Analysis

  • max time kernel
    65s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 18:21

General

  • Target

    2535a57915da267368b9dba6e60e0b84f3f2fbaa27c8de16d1a329199e7d78b7.exe

  • Size

    521KB

  • MD5

    15043d3fdb28b84e2cd41d19581d22db

  • SHA1

    04139ebacdc62abf5eac320afd453b1a1b8d6e91

  • SHA256

    2535a57915da267368b9dba6e60e0b84f3f2fbaa27c8de16d1a329199e7d78b7

  • SHA512

    42c4f0b9fa37739836a4b50347d954b1bf8d63de76990c78b5dcd19724a752dcdd9150be2f1dbb9f851ac6a9a0abd37c8754645ffd88751ff53c806f6c9a5b73

  • SSDEEP

    12288:2Mr9y9083I74IkIR+qcURTYcuyZLk/bLgYOz:LyL3+4IvM5UBuyi/bLSz

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2535a57915da267368b9dba6e60e0b84f3f2fbaa27c8de16d1a329199e7d78b7.exe
    "C:\Users\Admin\AppData\Local\Temp\2535a57915da267368b9dba6e60e0b84f3f2fbaa27c8de16d1a329199e7d78b7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2092
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYY1640.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYY1640.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4780
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr760027.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr760027.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4800
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku305083.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku305083.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:116
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 116 -s 1196
          4⤵
          • Program crash
          PID:4092
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr202902.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr202902.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2824
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 116 -ip 116
    1⤵
      PID:1608

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr202902.exe
      Filesize

      175KB

      MD5

      b80313e5233f9f5dfe8cc356e1dd7cd6

      SHA1

      73ab1a2224942f8cb9fd494dc848dee106288b41

      SHA256

      cc3f7c39b8edab752edd9051a566413eadbc9e19fee267099f67f17b59e0680e

      SHA512

      531ecd03c424fe9cd669186845309ff21a16afec95cb42759b04688fa74f50dcb25d6c5425f0520b9a54aeacd759f45c8a4361ff9ac4a58ea441af1860562f15

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr202902.exe
      Filesize

      175KB

      MD5

      b80313e5233f9f5dfe8cc356e1dd7cd6

      SHA1

      73ab1a2224942f8cb9fd494dc848dee106288b41

      SHA256

      cc3f7c39b8edab752edd9051a566413eadbc9e19fee267099f67f17b59e0680e

      SHA512

      531ecd03c424fe9cd669186845309ff21a16afec95cb42759b04688fa74f50dcb25d6c5425f0520b9a54aeacd759f45c8a4361ff9ac4a58ea441af1860562f15

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYY1640.exe
      Filesize

      379KB

      MD5

      aa6146ad5cd633dcf80eb04b7b79aa8b

      SHA1

      f0b9841ceb8ec909ed505c0200c313920756ed89

      SHA256

      8c382911a8f06548829a79ca794695497e7384bca02f4ff16c6ef309e92f6390

      SHA512

      f3465cffb767f974a6852c160688e03c84a86706e02b58d62ea0f331d77154b4f73357e9ebf4cace389ad078a36f683059e70eb7185237e9fe500d793d35c456

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYY1640.exe
      Filesize

      379KB

      MD5

      aa6146ad5cd633dcf80eb04b7b79aa8b

      SHA1

      f0b9841ceb8ec909ed505c0200c313920756ed89

      SHA256

      8c382911a8f06548829a79ca794695497e7384bca02f4ff16c6ef309e92f6390

      SHA512

      f3465cffb767f974a6852c160688e03c84a86706e02b58d62ea0f331d77154b4f73357e9ebf4cace389ad078a36f683059e70eb7185237e9fe500d793d35c456

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr760027.exe
      Filesize

      11KB

      MD5

      eead17d3376defc1b833e4f41378de64

      SHA1

      16cbe2843eb639e2ef9a6eb241abd1e319fc6665

      SHA256

      67efc7a9be0966299d6baf23eec28665784efeccce75a4e49b0901ae5b6b7c27

      SHA512

      60f7a06523779896c379bd4d1473c5e0199a1b075058737dc3c1ce72c07ff9f8000b29a91b0ff20e3df95db272224ce7f3052e192ce2a9d12cb7d4848bc26b5f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr760027.exe
      Filesize

      11KB

      MD5

      eead17d3376defc1b833e4f41378de64

      SHA1

      16cbe2843eb639e2ef9a6eb241abd1e319fc6665

      SHA256

      67efc7a9be0966299d6baf23eec28665784efeccce75a4e49b0901ae5b6b7c27

      SHA512

      60f7a06523779896c379bd4d1473c5e0199a1b075058737dc3c1ce72c07ff9f8000b29a91b0ff20e3df95db272224ce7f3052e192ce2a9d12cb7d4848bc26b5f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku305083.exe
      Filesize

