Analysis

  • max time kernel
    67s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-04-2023 21:09

General

  • Target

    d5742ab9a7501c0cdcab92d8bfedf847f12fba3d8527e793a68f2804d54a5412.exe

  • Size

    522KB

  • MD5

    4f60ed16360097208efccac1cdac2ec7

  • SHA1

    d181a2ca371c505047886c7a035288e832d8ff0e

  • SHA256

    d5742ab9a7501c0cdcab92d8bfedf847f12fba3d8527e793a68f2804d54a5412

  • SHA512

    ee9ce1a401082cd7d96d9acec6ac4e722f39185104c4597b55c6fc65b61a79aa82286c0c3918a8ca36ded3d2d5ab8b9765e4450e61345481ed32fb9b7b610015

  • SSDEEP

    12288:CMrfy90GjMTCzsGgSEZEC58Ev4PIzWXTK+WHZ:typj+CwGJAFmEwPBjcZ

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5742ab9a7501c0cdcab92d8bfedf847f12fba3d8527e793a68f2804d54a5412.exe
    "C:\Users\Admin\AppData\Local\Temp\d5742ab9a7501c0cdcab92d8bfedf847f12fba3d8527e793a68f2804d54a5412.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1120
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziCL0209.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziCL0209.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1040
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr064548.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr064548.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4084
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku595748.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku595748.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3364
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 1372
          4⤵
          • Program crash
          PID:4796
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr918418.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr918418.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:240
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3364 -ip 3364
    1⤵
      PID:1876

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    2
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    2
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr918418.exe
      Filesize

      175KB

      MD5

      11236a454445c5242f712f6d1e3f9d12

      SHA1

      5e411bb62092445537bb17b3c62d2caa39d41b96

      SHA256

      33051f6e3e6793efcb26bd167738a55ac59f512c4712e0553f5299a47d00a829

      SHA512

      c127404660367e8c4b444378005a54e0050690d6628761a4f0e2105d757fff7f191c7896812ac644215a9170680de61ca50a8a8ce0b240fd1004279626b7a15e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr918418.exe
      Filesize

      175KB

      MD5

      11236a454445c5242f712f6d1e3f9d12

      SHA1

      5e411bb62092445537bb17b3c62d2caa39d41b96

      SHA256

      33051f6e3e6793efcb26bd167738a55ac59f512c4712e0553f5299a47d00a829

      SHA512

      c127404660367e8c4b444378005a54e0050690d6628761a4f0e2105d757fff7f191c7896812ac644215a9170680de61ca50a8a8ce0b240fd1004279626b7a15e

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziCL0209.exe
      Filesize

      379KB

      MD5

      1a3e73b577826b6ad0669491656bb574

      SHA1

      c0ba069ee7c2b3e57538539324e1c16029c1aa88

      SHA256

      2cf3ad24b874605310eb0a9f611d2004161cb0bd3a50e0add2a4204f92f95172

      SHA512

      c1f7fc4ae0ad9e6e550dee454a4ead439c14f755fbf053d48e79451888f4055cd7038d2e0aa83c7298069f94fe66c4d2d8c5b8d077f9cea3956fe3ce418054dc

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziCL0209.exe
      Filesize

      379KB

      MD5

      1a3e73b577826b6ad0669491656bb574

      SHA1

      c0ba069ee7c2b3e57538539324e1c16029c1aa88

      SHA256

      2cf3ad24b874605310eb0a9f611d2004161cb0bd3a50e0add2a4204f92f95172

      SHA512

      c1f7fc4ae0ad9e6e550dee454a4ead439c14f755fbf053d48e79451888f4055cd7038d2e0aa83c7298069f94fe66c4d2d8c5b8d077f9cea3956fe3ce418054dc

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr064548.exe
      Filesize

      15KB

      MD5

      483240f55605534f1233347a5bfb989a

      SHA1

      683ed7e748e66d30908964d52e0fb9152a74888a

      SHA256

      662b7010f48a57d1c2660f3651f15f2fd04e520838b51f3670f4da5af17a9c8b

      SHA512

      e53fc7127879a16443a9596aee080813316832344ff6e28d6bc9a02c55a9195d2c8343115e4072818c3221650310f728dd7d64690ac0b91c7395166ca9e1bfb5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr064548.exe
      Filesize

      15KB

      MD5

      483240f55605534f1233347a5bfb989a

      SHA1

      683ed7e748e66d30908964d52e0fb9152a74888a

      SHA256

      662b7010f48a57d1c2660f3651f15f2fd04e520838b51f3670f4da5af17a9c8b

      SHA512

      e53fc7127879a16443a9596aee080813316832344ff6e28d6bc9a02c55a9195d2c8343115e4072818c3221650310f728dd7d64690ac0b91c7395166ca9e1bfb5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku595748.exe
      Filesize

