Analysis

  • max time kernel
    106s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 19:48

General

  • Target

    182394346113ce0608593b3a9caa541b5d958dbd6906137af85b3e996b0fa0bf.exe

  • Size

    658KB

  • MD5

    ca11b95a0aecfd8a2d8a43e921578e72

  • SHA1

    1c4b57eeaf2e1605370f1405f17e966d6108222a

  • SHA256

    182394346113ce0608593b3a9caa541b5d958dbd6906137af85b3e996b0fa0bf

  • SHA512

    15ad340add5630c748aa34c99eb41648e4ab346e0b2c639c6d92e7ef8ad72709ad42f44810369c9ba694eeb1b81d72f85ba076f31c4d704454ced775e89907a5

  • SSDEEP

    12288:GMrvy90Z0Vy9jksT5RWActeTfQQqHorAU44fzWKs98vGlMw5NDx8Y:FyzQ6sLvctUoQqHAAF4qKslMOb

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\182394346113ce0608593b3a9caa541b5d958dbd6906137af85b3e996b0fa0bf.exe
    "C:\Users\Admin\AppData\Local\Temp\182394346113ce0608593b3a9caa541b5d958dbd6906137af85b3e996b0fa0bf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4408
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un194135.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un194135.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1632
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1274.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1274.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2132
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 1088
          4⤵
          • Program crash
          PID:2804
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7505.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7505.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3836
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3836 -s 1848
          4⤵
          • Program crash
          PID:4220
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si707141.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si707141.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3276
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 2132 -ip 2132
    1⤵
      PID:3832
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3836 -ip 3836
      1⤵
        PID:3284

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si707141.exe
        Filesize

        175KB

        MD5

        35dddcf57f1b2252b881606d644839de

        SHA1

        c9a5bb72beca91ffd5d2e74fd3d37a217013e81d

        SHA256

        5709ea184dbee944005fd29ba50f48d1d074c5e4d727be819dd585e265e60590

        SHA512

        25a5c6b86e892f8c475f35a71fb52a7ac7326d47bbfaaff592c3119716b289501c59e1552916836ad6b5fd5f1060051988025518aea0caf858d3c78d1022d170

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si707141.exe
        Filesize

        175KB

        MD5

        35dddcf57f1b2252b881606d644839de

        SHA1

        c9a5bb72beca91ffd5d2e74fd3d37a217013e81d

        SHA256

        5709ea184dbee944005fd29ba50f48d1d074c5e4d727be819dd585e265e60590

        SHA512

        25a5c6b86e892f8c475f35a71fb52a7ac7326d47bbfaaff592c3119716b289501c59e1552916836ad6b5fd5f1060051988025518aea0caf858d3c78d1022d170

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un194135.exe
        Filesize

        516KB

        MD5

        7524bb2ab77b41b6817155e233695524

        SHA1

        149595bc9953f7b5a0b146eedd8e29459a7b5e4c

        SHA256

        03209fdcab11e07b3cdf827b9ca732ee44dd367b9e878ee8c9cedb8d73e1b961

        SHA512

        4e1062978cee9891c2b3c6d73e160f56398f69fe76916f4c8b91c0684cb594eda44977b7d01b225df7d65580e5aef0f09aa0d0049a4534d476d1f4f8e195a805

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un194135.exe
        Filesize

        516KB

        MD5

        7524bb2ab77b41b6817155e233695524

        SHA1

        149595bc9953f7b5a0b146eedd8e29459a7b5e4c

        SHA256

        03209fdcab11e07b3cdf827b9ca732ee44dd367b9e878ee8c9cedb8d73e1b961

        SHA512

        4e1062978cee9891c2b3c6d73e160f56398f69fe76916f4c8b91c0684cb594eda44977b7d01b225df7d65580e5aef0f09aa0d0049a4534d476d1f4f8e195a805

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1274.exe
        Filesize

        235KB

        MD5

        fc6379c24be9b49caf03f48bd13f19f0

        SHA1

        143b78916e6815d1b3a6c45fd342794f1b6984a0

        SHA256

        8aee7cab7b8fa833a19cbe12ed9f7dd48c6c0996fa5e9d7024c501f87722b71c

        SHA512

        0cd92db3cbe80c969c5458648fe5e1f822d793f3644c5a4476aa1c3f3712bf60dbad20356a5598362c26bf4957617c6a8d50bd1c5d140b21ef44095e93544ce3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1274.exe
        Filesize

