Analysis

  • max time kernel
    51s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 20:36

General

  • Target

    c66e090419027194508a131e5cbaafe2752c5aa4468045b5c990a22eb4a8a7d7.exe

  • Size

    522KB

  • MD5

    a6c188daa512b45730f2cbeef28d2a08

  • SHA1

    126d87ba73aadbcbc7da36235db62efa94ca8c58

  • SHA256

    c66e090419027194508a131e5cbaafe2752c5aa4468045b5c990a22eb4a8a7d7

  • SHA512

    da15d19bc6caf71f9709ff2a01538d7ddf6c430a0cad0315545dad5a060b1f2d428761e37c3e2200ffd534210e3fac6d673d291e0eccb9fd145e24383966fcfc

  • SSDEEP

    12288:aMrwy90ojbqWmsVy77wJ3R8m3446zWKKiLaIalW9jBpBX:Sy/ObeuGumo4DKBLaDlW9NX

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 32 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c66e090419027194508a131e5cbaafe2752c5aa4468045b5c990a22eb4a8a7d7.exe
    "C:\Users\Admin\AppData\Local\Temp\c66e090419027194508a131e5cbaafe2752c5aa4468045b5c990a22eb4a8a7d7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziqn1662.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziqn1662.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3716
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr868174.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr868174.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4684
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku402492.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku402492.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3428
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3428 -s 1488
          4⤵
          • Program crash
          PID:2144
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr594211.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr594211.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4808
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3428 -ip 3428
    1⤵
      PID:4192

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr594211.exe
      Filesize

      175KB

      MD5

      5b91d3ad54eae27feb0c5e438a9b8908

      SHA1

      644e7ad0fb1e0edd4e3dacef4fe5095287ff3518

      SHA256

      eb82369510994d45a7e3525a92f5c512fed0ed0c4d6561e1308b5060e665c836

      SHA512

      14015e59eb5e73bb34793adef8bd6db24f0c904ace4a95abea092754e6e8ba5b24c586e4b1ca0a6c8222ff5fbf3fbb29bbe6ba6da51ed65d3685924de1555618

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr594211.exe
      Filesize

      175KB

      MD5

      5b91d3ad54eae27feb0c5e438a9b8908

      SHA1

      644e7ad0fb1e0edd4e3dacef4fe5095287ff3518

      SHA256

      eb82369510994d45a7e3525a92f5c512fed0ed0c4d6561e1308b5060e665c836

      SHA512

      14015e59eb5e73bb34793adef8bd6db24f0c904ace4a95abea092754e6e8ba5b24c586e4b1ca0a6c8222ff5fbf3fbb29bbe6ba6da51ed65d3685924de1555618

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziqn1662.exe
      Filesize

      380KB

      MD5

      842234350fc0e7f4225e3d6839ac4291

      SHA1

      4498352d9f96ad7deea3789af4c9d150f12558cb

      SHA256

      dfc908675401769761c89b8dd15b88d9686f235c7ebd8b4b1f9078f6ba80642b

      SHA512

      cacae75669c208b5d6c18a144f8f210e3af6dccbdca24695ad1bb95c54aec71148303875af347ffeaa53f70f742b9430755248625a0f12757b818eb34f3cccf8

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziqn1662.exe
      Filesize

      380KB

      MD5

      842234350fc0e7f4225e3d6839ac4291

      SHA1

      4498352d9f96ad7deea3789af4c9d150f12558cb

      SHA256

      dfc908675401769761c89b8dd15b88d9686f235c7ebd8b4b1f9078f6ba80642b

      SHA512

      cacae75669c208b5d6c18a144f8f210e3af6dccbdca24695ad1bb95c54aec71148303875af347ffeaa53f70f742b9430755248625a0f12757b818eb34f3cccf8

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr868174.exe
      Filesize

      15KB

      MD5

      7e10658aa7db8233824c2e9b0805790c

      SHA1

      39b4ed5b30897c7665f7cadf75aba8e3e780480d

      SHA256

      471c046582224a5fb931cf77380472c9c18ef6a36069cc4dfa6f02d14ece8b5b

      SHA512

      811b84e3b57f63147f8f99b0eefc64d922d230b2a283b9e48e3cdd67ddfa10d68f0c6980f4a445ef3f681d25ac0eeeb6a1eb985201c61f5d73147401fff4090b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr868174.exe
      Filesize

      15KB

      MD5

      7e10658aa7db8233824c2e9b0805790c

      SHA1

      39b4ed5b30897c7665f7cadf75aba8e3e780480d

      SHA256

      471c046582224a5fb931cf77380472c9c18ef6a36069cc4dfa6f02d14ece8b5b

      SHA512

      811b84e3b57f63147f8f99b0eefc64d922d230b2a283b9e48e3cdd67ddfa10d68f0c6980f4a445ef3f681d25ac0eeeb6a1eb985201c61f5d73147401fff4090b

