Analysis

  • max time kernel
    99s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 18:43

General

  • Target

    d30623788772774aa4f9979c49dcc24bd9d35cfc9b32a969e53d6c30901d9879.exe

  • Size

    659KB

  • MD5

    b6bd364d778d37a1e9dfa5ba15edb1ee

  • SHA1

    e0287e29efb294d305d581ed200d437702f6f1c2

  • SHA256

    d30623788772774aa4f9979c49dcc24bd9d35cfc9b32a969e53d6c30901d9879

  • SHA512

    30d1ae67724acbebfdfdcd0b137a46f5f29f489c3723ee5a4244a6a1d2c0371fcf8bc37586dd97be33b0d7f7f1b68593499d5534244a7121422fb764f1e14b18

  • SSDEEP

    12288:PMrQy90Q348oXefys6s7GJUAQyCZSqcoIHz6TnoUM:nysBOAJl3qcFuTnoB

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 17 IoCs
  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d30623788772774aa4f9979c49dcc24bd9d35cfc9b32a969e53d6c30901d9879.exe
    "C:\Users\Admin\AppData\Local\Temp\d30623788772774aa4f9979c49dcc24bd9d35cfc9b32a969e53d6c30901d9879.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4920
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un499077.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un499077.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1252
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4433.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4433.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:852
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4433.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4433.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4700
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7598.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7598.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2080
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 1644
          4⤵
          • Program crash
          PID:3300
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si675897.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si675897.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1868
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2080 -ip 2080
    1⤵
      PID:1352

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si675897.exe
      Filesize

      175KB

      MD5

      2ba77d393f110ace2c865933b2a3fe77

      SHA1

      cae8de5a935178f716b8da3d66d39cb077d54269

      SHA256

      4a157c3cd914512b720103a277cac5deb51c50554ca8e450500ff85b81a5c2f5

      SHA512

      7bd3de3ba9d5571c5317aa1dedcc1f89d91da77e066d9c808b784191dea33ab48c735b15183bcb036efc6ee091ce2360e9359533cd2b1de65c89ed68852bbfb1

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si675897.exe
      Filesize

      175KB

      MD5

      2ba77d393f110ace2c865933b2a3fe77

      SHA1

      cae8de5a935178f716b8da3d66d39cb077d54269

      SHA256

      4a157c3cd914512b720103a277cac5deb51c50554ca8e450500ff85b81a5c2f5

      SHA512

      7bd3de3ba9d5571c5317aa1dedcc1f89d91da77e066d9c808b784191dea33ab48c735b15183bcb036efc6ee091ce2360e9359533cd2b1de65c89ed68852bbfb1

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un499077.exe
      Filesize

      517KB

      MD5

      6556d4b6d7cabf37d0af2ccc3e3c472c

      SHA1

      612efeee15efb32bc4e961c3a8ed8b7c97bc080c

      SHA256

      ba8d9f828df0c4fe4deadfd239c40680de21310a94a59ed41d0c2dfe9735c95f

      SHA512

      703fe47a205c6c07b91e159ad79c306c27beb8bba1097415240053d248cd6f013ef1c0505ddf3d6206f34199a08e43a1b02198b53b5385a616b739f3d9786d25

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un499077.exe
      Filesize

      517KB

      MD5

      6556d4b6d7cabf37d0af2ccc3e3c472c

      SHA1

      612efeee15efb32bc4e961c3a8ed8b7c97bc080c

      SHA256

      ba8d9f828df0c4fe4deadfd239c40680de21310a94a59ed41d0c2dfe9735c95f

      SHA512

      703fe47a205c6c07b91e159ad79c306c27beb8bba1097415240053d248cd6f013ef1c0505ddf3d6206f34199a08e43a1b02198b53b5385a616b739f3d9786d25

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4433.exe
      Filesize

      237KB

      MD5

      945191ba680069140d9308a3782fbb40

      SHA1

      d1ec491f67a9fe6fddd33499921101840701ec9f

      SHA256

      ffba94eb8129e1a25d920f37ca0b6417e5f9a8d887cc719f97e2aad56a672aa1

      SHA512

      a351724a27f95191ca81e30c9500db978086ea18d562ece7d2c152fe730a59712b37d0393cf9adba0bf2037c45f0d2e9a9103f7e994dc75cec2ebed4f7376d5a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4433.exe
      Filesize

