Analysis

  • max time kernel
    100s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 20:12

General

  • Target

    fab55e61eff116d7e11d6a4b15199af0d7bead3bc3c8d20651d46220bf3c0090.exe

  • Size

    658KB

  • MD5

    bc8e2db8eed3705d26acdf89df13c40a

  • SHA1

    4e4c1a9728625d5ca1130d436781ea202ca4875b

  • SHA256

    fab55e61eff116d7e11d6a4b15199af0d7bead3bc3c8d20651d46220bf3c0090

  • SHA512

    136b89beaa912e41882ecb8e38be6e00316841417bf31d05256cd89c25b3b9c37378c6c1ca8feb1eec51f6b1e6839c01506a73dab14206d8e5eec6f93c09c4d7

  • SSDEEP

    12288:XMrQy90ZPka9q5TfLD8WkF/nqUA4skTeO72Lt8OxxGH144fzWKb88vAF9/SN:vyZ5TfQFSUonh7IHm4qK4Fe

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fab55e61eff116d7e11d6a4b15199af0d7bead3bc3c8d20651d46220bf3c0090.exe
    "C:\Users\Admin\AppData\Local\Temp\fab55e61eff116d7e11d6a4b15199af0d7bead3bc3c8d20651d46220bf3c0090.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4480
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un235301.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un235301.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5032
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3724.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3724.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4516
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4516 -s 1080
          4⤵
          • Program crash
          PID:380
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7593.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7593.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5044
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5044 -s 1324
          4⤵
          • Program crash
          PID:4288
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si440136.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si440136.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1312
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4516 -ip 4516
    1⤵
      PID:4236
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 5044 -ip 5044
      1⤵
        PID:3056

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si440136.exe
        Filesize

        175KB

        MD5

        89c60c92681267b6145a4985e37a43b3

        SHA1

        62b085a6a6afe0cd2d293822ee47288a64e3d5e3

        SHA256

        53fb748f4a68beb8ed8fbd8d0f80626e92ed7cf259d64c61cf85fd83180bcc5b

        SHA512

        272dd69bb76c11f3f41ddb370384f58b678e54c2b043fe3c3d0d33dac21d9b447d11b6573ef58ce209109f2360fd1c5d3fe36ff8148e8a05348cce6f9005f54c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si440136.exe
        Filesize

        175KB

        MD5

        89c60c92681267b6145a4985e37a43b3

        SHA1

        62b085a6a6afe0cd2d293822ee47288a64e3d5e3

        SHA256

        53fb748f4a68beb8ed8fbd8d0f80626e92ed7cf259d64c61cf85fd83180bcc5b

        SHA512

        272dd69bb76c11f3f41ddb370384f58b678e54c2b043fe3c3d0d33dac21d9b447d11b6573ef58ce209109f2360fd1c5d3fe36ff8148e8a05348cce6f9005f54c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un235301.exe
        Filesize

        516KB

        MD5

        6aeb2c8553feb8957cf1967fb5daea64

        SHA1

        6d0c215c9616430f11d8ceabe41e8fefb38233c3

        SHA256

        59516c02f6030eafa3389da7c284e084aa20b50e94dbb7f9fe2d612f91edbf56

        SHA512

        b378694a6b7fd74c9fc45b451d9096cdf20a522cfe88bcf599052b2373bc12943c11f76ad16a64c3244f59ac29a6ef1479b0ec383c281aabba320d0f64dd5535

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un235301.exe
        Filesize

        516KB

        MD5

        6aeb2c8553feb8957cf1967fb5daea64

        SHA1

        6d0c215c9616430f11d8ceabe41e8fefb38233c3

        SHA256

        59516c02f6030eafa3389da7c284e084aa20b50e94dbb7f9fe2d612f91edbf56

        SHA512

        b378694a6b7fd74c9fc45b451d9096cdf20a522cfe88bcf599052b2373bc12943c11f76ad16a64c3244f59ac29a6ef1479b0ec383c281aabba320d0f64dd5535

