Analysis

  • max time kernel
    84s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 20:49

General

  • Target

    376837e20cd2c2eb9d222f6cd466533af2dd6d91120be4d6afa1ce22ae93f5c4.exe

  • Size

    658KB

  • MD5

    5ee315913c2efed0822d596a4c0fe414

  • SHA1

    38ae83da297790ec584d2467178a3ab830244ad7

  • SHA256

    376837e20cd2c2eb9d222f6cd466533af2dd6d91120be4d6afa1ce22ae93f5c4

  • SHA512

    f48a831d1bf43ed84fc13da4bad4bab2de1d656bf8ffd3e1e3e51f35b16ed22b00fec30c0fb4cfa383ddcfce5ed74e14e782522d63957c57a3b11e1bb7856eec

  • SSDEEP

    12288:EMrSy90uAV03HZBzM3bZpgKBLt8flgjCb449zWKeX8vflrO4j:Oyde03HZBzMLHgKBhq8CE4AKpN

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\376837e20cd2c2eb9d222f6cd466533af2dd6d91120be4d6afa1ce22ae93f5c4.exe
    "C:\Users\Admin\AppData\Local\Temp\376837e20cd2c2eb9d222f6cd466533af2dd6d91120be4d6afa1ce22ae93f5c4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4224
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un740447.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un740447.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4688
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6368.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6368.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3388
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3388 -s 1092
          4⤵
          • Program crash
          PID:3372
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6690.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6690.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4540
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4540 -s 1344
          4⤵
          • Program crash
          PID:788
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si692033.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si692033.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3708
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3388 -ip 3388
    1⤵
      PID:3788
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4540 -ip 4540
      1⤵
        PID:2628

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si692033.exe
        Filesize

        175KB

        MD5

        f79ba38fc75bc7d44942e0fd6a98bf56

        SHA1

        03d352bd304ad7a64a5081e903f609fd3ef133e0

        SHA256

        80de7bb399f2c07ba62e786b01f9e441de743e3a982e0c4bb135214d0de38bdb

        SHA512

        74ce18a5960bc5d5536cbaf3171b88d4497f860708211b53be732e8e5045c14670258eec42fed5adb848ccee7268c8d9eaf9a81949ced44b8f97c00d9126d269

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si692033.exe
        Filesize

        175KB

        MD5

        f79ba38fc75bc7d44942e0fd6a98bf56

        SHA1

        03d352bd304ad7a64a5081e903f609fd3ef133e0

        SHA256

        80de7bb399f2c07ba62e786b01f9e441de743e3a982e0c4bb135214d0de38bdb

        SHA512

        74ce18a5960bc5d5536cbaf3171b88d4497f860708211b53be732e8e5045c14670258eec42fed5adb848ccee7268c8d9eaf9a81949ced44b8f97c00d9126d269

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un740447.exe
        Filesize

        516KB

        MD5

        3afc78098e1eb0689d5d955288b93427

        SHA1

        d1134597a34923978a9d00a13d4b79a59c8b467a

        SHA256

        0904de8f32b028a86bc0d36ba643cdd1b763b6020515d7bc784a3105d9581155

        SHA512

        784b288ed5f3f4049df567ccb9cee0c49a620403d8cb364dbb33de6abb67da2e9d4e7683d571f5729e36de545b07cbf275727b1db9a5e4cd3b82c89e40f9cb14

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un740447.exe
        Filesize

        516KB

        MD5

        3afc78098e1eb0689d5d955288b93427

        SHA1

        d1134597a34923978a9d00a13d4b79a59c8b467a

        SHA256

        0904de8f32b028a86bc0d36ba643cdd1b763b6020515d7bc784a3105d9581155

        SHA512

        784b288ed5f3f4049df567ccb9cee0c49a620403d8cb364dbb33de6abb67da2e9d4e7683d571f5729e36de545b07cbf275727b1db9a5e4cd3b82c89e40f9cb14

