Analysis

  • max time kernel
    67s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 20:19

General

  • Target

    a3d8f99c98c0f526dc62621527fb61682488211a846b810bfac2d5c02f05860e.exe

  • Size

    522KB

  • MD5

    d04b55cef45bc4b5ef12eb221d4b5ef5

  • SHA1

    78a5146d58dbdae415b211c1698460db22e986d7

  • SHA256

    a3d8f99c98c0f526dc62621527fb61682488211a846b810bfac2d5c02f05860e

  • SHA512

    aa7e81c75ea2c70f6cb2f01e9bfb3936bd9a22b6f54641b2941f05a33ee5b4ada78b82a0ddb31ed02e916f22045b88049d1a59645efeaf8b3abee8a3b8c9c42a

  • SSDEEP

    12288:yMrHy90dVR1o7V+2s/2rnhxL3u42580J4vuzWKXRVoTPbQLmAO6l5F:1ySRH/CnhxLym0iv3KXHwgmAO6l/

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3d8f99c98c0f526dc62621527fb61682488211a846b810bfac2d5c02f05860e.exe
    "C:\Users\Admin\AppData\Local\Temp\a3d8f99c98c0f526dc62621527fb61682488211a846b810bfac2d5c02f05860e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4604
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidp9411.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidp9411.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4280
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr154906.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr154906.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5064
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku607860.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku607860.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2032
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2032 -s 1188
          4⤵
          • Program crash
          PID:4460
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr755074.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr755074.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1432
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2032 -ip 2032
    1⤵
      PID:5076

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr755074.exe
      Filesize

      175KB

      MD5

      f7dfc1585d672c13d2fea260ae2dd7b8

      SHA1

      8bef6f86658638b62d54a23956091475e84be4e3

      SHA256

      a150b1dedcdae78bfca009d3e90997dd7f6566a9341b8a5d1a24d5bf711a1bb4

      SHA512

      1dd20517f4cc03c85dcdf64869f7e9cdcb70d6e2dcdd07befc027d663a6c0de3c081f31f383460eb67cae1cac1e94f9638644c18a88c35e3102af45456098b2c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr755074.exe
      Filesize

      175KB

      MD5

      f7dfc1585d672c13d2fea260ae2dd7b8

      SHA1

      8bef6f86658638b62d54a23956091475e84be4e3

      SHA256

      a150b1dedcdae78bfca009d3e90997dd7f6566a9341b8a5d1a24d5bf711a1bb4

      SHA512

      1dd20517f4cc03c85dcdf64869f7e9cdcb70d6e2dcdd07befc027d663a6c0de3c081f31f383460eb67cae1cac1e94f9638644c18a88c35e3102af45456098b2c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidp9411.exe
      Filesize

      380KB

      MD5

      3f26bdf903bc5314d0b8827fb3e5b157

      SHA1

      d34f67cbebfa5f2b132f4ce791de14b00a1bcb6d

      SHA256

      0cd0331eb4ce4a489bd2a01d2e2aa2e8a4789f1e8fe3daecdadddfc1a22d9149

      SHA512

      e49f3f81cf50126730f583059fc70a5f3fee6ba0b9c34f710f5003983b461012c47f10c3a1f7beed508044fa3d48fad8cda65142b758faa87a497297be780bc3

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zidp9411.exe
      Filesize

      380KB

      MD5

      3f26bdf903bc5314d0b8827fb3e5b157

      SHA1

      d34f67cbebfa5f2b132f4ce791de14b00a1bcb6d

      SHA256

      0cd0331eb4ce4a489bd2a01d2e2aa2e8a4789f1e8fe3daecdadddfc1a22d9149

      SHA512

      e49f3f81cf50126730f583059fc70a5f3fee6ba0b9c34f710f5003983b461012c47f10c3a1f7beed508044fa3d48fad8cda65142b758faa87a497297be780bc3

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr154906.exe
      Filesize

      15KB

      MD5

      4407e1d17211acaad2d2a8b61e1264a8

      SHA1

      aa8358eee2e07efe413de945f377ce699d59644a

      SHA256

      8016303b93b73aaaed18163625667407d22378be0c207a58f15cd24f1afdd02c

      SHA512

      5a4d1fcda4b7b12b7d65b97ccbca75a7fc3aa225fb317f2f6c4ffb0ed7dd751de6fb9ce00fb8dce9f1cb6151f0b4edb92ed35548095a4b5949c7d9ee21fd3e59

