Analysis

  • max time kernel
    82s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 19:15

General

  • Target

    e0accc56d2710fdef55b0a6c56b0df48655125b21373e73db72fe90053f4f622.exe

  • Size

    521KB

  • MD5

    54bbd7e1ddb745cf7bf4c9b6f9d6598f

  • SHA1

    82cd0112f200c6babdd8162ad55353ee258d181a

  • SHA256

    e0accc56d2710fdef55b0a6c56b0df48655125b21373e73db72fe90053f4f622

  • SHA512

    2cfc4513667c775830e0fd86ea22721e00c28f563deab9f82669a6c11081b336145dc00ed5c1d97f8ef48af9e2b7eac638a30a2df1638828bf064f27571b3a50

  • SSDEEP

    12288:CMrIy90tMEZafFLiaBtxOkbtJl6RizsjfOO:6yWjZafN7NOkXsPj2O

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0accc56d2710fdef55b0a6c56b0df48655125b21373e73db72fe90053f4f622.exe
    "C:\Users\Admin\AppData\Local\Temp\e0accc56d2710fdef55b0a6c56b0df48655125b21373e73db72fe90053f4f622.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3700
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zior3413.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zior3413.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2392
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr932731.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr932731.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2000
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku920995.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku920995.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:652
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 652 -s 1772
          4⤵
          • Program crash
          PID:5036
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr184879.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr184879.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2088
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 652 -ip 652
    1⤵
      PID:4012

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr184879.exe

      Filesize

      175KB

      MD5

      a00d3fc1e149d4154a1027a1b9c1715c

      SHA1

      c5deb25c31e3ed147dcd724a1aa861e0c29d1529

      SHA256

      a7b2bb2c16f597f2eeb653fa69aafca304fd3d814f791818c2e11485add10cea

      SHA512

      6f40fdd46ac8dd2060de5db59fb9ca081bdfe309726e172f2ed0a1ced9a2ccc07f2dfdfc4cb671d7c456bf3557b6f595968375a61e2ded4c776045543801a79b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr184879.exe

      Filesize

      175KB

      MD5

      a00d3fc1e149d4154a1027a1b9c1715c

      SHA1

      c5deb25c31e3ed147dcd724a1aa861e0c29d1529

      SHA256

      a7b2bb2c16f597f2eeb653fa69aafca304fd3d814f791818c2e11485add10cea

      SHA512

      6f40fdd46ac8dd2060de5db59fb9ca081bdfe309726e172f2ed0a1ced9a2ccc07f2dfdfc4cb671d7c456bf3557b6f595968375a61e2ded4c776045543801a79b

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zior3413.exe

      Filesize

      379KB

      MD5

      e93e4a6fb6c01d9e494d379ac0097cba

      SHA1

      f6eb53d5729a835f09ca8b300faa7068161868b1

      SHA256

      29712362b22ff83aaeacb29116e9c0a6f5b4331aaac1698530e2cb64a7b31937

      SHA512

      47a01ee49bbb4af1083ad91c8fcc0b8498d5205d28d84a52e9eeef66094da89312051cee431710a3b37c5299333fab56e0a5bd7b81fd51ed3766bdea7202225c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zior3413.exe

      Filesize

      379KB

      MD5

      e93e4a6fb6c01d9e494d379ac0097cba

      SHA1

      f6eb53d5729a835f09ca8b300faa7068161868b1

      SHA256

      29712362b22ff83aaeacb29116e9c0a6f5b4331aaac1698530e2cb64a7b31937

      SHA512

      47a01ee49bbb4af1083ad91c8fcc0b8498d5205d28d84a52e9eeef66094da89312051cee431710a3b37c5299333fab56e0a5bd7b81fd51ed3766bdea7202225c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr932731.exe

      Filesize

      11KB

      MD5

      ce38d9d7ecc984decac9badc6b2b4b5f

      SHA1

      ab3aeb8b8852f45bff7b8eebbe5f6fb38a2f6403

      SHA256

      bc0e08474b9a4450c6fd28936d4b108f0636e7bcf72a3682a697f45f863148d6

      SHA512

      0f22e62a89a2339c173af30c72a2ca0633db1842cc6077573847dab565756e7244a2a82c8aed5eec4d8f23b6f6c0d8f5fad2baf70b0b465e9d7aadb35b128fdd

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr932731.exe

      Filesize

      11KB

      MD5

      ce38d9d7ecc984decac9badc6b2b4b5f

      SHA1

      ab3aeb8b8852f45bff7b8eebbe5f6fb38a2f6403

      SHA256

      bc0e08474b9a4450c6fd28936d4b108f0636e7bcf72a3682a697f45f863148d6

      SHA512

      0f22e62a89a2339c173af30c72a2ca0633db1842cc6077573847dab565756e7244a2a82c8aed5eec4d8f23b6f6c0d8f5fad2baf70b0b465e9d7aadb35b128fdd

