Analysis

  • max time kernel
    111s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 18:39

General

  • Target

    16425dfabf3fcd242ab3893e88b60ed1a0e52afa59039bc287a227038a20783c.exe

  • Size

    521KB

  • MD5

    da6fa8e6f0af1d49338691fc04bb2c89

  • SHA1

    9e0d1177a25650fcb1686f141af5cebcacc2f55b

  • SHA256

    16425dfabf3fcd242ab3893e88b60ed1a0e52afa59039bc287a227038a20783c

  • SHA512

    b4625680a50ca17c1929fcca33c63ac032bd0d995357ef42ab3f3fd4f4bf0ab3726206a0e5e8316b498c88d3ec935f6f1eb4c81fad82668f80b718ee11a88f16

  • SSDEEP

    12288:3Mrmy90MMN0qf/WOub++l6qEeuwvqyZGO:Fy7fOufsqvvqXO

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16425dfabf3fcd242ab3893e88b60ed1a0e52afa59039bc287a227038a20783c.exe
    "C:\Users\Admin\AppData\Local\Temp\16425dfabf3fcd242ab3893e88b60ed1a0e52afa59039bc287a227038a20783c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicO6339.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicO6339.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2556
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr868217.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr868217.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2092
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku607020.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku607020.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:216
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 216 -s 1356
          4⤵
          • Program crash
          PID:564
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr163400.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr163400.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3940
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 216 -ip 216
    1⤵
      PID:4740

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr163400.exe
      Filesize

      175KB

      MD5

      be8df8ae835624cfe4922352f7719058

      SHA1

      92be69c54956200d41f9e97c69952463d826744a

      SHA256

      6b5bbef61a2369448a918979428c77695c567df4dde01aa4bcbcf59d554bc69b

      SHA512

      d308fae0bee81544dac0639aa54e15ce7f80b04afae6b13b44e6685dda80a06db57687139f245331115aa3bf77389e6fa9d122d8e707c3ddef999c24f7e0b6e3

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr163400.exe
      Filesize

      175KB

      MD5

      be8df8ae835624cfe4922352f7719058

      SHA1

      92be69c54956200d41f9e97c69952463d826744a

      SHA256

      6b5bbef61a2369448a918979428c77695c567df4dde01aa4bcbcf59d554bc69b

      SHA512

      d308fae0bee81544dac0639aa54e15ce7f80b04afae6b13b44e6685dda80a06db57687139f245331115aa3bf77389e6fa9d122d8e707c3ddef999c24f7e0b6e3

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicO6339.exe
      Filesize

      379KB

      MD5

      5b3469abf1fad7bd71363b0459fbe1a8

      SHA1

      89dc3368e1a5aef35c96412ebd553e41eb171568

      SHA256

      11a808df8a1bd4cc1b1252a073af27d023b908830f520be6a824f34c9275dc92

      SHA512

      f7c6ec4700ad7135dbddbff7e9d27ff058b8f1717cf657af1893cbb7592992fc25627445dca8d087e192411ce731a77b5a77d47405eea43e762fe76a2bc08153

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicO6339.exe
      Filesize

      379KB

      MD5

      5b3469abf1fad7bd71363b0459fbe1a8

      SHA1

      89dc3368e1a5aef35c96412ebd553e41eb171568

      SHA256

      11a808df8a1bd4cc1b1252a073af27d023b908830f520be6a824f34c9275dc92

      SHA512

      f7c6ec4700ad7135dbddbff7e9d27ff058b8f1717cf657af1893cbb7592992fc25627445dca8d087e192411ce731a77b5a77d47405eea43e762fe76a2bc08153

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr868217.exe
      Filesize

      11KB

      MD5

      507dff040363b66657f55c074b36277e

      SHA1

      b40dc9787fa97b477674215470cf30c224ee7672

      SHA256

      861e17355a173a6f65d42724e7941312693fc227f41814106e4c8b78320fff58

      SHA512

      c5cb2983ec79a1103faab75e1cd8823d034b0f4b2819ff4c7e638e7951ba9d1462837eb6a709175fae766bc95a63e00d631344b7fe69f34fafdcd1ff95698f32

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr868217.exe
      Filesize

      11KB

      MD5

      507dff040363b66657f55c074b36277e

      SHA1

      b40dc9787fa97b477674215470cf30c224ee7672

      SHA256

      861e17355a173a6f65d42724e7941312693fc227f41814106e4c8b78320fff58

      SHA512

      c5cb2983ec79a1103faab75e1cd8823d034b0f4b2819ff4c7e638e7951ba9d1462837eb6a709175fae766bc95a63e00d631344b7fe69f34fafdcd1ff95698f32

