbb833f381a116fbb1d62a2981d99ba167b566a23b640ce8494f08d00962a9d7fd8a8d604590e73c153262eb

          • memory/736-153-0x0000000004C50000-0x00000000051F4000-memory.dmp

            Filesize

            5.6MB

          • memory/736-154-0x0000000000630000-0x000000000067B000-memory.dmp

            Filesize

            300KB

          • memory/736-155-0x0000000004C40000-0x0000000004C50000-memory.dmp

            Filesize

            64KB

          • memory/736-156-0x0000000004C40000-0x0000000004C50000-memory.dmp

            Filesize

            64KB

          • memory/736-157-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-160-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-158-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-162-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-166-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-168-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-164-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-170-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-172-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-174-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-176-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-178-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-180-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-182-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-184-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-186-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-188-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-190-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-192-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-194-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-196-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-198-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-200-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-202-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-204-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-206-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-208-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-210-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-212-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-214-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-216-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-218-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-220-0x0000000002750000-0x000000000278F000-memory.dmp

            Filesize

            252KB

          • memory/736-1063-0x0000000005200000-0x0000000005818000-memory.dmp

            Filesize

            6.1MB

          • memory/736-1064-0x00000000058A0000-0x00000000059AA000-memory.dmp

            Filesize

            1.0MB

          • memory/736-1065-0x00000000059E0000-0x00000000059F2000-memory.dmp

            Filesize

            72KB

          • memory/736-1066-0x0000000005A00000-0x0000000005A3C000-memory.dmp

            Filesize

            240KB

          • memory/736-1067-0x0000000004C40000-0x0000000004C50000-memory.dmp

            Filesize

            64KB

          • memory/736-1069-0x0000000005CF0000-0x0000000005D82000-memory.dmp

            Filesize

            584KB

          • memory/736-1070-0x0000000005D90000-0x0000000005DF6000-memory.dmp

            Filesize

            408KB

          • memory/736-1071-0x0000000004C40000-0x0000000004C50000-memory.dmp

            Filesize

            64KB

          • memory/736-1072-0x0000000004C40000-0x0000000004C50000-memory.dmp

            Filesize

            64KB

          • memory/736-1073-0x0000000004C40000-0x0000000004C50000-memory.dmp

            Filesize

            64KB

          • memory/736-1074-0x0000000006590000-0x0000000006606000-memory.dmp

            Filesize

            472KB

          • memory/736-1075-0x0000000006620000-0x0000000006670000-memory.dmp

            Filesize

            320KB

          • memory/736-1076-0x0000000004C40000-0x0000000004C50000-memory.dmp

            Filesize

            64KB

          • memory/736-1077-0x00000000067E0000-0x00000000069A2000-memory.dmp

            Filesize

            1.8MB

          • memory/736-1078-0x00000000069B0000-0x0000000006EDC000-memory.dmp

            Filesize

            5.2MB

          • memory/3744-1084-0x0000000000DE0000-0x0000000000E12000-memory.dmp

            Filesize

            200KB

          • memory/3744-1085-0x0000000005810000-0x0000000005820000-memory.dmp

            Filesize

            64KB

          • memory/3744-1086-0x0000000005810000-0x0000000005820000-memory.dmp

            Filesize

            64KB

          • memory/4596-147-0x0000000000290000-0x000000000029A000-memory.dmp

            Filesize

            40KB