Analysis

  • max time kernel
    103s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 21:17

General

  • Target

    58df8e200fedb3c4e758530afb73b46a455c3f2c3270a60c0554cbe1a5a0b200.exe

  • Size

    522KB

  • MD5

    1c05974cb349c22fa4166005eaf04a48

  • SHA1

    5b80a7cde8be3e43f15d4ad974f0a1c85394bcfb

  • SHA256

    58df8e200fedb3c4e758530afb73b46a455c3f2c3270a60c0554cbe1a5a0b200

  • SHA512

    d14c408efeff5fd6d65c4cb596063bce9754804e51eba6dfbf81c37433de4770e9d2ed7f7ba1a672f0c161d3582f9a21bfb531ad41439fc294f3ec4915f4b82e

  • SSDEEP

    12288:vMr1y90CwyXF0wP7DN2tu1M9J238wz44pzWywEZvImirzvI:uyp+wj13swM4sy+dfvI

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 32 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58df8e200fedb3c4e758530afb73b46a455c3f2c3270a60c0554cbe1a5a0b200.exe
    "C:\Users\Admin\AppData\Local\Temp\58df8e200fedb3c4e758530afb73b46a455c3f2c3270a60c0554cbe1a5a0b200.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4936
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNp3194.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNp3194.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3564
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr992813.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr992813.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:552
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku413393.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku413393.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4600
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4600 -s 1328
          4⤵
          • Program crash
          PID:3316
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr386009.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr386009.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4176
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4600 -ip 4600
    1⤵
      PID:3856

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr386009.exe

      Filesize

      175KB

      MD5

      0b67025398f753671e101920146fc18a

      SHA1

      d5fe60a42982cd0ad8fbcea455eaa45c381b33e5

      SHA256

      74d3553535ee5d0e3bb89b06714ff807e0a44decdc40a40ed526edf946d59554

      SHA512

      7d564c78b930f81f5b8b2f439bb2314129287bd8b5627b3591b0e7edc5f531c1895ba96579c5c71f2c9a070788e620331d85124ce6c35192466497956595586a

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr386009.exe

      Filesize

      175KB

      MD5

      0b67025398f753671e101920146fc18a

      SHA1

      d5fe60a42982cd0ad8fbcea455eaa45c381b33e5

      SHA256

      74d3553535ee5d0e3bb89b06714ff807e0a44decdc40a40ed526edf946d59554

      SHA512

      7d564c78b930f81f5b8b2f439bb2314129287bd8b5627b3591b0e7edc5f531c1895ba96579c5c71f2c9a070788e620331d85124ce6c35192466497956595586a

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNp3194.exe

      Filesize

      380KB

      MD5

      ba3c4acb8908e244812cbfd2ef0cce83

      SHA1

      b0dbadc2af7617cafe55691bb76f94393869d92f

      SHA256

      118123dcaa3527b911dc5f7ffb09c08337a2cfcf6fb1e5802a47c7801b27b0ee

      SHA512

      c3ba512c02c6a92b19b06ad5a7367c767977e333660ab887bf55fcb7bb8f795ac648fb71c352b57812d77e9b7883effa8b54c3e17af15ef54885643b9b01b11c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNp3194.exe

      Filesize

      380KB

      MD5

      ba3c4acb8908e244812cbfd2ef0cce83

      SHA1

      b0dbadc2af7617cafe55691bb76f94393869d92f

      SHA256

      118123dcaa3527b911dc5f7ffb09c08337a2cfcf6fb1e5802a47c7801b27b0ee

      SHA512

      c3ba512c02c6a92b19b06ad5a7367c767977e333660ab887bf55fcb7bb8f795ac648fb71c352b57812d77e9b7883effa8b54c3e17af15ef54885643b9b01b11c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr992813.exe

      Filesize

      15KB

      MD5

      57490e1635a0965ed5cd98141e551d33

      SHA1

      6002eb78ac2098f4379eca4af5a92a8f9202e395

      SHA256

      c3f2af6930a329a9157bd02ed0e7fbd7b9df8a353fe155e6bdda759bc3ef9719

      SHA512

      d911b83aadcbd23b06966b7875666721efe56cdce46b806574b7fe762edb039a310af3f17a2132a8a83246fe6b72d561a1adebacfd392106d37c8ff46edd92ec

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr992813.exe

      Filesize

      15KB

      MD5

      57490e1635a0965ed5cd98141e551d33

      SHA1

      6002eb78ac2098f4379eca4af5a92a8f9202e395

      SHA256

      c3f2af6930a329a9157bd02ed0e7fbd7b9df8a353fe155e6bdda759bc3ef9719

      SHA512

      d911b83aadcbd23b06966b7875666721efe56cdce46b806574b7fe762edb039a310af3f17a2132a8a83246fe6b72d561a1adebacfd392106d37c8ff46edd92ec

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku413393.exe

      Filesize

      294KB

      MD5

      2e170e3c90ebac3b33e51ad273f1c7d5

      SHA1

      6dc5f23affd1ef4def15ad1e53c61f9b13292513

      SHA256

      e05a03bf00ac82f12fb08aa753087f26e565e0cc4e2317970ad86d9145fa8c37

      SHA512

      5a0fc0b655f89ead9e56f294329654d18154ad1a65fb322fad11e052ea30f7ddfa652489f71c4f1842e35418f7381a0d239992c8729eddf1ac14a1ec79ce4795

