Analysis

  • max time kernel
    147s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 18:45

General

  • Target

    4b8e5d1dd50bc794c81e9d89f03623badd64b6022b437b57c0e6c57baeda5155.exe

  • Size

    660KB

  • MD5

    71b9a24483a3813ac6d24a3633a97fc5

  • SHA1

    6d0e5f06cebc7443fe394fe4041639137e46e8df

  • SHA256

    4b8e5d1dd50bc794c81e9d89f03623badd64b6022b437b57c0e6c57baeda5155

  • SHA512

    32d3c68f66fd2e8b442f81ea136cc4342d70dd0fdb7426036f4efa3262416068beb1088b2973d3680b67d5f23f796ab71c6d8ce562cbafc75111e63cc01ebd45

  • SSDEEP

    12288:4Mrky90siZlOcHhvJNiu0ky6WtZTvrZShiWjll6eoEhmO:sypiZJYup0vAhiyseoEhmO

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b8e5d1dd50bc794c81e9d89f03623badd64b6022b437b57c0e6c57baeda5155.exe
    "C:\Users\Admin\AppData\Local\Temp\4b8e5d1dd50bc794c81e9d89f03623badd64b6022b437b57c0e6c57baeda5155.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4920
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un638911.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un638911.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2668
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7979.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7979.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:824
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7979.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7979.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4384
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4571.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4571.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2672
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 1328
          4⤵
          • Program crash
          PID:1136
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si847288.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si847288.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3792
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2672 -ip 2672
    1⤵
      PID:1548
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe start wuauserv
      1⤵
      • Launches sc.exe
      PID:2208

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si847288.exe
      Filesize

      175KB

      MD5

      42b23c20e1d5e20de403046dbc1ec480

      SHA1

      a73500c7d55cd223f6614c392aa5904d9efd2b46

      SHA256

      a071aa679adaf7ea0ad621f2c491bf36f9a8797166e50c1b6b14705556ac788f

      SHA512

      904ce52f8e5bde51917e9de27f4c76f09a14c6d99d7ee1aaf75a27ca37c2dc11ff9d20a692aad67e520a87ac6495aeba36d1017994f992924a4a313ae03f4433

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si847288.exe
      Filesize

      175KB

      MD5

      42b23c20e1d5e20de403046dbc1ec480

      SHA1

      a73500c7d55cd223f6614c392aa5904d9efd2b46

      SHA256

      a071aa679adaf7ea0ad621f2c491bf36f9a8797166e50c1b6b14705556ac788f

      SHA512

      904ce52f8e5bde51917e9de27f4c76f09a14c6d99d7ee1aaf75a27ca37c2dc11ff9d20a692aad67e520a87ac6495aeba36d1017994f992924a4a313ae03f4433

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un638911.exe
      Filesize

      517KB

      MD5

      72af93a8341b13c514d11852dd808aaf

      SHA1

      b53d83d6b4dfe348944315a70ac7502967d15886

      SHA256

      7471968a9008ca5405eeb1993798a3316519d40fa47f7d0bb17f3458f4b7d894

      SHA512

      c743170da1e6c285ec3a5d86ebbd028f76439701504a0cb0e8cb75aa5571f6b26c2ffcda713467a5a92d0ef1415a8661c0a750ef84bad911e16aee4b7d261bd6

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un638911.exe
      Filesize

      517KB

      MD5

      72af93a8341b13c514d11852dd808aaf

      SHA1

      b53d83d6b4dfe348944315a70ac7502967d15886

      SHA256

      7471968a9008ca5405eeb1993798a3316519d40fa47f7d0bb17f3458f4b7d894

      SHA512

      c743170da1e6c285ec3a5d86ebbd028f76439701504a0cb0e8cb75aa5571f6b26c2ffcda713467a5a92d0ef1415a8661c0a750ef84bad911e16aee4b7d261bd6

