Analysis

  • max time kernel
    62s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 20:51

General

  • Target

    57db639ed8374970ec4fbb8ca1df2fb41e92aa13c4ac55e611c1e1c79c639c20.exe

  • Size

    521KB

  • MD5

    abc75d0e4f86f117119bb2ac8bce2248

  • SHA1

    8829da2eb04c50c08e3700e3ed4bc87c86f48def

  • SHA256

    57db639ed8374970ec4fbb8ca1df2fb41e92aa13c4ac55e611c1e1c79c639c20

  • SHA512

    9a980b8c7fc4dc39876066356b96bbb40563a7cd2245551177bd1fa9564f74944fdb9179053902494c92dbbb77ba734b5940273938995637da58001824c50539

  • SSDEEP

    12288:yMrRy90VXSKbnFiBrzNc8ljv8ea447zWKi4YJXNi3J8HPnsEC:jysnFiBrzyyUeb4mKrYJekPn4

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\57db639ed8374970ec4fbb8ca1df2fb41e92aa13c4ac55e611c1e1c79c639c20.exe
    "C:\Users\Admin\AppData\Local\Temp\57db639ed8374970ec4fbb8ca1df2fb41e92aa13c4ac55e611c1e1c79c639c20.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicB7153.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicB7153.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4056
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr449358.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr449358.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4288
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku124922.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku124922.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3604
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 1348
          4⤵
          • Program crash
          PID:4612
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr801688.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr801688.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4172
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3604 -ip 3604
    1⤵
      PID:3672

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr801688.exe
      Filesize

      175KB

      MD5

      317432ac22547442916b73abb1ac9391

      SHA1

      a295c636369212933ce7244d93c7e54e09a0c74e

      SHA256

      df113e106c9028deb76daac9b6672a11a525f82e48859bb66acc5b00103efcba

      SHA512

      6c6f21b2312402ec24bd4a3dd9ad1addca52abb4579fff9f0e94dff6efbc275a11c3d345528d62cb46ed999306e2590ce42278a8a51467b824d0561b4462d06e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr801688.exe
      Filesize

      175KB

      MD5

      317432ac22547442916b73abb1ac9391

      SHA1

      a295c636369212933ce7244d93c7e54e09a0c74e

      SHA256

      df113e106c9028deb76daac9b6672a11a525f82e48859bb66acc5b00103efcba

      SHA512

      6c6f21b2312402ec24bd4a3dd9ad1addca52abb4579fff9f0e94dff6efbc275a11c3d345528d62cb46ed999306e2590ce42278a8a51467b824d0561b4462d06e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicB7153.exe
      Filesize

      379KB

      MD5

      145129847b47b70b74f6aba2e2239aea

      SHA1

      ebf66c2a5de5b09b7653cfae64533956832206a5

      SHA256

      0ac36bf008277f5fc278d742f72dc811c2e80d446f11a319b470f859168b01af

      SHA512

      0ac0abd422af1ec5336c0b3cba4be90482916791c4ed474c8d22040940a40509b52ee6a4a4751713981440a0d7df6645fc081805891d06a7dbd2ecf11e8a3d18

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zicB7153.exe
      Filesize

      379KB

      MD5

      145129847b47b70b74f6aba2e2239aea

      SHA1

      ebf66c2a5de5b09b7653cfae64533956832206a5

      SHA256

      0ac36bf008277f5fc278d742f72dc811c2e80d446f11a319b470f859168b01af

      SHA512

      0ac0abd422af1ec5336c0b3cba4be90482916791c4ed474c8d22040940a40509b52ee6a4a4751713981440a0d7df6645fc081805891d06a7dbd2ecf11e8a3d18

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr449358.exe
      Filesize

      15KB

      MD5

      10c4a0815858ed7df75646d37f0602d9

      SHA1

      a969c7f28ec9fb0eab3f9593b92a4b92d01bb067

      SHA256

      e1ec766da1309e73b67d62963be0e753eb5b877672ddac304a48b6a2e3c2e7d6

      SHA512

      42db92c44c0b3bdc3928ed427f82011cefbd68c7806be35b17485288a5943c72c1479e27aef623342926f1e4778d1267f1b5ec859fceca1e869a5e2860f0f5d7

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr449358.exe
      Filesize

      15KB

      MD5

      10c4a0815858ed7df75646d37f0602d9

      SHA1

      a969c7f28ec9fb0eab3f9593b92a4b92d01bb067

      SHA256

      e1ec766da1309e73b67d62963be0e753eb5b877672ddac304a48b6a2e3c2e7d6

      SHA512

      42db92c44c0b3bdc3928ed427f82011cefbd68c7806be35b17485288a5943c72c1479e27aef623342926f1e4778d1267f1b5ec859fceca1e869a5e2860f0f5d7

