Analysis

  • max time kernel
    98s
  • max time network
    100s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 18:24

General

  • Target

    fd96043986d8ae73f23a1b121eac82310fa3c2b38d4ae80d50841d11bfae2f0f.exe

  • Size

    660KB

  • MD5

    b5a8abe73e2d8b27ce35e3063418f547

  • SHA1

    cb43d545622bd8b7a3e9a63de3787ef37836ee58

  • SHA256

    fd96043986d8ae73f23a1b121eac82310fa3c2b38d4ae80d50841d11bfae2f0f

  • SHA512

    2953414db9afb52d674cd7918d3d9d9a392d8dd8b7415e7b18f9d2507014c3a82adc00b6d768c453d5555adf978f55e8dd0586dbea31409a88fc6c5544c443ef

  • SSDEEP

    12288:zMr9y90zhyUxkK78cjcP6IsUoiUo7ioIHbxZN+ZSyrPbsl6VqJjt:CyEP4cja6IHoiMfyrIsYRt

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 17 IoCs
  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd96043986d8ae73f23a1b121eac82310fa3c2b38d4ae80d50841d11bfae2f0f.exe
    "C:\Users\Admin\AppData\Local\Temp\fd96043986d8ae73f23a1b121eac82310fa3c2b38d4ae80d50841d11bfae2f0f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:796
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un438353.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un438353.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4640
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3170.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3170.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1324
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3170.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3170.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:624
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1833.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1833.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1516
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 1740
          4⤵
          • Program crash
          PID:4076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si587888.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si587888.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1908
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1516 -ip 1516
    1⤵
      PID:1444

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si587888.exe
      Filesize

      175KB

      MD5

      4e91559734c8ef6dd43a92bfb01419e1

      SHA1

      727dd4ae32cc86eda3530d8be7c4f861a455544d

      SHA256

      a2382446a854e8ff44404b6b94a5baaee80c381eb32dfffbdb7470905a7357cc

      SHA512

      c30f70b4c280c2cabcd1c12064efe438d73aa55bc59561f6ccafcf1268e390751abfaa4a35c50fab714c2471eb941abe3080009d1862b87c1831cc196aaa1c3d

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si587888.exe
      Filesize

      175KB

      MD5

      4e91559734c8ef6dd43a92bfb01419e1

      SHA1

      727dd4ae32cc86eda3530d8be7c4f861a455544d

      SHA256

      a2382446a854e8ff44404b6b94a5baaee80c381eb32dfffbdb7470905a7357cc

      SHA512

      c30f70b4c280c2cabcd1c12064efe438d73aa55bc59561f6ccafcf1268e390751abfaa4a35c50fab714c2471eb941abe3080009d1862b87c1831cc196aaa1c3d

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un438353.exe
      Filesize

      517KB

      MD5

      0cf2fb8c1177626bcb9767a910c3ed91

      SHA1

      7222a9b2e52a0b7255b6f808519772a1d6c87981

      SHA256

      2d093fe0b24af439c75799aa90aee4c81dc9c832da44ba1b5228d682d4e51433

      SHA512

      e91394915175a32aacd9d9b79099e34582f3fb9f78c5e226f0afc50381cded3f2e7ac695bfe38f4774f9c43e467310e4593e6e7c6b974816d823a0944fbb04a4

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un438353.exe
      Filesize

      517KB

      MD5

      0cf2fb8c1177626bcb9767a910c3ed91

      SHA1

      7222a9b2e52a0b7255b6f808519772a1d6c87981

      SHA256

      2d093fe0b24af439c75799aa90aee4c81dc9c832da44ba1b5228d682d4e51433

      SHA512

      e91394915175a32aacd9d9b79099e34582f3fb9f78c5e226f0afc50381cded3f2e7ac695bfe38f4774f9c43e467310e4593e6e7c6b974816d823a0944fbb04a4

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3170.exe
      Filesize

      237KB

      MD5

      e4b351452d3e1f6b55c55937e40d55e1

      SHA1

      b084e34f66242fde86eda26c8484877803ceebc7

      SHA256

      0836e8777018067a5e0fb840a181c2418bfa292c5915084542af7f866255baaa

      SHA512

      8d8737261bf159b57a910617165016b1d8dfe2e6b0103110a9e9dfd7d79148a7ebdd75040c234f38589825d76dd7a1318ee60519e7e8c57908d7680427d2f2a5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3170.exe
      Filesize

