Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 19:28

General

  • Target

    205342165f8addd1413e823279899bc589f4e2d25428baeb3594d98ad76b7fe1.exe

  • Size

    663KB

  • MD5

    3d02776e430b3f6fa19295b8ea427e25

  • SHA1

    64a5d6350b2b169ea603adaabf9a473c0207e231

  • SHA256

    205342165f8addd1413e823279899bc589f4e2d25428baeb3594d98ad76b7fe1

  • SHA512

    1fc2c8a58e0a543a647d909f963fa3f944a055ee7ec0e6abc142a2f9b6902bbe3e5a967f3f9a033a361d2c17bbdbe9a811790b58c99c5fc2be16b4b076e24396

  • SSDEEP

    12288:rMrey90FaYlEJpUA0KxJfe6tldjdECoS0/Lh8iAPbxv44EzWKJKaHEPDQKu:JyalYuKFegHjdKSOVKTxw4tKJKILn

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\205342165f8addd1413e823279899bc589f4e2d25428baeb3594d98ad76b7fe1.exe
    "C:\Users\Admin\AppData\Local\Temp\205342165f8addd1413e823279899bc589f4e2d25428baeb3594d98ad76b7fe1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3592
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un556556.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un556556.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2180
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5366.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5366.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2684
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2684 -s 1088
          4⤵
          • Program crash
          PID:1012
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7159.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7159.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4400
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4400 -s 1348
          4⤵
          • Program crash
          PID:3304
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si921735.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si921735.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1208
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2684 -ip 2684
    1⤵
      PID:3820
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 500 -p 4400 -ip 4400
      1⤵
        PID:4092

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si921735.exe
        Filesize

        175KB

        MD5

        2f95f1c0d3405f1c16f024f7386cb6d7

        SHA1

        e48355844a91c5d1f9092672b9a77c07d2b94b6d

        SHA256

        a1b02052f04e6e5e1c7f9f35593d66cd01006c0f613b37222b55e4e7d60e79cf

        SHA512

        74800b9def2e5c2ff153dc544b64ca9c9913a9c9b275f8006503ac8ea5f0fa1d0a8e604768d14e9113054ffe33c492ec47e15b34a628208738a3ac3c8cb514c1

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si921735.exe
        Filesize

        175KB

        MD5

        2f95f1c0d3405f1c16f024f7386cb6d7

        SHA1

        e48355844a91c5d1f9092672b9a77c07d2b94b6d

        SHA256

        a1b02052f04e6e5e1c7f9f35593d66cd01006c0f613b37222b55e4e7d60e79cf

        SHA512

        74800b9def2e5c2ff153dc544b64ca9c9913a9c9b275f8006503ac8ea5f0fa1d0a8e604768d14e9113054ffe33c492ec47e15b34a628208738a3ac3c8cb514c1

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un556556.exe
        Filesize

        521KB

        MD5

        9730e6172b06801667b7d91c100494c9

        SHA1

        9d5adee03e0960f9498175bbb3eac5c45e8c0ac3

        SHA256

        eff3e2d4cbaaa2850a4236930720ef5533ae5a5672f894f32952b0185a4375f4

        SHA512

        813634d2fa746ad0df7ff91cadb107f1ab509794fbe7e5f4119fc654874a1f3e4d7af57e19420ee7668191b6687f213e5aaad31f0e9ef83cb8f52f547b08f048

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un556556.exe
        Filesize

        521KB

        MD5

        9730e6172b06801667b7d91c100494c9

        SHA1

        9d5adee03e0960f9498175bbb3eac5c45e8c0ac3

        SHA256

        eff3e2d4cbaaa2850a4236930720ef5533ae5a5672f894f32952b0185a4375f4

        SHA512

        813634d2fa746ad0df7ff91cadb107f1ab509794fbe7e5f4119fc654874a1f3e4d7af57e19420ee7668191b6687f213e5aaad31f0e9ef83cb8f52f547b08f048

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5366.exe
        Filesize

        236KB

        MD5

        f8b52dd13e5fac2b66b27e82656fbe42

        SHA1

        9dc7970327ce12d890a4fb1c7e9bcfe2c1c03e4d

        SHA256

        29171e6e7ec3784e269ae12486d45e2d20afea7c6c8540e116277740cd2b1e03

        SHA512

        a24863d3bb231bc97aaa7beb0c2c2541fb9b0e352a7aa41337ae7a2ded57bcc1bcdcbb6ef15d7b2b5ca306a0760c1c553ce792d1481d677d6b2590a4e38bf101

