Analysis

  • max time kernel
    135s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 18:25

General

  • Target

    e5ec4cf13f19556e26f12a2d73842ff33b50ebf8a28d6a70ec4e992a7763819b.exe

  • Size

    659KB

  • MD5

    9b3e0d626aadef57bafc6e659ab9e56d

  • SHA1

    4b7ff59a3ab1f6e945e718669ae4feb4efe05824

  • SHA256

    e5ec4cf13f19556e26f12a2d73842ff33b50ebf8a28d6a70ec4e992a7763819b

  • SHA512

    109e52953ef488f49a375a5e03ee0f16a12868a092493f479566488471520238593b552aa2d34609f3127dd7947f861acee6cc9824057b792335b12e2da5b1cc

  • SSDEEP

    12288:UMray90UlxnMtIBIZzsayn+lsVZSwP2Vvp6+3P:GypYlhwPW4+3P

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 17 IoCs
  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5ec4cf13f19556e26f12a2d73842ff33b50ebf8a28d6a70ec4e992a7763819b.exe
    "C:\Users\Admin\AppData\Local\Temp\e5ec4cf13f19556e26f12a2d73842ff33b50ebf8a28d6a70ec4e992a7763819b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3388
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un778004.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un778004.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3372
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3187.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3187.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:5024
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3187.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3187.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2132
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0812.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0812.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:636
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 636 -s 1480
          4⤵
          • Program crash
          PID:4900
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si739325.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si739325.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:988
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 636 -ip 636
    1⤵
      PID:3252

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si739325.exe
      Filesize

      175KB

      MD5

      8f9516389ef45e1c5bfdfea69a83c624

      SHA1

      5c0b69cfce1d33680dc23934026039cdb7d67c3c

      SHA256

      35ed48c4696dca5545031cb9ac3e74236a6aad78796bc0f1942562049031a073

      SHA512

      1867b0eab71aa8ceb688f6842d7a01f121f3dae32564c7655e21c6ece0412e42565e09018a89e6d5b2c8f8f4973f8263340292808b3ff19fa63636f95ede93c6

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si739325.exe
      Filesize

      175KB

      MD5

      8f9516389ef45e1c5bfdfea69a83c624

      SHA1

      5c0b69cfce1d33680dc23934026039cdb7d67c3c

      SHA256

      35ed48c4696dca5545031cb9ac3e74236a6aad78796bc0f1942562049031a073

      SHA512

      1867b0eab71aa8ceb688f6842d7a01f121f3dae32564c7655e21c6ece0412e42565e09018a89e6d5b2c8f8f4973f8263340292808b3ff19fa63636f95ede93c6

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un778004.exe
      Filesize

      517KB

      MD5

      068c9a9265502bc4411e0400556124d7

      SHA1

      0e40559a270d33f8d931cae8d4d0a11925ea0720

      SHA256

      cb5033ac4185d7fc418ef06aae71faaa15cecd29e4bf6d57891c494439a73ea8

      SHA512

      8ad44bf62f0942208e236ccf6d020b2d45e12061ed573853e35efe971b7d5d7a75068ad445d3b94076e677ad1293b5397f54528e0f4a9c2ef84f7e17c24b7913

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un778004.exe
      Filesize

      517KB

      MD5

      068c9a9265502bc4411e0400556124d7

      SHA1

      0e40559a270d33f8d931cae8d4d0a11925ea0720

      SHA256

      cb5033ac4185d7fc418ef06aae71faaa15cecd29e4bf6d57891c494439a73ea8

      SHA512

      8ad44bf62f0942208e236ccf6d020b2d45e12061ed573853e35efe971b7d5d7a75068ad445d3b94076e677ad1293b5397f54528e0f4a9c2ef84f7e17c24b7913

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3187.exe
      Filesize

      237KB

      MD5

      b06fdfd9fcb5e7575c5b02c70ecaa089

      SHA1

      17bc4ee9531171e02fdfa08d58230401467b03cb

      SHA256

      ed2f8b42879a75b2a19ddb6c1a6ac9bd76b019e0052948687b99c81485702db7

      SHA512

      8f6cfd406f338a0771e92e1d5438d9ea282d8129272c41a90ab296dc301bf0f959c87fc97d5a2263ef092a71a0b8fcbe6565754c3af0b43d9677f305e9211833

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3187.exe
      Filesize

      237KB

      MD5

      b06fdfd9fcb5e7575c5b02c70ecaa089

      SHA1

      17bc4ee9531171e02fdfa08d58230401467b03cb

      SHA256

      ed2f8b42879a75b2a19ddb6c1a6ac9bd76b019e0052948687b99c81485702db7

      SHA512

      8f6cfd406f338a0771e92e1d5438d9ea282d8129272c41a90ab296dc301bf0f959c87fc97d5a2263ef092a71a0b8fcbe6565754c3af0b43d9677f305e9211833

