Analysis

  • max time kernel
    105s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 21:18

General

  • Target

    b462906acd150d8f901f38f291b8acb86354fa9a9fbdcb2aac8aa5f18fb48c6d.exe

  • Size

    522KB

  • MD5

    cf59c35c75a0e97d311113956505aa07

  • SHA1

    db1a3d9b8cf5c0978b8f3b36b4273bfbf458719d

  • SHA256

    b462906acd150d8f901f38f291b8acb86354fa9a9fbdcb2aac8aa5f18fb48c6d

  • SHA512

    610c851adc789b49c01edf8bf4cf30083a32ae26f1680413f86a6c375415761a39f60702aa074dc1a2f045c459b2394816d26f8f217ed31ca98caff144559760

  • SSDEEP

    12288:uMr6y906jF6FyszN7ZC2qh+AwTJLK8GJ4ubzWKpuzWGnc23:MyfbszN7jq4Aw1jGiuGKpiW3I

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b462906acd150d8f901f38f291b8acb86354fa9a9fbdcb2aac8aa5f18fb48c6d.exe
    "C:\Users\Admin\AppData\Local\Temp\b462906acd150d8f901f38f291b8acb86354fa9a9fbdcb2aac8aa5f18fb48c6d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2264
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHk6235.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHk6235.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4776
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr987757.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr987757.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3920
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku517214.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku517214.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3776
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3776 -s 1348
          4⤵
          • Program crash
          PID:3368
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr121295.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr121295.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2868
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3776 -ip 3776
    1⤵
      PID:4496

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr121295.exe
      Filesize

      175KB

      MD5

      17918356f985217bfc8c5f196f4bf201

      SHA1

      60d12066125f703670258e503e184b0df8bde229

      SHA256

      fd3393b5d446fcd335ed134fb171b41cb9dbe8bef975bb6fed72a577688573f5

      SHA512

      8af5e587dda4cc47125f43546b5337533d17cc33010974ebc72eedd884852533ee4ac9d06a95db31a6fd38f228977961ca6e1f1a18d7ebcbb558a6edcaa79f27

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr121295.exe
      Filesize

      175KB

      MD5

      17918356f985217bfc8c5f196f4bf201

      SHA1

      60d12066125f703670258e503e184b0df8bde229

      SHA256

      fd3393b5d446fcd335ed134fb171b41cb9dbe8bef975bb6fed72a577688573f5

      SHA512

      8af5e587dda4cc47125f43546b5337533d17cc33010974ebc72eedd884852533ee4ac9d06a95db31a6fd38f228977961ca6e1f1a18d7ebcbb558a6edcaa79f27

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHk6235.exe
      Filesize

      379KB

      MD5

      2b415aa65ba42c7a6f9ae4c81fad5b00

      SHA1

      49146ab217ce6ac1be1fb616417c68fcd64c5f0c

      SHA256

      0362979c4cc7f180a8c119680ed4fff2cef6e31c6f3e39ab70f3589db7732125

      SHA512

      c12b38de4191cfd579ab6ee4a4e14935d9e4a45bd8f222164eba6a667c35d6b14e33f6d59852e227c9843e1f27cd295583fcb12589cc739db45b9d104d487a5f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHk6235.exe
      Filesize

      379KB

      MD5

      2b415aa65ba42c7a6f9ae4c81fad5b00

      SHA1

      49146ab217ce6ac1be1fb616417c68fcd64c5f0c

      SHA256

      0362979c4cc7f180a8c119680ed4fff2cef6e31c6f3e39ab70f3589db7732125

      SHA512

      c12b38de4191cfd579ab6ee4a4e14935d9e4a45bd8f222164eba6a667c35d6b14e33f6d59852e227c9843e1f27cd295583fcb12589cc739db45b9d104d487a5f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr987757.exe
      Filesize

      15KB

      MD5

      19bed85fe81a0924d8e2d21271133d82

      SHA1

      bf8ef8613af4a1a929855d8670e11dc89229dee7

      SHA256

      d5270df01e15e94242a49f77de966256e008f79f29d7d0bc2f26c8ce6c7bff92

      SHA512

      bbe52470c9078c61f08df10c3a2ed79cb13381938611a6473b9d0ec959a8b23819eafb7bcdef5557f82d63617b1ae5f88d7faa89192d359f0ba056866ca5d468

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr987757.exe
      Filesize

      15KB

      MD5

      19bed85fe81a0924d8e2d21271133d82

      SHA1

      bf8ef8613af4a1a929855d8670e11dc89229dee7

      SHA256

      d5270df01e15e94242a49f77de966256e008f79f29d7d0bc2f26c8ce6c7bff92

      SHA512

      bbe52470c9078c61f08df10c3a2ed79cb13381938611a6473b9d0ec959a8b23819eafb7bcdef5557f82d63617b1ae5f88d7faa89192d359f0ba056866ca5d468