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5366.exe
        Filesize

        236KB

        MD5

        f8b52dd13e5fac2b66b27e82656fbe42

        SHA1

        9dc7970327ce12d890a4fb1c7e9bcfe2c1c03e4d

        SHA256

        29171e6e7ec3784e269ae12486d45e2d20afea7c6c8540e116277740cd2b1e03

        SHA512

        a24863d3bb231bc97aaa7beb0c2c2541fb9b0e352a7aa41337ae7a2ded57bcc1bcdcbb6ef15d7b2b5ca306a0760c1c553ce792d1481d677d6b2590a4e38bf101

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7159.exe
        Filesize

        294KB

        MD5

        cdfa29f671dba18b6a4c24a35b2b3381

        SHA1

        7f3bc1fae773382e18da84fea65a5fa2a5886a48

        SHA256

        98dd94b8e36439f13e9a62252d6426f5dbbb9d8d245eb1c33e4247aaa4702c2e

        SHA512

        eb03a7907e8d8f0ebd2d9e5e56b824a79c1af8ddc720236b90aeed75741cff629aac77beb52477e65b3f4cd9f7cb289749f32507a944e1a0f64a2bf47caca9c7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7159.exe
        Filesize

        294KB

        MD5

        cdfa29f671dba18b6a4c24a35b2b3381

        SHA1

        7f3bc1fae773382e18da84fea65a5fa2a5886a48

        SHA256

        98dd94b8e36439f13e9a62252d6426f5dbbb9d8d245eb1c33e4247aaa4702c2e

        SHA512

        eb03a7907e8d8f0ebd2d9e5e56b824a79c1af8ddc720236b90aeed75741cff629aac77beb52477e65b3f4cd9f7cb289749f32507a944e1a0f64a2bf47caca9c7

      • memory/1208-1120-0x0000000000940000-0x0000000000972000-memory.dmp
        Filesize

        200KB

      • memory/1208-1121-0x0000000005250000-0x0000000005260000-memory.dmp
        Filesize

        64KB

      • memory/2684-156-0x0000000004A10000-0x0000000004A22000-memory.dmp
        Filesize

        72KB

      • memory/2684-166-0x0000000004A10000-0x0000000004A22000-memory.dmp
        Filesize

        72KB

      • memory/2684-151-0x0000000004BA0000-0x0000000004BB0000-memory.dmp
        Filesize

        64KB

      • memory/2684-152-0x0000000004BA0000-0x0000000004BB0000-memory.dmp
        Filesize

        64KB

      • memory/2684-153-0x0000000004A10000-0x0000000004A22000-memory.dmp
        Filesize

        72KB

      • memory/2684-154-0x0000000004A10000-0x0000000004A22000-memory.dmp
        Filesize

        72KB

      • memory/2684-149-0x0000000002100000-0x000000000212D000-memory.dmp
        Filesize

        180KB

      • memory/2684-158-0x0000000004A10000-0x0000000004A22000-memory.dmp
        Filesize

        72KB

      • memory/2684-160-0x0000000004A10000-0x0000000004A22000-memory.dmp
        Filesize

        72KB

      • memory/2684-162-0x0000000004A10000-0x0000000004A22000-memory.dmp
        Filesize

        72KB

      • memory/2684-164-0x0000000004A10000-0x0000000004A22000-memory.dmp
        Filesize

        72KB

      • memory/2684-150-0x0000000004BA0000-0x0000000004BB0000-memory.dmp
        Filesize

        64KB

      • memory/2684-168-0x0000000004A10000-0x0000000004A22000-memory.dmp
        Filesize

        72KB

      • memory/2684-170-0x0000000004A10000-0x0000000004A22000-memory.dmp
        Filesize

        72KB

      • memory/2684-172-0x0000000004A10000-0x0000000004A22000-memory.dmp
        Filesize

        72KB

      • memory/2684-174-0x0000000004A10000-0x0000000004A22000-memory.dmp
        Filesize

        72KB

      • memory/2684-176-0x0000000004A10000-0x0000000004A22000-memory.dmp
        Filesize

        72KB

      • memory/2684-178-0x0000000004A10000-0x0000000004A22000-memory.dmp
        Filesize

        72KB

      • memory/2684-180-0x0000000004A10000-0x0000000004A22000-memory.dmp
        Filesize

        72KB

      • memory/2684-181-0x0000000000400000-0x00000000004A9000-memory.dmp
        Filesize

        676KB

      • memory/2684-182-0x0000000004BA0000-0x0000000004BB0000-memory.dmp
        Filesize

        64KB

      • memory/2684-183-0x0000000004BA0000-0x0000000004BB0000-memory.dmp
        Filesize

