Analysis

  • max time kernel
    111s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 19:25

General

  • Target

    df9f1e3ce70f2be1ef5510093ca9cc01f4e0910e411637489eec75887960fde0.exe

  • Size

    659KB

  • MD5

    13139c3a241221faac96e37011667093

  • SHA1

    8053a52096d74894f566e2442c968214e68548d6

  • SHA256

    df9f1e3ce70f2be1ef5510093ca9cc01f4e0910e411637489eec75887960fde0

  • SHA512

    1f7846858a1a9fc41efa98d4f07736bdb94c0bcc314fbbfe03c95629699dee17d8723587d413eeda852e0f9775693e9b84638b0b1e9c8fc96b7c9c79fbc46df1

  • SSDEEP

    12288:aMrAy90b0NDdp8MoPWB3vXlvSxEqFnGim7hoZE58UtBY6IEu2R:+y+Gdp8P8/lKx5Zm7hZ58aPIA

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df9f1e3ce70f2be1ef5510093ca9cc01f4e0910e411637489eec75887960fde0.exe
    "C:\Users\Admin\AppData\Local\Temp\df9f1e3ce70f2be1ef5510093ca9cc01f4e0910e411637489eec75887960fde0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3848
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un386465.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un386465.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4692
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6328.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6328.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5084
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5084 -s 1080
          4⤵
          • Program crash
          PID:3772
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7178.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7178.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:764
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 764 -s 1348
          4⤵
          • Program crash
          PID:2668
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si535957.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si535957.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1352
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 5084 -ip 5084
    1⤵
      PID:4584
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 764 -ip 764
      1⤵
        PID:4944

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si535957.exe
        Filesize

        175KB

        MD5

        bcc1126013297b241868a23046220f1b

        SHA1

        6c11ae03ef25a1ed38c17c90b84fbd9544a001d8

        SHA256

        50dcf3de852d023971685e6c07401141ae026d3386ac2a635da1887040e96671

        SHA512

        e7ba77b98830b20d00c454d8ab2f9c4fe87399f40f332087a4c20754d1203c41df1d4f146a74ec538515b39a959252b03fb0c4845f6cb7dd835df3fd1bc1a35f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si535957.exe
        Filesize

        175KB

        MD5

        bcc1126013297b241868a23046220f1b

        SHA1

        6c11ae03ef25a1ed38c17c90b84fbd9544a001d8

        SHA256

        50dcf3de852d023971685e6c07401141ae026d3386ac2a635da1887040e96671

        SHA512

        e7ba77b98830b20d00c454d8ab2f9c4fe87399f40f332087a4c20754d1203c41df1d4f146a74ec538515b39a959252b03fb0c4845f6cb7dd835df3fd1bc1a35f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un386465.exe
        Filesize

        517KB

        MD5

        749d1ea7f40510a46b25b71025b22103

        SHA1

        dc753e7efcb17d1e6529f4a953ae4a2c09c89a15

        SHA256

        4fd738063a2b3e1f70afc7d6a516172473ddb12b78c440750d37c9863e04b657

        SHA512

        5e4bc7b051bbcc003355c83c31c6997a0cdc23dafa3c735b24d75b951f7ae0f93557840a15717629519757704b614661461c9baa58db5a8c065fc05a76618bc5

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un386465.exe
        Filesize

        517KB

        MD5

        749d1ea7f40510a46b25b71025b22103

        SHA1

        dc753e7efcb17d1e6529f4a953ae4a2c09c89a15

        SHA256

        4fd738063a2b3e1f70afc7d6a516172473ddb12b78c440750d37c9863e04b657

        SHA512

        5e4bc7b051bbcc003355c83c31c6997a0cdc23dafa3c735b24d75b951f7ae0f93557840a15717629519757704b614661461c9baa58db5a8c065fc05a76618bc5