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7979.exe
      Filesize

      237KB

      MD5

      115973895bc057510b16613b8c0c94fa

      SHA1

      13c4c9b0fd54d51f3c522550b081c4e1873d4a80

      SHA256

      b6e10ab97b9229488c303863d704d4a4f6a1768327ae8c6699be213c28df95a0

      SHA512

      e6d22f6511bccb4ff74dc30e12ebd54de2f4e81b340782dc757a2b1403033c886844f3d0534582c6291a9713b0f0628b10f6f82b0c6f2eb8e96e02705ef6949c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7979.exe
      Filesize

      237KB

      MD5

      115973895bc057510b16613b8c0c94fa

      SHA1

      13c4c9b0fd54d51f3c522550b081c4e1873d4a80

      SHA256

      b6e10ab97b9229488c303863d704d4a4f6a1768327ae8c6699be213c28df95a0

      SHA512

      e6d22f6511bccb4ff74dc30e12ebd54de2f4e81b340782dc757a2b1403033c886844f3d0534582c6291a9713b0f0628b10f6f82b0c6f2eb8e96e02705ef6949c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7979.exe
      Filesize

      237KB

      MD5

      115973895bc057510b16613b8c0c94fa

      SHA1

      13c4c9b0fd54d51f3c522550b081c4e1873d4a80

      SHA256

      b6e10ab97b9229488c303863d704d4a4f6a1768327ae8c6699be213c28df95a0

      SHA512

      e6d22f6511bccb4ff74dc30e12ebd54de2f4e81b340782dc757a2b1403033c886844f3d0534582c6291a9713b0f0628b10f6f82b0c6f2eb8e96e02705ef6949c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4571.exe
      Filesize

      294KB

      MD5

      643b593e0c56a9d79046c615f9778f8a

      SHA1

      82c228b0140aed4d2daaad985b0101949d2cbac7

      SHA256

      969b90de04ca94d10331b64755885b233c44c451ea2e55a5b84535b2de0a17d8

      SHA512

      6f1bf249765160abb599c907776a335f793ba801549cfc9a5df78e83064d79d9b7088e06c66eb0b14a0e965e145993c94968d8f9bd96d10a4bf59f76c47d2f2e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4571.exe
      Filesize

      294KB

      MD5

      643b593e0c56a9d79046c615f9778f8a

      SHA1

      82c228b0140aed4d2daaad985b0101949d2cbac7

      SHA256

      969b90de04ca94d10331b64755885b233c44c451ea2e55a5b84535b2de0a17d8

      SHA512

      6f1bf249765160abb599c907776a335f793ba801549cfc9a5df78e83064d79d9b7088e06c66eb0b14a0e965e145993c94968d8f9bd96d10a4bf59f76c47d2f2e

    • memory/824-150-0x0000000000580000-0x00000000005AE000-memory.dmp
      Filesize

      184KB

    • memory/2672-1103-0x00000000058A0000-0x00000000058B2000-memory.dmp
      Filesize

      72KB

    • memory/2672-213-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2672-1123-0x00000000068A0000-0x0000000006DCC000-memory.dmp
      Filesize

      5.2MB

    • memory/2672-1122-0x00000000066D0000-0x0000000006892000-memory.dmp
      Filesize

      1.8MB

    • memory/2672-162-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2672-1121-0x0000000002510000-0x0000000002520000-memory.dmp
      Filesize

      64KB

    • memory/2672-164-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2672-1120-0x00000000064E0000-0x0000000006530000-memory.dmp
      Filesize

      320KB

    • memory/2672-168-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2672-1119-0x0000000006450000-0x00000000064C6000-memory.dmp
      Filesize

      472KB

    • memory/2672-1114-0x0000000002510000-0x0000000002520000-memory.dmp
      Filesize

      64KB

    • memory/2672-1113-0x0000000002510000-0x0000000002520000-memory.dmp
      Filesize

      64KB

    • memory/2672-171-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2672-177-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2672-1109-0x0000000006270000-0x0000000006302000-memory.dmp
      Filesize

      584KB

    • memory/2672-1108-0x0000000005BB0000-0x0000000005C16000-memory.dmp
      Filesize

      408KB

    • memory/2672-1105-0x0000000002510000-0x0000000002520000-memory.dmp
      Filesize