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3187.exe
      Filesize

      237KB

      MD5

      b06fdfd9fcb5e7575c5b02c70ecaa089

      SHA1

      17bc4ee9531171e02fdfa08d58230401467b03cb

      SHA256

      ed2f8b42879a75b2a19ddb6c1a6ac9bd76b019e0052948687b99c81485702db7

      SHA512

      8f6cfd406f338a0771e92e1d5438d9ea282d8129272c41a90ab296dc301bf0f959c87fc97d5a2263ef092a71a0b8fcbe6565754c3af0b43d9677f305e9211833

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0812.exe
      Filesize

      294KB

      MD5

      dc7a2d424a0c4443906e10b25172491d

      SHA1

      3aa6de0d38a07c15679c1e1f9c1a1b4d959270e0

      SHA256

      f1ea2624c2dd19266c0052bd68bd295e914d3b73418a6377910c4e059c38cf9b

      SHA512

      cae0a4ffb1b2e1a2a25ff5531ee3f64ac9235e2dcb06a3634301c8ebaea3d25cbb0d8fa0a04f662832babaeae24d66976729652be233c9b6660994267c4cc5d5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0812.exe
      Filesize

      294KB

      MD5

      dc7a2d424a0c4443906e10b25172491d

      SHA1

      3aa6de0d38a07c15679c1e1f9c1a1b4d959270e0

      SHA256

      f1ea2624c2dd19266c0052bd68bd295e914d3b73418a6377910c4e059c38cf9b

      SHA512

      cae0a4ffb1b2e1a2a25ff5531ee3f64ac9235e2dcb06a3634301c8ebaea3d25cbb0d8fa0a04f662832babaeae24d66976729652be233c9b6660994267c4cc5d5

    • memory/636-175-0x0000000005080000-0x00000000050BF000-memory.dmp
      Filesize

      252KB

    • memory/636-1105-0x00000000025C0000-0x00000000025D0000-memory.dmp
      Filesize

      64KB

    • memory/636-222-0x0000000005080000-0x00000000050BF000-memory.dmp
      Filesize

      252KB

    • memory/636-1123-0x00000000066D0000-0x0000000006892000-memory.dmp
      Filesize

      1.8MB

    • memory/636-161-0x0000000005080000-0x00000000050BF000-memory.dmp
      Filesize

      252KB

    • memory/636-1122-0x00000000025C0000-0x00000000025D0000-memory.dmp
      Filesize

      64KB

    • memory/636-1121-0x0000000006640000-0x0000000006690000-memory.dmp
      Filesize

      320KB

    • memory/636-162-0x0000000005080000-0x00000000050BF000-memory.dmp
      Filesize

      252KB

    • memory/636-166-0x0000000005080000-0x00000000050BF000-memory.dmp
      Filesize

      252KB

    • memory/636-224-0x0000000005080000-0x00000000050BF000-memory.dmp
      Filesize

      252KB

    • memory/636-1120-0x00000000065B0000-0x0000000006626000-memory.dmp
      Filesize

      472KB

    • memory/636-1115-0x00000000025C0000-0x00000000025D0000-memory.dmp
      Filesize

      64KB

    • memory/636-1114-0x00000000025C0000-0x00000000025D0000-memory.dmp
      Filesize

      64KB

    • memory/636-217-0x0000000005080000-0x00000000050BF000-memory.dmp
      Filesize

      252KB

    • memory/636-1110-0x0000000006260000-0x00000000062F2000-memory.dmp
      Filesize

      584KB

    • memory/636-170-0x0000000005080000-0x00000000050BF000-memory.dmp
      Filesize

      252KB

    • memory/636-181-0x0000000005080000-0x00000000050BF000-memory.dmp
      Filesize

      252KB

    • memory/636-1109-0x0000000005BB0000-0x0000000005C16000-memory.dmp
      Filesize

      408KB

    • memory/636-183-0x0000000000610000-0x000000000065B000-memory.dmp
      Filesize

      300KB

    • memory/636-1124-0x00000000068A0000-0x0000000006DCC000-memory.dmp
      Filesize

      5.2MB

    • memory/636-186-0x00000000025C0000-0x00000000025D0000-memory.dmp
      Filesize

      64KB

    • memory/636-188-0x0000000005080000-0x00000000050BF000-memory.dmp
      Filesize

      252KB

    • memory/636-1104-0x00000000058C0000-0x00000000058FC000-memory.dmp
      Filesize