      237KB

      MD5

      945191ba680069140d9308a3782fbb40

      SHA1

      d1ec491f67a9fe6fddd33499921101840701ec9f

      SHA256

      ffba94eb8129e1a25d920f37ca0b6417e5f9a8d887cc719f97e2aad56a672aa1

      SHA512

      a351724a27f95191ca81e30c9500db978086ea18d562ece7d2c152fe730a59712b37d0393cf9adba0bf2037c45f0d2e9a9103f7e994dc75cec2ebed4f7376d5a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4433.exe
      Filesize

      237KB

      MD5

      945191ba680069140d9308a3782fbb40

      SHA1

      d1ec491f67a9fe6fddd33499921101840701ec9f

      SHA256

      ffba94eb8129e1a25d920f37ca0b6417e5f9a8d887cc719f97e2aad56a672aa1

      SHA512

      a351724a27f95191ca81e30c9500db978086ea18d562ece7d2c152fe730a59712b37d0393cf9adba0bf2037c45f0d2e9a9103f7e994dc75cec2ebed4f7376d5a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7598.exe
      Filesize

      294KB

      MD5

      fb79bb3188461776b52ea1ad27bac736

      SHA1

      801aaffcee04ec9dcf5a7cdc3b3509dabcd7431d

      SHA256

      e8a54a1332641193d6ac667ed5cce9e350e2486bd0709e69557749f6982ba5be

      SHA512

      81be77cf5f4b9e4baecf05051103b6051e87fdad3863279adcde5a72a8901647e550718c6b2fd066ac9386450f368ae81b15c923cc3dff959f82823813dfc4f3

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7598.exe
      Filesize

      294KB

      MD5

      fb79bb3188461776b52ea1ad27bac736

      SHA1

      801aaffcee04ec9dcf5a7cdc3b3509dabcd7431d

      SHA256

      e8a54a1332641193d6ac667ed5cce9e350e2486bd0709e69557749f6982ba5be

      SHA512

      81be77cf5f4b9e4baecf05051103b6051e87fdad3863279adcde5a72a8901647e550718c6b2fd066ac9386450f368ae81b15c923cc3dff959f82823813dfc4f3

    • memory/852-150-0x0000000000630000-0x000000000065E000-memory.dmp
      Filesize

      184KB

    • memory/1868-1131-0x0000000004A80000-0x0000000004A90000-memory.dmp
      Filesize

      64KB

    • memory/1868-1130-0x0000000000190000-0x00000000001C2000-memory.dmp
      Filesize

      200KB

    • memory/2080-1114-0x0000000004B70000-0x0000000004B80000-memory.dmp
      Filesize

      64KB

    • memory/2080-192-0x0000000004B70000-0x0000000004B80000-memory.dmp
      Filesize

      64KB

    • memory/2080-1122-0x00000000066D0000-0x0000000006892000-memory.dmp
      Filesize

      1.8MB

    • memory/2080-166-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/2080-164-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/2080-1124-0x0000000004B70000-0x0000000004B80000-memory.dmp
      Filesize

      64KB

    • memory/2080-1117-0x0000000006520000-0x0000000006570000-memory.dmp
      Filesize

      320KB

    • memory/2080-169-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/2080-1116-0x0000000006490000-0x0000000006506000-memory.dmp
      Filesize

      472KB

    • memory/2080-1115-0x0000000004B70000-0x0000000004B80000-memory.dmp
      Filesize

      64KB

    • memory/2080-173-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/2080-179-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/2080-220-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/2080-1113-0x0000000004B70000-0x0000000004B80000-memory.dmp
      Filesize

      64KB

    • memory/2080-1109-0x0000000006260000-0x00000000062F2000-memory.dmp
      Filesize

