Analysis

  • max time kernel
    138s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 20:56

General

  • Target

    bb4f6e0d520a7d77373243afbce98cba3fee63a57a622371c79b94e590b5a6f9.exe

  • Size

    658KB

  • MD5

    c1ab87257b7d4d203243eb9050fafc4e

  • SHA1

    0035365e55ba34ba7b2e8ce296dbe61760999148

  • SHA256

    bb4f6e0d520a7d77373243afbce98cba3fee63a57a622371c79b94e590b5a6f9

  • SHA512

    2a4f7d91ff9720b6841eeba8a9e04faeef0af42241d02df88c726ab66ae2116871959daf85b9c846548848aa248732fc7cd4fc0f2c84a89487a9ea73889c0f58

  • SSDEEP

    12288:FMrey90TVErXhJ6oMuQK+t1bDQE53MzRlfee44MzWKim8v/xJzd:3y0urz6oxQNthMWGeX4FKwJzd

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb4f6e0d520a7d77373243afbce98cba3fee63a57a622371c79b94e590b5a6f9.exe
    "C:\Users\Admin\AppData\Local\Temp\bb4f6e0d520a7d77373243afbce98cba3fee63a57a622371c79b94e590b5a6f9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1120
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un257165.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un257165.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3124
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4336.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4336.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:476
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 476 -s 1080
          4⤵
          • Program crash
          PID:4372
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5671.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5671.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4024
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4024 -s 1352
          4⤵
          • Program crash
          PID:1888
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si267878.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si267878.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3360
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 476 -ip 476
    1⤵
      PID:1800
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4024 -ip 4024
      1⤵
        PID:4104
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:528

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      2
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      2
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si267878.exe
        Filesize

        175KB

        MD5

        71c57d701ceba9537cd54208d77ee02b

        SHA1

        7f834ca9126388a025296bd8a4bb83c8b1a3c71d

        SHA256

        3a8f992f200d05f48b141656fe295d25eb2cce4fd2e5a796833e72be0d4186eb

        SHA512

        aff374920aeecb9db553233aed035f3e48a3ab64801ddb2c3f41afd9fc8b8bae0dd3f142f5a27a43b489db81d29fe6e18ecad4132e45bce18271df1c5a258cba

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si267878.exe
        Filesize

        175KB

        MD5

        71c57d701ceba9537cd54208d77ee02b

        SHA1

        7f834ca9126388a025296bd8a4bb83c8b1a3c71d

        SHA256

        3a8f992f200d05f48b141656fe295d25eb2cce4fd2e5a796833e72be0d4186eb

        SHA512

        aff374920aeecb9db553233aed035f3e48a3ab64801ddb2c3f41afd9fc8b8bae0dd3f142f5a27a43b489db81d29fe6e18ecad4132e45bce18271df1c5a258cba

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un257165.exe
        Filesize

        516KB

        MD5

        4b70746236b2d2bd101d1c965bb37ad8

        SHA1

        bff75266f31a1fb19345d055c9f639329b48c433

        SHA256

        f6a44fbe0f5de160deb110a65717ffb6e8d9a83f2b17769756a7ab432392c748

        SHA512

        afe4bb76261c3be61974045af6f0771dd628a5974e6ae7d604496c0863a44bb572e6b10146aa23dfb195e75e737393bb1ec75a0b56a6a8c50f8f6c363121be83

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un257165.exe
        Filesize

        516KB

        MD5

        4b70746236b2d2bd101d1c965bb37ad8

        SHA1

        bff75266f31a1fb19345d055c9f639329b48c433

        SHA256

        f6a44fbe0f5de160deb110a65717ffb6e8d9a83f2b17769756a7ab432392c748

        SHA512

        afe4bb76261c3be61974045af6f0771dd628a5974e6ae7d604496c0863a44bb572e6b10146aa23dfb195e75e737393bb1ec75a0b56a6a8c50f8f6c363121be83

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4336.exe
        Filesize

        235KB

        MD5

        aff34dd0718bf737740073844a94b309

        SHA1

        a5a25ec83f2d60b24b6242dfdfd7e6bb260ef1fe

        SHA256

        c8ac5801e05d3c3718830835c516067a72d8177bc905a08db4eef91c462a8ce3

        SHA512

        d3bb3d05cef0f319b3a73d022aaa02e0784dbbf69a0e4f02f24639abd28ea3e39a7bf6f8b2ce4af753a7cd5866287ea8b21437ce043cc73f5c4add6900331117