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku607020.exe
      Filesize

      294KB

      MD5

      f256963c6860115e7dcb1e46a92375dc

      SHA1

      b3a84b9da97367790a2c52ef70854a0229c9f627

      SHA256

      472b26d39e8662b8f446a9d24fe5ba6e74180afe853d3b690f62bd499c703cca

      SHA512

      31ed51846bf0ccac9d9c5a243d5bee1483b2d11e46d25f14f7f3aa62802a16e1ffda8e03aadc5d2570d7076f4f38a85d7d15833e5409226afeca5168ed014a7f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku607020.exe
      Filesize

      294KB

      MD5

      f256963c6860115e7dcb1e46a92375dc

      SHA1

      b3a84b9da97367790a2c52ef70854a0229c9f627

      SHA256

      472b26d39e8662b8f446a9d24fe5ba6e74180afe853d3b690f62bd499c703cca

      SHA512

      31ed51846bf0ccac9d9c5a243d5bee1483b2d11e46d25f14f7f3aa62802a16e1ffda8e03aadc5d2570d7076f4f38a85d7d15833e5409226afeca5168ed014a7f

    • memory/216-154-0x0000000002720000-0x0000000002730000-memory.dmp
      Filesize

      64KB

    • memory/216-153-0x0000000002150000-0x000000000219B000-memory.dmp
      Filesize

      300KB

    • memory/216-155-0x0000000004A80000-0x0000000005024000-memory.dmp
      Filesize

      5.6MB

    • memory/216-156-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-159-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-157-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-163-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-161-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-165-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-167-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-169-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-171-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-173-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-175-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-177-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-179-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-181-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-183-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-185-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-187-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-189-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-191-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-193-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-196-0x0000000002720000-0x0000000002730000-memory.dmp
      Filesize

      64KB

    • memory/216-198-0x0000000002720000-0x0000000002730000-memory.dmp
      Filesize

      64KB

    • memory/216-195-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-199-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-201-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-203-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-205-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-207-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-209-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-211-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-213-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-215-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-217-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-219-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-221-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/216-1064-0x00000000050C0000-0x00000000056D8000-memory.dmp
      Filesize

      6.1MB

    • memory/216-1065-0x0000000005760000-0x000000000586A000-memory.dmp
      Filesize

      1.0MB

    • memory/216-1066-0x00000000058A0000-0x00000000058B2000-memory.dmp
      Filesize

      72KB

    • memory/216-1067-0x00000000058C0000-0x00000000058FC000-memory.dmp
      Filesize

      240KB

    • memory/216-1068-0x0000000002720000-0x0000000002730000-memory.dmp
      Filesize

      64KB

    • memory/216-1069-0x0000000005BB0000-0x0000000005C42000-memory.dmp
      Filesize

      584KB

    • memory/216-1070-0x0000000005C50000-0x0000000005CB6000-memory.dmp
      Filesize

      408KB

    • memory/216-1072-0x0000000002720000-0x0000000002730000-memory.dmp
      Filesize

      64KB

    • memory/216-1073-0x0000000002720000-0x0000000002730000-memory.dmp
      Filesize

      64KB

    • memory/216-1074-0x0000000002720000-0x0000000002730000-memory.dmp
      Filesize

      64KB

    • memory/216-1075-0x00000000065B0000-0x0000000006626000-memory.dmp
      Filesize

      472KB

    • memory/216-1076-0x0000000006640000-0x0000000006690000-memory.dmp
      Filesize

      320KB

    • memory/216-1077-0x00000000066B0000-0x0000000006872000-memory.dmp
      Filesize

      1.8MB

    • memory/216-1078-0x0000000002720000-0x0000000002730000-memory.dmp
      Filesize

      64KB

    • memory/216-1079-0x0000000006880000-0x0000000006DAC000-memory.dmp
      Filesize

      5.2MB

    • memory/2092-147-0x0000000000280000-0x000000000028A000-memory.dmp
      Filesize

      40KB

    • memory/3940-1085-0x0000000000C60000-0x0000000000C92000-memory.dmp
      Filesize

      200KB

    • memory/3940-1086-0x00000000058D0000-0x00000000058E0000-memory.dmp
      Filesize

      64KB