Analysis

  • max time kernel
    70s
  • max time network
    114s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 21:20

General

  • Target

    bb7fdd83e0abf8b63c82357dfd04ae93d9593fd68ab8cb1b13e7523126634727.exe

  • Size

    521KB

  • MD5

    8439bc55ae0209f383fc7039f47ca7c7

  • SHA1

    202d7d2d8eb8ef1c019ad8e278062814a2d69026

  • SHA256

    bb7fdd83e0abf8b63c82357dfd04ae93d9593fd68ab8cb1b13e7523126634727

  • SHA512

    c7ed0d7b11ab778bf50b500bcd2edb878fb2eb6c7ab62a23379463b69d3a14765a2933ce900097f3796bcf48828095efdbe5b629d574eda3251f64171f0f9211

  • SSDEEP

    12288:2MrGy90iMPpP0LlZQOJKK8ph448zWDTiQOMElRu5F:AysaLzQJjpK41D+Q1ElyF

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb7fdd83e0abf8b63c82357dfd04ae93d9593fd68ab8cb1b13e7523126634727.exe
    "C:\Users\Admin\AppData\Local\Temp\bb7fdd83e0abf8b63c82357dfd04ae93d9593fd68ab8cb1b13e7523126634727.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4900
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHX6166.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHX6166.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3200
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr403932.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr403932.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2044
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku508585.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku508585.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2588
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2588 -s 1328
          4⤵
          • Program crash
          PID:4228
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr940386.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr940386.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:524
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2588 -ip 2588
    1⤵
      PID:4260

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr940386.exe
      Filesize

      175KB

      MD5

      8b0bd4c8896fa1892c3cb0cd771e5ce0

      SHA1

      719dad6b3df9635a037fa5804bf3950a5cef5d9c

      SHA256

      b4d3c5e1316c5d38d2473804d248c3d970031a9becf7b341b9f4c1704452fb15

      SHA512

      8f1b49b1cb4d7b35f995faa21bf15482b69edfe0dc2c5ddd983029a912476c908262c12fa8b57c1d6a28b2c8476a48764ee2288b6634ad990db91454b565963f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr940386.exe
      Filesize

      175KB

      MD5

      8b0bd4c8896fa1892c3cb0cd771e5ce0

      SHA1

      719dad6b3df9635a037fa5804bf3950a5cef5d9c

      SHA256

      b4d3c5e1316c5d38d2473804d248c3d970031a9becf7b341b9f4c1704452fb15

      SHA512

      8f1b49b1cb4d7b35f995faa21bf15482b69edfe0dc2c5ddd983029a912476c908262c12fa8b57c1d6a28b2c8476a48764ee2288b6634ad990db91454b565963f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHX6166.exe
      Filesize

      379KB

      MD5

      942fc1e08648cf4e8bf607f6ebaca2cc

      SHA1

      6b83d4400e87130875d29a0186731aa6164cfb7a

      SHA256

      466c72556c87ee5a359b686fa4d0725f41443e673a24d060e63021f53bf552da

      SHA512

      04d30a5c6ab8ff20c7bfa13461a29a3476095f9a17e7af803c4a6fd024eac06a08aaeb78b976cabb178114e94371099d32c1cf60f16ada53f6d17a5ece7f5043

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHX6166.exe
      Filesize

      379KB

      MD5

      942fc1e08648cf4e8bf607f6ebaca2cc

      SHA1

      6b83d4400e87130875d29a0186731aa6164cfb7a

      SHA256

      466c72556c87ee5a359b686fa4d0725f41443e673a24d060e63021f53bf552da

      SHA512

      04d30a5c6ab8ff20c7bfa13461a29a3476095f9a17e7af803c4a6fd024eac06a08aaeb78b976cabb178114e94371099d32c1cf60f16ada53f6d17a5ece7f5043

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr403932.exe
      Filesize

      15KB

      MD5

      71046b87d2daf253a6121a0a3131424d

      SHA1

      1bed27f5477c0e0477d67dccc1c0b09613100222

      SHA256

      546c3c6b876ebcd037a7c8e3fa84c3f112c32cb7d8935723838bc1e83f4f5648

      SHA512

      5a6ed5947477f08e314a19b44ee0ae4a753a7ae7dd638dd92e032e45f3a3d5aebd4fd4745612d40193db4b572026ec69a88486cf8b5aa4d2cbeacd318d3ce0a1

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr403932.exe
      Filesize

      15KB

      MD5

      71046b87d2daf253a6121a0a3131424d

      SHA1

      1bed27f5477c0e0477d67dccc1c0b09613100222

      SHA256

      546c3c6b876ebcd037a7c8e3fa84c3f112c32cb7d8935723838bc1e83f4f5648

      SHA512

      5a6ed5947477f08e314a19b44ee0ae4a753a7ae7dd638dd92e032e45f3a3d5aebd4fd4745612d40193db4b572026ec69a88486cf8b5aa4d2cbeacd318d3ce0a1

