Analysis

  • max time kernel
    104s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 19:03

General

  • Target

    d1224fc62d3055931606b7b37bf66950666f198517f5cd1484671dc5eaedb2dc.exe

  • Size

    521KB

  • MD5

    3fa79f8ab0208cf3ff5d5248c4e31fb2

  • SHA1

    d7b96f78bf2c6c1914cdff318b8e3eacfce9877e

  • SHA256

    d1224fc62d3055931606b7b37bf66950666f198517f5cd1484671dc5eaedb2dc

  • SHA512

    fff7ee9f7cf888e88e3b62c048355d804540711029b290b673baf5368c2cb733704ddbca01a309e3811735e5c0fd047c9c41189a2dfa96528c041c8a750300d9

  • SSDEEP

    12288:hMrIy90nOBC5A7F+2iz7pgP9RJCHWHIQ:9yAd73IRIkr

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1224fc62d3055931606b7b37bf66950666f198517f5cd1484671dc5eaedb2dc.exe
    "C:\Users\Admin\AppData\Local\Temp\d1224fc62d3055931606b7b37bf66950666f198517f5cd1484671dc5eaedb2dc.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3656
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDO4510.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDO4510.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1428
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr094513.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr094513.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4236
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku699023.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku699023.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:216
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 216 -s 1348
          4⤵
          • Program crash
          PID:4532
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr849974.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr849974.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3916
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 216 -ip 216
    1⤵
      PID:2008

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr849974.exe
      Filesize

      175KB

      MD5

      822a9d0bc06867e689fada55a1c628a2

      SHA1

      5ffe634acd550b8c65b9c979306a928d4d1fa7cf

      SHA256

      009fba38b924ad5fa99ba3b7858fedb0d574030c1ae205145bf90478e3f5404b

      SHA512

      9af86c4149d9bd868ed1ae6244b8db85e3c3c77549dc66cd5750543e3013f07b25d62ce3766c650084fba1c9b3c986b1dab9008ee18637c7a95eb715209f141d

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr849974.exe
      Filesize

      175KB

      MD5

      822a9d0bc06867e689fada55a1c628a2

      SHA1

      5ffe634acd550b8c65b9c979306a928d4d1fa7cf

      SHA256

      009fba38b924ad5fa99ba3b7858fedb0d574030c1ae205145bf90478e3f5404b

      SHA512

      9af86c4149d9bd868ed1ae6244b8db85e3c3c77549dc66cd5750543e3013f07b25d62ce3766c650084fba1c9b3c986b1dab9008ee18637c7a95eb715209f141d

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDO4510.exe
      Filesize

      379KB

      MD5

      2fb979922db37d4c461e3ae6a9dc53e2

      SHA1

      6ec97bfcb558427a56fc1d97b7c02ab2a749b50d

      SHA256

      219d401f8781d49f667c7a646f23c255b87cdfbff9adc6642c928021cb9f349e

      SHA512

      c3ac1cc245a508c14c0f2983e7f4fc103fe2c313490181896798fc5e88b7a4cba62184d103d56d8a2d170e595ed24cc1798f767c871c5c6e6fd20772fc91ee6f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziDO4510.exe
      Filesize

      379KB

      MD5

      2fb979922db37d4c461e3ae6a9dc53e2

      SHA1

      6ec97bfcb558427a56fc1d97b7c02ab2a749b50d

      SHA256

      219d401f8781d49f667c7a646f23c255b87cdfbff9adc6642c928021cb9f349e

      SHA512

      c3ac1cc245a508c14c0f2983e7f4fc103fe2c313490181896798fc5e88b7a4cba62184d103d56d8a2d170e595ed24cc1798f767c871c5c6e6fd20772fc91ee6f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr094513.exe
      Filesize

      11KB

      MD5

      4e4f55b1289a76e35a501f79c9202d30

      SHA1

      0f097b8bf3124bc9fc5a79490a2f375d12befb0c

      SHA256

      a90c2b48894648bbcd6b31f143ea5b1ee911e9be23bfd2566d602b392ba775e4

      SHA512

      6a937f31c5f5eba0fe6f8610e70c2baf227125593954db68db6c6458f9728717d561c393a4e80ce8f64480ae9110f885ef3fb1ca1244986782d0d69552420d3e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr094513.exe
      Filesize

      11KB

      MD5

      4e4f55b1289a76e35a501f79c9202d30

      SHA1

      0f097b8bf3124bc9fc5a79490a2f375d12befb0c

      SHA256

      a90c2b48894648bbcd6b31f143ea5b1ee911e9be23bfd2566d602b392ba775e4

      SHA512

      6a937f31c5f5eba0fe6f8610e70c2baf227125593954db68db6c6458f9728717d561c393a4e80ce8f64480ae9110f885ef3fb1ca1244986782d0d69552420d3e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku699023.exe
      Filesize