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4336.exe
        Filesize

        235KB

        MD5

        aff34dd0718bf737740073844a94b309

        SHA1

        a5a25ec83f2d60b24b6242dfdfd7e6bb260ef1fe

        SHA256

        c8ac5801e05d3c3718830835c516067a72d8177bc905a08db4eef91c462a8ce3

        SHA512

        d3bb3d05cef0f319b3a73d022aaa02e0784dbbf69a0e4f02f24639abd28ea3e39a7bf6f8b2ce4af753a7cd5866287ea8b21437ce043cc73f5c4add6900331117

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5671.exe
        Filesize

        294KB

        MD5

        8cd801dec34fd766fb00a2b90b85ebbe

        SHA1

        cfda72954ad02d76665ba8229f51cfbd9273ff53

        SHA256

        40722cab00fa5f71d88604096670539045187888bbb73ab4872ef86600362c5c

        SHA512

        198fe29d177b7ed0e8ba551c9fa53e54a39d36858dd295fbb805b39e6e7171aa5aba17c55f60914048d3e00cc5304388064e9265bcf8f09b8e80034e27b90e8a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5671.exe
        Filesize

        294KB

        MD5

        8cd801dec34fd766fb00a2b90b85ebbe

        SHA1

        cfda72954ad02d76665ba8229f51cfbd9273ff53

        SHA256

        40722cab00fa5f71d88604096670539045187888bbb73ab4872ef86600362c5c

        SHA512

        198fe29d177b7ed0e8ba551c9fa53e54a39d36858dd295fbb805b39e6e7171aa5aba17c55f60914048d3e00cc5304388064e9265bcf8f09b8e80034e27b90e8a

      • memory/476-148-0x0000000004C10000-0x00000000051B4000-memory.dmp
        Filesize

        5.6MB

      • memory/476-149-0x0000000000850000-0x000000000087D000-memory.dmp
        Filesize

        180KB

      • memory/476-150-0x0000000004C00000-0x0000000004C10000-memory.dmp
        Filesize

        64KB

      • memory/476-151-0x0000000004C00000-0x0000000004C10000-memory.dmp
        Filesize

        64KB

      • memory/476-152-0x0000000004C00000-0x0000000004C10000-memory.dmp
        Filesize

        64KB

      • memory/476-153-0x0000000002410000-0x0000000002422000-memory.dmp
        Filesize

        72KB

      • memory/476-156-0x0000000002410000-0x0000000002422000-memory.dmp
        Filesize

        72KB

      • memory/476-154-0x0000000002410000-0x0000000002422000-memory.dmp
        Filesize

        72KB

      • memory/476-158-0x0000000002410000-0x0000000002422000-memory.dmp
        Filesize

        72KB

      • memory/476-160-0x0000000002410000-0x0000000002422000-memory.dmp
        Filesize

        72KB

      • memory/476-162-0x0000000002410000-0x0000000002422000-memory.dmp
        Filesize

        72KB

      • memory/476-164-0x0000000002410000-0x0000000002422000-memory.dmp
        Filesize

        72KB

      • memory/476-166-0x0000000002410000-0x0000000002422000-memory.dmp
        Filesize

        72KB

      • memory/476-168-0x0000000002410000-0x0000000002422000-memory.dmp
        Filesize

        72KB

      • memory/476-170-0x0000000002410000-0x0000000002422000-memory.dmp
        Filesize

        72KB

      • memory/476-172-0x0000000002410000-0x0000000002422000-memory.dmp
        Filesize

        72KB

      • memory/476-174-0x0000000002410000-0x0000000002422000-memory.dmp
        Filesize

        72KB

      • memory/476-176-0x0000000002410000-0x0000000002422000-memory.dmp
        Filesize

        72KB

      • memory/476-178-0x0000000002410000-0x0000000002422000-memory.dmp
        Filesize

        72KB

      • memory/476-180-0x0000000002410000-0x0000000002422000-memory.dmp
        Filesize

        72KB

      • memory/476-181-0x0000000000400000-0x00000000004A9000-memory.dmp
        Filesize

        676KB

      • memory/476-182-0x0000000004C00000-0x0000000004C10000-memory.dmp
        Filesize

        64KB

      • memory/476-183-0x0000000004C00000-0x0000000004C10000-memory.dmp
        Filesize

        64KB

      • memory/476-185-0x0000000000400000-0x00000000004A9000-memory.dmp
        Filesize

        676KB

      • memory/3360-1121-0x00000000001A0000-0x00000000001D2000-memory.dmp
        Filesize

