Analysis

  • max time kernel
    130s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 20:48

General

  • Target

    b7a60b46cb00919b2498f57274abc36e2d5ca2c3acfca59f720a5ca41bd510ae.exe

  • Size

    658KB

  • MD5

    a219bc4df317db3efba5ecb2f7506b1e

  • SHA1

    95912cba1d89b0e587f5fc4e5b16d7c3000a7050

  • SHA256

    b7a60b46cb00919b2498f57274abc36e2d5ca2c3acfca59f720a5ca41bd510ae

  • SHA512

    726226a572240ffc81beab7c433f0579ccc35172dee3ac9ca719b9c94dd43e02bddca8575ece0fb806a0e33a4241f0f0393c23293e55756b3f9413ecd04db1f1

  • SSDEEP

    12288:SMr0y905H0h3k026S3rkxtLbEmtwL+a8TypDbczhpLt8FyHdM344QzWKOr8vD0Z3:yy8UU02PsEmtwyaLuhphr9Mo4ZKO3h

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7a60b46cb00919b2498f57274abc36e2d5ca2c3acfca59f720a5ca41bd510ae.exe
    "C:\Users\Admin\AppData\Local\Temp\b7a60b46cb00919b2498f57274abc36e2d5ca2c3acfca59f720a5ca41bd510ae.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4640
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un229784.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un229784.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1248
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3824.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3824.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1648
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1648 -s 1100
          4⤵
          • Program crash
          PID:1368
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8906.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8906.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4088
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 1328
          4⤵
          • Program crash
          PID:2296
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si385572.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si385572.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:848
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 1648 -ip 1648
    1⤵
      PID:4032
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4088 -ip 4088
      1⤵
        PID:3212
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:5008

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si385572.exe
        Filesize

        175KB

        MD5

        223ee225978f6e0fe48938c13bf351bb

        SHA1

        1076345f45a456fc4de006a5dd268f96cb4bd089

        SHA256

        632541aceb1f2e80c0ebe5f778eb6feaaac3b14883a95dd01da155aa96f9ee18

        SHA512

        7642ab81e432480502db80babff05801ec192784aa30b0eafd790d935c0f4362f53eeac8cbb608f4eb70a4703649f2d9a44dd0211113f5ebaaf901c2223cda1b

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si385572.exe
        Filesize

        175KB

        MD5

        223ee225978f6e0fe48938c13bf351bb

        SHA1

        1076345f45a456fc4de006a5dd268f96cb4bd089

        SHA256

        632541aceb1f2e80c0ebe5f778eb6feaaac3b14883a95dd01da155aa96f9ee18

        SHA512

        7642ab81e432480502db80babff05801ec192784aa30b0eafd790d935c0f4362f53eeac8cbb608f4eb70a4703649f2d9a44dd0211113f5ebaaf901c2223cda1b

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un229784.exe
        Filesize

        516KB

        MD5

        94c577a369c0d428e5da328827bb08be

        SHA1

        1c3a732c9ad3989271518f1b8e0d99a2f3384bf4

        SHA256

        7350ab20455eb2aa0d7843d5e895d129891f820eff981302cfe6d8de88edb8ff

        SHA512

        24fc83828450bb71e0a85f1856195f5b5f86a4cdd2b341b01783ad0627974b71490fc4d39ef3ea0783d9957a46e47ab1a25e3cf5968a9aa663e2a7aee12171df

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un229784.exe
        Filesize

        516KB

        MD5

        94c577a369c0d428e5da328827bb08be

        SHA1

        1c3a732c9ad3989271518f1b8e0d99a2f3384bf4

        SHA256

        7350ab20455eb2aa0d7843d5e895d129891f820eff981302cfe6d8de88edb8ff

        SHA512

        24fc83828450bb71e0a85f1856195f5b5f86a4cdd2b341b01783ad0627974b71490fc4d39ef3ea0783d9957a46e47ab1a25e3cf5968a9aa663e2a7aee12171df

