Analysis

  • max time kernel
    124s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 18:59

General

  • Target

    9b60c72f57fcfb1afd5db10a52e7027d0692598f7f1ffd5d01cd98e4ecdd3bca.exe

  • Size

    660KB

  • MD5

    f65f9af4291db9f7fb5c372f456b9fea

  • SHA1

    0035ff92981afd0756581ce00ec46c031cfb0d2b

  • SHA256

    9b60c72f57fcfb1afd5db10a52e7027d0692598f7f1ffd5d01cd98e4ecdd3bca

  • SHA512

    aeb8c9c10a64209257fce95e39b3d9de3ab9bee8f9d9cea4a26e51248f96fea69873040678e301d7a1c47f32f3570a5dc952bd48445f46c679af868694af48a1

  • SSDEEP

    12288:vMrDy90H55kapuaHV8L/IGfpBDl1nmowHb+8bXdQxZSM19HGl615vwuTX0:MygGQ8LQkBDzmZM14svw8X0

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b60c72f57fcfb1afd5db10a52e7027d0692598f7f1ffd5d01cd98e4ecdd3bca.exe
    "C:\Users\Admin\AppData\Local\Temp\9b60c72f57fcfb1afd5db10a52e7027d0692598f7f1ffd5d01cd98e4ecdd3bca.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1916
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un949285.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un949285.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2084
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4339.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4339.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4756
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4339.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4339.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1420
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7777.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7777.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1800
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 1332
          4⤵
          • Program crash
          PID:3284
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si056641.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si056641.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:916
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1800 -ip 1800
    1⤵
      PID:4852

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si056641.exe
      Filesize

      175KB

      MD5

      3dda93128b9aa16d4d999e97a1ff5402

      SHA1

      bd8a541114e1fab1f1eab4d4c9b1ad2f330b4b6f

      SHA256

      aeef0057eb90ec8ae22a6b238886e251fc679806d7ad3b3c2864ee16d2c6a0bc

      SHA512

      52edd686d9ea42739bf1cd324fd27822cec0c3170d072cfe505fd0e8fd9bca295bb92b5c84f380d5813b996f49dad9b19c9235d962c8acb0c795e6875f90bf4e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si056641.exe
      Filesize

      175KB

      MD5

      3dda93128b9aa16d4d999e97a1ff5402

      SHA1

      bd8a541114e1fab1f1eab4d4c9b1ad2f330b4b6f

      SHA256

      aeef0057eb90ec8ae22a6b238886e251fc679806d7ad3b3c2864ee16d2c6a0bc

      SHA512

      52edd686d9ea42739bf1cd324fd27822cec0c3170d072cfe505fd0e8fd9bca295bb92b5c84f380d5813b996f49dad9b19c9235d962c8acb0c795e6875f90bf4e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un949285.exe
      Filesize

      517KB

      MD5

      9f94ec5a302e1b529e60fdf9f9b32af5

      SHA1

      2f949fadca2e725f7eccee7ad68b067f5dce81ef

      SHA256

      3ab4f90770e4f12fcdcac21d19bd4f922c327f6352dde0f112b0b426bee53700

      SHA512

      383cf846a0c44fc405199ee92cf35a650c26ff398c1b7fe2362ecf20cfa4391d59d8dda89b36dc7af721a75566f69fcd2efa4381eab5910db3a0480c17a3c93f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un949285.exe
      Filesize

      517KB

      MD5

      9f94ec5a302e1b529e60fdf9f9b32af5

      SHA1

      2f949fadca2e725f7eccee7ad68b067f5dce81ef

      SHA256

      3ab4f90770e4f12fcdcac21d19bd4f922c327f6352dde0f112b0b426bee53700

      SHA512

      383cf846a0c44fc405199ee92cf35a650c26ff398c1b7fe2362ecf20cfa4391d59d8dda89b36dc7af721a75566f69fcd2efa4381eab5910db3a0480c17a3c93f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4339.exe
      Filesize

      237KB

      MD5

      9854d0989447afcec67726c8aa10c383

      SHA1

      03b2f465e89345a999f571683829059a461d633e

      SHA256

      823027b4da9c9f313f9984619c9c0d273c495ef5c5b8ff5f3c5c4a19d3c2ff09

      SHA512

      76d600683396db90328df8b0d4908bc0bec0faac181fd5d5a484024082437583edf19e8e4761b753491eedbaf801c0581eee6710ea8675be75dc611032474d23

