Analysis

  • max time kernel
    61s
  • max time network
    83s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/04/2023, 17:31

General

  • Target

    2fbc8e10b5f424e126a37d262e7f169773b60e6ae91426e83bcd127035d80748.exe

  • Size

    660KB

  • MD5

    4a539c4f66c519e1021e34a4961f94f9

  • SHA1

    0de3bd871f67c478152f8ad519717b1788ecaa26

  • SHA256

    2fbc8e10b5f424e126a37d262e7f169773b60e6ae91426e83bcd127035d80748

  • SHA512

    d5290a86324c4d2d7a4bf649a3e6c462370dac44167a68a6a75161c0bfdd482446787c989b2070a379a2e0ea68a4e34cb3538ada8d418e1d42db8f96499d7797

  • SSDEEP

    12288:bMrOy90She+iJ+vAsyuO4I6n40oLOkXAbvw0JsOrLijizaWPG8pb:hyBhe+ZvAsNDI6nSQjwgsO6jiz5Gwb

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2fbc8e10b5f424e126a37d262e7f169773b60e6ae91426e83bcd127035d80748.exe
    "C:\Users\Admin\AppData\Local\Temp\2fbc8e10b5f424e126a37d262e7f169773b60e6ae91426e83bcd127035d80748.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un627859.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un627859.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5056
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1411.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1411.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5104
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5104 -s 1080
          4⤵
          • Program crash
          PID:3368
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4227.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4227.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4848
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4848 -s 1896
          4⤵
          • Program crash
          PID:2712
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si416991.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si416991.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5040
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5104 -ip 5104
    1⤵
      PID:1572
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 564 -p 4848 -ip 4848
      1⤵
        PID:3180

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si416991.exe

        Filesize

        175KB

        MD5

        bb6d43fa4ebafe62b98ec4dea4ff49d9

        SHA1

        d8188e664ac977f59d3ec26589e3cf67b1fab23b

        SHA256

        1d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89

        SHA512

        679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si416991.exe

        Filesize

        175KB

        MD5

        bb6d43fa4ebafe62b98ec4dea4ff49d9

        SHA1

        d8188e664ac977f59d3ec26589e3cf67b1fab23b

        SHA256

        1d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89

        SHA512

        679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un627859.exe

        Filesize

        518KB

        MD5

        2393b4f59344c30326951143550b289b

        SHA1

        e638ca8f17d9cdfc3bf4d50bf4470ba2ddb84a5a

        SHA256

        0518f30cbc21c25fc91c75cc4a3e9c6c4867a8f194982ed976a4ab91a38cf17e

        SHA512

        31fcc12346aa75c2dd5a3f1e020842b0cb66d8c4247ae37b672387b815d23639d0afcfe7aee312b8e3640dfccb49233cf3618607ffd04fd587ae2f9061dc35bc

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un627859.exe

        Filesize

        518KB

        MD5

        2393b4f59344c30326951143550b289b

        SHA1

        e638ca8f17d9cdfc3bf4d50bf4470ba2ddb84a5a

        SHA256

        0518f30cbc21c25fc91c75cc4a3e9c6c4867a8f194982ed976a4ab91a38cf17e

        SHA512

        31fcc12346aa75c2dd5a3f1e020842b0cb66d8c4247ae37b672387b815d23639d0afcfe7aee312b8e3640dfccb49233cf3618607ffd04fd587ae2f9061dc35bc

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1411.exe

        Filesize

        236KB

        MD5

        244e04103d9d1afffaa40200671904d3

        SHA1

        8409b4dba28877b40991fefdc3be7591a1229f1d

        SHA256

        d7e12ae3050cd819b078760e980cc1ce4df0fe4533eaa6e91de0b86c2c909abc

        SHA512

        290358aa80338ee067d5c9c1cbf86a76b2398f7e521205f6e0bf6fb205b71268595abe475c1a566bef8a85f9adb4e915c5eb762cff96e945aa19e01f65640750

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1411.exe

        Filesize

        236KB

        MD5

        244e04103d9d1afffaa40200671904d3

        SHA1

        8409b4dba28877b40991fefdc3be7591a1229f1d

        SHA256

        d7e12ae3050cd819b078760e980cc1ce4df0fe4533eaa6e91de0b86c2c909abc

        SHA512

        290358aa80338ee067d5c9c1cbf86a76b2398f7e521205f6e0bf6fb205b71268595abe475c1a566bef8a85f9adb4e915c5eb762cff96e945aa19e01f65640750

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4227.exe

        Filesize

        295KB

        MD5

        33e3a9674c45e2697c3131b36c0499ec

        SHA1

        277367ee5342df5d663f725d47d8d08ac1653d52

        SHA256

        7ed3fc1329cf4a29c234e5b1452636dd96edbb084b1203238e2ead101a97ed71

        SHA512

        1b06d360f549f84994dddc348c9ccf291925a108ecd8500b866481b1566a805b2183f151953f49ba19d623c88ca22e808d5284a8c314c8fef98fc32ac5c13213

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4227.exe

        Filesize

        295KB

        MD5

        33e3a9674c45e2697c3131b36c0499ec

        SHA1

        277367ee5342df5d663f725d47d8d08ac1653d52

        SHA256

        7ed3fc1329cf4a29c234e5b1452636dd96edbb084b1203238e2ead101a97ed71

        SHA512

        1b06d360f549f84994dddc348c9ccf291925a108ecd8500b866481b1566a805b2183f151953f49ba19d623c88ca22e808d5284a8c314c8fef98fc32ac5c13213