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku508585.exe
      Filesize

      294KB

      MD5

      a8dc7daaa8be95df0a0803f51cc3572d

      SHA1

      31290bb71d8e5ce4c45b1f41cfe50ccff0031afc

      SHA256

      1f2f29dd83f6c65ca18ecd5af1f8bd8e28b0043d3f07cc41d0c44b03192d717c

      SHA512

      d38af24e12e44a2d082d7062b7f531ea25ad157ba2fac415cb846c62fdc83f7ae8cbd7dac7d7fa844f93b8f500614890352075889c806a00b351dc0f1a0fca37

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku508585.exe
      Filesize

      294KB

      MD5

      a8dc7daaa8be95df0a0803f51cc3572d

      SHA1

      31290bb71d8e5ce4c45b1f41cfe50ccff0031afc

      SHA256

      1f2f29dd83f6c65ca18ecd5af1f8bd8e28b0043d3f07cc41d0c44b03192d717c

      SHA512

      d38af24e12e44a2d082d7062b7f531ea25ad157ba2fac415cb846c62fdc83f7ae8cbd7dac7d7fa844f93b8f500614890352075889c806a00b351dc0f1a0fca37

    • memory/524-1085-0x00000000001B0000-0x00000000001E2000-memory.dmp
      Filesize

      200KB

    • memory/524-1086-0x0000000004A80000-0x0000000004A90000-memory.dmp
      Filesize

      64KB

    • memory/2044-147-0x0000000000F00000-0x0000000000F0A000-memory.dmp
      Filesize

      40KB

    • memory/2588-189-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-201-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-155-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-156-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-158-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-160-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-162-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-164-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-166-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-168-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-170-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-172-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-174-0x0000000002640000-0x0000000002650000-memory.dmp
      Filesize

      64KB

    • memory/2588-176-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-177-0x0000000002640000-0x0000000002650000-memory.dmp
      Filesize

      64KB

    • memory/2588-175-0x0000000002640000-0x0000000002650000-memory.dmp
      Filesize

      64KB

    • memory/2588-179-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-181-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-183-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-185-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-187-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-153-0x0000000000740000-0x000000000078B000-memory.dmp
      Filesize

      300KB

    • memory/2588-191-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-193-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-195-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-197-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-199-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-154-0x0000000004AC0000-0x0000000005064000-memory.dmp
      Filesize

      5.6MB

    • memory/2588-203-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-205-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-207-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-209-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-211-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-213-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-215-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-217-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-219-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-221-0x0000000005070000-0x00000000050AF000-memory.dmp
      Filesize

      252KB

    • memory/2588-1064-0x00000000050C0000-0x00000000056D8000-memory.dmp
      Filesize

      6.1MB

    • memory/2588-1065-0x0000000005760000-0x000000000586A000-memory.dmp
      Filesize

      1.0MB

    • memory/2588-1066-0x00000000058A0000-0x00000000058B2000-memory.dmp
      Filesize

      72KB

    • memory/2588-1067-0x0000000002640000-0x0000000002650000-memory.dmp
      Filesize

      64KB

    • memory/2588-1068-0x00000000058C0000-0x00000000058FC000-memory.dmp
      Filesize

      240KB

    • memory/2588-1070-0x0000000005BB0000-0x0000000005C16000-memory.dmp
      Filesize

      408KB

    • memory/2588-1071-0x0000000006270000-0x0000000006302000-memory.dmp
      Filesize

      584KB

    • memory/2588-1072-0x0000000002640000-0x0000000002650000-memory.dmp
      Filesize

      64KB

    • memory/2588-1073-0x0000000002640000-0x0000000002650000-memory.dmp
      Filesize

      64KB

    • memory/2588-1074-0x0000000002640000-0x0000000002650000-memory.dmp
      Filesize

      64KB

    • memory/2588-1075-0x0000000002640000-0x0000000002650000-memory.dmp
      Filesize

      64KB

    • memory/2588-1076-0x0000000006470000-0x00000000064E6000-memory.dmp
      Filesize

      472KB

    • memory/2588-1077-0x0000000006510000-0x0000000006560000-memory.dmp
      Filesize

      320KB

    • memory/2588-1078-0x0000000006590000-0x0000000006752000-memory.dmp
      Filesize

      1.8MB

    • memory/2588-1079-0x0000000006760000-0x0000000006C8C000-memory.dmp
      Filesize

      5.2MB