        64KB

      • memory/2684-185-0x0000000000400000-0x00000000004A9000-memory.dmp
        Filesize

        676KB

      • memory/2684-148-0x0000000004BB0000-0x0000000005154000-memory.dmp
        Filesize

        5.6MB

      • memory/4400-191-0x0000000004BC0000-0x0000000004BD0000-memory.dmp
        Filesize

        64KB

      • memory/4400-222-0x0000000002590000-0x00000000025CF000-memory.dmp
        Filesize

        252KB

      • memory/4400-194-0x0000000002590000-0x00000000025CF000-memory.dmp
        Filesize

        252KB

      • memory/4400-196-0x0000000002590000-0x00000000025CF000-memory.dmp
        Filesize

        252KB

      • memory/4400-193-0x0000000002590000-0x00000000025CF000-memory.dmp
        Filesize

        252KB

      • memory/4400-198-0x0000000002590000-0x00000000025CF000-memory.dmp
        Filesize

        252KB

      • memory/4400-200-0x0000000002590000-0x00000000025CF000-memory.dmp
        Filesize

        252KB

      • memory/4400-202-0x0000000002590000-0x00000000025CF000-memory.dmp
        Filesize

        252KB

      • memory/4400-204-0x0000000002590000-0x00000000025CF000-memory.dmp
        Filesize

        252KB

      • memory/4400-206-0x0000000002590000-0x00000000025CF000-memory.dmp
        Filesize

        252KB

      • memory/4400-208-0x0000000002590000-0x00000000025CF000-memory.dmp
        Filesize

        252KB

      • memory/4400-210-0x0000000002590000-0x00000000025CF000-memory.dmp
        Filesize

        252KB

      • memory/4400-212-0x0000000002590000-0x00000000025CF000-memory.dmp
        Filesize

        252KB

      • memory/4400-214-0x0000000002590000-0x00000000025CF000-memory.dmp
        Filesize

        252KB

      • memory/4400-216-0x0000000002590000-0x00000000025CF000-memory.dmp
        Filesize

        252KB

      • memory/4400-218-0x0000000002590000-0x00000000025CF000-memory.dmp
        Filesize

        252KB

      • memory/4400-220-0x0000000002590000-0x00000000025CF000-memory.dmp
        Filesize

        252KB

      • memory/4400-192-0x0000000004BC0000-0x0000000004BD0000-memory.dmp
        Filesize

        64KB

      • memory/4400-224-0x0000000002590000-0x00000000025CF000-memory.dmp
        Filesize

        252KB

      • memory/4400-226-0x0000000002590000-0x00000000025CF000-memory.dmp
        Filesize

        252KB

      • memory/4400-1099-0x0000000005280000-0x0000000005898000-memory.dmp
        Filesize

        6.1MB

      • memory/4400-1100-0x00000000058A0000-0x00000000059AA000-memory.dmp
        Filesize

        1.0MB

      • memory/4400-1101-0x00000000059E0000-0x00000000059F2000-memory.dmp
        Filesize

        72KB

      • memory/4400-1102-0x0000000005A00000-0x0000000005A3C000-memory.dmp
        Filesize

        240KB

      • memory/4400-1103-0x0000000004BC0000-0x0000000004BD0000-memory.dmp
        Filesize

        64KB

      • memory/4400-1104-0x0000000005CF0000-0x0000000005D82000-memory.dmp
        Filesize

        584KB

      • memory/4400-1105-0x0000000005D90000-0x0000000005DF6000-memory.dmp
        Filesize

        408KB

      • memory/4400-1106-0x0000000006490000-0x0000000006506000-memory.dmp
        Filesize

        472KB

      • memory/4400-1107-0x0000000006520000-0x0000000006570000-memory.dmp
        Filesize

        320KB

      • memory/4400-1108-0x0000000006690000-0x0000000006852000-memory.dmp
        Filesize

        1.8MB

      • memory/4400-1110-0x0000000004BC0000-0x0000000004BD0000-memory.dmp
        Filesize

        64KB

      • memory/4400-1112-0x0000000004BC0000-0x0000000004BD0000-memory.dmp
        Filesize

        64KB

      • memory/4400-190-0x0000000000640000-0x000000000068B000-memory.dmp
        Filesize

        300KB

      • memory/4400-1111-0x0000000004BC0000-0x0000000004BD0000-memory.dmp
        Filesize

        64KB

      • memory/4400-1113-0x0000000006870000-0x0000000006D9C000-memory.dmp
        Filesize

        5.2MB

      • memory/4400-1114-0x0000000004BC0000-0x0000000004BD0000-memory.dmp
        Filesize

        64KB