      64KB

    • memory/2672-182-0x00000000020F0000-0x000000000213B000-memory.dmp
      Filesize

      300KB

    • memory/2672-183-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2672-185-0x0000000002510000-0x0000000002520000-memory.dmp
      Filesize

      64KB

    • memory/2672-1104-0x00000000058C0000-0x00000000058FC000-memory.dmp
      Filesize

      240KB

    • memory/2672-189-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2672-188-0x0000000002510000-0x0000000002520000-memory.dmp
      Filesize

      64KB

    • memory/2672-1102-0x0000000005760000-0x000000000586A000-memory.dmp
      Filesize

      1.0MB

    • memory/2672-192-0x0000000002510000-0x0000000002520000-memory.dmp
      Filesize

      64KB

    • memory/2672-194-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2672-197-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2672-1101-0x00000000050C0000-0x00000000056D8000-memory.dmp
      Filesize

      6.1MB

    • memory/2672-200-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2672-226-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2672-224-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2672-205-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2672-209-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2672-221-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2672-216-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/3792-1129-0x0000000000500000-0x0000000000532000-memory.dmp
      Filesize

      200KB

    • memory/3792-1131-0x0000000005110000-0x0000000005120000-memory.dmp
      Filesize

      64KB

    • memory/3792-1130-0x0000000005110000-0x0000000005120000-memory.dmp
      Filesize

      64KB

    • memory/4384-1110-0x0000000004C50000-0x0000000004C60000-memory.dmp
      Filesize

      64KB

    • memory/4384-1112-0x0000000004C50000-0x0000000004C60000-memory.dmp
      Filesize

      64KB

    • memory/4384-206-0x0000000002530000-0x0000000002542000-memory.dmp
      Filesize

      72KB

    • memory/4384-202-0x0000000002530000-0x0000000002542000-memory.dmp
      Filesize

      72KB

    • memory/4384-199-0x0000000002530000-0x0000000002542000-memory.dmp
      Filesize

      72KB

    • memory/4384-193-0x0000000002530000-0x0000000002542000-memory.dmp
      Filesize

      72KB

    • memory/4384-152-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/4384-187-0x0000000002530000-0x0000000002542000-memory.dmp
      Filesize

      72KB

    • memory/4384-181-0x0000000002530000-0x0000000002542000-memory.dmp
      Filesize

      72KB

    • memory/4384-179-0x0000000004C50000-0x0000000004C60000-memory.dmp
      Filesize

      64KB

    • memory/4384-176-0x0000000004C50000-0x0000000004C60000-memory.dmp
      Filesize

      64KB

    • memory/4384-158-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/4384-1111-0x0000000004C50000-0x0000000004C60000-memory.dmp
      Filesize

      64KB

    • memory/4384-222-0x0000000002530000-0x0000000002542000-memory.dmp
      Filesize

      72KB

    • memory/4384-174-0x0000000004C50000-0x0000000004C60000-memory.dmp
      Filesize

      64KB

    • memory/4384-175-0x0000000002530000-0x0000000002542000-memory.dmp
      Filesize

      72KB

    • memory/4384-1118-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/4384-170-0x0000000002530000-0x0000000002542000-memory.dmp
      Filesize

      72KB

    • memory/4384-165-0x0000000002530000-0x0000000002542000-memory.dmp
      Filesize

      72KB

    • memory/4384-161-0x0000000002530000-0x0000000002542000-memory.dmp
      Filesize

      72KB

    • memory/4384-160-0x0000000002530000-0x0000000002542000-memory.dmp
      Filesize

      72KB

    • memory/4384-159-0x0000000004C60000-0x0000000005204000-memory.dmp
      Filesize

      5.6MB

    • memory/4384-151-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/4384-148-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/4384-218-0x0000000002530000-0x0000000002542000-memory.dmp
      Filesize

      72KB

    • memory/4384-210-0x0000000002530000-0x0000000002542000-memory.dmp
      Filesize

      72KB

    • memory/4384-215-0x0000000002530000-0x0000000002542000-memory.dmp
      Filesize

      72KB