Analysis

  • max time kernel
    111s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 21:00

General

  • Target

    786fd272afd8630a29a52a6936c0748f1e0365093984718c085757eb0fe555dc.exe

  • Size

    522KB

  • MD5

    bd83bfba3f46f52a51fa47657c2fed98

  • SHA1

    7d173ce0ffcde2ef2eb7b23eb02420bb968b5c4c

  • SHA256

    786fd272afd8630a29a52a6936c0748f1e0365093984718c085757eb0fe555dc

  • SHA512

    360b4894462f49b4f9ebecacccfc66489653d86dec4caa68b9677576d1c91f6e875fb0e36ce313a51202f10066caad20065866e1f8eac12c5624caee9d262c3b

  • SSDEEP

    12288:XMrLy90fVpe0E/B3iv3HVW8sb4EAzWceQuF/Xdy3dX4:syVivHVfsEEJFXdy3R4

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\786fd272afd8630a29a52a6936c0748f1e0365093984718c085757eb0fe555dc.exe
    "C:\Users\Admin\AppData\Local\Temp\786fd272afd8630a29a52a6936c0748f1e0365093984718c085757eb0fe555dc.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:564
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEo9232.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEo9232.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1516
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr743751.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr743751.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4676
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku920080.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku920080.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2128
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2128 -s 1348
          4⤵
          • Program crash
          PID:2104
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr793461.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr793461.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2384
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2128 -ip 2128
    1⤵
      PID:2284

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr793461.exe
      Filesize

      175KB

      MD5

      55cdea1e46ff445f1eba8971f44ebf36

      SHA1

      442a975b2d5775ee28c2504c753b8456cbdf5373

      SHA256

      4134b7b62bfcb90df5244a2eaeff2b8320af26c594a3ba5b8737dc2981354b6e

      SHA512

      dd21515dd5dfd327cfd29c5ea91ba6c171f0ae98937c3b81295686c891d3354b28ec6c2e7184c6b67e18bfc235a475b63453767325fce06c020ed186cd05f1a8

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr793461.exe
      Filesize

      175KB

      MD5

      55cdea1e46ff445f1eba8971f44ebf36

      SHA1

      442a975b2d5775ee28c2504c753b8456cbdf5373

      SHA256

      4134b7b62bfcb90df5244a2eaeff2b8320af26c594a3ba5b8737dc2981354b6e

      SHA512

      dd21515dd5dfd327cfd29c5ea91ba6c171f0ae98937c3b81295686c891d3354b28ec6c2e7184c6b67e18bfc235a475b63453767325fce06c020ed186cd05f1a8

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEo9232.exe
      Filesize

      379KB

      MD5

      dd16677306d842643c87c5360c5ed9f4

      SHA1

      8c688d71a7642d6e9e304d4973f71119685b08d3

      SHA256

      b3e09a173de06cbe62f83d544507b417170a6237d6a15c8d33916fce2b80855e

      SHA512

      fc38d064654ae3c9fc341e58cc9f4107ea60718ae54762f39d64a60e880617426c810e2cd5317541fb30944aee6751c17fdc03519ae70993bf25de303b705e5c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziEo9232.exe
      Filesize

      379KB

      MD5

      dd16677306d842643c87c5360c5ed9f4

      SHA1

      8c688d71a7642d6e9e304d4973f71119685b08d3

      SHA256

      b3e09a173de06cbe62f83d544507b417170a6237d6a15c8d33916fce2b80855e

      SHA512

      fc38d064654ae3c9fc341e58cc9f4107ea60718ae54762f39d64a60e880617426c810e2cd5317541fb30944aee6751c17fdc03519ae70993bf25de303b705e5c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr743751.exe
      Filesize

      15KB

      MD5

      7eba18eef41d33a10babbf589e51ae7f

      SHA1

      d82f9e2ff663f5836a8d7fa4fc532b20a4020177

      SHA256

      aa9bcf1c876e39f7cba0ad9ec19a097642f8b8696fdfa7af4548d538a035f778

      SHA512

      2841b0f4523ae28843b75d2ea87a4ca8a8d680ddb7f5d83e343d38dedba92f648d967e494bd566780e701824d0ece61ad7af37c813c7a12ecf971826822069de