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4339.exe
      Filesize

      237KB

      MD5

      9854d0989447afcec67726c8aa10c383

      SHA1

      03b2f465e89345a999f571683829059a461d633e

      SHA256

      823027b4da9c9f313f9984619c9c0d273c495ef5c5b8ff5f3c5c4a19d3c2ff09

      SHA512

      76d600683396db90328df8b0d4908bc0bec0faac181fd5d5a484024082437583edf19e8e4761b753491eedbaf801c0581eee6710ea8675be75dc611032474d23

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4339.exe
      Filesize

      237KB

      MD5

      9854d0989447afcec67726c8aa10c383

      SHA1

      03b2f465e89345a999f571683829059a461d633e

      SHA256

      823027b4da9c9f313f9984619c9c0d273c495ef5c5b8ff5f3c5c4a19d3c2ff09

      SHA512

      76d600683396db90328df8b0d4908bc0bec0faac181fd5d5a484024082437583edf19e8e4761b753491eedbaf801c0581eee6710ea8675be75dc611032474d23

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7777.exe
      Filesize

      294KB

      MD5

      760889ae7ad9a80f055cb92b899cda35

      SHA1

      2235c66e276c92b6c1692a93c9c35953b3229557

      SHA256

      98b493b17e7cf401f446423cd761f5f4517122420174f5f23b63e91e911f25e1

      SHA512

      316a8d5737fd3fcacd99129abbe49e261c0f1f9cadd1c6961f661bbc14b8fed05c065ab2efc893f676cda59c0e84af3cc92152da862c084431a9f9126ece5e49

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7777.exe
      Filesize

      294KB

      MD5

      760889ae7ad9a80f055cb92b899cda35

      SHA1

      2235c66e276c92b6c1692a93c9c35953b3229557

      SHA256

      98b493b17e7cf401f446423cd761f5f4517122420174f5f23b63e91e911f25e1

      SHA512

      316a8d5737fd3fcacd99129abbe49e261c0f1f9cadd1c6961f661bbc14b8fed05c065ab2efc893f676cda59c0e84af3cc92152da862c084431a9f9126ece5e49

    • memory/916-1132-0x00000000053A0000-0x00000000053B0000-memory.dmp
      Filesize

      64KB

    • memory/916-1131-0x00000000007E0000-0x0000000000812000-memory.dmp
      Filesize

      200KB

    • memory/1420-203-0x0000000004950000-0x0000000004962000-memory.dmp
      Filesize

      72KB

    • memory/1420-157-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1420-148-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1420-150-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1420-151-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1420-163-0x0000000004950000-0x0000000004962000-memory.dmp
      Filesize

      72KB

    • memory/1420-170-0x0000000004950000-0x0000000004962000-memory.dmp
      Filesize

      72KB

    • memory/1420-1122-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1420-172-0x0000000004AA0000-0x0000000004AB0000-memory.dmp
      Filesize

      64KB

    • memory/1420-177-0x0000000004950000-0x0000000004962000-memory.dmp
      Filesize

      72KB

    • memory/1420-1115-0x0000000004AA0000-0x0000000004AB0000-memory.dmp
      Filesize

      64KB

    • memory/1420-1113-0x0000000004AA0000-0x0000000004AB0000-memory.dmp
      Filesize

      64KB

    • memory/1420-165-0x0000000004AA0000-0x0000000004AB0000-memory.dmp
      Filesize

      64KB

    • memory/1420-160-0x0000000004950000-0x0000000004962000-memory.dmp
      Filesize

      72KB

    • memory/1420-178-0x0000000004AA0000-0x0000000004AB0000-memory.dmp
      Filesize

      64KB

    • memory/1420-1111-0x0000000004AA0000-0x0000000004AB0000-memory.dmp
      Filesize

      64KB

    • memory/1420-1108-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1420-222-0x0000000004950000-0x0000000004962000-memory.dmp
      Filesize

      72KB

    • memory/1420-183-0x0000000004950000-0x0000000004962000-memory.dmp
      Filesize

      72KB

    • memory/1420-215-0x0000000004950000-0x0000000004962000-memory.dmp
      Filesize

      72KB

    • memory/1420-188-0x0000000004950000-0x0000000004962000-memory.dmp
      Filesize

      72KB

    • memory/1420-219-0x0000000004950000-0x0000000004962000-memory.dmp
      Filesize

      72KB

    • memory/1420-159-0x0000000004AB0000-0x0000000005054000-memory.dmp
      Filesize

      5.6MB

    • memory/1420-191-0x0000000004950000-0x0000000004962000-memory.dmp
      Filesize

      72KB

    • memory/1420-196-0x0000000004950000-0x0000000004962000-memory.dmp
      Filesize

      72KB

    • memory/1420-211-0x0000000004950000-0x0000000004962000-memory.dmp
      Filesize

