Analysis

  • max time kernel
    110s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 20:55

General

  • Target

    c79446b6441127687018cfa4cfce9ee09614b45d2f4838dd4f76956a3b3885f0.exe

  • Size

    658KB

  • MD5

    0470ad47d8b7f63fa40137fa95494245

  • SHA1

    cd89c06b9f57b1d04f264114e1b0ab7c2dcfe66e

  • SHA256

    c79446b6441127687018cfa4cfce9ee09614b45d2f4838dd4f76956a3b3885f0

  • SHA512

    08ddbb86347912731872fed7ba4313dcd8ecb4a98605a20f741226eda7fb0c8cce45c4d8a9b40726497b69b3f33608fe44aea39e6604e50f313b32b3ac1eb70a

  • SSDEEP

    12288:sMryy90Np6t/qnytaL+cJVnCBtaH9QkLRYjrzknZ/zGQnv44/zWKlw8v0LId3J:eyec4N3JCtUuRkZ/znw4KKcIf

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c79446b6441127687018cfa4cfce9ee09614b45d2f4838dd4f76956a3b3885f0.exe
    "C:\Users\Admin\AppData\Local\Temp\c79446b6441127687018cfa4cfce9ee09614b45d2f4838dd4f76956a3b3885f0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2576
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un228076.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un228076.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4576
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5390.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5390.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3576
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3576 -s 1084
          4⤵
          • Program crash
          PID:4412
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3988.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3988.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4704
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 1876
          4⤵
          • Program crash
          PID:4404
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si806839.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si806839.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1688
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 3576 -ip 3576
    1⤵
      PID:224
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 4704 -ip 4704
      1⤵
        PID:4768

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si806839.exe

        Filesize

        175KB

        MD5

        9a3119c724abc2e135f182033a4c0c6b

        SHA1

        b02e0916be974d0846b603024796c9659001baec

        SHA256

        f57c71878c0ec87c3fbf69dd1e11d876a54e6998986bac9181d1143a81a96572

        SHA512

        2d44fabbf33c5552fa50d5b972ce22ac8dbd7c91ef3dd5d5d1ec2ee3fb9e58bd1c0643230dddc7f302c0cfe22a0afe3c6f64d00bc283fc9366b9f7f1a05f0bce

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si806839.exe

        Filesize

        175KB

        MD5

        9a3119c724abc2e135f182033a4c0c6b

        SHA1

        b02e0916be974d0846b603024796c9659001baec

        SHA256

        f57c71878c0ec87c3fbf69dd1e11d876a54e6998986bac9181d1143a81a96572

        SHA512

        2d44fabbf33c5552fa50d5b972ce22ac8dbd7c91ef3dd5d5d1ec2ee3fb9e58bd1c0643230dddc7f302c0cfe22a0afe3c6f64d00bc283fc9366b9f7f1a05f0bce

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un228076.exe

        Filesize

        516KB

        MD5

        f0a3a8550e34ff85364401bfc76439ab

        SHA1

        fa7890d2a36d2f524d6fd710b8c20254d52430d4

        SHA256

        6e5af1a5e9edd0c0c542907b7d539661cc750e0af86f937faeaba5e90370779e

        SHA512

        d319dde8c6efc645f95e731b7caa8d38c1bb43341867dbbf4530f4c61c4e2157b5f793f46ff37b599ccf854ea866e90c4bf1703c8035c4bb4ac268c5d50d9e09

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un228076.exe

        Filesize

        516KB

        MD5

        f0a3a8550e34ff85364401bfc76439ab

        SHA1

        fa7890d2a36d2f524d6fd710b8c20254d52430d4

        SHA256

        6e5af1a5e9edd0c0c542907b7d539661cc750e0af86f937faeaba5e90370779e

        SHA512

        d319dde8c6efc645f95e731b7caa8d38c1bb43341867dbbf4530f4c61c4e2157b5f793f46ff37b599ccf854ea866e90c4bf1703c8035c4bb4ac268c5d50d9e09

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5390.exe

        Filesize

        235KB

        MD5

        974387773eed4df355a78b2e861dcc9c

        SHA1

        41806f9fbf810dcdd2b8c464b714dc2ed46cbb05

        SHA256

        f1ce66fa3b9eb903537196c5a5c1464002d4e84552d7b4287fa188107e4b401f

        SHA512

        a03472ec24cdaeaa3895c02a54c82c1c6e6c0b3d6750d07982f18d8945f68d079d63a3167cf90a0c37c9d60d193cc1c618e5dc9778d29931796233c6d13745a9