      294KB

      MD5

      80f3b7080f82c11c23da9a9969fdc97d

      SHA1

      e9cd738f5576411c75e181ff90267dc9d9d7357b

      SHA256

      fe534eec3c370a6191661d508792ab67a3ca9efd4c8e7c2f41518c1ab012a2f4

      SHA512

      931385b928f8bbd787186d3485993546ca89ec8ae861768e0f741d5cf00e06e5a32d47ef4e681b7635976de3a8f8c12b06b60adc457181e6ee39648da93297c2

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku699023.exe
      Filesize

      294KB

      MD5

      80f3b7080f82c11c23da9a9969fdc97d

      SHA1

      e9cd738f5576411c75e181ff90267dc9d9d7357b

      SHA256

      fe534eec3c370a6191661d508792ab67a3ca9efd4c8e7c2f41518c1ab012a2f4

      SHA512

      931385b928f8bbd787186d3485993546ca89ec8ae861768e0f741d5cf00e06e5a32d47ef4e681b7635976de3a8f8c12b06b60adc457181e6ee39648da93297c2

    • memory/216-153-0x0000000002010000-0x000000000205B000-memory.dmp
      Filesize

      300KB

    • memory/216-154-0x0000000004C80000-0x0000000005224000-memory.dmp
      Filesize

      5.6MB

    • memory/216-155-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-156-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-158-0x0000000004C70000-0x0000000004C80000-memory.dmp
      Filesize

      64KB

    • memory/216-160-0x0000000004C70000-0x0000000004C80000-memory.dmp
      Filesize

      64KB

    • memory/216-159-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-162-0x0000000004C70000-0x0000000004C80000-memory.dmp
      Filesize

      64KB

    • memory/216-163-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-165-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-167-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-169-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-171-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-173-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-175-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-177-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-179-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-181-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-185-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-183-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-187-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-189-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-191-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-193-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-195-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-197-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-199-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-201-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-203-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-205-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-207-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-209-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-211-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-213-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-215-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-217-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-219-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-221-0x0000000004A90000-0x0000000004ACF000-memory.dmp
      Filesize

      252KB

    • memory/216-1064-0x0000000005230000-0x0000000005848000-memory.dmp
      Filesize

      6.1MB

    • memory/216-1065-0x0000000005850000-0x000000000595A000-memory.dmp
      Filesize

      1.0MB

    • memory/216-1066-0x0000000004BB0000-0x0000000004BC2000-memory.dmp
      Filesize

      72KB

    • memory/216-1067-0x0000000004BD0000-0x0000000004C0C000-memory.dmp
      Filesize

      240KB

    • memory/216-1068-0x0000000004C70000-0x0000000004C80000-memory.dmp
      Filesize

      64KB

    • memory/216-1070-0x0000000002010000-0x000000000205B000-memory.dmp
      Filesize

      300KB

    • memory/216-1071-0x0000000005BB0000-0x0000000005C42000-memory.dmp
      Filesize

      584KB

    • memory/216-1072-0x0000000005C50000-0x0000000005CB6000-memory.dmp
      Filesize

      408KB

    • memory/216-1073-0x0000000004C70000-0x0000000004C80000-memory.dmp
      Filesize

      64KB

    • memory/216-1074-0x0000000004C70000-0x0000000004C80000-memory.dmp
      Filesize

      64KB

    • memory/216-1075-0x0000000004C70000-0x0000000004C80000-memory.dmp
      Filesize

      64KB

    • memory/216-1076-0x0000000006350000-0x00000000063C6000-memory.dmp
      Filesize

      472KB

    • memory/216-1077-0x00000000063E0000-0x0000000006430000-memory.dmp
      Filesize

      320KB

    • memory/216-1078-0x0000000004C70000-0x0000000004C80000-memory.dmp
      Filesize

      64KB

    • memory/216-1079-0x00000000066B0000-0x0000000006872000-memory.dmp
      Filesize

      1.8MB

    • memory/216-1080-0x0000000006880000-0x0000000006DAC000-memory.dmp
      Filesize

      5.2MB

    • memory/3916-1086-0x0000000000070000-0x00000000000A2000-memory.dmp
      Filesize

      200KB

    • memory/3916-1087-0x0000000004CE0000-0x0000000004CF0000-memory.dmp
      Filesize

      64KB

    • memory/3916-1089-0x0000000004CE0000-0x0000000004CF0000-memory.dmp
      Filesize

      64KB

    • memory/4236-147-0x0000000000750000-0x000000000075A000-memory.dmp
      Filesize

      40KB