Analysis

  • max time kernel
    64s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 18:57

General

  • Target

    dabc7bec8dec8831808e6c25a753cccda1e855a0bd7babf605105372f0728cb3.exe

  • Size

    522KB

  • MD5

    d87d95a95c56d34059e92f5f74bc36c7

  • SHA1

    cdcd89fa898f468c648415a00e059fd0666e3397

  • SHA256

    dabc7bec8dec8831808e6c25a753cccda1e855a0bd7babf605105372f0728cb3

  • SHA512

    5347d153f8f431e728e7450b3ca3440d0f59a4be1664ecf24adadd883ea043e229e2b4d7c6d3ef6a1934e8cf6adb625c2ba1bae5bbf770bed2fddebb0f1cf552

  • SSDEEP

    12288:QMrly90IMiIv1nyZ2M4KLnmBbugl6c2rWFR:ly5MJyZ7mBhsiFR

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dabc7bec8dec8831808e6c25a753cccda1e855a0bd7babf605105372f0728cb3.exe
    "C:\Users\Admin\AppData\Local\Temp\dabc7bec8dec8831808e6c25a753cccda1e855a0bd7babf605105372f0728cb3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4296
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziaD0887.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziaD0887.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4792
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr435420.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr435420.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2528
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku448437.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku448437.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4024
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4024 -s 1860
          4⤵
          • Program crash
          PID:4592
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr507636.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr507636.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4600
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4024 -ip 4024
    1⤵
      PID:5080

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr507636.exe
      Filesize

      175KB

      MD5

      38ffc81e84dbd3d92ee4626f71e70878

      SHA1

      aa4b757b380a46e3c0eb9bfa1a4b113e5891f898

      SHA256

      6d3a9b7a45765082d7bf1591563c6e1afeabe1d673eb2c358b577d6600b06d12

      SHA512

      dc4d922896140fd7d5ac0c104397adbde54a554f79ea38c3c111a4bfee43d23778d9d623338cb6d7a401c0f9003116049caf73431319417ffc7bd8ee8bb27612

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr507636.exe
      Filesize

      175KB

      MD5

      38ffc81e84dbd3d92ee4626f71e70878

      SHA1

      aa4b757b380a46e3c0eb9bfa1a4b113e5891f898

      SHA256

      6d3a9b7a45765082d7bf1591563c6e1afeabe1d673eb2c358b577d6600b06d12

      SHA512

      dc4d922896140fd7d5ac0c104397adbde54a554f79ea38c3c111a4bfee43d23778d9d623338cb6d7a401c0f9003116049caf73431319417ffc7bd8ee8bb27612

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziaD0887.exe
      Filesize

      379KB

      MD5

      d33bdcb6e291240ad6c8b4c619f37055

      SHA1

      29ff196d83fe93faa93aa2ffb0388f245f9c5263

      SHA256

      b7bf5fe39ffea94c918ae84c69a726ebaaa040590f8b2a1ca12a641887153c6d

      SHA512

      ffaa74314e9b5e582ad9c2d0e2ee4d07cff447f6e0b95f61ba9ebd0052a95614001c9ef133b44c450504eb6da86ae9fe307c63048622f54bacec7e04a9fcce64

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziaD0887.exe
      Filesize

      379KB

      MD5

      d33bdcb6e291240ad6c8b4c619f37055

      SHA1

      29ff196d83fe93faa93aa2ffb0388f245f9c5263

      SHA256

      b7bf5fe39ffea94c918ae84c69a726ebaaa040590f8b2a1ca12a641887153c6d

      SHA512

      ffaa74314e9b5e582ad9c2d0e2ee4d07cff447f6e0b95f61ba9ebd0052a95614001c9ef133b44c450504eb6da86ae9fe307c63048622f54bacec7e04a9fcce64

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr435420.exe
      Filesize

      11KB

      MD5

      4d71ecf8aade0e6f8b129593ac3ad598

      SHA1

      e2a8053e910c4a6a0f33f1e192b0089782716212

      SHA256

      2948fd08e50a6641950acb3f99f2214bdd51ed1048a30b8db46674c487fea607

      SHA512

      55bbafb3ca1f4df88dde30aed7deda763c9a83dfaaabb13329da44642d6d8210996092caacb6add997fc1b01026679a6b327f67805a0141e87fa92405d28ce8c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr435420.exe
      Filesize