      237KB

      MD5

      e4b351452d3e1f6b55c55937e40d55e1

      SHA1

      b084e34f66242fde86eda26c8484877803ceebc7

      SHA256

      0836e8777018067a5e0fb840a181c2418bfa292c5915084542af7f866255baaa

      SHA512

      8d8737261bf159b57a910617165016b1d8dfe2e6b0103110a9e9dfd7d79148a7ebdd75040c234f38589825d76dd7a1318ee60519e7e8c57908d7680427d2f2a5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3170.exe
      Filesize

      237KB

      MD5

      e4b351452d3e1f6b55c55937e40d55e1

      SHA1

      b084e34f66242fde86eda26c8484877803ceebc7

      SHA256

      0836e8777018067a5e0fb840a181c2418bfa292c5915084542af7f866255baaa

      SHA512

      8d8737261bf159b57a910617165016b1d8dfe2e6b0103110a9e9dfd7d79148a7ebdd75040c234f38589825d76dd7a1318ee60519e7e8c57908d7680427d2f2a5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1833.exe
      Filesize

      294KB

      MD5

      fa559c2700c872f1b755b93dab38ebb9

      SHA1

      8f88a5faaf1c9207b779e912a658da072a7e542d

      SHA256

      5bde9311c47baf845f31b7f314694db9c331a12cb8cc8ed92028ab8ed75d6fa3

      SHA512

      7caf3e1d03b4a6cc7f1455d534c60877838751ac307592f3179cbdaaa59b071fd997ec28c01407cb6563454d2112230a551525a028132a91aa4b3cfb7ea085f2

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1833.exe
      Filesize

      294KB

      MD5

      fa559c2700c872f1b755b93dab38ebb9

      SHA1

      8f88a5faaf1c9207b779e912a658da072a7e542d

      SHA256

      5bde9311c47baf845f31b7f314694db9c331a12cb8cc8ed92028ab8ed75d6fa3

      SHA512

      7caf3e1d03b4a6cc7f1455d534c60877838751ac307592f3179cbdaaa59b071fd997ec28c01407cb6563454d2112230a551525a028132a91aa4b3cfb7ea085f2

    • memory/624-168-0x0000000002140000-0x0000000002152000-memory.dmp
      Filesize

      72KB

    • memory/624-180-0x0000000004BF0000-0x0000000004C00000-memory.dmp
      Filesize

      64KB

    • memory/624-158-0x0000000004C00000-0x00000000051A4000-memory.dmp
      Filesize

      5.6MB

    • memory/624-160-0x0000000002140000-0x0000000002152000-memory.dmp
      Filesize

      72KB

    • memory/624-159-0x0000000002140000-0x0000000002152000-memory.dmp
      Filesize

      72KB

    • memory/624-152-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/624-203-0x0000000002140000-0x0000000002152000-memory.dmp
      Filesize

      72KB

    • memory/624-1118-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/624-164-0x0000000002140000-0x0000000002152000-memory.dmp
      Filesize

      72KB

    • memory/624-198-0x0000000002140000-0x0000000002152000-memory.dmp
      Filesize

      72KB

    • memory/624-1108-0x0000000004BF0000-0x0000000004C00000-memory.dmp
      Filesize

      64KB

    • memory/624-173-0x0000000002140000-0x0000000002152000-memory.dmp
      Filesize

      72KB

    • memory/624-1110-0x0000000004BF0000-0x0000000004C00000-memory.dmp
      Filesize

      64KB

    • memory/624-156-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/624-177-0x0000000004BF0000-0x0000000004C00000-memory.dmp
      Filesize

      64KB

    • memory/624-179-0x0000000002140000-0x0000000002152000-memory.dmp
      Filesize

      72KB

    • memory/624-174-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/624-1111-0x0000000004BF0000-0x0000000004C00000-memory.dmp
      Filesize

      64KB

    • memory/624-186-0x0000000002140000-0x0000000002152000-memory.dmp
      Filesize

      72KB

    • memory/624-182-0x0000000004BF0000-0x0000000004C00000-memory.dmp
      Filesize

      64KB

    • memory/624-218-0x0000000002140000-0x0000000002152000-memory.dmp
      Filesize

      72KB

    • memory/624-214-0x0000000002140000-0x0000000002152000-memory.dmp
      Filesize

      72KB

    • memory/624-210-0x0000000002140000-0x0000000002152000-memory.dmp
      Filesize

      72KB

    • memory/624-207-0x0000000002140000-0x0000000002152000-memory.dmp
      Filesize

      72KB

    • memory/624-192-0x0000000002140000-0x0000000002152000-memory.dmp
      Filesize

      72KB

    • memory/624-195-0x0000000002140000-0x0000000002152000-memory.dmp
      Filesize

      72KB

    • memory/624-148-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1324-150-0x0000000000580000-0x00000000005AE000-memory.dmp
      Filesize

