Analysis

  • max time kernel
    84s
  • max time network
    93s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 21:03

General

  • Target

    debcab37a08da8ba930f9b2e5b4cc300a9d053f9ba4d5ca73b4bf49280f23a5d.exe

  • Size

    521KB

  • MD5

    4a0c33f7bed52b07055d4f6ef314ed08

  • SHA1

    ed83fb5469d51c5110671406acae085753e6ade0

  • SHA256

    debcab37a08da8ba930f9b2e5b4cc300a9d053f9ba4d5ca73b4bf49280f23a5d

  • SHA512

    4e6db6cf2a1127dbd7ac2f6221b452869e3445c6e762b60710c248378faaadab30df3da9a9e9c13255de4c7c699f1d682ac210ab9276f9d6b134f3919f1bd413

  • SSDEEP

    12288:zMrzy90w3mE5SYqaoZzJc8hJP88q44CzWLpFz9N7J:Qy933qaIzWa08L47zT1

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\debcab37a08da8ba930f9b2e5b4cc300a9d053f9ba4d5ca73b4bf49280f23a5d.exe
    "C:\Users\Admin\AppData\Local\Temp\debcab37a08da8ba930f9b2e5b4cc300a9d053f9ba4d5ca73b4bf49280f23a5d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZR3729.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZR3729.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr430842.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr430842.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3340
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku285795.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku285795.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:780
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 780 -s 1928
          4⤵
          • Program crash
          PID:3508
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr578975.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr578975.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2672
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 780 -ip 780
    1⤵
      PID:4316

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr578975.exe
      Filesize

      175KB

      MD5

      4ae4e6ce495af0af0b3bb25467e585c9

      SHA1

      6d0de52751ffa25bae1d2b1a531a08a9b8f13c7a

      SHA256

      b81cdb896902143de069bd2bbc05cd621d544f1bef560e4f2055ed406e2017ba

      SHA512

      548e99ab748087cb0e743e574e36817d17bedaa23fc200e7d1ef53a27799a806651424398ade1a2e8879c76c5bed721adf120783d528cb9e36a8823cf4213e57

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr578975.exe
      Filesize

      175KB

      MD5

      4ae4e6ce495af0af0b3bb25467e585c9

      SHA1

      6d0de52751ffa25bae1d2b1a531a08a9b8f13c7a

      SHA256

      b81cdb896902143de069bd2bbc05cd621d544f1bef560e4f2055ed406e2017ba

      SHA512

      548e99ab748087cb0e743e574e36817d17bedaa23fc200e7d1ef53a27799a806651424398ade1a2e8879c76c5bed721adf120783d528cb9e36a8823cf4213e57

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZR3729.exe
      Filesize

      379KB

      MD5

      e0ea3200d6ba420fe504ef5325ed1d6c

      SHA1

      6d92b2ee4ea516418a493ac26c03b842b0782c0d

      SHA256

      553d53058da527b8ebc9e9df626ed8862e21a7be9a1950b720544015c867c61f

      SHA512

      63c66d079e505c8f5e58dd4af5e35bf015ade5e2ce5350ed763ea9607b860c809df74220bd9e2c051caec3a4fb639e60fd473ee1a9a3e6a60962d79cbf425aff

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziZR3729.exe
      Filesize

      379KB

      MD5

      e0ea3200d6ba420fe504ef5325ed1d6c

      SHA1

      6d92b2ee4ea516418a493ac26c03b842b0782c0d

      SHA256

      553d53058da527b8ebc9e9df626ed8862e21a7be9a1950b720544015c867c61f

      SHA512

      63c66d079e505c8f5e58dd4af5e35bf015ade5e2ce5350ed763ea9607b860c809df74220bd9e2c051caec3a4fb639e60fd473ee1a9a3e6a60962d79cbf425aff

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr430842.exe
      Filesize

      15KB

      MD5

      c58e9e0f5d245d3ca06bc3dd9b82b9eb

      SHA1

      2a19d9b836b50411b2d9b19b277dd4ec19b56902

      SHA256

      ac2301f25f17c81e0c10b27cf9a206c929621b3d36f2da5bc5d8f2579891bbcf

      SHA512

      3724ef0907489a4f8b3f13261c46c0bfb69a348f440aadd4abc2e2ba97bfb5313e145ff3df0b033cbde9b43b707ca603344059db66370d1b8cec0cc4983d27b1

