Analysis

  • max time kernel
    96s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 19:30

General

  • Target

    e628a6ea92119eb3564f5cdcafeba070331ae5509b6fc534207ee6341f95c901.exe

  • Size

    522KB

  • MD5

    01dc49dd13f3d6f575794972d0a03f65

  • SHA1

    cba7c2b575766c5320a1c2bbf155c4dbc0ea3384

  • SHA256

    e628a6ea92119eb3564f5cdcafeba070331ae5509b6fc534207ee6341f95c901

  • SHA512

    d97b8b0ae3f2b086ea5bb6b8411e417964c7b84ea987213ffea229505641cf892b5de281f2475c9ac99765cb9d3e65f61581f1c38aea6e1cd15881bd92f85cde

  • SSDEEP

    12288:PMrZy903EO/AGuxUHYoksH8av42XzWKH2uv+TH9:SyKEOvaaw2SKG79

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e628a6ea92119eb3564f5cdcafeba070331ae5509b6fc534207ee6341f95c901.exe
    "C:\Users\Admin\AppData\Local\Temp\e628a6ea92119eb3564f5cdcafeba070331ae5509b6fc534207ee6341f95c901.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3100
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisU5521.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisU5521.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1792
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr747600.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr747600.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku314540.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku314540.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2112
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 1800
          4⤵
          • Program crash
          PID:1328
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr555743.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr555743.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4736
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 2112 -ip 2112
    1⤵
      PID:3712

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr555743.exe

      Filesize

      175KB

      MD5

      efbf7da03d06329828ccf65bdc4489cd

      SHA1

      17efa0a4b0a5c6afffd49b87f7c15c4490d842d4

      SHA256

      495eb3a655bef6f503be029e0348050d9dddff1f03adcfda54f0a10b3379df0d

      SHA512

      98509d9432fe4cb8c5bf93f667ba54b95a3e6d31a8f756f2f5c7a92232a5fc9367d411686bc8b662e12431fecda47defc61031b3bfcf3947a60cf105c59cce4d

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr555743.exe

      Filesize

      175KB

      MD5

      efbf7da03d06329828ccf65bdc4489cd

      SHA1

      17efa0a4b0a5c6afffd49b87f7c15c4490d842d4

      SHA256

      495eb3a655bef6f503be029e0348050d9dddff1f03adcfda54f0a10b3379df0d

      SHA512

      98509d9432fe4cb8c5bf93f667ba54b95a3e6d31a8f756f2f5c7a92232a5fc9367d411686bc8b662e12431fecda47defc61031b3bfcf3947a60cf105c59cce4d

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisU5521.exe

      Filesize

      380KB

      MD5

      eddea4559a30764c1b41016aa197ff87

      SHA1

      2d1de509c3c5b8a1e4fca8b9b5ddc4b3aa2c330e

      SHA256

      80a6612177ceb4340f4406601f1777b0a0895e6f6786db5453f7e5ed1a66f446

      SHA512

      c184b38ed7ca50514ba9143e856842397e63109e8092d2220af2dbc42dcb427f50d4ef525cb0b03cd6d33039c465108d975ff74def9f4fac2e1bb1949c9d9ccd

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zisU5521.exe

      Filesize

      380KB

      MD5

      eddea4559a30764c1b41016aa197ff87

      SHA1

      2d1de509c3c5b8a1e4fca8b9b5ddc4b3aa2c330e

      SHA256

      80a6612177ceb4340f4406601f1777b0a0895e6f6786db5453f7e5ed1a66f446

      SHA512

      c184b38ed7ca50514ba9143e856842397e63109e8092d2220af2dbc42dcb427f50d4ef525cb0b03cd6d33039c465108d975ff74def9f4fac2e1bb1949c9d9ccd

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr747600.exe

      Filesize

      11KB

      MD5

      d4d85643b7fac92d62acadf7b6f62310

      SHA1

      49f17fec10ce02b6f26635e1366661e5d92cdf4e

      SHA256

      bb9ded5e3e79f1ba1c44e9f7f2a802a0fbad93c867b83aaae439578efd65ece1

      SHA512

      364b640f8221fde7ab0865053406d468893b017f3ca5af54d2d9b08c4fecae5f9d1c53a9117baa392b02079727a30b3c251c41026d970198a918dc3c45c98f4f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr747600.exe