      294KB

      MD5

      5c90fcb635fab7a2655b4dc7c25cf817

      SHA1

      38d15b52429310e437f6502ce385f67e4372c6ca

      SHA256

      445d0df4239c3ab9ad31d84a85a8f8009e78f076b6d74a60910cd58a4ebcbe68

      SHA512

      e64f7203da097ec8ecd9cc452ab8970e382323f2e9bd122594e429cc8b1f3a881129374b3af52c981e838ed5e29799afc1fc27d911612ba150c3b6a58456cad6

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku595748.exe
      Filesize

      294KB

      MD5

      5c90fcb635fab7a2655b4dc7c25cf817

      SHA1

      38d15b52429310e437f6502ce385f67e4372c6ca

      SHA256

      445d0df4239c3ab9ad31d84a85a8f8009e78f076b6d74a60910cd58a4ebcbe68

      SHA512

      e64f7203da097ec8ecd9cc452ab8970e382323f2e9bd122594e429cc8b1f3a881129374b3af52c981e838ed5e29799afc1fc27d911612ba150c3b6a58456cad6

    • memory/240-1086-0x0000000000C60000-0x0000000000C92000-memory.dmp
      Filesize

      200KB

    • memory/240-1087-0x00000000054F0000-0x0000000005500000-memory.dmp
      Filesize

      64KB

    • memory/240-1088-0x00000000054F0000-0x0000000005500000-memory.dmp
      Filesize

      64KB

    • memory/3364-191-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-203-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-157-0x0000000004C10000-0x0000000004C20000-memory.dmp
      Filesize

      64KB

    • memory/3364-156-0x0000000004C10000-0x0000000004C20000-memory.dmp
      Filesize

      64KB

    • memory/3364-158-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-159-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-161-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-163-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-165-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-169-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-167-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-171-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-173-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-177-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-175-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-179-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-181-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-183-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-185-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-187-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-189-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-154-0x0000000000610000-0x000000000065B000-memory.dmp
      Filesize

      300KB

    • memory/3364-193-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-195-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-197-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-199-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-201-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-155-0x0000000004C10000-0x0000000004C20000-memory.dmp
      Filesize

      64KB

    • memory/3364-205-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-207-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-209-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-211-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-213-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-215-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-217-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-219-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-221-0x0000000002550000-0x000000000258F000-memory.dmp
      Filesize

      252KB

    • memory/3364-1064-0x00000000052D0000-0x00000000058E8000-memory.dmp
      Filesize

      6.1MB

    • memory/3364-1065-0x00000000058F0000-0x00000000059FA000-memory.dmp
      Filesize

      1.0MB

    • memory/3364-1066-0x0000000004BF0000-0x0000000004C02000-memory.dmp
      Filesize

      72KB

    • memory/3364-1067-0x0000000004C10000-0x0000000004C20000-memory.dmp
      Filesize

      64KB

    • memory/3364-1068-0x0000000005A00000-0x0000000005A3C000-memory.dmp
      Filesize

      240KB

    • memory/3364-1070-0x0000000004C10000-0x0000000004C20000-memory.dmp
      Filesize

      64KB

    • memory/3364-1071-0x0000000004C10000-0x0000000004C20000-memory.dmp
      Filesize

      64KB

    • memory/3364-1072-0x0000000004C10000-0x0000000004C20000-memory.dmp
      Filesize

      64KB

    • memory/3364-1073-0x0000000004C10000-0x0000000004C20000-memory.dmp
      Filesize

      64KB

    • memory/3364-1074-0x0000000005E30000-0x0000000005EC2000-memory.dmp
      Filesize

      584KB

    • memory/3364-1075-0x0000000005ED0000-0x0000000005F36000-memory.dmp
      Filesize

      408KB

    • memory/3364-153-0x0000000004C20000-0x00000000051C4000-memory.dmp
      Filesize

      5.6MB

    • memory/3364-1077-0x00000000078A0000-0x0000000007916000-memory.dmp
      Filesize

      472KB

    • memory/3364-1078-0x0000000007930000-0x0000000007980000-memory.dmp
      Filesize

      320KB

    • memory/3364-1079-0x0000000007A90000-0x0000000007C52000-memory.dmp
      Filesize

      1.8MB

    • memory/3364-1080-0x0000000007C60000-0x000000000818C000-memory.dmp
      Filesize

      5.2MB

    • memory/4084-147-0x00000000007B0000-0x00000000007BA000-memory.dmp
      Filesize

      40KB