      184KB

    • memory/1516-185-0x00000000008D0000-0x000000000091B000-memory.dmp
      Filesize

      300KB

    • memory/1516-199-0x0000000002740000-0x000000000277F000-memory.dmp
      Filesize

      252KB

    • memory/1516-202-0x0000000002740000-0x000000000277F000-memory.dmp
      Filesize

      252KB

    • memory/1516-206-0x0000000002740000-0x000000000277F000-memory.dmp
      Filesize

      252KB

    • memory/1516-193-0x0000000002740000-0x000000000277F000-memory.dmp
      Filesize

      252KB

    • memory/1516-190-0x00000000024A0000-0x00000000024B0000-memory.dmp
      Filesize

      64KB

    • memory/1516-211-0x0000000002740000-0x000000000277F000-memory.dmp
      Filesize

      252KB

    • memory/1516-187-0x00000000024A0000-0x00000000024B0000-memory.dmp
      Filesize

      64KB

    • memory/1516-215-0x0000000002740000-0x000000000277F000-memory.dmp
      Filesize

      252KB

    • memory/1516-219-0x0000000002740000-0x000000000277F000-memory.dmp
      Filesize

      252KB

    • memory/1516-221-0x0000000002740000-0x000000000277F000-memory.dmp
      Filesize

      252KB

    • memory/1516-188-0x0000000002740000-0x000000000277F000-memory.dmp
      Filesize

      252KB

    • memory/1516-223-0x0000000002740000-0x000000000277F000-memory.dmp
      Filesize

      252KB

    • memory/1516-225-0x0000000002740000-0x000000000277F000-memory.dmp
      Filesize

      252KB

    • memory/1516-1100-0x0000000005200000-0x0000000005818000-memory.dmp
      Filesize

      6.1MB

    • memory/1516-1101-0x00000000058A0000-0x00000000059AA000-memory.dmp
      Filesize

      1.0MB

    • memory/1516-1102-0x00000000059E0000-0x00000000059F2000-memory.dmp
      Filesize

      72KB

    • memory/1516-1103-0x0000000005A00000-0x0000000005A3C000-memory.dmp
      Filesize

      240KB

    • memory/1516-1104-0x00000000024A0000-0x00000000024B0000-memory.dmp
      Filesize

      64KB

    • memory/1516-1107-0x0000000005CF0000-0x0000000005D82000-memory.dmp
      Filesize

      584KB

    • memory/1516-1109-0x0000000005D90000-0x0000000005DF6000-memory.dmp
      Filesize

      408KB

    • memory/1516-181-0x0000000002740000-0x000000000277F000-memory.dmp
      Filesize

      252KB

    • memory/1516-175-0x0000000002740000-0x000000000277F000-memory.dmp
      Filesize

      252KB

    • memory/1516-170-0x0000000002740000-0x000000000277F000-memory.dmp
      Filesize

      252KB

    • memory/1516-1113-0x00000000024A0000-0x00000000024B0000-memory.dmp
      Filesize

      64KB

    • memory/1516-1112-0x00000000024A0000-0x00000000024B0000-memory.dmp
      Filesize

      64KB

    • memory/1516-1114-0x00000000024A0000-0x00000000024B0000-memory.dmp
      Filesize

      64KB

    • memory/1516-167-0x0000000002740000-0x000000000277F000-memory.dmp
      Filesize

      252KB

    • memory/1516-1119-0x0000000006590000-0x0000000006606000-memory.dmp
      Filesize

      472KB

    • memory/1516-1120-0x0000000006620000-0x0000000006670000-memory.dmp
      Filesize

      320KB

    • memory/1516-1121-0x00000000067F0000-0x00000000069B2000-memory.dmp
      Filesize

      1.8MB

    • memory/1516-1122-0x00000000069C0000-0x0000000006EEC000-memory.dmp
      Filesize

      5.2MB

    • memory/1516-1123-0x00000000024A0000-0x00000000024B0000-memory.dmp
      Filesize

      64KB

    • memory/1516-163-0x0000000002740000-0x000000000277F000-memory.dmp
      Filesize

      252KB

    • memory/1516-161-0x0000000002740000-0x000000000277F000-memory.dmp
      Filesize

      252KB

    • memory/1908-1129-0x0000000000C30000-0x0000000000C62000-memory.dmp
      Filesize

      200KB

    • memory/1908-1130-0x00000000055B0000-0x00000000055C0000-memory.dmp
      Filesize

      64KB