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3824.exe
        Filesize

        235KB

        MD5

        03ad908afdb8344b2a61303bdf34d980

        SHA1

        2de81e920d61118d9fb1845891fa102683c4f808

        SHA256

        c20c58c59cff3d8c3a88fc5382d5ea6ee14022360c2ec41e543094d9775371d2

        SHA512

        361521e2ac5d880160849dd50affb8e93df6cf37814a247729f7c7558a5e61481968cf1484cb10da56a99859a6dbac45dbd99401d172b636df8b6e79dc579ade

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3824.exe
        Filesize

        235KB

        MD5

        03ad908afdb8344b2a61303bdf34d980

        SHA1

        2de81e920d61118d9fb1845891fa102683c4f808

        SHA256

        c20c58c59cff3d8c3a88fc5382d5ea6ee14022360c2ec41e543094d9775371d2

        SHA512

        361521e2ac5d880160849dd50affb8e93df6cf37814a247729f7c7558a5e61481968cf1484cb10da56a99859a6dbac45dbd99401d172b636df8b6e79dc579ade

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8906.exe
        Filesize

        294KB

        MD5

        ec486b53e4f67e7ea0bd2d5ef190401e

        SHA1

        1c5db35b5535388ca2d6fa86a2b57beea4f7858c

        SHA256

        5cf1087d6cb3a895f0068a4ca1bdbb2380213b4b370901ea04375d6cf2c98587

        SHA512

        5ea3923f4daca2eea513647654a48d09382abc8c4a01abd6fbc606fb49697f59b366e06c799444a534a5b9bf90f6f901e02ae485881bf807284c81a2a85b3fed

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8906.exe
        Filesize

        294KB

        MD5

        ec486b53e4f67e7ea0bd2d5ef190401e

        SHA1

        1c5db35b5535388ca2d6fa86a2b57beea4f7858c

        SHA256

        5cf1087d6cb3a895f0068a4ca1bdbb2380213b4b370901ea04375d6cf2c98587

        SHA512

        5ea3923f4daca2eea513647654a48d09382abc8c4a01abd6fbc606fb49697f59b366e06c799444a534a5b9bf90f6f901e02ae485881bf807284c81a2a85b3fed

      • memory/848-1122-0x0000000000380000-0x00000000003B2000-memory.dmp
        Filesize

        200KB

      • memory/848-1123-0x0000000004C50000-0x0000000004C60000-memory.dmp
        Filesize

        64KB

      • memory/1648-159-0x00000000023B0000-0x00000000023C2000-memory.dmp
        Filesize

        72KB

      • memory/1648-177-0x00000000023B0000-0x00000000023C2000-memory.dmp
        Filesize

        72KB

      • memory/1648-151-0x00000000023B0000-0x00000000023C2000-memory.dmp
        Filesize

        72KB

      • memory/1648-153-0x00000000023B0000-0x00000000023C2000-memory.dmp
        Filesize

        72KB

      • memory/1648-155-0x00000000023B0000-0x00000000023C2000-memory.dmp
        Filesize

        72KB

      • memory/1648-157-0x00000000023B0000-0x00000000023C2000-memory.dmp
        Filesize

        72KB

      • memory/1648-149-0x0000000004B70000-0x0000000005114000-memory.dmp
        Filesize

        5.6MB

      • memory/1648-163-0x00000000023B0000-0x00000000023C2000-memory.dmp
        Filesize

        72KB

      • memory/1648-161-0x00000000023B0000-0x00000000023C2000-memory.dmp
        Filesize

        72KB

      • memory/1648-165-0x00000000023B0000-0x00000000023C2000-memory.dmp
        Filesize

        72KB

      • memory/1648-167-0x00000000023B0000-0x00000000023C2000-memory.dmp
        Filesize

        72KB

      • memory/1648-169-0x00000000023B0000-0x00000000023C2000-memory.dmp
        Filesize

        72KB

      • memory/1648-171-0x00000000023B0000-0x00000000023C2000-memory.dmp
        Filesize

        72KB

      • memory/1648-150-0x00000000023B0000-0x00000000023C2000-memory.dmp
        Filesize