      584KB

    • memory/2080-185-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/2080-1108-0x0000000005BB0000-0x0000000005C16000-memory.dmp
      Filesize

      408KB

    • memory/2080-1123-0x00000000068B0000-0x0000000006DDC000-memory.dmp
      Filesize

      5.2MB

    • memory/2080-191-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/2080-190-0x0000000004B70000-0x0000000004B80000-memory.dmp
      Filesize

      64KB

    • memory/2080-188-0x0000000000850000-0x000000000089B000-memory.dmp
      Filesize

      300KB

    • memory/2080-1105-0x00000000058C0000-0x00000000058FC000-memory.dmp
      Filesize

      240KB

    • memory/2080-195-0x0000000004B70000-0x0000000004B80000-memory.dmp
      Filesize

      64KB

    • memory/2080-1104-0x0000000004B70000-0x0000000004B80000-memory.dmp
      Filesize

      64KB

    • memory/2080-197-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/2080-1103-0x00000000058A0000-0x00000000058B2000-memory.dmp
      Filesize

      72KB

    • memory/2080-1102-0x0000000005760000-0x000000000586A000-memory.dmp
      Filesize

      1.0MB

    • memory/2080-201-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/2080-204-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/2080-208-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/2080-1101-0x0000000005130000-0x0000000005748000-memory.dmp
      Filesize

      6.1MB

    • memory/2080-226-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/2080-212-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/2080-224-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/2080-216-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/2080-222-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/4700-163-0x0000000004940000-0x0000000004952000-memory.dmp
      Filesize

      72KB

    • memory/4700-219-0x0000000004940000-0x0000000004952000-memory.dmp
      Filesize

      72KB

    • memory/4700-215-0x0000000004940000-0x0000000004952000-memory.dmp
      Filesize

      72KB

    • memory/4700-211-0x0000000004940000-0x0000000004952000-memory.dmp
      Filesize

      72KB

    • memory/4700-207-0x0000000004940000-0x0000000004952000-memory.dmp
      Filesize

      72KB

    • memory/4700-202-0x0000000004940000-0x0000000004952000-memory.dmp
      Filesize

      72KB

    • memory/4700-198-0x0000000004940000-0x0000000004952000-memory.dmp
      Filesize

      72KB

    • memory/4700-193-0x0000000004940000-0x0000000004952000-memory.dmp
      Filesize

      72KB

    • memory/4700-186-0x0000000004940000-0x0000000004952000-memory.dmp
      Filesize

      72KB

    • memory/4700-184-0x0000000004A50000-0x0000000004A60000-memory.dmp
      Filesize

      64KB

    • memory/4700-180-0x0000000004940000-0x0000000004952000-memory.dmp
      Filesize

      72KB

    • memory/4700-1110-0x0000000004A50000-0x0000000004A60000-memory.dmp
      Filesize

      64KB

    • memory/4700-1111-0x0000000004A50000-0x0000000004A60000-memory.dmp
      Filesize

      64KB

    • memory/4700-1112-0x0000000004A50000-0x0000000004A60000-memory.dmp
      Filesize

      64KB

    • memory/4700-181-0x0000000004A50000-0x0000000004A60000-memory.dmp
      Filesize

      64KB

    • memory/4700-178-0x0000000004A50000-0x0000000004A60000-memory.dmp
      Filesize

      64KB

    • memory/4700-175-0x0000000004940000-0x0000000004952000-memory.dmp
      Filesize

      72KB

    • memory/4700-171-0x0000000004940000-0x0000000004952000-memory.dmp
      Filesize

      72KB

    • memory/4700-167-0x0000000004940000-0x0000000004952000-memory.dmp
      Filesize

      72KB

    • memory/4700-1121-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/4700-161-0x0000000004940000-0x0000000004952000-memory.dmp
      Filesize

      72KB

    • memory/4700-160-0x0000000004940000-0x0000000004952000-memory.dmp
      Filesize

      72KB

    • memory/4700-159-0x0000000004A60000-0x0000000005004000-memory.dmp
      Filesize

      5.6MB

    • memory/4700-158-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/4700-152-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/4700-151-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/4700-148-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB