Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 20:07

General

  • Target

    d8ce5818238a1fb7bce2ffe19fa427af83ecba4da666448f4cec4c68e8701cb6.exe

  • Size

    521KB

  • MD5

    5dce6c45cc4e87d660780f1430793b5b

  • SHA1

    2d353744b1e8ec8ed5c4aa3f27c4901572388f18

  • SHA256

    d8ce5818238a1fb7bce2ffe19fa427af83ecba4da666448f4cec4c68e8701cb6

  • SHA512

    2a3a6b3a0ae35aafc2fbb85d38798348d0f89f194adbd27406495f0af7efacb13917692635625477e8edf99691d4a43514c0aab69beb2d7bff2deb9400851407

  • SSDEEP

    12288:XMrly90WprVNdvXilN8Eo4iIzWKv98ZGt:iyhprxvBEhiBKv4Gt

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d8ce5818238a1fb7bce2ffe19fa427af83ecba4da666448f4cec4c68e8701cb6.exe
    "C:\Users\Admin\AppData\Local\Temp\d8ce5818238a1fb7bce2ffe19fa427af83ecba4da666448f4cec4c68e8701cb6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3948
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPx8218.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPx8218.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2420
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr903615.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr903615.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1436
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku029872.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku029872.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:464
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 464 -s 1352
          4⤵
          • Program crash
          PID:3600
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr122049.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr122049.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4760
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 464 -ip 464
    1⤵
      PID:2368

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr122049.exe
      Filesize

      175KB

      MD5

      3e9f12a1470bf968deed40f10827a7dd

      SHA1

      012ad323ba6a599ac231f515a49086c5c1d4756e

      SHA256

      90b153ca1cabcefc57375bc0e869ced1836c5945f66c2a0fd3ae032f2b2429ac

      SHA512

      7bca41fd0ed6cf18d1a53f3de6cba0ddb8263fd6032477f22cbce1a2235928e9b40d9d66c77818b705e2e9dba66f55b1d8dff5e2d9736f125246c3140fe034a1

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr122049.exe
      Filesize

      175KB

      MD5

      3e9f12a1470bf968deed40f10827a7dd

      SHA1

      012ad323ba6a599ac231f515a49086c5c1d4756e

      SHA256

      90b153ca1cabcefc57375bc0e869ced1836c5945f66c2a0fd3ae032f2b2429ac

      SHA512

      7bca41fd0ed6cf18d1a53f3de6cba0ddb8263fd6032477f22cbce1a2235928e9b40d9d66c77818b705e2e9dba66f55b1d8dff5e2d9736f125246c3140fe034a1

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPx8218.exe
      Filesize

      379KB

      MD5

      7fffe8b78e412bb44916c0ec218d92d8

      SHA1

      b8f3b2b810b9012e8339484a3b37d06090698e11

      SHA256

      203545e99184f8d56602b0b78d55ed7350f3fbdcbeb9313945d4729340e71cd8

      SHA512

      61ea112277ba5161eac7b294bb9189de55f2c4942f6cbce126d0807dae7fa595f73c51c349ac5931eebae21518e05f0305583f5373798fc5291dcd9d5ec06283

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPx8218.exe
      Filesize

      379KB

      MD5

      7fffe8b78e412bb44916c0ec218d92d8

      SHA1

      b8f3b2b810b9012e8339484a3b37d06090698e11

      SHA256

      203545e99184f8d56602b0b78d55ed7350f3fbdcbeb9313945d4729340e71cd8

      SHA512

      61ea112277ba5161eac7b294bb9189de55f2c4942f6cbce126d0807dae7fa595f73c51c349ac5931eebae21518e05f0305583f5373798fc5291dcd9d5ec06283

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr903615.exe
      Filesize

      15KB

      MD5

      c656580f327ab19204df7dc6ac7d9dba

      SHA1

      2bf957c9c4d39af5dda2d8510ef4bfa9275b49a6

      SHA256

      98add833621f9b73452c76cddb3a7b7e5415748f00c34d73bbd3c87d71d4fcd0

      SHA512

      5fc2884034b82209447b0c404a6ea1e17f542defe59501905ee8f4fa2b9d7c3671a51246cac1c4ec6cd22d0e4100ae0804b770e811748122b159fdf990a19e0d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr903615.exe
      Filesize

      15KB

      MD5

      c656580f327ab19204df7dc6ac7d9dba

      SHA1

      2bf957c9c4d39af5dda2d8510ef4bfa9275b49a6

      SHA256

      98add833621f9b73452c76cddb3a7b7e5415748f00c34d73bbd3c87d71d4fcd0

      SHA512

      5fc2884034b82209447b0c404a6ea1e17f542defe59501905ee8f4fa2b9d7c3671a51246cac1c4ec6cd22d0e4100ae0804b770e811748122b159fdf990a19e0d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku029872.exe
      Filesize

