Analysis

  • max time kernel
    106s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 20:37

General

  • Target

    7e6c03c25ed42e60c29588b5829a7e0cdade1f8e7bc86518536c928e2da01416.exe

  • Size

    658KB

  • MD5

    43e4f58323683d6cf34c890aac6bfc98

  • SHA1

    9016fa07be5b549da3bfa08e7da38bccc4c87cba

  • SHA256

    7e6c03c25ed42e60c29588b5829a7e0cdade1f8e7bc86518536c928e2da01416

  • SHA512

    0bbaf57622eaa0d11979f93d6d053dbffb512b13e757c643b221ec439321dcd6d6643eadf8bbddf092450a4d97760cfe9e6ab80a6b0696f7eb794382bb449211

  • SSDEEP

    12288:8Mroy90KtmUAd3m1mAE1DWwp8TyYkfAPWiLt800JrM3440zWKCT8vrd+x:kyJtevB1D3pu+ihcFMo4dKUx

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e6c03c25ed42e60c29588b5829a7e0cdade1f8e7bc86518536c928e2da01416.exe
    "C:\Users\Admin\AppData\Local\Temp\7e6c03c25ed42e60c29588b5829a7e0cdade1f8e7bc86518536c928e2da01416.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1832
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un003941.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un003941.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1868
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5676.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5676.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:428
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 428 -s 1092
          4⤵
          • Program crash
          PID:3616
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8310.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8310.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5100
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5100 -s 1328
          4⤵
          • Program crash
          PID:4824
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si824040.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si824040.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4372
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 428 -ip 428
    1⤵
      PID:3428
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5100 -ip 5100
      1⤵
        PID:5032

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si824040.exe

        Filesize

        175KB

        MD5

        fdecfa3560cae7d802a572d0aa896b7e

        SHA1

        3f1a86406e52f054db8156395533660d3353897c

        SHA256

        c6697d11fafe77828e1674b34e93177338f8bfbfdf4e275c6278e9809194396f

        SHA512

        045f9769c46bee64400f48a37d93c29282079e863b5a1f5714b3df8fd51dec03a70357b304438d212db4832a49d5786df29722d1eba863290c649376df418240

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si824040.exe

        Filesize

        175KB

        MD5

        fdecfa3560cae7d802a572d0aa896b7e

        SHA1

        3f1a86406e52f054db8156395533660d3353897c

        SHA256

        c6697d11fafe77828e1674b34e93177338f8bfbfdf4e275c6278e9809194396f

        SHA512

        045f9769c46bee64400f48a37d93c29282079e863b5a1f5714b3df8fd51dec03a70357b304438d212db4832a49d5786df29722d1eba863290c649376df418240

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un003941.exe

        Filesize

        516KB

        MD5

        8ef3ca7ff6734cb6d5a4eff68d0b0ffd

        SHA1

        1df4a669dff2b825e833905274fadd7178c06d82

        SHA256

        8ec9c6476b06c51b8d41b1e44b611a13a6b3c40ad81fa3b44f764d755d0d9f16

        SHA512

        e0801f20c3ca2a9f287a1fd2be639559868d0ad87d09cb3f709d6a5f546c02f39d079ec1628ac7ead60a02f53bbe825322f06c22f45329cc1e823dbe5edef34e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un003941.exe

        Filesize

        516KB

        MD5

        8ef3ca7ff6734cb6d5a4eff68d0b0ffd

        SHA1

        1df4a669dff2b825e833905274fadd7178c06d82

        SHA256

        8ec9c6476b06c51b8d41b1e44b611a13a6b3c40ad81fa3b44f764d755d0d9f16

        SHA512

        e0801f20c3ca2a9f287a1fd2be639559868d0ad87d09cb3f709d6a5f546c02f39d079ec1628ac7ead60a02f53bbe825322f06c22f45329cc1e823dbe5edef34e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5676.exe

