Analysis

  • max time kernel
    142s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 21:21

General

  • Target

    c3c8c2e3cf16b3058951ff2f33c67e596b5067c9641516313968a65245bbe5f6.exe

  • Size

    658KB

  • MD5

    4a319353aec3b483402e729984cc50f4

  • SHA1

    53e11af5939364ac186d01301e28054e3977679a

  • SHA256

    c3c8c2e3cf16b3058951ff2f33c67e596b5067c9641516313968a65245bbe5f6

  • SHA512

    6b442a030c8d251c0b3935cb2aa5e1b3994680a49f61006086cf893512d45b93a09ec98a57f39b535c8e97a65abdd7e82d1d45f73c43bba12e49b520e390331a

  • SSDEEP

    12288:vMrmy90gx+pRlkKZVRHtMi0QY+hT9xyDqes44qzWKE98vcpeJ3PQQ/aFEX:Jy3xKFdHt/xL7ret4zKkE3IQh

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c3c8c2e3cf16b3058951ff2f33c67e596b5067c9641516313968a65245bbe5f6.exe
    "C:\Users\Admin\AppData\Local\Temp\c3c8c2e3cf16b3058951ff2f33c67e596b5067c9641516313968a65245bbe5f6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:372
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un522763.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un522763.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4964
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9629.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9629.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1008
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1008 -s 1080
          4⤵
          • Program crash
          PID:3604
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3023.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3023.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5064
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5064 -s 1608
          4⤵
          • Program crash
          PID:1076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si880678.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si880678.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4672
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 400 -p 1008 -ip 1008
    1⤵
      PID:4236
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 5064 -ip 5064
      1⤵
        PID:1844
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:1968

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si880678.exe
        Filesize

        175KB

        MD5

        ab1a2efe6cd425e61774c3621a1bc373

        SHA1

        981a6d54f8fc5f5256859e8c2a4e3d885b7ea65e

        SHA256

        13610a72b747b944f85a4f9fe3a5c7f1affae844babfb82a0948140b1902caf3

        SHA512

        d73ad79c22dd5e07a2de7b08eb00d7a6286895eb8f00cf11c9b877c16c9b251bc6eec79269287796958907cb894b9bf3cdc292c46cf8e1a056d02362aa3c8316

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si880678.exe
        Filesize

        175KB

        MD5

        ab1a2efe6cd425e61774c3621a1bc373

        SHA1

        981a6d54f8fc5f5256859e8c2a4e3d885b7ea65e

        SHA256

        13610a72b747b944f85a4f9fe3a5c7f1affae844babfb82a0948140b1902caf3

        SHA512

        d73ad79c22dd5e07a2de7b08eb00d7a6286895eb8f00cf11c9b877c16c9b251bc6eec79269287796958907cb894b9bf3cdc292c46cf8e1a056d02362aa3c8316

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un522763.exe
        Filesize

        516KB

        MD5

        e2171804f1eed074049f1f8ae4d5f3c2

        SHA1

        27bd6ea4a2defcea4c4391898c96afa6f08385f5

        SHA256

        2f975a966690db41b3a2d999048c5e63493e407f67e0d6e9a3514e7ff983205c

        SHA512

        01442deae7cca41bab14d18e805e0a0dd6b2353da331931342687a9138c26e5e7326005ae175d6ebc276a233bcb5f486afca7d8ad1a872fcaed67e78f52fb9eb

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un522763.exe
        Filesize

        516KB

        MD5

        e2171804f1eed074049f1f8ae4d5f3c2

        SHA1

        27bd6ea4a2defcea4c4391898c96afa6f08385f5

        SHA256

        2f975a966690db41b3a2d999048c5e63493e407f67e0d6e9a3514e7ff983205c

        SHA512

        01442deae7cca41bab14d18e805e0a0dd6b2353da331931342687a9138c26e5e7326005ae175d6ebc276a233bcb5f486afca7d8ad1a872fcaed67e78f52fb9eb