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3724.exe
        Filesize

        235KB

        MD5

        61c1d5fd96ac36e5df8a5a9482d01b5c

        SHA1

        7d5f644f38b26316e8905ec4c5fbdcc038fc7973

        SHA256

        61cc3dad28430081e4d8e23b821b66d3e03ab08738e7e857f760bcae94e854d7

        SHA512

        d582bf50f57fd2f882702ca4451b5c0b3de2426c4fb553a12dfad16f8e905f79eb721a3264146f19efd4eaec193050157d2626f3172eb87e9e7852d6535b634b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3724.exe
        Filesize

        235KB

        MD5

        61c1d5fd96ac36e5df8a5a9482d01b5c

        SHA1

        7d5f644f38b26316e8905ec4c5fbdcc038fc7973

        SHA256

        61cc3dad28430081e4d8e23b821b66d3e03ab08738e7e857f760bcae94e854d7

        SHA512

        d582bf50f57fd2f882702ca4451b5c0b3de2426c4fb553a12dfad16f8e905f79eb721a3264146f19efd4eaec193050157d2626f3172eb87e9e7852d6535b634b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7593.exe
        Filesize

        294KB

        MD5

        5e33ef7f994cd7364df359b693290783

        SHA1

        398a1457a28fa4c1f438c949f472d162e5293e65

        SHA256

        452cedbcd6d9065274a15f7ac136d9687434c2ff8052e6308de9e4d7a39e0006

        SHA512

        035ad1ff4b0d56e0e1909d41e0c01aa494bd4aaca8832c8cd9619dde0cd1bc2ec339e96a1be609b736a570adfe3cacdc4801d188db3af1746c472f6bfb58e7c5

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7593.exe
        Filesize

        294KB

        MD5

        5e33ef7f994cd7364df359b693290783

        SHA1

        398a1457a28fa4c1f438c949f472d162e5293e65

        SHA256

        452cedbcd6d9065274a15f7ac136d9687434c2ff8052e6308de9e4d7a39e0006

        SHA512

        035ad1ff4b0d56e0e1909d41e0c01aa494bd4aaca8832c8cd9619dde0cd1bc2ec339e96a1be609b736a570adfe3cacdc4801d188db3af1746c472f6bfb58e7c5

      • memory/1312-1122-0x0000000000670000-0x00000000006A2000-memory.dmp
        Filesize

        200KB

      • memory/1312-1123-0x00000000052F0000-0x0000000005300000-memory.dmp
        Filesize

        64KB

      • memory/1312-1124-0x00000000052F0000-0x0000000005300000-memory.dmp
        Filesize

        64KB

      • memory/4516-162-0x0000000004FD0000-0x0000000004FE2000-memory.dmp
        Filesize

        72KB

      • memory/4516-174-0x0000000004FD0000-0x0000000004FE2000-memory.dmp
        Filesize

        72KB

      • memory/4516-152-0x0000000004FD0000-0x0000000004FE2000-memory.dmp
        Filesize

        72KB

      • memory/4516-154-0x0000000004FD0000-0x0000000004FE2000-memory.dmp
        Filesize

        72KB

      • memory/4516-156-0x0000000004FD0000-0x0000000004FE2000-memory.dmp
        Filesize

        72KB

      • memory/4516-158-0x0000000004FD0000-0x0000000004FE2000-memory.dmp
        Filesize

        72KB

      • memory/4516-160-0x0000000004FD0000-0x0000000004FE2000-memory.dmp
        Filesize

        72KB

      • memory/4516-150-0x0000000004A20000-0x0000000004FC4000-memory.dmp
        Filesize

        5.6MB

      • memory/4516-164-0x0000000004FD0000-0x0000000004FE2000-memory.dmp
        Filesize

        72KB

      • memory/4516-166-0x0000000004FD0000-0x0000000004FE2000-memory.dmp
        Filesize

        72KB

      • memory/4516-168-0x0000000004FD0000-0x0000000004FE2000-memory.dmp
        Filesize

        72KB

      • memory/4516-170-0x0000000004FD0000-0x0000000004FE2000-memory.dmp
        Filesize

        72KB

      • memory/4516-172-0x0000000004FD0000-0x0000000004FE2000-memory.dmp
        Filesize

