Analysis

  • max time kernel
    77s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 17:38

General

  • Target

    ea6f2116be827fc3d2a9e13f38f4ee39b3dd172df20dea1c936b532f9674c09f.exe

  • Size

    660KB

  • MD5

    9ad9cd8331203b928d8435ae0a1a2d14

  • SHA1

    4de98ccd0a2816beaf7b9e08e8ee7f6e6a5b0ba0

  • SHA256

    ea6f2116be827fc3d2a9e13f38f4ee39b3dd172df20dea1c936b532f9674c09f

  • SHA512

    825dd40d5fe2d0503b6366f87aaab698bad7e0e7ed2be9adcbc0d982972001b1fe8dbe59b5652130561abb01ed009a105373cb6851e903746f7736466febe5f3

  • SSDEEP

    12288:QMr8y90TycflIDBnOm4c7nc8n7/MHO0UsvrLiMipaWPqHVwRJC:8yipflCnqc7nRn7/cOBsv6Mip5WVSJC

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea6f2116be827fc3d2a9e13f38f4ee39b3dd172df20dea1c936b532f9674c09f.exe
    "C:\Users\Admin\AppData\Local\Temp\ea6f2116be827fc3d2a9e13f38f4ee39b3dd172df20dea1c936b532f9674c09f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4380
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un008060.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un008060.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1824
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1296.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1296.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4200
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 1080
          4⤵
          • Program crash
          PID:3040
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3530.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3530.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:208
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 208 -s 1988
          4⤵
          • Program crash
          PID:5072
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si428113.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si428113.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5088
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 4200 -ip 4200
    1⤵
      PID:1664
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 208 -ip 208
      1⤵
        PID:2616

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si428113.exe
        Filesize

        175KB

        MD5

        bb6d43fa4ebafe62b98ec4dea4ff49d9

        SHA1

        d8188e664ac977f59d3ec26589e3cf67b1fab23b

        SHA256

        1d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89

        SHA512

        679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si428113.exe
        Filesize

        175KB

        MD5

        bb6d43fa4ebafe62b98ec4dea4ff49d9

        SHA1

        d8188e664ac977f59d3ec26589e3cf67b1fab23b

        SHA256

        1d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89

        SHA512

        679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un008060.exe
        Filesize

        518KB

        MD5

        1bb758c0bdaa37bfe2c2010f43202778

        SHA1

        fe34e4721c255279052d54c89dca45fdc2d91ad9

        SHA256

        4478c54f7ab395883be6b8fd30a0f3be3648c393f19ec19e893f5f7fbf22f9f1

        SHA512

        c6e7d28ce690e72845cab2665115ace872de161a746bfab26ec79cf90b7cf0c40f40c372c6c90a4da966c5f95424a7b66d20ed8b354ffe6de621b9647ffabd05

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un008060.exe
        Filesize

        518KB

        MD5

        1bb758c0bdaa37bfe2c2010f43202778

        SHA1

        fe34e4721c255279052d54c89dca45fdc2d91ad9

        SHA256

        4478c54f7ab395883be6b8fd30a0f3be3648c393f19ec19e893f5f7fbf22f9f1

        SHA512

        c6e7d28ce690e72845cab2665115ace872de161a746bfab26ec79cf90b7cf0c40f40c372c6c90a4da966c5f95424a7b66d20ed8b354ffe6de621b9647ffabd05

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1296.exe
        Filesize

        236KB

        MD5

        7100a47ee77d030cff03ffbeb277dd83

        SHA1

        9023762f3f2306bc4d92ecc6ac0e2174203bc023

        SHA256

        9b716c29c45ac85d3808be9e0c3e802fc9c0f7285f5632c1beb2952c715051c4

        SHA512

        1a2f3e55c00d33abae7284fd8b4662f26ab33eacabf175e3950c12571746907f68a6233442d1e5e09384b8b0cf70fb1db2ed12b98c65bbf2ff73d91732a100ff

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1296.exe
        Filesize

        236KB

        MD5

        7100a47ee77d030cff03ffbeb277dd83

        SHA1

        9023762f3f2306bc4d92ecc6ac0e2174203bc023

        SHA256

        9b716c29c45ac85d3808be9e0c3e802fc9c0f7285f5632c1beb2952c715051c4

        SHA512

        1a2f3e55c00d33abae7284fd8b4662f26ab33eacabf175e3950c12571746907f68a6233442d1e5e09384b8b0cf70fb1db2ed12b98c65bbf2ff73d91732a100ff

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3530.exe
        Filesize

        295KB

        MD5

        513c3489bd39c054a2a06ea71e799efc

        SHA1

        f060324842f0efa5a4526be0b76f1e41894e15cb

        SHA256

        0a14549e746be9f0e36b7afdc23a1a9c1d78e9ba86fded6268004c4cc7355bc8

        SHA512

        f71d963d28a5e08afe87d923052341e9730651e3d44f4e784bdb95fe64038ecf6ccd46df55cd10f79934361d574534abe2073a44ccd25b78a4adc94b2ba60989

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3530.exe
        Filesize

        295KB

        MD5

        513c3489bd39c054a2a06ea71e799efc

        SHA1

        f060324842f0efa5a4526be0b76f1e41894e15cb

        SHA256

        0a14549e746be9f0e36b7afdc23a1a9c1d78e9ba86fded6268004c4cc7355bc8

        SHA512

        f71d963d28a5e08afe87d923052341e9730651e3d44f4e784bdb95fe64038ecf6ccd46df55cd10f79934361d574534abe2073a44ccd25b78a4adc94b2ba60989

