Analysis

  • max time kernel
    84s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 21:05

General

  • Target

    359902499ee512cb2cf33f31c531fe39563cdf2f9d5b4bcf2a52d06ed274ceac.exe

  • Size

    522KB

  • MD5

    a018fec7de54a2a39d9c3e23b2c3d8df

  • SHA1

    61d0cbe2ece5e81c7931aa5722819bcb428a94d6

  • SHA256

    359902499ee512cb2cf33f31c531fe39563cdf2f9d5b4bcf2a52d06ed274ceac

  • SHA512

    1bb51b24125d1974752737497ed78b778d7b4b6dabbd265152fa8f5eef8e89f33a777a6b4db8f7d613fe12c279059255aa37c78b95b8c9f1c820f7c942287977

  • SSDEEP

    12288:bMrvy905Di0sgZ7ZqMi5sp1/q5+8Yd4vLzWCwyWvtA5iBd:EyKwhMi6pRaXY+v2COA5iBd

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\359902499ee512cb2cf33f31c531fe39563cdf2f9d5b4bcf2a52d06ed274ceac.exe
    "C:\Users\Admin\AppData\Local\Temp\359902499ee512cb2cf33f31c531fe39563cdf2f9d5b4bcf2a52d06ed274ceac.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1804
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXr1920.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXr1920.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1060
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr208310.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr208310.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4432
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku491083.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku491083.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4612
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4612 -s 1868
          4⤵
          • Program crash
          PID:1424
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr155596.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr155596.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2236
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4612 -ip 4612
    1⤵
      PID:4180

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr155596.exe
      Filesize

      175KB

      MD5

      ae9797c456535d7493ae3918603a2c19

      SHA1

      9db12e90bab014e02d1adb02cd27a346d4714e36

      SHA256

      cbc6d58bae9a37c18b039b12fc47d53a309f75566fef0020b0217b30f518693e

      SHA512

      839d5927777aa29bfc7446fa8863452fdf8d06d0bdb10f895a89d8818a0a2ba4d304e32f298d4f6a3a9ee066d3e26709591d05b945438a307624884b9b261b5f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr155596.exe
      Filesize

      175KB

      MD5

      ae9797c456535d7493ae3918603a2c19

      SHA1

      9db12e90bab014e02d1adb02cd27a346d4714e36

      SHA256

      cbc6d58bae9a37c18b039b12fc47d53a309f75566fef0020b0217b30f518693e

      SHA512

      839d5927777aa29bfc7446fa8863452fdf8d06d0bdb10f895a89d8818a0a2ba4d304e32f298d4f6a3a9ee066d3e26709591d05b945438a307624884b9b261b5f

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXr1920.exe
      Filesize

      380KB

      MD5

      2d90372365c93f4d34ba6e985f5bbaa0

      SHA1

      47b50628c5b1b1a6c46c09ecf188ef02405555ff

      SHA256

      944066820998fba3ff185071efac182e044bb84d292fb9d54d037c79125fbb42

      SHA512

      4249ffc796b6869a2f109cf8325ba42ced8cc84e1647bbd80804d5ccf64101d7864d51e3ef192d1f6a4ee3566664b6059e69676ce706149a3393e3a96aa3c61e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziXr1920.exe
      Filesize

      380KB

      MD5

      2d90372365c93f4d34ba6e985f5bbaa0

      SHA1

      47b50628c5b1b1a6c46c09ecf188ef02405555ff

      SHA256

      944066820998fba3ff185071efac182e044bb84d292fb9d54d037c79125fbb42

      SHA512

      4249ffc796b6869a2f109cf8325ba42ced8cc84e1647bbd80804d5ccf64101d7864d51e3ef192d1f6a4ee3566664b6059e69676ce706149a3393e3a96aa3c61e

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr208310.exe
      Filesize

      15KB

      MD5

      8da2908c6814d335a73a34df2d2d9135

      SHA1

      1782719da1526781f7d323982d0f43f6e62e4a05

      SHA256

      ca89b67aef1f70e55da29aab7559e89d64e7236f9e152064c4696f406dc25b80

      SHA512

      cd4e4829ea8c9b29fa4dee4aa66c5a2000eb9b66aacba02d3fecb28275c6adaf785ee902feaeea4426d21931cf5acee94d63c1645d50cb04b83a66b1fc7930b1

