Analysis

  • max time kernel
    142s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 18:41

General

  • Target

    a556e430f104006c6b4b9ef4f0b775bbbf9d67f407a6a2c67cc8bffeaffe4dc5.exe

  • Size

    659KB

  • MD5

    374819e5e27853be4d0bcf5e64ae4985

  • SHA1

    42ed1c9572d4b9107c40e5899c714dd0136d5d90

  • SHA256

    a556e430f104006c6b4b9ef4f0b775bbbf9d67f407a6a2c67cc8bffeaffe4dc5

  • SHA512

    112c9b1b014a5aa811e844f9b0099b7eb382ca4ebb180cbe89873b7792166a779e33ebd24063f650f14d8a916c0af57a29f786728d25c3c00e8b73bacaba62cd

  • SSDEEP

    12288:RMr7y90ct44qLt86FkIUwP3GJ4ZSdiqvtE6ehu:2yBtbqL/FkInP2RdiOTehu

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a556e430f104006c6b4b9ef4f0b775bbbf9d67f407a6a2c67cc8bffeaffe4dc5.exe
    "C:\Users\Admin\AppData\Local\Temp\a556e430f104006c6b4b9ef4f0b775bbbf9d67f407a6a2c67cc8bffeaffe4dc5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1912
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un362651.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un362651.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1034.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1034.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:508
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1034.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1034.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3992
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8684.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8684.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1820
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 1332
          4⤵
          • Program crash
          PID:1092
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si793783.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si793783.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2456
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1820 -ip 1820
    1⤵
      PID:3804
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe start wuauserv
      1⤵
      • Launches sc.exe
      PID:4156

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si793783.exe
      Filesize

      175KB

      MD5

      e99b0bf9385aa456481e8c6662c9c85a

      SHA1

      c87ad7b6526cffeaee5a94b7cde9ed115eb0dd10

      SHA256

      6cac2d7f16969148e1204208ee5fa4e878f98ae484828c9ad71b944fa6fc37db

      SHA512

      28554ee316ea219aea4e8f3f37a0d19507cb8d0a2e940f70cf743ae5bafd69899ee421e3803beb0683138545533c0a63442584f0cef8e6f6aa294021ad6c6221

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si793783.exe
      Filesize

      175KB

      MD5

      e99b0bf9385aa456481e8c6662c9c85a

      SHA1

      c87ad7b6526cffeaee5a94b7cde9ed115eb0dd10

      SHA256

      6cac2d7f16969148e1204208ee5fa4e878f98ae484828c9ad71b944fa6fc37db

      SHA512

      28554ee316ea219aea4e8f3f37a0d19507cb8d0a2e940f70cf743ae5bafd69899ee421e3803beb0683138545533c0a63442584f0cef8e6f6aa294021ad6c6221

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un362651.exe
      Filesize

      517KB

      MD5

      c8bf20ff5426b4fb3dc90dac7987a7d2

      SHA1

      0465ef57550ffd8f7dc239af723d402bd1b8b027

      SHA256

      842670f754e47dc89a6bb03b90e1ec2042547791b4bf2c70fcc118ac88a82694

      SHA512

      872d69f08bebb80bec820b8a960f10dc4f76aaf49028b32d9efbaf2be15e9e5382374ed18561868e91578092988fdb37baafb72e7fb33953c50c4aae41d33f2b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un362651.exe
      Filesize

      517KB

      MD5

      c8bf20ff5426b4fb3dc90dac7987a7d2

      SHA1

      0465ef57550ffd8f7dc239af723d402bd1b8b027

      SHA256

      842670f754e47dc89a6bb03b90e1ec2042547791b4bf2c70fcc118ac88a82694

      SHA512

      872d69f08bebb80bec820b8a960f10dc4f76aaf49028b32d9efbaf2be15e9e5382374ed18561868e91578092988fdb37baafb72e7fb33953c50c4aae41d33f2b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1034.exe
      Filesize

      237KB

      MD5

      163492bbf07168cf55b0a8306e558ba5

      SHA1

      aafb940b7b6f5c9429e818db6a623205e333242c

      SHA256

      70a18e0451767b282efcadb14e5c74bea1abcbc3862c494f5c21272865732a4c

      SHA512

      281beb1a102292684b0565c0d97affacc828f22195424cd4345f1cc591413dd856f4074643d7eab0f3d2d65e70322de054677c547f0dda316fc881d2904ed93b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1034.exe
      Filesize

      237KB

      MD5

      163492bbf07168cf55b0a8306e558ba5

      SHA1

      aafb940b7b6f5c9429e818db6a623205e333242c

      SHA256

      70a18e0451767b282efcadb14e5c74bea1abcbc3862c494f5c21272865732a4c

      SHA512

      281beb1a102292684b0565c0d97affacc828f22195424cd4345f1cc591413dd856f4074643d7eab0f3d2d65e70322de054677c547f0dda316fc881d2904ed93b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1034.exe
      Filesize