      11KB

      MD5

      4d71ecf8aade0e6f8b129593ac3ad598

      SHA1

      e2a8053e910c4a6a0f33f1e192b0089782716212

      SHA256

      2948fd08e50a6641950acb3f99f2214bdd51ed1048a30b8db46674c487fea607

      SHA512

      55bbafb3ca1f4df88dde30aed7deda763c9a83dfaaabb13329da44642d6d8210996092caacb6add997fc1b01026679a6b327f67805a0141e87fa92405d28ce8c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku448437.exe
      Filesize

      294KB

      MD5

      0b19b8de64aab6e4a99392679f83bb82

      SHA1

      fe226c6527be7e3efabe8d8cbd3a9e0aa68ea608

      SHA256

      7ff9fa1ef9a71f2ee665a79030d5d5b7573794842245fae5f4d43f731dbf7ef5

      SHA512

      42e43dabf49e8be5c11039e04885107f9f6fec9861eaa15a66b45f09dd6d7e29d7c63b1f13696eee5df0b2645bf8507963f63d6f34d51ef2a005518223fead5d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku448437.exe
      Filesize

      294KB

      MD5

      0b19b8de64aab6e4a99392679f83bb82

      SHA1

      fe226c6527be7e3efabe8d8cbd3a9e0aa68ea608

      SHA256

      7ff9fa1ef9a71f2ee665a79030d5d5b7573794842245fae5f4d43f731dbf7ef5

      SHA512

      42e43dabf49e8be5c11039e04885107f9f6fec9861eaa15a66b45f09dd6d7e29d7c63b1f13696eee5df0b2645bf8507963f63d6f34d51ef2a005518223fead5d

    • memory/2528-147-0x00000000000F0000-0x00000000000FA000-memory.dmp
      Filesize

      40KB

    • memory/4024-153-0x0000000004CD0000-0x0000000005274000-memory.dmp
      Filesize

      5.6MB

    • memory/4024-154-0x0000000000760000-0x00000000007AB000-memory.dmp
      Filesize

      300KB

    • memory/4024-155-0x0000000002280000-0x0000000002290000-memory.dmp
      Filesize

      64KB

    • memory/4024-156-0x0000000002280000-0x0000000002290000-memory.dmp
      Filesize

      64KB

    • memory/4024-157-0x0000000002280000-0x0000000002290000-memory.dmp
      Filesize

      64KB

    • memory/4024-158-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-159-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-161-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-163-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-165-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-167-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-169-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-171-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-173-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-175-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-177-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-179-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-181-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-183-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-185-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-187-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-189-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-191-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-193-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-195-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-197-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-199-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-201-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-203-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-205-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-207-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-209-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-211-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-213-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-215-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-217-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-219-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-221-0x0000000002590000-0x00000000025CF000-memory.dmp
      Filesize

      252KB

    • memory/4024-1064-0x0000000005280000-0x0000000005898000-memory.dmp
      Filesize

      6.1MB

    • memory/4024-1065-0x00000000058A0000-0x00000000059AA000-memory.dmp
      Filesize

      1.0MB

    • memory/4024-1066-0x00000000059E0000-0x00000000059F2000-memory.dmp
      Filesize

      72KB

    • memory/4024-1067-0x0000000005A00000-0x0000000005A3C000-memory.dmp
      Filesize

      240KB

    • memory/4024-1068-0x0000000002280000-0x0000000002290000-memory.dmp
      Filesize

      64KB

    • memory/4024-1070-0x0000000005CF0000-0x0000000005D56000-memory.dmp
      Filesize

      408KB

    • memory/4024-1071-0x0000000002280000-0x0000000002290000-memory.dmp
      Filesize

      64KB

    • memory/4024-1072-0x0000000002280000-0x0000000002290000-memory.dmp
      Filesize

      64KB

    • memory/4024-1073-0x00000000063C0000-0x0000000006452000-memory.dmp
      Filesize

      584KB

    • memory/4024-1074-0x0000000006480000-0x00000000064F6000-memory.dmp
      Filesize

      472KB

    • memory/4024-1075-0x0000000006520000-0x0000000006570000-memory.dmp
      Filesize

      320KB

    • memory/4024-1076-0x0000000006690000-0x0000000006852000-memory.dmp
      Filesize

      1.8MB

    • memory/4024-1077-0x0000000006870000-0x0000000006D9C000-memory.dmp
      Filesize

      5.2MB

    • memory/4024-1078-0x0000000002280000-0x0000000002290000-memory.dmp
      Filesize

      64KB

    • memory/4600-1084-0x0000000000010000-0x0000000000042000-memory.dmp
      Filesize

      200KB

    • memory/4600-1085-0x0000000004C50000-0x0000000004C60000-memory.dmp
      Filesize

      64KB