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6368.exe
        Filesize

        235KB

        MD5

        8953d277dc3ea5690e02f2ecaccf81ce

        SHA1

        0a66392d44c862cfa7ccbc4c05531d9b2427eddc

        SHA256

        28fd1fe811319cada8a1777faf96ad09e0d23d5d3aef9e28d41d59d2fada6b4e

        SHA512

        54cc553eb5937f434319faa60fe59ba56c220c92ca0daa9383379433f5eecc9053bad6e0712e6e4a0c8c74a1b6dc62ef7be6ca056ee5ee05c865fc3ad2432024

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6368.exe
        Filesize

        235KB

        MD5

        8953d277dc3ea5690e02f2ecaccf81ce

        SHA1

        0a66392d44c862cfa7ccbc4c05531d9b2427eddc

        SHA256

        28fd1fe811319cada8a1777faf96ad09e0d23d5d3aef9e28d41d59d2fada6b4e

        SHA512

        54cc553eb5937f434319faa60fe59ba56c220c92ca0daa9383379433f5eecc9053bad6e0712e6e4a0c8c74a1b6dc62ef7be6ca056ee5ee05c865fc3ad2432024

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6690.exe
        Filesize

        294KB

        MD5

        f5883968bbfefc2455bae562ad049c26

        SHA1

        f0f1269540ffb0531823a991d621285e9fb7327c

        SHA256

        bc0ceb3dc1e445c81cb625d23417dda2eee3585be07adb83b6c57ce59f85ce9b

        SHA512

        480ca85be4dc8757be949b666d3cdabacfafd6583717d2daf1f42bfe85d6c2869753d2eb54bef0e392c6d33b365a6fa67be96a3f6febb07da9cd86a89348c6bf

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6690.exe
        Filesize

        294KB

        MD5

        f5883968bbfefc2455bae562ad049c26

        SHA1

        f0f1269540ffb0531823a991d621285e9fb7327c

        SHA256

        bc0ceb3dc1e445c81cb625d23417dda2eee3585be07adb83b6c57ce59f85ce9b

        SHA512

        480ca85be4dc8757be949b666d3cdabacfafd6583717d2daf1f42bfe85d6c2869753d2eb54bef0e392c6d33b365a6fa67be96a3f6febb07da9cd86a89348c6bf

      • memory/3388-148-0x00000000005C0000-0x00000000005ED000-memory.dmp
        Filesize

        180KB

      • memory/3388-149-0x0000000004A90000-0x0000000005034000-memory.dmp
        Filesize

        5.6MB

      • memory/3388-150-0x00000000024D0000-0x00000000024E2000-memory.dmp
        Filesize

        72KB

      • memory/3388-151-0x00000000024D0000-0x00000000024E2000-memory.dmp
        Filesize

        72KB

      • memory/3388-153-0x00000000024D0000-0x00000000024E2000-memory.dmp
        Filesize

        72KB

      • memory/3388-155-0x00000000024D0000-0x00000000024E2000-memory.dmp
        Filesize

        72KB

      • memory/3388-159-0x00000000024D0000-0x00000000024E2000-memory.dmp
        Filesize

        72KB

      • memory/3388-157-0x00000000024D0000-0x00000000024E2000-memory.dmp
        Filesize

        72KB

      • memory/3388-161-0x00000000024D0000-0x00000000024E2000-memory.dmp
        Filesize

        72KB

      • memory/3388-163-0x00000000024D0000-0x00000000024E2000-memory.dmp
        Filesize

        72KB

      • memory/3388-165-0x00000000024D0000-0x00000000024E2000-memory.dmp
        Filesize

        72KB

      • memory/3388-167-0x00000000024D0000-0x00000000024E2000-memory.dmp
        Filesize

        72KB

      • memory/3388-169-0x00000000024D0000-0x00000000024E2000-memory.dmp
        Filesize

        72KB

      • memory/3388-171-0x00000000024D0000-0x00000000024E2000-memory.dmp
        Filesize

        72KB

      • memory/3388-173-0x00000000024D0000-0x00000000024E2000-memory.dmp
        Filesize

        72KB

      • memory/3388-175-0x00000000024D0000-0x00000000024E2000-memory.dmp
        Filesize

        72KB

      • memory/3388-177-0x00000000024D0000-0x00000000024E2000-memory.dmp
        Filesize