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku124922.exe
      Filesize

      294KB

      MD5

      7dda03bc4d17dd1dfe74ceaf839b4b3a

      SHA1

      73697637449437fc278a114d28c8791272f85e32

      SHA256

      f821bcbf8774b47053ff255f1eae223fdbc1aa74e11fee7c35ee0dfcf686f7f9

      SHA512

      ce77736c3912d34df49871e4af9c5313f4d4084325ac0272778f4621d0935ba6499eeb65cc7fe015bb180b2c9aecbc5e315d87328a604914513d265cc09a78cc

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku124922.exe
      Filesize

      294KB

      MD5

      7dda03bc4d17dd1dfe74ceaf839b4b3a

      SHA1

      73697637449437fc278a114d28c8791272f85e32

      SHA256

      f821bcbf8774b47053ff255f1eae223fdbc1aa74e11fee7c35ee0dfcf686f7f9

      SHA512

      ce77736c3912d34df49871e4af9c5313f4d4084325ac0272778f4621d0935ba6499eeb65cc7fe015bb180b2c9aecbc5e315d87328a604914513d265cc09a78cc

    • memory/3604-153-0x00000000020E0000-0x000000000212B000-memory.dmp
      Filesize

      300KB

    • memory/3604-154-0x0000000004B40000-0x00000000050E4000-memory.dmp
      Filesize

      5.6MB

    • memory/3604-155-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-156-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-158-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-160-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-162-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-164-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-166-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-168-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-169-0x0000000004B30000-0x0000000004B40000-memory.dmp
      Filesize

      64KB

    • memory/3604-172-0x0000000004B30000-0x0000000004B40000-memory.dmp
      Filesize

      64KB

    • memory/3604-174-0x0000000004B30000-0x0000000004B40000-memory.dmp
      Filesize

      64KB

    • memory/3604-175-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-171-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-177-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-179-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-181-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-183-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-185-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-187-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-189-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-191-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-193-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-195-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-197-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-199-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-201-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-203-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-205-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-207-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-209-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-211-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-213-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-215-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-217-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-219-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-221-0x0000000004A60000-0x0000000004A9F000-memory.dmp
      Filesize

      252KB

    • memory/3604-1064-0x0000000005200000-0x0000000005818000-memory.dmp
      Filesize

      6.1MB

    • memory/3604-1065-0x00000000058A0000-0x00000000059AA000-memory.dmp
      Filesize

      1.0MB

    • memory/3604-1066-0x00000000059E0000-0x00000000059F2000-memory.dmp
      Filesize

      72KB

    • memory/3604-1067-0x0000000005A00000-0x0000000005A3C000-memory.dmp
      Filesize

      240KB

    • memory/3604-1068-0x0000000004B30000-0x0000000004B40000-memory.dmp
      Filesize

      64KB

    • memory/3604-1071-0x0000000004B30000-0x0000000004B40000-memory.dmp
      Filesize

      64KB

    • memory/3604-1070-0x0000000004B30000-0x0000000004B40000-memory.dmp
      Filesize

      64KB

    • memory/3604-1072-0x0000000004B30000-0x0000000004B40000-memory.dmp
      Filesize

      64KB

    • memory/3604-1073-0x0000000005CF0000-0x0000000005D82000-memory.dmp
      Filesize

      584KB

    • memory/3604-1074-0x0000000005D90000-0x0000000005DF6000-memory.dmp
      Filesize

      408KB

    • memory/3604-1075-0x00000000064B0000-0x0000000006672000-memory.dmp
      Filesize

      1.8MB

    • memory/3604-1076-0x0000000006680000-0x0000000006BAC000-memory.dmp
      Filesize

      5.2MB

    • memory/3604-1077-0x0000000004B30000-0x0000000004B40000-memory.dmp
      Filesize

      64KB

    • memory/3604-1078-0x0000000006F40000-0x0000000006FB6000-memory.dmp
      Filesize

      472KB

    • memory/3604-1079-0x0000000006FC0000-0x0000000007010000-memory.dmp
      Filesize

      320KB

    • memory/4172-1085-0x0000000000320000-0x0000000000352000-memory.dmp
      Filesize

      200KB

    • memory/4172-1086-0x0000000004C00000-0x0000000004C10000-memory.dmp
      Filesize

      64KB

    • memory/4288-147-0x0000000000D20000-0x0000000000D2A000-memory.dmp
      Filesize

      40KB