        72KB

      • memory/4516-151-0x0000000004FD0000-0x0000000004FE2000-memory.dmp
        Filesize

        72KB

      • memory/4516-176-0x0000000004FD0000-0x0000000004FE2000-memory.dmp
        Filesize

        72KB

      • memory/4516-178-0x0000000004FD0000-0x0000000004FE2000-memory.dmp
        Filesize

        72KB

      • memory/4516-179-0x0000000002440000-0x0000000002450000-memory.dmp
        Filesize

        64KB

      • memory/4516-180-0x0000000002440000-0x0000000002450000-memory.dmp
        Filesize

        64KB

      • memory/4516-181-0x0000000000400000-0x00000000004A9000-memory.dmp
        Filesize

        676KB

      • memory/4516-182-0x0000000002440000-0x0000000002450000-memory.dmp
        Filesize

        64KB

      • memory/4516-183-0x0000000002440000-0x0000000002450000-memory.dmp
        Filesize

        64KB

      • memory/4516-184-0x0000000002440000-0x0000000002450000-memory.dmp
        Filesize

        64KB

      • memory/4516-186-0x0000000000400000-0x00000000004A9000-memory.dmp
        Filesize

        676KB

      • memory/4516-148-0x0000000002100000-0x000000000212D000-memory.dmp
        Filesize

        180KB

      • memory/4516-149-0x0000000002440000-0x0000000002450000-memory.dmp
        Filesize

        64KB

      • memory/5044-196-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/5044-266-0x0000000002240000-0x0000000002250000-memory.dmp
        Filesize

        64KB

      • memory/5044-198-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/5044-200-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/5044-202-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/5044-204-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/5044-206-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/5044-208-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/5044-210-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/5044-212-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/5044-214-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/5044-216-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/5044-218-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/5044-220-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/5044-222-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/5044-224-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/5044-261-0x0000000000730000-0x000000000077B000-memory.dmp
        Filesize

        300KB

      • memory/5044-265-0x0000000002240000-0x0000000002250000-memory.dmp
        Filesize

        64KB

      • memory/5044-263-0x0000000002240000-0x0000000002250000-memory.dmp
        Filesize

        64KB

      • memory/5044-192-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/5044-1101-0x0000000005200000-0x0000000005818000-memory.dmp
        Filesize

        6.1MB

      • memory/5044-1102-0x00000000058A0000-0x00000000059AA000-memory.dmp
        Filesize

        1.0MB

      • memory/5044-1103-0x00000000059E0000-0x00000000059F2000-memory.dmp
        Filesize

        72KB

      • memory/5044-1104-0x0000000005A00000-0x0000000005A3C000-memory.dmp
        Filesize

        240KB

      • memory/5044-1105-0x0000000002240000-0x0000000002250000-memory.dmp
        Filesize

        64KB

      • memory/5044-1106-0x0000000005CF0000-0x0000000005D82000-memory.dmp
        Filesize

        584KB

      • memory/5044-1107-0x0000000005D90000-0x0000000005DF6000-memory.dmp
        Filesize

        408KB

      • memory/5044-1109-0x0000000002240000-0x0000000002250000-memory.dmp
        Filesize

        64KB

      • memory/5044-1110-0x0000000002240000-0x0000000002250000-memory.dmp
        Filesize

        64KB

      • memory/5044-1111-0x0000000002240000-0x0000000002250000-memory.dmp
        Filesize

        64KB

      • memory/5044-1112-0x0000000002240000-0x0000000002250000-memory.dmp
        Filesize

        64KB

      • memory/5044-1113-0x0000000007A70000-0x0000000007C32000-memory.dmp
        Filesize

        1.8MB

      • memory/5044-194-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/5044-191-0x0000000005020000-0x000000000505F000-memory.dmp
        Filesize

        252KB

      • memory/5044-1114-0x0000000007C50000-0x000000000817C000-memory.dmp
        Filesize

        5.2MB

      • memory/5044-1115-0x0000000002550000-0x00000000025C6000-memory.dmp
        Filesize

        472KB

      • memory/5044-1116-0x00000000082A0000-0x00000000082F0000-memory.dmp
        Filesize

        320KB