        Filesize

        235KB

        MD5

        dd82c0457060cf673b88e69201fdf1ad

        SHA1

        b4fdc551d60da2deec1a5fae3886cbbec49180f9

        SHA256

        5ae30a60fbcf525b218c2c7b3aa4bf94f38d6e40f7cab42db4356ed0fdcf1110

        SHA512

        0a982706414d38fa5a915327208e7ac8b314383b6a630835ec3e88ebd0d5c242688c35bc86ea41179f504c15e5e1d08bfcc0907061cf4a37011bf7f7bfec54df

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5676.exe

        Filesize

        235KB

        MD5

        dd82c0457060cf673b88e69201fdf1ad

        SHA1

        b4fdc551d60da2deec1a5fae3886cbbec49180f9

        SHA256

        5ae30a60fbcf525b218c2c7b3aa4bf94f38d6e40f7cab42db4356ed0fdcf1110

        SHA512

        0a982706414d38fa5a915327208e7ac8b314383b6a630835ec3e88ebd0d5c242688c35bc86ea41179f504c15e5e1d08bfcc0907061cf4a37011bf7f7bfec54df

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8310.exe

        Filesize

        294KB

        MD5

        2655e9a4357ead1ecc2f30ca719ad753

        SHA1

        fb2a6fae20d6dcf3cbc39063af03783b918f400c

        SHA256

        bd592af2ffd30b6089070ea8fbbf53f3d84d9aaadc54d2cbcab26b7ea349449d

        SHA512

        7f6bc49ebdbee73ae95ed8223aca0aa6ea79f8535fb0f07afb3cb0d315fda6b85cd2d96fdd668e4ab1614cdf13f6662097561271ad6c0a9d063b61b6037b9071

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8310.exe

        Filesize

        294KB

        MD5

        2655e9a4357ead1ecc2f30ca719ad753

        SHA1

        fb2a6fae20d6dcf3cbc39063af03783b918f400c

        SHA256

        bd592af2ffd30b6089070ea8fbbf53f3d84d9aaadc54d2cbcab26b7ea349449d

        SHA512

        7f6bc49ebdbee73ae95ed8223aca0aa6ea79f8535fb0f07afb3cb0d315fda6b85cd2d96fdd668e4ab1614cdf13f6662097561271ad6c0a9d063b61b6037b9071

