Analysis

  • max time kernel
    46s
  • max time network
    50s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    28-03-2023 22:17

General

  • Target

    236d6964559a3592d32a2b760c8353363b0a51d5c54db2b012b32492415e4a15.exe

  • Size

    752KB

  • MD5

    190c07a589e581e8ba109bb55a417846

  • SHA1

    461a37717de409dd71132a2d18edc38c381b4c13

  • SHA256

    236d6964559a3592d32a2b760c8353363b0a51d5c54db2b012b32492415e4a15

  • SHA512

    920cea6836456ad551f364c70062a1b3fc23994d5b5986cc55d5ca10b70be56b61db7d3417f10f7c002fe57ca99b1cfa14f20f07ddd905c01d118295ef895b8f

  • SSDEEP

    12288:y6loBKUk8OW2YlksgdmkmpdMWzsVcS5AzTVyOv6swiiF2jq:B0KUFOeQb+dMWAtCzTsFswiBq

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

muse

C2

176.113.115.145:4125

Attributes
  • auth_value

    b91988a63a24940038d9262827a5320c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\236d6964559a3592d32a2b760c8353363b0a51d5c54db2b012b32492415e4a15.exe
    "C:\Users\Admin\AppData\Local\Temp\236d6964559a3592d32a2b760c8353363b0a51d5c54db2b012b32492415e4a15.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPX0226.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPX0226.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr711182.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr711182.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:680
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku689405.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku689405.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1060
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr818587.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr818587.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1956

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr818587.exe
    Filesize

    175KB

    MD5

    2aea66c4cf45466a5368cffcbac63580

    SHA1

    2c958ed578b1b0b0ebe7095bc85015cdd2b08ea3

    SHA256

    dc04c6499fee7358f8b46e43f84856354ab92c0baadd55a0a08d3cd2d8a3db9c

    SHA512

    3c6727ba02e61412c65bdeef5e408f4ec71709afc22dccd1e9a0dc03faf44421ce0031456e814182e8957bd510a0347dd8f3dc1ca43a9fdc4e5ebd4aaf262ef2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr818587.exe
    Filesize

    175KB

    MD5

    2aea66c4cf45466a5368cffcbac63580

    SHA1

    2c958ed578b1b0b0ebe7095bc85015cdd2b08ea3

    SHA256

    dc04c6499fee7358f8b46e43f84856354ab92c0baadd55a0a08d3cd2d8a3db9c

    SHA512

    3c6727ba02e61412c65bdeef5e408f4ec71709afc22dccd1e9a0dc03faf44421ce0031456e814182e8957bd510a0347dd8f3dc1ca43a9fdc4e5ebd4aaf262ef2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPX0226.exe
    Filesize

    420KB

    MD5

    8930e2e231973608c4ed837c76f4fa58

    SHA1

    a51e04731e9361dc029622f93410390d9dac9fc9

    SHA256

    45361e35263bcd362162a4b76e1964c37ca4061dfa7604a146ca806408be93d7

    SHA512

    552ae6ed1287d5d694261bdfe4f3a7d26ed9971477b80c0fe98a8748cad089117a34c7c988cbddcaefe87f651b5f457b9e1eb9fad68e3ab3d8f329f4d77e4133

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPX0226.exe
    Filesize

    420KB

    MD5

    8930e2e231973608c4ed837c76f4fa58

    SHA1

    a51e04731e9361dc029622f93410390d9dac9fc9

    SHA256

    45361e35263bcd362162a4b76e1964c37ca4061dfa7604a146ca806408be93d7

    SHA512

    552ae6ed1287d5d694261bdfe4f3a7d26ed9971477b80c0fe98a8748cad089117a34c7c988cbddcaefe87f651b5f457b9e1eb9fad68e3ab3d8f329f4d77e4133