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku920995.exe

      Filesize

      294KB

      MD5

      61ab411da160854b1e14e26566100e0b

      SHA1

      e74d76f6f004e47c1b5992f321c955119b4b1dee

      SHA256

      52bfd364e7c94bae6cb26125197c6b67221b8bf32fe177b03e88b4673717597c

      SHA512

      317f364611b1645e44cfaed93e049fdf9d9b32d33db9b77e329b979bf95f321615e8e18de64f171d79d31533a95b7ab8fdd7e9bea7b3760ea073b9614384aad5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku920995.exe

      Filesize

      294KB

      MD5

      61ab411da160854b1e14e26566100e0b

      SHA1

      e74d76f6f004e47c1b5992f321c955119b4b1dee

      SHA256

      52bfd364e7c94bae6cb26125197c6b67221b8bf32fe177b03e88b4673717597c

      SHA512

      317f364611b1645e44cfaed93e049fdf9d9b32d33db9b77e329b979bf95f321615e8e18de64f171d79d31533a95b7ab8fdd7e9bea7b3760ea073b9614384aad5

    • memory/652-194-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/652-204-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/652-157-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/652-160-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/652-158-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/652-161-0x0000000004C80000-0x0000000004C90000-memory.dmp

      Filesize

      64KB

    • memory/652-162-0x0000000004C80000-0x0000000004C90000-memory.dmp

      Filesize

      64KB

    • memory/652-164-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/652-166-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/652-168-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/652-170-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/652-172-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/652-174-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/652-176-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/652-178-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/652-180-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/652-182-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/652-184-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/652-186-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/652-188-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/652-190-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/652-192-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/652-155-0x0000000000730000-0x000000000077B000-memory.dmp

      Filesize

      300KB

    • memory/652-196-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/652-198-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/652-200-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/652-202-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/652-156-0x0000000004C90000-0x0000000005234000-memory.dmp

      Filesize

      5.6MB

    • memory/652-206-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/652-208-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/652-210-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/652-214-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/652-212-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/652-216-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/652-218-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/652-220-0x0000000002500000-0x000000000253F000-memory.dmp

      Filesize

      252KB

    • memory/652-1065-0x0000000005240000-0x0000000005858000-memory.dmp

      Filesize

      6.1MB

    • memory/652-1066-0x00000000058A0000-0x00000000059AA000-memory.dmp

      Filesize

      1.0MB

    • memory/652-1067-0x00000000059E0000-0x00000000059F2000-memory.dmp

      Filesize

      72KB

    • memory/652-1068-0x0000000004C80000-0x0000000004C90000-memory.dmp

      Filesize

      64KB

    • memory/652-1069-0x0000000005B00000-0x0000000005B3C000-memory.dmp

      Filesize

      240KB

    • memory/652-1071-0x0000000005CF0000-0x0000000005D82000-memory.dmp

      Filesize

      584KB

    • memory/652-1072-0x0000000005D90000-0x0000000005DF6000-memory.dmp

      Filesize

      408KB

    • memory/652-1073-0x0000000004C80000-0x0000000004C90000-memory.dmp

      Filesize

      64KB

    • memory/652-1074-0x0000000004C80000-0x0000000004C90000-memory.dmp

      Filesize

      64KB

    • memory/652-1075-0x0000000006490000-0x0000000006506000-memory.dmp

      Filesize

      472KB

    • memory/652-1076-0x0000000006520000-0x0000000006570000-memory.dmp

      Filesize

      320KB

    • memory/652-1077-0x00000000066B0000-0x0000000006872000-memory.dmp

      Filesize

      1.8MB

    • memory/652-1078-0x0000000006A80000-0x0000000006FAC000-memory.dmp

      Filesize

      5.2MB

    • memory/652-1079-0x0000000004C80000-0x0000000004C90000-memory.dmp

      Filesize

      64KB

    • memory/2000-147-0x0000000000520000-0x000000000052A000-memory.dmp

      Filesize

      40KB

    • memory/2000-148-0x000000001B060000-0x000000001B1AE000-memory.dmp

      Filesize

      1.3MB

    • memory/2000-150-0x000000001B060000-0x000000001B1AE000-memory.dmp

      Filesize

      1.3MB

    • memory/2088-1085-0x0000000000DA0000-0x0000000000DD2000-memory.dmp

      Filesize

      200KB

    • memory/2088-1086-0x0000000005980000-0x0000000005990000-memory.dmp

      Filesize

      64KB