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6328.exe
        Filesize

        236KB

        MD5

        e0bb57a7c5de44ae1cda8f3d5f9f7a5e

        SHA1

        646518fdc59f580db394c6b8184f7aec8bc5cbcc

        SHA256

        a430e6f8416fe4c7384c4e2ceba8389aa6bc72c9096ad926ccd7c00243652ba4

        SHA512

        41878c7c827c74379c033a9c3effc950753c9c90719d8c28ab9fec4167640d9dd3eda985b5069b9a740a66e41540856dde5c961612fcc21073f254922e5842db

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6328.exe
        Filesize

        236KB

        MD5

        e0bb57a7c5de44ae1cda8f3d5f9f7a5e

        SHA1

        646518fdc59f580db394c6b8184f7aec8bc5cbcc

        SHA256

        a430e6f8416fe4c7384c4e2ceba8389aa6bc72c9096ad926ccd7c00243652ba4

        SHA512

        41878c7c827c74379c033a9c3effc950753c9c90719d8c28ab9fec4167640d9dd3eda985b5069b9a740a66e41540856dde5c961612fcc21073f254922e5842db

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7178.exe
        Filesize

        294KB

        MD5

        0b1294e24c1ae97f17af6bee8400fe5d

        SHA1

        89a7616b002ecf4ca0c891062694809260395db5

        SHA256

        bb7619ffc10b53c81db1c17e11f43b09ea0953d1f7f127076670883f4abd5d11

        SHA512

        af58a58b83f22bc631b9a0fe3d3af87122c78aea85ad216687cf75aade012bfbf764912e4e474334100d99889ab025251d3bd61fcbef51efaf138fb191842ff3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7178.exe
        Filesize

        294KB

        MD5

        0b1294e24c1ae97f17af6bee8400fe5d

        SHA1

        89a7616b002ecf4ca0c891062694809260395db5

        SHA256

        bb7619ffc10b53c81db1c17e11f43b09ea0953d1f7f127076670883f4abd5d11

        SHA512

        af58a58b83f22bc631b9a0fe3d3af87122c78aea85ad216687cf75aade012bfbf764912e4e474334100d99889ab025251d3bd61fcbef51efaf138fb191842ff3

      • memory/764-227-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/764-1102-0x00000000059E0000-0x00000000059F2000-memory.dmp
        Filesize

        72KB

      • memory/764-1115-0x0000000004C70000-0x0000000004C80000-memory.dmp
        Filesize

        64KB

      • memory/764-1114-0x0000000006FC0000-0x0000000007010000-memory.dmp
        Filesize

        320KB

      • memory/764-1113-0x0000000006F20000-0x0000000006F96000-memory.dmp
        Filesize

        472KB

      • memory/764-1112-0x00000000068D0000-0x0000000006DFC000-memory.dmp
        Filesize

        5.2MB

      • memory/764-1111-0x00000000066F0000-0x00000000068B2000-memory.dmp
        Filesize

        1.8MB

      • memory/764-1110-0x0000000004C70000-0x0000000004C80000-memory.dmp
        Filesize

        64KB

      • memory/764-1109-0x0000000004C70000-0x0000000004C80000-memory.dmp
        Filesize

        64KB

      • memory/764-1108-0x0000000004C70000-0x0000000004C80000-memory.dmp
        Filesize

        64KB

      • memory/764-1106-0x0000000005D90000-0x0000000005DF6000-memory.dmp
        Filesize

        408KB

      • memory/764-1105-0x0000000005CF0000-0x0000000005D82000-memory.dmp
        Filesize

        584KB

      • memory/764-1104-0x0000000004C70000-0x0000000004C80000-memory.dmp
        Filesize

        64KB

      • memory/764-1103-0x0000000005A00000-0x0000000005A3C000-memory.dmp
        Filesize

        240KB

      • memory/764-1101-0x00000000058A0000-0x00000000059AA000-memory.dmp
        Filesize