      294KB

      MD5

      c4dcf9aa726c96ce0a593ab15fcc827c

      SHA1

      05545e4ce4fe5e29c3c31e09c90a8e907098b85d

      SHA256

      7e0d3fb2edea4936f93ce1de8aa2eb2eb4bf656a778b4d0ee64bcfdef9788e13

      SHA512

      f57084eb83dbf612f53adafd7014ff47d1b2abe64823e01e50f0c5ddc5e3dfa146cef1d5eeae7308600c92c654fdc96576bc9d2b5ecc010f3b6750c4a5d90346

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku305083.exe
      Filesize

      294KB

      MD5

      c4dcf9aa726c96ce0a593ab15fcc827c

      SHA1

      05545e4ce4fe5e29c3c31e09c90a8e907098b85d

      SHA256

      7e0d3fb2edea4936f93ce1de8aa2eb2eb4bf656a778b4d0ee64bcfdef9788e13

      SHA512

      f57084eb83dbf612f53adafd7014ff47d1b2abe64823e01e50f0c5ddc5e3dfa146cef1d5eeae7308600c92c654fdc96576bc9d2b5ecc010f3b6750c4a5d90346

    • memory/116-153-0x0000000004AA0000-0x0000000005044000-memory.dmp
      Filesize

      5.6MB

    • memory/116-154-0x0000000000610000-0x000000000065B000-memory.dmp
      Filesize

      300KB

    • memory/116-156-0x0000000002640000-0x0000000002650000-memory.dmp
      Filesize

      64KB

    • memory/116-155-0x0000000002640000-0x0000000002650000-memory.dmp
      Filesize

      64KB

    • memory/116-157-0x0000000002640000-0x0000000002650000-memory.dmp
      Filesize

      64KB

    • memory/116-158-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-159-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-161-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-163-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-165-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-167-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-169-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-173-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-171-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-175-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-177-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-179-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-181-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-183-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-185-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-187-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-189-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-191-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-193-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-195-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-197-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-199-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-201-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-203-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-205-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-207-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-209-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-211-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-213-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-215-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-217-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-219-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-221-0x0000000005090000-0x00000000050CF000-memory.dmp
      Filesize

      252KB

    • memory/116-1064-0x0000000005210000-0x0000000005828000-memory.dmp
      Filesize

      6.1MB

    • memory/116-1065-0x00000000058A0000-0x00000000059AA000-memory.dmp
      Filesize

      1.0MB

    • memory/116-1066-0x00000000059E0000-0x00000000059F2000-memory.dmp
      Filesize

      72KB

    • memory/116-1067-0x0000000002640000-0x0000000002650000-memory.dmp
      Filesize

      64KB

    • memory/116-1068-0x0000000005A00000-0x0000000005A3C000-memory.dmp
      Filesize

      240KB

    • memory/116-1070-0x0000000002640000-0x0000000002650000-memory.dmp
      Filesize

      64KB

    • memory/116-1071-0x0000000002640000-0x0000000002650000-memory.dmp
      Filesize

      64KB

    • memory/116-1072-0x0000000002640000-0x0000000002650000-memory.dmp
      Filesize

      64KB

    • memory/116-1073-0x0000000005CF0000-0x0000000005D56000-memory.dmp
      Filesize

      408KB

    • memory/116-1074-0x00000000063A0000-0x0000000006432000-memory.dmp
      Filesize

      584KB

    • memory/116-1075-0x0000000006490000-0x0000000006506000-memory.dmp
      Filesize

      472KB

    • memory/116-1076-0x0000000006520000-0x0000000006570000-memory.dmp
      Filesize

      320KB

    • memory/116-1077-0x00000000067F0000-0x00000000069B2000-memory.dmp
      Filesize

      1.8MB

    • memory/116-1078-0x0000000002640000-0x0000000002650000-memory.dmp
      Filesize

      64KB

    • memory/116-1079-0x00000000069C0000-0x0000000006EEC000-memory.dmp
      Filesize

      5.2MB

    • memory/2824-1085-0x0000000000010000-0x0000000000042000-memory.dmp
      Filesize

      200KB

    • memory/2824-1086-0x0000000004C50000-0x0000000004C60000-memory.dmp
      Filesize

      64KB

    • memory/4800-147-0x0000000000C80000-0x0000000000C8A000-memory.dmp
      Filesize

      40KB