      240KB

    • memory/636-189-0x00000000025C0000-0x00000000025D0000-memory.dmp
      Filesize

      64KB

    • memory/636-192-0x00000000025C0000-0x00000000025D0000-memory.dmp
      Filesize

      64KB

    • memory/636-194-0x0000000005080000-0x00000000050BF000-memory.dmp
      Filesize

      252KB

    • memory/636-1103-0x00000000058A0000-0x00000000058B2000-memory.dmp
      Filesize

      72KB

    • memory/636-197-0x0000000005080000-0x00000000050BF000-memory.dmp
      Filesize

      252KB

    • memory/636-1102-0x0000000005760000-0x000000000586A000-memory.dmp
      Filesize

      1.0MB

    • memory/636-201-0x0000000005080000-0x00000000050BF000-memory.dmp
      Filesize

      252KB

    • memory/636-1101-0x00000000050C0000-0x00000000056D8000-memory.dmp
      Filesize

      6.1MB

    • memory/636-226-0x0000000005080000-0x00000000050BF000-memory.dmp
      Filesize

      252KB

    • memory/636-205-0x0000000005080000-0x00000000050BF000-memory.dmp
      Filesize

      252KB

    • memory/636-209-0x0000000005080000-0x00000000050BF000-memory.dmp
      Filesize

      252KB

    • memory/636-212-0x0000000005080000-0x00000000050BF000-memory.dmp
      Filesize

      252KB

    • memory/988-1131-0x00000000050D0000-0x00000000050E0000-memory.dmp
      Filesize

      64KB

    • memory/988-1130-0x00000000004B0000-0x00000000004E2000-memory.dmp
      Filesize

      200KB

    • memory/2132-167-0x0000000004A90000-0x0000000004AA2000-memory.dmp
      Filesize

      72KB

    • memory/2132-1111-0x0000000004C10000-0x0000000004C20000-memory.dmp
      Filesize

      64KB

    • memory/2132-214-0x0000000004A90000-0x0000000004AA2000-memory.dmp
      Filesize

      72KB

    • memory/2132-221-0x0000000004A90000-0x0000000004AA2000-memory.dmp
      Filesize

      72KB

    • memory/2132-210-0x0000000004A90000-0x0000000004AA2000-memory.dmp
      Filesize

      72KB

    • memory/2132-206-0x0000000004A90000-0x0000000004AA2000-memory.dmp
      Filesize

      72KB

    • memory/2132-202-0x0000000004A90000-0x0000000004AA2000-memory.dmp
      Filesize

      72KB

    • memory/2132-198-0x0000000004A90000-0x0000000004AA2000-memory.dmp
      Filesize

      72KB

    • memory/2132-193-0x0000000004A90000-0x0000000004AA2000-memory.dmp
      Filesize

      72KB

    • memory/2132-187-0x0000000004A90000-0x0000000004AA2000-memory.dmp
      Filesize

      72KB

    • memory/2132-182-0x0000000004A90000-0x0000000004AA2000-memory.dmp
      Filesize

      72KB

    • memory/2132-1108-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/2132-180-0x0000000004C10000-0x0000000004C20000-memory.dmp
      Filesize

      64KB

    • memory/2132-173-0x0000000004C10000-0x0000000004C20000-memory.dmp
      Filesize

      64KB

    • memory/2132-1112-0x0000000004C10000-0x0000000004C20000-memory.dmp
      Filesize

      64KB

    • memory/2132-218-0x0000000004A90000-0x0000000004AA2000-memory.dmp
      Filesize

      72KB

    • memory/2132-1113-0x0000000004C10000-0x0000000004C20000-memory.dmp
      Filesize

      64KB

    • memory/2132-176-0x0000000004A90000-0x0000000004AA2000-memory.dmp
      Filesize

      72KB

    • memory/2132-177-0x0000000004C10000-0x0000000004C20000-memory.dmp
      Filesize

      64KB

    • memory/2132-1119-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/2132-171-0x0000000004A90000-0x0000000004AA2000-memory.dmp
      Filesize

      72KB

    • memory/2132-163-0x0000000004A90000-0x0000000004AA2000-memory.dmp
      Filesize

      72KB

    • memory/2132-160-0x0000000004A90000-0x0000000004AA2000-memory.dmp
      Filesize

      72KB

    • memory/2132-159-0x0000000004C20000-0x00000000051C4000-memory.dmp
      Filesize

      5.6MB

    • memory/2132-157-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/2132-152-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/2132-151-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/2132-148-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/5024-150-0x00000000005E0000-0x000000000060E000-memory.dmp
      Filesize

      184KB