      72KB

    • memory/1420-199-0x0000000004950000-0x0000000004962000-memory.dmp
      Filesize

      72KB

    • memory/1420-207-0x0000000004950000-0x0000000004962000-memory.dmp
      Filesize

      72KB

    • memory/1800-212-0x0000000002520000-0x000000000255F000-memory.dmp
      Filesize

      252KB

    • memory/1800-1109-0x0000000005CF0000-0x0000000005D56000-memory.dmp
      Filesize

      408KB

    • memory/1800-200-0x0000000002520000-0x000000000255F000-memory.dmp
      Filesize

      252KB

    • memory/1800-208-0x0000000002520000-0x000000000255F000-memory.dmp
      Filesize

      252KB

    • memory/1800-195-0x0000000002520000-0x000000000255F000-memory.dmp
      Filesize

      252KB

    • memory/1800-192-0x0000000002520000-0x000000000255F000-memory.dmp
      Filesize

      252KB

    • memory/1800-216-0x0000000002520000-0x000000000255F000-memory.dmp
      Filesize

      252KB

    • memory/1800-187-0x0000000002520000-0x000000000255F000-memory.dmp
      Filesize

      252KB

    • memory/1800-184-0x0000000002520000-0x000000000255F000-memory.dmp
      Filesize

      252KB

    • memory/1800-221-0x0000000002520000-0x000000000255F000-memory.dmp
      Filesize

      252KB

    • memory/1800-175-0x0000000004D90000-0x0000000004DA0000-memory.dmp
      Filesize

      64KB

    • memory/1800-224-0x0000000002520000-0x000000000255F000-memory.dmp
      Filesize

      252KB

    • memory/1800-226-0x0000000002520000-0x000000000255F000-memory.dmp
      Filesize

      252KB

    • memory/1800-1101-0x0000000005350000-0x0000000005968000-memory.dmp
      Filesize

      6.1MB

    • memory/1800-1102-0x0000000005970000-0x0000000005A7A000-memory.dmp
      Filesize

      1.0MB

    • memory/1800-1103-0x00000000028A0000-0x00000000028B2000-memory.dmp
      Filesize

      72KB

    • memory/1800-1104-0x0000000004D10000-0x0000000004D4C000-memory.dmp
      Filesize

      240KB

    • memory/1800-1105-0x0000000004D90000-0x0000000004DA0000-memory.dmp
      Filesize

      64KB

    • memory/1800-181-0x0000000004D90000-0x0000000004DA0000-memory.dmp
      Filesize

      64KB

    • memory/1800-204-0x0000000002520000-0x000000000255F000-memory.dmp
      Filesize

      252KB

    • memory/1800-1110-0x00000000063A0000-0x0000000006432000-memory.dmp
      Filesize

      584KB

    • memory/1800-1112-0x0000000004D90000-0x0000000004DA0000-memory.dmp
      Filesize

      64KB

    • memory/1800-179-0x0000000002520000-0x000000000255F000-memory.dmp
      Filesize

      252KB

    • memory/1800-168-0x0000000004D90000-0x0000000004DA0000-memory.dmp
      Filesize

      64KB

    • memory/1800-1114-0x0000000004D90000-0x0000000004DA0000-memory.dmp
      Filesize

      64KB

    • memory/1800-174-0x0000000002520000-0x000000000255F000-memory.dmp
      Filesize

      252KB

    • memory/1800-1116-0x0000000004D90000-0x0000000004DA0000-memory.dmp
      Filesize

      64KB

    • memory/1800-1117-0x00000000064B0000-0x0000000006672000-memory.dmp
      Filesize

      1.8MB

    • memory/1800-1118-0x0000000006680000-0x0000000006BAC000-memory.dmp
      Filesize

      5.2MB

    • memory/1800-169-0x0000000002520000-0x000000000255F000-memory.dmp
      Filesize

      252KB

    • memory/1800-1123-0x0000000004D90000-0x0000000004DA0000-memory.dmp
      Filesize

      64KB

    • memory/1800-1124-0x0000000007140000-0x00000000071B6000-memory.dmp
      Filesize

      472KB

    • memory/1800-1125-0x00000000071C0000-0x0000000007210000-memory.dmp
      Filesize

      320KB

    • memory/1800-164-0x0000000002520000-0x000000000255F000-memory.dmp
      Filesize

      252KB

    • memory/1800-161-0x0000000002520000-0x000000000255F000-memory.dmp
      Filesize

      252KB

    • memory/1800-162-0x0000000000630000-0x000000000067B000-memory.dmp
      Filesize

      300KB

    • memory/4756-152-0x0000000000550000-0x000000000057E000-memory.dmp
      Filesize

      184KB