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr208310.exe
      Filesize

      15KB

      MD5

      8da2908c6814d335a73a34df2d2d9135

      SHA1

      1782719da1526781f7d323982d0f43f6e62e4a05

      SHA256

      ca89b67aef1f70e55da29aab7559e89d64e7236f9e152064c4696f406dc25b80

      SHA512

      cd4e4829ea8c9b29fa4dee4aa66c5a2000eb9b66aacba02d3fecb28275c6adaf785ee902feaeea4426d21931cf5acee94d63c1645d50cb04b83a66b1fc7930b1

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku491083.exe
      Filesize

      294KB

      MD5

      e706b46d4b2f9476b47c4fac955a9d13

      SHA1

      1268f8dee6c6d469c1979c2cbf40af5a88803dd1

      SHA256

      d382527a03be3562180441bde796bace1628a0d8d7f5d66f69b5a4575097cd4f

      SHA512

      edf28337d370f353bf349b552c5fc8cbcec32e1e6137183e1db0d9e4c8715f80e45ffe901dbccb4011c1fbd764586b090f4c8a553c98cd4470d53bbd22d11d5c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku491083.exe
      Filesize

      294KB

      MD5

      e706b46d4b2f9476b47c4fac955a9d13

      SHA1

      1268f8dee6c6d469c1979c2cbf40af5a88803dd1

      SHA256

      d382527a03be3562180441bde796bace1628a0d8d7f5d66f69b5a4575097cd4f

      SHA512

      edf28337d370f353bf349b552c5fc8cbcec32e1e6137183e1db0d9e4c8715f80e45ffe901dbccb4011c1fbd764586b090f4c8a553c98cd4470d53bbd22d11d5c

    • memory/2236-1083-0x00000000005C0000-0x00000000005F2000-memory.dmp
      Filesize

      200KB

    • memory/2236-1084-0x00000000051F0000-0x0000000005200000-memory.dmp
      Filesize

      64KB

    • memory/4432-147-0x0000000000FB0000-0x0000000000FBA000-memory.dmp
      Filesize

      40KB

    • memory/4612-186-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-198-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-156-0x00000000027D0000-0x00000000027E0000-memory.dmp
      Filesize

      64KB

    • memory/4612-155-0x00000000027D0000-0x00000000027E0000-memory.dmp
      Filesize

      64KB

    • memory/4612-157-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-160-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-158-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-162-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-164-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-166-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-168-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-170-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-172-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-174-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-176-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-178-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-180-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-182-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-184-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-153-0x0000000004B30000-0x00000000050D4000-memory.dmp
      Filesize

      5.6MB

    • memory/4612-188-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-190-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-192-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-194-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-196-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-154-0x0000000000640000-0x000000000068B000-memory.dmp
      Filesize

      300KB

    • memory/4612-200-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-202-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-204-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-206-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-208-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-210-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-212-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-214-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-216-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-218-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-220-0x0000000002730000-0x000000000276F000-memory.dmp
      Filesize

      252KB

    • memory/4612-1063-0x0000000005220000-0x0000000005838000-memory.dmp
      Filesize

      6.1MB

    • memory/4612-1064-0x00000000058A0000-0x00000000059AA000-memory.dmp
      Filesize

      1.0MB

    • memory/4612-1065-0x00000000059E0000-0x00000000059F2000-memory.dmp
      Filesize

      72KB

    • memory/4612-1066-0x00000000027D0000-0x00000000027E0000-memory.dmp
      Filesize

      64KB

    • memory/4612-1067-0x0000000005A00000-0x0000000005A3C000-memory.dmp
      Filesize

      240KB

    • memory/4612-1069-0x0000000005CF0000-0x0000000005D82000-memory.dmp
      Filesize

      584KB

    • memory/4612-1070-0x0000000005D90000-0x0000000005DF6000-memory.dmp
      Filesize

      408KB

    • memory/4612-1071-0x00000000027D0000-0x00000000027E0000-memory.dmp
      Filesize

      64KB

    • memory/4612-1072-0x00000000027D0000-0x00000000027E0000-memory.dmp
      Filesize

      64KB

    • memory/4612-1073-0x00000000027D0000-0x00000000027E0000-memory.dmp
      Filesize

      64KB

    • memory/4612-1074-0x0000000007810000-0x00000000079D2000-memory.dmp
      Filesize

      1.8MB

    • memory/4612-1075-0x00000000079E0000-0x0000000007F0C000-memory.dmp
      Filesize

      5.2MB

    • memory/4612-1076-0x00000000064C0000-0x0000000006536000-memory.dmp
      Filesize

      472KB

    • memory/4612-1077-0x0000000006550000-0x00000000065A0000-memory.dmp
      Filesize

      320KB