Analysis

  • max time kernel
    51s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 19:05

General

  • Target

    db9d8976b8a0f754fc52de888305afd7ed6eda39f1bd1e1665d46a05b2444c16.exe

  • Size

    521KB

  • MD5

    b623e4cacd17eadaf1f71b54943ea9f5

  • SHA1

    310509e80478678b41f233c49fdd4056e7dc49b3

  • SHA256

    db9d8976b8a0f754fc52de888305afd7ed6eda39f1bd1e1665d46a05b2444c16

  • SHA512

    c62d70181fcbc0583cd93c0d3bff032eba47fe16ae949ee51d2f060a705d530c05edf49162aae242fa73184bfbe3ab043509dc023edf4d31af289f1aac829ebe

  • SSDEEP

    6144:KCy+bnr+3p0yN90QE6Xw+Fbb6dD5p/w5zXVTg43W4Pbfy61wO3XEvo9LMbiRdfZ6:WMrfy90Cw+kPpolXVJdz6Dfo1Mb8jgx

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db9d8976b8a0f754fc52de888305afd7ed6eda39f1bd1e1665d46a05b2444c16.exe
    "C:\Users\Admin\AppData\Local\Temp\db9d8976b8a0f754fc52de888305afd7ed6eda39f1bd1e1665d46a05b2444c16.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHh2067.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHh2067.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4920
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr957112.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr957112.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1156
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku385384.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku385384.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2940
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2940 -s 1328
          4⤵
          • Program crash
          PID:3968
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr637492.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr637492.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3488
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2940 -ip 2940
    1⤵
      PID:4684

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr637492.exe
      Filesize

      175KB

      MD5

      3cedd6cd61a7aac29bd96962016bd4ac

      SHA1

      e2b4fa280911117529ddb272dfc19d121d21b1a5

      SHA256

      7674aa9d23d62c9f16a7cd4c8079a801d59e078b8f8f9f7a4b0807530404ff50

      SHA512

      c223e79e3c0a3ca4c6d70b1f4ffaad5499213d8edc7354da63586491243eb92c83fd1f4d63da76e2fac90d9e815c72dba4a6bd0dfdde210656dfa22439fa9a18

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr637492.exe
      Filesize

      175KB

      MD5

      3cedd6cd61a7aac29bd96962016bd4ac

      SHA1

      e2b4fa280911117529ddb272dfc19d121d21b1a5

      SHA256

      7674aa9d23d62c9f16a7cd4c8079a801d59e078b8f8f9f7a4b0807530404ff50

      SHA512

      c223e79e3c0a3ca4c6d70b1f4ffaad5499213d8edc7354da63586491243eb92c83fd1f4d63da76e2fac90d9e815c72dba4a6bd0dfdde210656dfa22439fa9a18

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHh2067.exe
      Filesize

      379KB

      MD5

      16c5bb6e611f6063689e09adbb2bcdfb

      SHA1

      566636dd69d495fdb504c8e6a2f93e36f8f1edba

      SHA256

      c5ab76cfbf46ae59940f6ce8b5a1e3c2fd5c5e69f819cc601624a61cb6b87f45

      SHA512

      a81f19952f1cd3ae701bb08e423cba8094e3d2cb07d384a0b808d160767c8f80c47e1187b0e604860e82be6db5eff5e850ddce755fe93cb97c715b8fba75cbbb

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHh2067.exe
      Filesize

      379KB

      MD5

      16c5bb6e611f6063689e09adbb2bcdfb

      SHA1

      566636dd69d495fdb504c8e6a2f93e36f8f1edba

      SHA256

      c5ab76cfbf46ae59940f6ce8b5a1e3c2fd5c5e69f819cc601624a61cb6b87f45

      SHA512

      a81f19952f1cd3ae701bb08e423cba8094e3d2cb07d384a0b808d160767c8f80c47e1187b0e604860e82be6db5eff5e850ddce755fe93cb97c715b8fba75cbbb

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr957112.exe
      Filesize

      11KB

      MD5

      2f4b25a3407645a2c28267f108682c85

      SHA1

      936f435ee996078e4c1519302fec1b129937eb5b

      SHA256

      d6e90dbaf9403286bcef5ddd231152df01330d24075da3c17a1ce45cb30d922c

      SHA512

      f8397703336c7f92865d3aa71fea3530946e80919d66241436630bb48136465aa04474caabcfb72f6a9ccb2e5c75e1a0262852613471b06e60a507d821e215d6

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr957112.exe
      Filesize

      11KB

      MD5

      2f4b25a3407645a2c28267f108682c85

      SHA1

      936f435ee996078e4c1519302fec1b129937eb5b

      SHA256

      d6e90dbaf9403286bcef5ddd231152df01330d24075da3c17a1ce45cb30d922c

      SHA512

      f8397703336c7f92865d3aa71fea3530946e80919d66241436630bb48136465aa04474caabcfb72f6a9ccb2e5c75e1a0262852613471b06e60a507d821e215d6

