Analysis

  • max time kernel
    86s
  • max time network
    89s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 19:18

General

  • Target

    53df7eb3552d46ec9699209d5a31a6fbb9576cd685c0b6d6c60df046fe89a739.exe

  • Size

    521KB

  • MD5

    ce2e906eb11ea6abd05584b826cbc3df

  • SHA1

    df3621a19c808f9701d637e4338729d8428d0d30

  • SHA256

    53df7eb3552d46ec9699209d5a31a6fbb9576cd685c0b6d6c60df046fe89a739

  • SHA512

    abfa4ec0dcd6b10518889b333fc6f933d7fb55a9b0dd3c005502ea47ba8d6690b6ab63b340e998563df2dc7646606d3405f4f71c60b329f39f74262cc5f90022

  • SSDEEP

    12288:WMrXy901MdXLdD7Ogw8itetpAHp9t96iCl5Tl8qk:ByZLW0SetKp9/6iYyqk

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\53df7eb3552d46ec9699209d5a31a6fbb9576cd685c0b6d6c60df046fe89a739.exe
    "C:\Users\Admin\AppData\Local\Temp\53df7eb3552d46ec9699209d5a31a6fbb9576cd685c0b6d6c60df046fe89a739.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4604
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziaU7809.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziaU7809.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4440
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr039934.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr039934.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2704
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku594256.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku594256.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1244
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1244 -s 1328
          4⤵
          • Program crash
          PID:2032
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr920441.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr920441.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3140
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1244 -ip 1244
    1⤵
      PID:4592

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr920441.exe

      Filesize

      175KB

      MD5

      2a7102f0a042201e1a190c7ca1392b84

      SHA1

      4eb03dae133b04685b16626039946226dd52cb8f

      SHA256

      bd05f734a20f083ed390963a9b1757f8d2264e11b6fd4100f32bd73be2e42852

      SHA512

      5ebd44b5bdc37524d7a558893e53ec24cfe37b756e7d045c4d3884743d49f72ed200e37049230c27ad3bc433fa4edb7139c648abda1a1342482124d0d682d309

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr920441.exe

      Filesize

      175KB

      MD5

      2a7102f0a042201e1a190c7ca1392b84

      SHA1

      4eb03dae133b04685b16626039946226dd52cb8f

      SHA256

      bd05f734a20f083ed390963a9b1757f8d2264e11b6fd4100f32bd73be2e42852

      SHA512

      5ebd44b5bdc37524d7a558893e53ec24cfe37b756e7d045c4d3884743d49f72ed200e37049230c27ad3bc433fa4edb7139c648abda1a1342482124d0d682d309

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziaU7809.exe

      Filesize

      379KB

      MD5

      6d90eabcad5420d2a1436245ba0fadc1

      SHA1

      4dbe83fa083b835d304cb228204d4df9bc3c90a7

      SHA256

      3778a8fd10b06555f4f6c203cffac35a4f6d60414e38a44882274944917e9fe4

      SHA512

      99018db1c34c342c8c7125d034036779f113afb43929cc8328845d67f5f13d6949ff8ad5a71d6ae6161265719ad3f2b607c0725b46cc871257dd69ec8c8a535d

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziaU7809.exe

      Filesize

      379KB

      MD5

      6d90eabcad5420d2a1436245ba0fadc1

      SHA1

      4dbe83fa083b835d304cb228204d4df9bc3c90a7

      SHA256

      3778a8fd10b06555f4f6c203cffac35a4f6d60414e38a44882274944917e9fe4

      SHA512

      99018db1c34c342c8c7125d034036779f113afb43929cc8328845d67f5f13d6949ff8ad5a71d6ae6161265719ad3f2b607c0725b46cc871257dd69ec8c8a535d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr039934.exe

      Filesize

      11KB

      MD5

      9f37ac9732f227a7cb4d38a101cd95b6

      SHA1

      036648d141f75044fb6fb2e4e965b4ca791f7e43

      SHA256

      d98f9db749585792ba75ec9d29da3f8d74ebff739621f207386a06794c710d0c

      SHA512

      928c7b0b4d29e11aca8ce81c1e0580c8572f0c79b5faff1970b718eb19eb7a4ec3897e1ae1ac04a70c55d6029211c2ba9f51750efb4c52e40043fde4486e87b1