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr743751.exe
      Filesize

      15KB

      MD5

      7eba18eef41d33a10babbf589e51ae7f

      SHA1

      d82f9e2ff663f5836a8d7fa4fc532b20a4020177

      SHA256

      aa9bcf1c876e39f7cba0ad9ec19a097642f8b8696fdfa7af4548d538a035f778

      SHA512

      2841b0f4523ae28843b75d2ea87a4ca8a8d680ddb7f5d83e343d38dedba92f648d967e494bd566780e701824d0ece61ad7af37c813c7a12ecf971826822069de

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku920080.exe
      Filesize

      294KB

      MD5

      8ba2608c1556f72eb32ef9c8c7c7575f

      SHA1

      dbc8f467aa5dc3e9b775940ecc751eb5c8057f26

      SHA256

      de79bb1220a59e60b6f47da82c0e122fb67bad410317495a78431322d4197cbf

      SHA512

      eb2cd77112a10b3efa1461e7c480df244cce5b4378a3c9450a532f1df43c8b3c3b3768d2d5c0f0ca7849fa4af56bc60c1d358f02eb43ea9d77dee2a98e136239

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku920080.exe
      Filesize

      294KB

      MD5

      8ba2608c1556f72eb32ef9c8c7c7575f

      SHA1

      dbc8f467aa5dc3e9b775940ecc751eb5c8057f26

      SHA256

      de79bb1220a59e60b6f47da82c0e122fb67bad410317495a78431322d4197cbf

      SHA512

      eb2cd77112a10b3efa1461e7c480df244cce5b4378a3c9450a532f1df43c8b3c3b3768d2d5c0f0ca7849fa4af56bc60c1d358f02eb43ea9d77dee2a98e136239

    • memory/2128-153-0x00000000020F0000-0x000000000213B000-memory.dmp
      Filesize

      300KB

    • memory/2128-154-0x0000000004CE0000-0x0000000004CF0000-memory.dmp
      Filesize

      64KB

    • memory/2128-155-0x0000000004CE0000-0x0000000004CF0000-memory.dmp
      Filesize

      64KB

    • memory/2128-156-0x0000000004CE0000-0x0000000004CF0000-memory.dmp
      Filesize

      64KB

    • memory/2128-157-0x0000000004CF0000-0x0000000005294000-memory.dmp
      Filesize

      5.6MB

    • memory/2128-158-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-159-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-161-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-163-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-165-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-167-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-169-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-171-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-173-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-175-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-177-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-179-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-181-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-183-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-185-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-187-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-189-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-191-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-193-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-195-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-197-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-199-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-201-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-203-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-205-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-207-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-209-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-211-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-213-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-215-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-217-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-219-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-221-0x0000000002510000-0x000000000254F000-memory.dmp
      Filesize

      252KB

    • memory/2128-1064-0x00000000052A0000-0x00000000058B8000-memory.dmp
      Filesize

      6.1MB

    • memory/2128-1065-0x0000000004B80000-0x0000000004C8A000-memory.dmp
      Filesize

      1.0MB

    • memory/2128-1066-0x0000000004CC0000-0x0000000004CD2000-memory.dmp
      Filesize

      72KB

    • memory/2128-1067-0x00000000058C0000-0x00000000058FC000-memory.dmp
      Filesize

      240KB

    • memory/2128-1068-0x0000000004CE0000-0x0000000004CF0000-memory.dmp
      Filesize

      64KB

    • memory/2128-1070-0x0000000005BB0000-0x0000000005C42000-memory.dmp
      Filesize

      584KB

    • memory/2128-1071-0x0000000005C50000-0x0000000005CB6000-memory.dmp
      Filesize

      408KB

    • memory/2128-1072-0x0000000006350000-0x00000000063C6000-memory.dmp
      Filesize

      472KB

    • memory/2128-1073-0x00000000063E0000-0x0000000006430000-memory.dmp
      Filesize

      320KB

    • memory/2128-1074-0x0000000004CE0000-0x0000000004CF0000-memory.dmp
      Filesize

      64KB

    • memory/2128-1076-0x0000000007950000-0x0000000007B12000-memory.dmp
      Filesize

      1.8MB

    • memory/2128-1077-0x0000000007B60000-0x000000000808C000-memory.dmp
      Filesize

      5.2MB

    • memory/2384-1083-0x0000000000520000-0x0000000000552000-memory.dmp
      Filesize

      200KB

    • memory/2384-1084-0x0000000004E30000-0x0000000004E40000-memory.dmp
      Filesize

      64KB

    • memory/4676-147-0x0000000000A60000-0x0000000000A6A000-memory.dmp
      Filesize

      40KB