      294KB

      MD5

      a0bacd141de22a587f52c564119757be

      SHA1

      330c7c1885a6de80ed59572ff45818615bf73605

      SHA256

      65a9ada7b0ae699f22a4bd00deab58ffdddb5707ae5a8a2e1025f2c84da29248

      SHA512

      e99c404c8f836a608bcae779d1e3eee5fcfe0c86c3369209ddcb3af2593936303f31f4d62779033826f4b040d19890e1d9e8135d0020d13440eda35850acb209

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku029872.exe
      Filesize

      294KB

      MD5

      a0bacd141de22a587f52c564119757be

      SHA1

      330c7c1885a6de80ed59572ff45818615bf73605

      SHA256

      65a9ada7b0ae699f22a4bd00deab58ffdddb5707ae5a8a2e1025f2c84da29248

      SHA512

      e99c404c8f836a608bcae779d1e3eee5fcfe0c86c3369209ddcb3af2593936303f31f4d62779033826f4b040d19890e1d9e8135d0020d13440eda35850acb209

    • memory/464-153-0x0000000000820000-0x000000000086B000-memory.dmp
      Filesize

      300KB

    • memory/464-154-0x0000000004AA0000-0x0000000005044000-memory.dmp
      Filesize

      5.6MB

    • memory/464-155-0x0000000004A90000-0x0000000004AA0000-memory.dmp
      Filesize

      64KB

    • memory/464-156-0x0000000004A90000-0x0000000004AA0000-memory.dmp
      Filesize

      64KB

    • memory/464-157-0x0000000004A90000-0x0000000004AA0000-memory.dmp
      Filesize

      64KB

    • memory/464-158-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-161-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-159-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-163-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-165-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-167-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-169-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-171-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-173-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-175-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-177-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-179-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-181-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-183-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-185-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-187-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-189-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-191-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-193-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-195-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-197-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-199-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-201-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-203-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-205-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-207-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-209-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-211-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-213-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-215-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-217-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-219-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-221-0x0000000005050000-0x000000000508F000-memory.dmp
      Filesize

      252KB

    • memory/464-1064-0x0000000005200000-0x0000000005818000-memory.dmp
      Filesize

      6.1MB

    • memory/464-1065-0x00000000058A0000-0x00000000059AA000-memory.dmp
      Filesize

      1.0MB

    • memory/464-1066-0x00000000059E0000-0x00000000059F2000-memory.dmp
      Filesize

      72KB

    • memory/464-1067-0x0000000005A00000-0x0000000005A3C000-memory.dmp
      Filesize

      240KB

    • memory/464-1068-0x0000000004A90000-0x0000000004AA0000-memory.dmp
      Filesize

      64KB

    • memory/464-1070-0x0000000000820000-0x000000000086B000-memory.dmp
      Filesize

      300KB

    • memory/464-1071-0x0000000005CF0000-0x0000000005D82000-memory.dmp
      Filesize

      584KB

    • memory/464-1072-0x0000000005D90000-0x0000000005DF6000-memory.dmp
      Filesize

      408KB

    • memory/464-1073-0x0000000004A90000-0x0000000004AA0000-memory.dmp
      Filesize

      64KB

    • memory/464-1074-0x0000000004A90000-0x0000000004AA0000-memory.dmp
      Filesize

      64KB

    • memory/464-1075-0x0000000004A90000-0x0000000004AA0000-memory.dmp
      Filesize

      64KB

    • memory/464-1076-0x0000000006590000-0x0000000006606000-memory.dmp
      Filesize

      472KB

    • memory/464-1077-0x0000000006620000-0x0000000006670000-memory.dmp
      Filesize

      320KB

    • memory/464-1078-0x00000000066A0000-0x0000000006862000-memory.dmp
      Filesize

      1.8MB

    • memory/464-1079-0x0000000006880000-0x0000000006DAC000-memory.dmp
      Filesize

      5.2MB

    • memory/464-1080-0x0000000004A90000-0x0000000004AA0000-memory.dmp
      Filesize

      64KB

    • memory/1436-147-0x00000000006F0000-0x00000000006FA000-memory.dmp
      Filesize

      40KB

    • memory/4760-1087-0x0000000000D70000-0x0000000000DA2000-memory.dmp
      Filesize

      200KB

    • memory/4760-1088-0x0000000005670000-0x0000000005680000-memory.dmp
      Filesize

      64KB

    • memory/4760-1089-0x0000000005670000-0x0000000005680000-memory.dmp
      Filesize

      64KB