      • memory/428-161-0x0000000002410000-0x0000000002422000-memory.dmp

        Filesize

        72KB

      • memory/428-171-0x0000000002410000-0x0000000002422000-memory.dmp

        Filesize

        72KB

      • memory/428-150-0x0000000002410000-0x0000000002422000-memory.dmp

        Filesize

        72KB

      • memory/428-151-0x0000000002410000-0x0000000002422000-memory.dmp

        Filesize

        72KB

      • memory/428-153-0x0000000002410000-0x0000000002422000-memory.dmp

        Filesize

        72KB

      • memory/428-155-0x0000000002410000-0x0000000002422000-memory.dmp

        Filesize

        72KB

      • memory/428-157-0x0000000002410000-0x0000000002422000-memory.dmp

        Filesize

        72KB

      • memory/428-159-0x0000000002410000-0x0000000002422000-memory.dmp

        Filesize

        72KB

      • memory/428-148-0x0000000000600000-0x000000000062D000-memory.dmp

        Filesize

        180KB

      • memory/428-163-0x0000000002410000-0x0000000002422000-memory.dmp

        Filesize

        72KB

      • memory/428-165-0x0000000002410000-0x0000000002422000-memory.dmp

        Filesize

        72KB

      • memory/428-167-0x0000000002410000-0x0000000002422000-memory.dmp

        Filesize

        72KB

      • memory/428-169-0x0000000002410000-0x0000000002422000-memory.dmp

        Filesize

        72KB

      • memory/428-149-0x0000000004BA0000-0x0000000005144000-memory.dmp

        Filesize

        5.6MB

      • memory/428-173-0x0000000002410000-0x0000000002422000-memory.dmp

        Filesize

        72KB

      • memory/428-175-0x0000000002410000-0x0000000002422000-memory.dmp

        Filesize

        72KB

      • memory/428-177-0x0000000002410000-0x0000000002422000-memory.dmp

        Filesize

        72KB

      • memory/428-178-0x0000000004B90000-0x0000000004BA0000-memory.dmp

        Filesize

        64KB

      • memory/428-179-0x0000000004B90000-0x0000000004BA0000-memory.dmp

        Filesize

        64KB

      • memory/428-180-0x0000000004B90000-0x0000000004BA0000-memory.dmp

        Filesize

        64KB

      • memory/428-181-0x0000000000400000-0x00000000004A9000-memory.dmp

        Filesize

        676KB

      • memory/428-183-0x0000000004B90000-0x0000000004BA0000-memory.dmp

        Filesize

        64KB

      • memory/428-184-0x0000000004B90000-0x0000000004BA0000-memory.dmp

        Filesize

        64KB

      • memory/428-185-0x0000000004B90000-0x0000000004BA0000-memory.dmp

        Filesize

        64KB

      • memory/428-186-0x0000000000400000-0x00000000004A9000-memory.dmp

        Filesize

        676KB

      • memory/4372-1121-0x0000000000490000-0x00000000004C2000-memory.dmp

        Filesize

        200KB

      • memory/4372-1122-0x00000000050F0000-0x0000000005100000-memory.dmp

        Filesize

        64KB

      • memory/5100-191-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/5100-224-0x0000000002130000-0x0000000002140000-memory.dmp

        Filesize

        64KB

      • memory/5100-196-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/5100-198-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/5100-200-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/5100-202-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/5100-204-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/5100-206-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/5100-208-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/5100-210-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/5100-212-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/5100-214-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/5100-216-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/5100-218-0x0000000000840000-0x000000000088B000-memory.dmp

        Filesize

        300KB

      • memory/5100-220-0x0000000002130000-0x0000000002140000-memory.dmp

        Filesize

        64KB

      • memory/5100-219-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/5100-222-0x0000000002130000-0x0000000002140000-memory.dmp

        Filesize

        64KB

      • memory/5100-194-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/5100-226-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/5100-228-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/5100-223-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/5100-1101-0x0000000005200000-0x0000000005818000-memory.dmp

        Filesize

        6.1MB

      • memory/5100-1102-0x00000000058A0000-0x00000000059AA000-memory.dmp

        Filesize

        1.0MB

      • memory/5100-1103-0x00000000059E0000-0x00000000059F2000-memory.dmp

        Filesize

        72KB

      • memory/5100-1104-0x0000000005A00000-0x0000000005A3C000-memory.dmp

        Filesize

        240KB

      • memory/5100-1105-0x0000000002130000-0x0000000002140000-memory.dmp

        Filesize

        64KB

      • memory/5100-1107-0x0000000005CF0000-0x0000000005D56000-memory.dmp

        Filesize

        408KB

      • memory/5100-1108-0x00000000064B0000-0x0000000006542000-memory.dmp

        Filesize

        584KB

      • memory/5100-1109-0x00000000065B0000-0x0000000006772000-memory.dmp

        Filesize

        1.8MB

      • memory/5100-1110-0x0000000006780000-0x0000000006CAC000-memory.dmp

        Filesize

        5.2MB

      • memory/5100-1111-0x0000000002130000-0x0000000002140000-memory.dmp

        Filesize

        64KB

      • memory/5100-1112-0x0000000002130000-0x0000000002140000-memory.dmp

        Filesize

        64KB

      • memory/5100-192-0x0000000005050000-0x000000000508F000-memory.dmp

        Filesize

        252KB

      • memory/5100-1113-0x0000000006E00000-0x0000000006E76000-memory.dmp

        Filesize

        472KB

      • memory/5100-1114-0x0000000006E80000-0x0000000006ED0000-memory.dmp

        Filesize

        320KB

      • memory/5100-1115-0x0000000002130000-0x0000000002140000-memory.dmp

        Filesize

        64KB