        72KB

      • memory/1648-175-0x00000000023B0000-0x00000000023C2000-memory.dmp
        Filesize

        72KB

      • memory/1648-173-0x00000000023B0000-0x00000000023C2000-memory.dmp
        Filesize

        72KB

      • memory/1648-178-0x0000000004B60000-0x0000000004B70000-memory.dmp
        Filesize

        64KB

      • memory/1648-179-0x0000000004B60000-0x0000000004B70000-memory.dmp
        Filesize

        64KB

      • memory/1648-180-0x0000000004B60000-0x0000000004B70000-memory.dmp
        Filesize

        64KB

      • memory/1648-181-0x0000000000400000-0x00000000004A9000-memory.dmp
        Filesize

        676KB

      • memory/1648-183-0x0000000004B60000-0x0000000004B70000-memory.dmp
        Filesize

        64KB

      • memory/1648-184-0x0000000004B60000-0x0000000004B70000-memory.dmp
        Filesize

        64KB

      • memory/1648-185-0x0000000004B60000-0x0000000004B70000-memory.dmp
        Filesize

        64KB

      • memory/1648-186-0x0000000000400000-0x00000000004A9000-memory.dmp
        Filesize

        676KB

      • memory/1648-148-0x0000000000530000-0x000000000055D000-memory.dmp
        Filesize

        180KB

      • memory/4088-192-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/4088-226-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/4088-196-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/4088-198-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/4088-200-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/4088-203-0x00000000028C0000-0x00000000028D0000-memory.dmp
        Filesize

        64KB

      • memory/4088-204-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/4088-208-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/4088-207-0x00000000028C0000-0x00000000028D0000-memory.dmp
        Filesize

        64KB

      • memory/4088-205-0x00000000028C0000-0x00000000028D0000-memory.dmp
        Filesize

        64KB

      • memory/4088-202-0x0000000002100000-0x000000000214B000-memory.dmp
        Filesize

        300KB

      • memory/4088-212-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/4088-210-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/4088-214-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/4088-216-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/4088-218-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/4088-220-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/4088-222-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/4088-224-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/4088-194-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/4088-228-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/4088-1101-0x0000000005230000-0x0000000005848000-memory.dmp
        Filesize

        6.1MB

      • memory/4088-1102-0x0000000005850000-0x000000000595A000-memory.dmp
        Filesize

        1.0MB

      • memory/4088-1103-0x0000000002860000-0x0000000002872000-memory.dmp
        Filesize

        72KB

      • memory/4088-1104-0x0000000002880000-0x00000000028BC000-memory.dmp
        Filesize

        240KB

      • memory/4088-1105-0x00000000028C0000-0x00000000028D0000-memory.dmp
        Filesize

        64KB

      • memory/4088-1106-0x0000000005BB0000-0x0000000005C16000-memory.dmp
        Filesize

        408KB

      • memory/4088-1107-0x0000000006260000-0x00000000062F2000-memory.dmp
        Filesize

        584KB

      • memory/4088-1109-0x0000000006370000-0x0000000006532000-memory.dmp
        Filesize

        1.8MB

      • memory/4088-1110-0x0000000006540000-0x0000000006A6C000-memory.dmp
        Filesize

        5.2MB

      • memory/4088-1111-0x00000000028C0000-0x00000000028D0000-memory.dmp
        Filesize

        64KB

      • memory/4088-1112-0x00000000028C0000-0x00000000028D0000-memory.dmp
        Filesize

        64KB

      • memory/4088-1113-0x00000000028C0000-0x00000000028D0000-memory.dmp
        Filesize

        64KB

      • memory/4088-191-0x0000000002780000-0x00000000027BF000-memory.dmp
        Filesize

        252KB

      • memory/4088-1114-0x0000000006BC0000-0x0000000006C36000-memory.dmp
        Filesize

        472KB

      • memory/4088-1115-0x0000000006C40000-0x0000000006C90000-memory.dmp
        Filesize

        320KB

      • memory/4088-1116-0x00000000028C0000-0x00000000028D0000-memory.dmp
        Filesize

        64KB