      237KB

      MD5

      163492bbf07168cf55b0a8306e558ba5

      SHA1

      aafb940b7b6f5c9429e818db6a623205e333242c

      SHA256

      70a18e0451767b282efcadb14e5c74bea1abcbc3862c494f5c21272865732a4c

      SHA512

      281beb1a102292684b0565c0d97affacc828f22195424cd4345f1cc591413dd856f4074643d7eab0f3d2d65e70322de054677c547f0dda316fc881d2904ed93b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8684.exe
      Filesize

      294KB

      MD5

      004b1a7b0504f0881ca5722e670e2009

      SHA1

      f46235e7ed37ba18928de458bc398ec8a58ba93e

      SHA256

      6c04eab97b0fbf03c3ce4f33c488f48f9eaa490cce2dbb1e2d1385ad55321669

      SHA512

      2270ec987cf422b53f77e128499cd96743e2bc83af2708484a4fde334c57bccfe8b772815e773ca9755b4f3edf886c0e0a72c84b29027a55d1d1956a375bbae8

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8684.exe
      Filesize

      294KB

      MD5

      004b1a7b0504f0881ca5722e670e2009

      SHA1

      f46235e7ed37ba18928de458bc398ec8a58ba93e

      SHA256

      6c04eab97b0fbf03c3ce4f33c488f48f9eaa490cce2dbb1e2d1385ad55321669

      SHA512

      2270ec987cf422b53f77e128499cd96743e2bc83af2708484a4fde334c57bccfe8b772815e773ca9755b4f3edf886c0e0a72c84b29027a55d1d1956a375bbae8

    • memory/508-151-0x0000000002100000-0x000000000212E000-memory.dmp
      Filesize

      184KB

    • memory/1820-1103-0x00000000058A0000-0x00000000058B2000-memory.dmp
      Filesize

      72KB

    • memory/1820-208-0x0000000000620000-0x000000000066B000-memory.dmp
      Filesize

      300KB

    • memory/1820-1124-0x00000000026A0000-0x00000000026B0000-memory.dmp
      Filesize

      64KB

    • memory/1820-1123-0x0000000006630000-0x0000000006B5C000-memory.dmp
      Filesize

      5.2MB

    • memory/1820-1122-0x0000000006450000-0x0000000006612000-memory.dmp
      Filesize

      1.8MB

    • memory/1820-1121-0x00000000026A0000-0x00000000026B0000-memory.dmp
      Filesize

      64KB

    • memory/1820-1120-0x00000000026A0000-0x00000000026B0000-memory.dmp
      Filesize

      64KB

    • memory/1820-1119-0x00000000026A0000-0x00000000026B0000-memory.dmp
      Filesize

      64KB

    • memory/1820-1114-0x00000000063E0000-0x0000000006430000-memory.dmp
      Filesize

      320KB

    • memory/1820-1113-0x0000000006350000-0x00000000063C6000-memory.dmp
      Filesize

      472KB

    • memory/1820-1112-0x0000000006260000-0x00000000062F2000-memory.dmp
      Filesize

      584KB

    • memory/1820-173-0x00000000050C0000-0x00000000050FF000-memory.dmp
      Filesize

      252KB

    • memory/1820-175-0x00000000050C0000-0x00000000050FF000-memory.dmp
      Filesize

      252KB

    • memory/1820-1109-0x0000000005BB0000-0x0000000005C16000-memory.dmp
      Filesize

      408KB

    • memory/1820-179-0x00000000050C0000-0x00000000050FF000-memory.dmp
      Filesize

      252KB

    • memory/1820-1105-0x00000000026A0000-0x00000000026B0000-memory.dmp
      Filesize

      64KB

    • memory/1820-182-0x00000000050C0000-0x00000000050FF000-memory.dmp
      Filesize

      252KB

    • memory/1820-1104-0x00000000058C0000-0x00000000058FC000-memory.dmp
      Filesize

      240KB

    • memory/1820-186-0x00000000050C0000-0x00000000050FF000-memory.dmp
      Filesize

      252KB

    • memory/1820-1102-0x0000000005760000-0x000000000586A000-memory.dmp
      Filesize

      1.0MB

    • memory/1820-190-0x00000000050C0000-0x00000000050FF000-memory.dmp
      Filesize

      252KB

    • memory/1820-1101-0x0000000005100000-0x0000000005718000-memory.dmp
      Filesize