      • memory/208-1102-0x00000000058A0000-0x00000000059AA000-memory.dmp
        Filesize

        1.0MB

      • memory/208-226-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/208-204-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/208-206-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/208-1115-0x0000000006870000-0x0000000006D9C000-memory.dmp
        Filesize

        5.2MB

      • memory/208-1114-0x0000000006690000-0x0000000006852000-memory.dmp
        Filesize

        1.8MB

      • memory/208-1113-0x0000000002510000-0x0000000002520000-memory.dmp
        Filesize

        64KB

      • memory/208-1112-0x0000000002510000-0x0000000002520000-memory.dmp
        Filesize

        64KB

      • memory/208-1111-0x0000000002510000-0x0000000002520000-memory.dmp
        Filesize

        64KB

      • memory/208-1110-0x0000000006520000-0x0000000006570000-memory.dmp
        Filesize

        320KB

      • memory/208-208-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/208-1109-0x0000000006490000-0x0000000006506000-memory.dmp
        Filesize

        472KB

      • memory/208-1108-0x00000000063A0000-0x0000000006432000-memory.dmp
        Filesize

        584KB

      • memory/208-1106-0x0000000005CF0000-0x0000000005D56000-memory.dmp
        Filesize

        408KB

      • memory/208-1105-0x0000000002510000-0x0000000002520000-memory.dmp
        Filesize

        64KB

      • memory/208-1104-0x0000000005A00000-0x0000000005A3C000-memory.dmp
        Filesize

        240KB

      • memory/208-1103-0x00000000059E0000-0x00000000059F2000-memory.dmp
        Filesize

        72KB

      • memory/208-1101-0x0000000005200000-0x0000000005818000-memory.dmp
        Filesize

        6.1MB

      • memory/208-228-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/208-215-0x0000000000790000-0x00000000007DB000-memory.dmp
        Filesize

        300KB

      • memory/208-224-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/208-222-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/208-218-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/208-191-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/208-192-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/208-194-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/208-196-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/208-198-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/208-200-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/208-202-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/208-220-0x0000000002510000-0x0000000002520000-memory.dmp
        Filesize

        64KB

      • memory/208-1116-0x0000000002510000-0x0000000002520000-memory.dmp
        Filesize

        64KB

      • memory/208-219-0x0000000002510000-0x0000000002520000-memory.dmp
        Filesize

        64KB

      • memory/208-210-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/208-212-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/208-214-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/208-217-0x0000000002510000-0x0000000002520000-memory.dmp
        Filesize

        64KB

      • memory/4200-181-0x0000000000400000-0x00000000004AA000-memory.dmp
        Filesize

        680KB

      • memory/4200-173-0x0000000002400000-0x0000000002412000-memory.dmp
        Filesize

        72KB

      • memory/4200-148-0x0000000000560000-0x000000000058D000-memory.dmp
        Filesize

        180KB

      • memory/4200-151-0x0000000002400000-0x0000000002412000-memory.dmp
        Filesize

        72KB

      • memory/4200-153-0x0000000002400000-0x0000000002412000-memory.dmp
        Filesize

        72KB

      • memory/4200-186-0x0000000000400000-0x00000000004AA000-memory.dmp
        Filesize

        680KB

      • memory/4200-185-0x0000000004C10000-0x0000000004C20000-memory.dmp
        Filesize

        64KB

      • memory/4200-184-0x0000000004C10000-0x0000000004C20000-memory.dmp
        Filesize

        64KB

      • memory/4200-183-0x0000000004C10000-0x0000000004C20000-memory.dmp
        Filesize

        64KB

      • memory/4200-150-0x0000000002400000-0x0000000002412000-memory.dmp
        Filesize

        72KB

      • memory/4200-155-0x0000000002400000-0x0000000002412000-memory.dmp
        Filesize

        72KB

      • memory/4200-180-0x0000000004C10000-0x0000000004C20000-memory.dmp
        Filesize

        64KB

      • memory/4200-179-0x0000000004C10000-0x0000000004C20000-memory.dmp
        Filesize

        64KB

      • memory/4200-178-0x0000000004C10000-0x0000000004C20000-memory.dmp
        Filesize

        64KB

      • memory/4200-177-0x0000000002400000-0x0000000002412000-memory.dmp
        Filesize

        72KB

      • memory/4200-175-0x0000000002400000-0x0000000002412000-memory.dmp
        Filesize

        72KB

      • memory/4200-171-0x0000000002400000-0x0000000002412000-memory.dmp
        Filesize

        72KB

      • memory/4200-169-0x0000000002400000-0x0000000002412000-memory.dmp
        Filesize

        72KB

      • memory/4200-167-0x0000000002400000-0x0000000002412000-memory.dmp
        Filesize

        72KB

      • memory/4200-165-0x0000000002400000-0x0000000002412000-memory.dmp
        Filesize

        72KB

      • memory/4200-163-0x0000000002400000-0x0000000002412000-memory.dmp
        Filesize

        72KB

      • memory/4200-161-0x0000000002400000-0x0000000002412000-memory.dmp
        Filesize

        72KB

      • memory/4200-159-0x0000000002400000-0x0000000002412000-memory.dmp
        Filesize

        72KB

      • memory/4200-149-0x0000000004C20000-0x00000000051C4000-memory.dmp
        Filesize

        5.6MB

      • memory/4200-157-0x0000000002400000-0x0000000002412000-memory.dmp
        Filesize

        72KB

      • memory/5088-1122-0x0000000000AD0000-0x0000000000B02000-memory.dmp
        Filesize

        200KB

      • memory/5088-1123-0x0000000005370000-0x0000000005380000-memory.dmp
        Filesize

        64KB