Analysis

  • max time kernel
    86s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 19:12

General

  • Target

    86298721f019f439c8a6aa7e628a07d3741ce12bee5518689b20d67b510506ba.exe

  • Size

    521KB

  • MD5

    c5e87a011447485ba7232e2951770a84

  • SHA1

    9004a0cae963829b10feca3bd38950821c6fee3f

  • SHA256

    86298721f019f439c8a6aa7e628a07d3741ce12bee5518689b20d67b510506ba

  • SHA512

    6db66d65d86f851b35be64ebd17cba5bc12ded4ec32b34612a3474222abe4fd019fe15f60d090fab958f7db1f6076267bc76297d2d4a79c4a154582586f81cab

  • SSDEEP

    12288:IMrTy9015gXMpAkfbdWTRR4nT0TEbyAwNiO:byEnbdWTf4nowiNiO

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\86298721f019f439c8a6aa7e628a07d3741ce12bee5518689b20d67b510506ba.exe
    "C:\Users\Admin\AppData\Local\Temp\86298721f019f439c8a6aa7e628a07d3741ce12bee5518689b20d67b510506ba.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4624
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziiF4784.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziiF4784.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4692
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr962292.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr962292.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3000
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku791315.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku791315.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1108
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1108 -s 1356
          4⤵
          • Program crash
          PID:4544
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr950578.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr950578.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:32
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1108 -ip 1108
    1⤵
      PID:2660

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr950578.exe

      Filesize

      175KB

      MD5

      f28bc25dbd7c56d4bdf43e666764d765

      SHA1

      c4f17d783adf3c2a157ecfa9eb828d7150301708

      SHA256

      0cea477a3bda6d5b4c5db83759bc65ce73d5d18040e68a1d5ae2cad6d15816da

      SHA512

      7307161fa7f6a21718f0d97323b79d12d81fc3b922749256a28e0d3288625c7ac1bef461644d97be9915e46104ed841998bd087e0f9e45309ebc56c643b2542d

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr950578.exe

      Filesize

      175KB

      MD5

      f28bc25dbd7c56d4bdf43e666764d765

      SHA1

      c4f17d783adf3c2a157ecfa9eb828d7150301708

      SHA256

      0cea477a3bda6d5b4c5db83759bc65ce73d5d18040e68a1d5ae2cad6d15816da

      SHA512

      7307161fa7f6a21718f0d97323b79d12d81fc3b922749256a28e0d3288625c7ac1bef461644d97be9915e46104ed841998bd087e0f9e45309ebc56c643b2542d

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziiF4784.exe

      Filesize

      379KB

      MD5

      8ac74c7653ddacdf2462921d57dde43f

      SHA1

      f656f76edaf72eb7e359dcc6cac319c8bc13b794

      SHA256

      147ac5fa1a2bc29477edb36233e08bfb706e3dc38475b192f258e02c0d610272

      SHA512

      7382166f1f7071ebc40b3ba5c3821225e896f02b06c7f44854376b9f2b89f9416517f89303d44f1da0515bdf2870f8d3214723b6ba85903f157da9830b404452

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziiF4784.exe

      Filesize

      379KB

      MD5

      8ac74c7653ddacdf2462921d57dde43f

      SHA1

      f656f76edaf72eb7e359dcc6cac319c8bc13b794

      SHA256

      147ac5fa1a2bc29477edb36233e08bfb706e3dc38475b192f258e02c0d610272

      SHA512

      7382166f1f7071ebc40b3ba5c3821225e896f02b06c7f44854376b9f2b89f9416517f89303d44f1da0515bdf2870f8d3214723b6ba85903f157da9830b404452

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr962292.exe

      Filesize

      11KB

      MD5

      02190ecc301498fde7c82cfa27ce9a80

      SHA1

      175e9d0b30f85c710407a1bab8445f01bd50ed5b

      SHA256

      3c95028e3b8c3bee4014f7a88e71ff40a5d46574f740bfef16a67fe7c1ddafc6

      SHA512

      842bf8abd9c9d5c1644a3cfb1d81f7d2302277082da7dc8f00fd0c5c6408f325d81a71496c153c0e3b0e1cbb0a95778269149fe8b0f5daec211fabee25613832