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr039934.exe

      Filesize

      11KB

      MD5

      9f37ac9732f227a7cb4d38a101cd95b6

      SHA1

      036648d141f75044fb6fb2e4e965b4ca791f7e43

      SHA256

      d98f9db749585792ba75ec9d29da3f8d74ebff739621f207386a06794c710d0c

      SHA512

      928c7b0b4d29e11aca8ce81c1e0580c8572f0c79b5faff1970b718eb19eb7a4ec3897e1ae1ac04a70c55d6029211c2ba9f51750efb4c52e40043fde4486e87b1

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku594256.exe

      Filesize

      294KB

      MD5

      c9aa4d75655f0639115797d70aa0e038

      SHA1

      ba0adbb0743bf8da131a84d84bbd95bbc4972dfe

      SHA256

      42bd9d01eca0474ca198e73bdcdec993a040d22cc8000478f9eec647e607e81f

      SHA512

      61f1bc4f76bd4e7ae858bb98a7084e56a80383e387e0158785e2fce04a4c1177c6ac659c6f0479bb2f6815631210aabb1a9048f3effd01a4e2b9ff280453befd

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku594256.exe

      Filesize

      294KB

      MD5

      c9aa4d75655f0639115797d70aa0e038

      SHA1

      ba0adbb0743bf8da131a84d84bbd95bbc4972dfe

      SHA256

      42bd9d01eca0474ca198e73bdcdec993a040d22cc8000478f9eec647e607e81f

      SHA512

      61f1bc4f76bd4e7ae858bb98a7084e56a80383e387e0158785e2fce04a4c1177c6ac659c6f0479bb2f6815631210aabb1a9048f3effd01a4e2b9ff280453befd

    • memory/1244-153-0x0000000000620000-0x000000000066B000-memory.dmp

      Filesize

      300KB

    • memory/1244-154-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/1244-155-0x0000000004C80000-0x0000000005224000-memory.dmp

      Filesize

      5.6MB

    • memory/1244-156-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-157-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-159-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-161-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-163-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-165-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-167-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-169-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-171-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-173-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-175-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-177-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-179-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-181-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-183-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-185-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-186-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/1244-189-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-188-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/1244-191-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-193-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-195-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-197-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-199-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-201-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-203-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-205-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-207-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-209-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-211-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-213-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-215-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-217-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-219-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-221-0x0000000002630000-0x000000000266F000-memory.dmp

      Filesize

      252KB

    • memory/1244-1064-0x0000000005230000-0x0000000005848000-memory.dmp

      Filesize

      6.1MB

    • memory/1244-1065-0x00000000058A0000-0x00000000059AA000-memory.dmp

      Filesize

      1.0MB

    • memory/1244-1066-0x00000000059E0000-0x00000000059F2000-memory.dmp

      Filesize

      72KB

    • memory/1244-1067-0x0000000005A00000-0x0000000005A3C000-memory.dmp

      Filesize

      240KB

    • memory/1244-1068-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/1244-1070-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/1244-1071-0x0000000005CF0000-0x0000000005D82000-memory.dmp

      Filesize

      584KB

    • memory/1244-1072-0x0000000005D90000-0x0000000005DF6000-memory.dmp

      Filesize

      408KB

    • memory/1244-1073-0x00000000065B0000-0x0000000006626000-memory.dmp

      Filesize

      472KB

    • memory/1244-1074-0x0000000006630000-0x0000000006680000-memory.dmp

      Filesize

      320KB

    • memory/1244-1075-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/1244-1076-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/1244-1077-0x00000000066A0000-0x0000000006862000-memory.dmp

      Filesize

      1.8MB

    • memory/1244-1078-0x0000000006870000-0x0000000006D9C000-memory.dmp

      Filesize

      5.2MB

    • memory/1244-1079-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/2704-147-0x0000000000E00000-0x0000000000E0A000-memory.dmp

      Filesize

      40KB

    • memory/3140-1085-0x0000000000DB0000-0x0000000000DE2000-memory.dmp

      Filesize

      200KB

    • memory/3140-1086-0x0000000005A20000-0x0000000005A30000-memory.dmp

      Filesize

      64KB