Analysis

  • max time kernel
    88s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 20:43

General

  • Target

    7057527f614b98191083948b992eb35543cd51110bcb6d5a1eb4ee53554d532b.exe

  • Size

    522KB

  • MD5

    8e98652835c14c2ff771d212c944d76f

  • SHA1

    f044e0c7ef50e8cf7efd5b59bfdfa6a072a39537

  • SHA256

    7057527f614b98191083948b992eb35543cd51110bcb6d5a1eb4ee53554d532b

  • SHA512

    4002b66fde08ac7d5b2fc4c83db8bb8c949b6448611f53425f7a82a9ce70d92132f5d963c6817c22a23b97bfc1b511c5acc2e0e8c4df8d15068c973db32cc178

  • SSDEEP

    12288:IMr3y90d2KgvXszvXmhE8Wl4pgzWKVokfyuh:PyG2KgqXIlW2ppKVb/

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7057527f614b98191083948b992eb35543cd51110bcb6d5a1eb4ee53554d532b.exe
    "C:\Users\Admin\AppData\Local\Temp\7057527f614b98191083948b992eb35543cd51110bcb6d5a1eb4ee53554d532b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1172
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAL9685.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAL9685.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:640
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr032692.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr032692.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1524
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku976935.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku976935.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4860
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4860 -s 1868
          4⤵
          • Program crash
          PID:436
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr294272.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr294272.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4608
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4860 -ip 4860
    1⤵
      PID:3616

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr294272.exe
      Filesize

      175KB

      MD5

      320ed9a07da95271730c1208187f92b7

      SHA1

      540d7cf11521bf862f6efe15edf266b953c72645

      SHA256

      491103d3490142133d1b05d920300d16c833afdf795f86efc34ae40b3b9e32af

      SHA512

      2190f25e73d7c6e4a76ae312d142fa1382e920661aff4d2440b638703af5c8d2b2ae65b6d3f09258b7587ed0218375edc6335c609cb511abac6738c9086654d4

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr294272.exe
      Filesize

      175KB

      MD5

      320ed9a07da95271730c1208187f92b7

      SHA1

      540d7cf11521bf862f6efe15edf266b953c72645

      SHA256

      491103d3490142133d1b05d920300d16c833afdf795f86efc34ae40b3b9e32af

      SHA512

      2190f25e73d7c6e4a76ae312d142fa1382e920661aff4d2440b638703af5c8d2b2ae65b6d3f09258b7587ed0218375edc6335c609cb511abac6738c9086654d4

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAL9685.exe
      Filesize

      379KB

      MD5

      8dcba5b9187d58981e8a0a29b6dddfc2

      SHA1

      051ea50174bf1aa0fb3c8719ac9138c0d4b89368

      SHA256

      7b8da4d87d37ede3272e1391f288aa0c45727898ab2947b1ab213852f264f23e

      SHA512

      5366c18063b9bae961ec09a462c3178e9539313eb5c680c4d6a62b96dd45dfd1d4eba7d2556d3a71ce93409f89ff16d23c91161569956b19e1a00dbe068c0128

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziAL9685.exe
      Filesize

      379KB

      MD5

      8dcba5b9187d58981e8a0a29b6dddfc2

      SHA1

      051ea50174bf1aa0fb3c8719ac9138c0d4b89368

      SHA256

      7b8da4d87d37ede3272e1391f288aa0c45727898ab2947b1ab213852f264f23e

      SHA512

      5366c18063b9bae961ec09a462c3178e9539313eb5c680c4d6a62b96dd45dfd1d4eba7d2556d3a71ce93409f89ff16d23c91161569956b19e1a00dbe068c0128

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr032692.exe
      Filesize

      15KB

      MD5

      e4700bed0cbf5b5ae164892f89957328

      SHA1

      5c76f312e68af9f5d7176b59ada0505dec2f33ed

      SHA256

      92b85679acb6803f0797d51f1a6c81bfccc45d69b2aaf57e4c53ae544576f189

      SHA512

      51716bbe72d0595bf11ef3f947f0c90b2b39a62547d6aef9daedeccd3be4de5afa3d84425f24c1bc250abf82335af53ac0c53c33c6c9519bb5e85bf1c9c9a08a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr032692.exe
      Filesize

      15KB

      MD5

      e4700bed0cbf5b5ae164892f89957328

      SHA1

      5c76f312e68af9f5d7176b59ada0505dec2f33ed

      SHA256

      92b85679acb6803f0797d51f1a6c81bfccc45d69b2aaf57e4c53ae544576f189

      SHA512

      51716bbe72d0595bf11ef3f947f0c90b2b39a62547d6aef9daedeccd3be4de5afa3d84425f24c1bc250abf82335af53ac0c53c33c6c9519bb5e85bf1c9c9a08a