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9629.exe
        Filesize

        235KB

        MD5

        62d25896cf9e75c5ce0dc811087e3d8a

        SHA1

        6c936219ab7bce2455fceee6f108ad42b95965f5

        SHA256

        af1d2f53b19df91589edfd9052d832a9c406991663306cb0ed256d0555b921f3

        SHA512

        84f1c94a1b906d237f26524e59c0c210edb5c03938e219e3f1fd6bcd5362d3359d5f36d12c007d0f448177e0b4c8b0878842827a00c84ef9ed4c0187fc932458

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9629.exe
        Filesize

        235KB

        MD5

        62d25896cf9e75c5ce0dc811087e3d8a

        SHA1

        6c936219ab7bce2455fceee6f108ad42b95965f5

        SHA256

        af1d2f53b19df91589edfd9052d832a9c406991663306cb0ed256d0555b921f3

        SHA512

        84f1c94a1b906d237f26524e59c0c210edb5c03938e219e3f1fd6bcd5362d3359d5f36d12c007d0f448177e0b4c8b0878842827a00c84ef9ed4c0187fc932458

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3023.exe
        Filesize

        294KB

        MD5

        654c4cf045e882c3d6489ac012bbc64d

        SHA1

        646d3e22796c3a2c264aaf66479652b7e4bce8ea

        SHA256

        b7916040bb9c7b7f5ab4da2fa972953fb3755ada8ede7f2773191274eada6202

        SHA512

        bf778589457ee97949b3a3a1d6e4c9ddb5f3bf1157dbfcf894231e3f609427e590f52b6272f4cfdb49c7ea565a3e14e0f4040c27de451a58ea01f0079543d223

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3023.exe
        Filesize

        294KB

        MD5

        654c4cf045e882c3d6489ac012bbc64d

        SHA1

        646d3e22796c3a2c264aaf66479652b7e4bce8ea

        SHA256

        b7916040bb9c7b7f5ab4da2fa972953fb3755ada8ede7f2773191274eada6202

        SHA512

        bf778589457ee97949b3a3a1d6e4c9ddb5f3bf1157dbfcf894231e3f609427e590f52b6272f4cfdb49c7ea565a3e14e0f4040c27de451a58ea01f0079543d223

      • memory/1008-148-0x0000000002100000-0x000000000212D000-memory.dmp
        Filesize

        180KB

      • memory/1008-149-0x0000000004BF0000-0x0000000004C00000-memory.dmp
        Filesize

        64KB

      • memory/1008-150-0x0000000004C00000-0x00000000051A4000-memory.dmp
        Filesize

        5.6MB

      • memory/1008-152-0x00000000025E0000-0x00000000025F2000-memory.dmp
        Filesize

        72KB

      • memory/1008-151-0x00000000025E0000-0x00000000025F2000-memory.dmp
        Filesize

        72KB

      • memory/1008-154-0x00000000025E0000-0x00000000025F2000-memory.dmp
        Filesize

        72KB

      • memory/1008-156-0x00000000025E0000-0x00000000025F2000-memory.dmp
        Filesize

        72KB

      • memory/1008-158-0x00000000025E0000-0x00000000025F2000-memory.dmp
        Filesize

        72KB

      • memory/1008-160-0x00000000025E0000-0x00000000025F2000-memory.dmp
        Filesize

        72KB

      • memory/1008-162-0x00000000025E0000-0x00000000025F2000-memory.dmp
        Filesize

        72KB

      • memory/1008-164-0x00000000025E0000-0x00000000025F2000-memory.dmp
        Filesize

        72KB

      • memory/1008-166-0x00000000025E0000-0x00000000025F2000-memory.dmp
        Filesize

        72KB

      • memory/1008-168-0x00000000025E0000-0x00000000025F2000-memory.dmp
        Filesize

        72KB

      • memory/1008-170-0x00000000025E0000-0x00000000025F2000-memory.dmp
        Filesize

        72KB

      • memory/1008-172-0x00000000025E0000-0x00000000025F2000-memory.dmp
        Filesize

        72KB

      • memory/1008-174-0x00000000025E0000-0x00000000025F2000-memory.dmp
        Filesize

        72KB

      • memory/1008-178-0x00000000025E0000-0x00000000025F2000-memory.dmp
        Filesize