      • memory/4848-420-0x0000000002410000-0x0000000002420000-memory.dmp

        Filesize

        64KB

      • memory/4848-1102-0x00000000058A0000-0x00000000059AA000-memory.dmp

        Filesize

        1.0MB

      • memory/4848-1114-0x00000000069E0000-0x0000000006F0C000-memory.dmp

        Filesize

        5.2MB

      • memory/4848-1113-0x0000000006810000-0x00000000069D2000-memory.dmp

        Filesize

        1.8MB

      • memory/4848-1112-0x0000000002410000-0x0000000002420000-memory.dmp

        Filesize

        64KB

      • memory/4848-1111-0x0000000002410000-0x0000000002420000-memory.dmp

        Filesize

        64KB

      • memory/4848-1109-0x0000000006520000-0x0000000006570000-memory.dmp

        Filesize

        320KB

      • memory/4848-1108-0x0000000006490000-0x0000000006506000-memory.dmp

        Filesize

        472KB

      • memory/4848-1107-0x0000000005D90000-0x0000000005DF6000-memory.dmp

        Filesize

        408KB

      • memory/4848-1106-0x0000000005CF0000-0x0000000005D82000-memory.dmp

        Filesize

        584KB

      • memory/4848-1105-0x0000000005A00000-0x0000000005A3C000-memory.dmp

        Filesize

        240KB

      • memory/4848-1104-0x0000000002410000-0x0000000002420000-memory.dmp

        Filesize

        64KB

      • memory/4848-1103-0x00000000059E0000-0x00000000059F2000-memory.dmp

        Filesize

        72KB

      • memory/4848-1101-0x0000000005200000-0x0000000005818000-memory.dmp

        Filesize

        6.1MB

      • memory/4848-423-0x0000000002410000-0x0000000002420000-memory.dmp

        Filesize

        64KB

      • memory/4848-421-0x0000000002410000-0x0000000002420000-memory.dmp

        Filesize

        64KB

      • memory/4848-418-0x0000000002130000-0x000000000217B000-memory.dmp

        Filesize

        300KB

      • memory/4848-224-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/4848-222-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/4848-220-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/4848-218-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/4848-216-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/4848-214-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/4848-191-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/4848-192-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/4848-194-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/4848-196-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/4848-198-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/4848-200-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/4848-202-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/4848-204-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/4848-206-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/4848-208-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/4848-210-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/4848-212-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/5040-1120-0x0000000000BD0000-0x0000000000C02000-memory.dmp

        Filesize

        200KB

      • memory/5040-1121-0x00000000054B0000-0x00000000054C0000-memory.dmp

        Filesize

        64KB

      • memory/5104-174-0x0000000002520000-0x0000000002532000-memory.dmp

        Filesize

        72KB

      • memory/5104-149-0x0000000004BF0000-0x0000000005194000-memory.dmp

        Filesize

        5.6MB

      • memory/5104-183-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

        Filesize

        64KB

      • memory/5104-182-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

        Filesize

        64KB

      • memory/5104-181-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/5104-180-0x0000000002520000-0x0000000002532000-memory.dmp

        Filesize

        72KB

      • memory/5104-150-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

        Filesize

        64KB

      • memory/5104-178-0x0000000002520000-0x0000000002532000-memory.dmp

        Filesize

        72KB

      • memory/5104-176-0x0000000002520000-0x0000000002532000-memory.dmp

        Filesize

        72KB

      • memory/5104-153-0x0000000002520000-0x0000000002532000-memory.dmp

        Filesize

        72KB

      • memory/5104-151-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

        Filesize

        64KB

      • memory/5104-172-0x0000000002520000-0x0000000002532000-memory.dmp

        Filesize

        72KB

      • memory/5104-184-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

        Filesize

        64KB

      • memory/5104-166-0x0000000002520000-0x0000000002532000-memory.dmp

        Filesize

        72KB

      • memory/5104-170-0x0000000002520000-0x0000000002532000-memory.dmp

        Filesize

        72KB

      • memory/5104-164-0x0000000002520000-0x0000000002532000-memory.dmp

        Filesize

        72KB

      • memory/5104-162-0x0000000002520000-0x0000000002532000-memory.dmp

        Filesize

        72KB

      • memory/5104-160-0x0000000002520000-0x0000000002532000-memory.dmp

        Filesize

        72KB

      • memory/5104-158-0x0000000002520000-0x0000000002532000-memory.dmp

        Filesize

        72KB

      • memory/5104-156-0x0000000002520000-0x0000000002532000-memory.dmp

        Filesize

        72KB

      • memory/5104-154-0x0000000002520000-0x0000000002532000-memory.dmp

        Filesize

        72KB

      • memory/5104-168-0x0000000002520000-0x0000000002532000-memory.dmp

        Filesize

        72KB

      • memory/5104-148-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/5104-186-0x0000000000400000-0x00000000004AA000-memory.dmp

        Filesize

        680KB

      • memory/5104-152-0x0000000004BE0000-0x0000000004BF0000-memory.dmp

        Filesize

        64KB