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5390.exe

        Filesize

        235KB

        MD5

        974387773eed4df355a78b2e861dcc9c

        SHA1

        41806f9fbf810dcdd2b8c464b714dc2ed46cbb05

        SHA256

        f1ce66fa3b9eb903537196c5a5c1464002d4e84552d7b4287fa188107e4b401f

        SHA512

        a03472ec24cdaeaa3895c02a54c82c1c6e6c0b3d6750d07982f18d8945f68d079d63a3167cf90a0c37c9d60d193cc1c618e5dc9778d29931796233c6d13745a9

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3988.exe

        Filesize

        294KB

        MD5

        5e8ff9450984ec0168a36285865cd19a

        SHA1

        a82c4dc56242ead04c003ea0f22b4713344829ed

        SHA256

        58753379e60552e43adf9007860b4a25c517821d560c881a8a1eafea14272cd5

        SHA512

        03df094917035bd0f5d13cba57ce195072535123c9c65a57c86c62b9de8923e18e3661493d1ae22fc84b4355ae50ea7b32aaa40377915a4c8c4389c6e825f60d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3988.exe

        Filesize

        294KB

        MD5

        5e8ff9450984ec0168a36285865cd19a

        SHA1

        a82c4dc56242ead04c003ea0f22b4713344829ed

        SHA256

        58753379e60552e43adf9007860b4a25c517821d560c881a8a1eafea14272cd5

        SHA512

        03df094917035bd0f5d13cba57ce195072535123c9c65a57c86c62b9de8923e18e3661493d1ae22fc84b4355ae50ea7b32aaa40377915a4c8c4389c6e825f60d