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku413393.exe

      Filesize

      294KB

      MD5

      2e170e3c90ebac3b33e51ad273f1c7d5

      SHA1

      6dc5f23affd1ef4def15ad1e53c61f9b13292513

      SHA256

      e05a03bf00ac82f12fb08aa753087f26e565e0cc4e2317970ad86d9145fa8c37

      SHA512

      5a0fc0b655f89ead9e56f294329654d18154ad1a65fb322fad11e052ea30f7ddfa652489f71c4f1842e35418f7381a0d239992c8729eddf1ac14a1ec79ce4795

    • memory/552-147-0x0000000000AA0000-0x0000000000AAA000-memory.dmp

      Filesize

      40KB

    • memory/552-149-0x000000001B620000-0x000000001B76E000-memory.dmp

      Filesize

      1.3MB

    • memory/4176-1086-0x0000000000D00000-0x0000000000D32000-memory.dmp

      Filesize

      200KB

    • memory/4176-1087-0x00000000058F0000-0x0000000005900000-memory.dmp

      Filesize

      64KB

    • memory/4600-190-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

      Filesize

      252KB

    • memory/4600-200-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

      Filesize

      252KB

    • memory/4600-157-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

      Filesize

      252KB

    • memory/4600-159-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

      Filesize

      252KB

    • memory/4600-161-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

      Filesize

      252KB

    • memory/4600-163-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

      Filesize

      252KB

    • memory/4600-165-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

      Filesize

      252KB

    • memory/4600-167-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

      Filesize

      252KB

    • memory/4600-169-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

      Filesize

      252KB

    • memory/4600-172-0x0000000004B70000-0x0000000004B80000-memory.dmp

      Filesize

      64KB

    • memory/4600-171-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

      Filesize

      252KB

    • memory/4600-174-0x0000000004B70000-0x0000000004B80000-memory.dmp

      Filesize

      64KB

    • memory/4600-175-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

      Filesize

      252KB

    • memory/4600-176-0x0000000004B70000-0x0000000004B80000-memory.dmp

      Filesize

      64KB

    • memory/4600-178-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

      Filesize

      252KB

    • memory/4600-180-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

      Filesize

      252KB

    • memory/4600-182-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

      Filesize

      252KB

    • memory/4600-184-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

      Filesize

      252KB

    • memory/4600-186-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

      Filesize

      252KB

    • memory/4600-188-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

      Filesize

      252KB

    • memory/4600-155-0x0000000004B80000-0x0000000005124000-memory.dmp

      Filesize

      5.6MB

    • memory/4600-192-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

      Filesize

      252KB

    • memory/4600-194-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

      Filesize

      252KB

    • memory/4600-196-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

      Filesize

      252KB

    • memory/4600-198-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

      Filesize

      252KB

    • memory/4600-156-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

      Filesize

      252KB

    • memory/4600-202-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

      Filesize

      252KB

    • memory/4600-204-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

      Filesize

      252KB

    • memory/4600-206-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

      Filesize

      252KB

    • memory/4600-208-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

      Filesize

      252KB

    • memory/4600-210-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

      Filesize

      252KB

    • memory/4600-212-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

      Filesize

      252KB

    • memory/4600-214-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

      Filesize

      252KB

    • memory/4600-216-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

      Filesize

      252KB

    • memory/4600-218-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

      Filesize

      252KB

    • memory/4600-220-0x0000000004AB0000-0x0000000004AEF000-memory.dmp

      Filesize

      252KB

    • memory/4600-1065-0x0000000005130000-0x0000000005748000-memory.dmp

      Filesize

      6.1MB

    • memory/4600-1066-0x0000000005760000-0x000000000586A000-memory.dmp

      Filesize

      1.0MB

    • memory/4600-1067-0x00000000058A0000-0x00000000058B2000-memory.dmp

      Filesize

      72KB

    • memory/4600-1068-0x00000000058C0000-0x00000000058FC000-memory.dmp

      Filesize

      240KB

    • memory/4600-1069-0x0000000004B70000-0x0000000004B80000-memory.dmp

      Filesize

      64KB

    • memory/4600-1071-0x0000000005BB0000-0x0000000005C16000-memory.dmp

      Filesize

      408KB

    • memory/4600-1072-0x0000000006280000-0x0000000006312000-memory.dmp

      Filesize

      584KB

    • memory/4600-1073-0x0000000004B70000-0x0000000004B80000-memory.dmp

      Filesize

      64KB

    • memory/4600-1074-0x0000000004B70000-0x0000000004B80000-memory.dmp

      Filesize

      64KB

    • memory/4600-1075-0x0000000004B70000-0x0000000004B80000-memory.dmp

      Filesize

      64KB

    • memory/4600-1076-0x0000000006370000-0x0000000006532000-memory.dmp

      Filesize

      1.8MB

    • memory/4600-1077-0x0000000006550000-0x0000000006A7C000-memory.dmp

      Filesize

      5.2MB

    • memory/4600-154-0x00000000020F0000-0x000000000213B000-memory.dmp

      Filesize

      300KB

    • memory/4600-1078-0x0000000004B70000-0x0000000004B80000-memory.dmp

      Filesize

      64KB

    • memory/4600-1079-0x0000000006CC0000-0x0000000006D36000-memory.dmp

      Filesize

      472KB

    • memory/4600-1080-0x0000000006D50000-0x0000000006DA0000-memory.dmp

      Filesize

      320KB