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku976935.exe
      Filesize

      294KB

      MD5

      89d0e7d92aa29cf29be76a983bf09d72

      SHA1

      fc4113b72e19c53b61fc4616be8d4f6ac2c75949

      SHA256

      c5e84a7f29f81dbdb6372afdd5ac60c437457cf42281a4942c07ffa29fe0c8e0

      SHA512

      e50e8fc9cf510fc020a19880c9a8e5398a085617e757b21c19fc8a4b971af39645827b99c03a870d1bb3a2a1e99bbc891e2fc813f008d847cb093294e78f1beb

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku976935.exe
      Filesize

      294KB

      MD5

      89d0e7d92aa29cf29be76a983bf09d72

      SHA1

      fc4113b72e19c53b61fc4616be8d4f6ac2c75949

      SHA256

      c5e84a7f29f81dbdb6372afdd5ac60c437457cf42281a4942c07ffa29fe0c8e0

      SHA512

      e50e8fc9cf510fc020a19880c9a8e5398a085617e757b21c19fc8a4b971af39645827b99c03a870d1bb3a2a1e99bbc891e2fc813f008d847cb093294e78f1beb

    • memory/1524-147-0x00000000001A0000-0x00000000001AA000-memory.dmp
      Filesize

      40KB

    • memory/4608-1085-0x0000000000800000-0x0000000000832000-memory.dmp
      Filesize

      200KB

    • memory/4608-1086-0x0000000005430000-0x0000000005440000-memory.dmp
      Filesize

      64KB

    • memory/4608-1087-0x0000000005430000-0x0000000005440000-memory.dmp
      Filesize

      64KB

    • memory/4860-189-0x0000000004C50000-0x0000000004C60000-memory.dmp
      Filesize

      64KB

    • memory/4860-203-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-155-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-158-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-160-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-162-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-164-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-166-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-168-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-170-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-172-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-174-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-176-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-178-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-180-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-182-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-184-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-186-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-188-0x0000000004C50000-0x0000000004C60000-memory.dmp
      Filesize

      64KB

    • memory/4860-190-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-154-0x0000000004C60000-0x0000000005204000-memory.dmp
      Filesize

      5.6MB

    • memory/4860-193-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-191-0x0000000004C50000-0x0000000004C60000-memory.dmp
      Filesize

      64KB

    • memory/4860-195-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-197-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-199-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-201-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-156-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-205-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-207-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-209-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-211-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-213-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-215-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-217-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-219-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-221-0x0000000004BA0000-0x0000000004BDF000-memory.dmp
      Filesize

      252KB

    • memory/4860-1064-0x0000000005210000-0x0000000005828000-memory.dmp
      Filesize

      6.1MB

    • memory/4860-1065-0x00000000058A0000-0x00000000059AA000-memory.dmp
      Filesize

      1.0MB

    • memory/4860-1066-0x00000000059E0000-0x00000000059F2000-memory.dmp
      Filesize

      72KB

    • memory/4860-1067-0x0000000005A00000-0x0000000005A3C000-memory.dmp
      Filesize

      240KB

    • memory/4860-1068-0x0000000004C50000-0x0000000004C60000-memory.dmp
      Filesize

      64KB

    • memory/4860-1070-0x0000000005CF0000-0x0000000005D56000-memory.dmp
      Filesize

      408KB

    • memory/4860-1071-0x00000000063B0000-0x0000000006442000-memory.dmp
      Filesize

      584KB

    • memory/4860-1072-0x00000000064B0000-0x0000000006672000-memory.dmp
      Filesize

      1.8MB

    • memory/4860-1073-0x0000000006680000-0x0000000006BAC000-memory.dmp
      Filesize

      5.2MB

    • memory/4860-1074-0x0000000004C50000-0x0000000004C60000-memory.dmp
      Filesize

      64KB

    • memory/4860-1075-0x0000000004C50000-0x0000000004C60000-memory.dmp
      Filesize

      64KB

    • memory/4860-153-0x0000000000650000-0x000000000069B000-memory.dmp
      Filesize

      300KB

    • memory/4860-1076-0x0000000004C50000-0x0000000004C60000-memory.dmp
      Filesize

      64KB

    • memory/4860-1077-0x0000000006CD0000-0x0000000006D46000-memory.dmp
      Filesize

      472KB

    • memory/4860-1078-0x0000000006D70000-0x0000000006DC0000-memory.dmp
      Filesize

      320KB

    • memory/4860-1079-0x0000000004C50000-0x0000000004C60000-memory.dmp
      Filesize

      64KB