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr711182.exe
    Filesize

    11KB

    MD5

    fda150cbbe59c4a15e60691d25397873

    SHA1

    10214422ff569e6b48623d9f73465dab8157d993

    SHA256

    69dbde5c1e79180df44fbbe52a81585cf03b44843610fdff1f0a15fa212046f9

    SHA512

    9a4db3f159a8ba5a950c27edb8b784dafe443561c55c95fbfaf7bf0e120e1dbf1552b5b85025c634d2841ad3e9927394b3072dc5dc2e974bd494e4ff9b38e089

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr711182.exe
    Filesize

    11KB

    MD5

    fda150cbbe59c4a15e60691d25397873

    SHA1

    10214422ff569e6b48623d9f73465dab8157d993

    SHA256

    69dbde5c1e79180df44fbbe52a81585cf03b44843610fdff1f0a15fa212046f9

    SHA512

    9a4db3f159a8ba5a950c27edb8b784dafe443561c55c95fbfaf7bf0e120e1dbf1552b5b85025c634d2841ad3e9927394b3072dc5dc2e974bd494e4ff9b38e089

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku689405.exe
    Filesize

    405KB

    MD5

    24e5148224654550286aa039ea6ff337

    SHA1

    c98c118d41bf772f58487c46aac3ff1738212fff

    SHA256

    574dede1b047bf2773e8a7c44dace41bc7dac649dd8f9fcf0c8122c7a64ece1f

    SHA512

    fb98a5b3a1cf5d1dc4a1ffe7945df5929ff4cd735d2c2ab10def58c183979c4f6f8901867e2e7afd24a85197e73a71409ffdbb108fa2e86e71fb76e0b644d237

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku689405.exe
    Filesize

    405KB

    MD5

    24e5148224654550286aa039ea6ff337

    SHA1

    c98c118d41bf772f58487c46aac3ff1738212fff

    SHA256

    574dede1b047bf2773e8a7c44dace41bc7dac649dd8f9fcf0c8122c7a64ece1f

    SHA512

    fb98a5b3a1cf5d1dc4a1ffe7945df5929ff4cd735d2c2ab10def58c183979c4f6f8901867e2e7afd24a85197e73a71409ffdbb108fa2e86e71fb76e0b644d237

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku689405.exe
    Filesize

    405KB

    MD5

    24e5148224654550286aa039ea6ff337

    SHA1

    c98c118d41bf772f58487c46aac3ff1738212fff

    SHA256

    574dede1b047bf2773e8a7c44dace41bc7dac649dd8f9fcf0c8122c7a64ece1f

    SHA512

    fb98a5b3a1cf5d1dc4a1ffe7945df5929ff4cd735d2c2ab10def58c183979c4f6f8901867e2e7afd24a85197e73a71409ffdbb108fa2e86e71fb76e0b644d237

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\lr818587.exe
    Filesize

    175KB

    MD5

    2aea66c4cf45466a5368cffcbac63580

    SHA1

    2c958ed578b1b0b0ebe7095bc85015cdd2b08ea3

    SHA256

    dc04c6499fee7358f8b46e43f84856354ab92c0baadd55a0a08d3cd2d8a3db9c

    SHA512

    3c6727ba02e61412c65bdeef5e408f4ec71709afc22dccd1e9a0dc03faf44421ce0031456e814182e8957bd510a0347dd8f3dc1ca43a9fdc4e5ebd4aaf262ef2

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPX0226.exe
    Filesize

    420KB

    MD5

    8930e2e231973608c4ed837c76f4fa58

    SHA1

    a51e04731e9361dc029622f93410390d9dac9fc9

    SHA256

    45361e35263bcd362162a4b76e1964c37ca4061dfa7604a146ca806408be93d7

    SHA512

    552ae6ed1287d5d694261bdfe4f3a7d26ed9971477b80c0fe98a8748cad089117a34c7c988cbddcaefe87f651b5f457b9e1eb9fad68e3ab3d8f329f4d77e4133

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPX0226.exe
    Filesize

    420KB

    MD5

    8930e2e231973608c4ed837c76f4fa58

    SHA1

    a51e04731e9361dc029622f93410390d9dac9fc9

    SHA256

    45361e35263bcd362162a4b76e1964c37ca4061dfa7604a146ca806408be93d7

    SHA512

    552ae6ed1287d5d694261bdfe4f3a7d26ed9971477b80c0fe98a8748cad089117a34c7c988cbddcaefe87f651b5f457b9e1eb9fad68e3ab3d8f329f4d77e4133