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku517214.exe
      Filesize

      294KB

      MD5

      4e60bf28d0f23f22a80d025b22fe33db

      SHA1

      87c8b602b3ef7071d36a9794bbe61fe0b24ad10b

      SHA256

      d9894f9c31dd093f0519ce57e1ef45aeec2f422355679056a2635c2c0f85a7d8

      SHA512

      1cd7db349961b92ab5653572d3548f153d5fb1397efdb05626b024f499a3b751a1258f8a21cca1b8b90800bbc27c9292d32d2be657bd045321b4524e601440bf

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku517214.exe
      Filesize

      294KB

      MD5

      4e60bf28d0f23f22a80d025b22fe33db

      SHA1

      87c8b602b3ef7071d36a9794bbe61fe0b24ad10b

      SHA256

      d9894f9c31dd093f0519ce57e1ef45aeec2f422355679056a2635c2c0f85a7d8

      SHA512

      1cd7db349961b92ab5653572d3548f153d5fb1397efdb05626b024f499a3b751a1258f8a21cca1b8b90800bbc27c9292d32d2be657bd045321b4524e601440bf

    • memory/2868-1085-0x0000000000960000-0x0000000000992000-memory.dmp
      Filesize

      200KB

    • memory/2868-1086-0x0000000005570000-0x0000000005580000-memory.dmp
      Filesize

      64KB

    • memory/3776-194-0x0000000004B50000-0x0000000004B60000-memory.dmp
      Filesize

      64KB

    • memory/3776-203-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-156-0x0000000004B60000-0x0000000005104000-memory.dmp
      Filesize

      5.6MB

    • memory/3776-157-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-158-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-160-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-162-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-164-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-166-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-168-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-170-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-172-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-174-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-176-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-178-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-180-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-182-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-186-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-184-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-188-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-190-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-192-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-154-0x0000000004B50000-0x0000000004B60000-memory.dmp
      Filesize

      64KB

    • memory/3776-195-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-197-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-199-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-201-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-155-0x0000000004B50000-0x0000000004B60000-memory.dmp
      Filesize

      64KB

    • memory/3776-205-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-207-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-209-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-211-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-213-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-215-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-217-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-219-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-221-0x0000000004A80000-0x0000000004ABF000-memory.dmp
      Filesize

      252KB

    • memory/3776-1064-0x0000000005210000-0x0000000005828000-memory.dmp
      Filesize

      6.1MB

    • memory/3776-1065-0x00000000058A0000-0x00000000059AA000-memory.dmp
      Filesize

      1.0MB

    • memory/3776-1066-0x00000000059E0000-0x00000000059F2000-memory.dmp
      Filesize

      72KB

    • memory/3776-1067-0x0000000004B50000-0x0000000004B60000-memory.dmp
      Filesize

      64KB

    • memory/3776-1068-0x0000000005A00000-0x0000000005A3C000-memory.dmp
      Filesize

      240KB

    • memory/3776-1070-0x0000000004B50000-0x0000000004B60000-memory.dmp
      Filesize

      64KB

    • memory/3776-1071-0x0000000004B50000-0x0000000004B60000-memory.dmp
      Filesize

      64KB

    • memory/3776-1072-0x0000000005CF0000-0x0000000005D82000-memory.dmp
      Filesize

      584KB

    • memory/3776-1073-0x0000000005D90000-0x0000000005DF6000-memory.dmp
      Filesize

      408KB

    • memory/3776-1074-0x0000000004B50000-0x0000000004B60000-memory.dmp
      Filesize

      64KB

    • memory/3776-1075-0x0000000006590000-0x0000000006606000-memory.dmp
      Filesize

      472KB

    • memory/3776-1076-0x0000000006620000-0x0000000006670000-memory.dmp
      Filesize

      320KB

    • memory/3776-153-0x0000000002120000-0x000000000216B000-memory.dmp
      Filesize

      300KB

    • memory/3776-1077-0x0000000004B50000-0x0000000004B60000-memory.dmp
      Filesize

      64KB

    • memory/3776-1078-0x0000000006910000-0x0000000006AD2000-memory.dmp
      Filesize

      1.8MB

    • memory/3776-1079-0x0000000006B00000-0x000000000702C000-memory.dmp
      Filesize

      5.2MB

    • memory/3920-147-0x0000000000B00000-0x0000000000B0A000-memory.dmp
      Filesize

      40KB