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr430842.exe
      Filesize

      15KB

      MD5

      c58e9e0f5d245d3ca06bc3dd9b82b9eb

      SHA1

      2a19d9b836b50411b2d9b19b277dd4ec19b56902

      SHA256

      ac2301f25f17c81e0c10b27cf9a206c929621b3d36f2da5bc5d8f2579891bbcf

      SHA512

      3724ef0907489a4f8b3f13261c46c0bfb69a348f440aadd4abc2e2ba97bfb5313e145ff3df0b033cbde9b43b707ca603344059db66370d1b8cec0cc4983d27b1

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku285795.exe
      Filesize

      294KB

      MD5

      dc34ada1a12ec13b9c0888560abdc7af

      SHA1

      ceab6aa6eca6291df258cbc1be47c30258e60ad4

      SHA256

      ef048faaacb046f1850a7627391ccd2629ec0802b8328fc2c45018358ebf19e8

      SHA512

      55c5c691eec17e472f7a0c040b9f23593a5f2f84cbcac41230c39381eff36ef940269dde009fd35aa8882bfdd87e9f82ca6c5b8683de63e042fd78c80599f21f

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku285795.exe
      Filesize

      294KB

      MD5

      dc34ada1a12ec13b9c0888560abdc7af

      SHA1

      ceab6aa6eca6291df258cbc1be47c30258e60ad4

      SHA256

      ef048faaacb046f1850a7627391ccd2629ec0802b8328fc2c45018358ebf19e8

      SHA512

      55c5c691eec17e472f7a0c040b9f23593a5f2f84cbcac41230c39381eff36ef940269dde009fd35aa8882bfdd87e9f82ca6c5b8683de63e042fd78c80599f21f

    • memory/780-153-0x0000000004A80000-0x0000000005024000-memory.dmp
      Filesize

      5.6MB

    • memory/780-154-0x0000000000680000-0x00000000006CB000-memory.dmp
      Filesize

      300KB

    • memory/780-156-0x0000000004A70000-0x0000000004A80000-memory.dmp
      Filesize

      64KB

    • memory/780-155-0x0000000004A70000-0x0000000004A80000-memory.dmp
      Filesize

      64KB

    • memory/780-157-0x0000000004A70000-0x0000000004A80000-memory.dmp
      Filesize

      64KB

    • memory/780-158-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-159-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-161-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-163-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-165-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-167-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-169-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-171-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-173-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-175-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-177-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-179-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-181-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-183-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-185-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-187-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-189-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-191-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-193-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-195-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-197-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-199-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-201-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-203-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-205-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-207-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-209-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-211-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-213-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-215-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-217-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-219-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-221-0x0000000005030000-0x000000000506F000-memory.dmp
      Filesize

      252KB

    • memory/780-1064-0x0000000005200000-0x0000000005818000-memory.dmp
      Filesize

      6.1MB

    • memory/780-1065-0x00000000058A0000-0x00000000059AA000-memory.dmp
      Filesize

      1.0MB

    • memory/780-1066-0x00000000059E0000-0x00000000059F2000-memory.dmp
      Filesize

      72KB

    • memory/780-1067-0x0000000004A70000-0x0000000004A80000-memory.dmp
      Filesize

      64KB

    • memory/780-1068-0x0000000005A40000-0x0000000005A7C000-memory.dmp
      Filesize

      240KB

    • memory/780-1070-0x0000000004A70000-0x0000000004A80000-memory.dmp
      Filesize

      64KB

    • memory/780-1071-0x0000000004A70000-0x0000000004A80000-memory.dmp
      Filesize

      64KB

    • memory/780-1072-0x0000000004A70000-0x0000000004A80000-memory.dmp
      Filesize

      64KB

    • memory/780-1073-0x0000000005CF0000-0x0000000005D56000-memory.dmp
      Filesize

      408KB

    • memory/780-1074-0x0000000006500000-0x0000000006592000-memory.dmp
      Filesize

      584KB

    • memory/780-1075-0x00000000065F0000-0x00000000067B2000-memory.dmp
      Filesize

      1.8MB

    • memory/780-1076-0x00000000067C0000-0x0000000006CEC000-memory.dmp
      Filesize

      5.2MB

    • memory/780-1077-0x0000000004A70000-0x0000000004A80000-memory.dmp
      Filesize

      64KB

    • memory/780-1078-0x0000000007080000-0x00000000070F6000-memory.dmp
      Filesize

      472KB

    • memory/780-1079-0x0000000007100000-0x0000000007150000-memory.dmp
      Filesize

      320KB

    • memory/2672-1086-0x0000000000680000-0x00000000006B2000-memory.dmp
      Filesize

      200KB

    • memory/2672-1087-0x0000000005020000-0x0000000005030000-memory.dmp
      Filesize

      64KB

    • memory/3340-147-0x0000000000190000-0x000000000019A000-memory.dmp
      Filesize

      40KB