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr962292.exe

      Filesize

      11KB

      MD5

      02190ecc301498fde7c82cfa27ce9a80

      SHA1

      175e9d0b30f85c710407a1bab8445f01bd50ed5b

      SHA256

      3c95028e3b8c3bee4014f7a88e71ff40a5d46574f740bfef16a67fe7c1ddafc6

      SHA512

      842bf8abd9c9d5c1644a3cfb1d81f7d2302277082da7dc8f00fd0c5c6408f325d81a71496c153c0e3b0e1cbb0a95778269149fe8b0f5daec211fabee25613832

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku791315.exe

      Filesize

      294KB

      MD5

      af89de233b50c5c3a1cf73ab255a078b

      SHA1

      60a12b22249804ee8e50bfe3046b3111ecf587d1

      SHA256

      d2e965b84c534f66c94ed0c40f341c145dfc0a31f45dc505be699b94d635066b

      SHA512

      b92940b7ddf2f1bca7e5362671602fae28aedd3df46132979c3d0f7dc299f21f42c5ca4a64cbd69d090a0e03347ad86476efa96d892151cf6df981f209a1f484

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku791315.exe

      Filesize

      294KB

      MD5

      af89de233b50c5c3a1cf73ab255a078b

      SHA1

      60a12b22249804ee8e50bfe3046b3111ecf587d1

      SHA256

      d2e965b84c534f66c94ed0c40f341c145dfc0a31f45dc505be699b94d635066b

      SHA512

      b92940b7ddf2f1bca7e5362671602fae28aedd3df46132979c3d0f7dc299f21f42c5ca4a64cbd69d090a0e03347ad86476efa96d892151cf6df981f209a1f484

    • memory/32-1085-0x0000000000980000-0x00000000009B2000-memory.dmp

      Filesize

      200KB

    • memory/32-1086-0x0000000005520000-0x0000000005530000-memory.dmp

      Filesize

      64KB

    • memory/1108-193-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-203-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-156-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-158-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-161-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/1108-160-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-162-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/1108-165-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/1108-164-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-167-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-169-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-171-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-173-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-175-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-177-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-179-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-181-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-183-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-185-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-187-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-189-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-191-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-154-0x0000000004C80000-0x0000000005224000-memory.dmp

      Filesize

      5.6MB

    • memory/1108-195-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-197-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-199-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-201-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-155-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-205-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-207-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-209-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-211-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-213-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-215-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-217-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-219-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-221-0x0000000002530000-0x000000000256F000-memory.dmp

      Filesize

      252KB

    • memory/1108-1064-0x0000000005230000-0x0000000005848000-memory.dmp

      Filesize

      6.1MB

    • memory/1108-1065-0x00000000058A0000-0x00000000059AA000-memory.dmp

      Filesize

      1.0MB

    • memory/1108-1066-0x00000000059E0000-0x00000000059F2000-memory.dmp

      Filesize

      72KB

    • memory/1108-1067-0x0000000005A00000-0x0000000005A3C000-memory.dmp

      Filesize

      240KB

    • memory/1108-1068-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/1108-1070-0x0000000005CF0000-0x0000000005D82000-memory.dmp

      Filesize

      584KB

    • memory/1108-1071-0x0000000005D90000-0x0000000005DF6000-memory.dmp

      Filesize

      408KB

    • memory/1108-1072-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/1108-1073-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/1108-1074-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/1108-1075-0x00000000065A0000-0x0000000006616000-memory.dmp

      Filesize

      472KB

    • memory/1108-1076-0x0000000006620000-0x0000000006670000-memory.dmp

      Filesize

      320KB

    • memory/1108-153-0x00000000020F0000-0x000000000213B000-memory.dmp

      Filesize

      300KB

    • memory/1108-1077-0x00000000066A0000-0x0000000006862000-memory.dmp

      Filesize

      1.8MB

    • memory/1108-1078-0x0000000006870000-0x0000000006D9C000-memory.dmp

      Filesize

      5.2MB

    • memory/1108-1079-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/3000-147-0x0000000000E50000-0x0000000000E5A000-memory.dmp

      Filesize

      40KB