        1.0MB

      • memory/764-1100-0x0000000005230000-0x0000000005848000-memory.dmp
        Filesize

        6.1MB

      • memory/764-225-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/764-223-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/764-221-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/764-219-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/764-217-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/764-215-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/764-191-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/764-190-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/764-193-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/764-195-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/764-197-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/764-199-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/764-201-0x0000000000900000-0x000000000094B000-memory.dmp
        Filesize

        300KB

      • memory/764-202-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/764-205-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/764-209-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/764-208-0x0000000004C70000-0x0000000004C80000-memory.dmp
        Filesize

        64KB

      • memory/764-206-0x0000000004C70000-0x0000000004C80000-memory.dmp
        Filesize

        64KB

      • memory/764-204-0x0000000004C70000-0x0000000004C80000-memory.dmp
        Filesize

        64KB

      • memory/764-211-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/764-213-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/1352-1121-0x0000000000EA0000-0x0000000000ED2000-memory.dmp
        Filesize

        200KB

      • memory/1352-1122-0x00000000057E0000-0x00000000057F0000-memory.dmp
        Filesize

        64KB

      • memory/5084-175-0x0000000002670000-0x0000000002682000-memory.dmp
        Filesize

        72KB

      • memory/5084-148-0x0000000000720000-0x000000000074D000-memory.dmp
        Filesize

        180KB

      • memory/5084-183-0x0000000004D60000-0x0000000004D70000-memory.dmp
        Filesize

        64KB

      • memory/5084-182-0x0000000004D60000-0x0000000004D70000-memory.dmp
        Filesize

        64KB

      • memory/5084-150-0x0000000002670000-0x0000000002682000-memory.dmp
        Filesize

        72KB

      • memory/5084-180-0x0000000000400000-0x00000000004A9000-memory.dmp
        Filesize

        676KB

      • memory/5084-179-0x0000000004D60000-0x0000000004D70000-memory.dmp
        Filesize

        64KB

      • memory/5084-155-0x0000000002670000-0x0000000002682000-memory.dmp
        Filesize

        72KB

      • memory/5084-178-0x0000000004D60000-0x0000000004D70000-memory.dmp
        Filesize

        64KB

      • memory/5084-177-0x0000000002670000-0x0000000002682000-memory.dmp
        Filesize

        72KB

      • memory/5084-153-0x0000000002670000-0x0000000002682000-memory.dmp
        Filesize

        72KB

      • memory/5084-184-0x0000000004D60000-0x0000000004D70000-memory.dmp
        Filesize

        64KB

      • memory/5084-167-0x0000000002670000-0x0000000002682000-memory.dmp
        Filesize

        72KB

      • memory/5084-169-0x0000000002670000-0x0000000002682000-memory.dmp
        Filesize

        72KB

      • memory/5084-171-0x0000000002670000-0x0000000002682000-memory.dmp
        Filesize

        72KB

      • memory/5084-165-0x0000000002670000-0x0000000002682000-memory.dmp
        Filesize

        72KB

      • memory/5084-163-0x0000000002670000-0x0000000002682000-memory.dmp
        Filesize

        72KB

      • memory/5084-161-0x0000000002670000-0x0000000002682000-memory.dmp
        Filesize

        72KB

      • memory/5084-159-0x0000000002670000-0x0000000002682000-memory.dmp
        Filesize

        72KB

      • memory/5084-157-0x0000000002670000-0x0000000002682000-memory.dmp
        Filesize

        72KB

      • memory/5084-149-0x0000000004D70000-0x0000000005314000-memory.dmp
        Filesize

        5.6MB

      • memory/5084-173-0x0000000002670000-0x0000000002682000-memory.dmp
        Filesize

        72KB

      • memory/5084-185-0x0000000000400000-0x00000000004A9000-memory.dmp
        Filesize

        676KB

      • memory/5084-151-0x0000000002670000-0x0000000002682000-memory.dmp
        Filesize

        72KB