        72KB

      • memory/1008-176-0x00000000025E0000-0x00000000025F2000-memory.dmp
        Filesize

        72KB

      • memory/1008-179-0x0000000004BF0000-0x0000000004C00000-memory.dmp
        Filesize

        64KB

      • memory/1008-180-0x0000000004BF0000-0x0000000004C00000-memory.dmp
        Filesize

        64KB

      • memory/1008-181-0x0000000000400000-0x00000000004A9000-memory.dmp
        Filesize

        676KB

      • memory/1008-182-0x0000000004BF0000-0x0000000004C00000-memory.dmp
        Filesize

        64KB

      • memory/1008-184-0x0000000004BF0000-0x0000000004C00000-memory.dmp
        Filesize

        64KB

      • memory/1008-185-0x0000000004BF0000-0x0000000004C00000-memory.dmp
        Filesize

        64KB

      • memory/1008-186-0x0000000000400000-0x00000000004A9000-memory.dmp
        Filesize

        676KB

      • memory/4672-1122-0x0000000000040000-0x0000000000072000-memory.dmp
        Filesize

        200KB

      • memory/4672-1125-0x0000000004950000-0x0000000004960000-memory.dmp
        Filesize

        64KB

      • memory/4672-1123-0x0000000004950000-0x0000000004960000-memory.dmp
        Filesize

        64KB

      • memory/5064-194-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/5064-228-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/5064-198-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/5064-200-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/5064-203-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/5064-202-0x0000000000640000-0x000000000068B000-memory.dmp
        Filesize

        300KB

      • memory/5064-204-0x00000000023C0000-0x00000000023D0000-memory.dmp
        Filesize

        64KB

      • memory/5064-206-0x00000000023C0000-0x00000000023D0000-memory.dmp
        Filesize

        64KB

      • memory/5064-208-0x00000000023C0000-0x00000000023D0000-memory.dmp
        Filesize

        64KB

      • memory/5064-207-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/5064-210-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/5064-212-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/5064-218-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/5064-216-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/5064-214-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/5064-220-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/5064-222-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/5064-224-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/5064-226-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/5064-196-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/5064-1101-0x0000000005200000-0x0000000005818000-memory.dmp
        Filesize

        6.1MB

      • memory/5064-1102-0x00000000058A0000-0x00000000059AA000-memory.dmp
        Filesize

        1.0MB

      • memory/5064-1103-0x00000000059E0000-0x00000000059F2000-memory.dmp
        Filesize

        72KB

      • memory/5064-1104-0x0000000005A00000-0x0000000005A3C000-memory.dmp
        Filesize

        240KB

      • memory/5064-1105-0x00000000023C0000-0x00000000023D0000-memory.dmp
        Filesize

        64KB

      • memory/5064-1107-0x0000000005CF0000-0x0000000005D82000-memory.dmp
        Filesize

        584KB

      • memory/5064-1108-0x0000000005D90000-0x0000000005DF6000-memory.dmp
        Filesize

        408KB

      • memory/5064-1109-0x00000000023C0000-0x00000000023D0000-memory.dmp
        Filesize

        64KB

      • memory/5064-1110-0x00000000023C0000-0x00000000023D0000-memory.dmp
        Filesize

        64KB

      • memory/5064-1111-0x00000000023C0000-0x00000000023D0000-memory.dmp
        Filesize

        64KB

      • memory/5064-1112-0x00000000023C0000-0x00000000023D0000-memory.dmp
        Filesize

        64KB

      • memory/5064-1113-0x00000000066F0000-0x0000000006766000-memory.dmp
        Filesize

        472KB

      • memory/5064-192-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/5064-191-0x0000000005070000-0x00000000050AF000-memory.dmp
        Filesize

        252KB

      • memory/5064-1114-0x0000000006780000-0x00000000067D0000-memory.dmp
        Filesize

        320KB

      • memory/5064-1115-0x00000000067E0000-0x00000000069A2000-memory.dmp
        Filesize

        1.8MB

      • memory/5064-1116-0x00000000069B0000-0x0000000006EDC000-memory.dmp
        Filesize

        5.2MB