        200KB

      • memory/3360-1122-0x0000000004AB0000-0x0000000004AC0000-memory.dmp
        Filesize

        64KB

      • memory/4024-191-0x0000000004C00000-0x0000000004C10000-memory.dmp
        Filesize

        64KB

      • memory/4024-226-0x0000000002620000-0x000000000265F000-memory.dmp
        Filesize

        252KB

      • memory/4024-193-0x0000000002620000-0x000000000265F000-memory.dmp
        Filesize

        252KB

      • memory/4024-194-0x0000000002620000-0x000000000265F000-memory.dmp
        Filesize

        252KB

      • memory/4024-196-0x0000000002620000-0x000000000265F000-memory.dmp
        Filesize

        252KB

      • memory/4024-198-0x0000000002620000-0x000000000265F000-memory.dmp
        Filesize

        252KB

      • memory/4024-200-0x0000000002620000-0x000000000265F000-memory.dmp
        Filesize

        252KB

      • memory/4024-202-0x0000000002620000-0x000000000265F000-memory.dmp
        Filesize

        252KB

      • memory/4024-204-0x0000000002620000-0x000000000265F000-memory.dmp
        Filesize

        252KB

      • memory/4024-206-0x0000000002620000-0x000000000265F000-memory.dmp
        Filesize

        252KB

      • memory/4024-208-0x0000000002620000-0x000000000265F000-memory.dmp
        Filesize

        252KB

      • memory/4024-210-0x0000000002620000-0x000000000265F000-memory.dmp
        Filesize

        252KB

      • memory/4024-212-0x0000000002620000-0x000000000265F000-memory.dmp
        Filesize

        252KB

      • memory/4024-214-0x0000000002620000-0x000000000265F000-memory.dmp
        Filesize

        252KB

      • memory/4024-216-0x0000000002620000-0x000000000265F000-memory.dmp
        Filesize

        252KB

      • memory/4024-218-0x0000000002620000-0x000000000265F000-memory.dmp
        Filesize

        252KB

      • memory/4024-220-0x0000000002620000-0x000000000265F000-memory.dmp
        Filesize

        252KB

      • memory/4024-222-0x0000000002620000-0x000000000265F000-memory.dmp
        Filesize

        252KB

      • memory/4024-224-0x0000000002620000-0x000000000265F000-memory.dmp
        Filesize

        252KB

      • memory/4024-192-0x0000000004C00000-0x0000000004C10000-memory.dmp
        Filesize

        64KB

      • memory/4024-584-0x0000000004C00000-0x0000000004C10000-memory.dmp
        Filesize

        64KB

      • memory/4024-1100-0x00000000052C0000-0x00000000058D8000-memory.dmp
        Filesize

        6.1MB

      • memory/4024-1101-0x00000000058E0000-0x00000000059EA000-memory.dmp
        Filesize

        1.0MB

      • memory/4024-1102-0x00000000059F0000-0x0000000005A02000-memory.dmp
        Filesize

        72KB

      • memory/4024-1103-0x0000000005A10000-0x0000000005A4C000-memory.dmp
        Filesize

        240KB

      • memory/4024-1104-0x0000000004C00000-0x0000000004C10000-memory.dmp
        Filesize

        64KB

      • memory/4024-1105-0x0000000005CF0000-0x0000000005D82000-memory.dmp
        Filesize

        584KB

      • memory/4024-1106-0x0000000005D90000-0x0000000005DF6000-memory.dmp
        Filesize

        408KB

      • memory/4024-1107-0x00000000065C0000-0x0000000006782000-memory.dmp
        Filesize

        1.8MB

      • memory/4024-1108-0x0000000006790000-0x0000000006CBC000-memory.dmp
        Filesize

        5.2MB

      • memory/4024-1110-0x0000000004C00000-0x0000000004C10000-memory.dmp
        Filesize

        64KB

      • memory/4024-1111-0x0000000004C00000-0x0000000004C10000-memory.dmp
        Filesize

        64KB

      • memory/4024-1112-0x0000000004C00000-0x0000000004C10000-memory.dmp
        Filesize

        64KB

      • memory/4024-190-0x0000000002120000-0x000000000216B000-memory.dmp
        Filesize

        300KB

      • memory/4024-1113-0x0000000006F20000-0x0000000006F96000-memory.dmp
        Filesize

        472KB

      • memory/4024-1114-0x0000000006FB0000-0x0000000007000000-memory.dmp
        Filesize

        320KB

      • memory/4024-1115-0x0000000004C00000-0x0000000004C10000-memory.dmp
        Filesize

        64KB