        235KB

        MD5

        fc6379c24be9b49caf03f48bd13f19f0

        SHA1

        143b78916e6815d1b3a6c45fd342794f1b6984a0

        SHA256

        8aee7cab7b8fa833a19cbe12ed9f7dd48c6c0996fa5e9d7024c501f87722b71c

        SHA512

        0cd92db3cbe80c969c5458648fe5e1f822d793f3644c5a4476aa1c3f3712bf60dbad20356a5598362c26bf4957617c6a8d50bd1c5d140b21ef44095e93544ce3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7505.exe
        Filesize

        294KB

        MD5

        a910d2f4cbc3ac955f20d4a7ec063281

        SHA1

        15b894d819ff633deb96d175c0dfb965d8cafc70

        SHA256

        ebaa9aafcc1eb6007b5df783681c34c15b895f55a9cdaac69d4b6b43447e39c9

        SHA512

        e36ba3afb9c1a843302938befdf1844ae6185947eed0b2f702f843743bbd423ba93c2c34e96362573d3d1f7873d227ffadd2f464e832e33990bad1220756263e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7505.exe
        Filesize

        294KB

        MD5

        a910d2f4cbc3ac955f20d4a7ec063281

        SHA1

        15b894d819ff633deb96d175c0dfb965d8cafc70

        SHA256

        ebaa9aafcc1eb6007b5df783681c34c15b895f55a9cdaac69d4b6b43447e39c9

        SHA512

        e36ba3afb9c1a843302938befdf1844ae6185947eed0b2f702f843743bbd423ba93c2c34e96362573d3d1f7873d227ffadd2f464e832e33990bad1220756263e

      • memory/2132-148-0x0000000002100000-0x000000000212D000-memory.dmp
        Filesize

        180KB

      • memory/2132-149-0x0000000004BA0000-0x0000000004BB0000-memory.dmp
        Filesize

        64KB

      • memory/2132-150-0x0000000004BB0000-0x0000000005154000-memory.dmp
        Filesize

        5.6MB

      • memory/2132-151-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/2132-152-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/2132-154-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/2132-156-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/2132-158-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/2132-160-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/2132-162-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/2132-164-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/2132-166-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/2132-169-0x0000000004BA0000-0x0000000004BB0000-memory.dmp
        Filesize

        64KB

      • memory/2132-168-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/2132-170-0x0000000004BA0000-0x0000000004BB0000-memory.dmp
        Filesize

        64KB

      • memory/2132-172-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/2132-174-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/2132-176-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/2132-178-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/2132-180-0x0000000004A20000-0x0000000004A32000-memory.dmp
        Filesize

        72KB

      • memory/2132-181-0x0000000000400000-0x00000000004A9000-memory.dmp
        Filesize

        676KB

      • memory/2132-182-0x0000000004BA0000-0x0000000004BB0000-memory.dmp
        Filesize

        64KB

      • memory/2132-183-0x0000000004BA0000-0x0000000004BB0000-memory.dmp
        Filesize

        64KB

      • memory/2132-184-0x0000000004BA0000-0x0000000004BB0000-memory.dmp
        Filesize

        64KB

      • memory/2132-186-0x0000000000400000-0x00000000004A9000-memory.dmp
        Filesize

        676KB

      • memory/3276-1122-0x0000000000820000-0x0000000000852000-memory.dmp
        Filesize

        200KB

      • memory/3276-1123-0x0000000005410000-0x0000000005420000-memory.dmp
        Filesize

        64KB

      • memory/3836-194-0x0000000004A80000-0x0000000004ABF000-memory.dmp
        Filesize

        252KB

      • memory/3836-328-0x0000000004B00000-0x0000000004B10000-memory.dmp
        Filesize

        64KB

      • memory/3836-196-0x0000000004A80000-0x0000000004ABF000-memory.dmp
        Filesize