        72KB

      • memory/3388-178-0x0000000002480000-0x0000000002490000-memory.dmp
        Filesize

        64KB

      • memory/3388-179-0x0000000002480000-0x0000000002490000-memory.dmp
        Filesize

        64KB

      • memory/3388-180-0x0000000002480000-0x0000000002490000-memory.dmp
        Filesize

        64KB

      • memory/3388-181-0x0000000000400000-0x00000000004A9000-memory.dmp
        Filesize

        676KB

      • memory/3388-182-0x0000000002480000-0x0000000002490000-memory.dmp
        Filesize

        64KB

      • memory/3388-183-0x0000000002480000-0x0000000002490000-memory.dmp
        Filesize

        64KB

      • memory/3388-184-0x0000000002480000-0x0000000002490000-memory.dmp
        Filesize

        64KB

      • memory/3388-186-0x0000000000400000-0x00000000004A9000-memory.dmp
        Filesize

        676KB

      • memory/3708-1124-0x0000000005690000-0x00000000056A0000-memory.dmp
        Filesize

        64KB

      • memory/3708-1123-0x0000000000D30000-0x0000000000D62000-memory.dmp
        Filesize

        200KB

      • memory/4540-195-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/4540-547-0x0000000004C10000-0x0000000004C20000-memory.dmp
        Filesize

        64KB

      • memory/4540-197-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/4540-199-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/4540-201-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/4540-203-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/4540-205-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/4540-207-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/4540-209-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/4540-211-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/4540-213-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/4540-215-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/4540-217-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/4540-219-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/4540-221-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/4540-223-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/4540-225-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/4540-546-0x0000000004C10000-0x0000000004C20000-memory.dmp
        Filesize

        64KB

      • memory/4540-550-0x0000000004C10000-0x0000000004C20000-memory.dmp
        Filesize

        64KB

      • memory/4540-192-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/4540-1101-0x00000000052D0000-0x00000000058E8000-memory.dmp
        Filesize

        6.1MB

      • memory/4540-1102-0x00000000058F0000-0x00000000059FA000-memory.dmp
        Filesize

        1.0MB

      • memory/4540-1103-0x0000000004BF0000-0x0000000004C02000-memory.dmp
        Filesize

        72KB

      • memory/4540-1104-0x0000000005A00000-0x0000000005A3C000-memory.dmp
        Filesize

        240KB

      • memory/4540-1105-0x0000000004C10000-0x0000000004C20000-memory.dmp
        Filesize

        64KB

      • memory/4540-1106-0x0000000005CF0000-0x0000000005D56000-memory.dmp
        Filesize

        408KB

      • memory/4540-1107-0x00000000063B0000-0x0000000006442000-memory.dmp
        Filesize

        584KB

      • memory/4540-1109-0x0000000000770000-0x00000000007BB000-memory.dmp
        Filesize

        300KB

      • memory/4540-1110-0x0000000004C10000-0x0000000004C20000-memory.dmp
        Filesize

        64KB

      • memory/4540-1111-0x0000000004C10000-0x0000000004C20000-memory.dmp
        Filesize

        64KB

      • memory/4540-1112-0x0000000004C10000-0x0000000004C20000-memory.dmp
        Filesize

        64KB

      • memory/4540-1113-0x00000000064C0000-0x0000000006536000-memory.dmp
        Filesize

        472KB

      • memory/4540-1114-0x0000000006540000-0x0000000006590000-memory.dmp
        Filesize

        320KB

      • memory/4540-1115-0x00000000066D0000-0x0000000006892000-memory.dmp
        Filesize

        1.8MB

      • memory/4540-193-0x0000000002500000-0x000000000253F000-memory.dmp
        Filesize

        252KB

      • memory/4540-191-0x0000000000770000-0x00000000007BB000-memory.dmp
        Filesize

        300KB

      • memory/4540-1116-0x0000000004C10000-0x0000000004C20000-memory.dmp
        Filesize

        64KB

      • memory/4540-1117-0x00000000068A0000-0x0000000006DCC000-memory.dmp
        Filesize

        5.2MB