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku402492.exe
      Filesize

      294KB

      MD5

      3662d5a93287b9e7ce53339265f777bb

      SHA1

      b4348d3bb05da2f40c5123d71c04a2184d722742

      SHA256

      b122f827d4efbacc744d95135da863efc172f94298a8a79e0979b478b0379c43

      SHA512

      b0f5689ac350570a1cc6b2792a44b9d4c6bc80e2bd5862c48109b08bb3c88924778747f8574537540bc504e458cb6c79f947767bd028445a1b77a5544973e910

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku402492.exe
      Filesize

      294KB

      MD5

      3662d5a93287b9e7ce53339265f777bb

      SHA1

      b4348d3bb05da2f40c5123d71c04a2184d722742

      SHA256

      b122f827d4efbacc744d95135da863efc172f94298a8a79e0979b478b0379c43

      SHA512

      b0f5689ac350570a1cc6b2792a44b9d4c6bc80e2bd5862c48109b08bb3c88924778747f8574537540bc504e458cb6c79f947767bd028445a1b77a5544973e910

    • memory/3428-154-0x0000000002160000-0x00000000021AB000-memory.dmp
      Filesize

      300KB

    • memory/3428-155-0x0000000002240000-0x0000000002250000-memory.dmp
      Filesize

      64KB

    • memory/3428-156-0x0000000004BC0000-0x0000000005164000-memory.dmp
      Filesize

      5.6MB

    • memory/3428-157-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/3428-158-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/3428-160-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/3428-162-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/3428-164-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/3428-169-0x0000000002240000-0x0000000002250000-memory.dmp
      Filesize

      64KB

    • memory/3428-167-0x0000000002240000-0x0000000002250000-memory.dmp
      Filesize

      64KB

    • memory/3428-166-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/3428-172-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/3428-170-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/3428-174-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/3428-176-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/3428-178-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/3428-180-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/3428-182-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/3428-184-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/3428-186-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/3428-188-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/3428-190-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/3428-192-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/3428-194-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/3428-198-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/3428-196-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/3428-200-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/3428-202-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/3428-204-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/3428-206-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/3428-208-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/3428-210-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/3428-212-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/3428-214-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/3428-218-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/3428-216-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/3428-220-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/3428-1065-0x0000000005170000-0x0000000005788000-memory.dmp
      Filesize

      6.1MB

    • memory/3428-1066-0x0000000005790000-0x000000000589A000-memory.dmp
      Filesize

      1.0MB

    • memory/3428-1067-0x00000000058A0000-0x00000000058B2000-memory.dmp
      Filesize

      72KB

    • memory/3428-1068-0x0000000005900000-0x000000000593C000-memory.dmp
      Filesize

      240KB

    • memory/3428-1069-0x0000000002240000-0x0000000002250000-memory.dmp
      Filesize

      64KB

    • memory/3428-1071-0x0000000002240000-0x0000000002250000-memory.dmp
      Filesize

      64KB

    • memory/3428-1072-0x0000000002240000-0x0000000002250000-memory.dmp
      Filesize

      64KB

    • memory/3428-1073-0x0000000002240000-0x0000000002250000-memory.dmp
      Filesize

      64KB

    • memory/3428-1074-0x0000000005BB0000-0x0000000005C42000-memory.dmp
      Filesize

      584KB

    • memory/3428-1075-0x0000000005C50000-0x0000000005CB6000-memory.dmp
      Filesize

      408KB

    • memory/3428-1076-0x0000000006370000-0x0000000006532000-memory.dmp
      Filesize

      1.8MB

    • memory/3428-1077-0x0000000006550000-0x0000000006A7C000-memory.dmp
      Filesize

      5.2MB

    • memory/3428-1078-0x0000000006CB0000-0x0000000006D26000-memory.dmp
      Filesize

      472KB

    • memory/3428-1079-0x0000000006D40000-0x0000000006D90000-memory.dmp
      Filesize

      320KB

    • memory/3428-1080-0x0000000002240000-0x0000000002250000-memory.dmp
      Filesize

      64KB

    • memory/4684-147-0x0000000000390000-0x000000000039A000-memory.dmp
      Filesize

      40KB

    • memory/4684-149-0x000000001AF40000-0x000000001B08E000-memory.dmp
      Filesize

      1.3MB

    • memory/4808-1086-0x0000000000080000-0x00000000000B2000-memory.dmp
      Filesize

      200KB

    • memory/4808-1087-0x0000000004990000-0x00000000049A0000-memory.dmp
      Filesize

      64KB