        252KB

      • memory/3836-198-0x0000000004A80000-0x0000000004ABF000-memory.dmp
        Filesize

        252KB

      • memory/3836-200-0x0000000004A80000-0x0000000004ABF000-memory.dmp
        Filesize

        252KB

      • memory/3836-202-0x0000000004A80000-0x0000000004ABF000-memory.dmp
        Filesize

        252KB

      • memory/3836-204-0x0000000004A80000-0x0000000004ABF000-memory.dmp
        Filesize

        252KB

      • memory/3836-206-0x0000000004A80000-0x0000000004ABF000-memory.dmp
        Filesize

        252KB

      • memory/3836-208-0x0000000004A80000-0x0000000004ABF000-memory.dmp
        Filesize

        252KB

      • memory/3836-210-0x0000000004A80000-0x0000000004ABF000-memory.dmp
        Filesize

        252KB

      • memory/3836-212-0x0000000004A80000-0x0000000004ABF000-memory.dmp
        Filesize

        252KB

      • memory/3836-214-0x0000000004A80000-0x0000000004ABF000-memory.dmp
        Filesize

        252KB

      • memory/3836-216-0x0000000004A80000-0x0000000004ABF000-memory.dmp
        Filesize

        252KB

      • memory/3836-218-0x0000000004A80000-0x0000000004ABF000-memory.dmp
        Filesize

        252KB

      • memory/3836-220-0x0000000004A80000-0x0000000004ABF000-memory.dmp
        Filesize

        252KB

      • memory/3836-222-0x0000000004A80000-0x0000000004ABF000-memory.dmp
        Filesize

        252KB

      • memory/3836-224-0x0000000004A80000-0x0000000004ABF000-memory.dmp
        Filesize

        252KB

      • memory/3836-327-0x0000000000690000-0x00000000006DB000-memory.dmp
        Filesize

        300KB

      • memory/3836-331-0x0000000004B00000-0x0000000004B10000-memory.dmp
        Filesize

        64KB

      • memory/3836-192-0x0000000004A80000-0x0000000004ABF000-memory.dmp
        Filesize

        252KB

      • memory/3836-332-0x0000000004B00000-0x0000000004B10000-memory.dmp
        Filesize

        64KB

      • memory/3836-1101-0x0000000005200000-0x0000000005818000-memory.dmp
        Filesize

        6.1MB

      • memory/3836-1102-0x00000000058A0000-0x00000000059AA000-memory.dmp
        Filesize

        1.0MB

      • memory/3836-1103-0x00000000059E0000-0x00000000059F2000-memory.dmp
        Filesize

        72KB

      • memory/3836-1104-0x0000000005A00000-0x0000000005A3C000-memory.dmp
        Filesize

        240KB

      • memory/3836-1105-0x0000000004B00000-0x0000000004B10000-memory.dmp
        Filesize

        64KB

      • memory/3836-1107-0x0000000005CF0000-0x0000000005D56000-memory.dmp
        Filesize

        408KB

      • memory/3836-1108-0x0000000004B00000-0x0000000004B10000-memory.dmp
        Filesize

        64KB

      • memory/3836-1109-0x0000000004B00000-0x0000000004B10000-memory.dmp
        Filesize

        64KB

      • memory/3836-1110-0x0000000004B00000-0x0000000004B10000-memory.dmp
        Filesize

        64KB

      • memory/3836-1111-0x00000000063C0000-0x0000000006452000-memory.dmp
        Filesize

        584KB

      • memory/3836-1112-0x0000000006590000-0x0000000006606000-memory.dmp
        Filesize

        472KB

      • memory/3836-1113-0x0000000006620000-0x0000000006670000-memory.dmp
        Filesize

        320KB

      • memory/3836-191-0x0000000004A80000-0x0000000004ABF000-memory.dmp
        Filesize

        252KB

      • memory/3836-1114-0x0000000006810000-0x00000000069D2000-memory.dmp
        Filesize

        1.8MB

      • memory/3836-1115-0x00000000069E0000-0x0000000006F0C000-memory.dmp
        Filesize

        5.2MB

      • memory/3836-1116-0x0000000004B00000-0x0000000004B10000-memory.dmp
        Filesize

        64KB