      6.1MB

    • memory/1820-226-0x00000000050C0000-0x00000000050FF000-memory.dmp
      Filesize

      252KB

    • memory/1820-224-0x00000000050C0000-0x00000000050FF000-memory.dmp
      Filesize

      252KB

    • memory/1820-194-0x00000000050C0000-0x00000000050FF000-memory.dmp
      Filesize

      252KB

    • memory/1820-198-0x00000000050C0000-0x00000000050FF000-memory.dmp
      Filesize

      252KB

    • memory/1820-222-0x00000000050C0000-0x00000000050FF000-memory.dmp
      Filesize

      252KB

    • memory/1820-203-0x00000000050C0000-0x00000000050FF000-memory.dmp
      Filesize

      252KB

    • memory/1820-207-0x00000000050C0000-0x00000000050FF000-memory.dmp
      Filesize

      252KB

    • memory/1820-220-0x00000000050C0000-0x00000000050FF000-memory.dmp
      Filesize

      252KB

    • memory/1820-212-0x00000000050C0000-0x00000000050FF000-memory.dmp
      Filesize

      252KB

    • memory/1820-218-0x00000000050C0000-0x00000000050FF000-memory.dmp
      Filesize

      252KB

    • memory/1820-211-0x00000000026A0000-0x00000000026B0000-memory.dmp
      Filesize

      64KB

    • memory/1820-216-0x00000000050C0000-0x00000000050FF000-memory.dmp
      Filesize

      252KB

    • memory/1820-215-0x00000000026A0000-0x00000000026B0000-memory.dmp
      Filesize

      64KB

    • memory/1820-213-0x00000000026A0000-0x00000000026B0000-memory.dmp
      Filesize

      64KB

    • memory/2456-1130-0x0000000000220000-0x0000000000252000-memory.dmp
      Filesize

      200KB

    • memory/2456-1131-0x0000000004AE0000-0x0000000004AF0000-memory.dmp
      Filesize

      64KB

    • memory/3992-1111-0x0000000004C50000-0x0000000004C60000-memory.dmp
      Filesize

      64KB

    • memory/3992-210-0x0000000004A90000-0x0000000004AA2000-memory.dmp
      Filesize

      72KB

    • memory/3992-158-0x0000000004C60000-0x0000000005204000-memory.dmp
      Filesize

      5.6MB

    • memory/3992-193-0x0000000004A90000-0x0000000004AA2000-memory.dmp
      Filesize

      72KB

    • memory/3992-189-0x0000000004A90000-0x0000000004AA2000-memory.dmp
      Filesize

      72KB

    • memory/3992-185-0x0000000004A90000-0x0000000004AA2000-memory.dmp
      Filesize

      72KB

    • memory/3992-152-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/3992-172-0x0000000004A90000-0x0000000004AA2000-memory.dmp
      Filesize

      72KB

    • memory/3992-181-0x0000000004A90000-0x0000000004AA2000-memory.dmp
      Filesize

      72KB

    • memory/3992-1108-0x0000000004C50000-0x0000000004C60000-memory.dmp
      Filesize

      64KB

    • memory/3992-176-0x0000000004A90000-0x0000000004AA2000-memory.dmp
      Filesize

      72KB

    • memory/3992-1110-0x0000000004C50000-0x0000000004C60000-memory.dmp
      Filesize

      64KB

    • memory/3992-196-0x0000000004A90000-0x0000000004AA2000-memory.dmp
      Filesize

      72KB

    • memory/3992-200-0x0000000004A90000-0x0000000004AA2000-memory.dmp
      Filesize

      72KB

    • memory/3992-159-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/3992-166-0x0000000004A90000-0x0000000004AA2000-memory.dmp
      Filesize

      72KB

    • memory/3992-1118-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/3992-164-0x0000000004A90000-0x0000000004AA2000-memory.dmp
      Filesize

      72KB

    • memory/3992-163-0x0000000004A90000-0x0000000004AA2000-memory.dmp
      Filesize

      72KB

    • memory/3992-162-0x0000000004C50000-0x0000000004C60000-memory.dmp
      Filesize

      64KB

    • memory/3992-161-0x0000000004C50000-0x0000000004C60000-memory.dmp
      Filesize

      64KB

    • memory/3992-168-0x0000000004A90000-0x0000000004AA2000-memory.dmp
      Filesize

      72KB

    • memory/3992-160-0x0000000004C50000-0x0000000004C60000-memory.dmp
      Filesize

      64KB

    • memory/3992-150-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/3992-148-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/3992-204-0x0000000004A90000-0x0000000004AA2000-memory.dmp
      Filesize

      72KB

    • memory/3992-170-0x0000000004A90000-0x0000000004AA2000-memory.dmp
      Filesize

      72KB