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\jr711182.exe
    Filesize

    11KB

    MD5

    fda150cbbe59c4a15e60691d25397873

    SHA1

    10214422ff569e6b48623d9f73465dab8157d993

    SHA256

    69dbde5c1e79180df44fbbe52a81585cf03b44843610fdff1f0a15fa212046f9

    SHA512

    9a4db3f159a8ba5a950c27edb8b784dafe443561c55c95fbfaf7bf0e120e1dbf1552b5b85025c634d2841ad3e9927394b3072dc5dc2e974bd494e4ff9b38e089

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ku689405.exe
    Filesize

    405KB

    MD5

    24e5148224654550286aa039ea6ff337

    SHA1

    c98c118d41bf772f58487c46aac3ff1738212fff

    SHA256

    574dede1b047bf2773e8a7c44dace41bc7dac649dd8f9fcf0c8122c7a64ece1f

    SHA512

    fb98a5b3a1cf5d1dc4a1ffe7945df5929ff4cd735d2c2ab10def58c183979c4f6f8901867e2e7afd24a85197e73a71409ffdbb108fa2e86e71fb76e0b644d237

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ku689405.exe
    Filesize

    405KB

    MD5

    24e5148224654550286aa039ea6ff337

    SHA1

    c98c118d41bf772f58487c46aac3ff1738212fff

    SHA256

    574dede1b047bf2773e8a7c44dace41bc7dac649dd8f9fcf0c8122c7a64ece1f

    SHA512

    fb98a5b3a1cf5d1dc4a1ffe7945df5929ff4cd735d2c2ab10def58c183979c4f6f8901867e2e7afd24a85197e73a71409ffdbb108fa2e86e71fb76e0b644d237

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ku689405.exe
    Filesize

    405KB

    MD5

    24e5148224654550286aa039ea6ff337

    SHA1

    c98c118d41bf772f58487c46aac3ff1738212fff

    SHA256

    574dede1b047bf2773e8a7c44dace41bc7dac649dd8f9fcf0c8122c7a64ece1f

    SHA512

    fb98a5b3a1cf5d1dc4a1ffe7945df5929ff4cd735d2c2ab10def58c183979c4f6f8901867e2e7afd24a85197e73a71409ffdbb108fa2e86e71fb76e0b644d237