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr154906.exe
      Filesize

      15KB

      MD5

      4407e1d17211acaad2d2a8b61e1264a8

      SHA1

      aa8358eee2e07efe413de945f377ce699d59644a

      SHA256

      8016303b93b73aaaed18163625667407d22378be0c207a58f15cd24f1afdd02c

      SHA512

      5a4d1fcda4b7b12b7d65b97ccbca75a7fc3aa225fb317f2f6c4ffb0ed7dd751de6fb9ce00fb8dce9f1cb6151f0b4edb92ed35548095a4b5949c7d9ee21fd3e59

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku607860.exe
      Filesize

      294KB

      MD5

      c2b40967dd2ae5c38f3afe05a5fa5776

      SHA1

      6df7d5f92d2d2bc713c788a5ccbde63db17f2160

      SHA256

      cadcc7b3fe6b43e9c12020ed4db05299dd135c91d76121a37915402c8403edf7

      SHA512

      537b67d8acaca3c964c61128f9c1f4684a9b591b84c21d19dc8cbc90e806d60717cafc1dc1a47054e7f450b645935137915a50f0bda271f7c3cdaa680e22271e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku607860.exe
      Filesize

      294KB

      MD5

      c2b40967dd2ae5c38f3afe05a5fa5776

      SHA1

      6df7d5f92d2d2bc713c788a5ccbde63db17f2160

      SHA256

      cadcc7b3fe6b43e9c12020ed4db05299dd135c91d76121a37915402c8403edf7

      SHA512

      537b67d8acaca3c964c61128f9c1f4684a9b591b84c21d19dc8cbc90e806d60717cafc1dc1a47054e7f450b645935137915a50f0bda271f7c3cdaa680e22271e

    • memory/1432-1085-0x0000000000900000-0x0000000000932000-memory.dmp
      Filesize

      200KB

    • memory/1432-1086-0x0000000005300000-0x0000000005310000-memory.dmp
      Filesize

      64KB

    • memory/2032-191-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-201-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-155-0x00000000027B0000-0x00000000027C0000-memory.dmp
      Filesize

      64KB

    • memory/2032-156-0x00000000027B0000-0x00000000027C0000-memory.dmp
      Filesize

      64KB

    • memory/2032-157-0x00000000027B0000-0x00000000027C0000-memory.dmp
      Filesize

      64KB

    • memory/2032-158-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-159-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-161-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-163-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-165-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-167-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-169-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-171-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-173-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-175-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-177-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-179-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-181-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-183-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-185-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-187-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-189-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-153-0x0000000004B20000-0x00000000050C4000-memory.dmp
      Filesize

      5.6MB

    • memory/2032-193-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-195-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-197-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-199-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-154-0x0000000002050000-0x000000000209B000-memory.dmp
      Filesize

      300KB

    • memory/2032-205-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-203-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-207-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-211-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-209-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-213-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-215-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-217-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-219-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-221-0x0000000002710000-0x000000000274F000-memory.dmp
      Filesize

      252KB

    • memory/2032-1064-0x00000000050D0000-0x00000000056E8000-memory.dmp
      Filesize

      6.1MB

    • memory/2032-1065-0x0000000005760000-0x000000000586A000-memory.dmp
      Filesize

      1.0MB

    • memory/2032-1066-0x00000000058A0000-0x00000000058B2000-memory.dmp
      Filesize

      72KB

    • memory/2032-1067-0x00000000058C0000-0x00000000058FC000-memory.dmp
      Filesize

      240KB

    • memory/2032-1068-0x00000000027B0000-0x00000000027C0000-memory.dmp
      Filesize

      64KB

    • memory/2032-1070-0x0000000005BB0000-0x0000000005C42000-memory.dmp
      Filesize

      584KB

    • memory/2032-1071-0x0000000005C50000-0x0000000005CB6000-memory.dmp
      Filesize

      408KB

    • memory/2032-1072-0x00000000027B0000-0x00000000027C0000-memory.dmp
      Filesize

      64KB

    • memory/2032-1073-0x00000000027B0000-0x00000000027C0000-memory.dmp
      Filesize

      64KB

    • memory/2032-1074-0x00000000027B0000-0x00000000027C0000-memory.dmp
      Filesize

      64KB

    • memory/2032-1075-0x00000000065B0000-0x0000000006772000-memory.dmp
      Filesize

      1.8MB

    • memory/2032-1076-0x0000000006790000-0x0000000006CBC000-memory.dmp
      Filesize

      5.2MB

    • memory/2032-1077-0x0000000006E10000-0x0000000006E86000-memory.dmp
      Filesize

      472KB

    • memory/2032-1078-0x0000000006E90000-0x0000000006EE0000-memory.dmp
      Filesize

      320KB

    • memory/2032-1079-0x00000000027B0000-0x00000000027C0000-memory.dmp
      Filesize

      64KB

    • memory/5064-147-0x0000000000CC0000-0x0000000000CCA000-memory.dmp
      Filesize

      40KB