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku385384.exe
      Filesize

      294KB

      MD5

      45c9f0956ea7ce244fd20b70efe5c2a8

      SHA1

      506e36eab09eb0ea07237778301eb84796d48ed3

      SHA256

      e3718e8409029b2807375bf797c908573473740d794ca5d6998636caf3c6b641

      SHA512

      313c5a8b07a280c74fb10c0c654be07c8f134a8a8f7ff2afc8a535fd0ec18ff4c2f35574ce08100089a179e3cc2e2edfa4930eea80aebda8e9af4f1b5e448e7a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku385384.exe
      Filesize

      294KB

      MD5

      45c9f0956ea7ce244fd20b70efe5c2a8

      SHA1

      506e36eab09eb0ea07237778301eb84796d48ed3

      SHA256

      e3718e8409029b2807375bf797c908573473740d794ca5d6998636caf3c6b641

      SHA512

      313c5a8b07a280c74fb10c0c654be07c8f134a8a8f7ff2afc8a535fd0ec18ff4c2f35574ce08100089a179e3cc2e2edfa4930eea80aebda8e9af4f1b5e448e7a

    • memory/1156-147-0x0000000000E30000-0x0000000000E3A000-memory.dmp
      Filesize

      40KB

    • memory/2940-153-0x0000000004C60000-0x0000000005204000-memory.dmp
      Filesize

      5.6MB

    • memory/2940-154-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-155-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-159-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-157-0x0000000000610000-0x000000000065B000-memory.dmp
      Filesize

      300KB

    • memory/2940-161-0x0000000004C50000-0x0000000004C60000-memory.dmp
      Filesize

      64KB

    • memory/2940-162-0x0000000004C50000-0x0000000004C60000-memory.dmp
      Filesize

      64KB

    • memory/2940-158-0x0000000004C50000-0x0000000004C60000-memory.dmp
      Filesize

      64KB

    • memory/2940-163-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-165-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-167-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-169-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-171-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-173-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-175-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-177-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-179-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-181-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-183-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-185-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-187-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-189-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-191-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-193-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-195-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-197-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-199-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-201-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-203-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-205-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-207-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-209-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-211-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-213-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-215-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-217-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-219-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-221-0x0000000002760000-0x000000000279F000-memory.dmp
      Filesize

      252KB

    • memory/2940-1064-0x0000000005210000-0x0000000005828000-memory.dmp
      Filesize

      6.1MB

    • memory/2940-1065-0x0000000005830000-0x000000000593A000-memory.dmp
      Filesize

      1.0MB

    • memory/2940-1066-0x0000000004BB0000-0x0000000004BC2000-memory.dmp
      Filesize

      72KB

    • memory/2940-1067-0x0000000004C50000-0x0000000004C60000-memory.dmp
      Filesize

      64KB

    • memory/2940-1068-0x0000000004BD0000-0x0000000004C0C000-memory.dmp
      Filesize

      240KB

    • memory/2940-1070-0x0000000004C50000-0x0000000004C60000-memory.dmp
      Filesize

      64KB

    • memory/2940-1071-0x0000000004C50000-0x0000000004C60000-memory.dmp
      Filesize

      64KB

    • memory/2940-1072-0x0000000004C50000-0x0000000004C60000-memory.dmp
      Filesize

      64KB

    • memory/2940-1073-0x0000000005BB0000-0x0000000005C16000-memory.dmp
      Filesize

      408KB

    • memory/2940-1074-0x0000000006280000-0x0000000006312000-memory.dmp
      Filesize

      584KB

    • memory/2940-1075-0x0000000006340000-0x00000000063B6000-memory.dmp
      Filesize

      472KB

    • memory/2940-1076-0x00000000063E0000-0x0000000006430000-memory.dmp
      Filesize

      320KB

    • memory/2940-1077-0x0000000006450000-0x0000000006612000-memory.dmp
      Filesize

      1.8MB

    • memory/2940-1078-0x0000000006620000-0x0000000006B4C000-memory.dmp
      Filesize

      5.2MB

    • memory/2940-1079-0x0000000004C50000-0x0000000004C60000-memory.dmp
      Filesize

      64KB

    • memory/3488-1085-0x0000000000510000-0x0000000000542000-memory.dmp
      Filesize

      200KB

    • memory/3488-1086-0x00000000050E0000-0x00000000050F0000-memory.dmp
      Filesize

      64KB

    • memory/3488-1088-0x00000000050E0000-0x00000000050F0000-memory.dmp
      Filesize

      64KB