  • memory/680-74-0x0000000000EC0000-0x0000000000ECA000-memory.dmp
    Filesize

    40KB

  • memory/1048-54-0x00000000002C0000-0x0000000000344000-memory.dmp
    Filesize

    528KB

  • memory/1048-75-0x0000000000400000-0x0000000002BEA000-memory.dmp
    Filesize

    39.9MB

  • memory/1048-63-0x0000000000350000-0x00000000003DE000-memory.dmp
    Filesize

    568KB

  • memory/1060-105-0x00000000049D0000-0x0000000004A0F000-memory.dmp
    Filesize

    252KB

  • memory/1060-127-0x00000000049D0000-0x0000000004A0F000-memory.dmp
    Filesize

    252KB

  • memory/1060-91-0x00000000072F0000-0x0000000007330000-memory.dmp
    Filesize

    256KB

  • memory/1060-92-0x00000000049D0000-0x0000000004A0F000-memory.dmp
    Filesize

    252KB

  • memory/1060-93-0x00000000049D0000-0x0000000004A0F000-memory.dmp
    Filesize

    252KB

  • memory/1060-95-0x00000000049D0000-0x0000000004A0F000-memory.dmp
    Filesize

    252KB

  • memory/1060-97-0x00000000049D0000-0x0000000004A0F000-memory.dmp
    Filesize

    252KB

  • memory/1060-99-0x00000000049D0000-0x0000000004A0F000-memory.dmp
    Filesize

    252KB

  • memory/1060-101-0x00000000049D0000-0x0000000004A0F000-memory.dmp
    Filesize

    252KB

  • memory/1060-103-0x00000000049D0000-0x0000000004A0F000-memory.dmp
    Filesize

    252KB

  • memory/1060-89-0x00000000072F0000-0x0000000007330000-memory.dmp
    Filesize

    256KB

  • memory/1060-107-0x00000000049D0000-0x0000000004A0F000-memory.dmp
    Filesize

    252KB

  • memory/1060-109-0x00000000049D0000-0x0000000004A0F000-memory.dmp
    Filesize

    252KB

  • memory/1060-111-0x00000000049D0000-0x0000000004A0F000-memory.dmp
    Filesize

    252KB

  • memory/1060-113-0x00000000049D0000-0x0000000004A0F000-memory.dmp
    Filesize

    252KB

  • memory/1060-115-0x00000000049D0000-0x0000000004A0F000-memory.dmp
    Filesize

    252KB

  • memory/1060-117-0x00000000049D0000-0x0000000004A0F000-memory.dmp
    Filesize

    252KB

  • memory/1060-121-0x00000000049D0000-0x0000000004A0F000-memory.dmp
    Filesize

    252KB

  • memory/1060-119-0x00000000049D0000-0x0000000004A0F000-memory.dmp
    Filesize

    252KB

  • memory/1060-125-0x00000000049D0000-0x0000000004A0F000-memory.dmp
    Filesize

    252KB

  • memory/1060-123-0x00000000049D0000-0x0000000004A0F000-memory.dmp
    Filesize

    252KB

  • memory/1060-90-0x00000000072F0000-0x0000000007330000-memory.dmp
    Filesize

    256KB

  • memory/1060-129-0x00000000049D0000-0x0000000004A0F000-memory.dmp
    Filesize

    252KB

  • memory/1060-131-0x00000000049D0000-0x0000000004A0F000-memory.dmp
    Filesize

    252KB

  • memory/1060-133-0x00000000049D0000-0x0000000004A0F000-memory.dmp
    Filesize

    252KB

  • memory/1060-137-0x00000000049D0000-0x0000000004A0F000-memory.dmp
    Filesize

    252KB

  • memory/1060-135-0x00000000049D0000-0x0000000004A0F000-memory.dmp
    Filesize

    252KB

  • memory/1060-139-0x00000000049D0000-0x0000000004A0F000-memory.dmp
    Filesize

    252KB

  • memory/1060-141-0x00000000049D0000-0x0000000004A0F000-memory.dmp
    Filesize

    252KB

  • memory/1060-143-0x00000000049D0000-0x0000000004A0F000-memory.dmp
    Filesize

    252KB

  • memory/1060-147-0x00000000049D0000-0x0000000004A0F000-memory.dmp
    Filesize

    252KB

  • memory/1060-145-0x00000000049D0000-0x0000000004A0F000-memory.dmp
    Filesize

    252KB

  • memory/1060-149-0x00000000049D0000-0x0000000004A0F000-memory.dmp
    Filesize

    252KB

  • memory/1060-151-0x00000000049D0000-0x0000000004A0F000-memory.dmp
    Filesize

    252KB

  • memory/1060-153-0x00000000049D0000-0x0000000004A0F000-memory.dmp
    Filesize

    252KB

  • memory/1060-999-0x00000000072F0000-0x0000000007330000-memory.dmp
    Filesize

    256KB

  • memory/1060-88-0x0000000000300000-0x000000000034B000-memory.dmp
    Filesize

    300KB

  • memory/1060-87-0x00000000049D0000-0x0000000004A14000-memory.dmp
    Filesize

    272KB

  • memory/1060-86-0x0000000004860000-0x00000000048A6000-memory.dmp
    Filesize

    280KB

  • memory/1956-1008-0x0000000000EB0000-0x0000000000EE2000-memory.dmp
    Filesize

    200KB

  • memory/1956-1009-0x0000000004A40000-0x0000000004A80000-memory.dmp
    Filesize

    256KB