      Filesize

      11KB

      MD5

      d4d85643b7fac92d62acadf7b6f62310

      SHA1

      49f17fec10ce02b6f26635e1366661e5d92cdf4e

      SHA256

      bb9ded5e3e79f1ba1c44e9f7f2a802a0fbad93c867b83aaae439578efd65ece1

      SHA512

      364b640f8221fde7ab0865053406d468893b017f3ca5af54d2d9b08c4fecae5f9d1c53a9117baa392b02079727a30b3c251c41026d970198a918dc3c45c98f4f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku314540.exe

      Filesize

      294KB

      MD5

      d3e7b49b3e084595f11b08bad4ab8542

      SHA1

      b349ecc1261a1fada04e9a2994e69dafd3cb113e

      SHA256

      e000219006d35e56cf56f8d1576f2e11e817b96b946be114966fd30eacdb0d34

      SHA512

      f49ba6c452cc6f7fcfa6a518510df7e619f8c3007bbd852fdf2294bb3652c1f7b0b3171c5c37c9013b8dfbdb932c27c800c097dc9e6390b88fd9102b8a35320e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku314540.exe

      Filesize

      294KB

      MD5

      d3e7b49b3e084595f11b08bad4ab8542

      SHA1

      b349ecc1261a1fada04e9a2994e69dafd3cb113e

      SHA256

      e000219006d35e56cf56f8d1576f2e11e817b96b946be114966fd30eacdb0d34

      SHA512

      f49ba6c452cc6f7fcfa6a518510df7e619f8c3007bbd852fdf2294bb3652c1f7b0b3171c5c37c9013b8dfbdb932c27c800c097dc9e6390b88fd9102b8a35320e

    • memory/2112-153-0x0000000002120000-0x000000000216B000-memory.dmp

      Filesize

      300KB

    • memory/2112-154-0x0000000004C80000-0x0000000005224000-memory.dmp

      Filesize

      5.6MB

    • memory/2112-155-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-156-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-158-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-160-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-162-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-164-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-166-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-168-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-170-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-172-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-173-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/2112-175-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/2112-176-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/2112-179-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-177-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-181-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-183-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-185-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-187-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-189-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-191-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-195-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-193-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-197-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-199-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-201-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-203-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-205-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-207-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-209-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-211-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-213-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-215-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-217-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-219-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-221-0x0000000004BA0000-0x0000000004BDF000-memory.dmp

      Filesize

      252KB

    • memory/2112-1064-0x0000000005230000-0x0000000005848000-memory.dmp

      Filesize

      6.1MB

    • memory/2112-1065-0x00000000058A0000-0x00000000059AA000-memory.dmp

      Filesize

      1.0MB

    • memory/2112-1066-0x00000000059E0000-0x00000000059F2000-memory.dmp

      Filesize

      72KB

    • memory/2112-1067-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/2112-1068-0x0000000005A00000-0x0000000005A3C000-memory.dmp

      Filesize

      240KB

    • memory/2112-1070-0x0000000005CF0000-0x0000000005D56000-memory.dmp

      Filesize

      408KB

    • memory/2112-1071-0x00000000063B0000-0x0000000006442000-memory.dmp

      Filesize

      584KB

    • memory/2112-1072-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/2112-1074-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/2112-1073-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/2112-1075-0x00000000065B0000-0x0000000006626000-memory.dmp

      Filesize

      472KB

    • memory/2112-1076-0x0000000006640000-0x0000000006690000-memory.dmp

      Filesize

      320KB

    • memory/2112-1077-0x00000000066A0000-0x0000000006862000-memory.dmp

      Filesize

      1.8MB

    • memory/2112-1078-0x0000000006870000-0x0000000006D9C000-memory.dmp

      Filesize

      5.2MB

    • memory/2112-1079-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/2116-147-0x00000000009A0000-0x00000000009AA000-memory.dmp

      Filesize

      40KB

    • memory/4736-1085-0x0000000000DF0000-0x0000000000E22000-memory.dmp

      Filesize

      200KB

    • memory/4736-1086-0x0000000005970000-0x0000000005980000-memory.dmp

      Filesize

      64KB