      • memory/1688-1122-0x0000000000F10000-0x0000000000F42000-memory.dmp

        Filesize

        200KB

      • memory/1688-1123-0x0000000005B20000-0x0000000005B30000-memory.dmp

        Filesize

        64KB

      • memory/3576-158-0x00000000024A0000-0x00000000024B2000-memory.dmp

        Filesize

        72KB

      • memory/3576-172-0x00000000024A0000-0x00000000024B2000-memory.dmp

        Filesize

        72KB

      • memory/3576-152-0x0000000004CF0000-0x0000000004D00000-memory.dmp

        Filesize

        64KB

      • memory/3576-153-0x00000000024A0000-0x00000000024B2000-memory.dmp

        Filesize

        72KB

      • memory/3576-156-0x00000000024A0000-0x00000000024B2000-memory.dmp

        Filesize

        72KB

      • memory/3576-154-0x00000000024A0000-0x00000000024B2000-memory.dmp

        Filesize

        72KB

      • memory/3576-151-0x0000000004CF0000-0x0000000004D00000-memory.dmp

        Filesize

        64KB

      • memory/3576-160-0x00000000024A0000-0x00000000024B2000-memory.dmp

        Filesize

        72KB

      • memory/3576-162-0x00000000024A0000-0x00000000024B2000-memory.dmp

        Filesize

        72KB

      • memory/3576-164-0x00000000024A0000-0x00000000024B2000-memory.dmp

        Filesize

        72KB

      • memory/3576-168-0x00000000024A0000-0x00000000024B2000-memory.dmp

        Filesize

        72KB

      • memory/3576-166-0x00000000024A0000-0x00000000024B2000-memory.dmp

        Filesize

        72KB

      • memory/3576-170-0x00000000024A0000-0x00000000024B2000-memory.dmp

        Filesize

        72KB

      • memory/3576-150-0x0000000004CF0000-0x0000000004D00000-memory.dmp

        Filesize

        64KB

      • memory/3576-174-0x00000000024A0000-0x00000000024B2000-memory.dmp

        Filesize

        72KB

      • memory/3576-178-0x00000000024A0000-0x00000000024B2000-memory.dmp

        Filesize

        72KB

      • memory/3576-180-0x00000000024A0000-0x00000000024B2000-memory.dmp

        Filesize

        72KB

      • memory/3576-176-0x00000000024A0000-0x00000000024B2000-memory.dmp

        Filesize

        72KB

      • memory/3576-181-0x0000000000400000-0x00000000004A9000-memory.dmp

        Filesize

        676KB

      • memory/3576-182-0x0000000004CF0000-0x0000000004D00000-memory.dmp

        Filesize

        64KB

      • memory/3576-183-0x0000000004CF0000-0x0000000004D00000-memory.dmp

        Filesize

        64KB

      • memory/3576-184-0x0000000004CF0000-0x0000000004D00000-memory.dmp

        Filesize

        64KB

      • memory/3576-186-0x0000000000400000-0x00000000004A9000-memory.dmp

        Filesize

        676KB

      • memory/3576-149-0x0000000000580000-0x00000000005AD000-memory.dmp

        Filesize

        180KB

      • memory/3576-148-0x0000000004D00000-0x00000000052A4000-memory.dmp

        Filesize

        5.6MB

      • memory/4704-197-0x0000000002480000-0x0000000002490000-memory.dmp

        Filesize

        64KB

      • memory/4704-228-0x00000000023F0000-0x000000000242F000-memory.dmp

        Filesize

        252KB

      • memory/4704-199-0x0000000002480000-0x0000000002490000-memory.dmp

        Filesize

        64KB

      • memory/4704-200-0x00000000023F0000-0x000000000242F000-memory.dmp

        Filesize

        252KB

      • memory/4704-196-0x00000000023F0000-0x000000000242F000-memory.dmp

        Filesize

        252KB

      • memory/4704-195-0x0000000002480000-0x0000000002490000-memory.dmp

        Filesize

        64KB

      • memory/4704-202-0x00000000023F0000-0x000000000242F000-memory.dmp

        Filesize

        252KB

      • memory/4704-204-0x00000000023F0000-0x000000000242F000-memory.dmp

        Filesize

        252KB

      • memory/4704-210-0x00000000023F0000-0x000000000242F000-memory.dmp

        Filesize

        252KB

      • memory/4704-208-0x00000000023F0000-0x000000000242F000-memory.dmp

        Filesize

        252KB

      • memory/4704-214-0x00000000023F0000-0x000000000242F000-memory.dmp

        Filesize

        252KB

      • memory/4704-212-0x00000000023F0000-0x000000000242F000-memory.dmp

        Filesize

        252KB

      • memory/4704-216-0x00000000023F0000-0x000000000242F000-memory.dmp

        Filesize

        252KB

      • memory/4704-206-0x00000000023F0000-0x000000000242F000-memory.dmp

        Filesize

        252KB

      • memory/4704-218-0x00000000023F0000-0x000000000242F000-memory.dmp

        Filesize

        252KB

      • memory/4704-220-0x00000000023F0000-0x000000000242F000-memory.dmp

        Filesize

        252KB

      • memory/4704-222-0x00000000023F0000-0x000000000242F000-memory.dmp

        Filesize

        252KB

      • memory/4704-224-0x00000000023F0000-0x000000000242F000-memory.dmp

        Filesize

        252KB

      • memory/4704-226-0x00000000023F0000-0x000000000242F000-memory.dmp

        Filesize

        252KB

      • memory/4704-192-0x00000000023F0000-0x000000000242F000-memory.dmp

        Filesize

        252KB

      • memory/4704-1101-0x0000000005130000-0x0000000005748000-memory.dmp

        Filesize

        6.1MB

      • memory/4704-1102-0x0000000005760000-0x000000000586A000-memory.dmp

        Filesize

        1.0MB

      • memory/4704-1103-0x00000000058A0000-0x00000000058B2000-memory.dmp

        Filesize

        72KB

      • memory/4704-1104-0x00000000058C0000-0x00000000058FC000-memory.dmp

        Filesize

        240KB

      • memory/4704-1105-0x0000000002480000-0x0000000002490000-memory.dmp

        Filesize

        64KB

      • memory/4704-1106-0x0000000005BB0000-0x0000000005C42000-memory.dmp

        Filesize

        584KB

      • memory/4704-1107-0x0000000005C50000-0x0000000005CB6000-memory.dmp

        Filesize

        408KB

      • memory/4704-1109-0x0000000002480000-0x0000000002490000-memory.dmp

        Filesize

        64KB

      • memory/4704-1110-0x0000000002480000-0x0000000002490000-memory.dmp

        Filesize

        64KB

      • memory/4704-1111-0x0000000002480000-0x0000000002490000-memory.dmp

        Filesize

        64KB

      • memory/4704-1112-0x00000000066F0000-0x00000000068B2000-memory.dmp

        Filesize

        1.8MB

      • memory/4704-1113-0x00000000068D0000-0x0000000006DFC000-memory.dmp

        Filesize

        5.2MB

      • memory/4704-1114-0x0000000002480000-0x0000000002490000-memory.dmp

        Filesize

        64KB

      • memory/4704-194-0x00000000007B0000-0x00000000007FB000-memory.dmp

        Filesize

        300KB

      • memory/4704-191-0x00000000023F0000-0x000000000242F000-memory.dmp

        Filesize

        252KB

      • memory/4704-1115-0x00000000022C0000-0x0000000002336000-memory.dmp

        Filesize

        472KB

      • memory/4704-1116-0x00000000080C0000-0x0000000008110000-memory.dmp

        Filesize

        320KB