Analysis

  • max time kernel
    53s
  • max time network
    70s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 02:32

General

  • Target

    c95f58413b529c8ba9621d1e8def16d691e1fd037d6cc582d6ffc1155bffc59f.exe

  • Size

    664KB

  • MD5

    7ab8e62888acc2310ce3a8b1e211aac5

  • SHA1

    20b91286b7a9488d856788d90110e2fad4023ade

  • SHA256

    c95f58413b529c8ba9621d1e8def16d691e1fd037d6cc582d6ffc1155bffc59f

  • SHA512

    c8306d6677a3c418c107acfbff5d19eb53481e08bad1654fcfc38e0357b7c1de3d7591d3c3a76451d6ab54cfdf0c7856feabf542206ee860c8d2a61dc774449f

  • SSDEEP

    12288:5VaVtadukTDcT7VqrPl/eo2E+4YoOOvpv0V7f40cKkyRluPsyM06u44CexnI:5VCiIfMr9/12EbYo9xUf40cKkyn9yM0a

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c95f58413b529c8ba9621d1e8def16d691e1fd037d6cc582d6ffc1155bffc59f.exe
    "C:\Users\Admin\AppData\Local\Temp\c95f58413b529c8ba9621d1e8def16d691e1fd037d6cc582d6ffc1155bffc59f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5104
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQC9687.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQC9687.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2200
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr510069.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr510069.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3868
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku260293.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku260293.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4832
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr097905.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr097905.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2152

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr097905.exe
    Filesize

    175KB

    MD5

    5f975b4331673c30c9ac4d5489f3cd63

    SHA1

    bbb4c7f8fcbe773d2998c301a0e4c1d5f802baff

    SHA256

    0a72e4acc80b7c72d377d96bc308c972f6aac8bbf180570a52152f71f9f3f5a9

    SHA512

    0d6db9c03d06ece44fb3780bd25ffc5ef975ad14347bcce1349b006c1db266f82e5b18e33f75152c1127ec935067e330e363b045543fbcd8801bdab9d878975c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr097905.exe
    Filesize

    175KB

    MD5

    5f975b4331673c30c9ac4d5489f3cd63

    SHA1

    bbb4c7f8fcbe773d2998c301a0e4c1d5f802baff

    SHA256

    0a72e4acc80b7c72d377d96bc308c972f6aac8bbf180570a52152f71f9f3f5a9

    SHA512

    0d6db9c03d06ece44fb3780bd25ffc5ef975ad14347bcce1349b006c1db266f82e5b18e33f75152c1127ec935067e330e363b045543fbcd8801bdab9d878975c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQC9687.exe
    Filesize

    387KB

    MD5

    53caf17adc839a4667992c6c0ea06d36

    SHA1

    733ef02662f6384bc3a76e8bbc6064793315030c

    SHA256

    be6e81f0b16af02d9133ddf034057fd31fa315165517125f1c348d676001527f

    SHA512

    eb8c2b9ada459f27163a234c84efad7ee04b8ddede5f28e58ff500b190eba4a14467843e546d644e04fc460049a59bbce0e1843474fdcfd48f7d411e05c326b7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQC9687.exe
    Filesize

    387KB

    MD5

    53caf17adc839a4667992c6c0ea06d36

    SHA1

    733ef02662f6384bc3a76e8bbc6064793315030c

    SHA256

    be6e81f0b16af02d9133ddf034057fd31fa315165517125f1c348d676001527f

    SHA512

    eb8c2b9ada459f27163a234c84efad7ee04b8ddede5f28e58ff500b190eba4a14467843e546d644e04fc460049a59bbce0e1843474fdcfd48f7d411e05c326b7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr510069.exe
    Filesize

    11KB

    MD5

    c9c3eb9eabfde6272d553187852e20d1

    SHA1

    ca3e3be1439463bda64a3d248e9203e310625691

    SHA256

    c1b3bfd5b1c3d5d13640d753e45a63c6df8856cbe52733a84be60b0ba9942542

    SHA512

    42bbbc7f0c2822610c74ce732f9bb231fe8b947d1b3115adfab0e86a478f42f309311d6c61d4c48b52f9ca47acd03fcd729f755243ab89651ec7198f4583efed

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr510069.exe
    Filesize

    11KB

    MD5

    c9c3eb9eabfde6272d553187852e20d1

    SHA1

    ca3e3be1439463bda64a3d248e9203e310625691

    SHA256

    c1b3bfd5b1c3d5d13640d753e45a63c6df8856cbe52733a84be60b0ba9942542

    SHA512

    42bbbc7f0c2822610c74ce732f9bb231fe8b947d1b3115adfab0e86a478f42f309311d6c61d4c48b52f9ca47acd03fcd729f755243ab89651ec7198f4583efed

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku260293.exe
    Filesize

    345KB

    MD5

    c2b4517fec935d1bb36b3e9ada66a492

    SHA1

    8a35e3edae871bef9042f063dd2c1808e21d1033

    SHA256

    2dae1f45f8df7cd6879329e22c470f539402fdda4e430e10a1f3801ef240ee0b

    SHA512

    ad5dc41d34f74d0c687765b9418441f6299d7d75d2e642e8a462220123e073fa8239eed66ee7168768bd183ace5570cec6dc7a38a32332a2cb0e8a754997c000

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku260293.exe
    Filesize

    345KB

    MD5

    c2b4517fec935d1bb36b3e9ada66a492

    SHA1

    8a35e3edae871bef9042f063dd2c1808e21d1033

    SHA256

    2dae1f45f8df7cd6879329e22c470f539402fdda4e430e10a1f3801ef240ee0b

    SHA512

    ad5dc41d34f74d0c687765b9418441f6299d7d75d2e642e8a462220123e073fa8239eed66ee7168768bd183ace5570cec6dc7a38a32332a2cb0e8a754997c000

  • memory/2152-1078-0x0000000000C70000-0x0000000000CA2000-memory.dmp
    Filesize

    200KB

  • memory/2152-1082-0x00000000057F0000-0x0000000005800000-memory.dmp
    Filesize

    64KB

  • memory/2152-1080-0x00000000057F0000-0x0000000005800000-memory.dmp
    Filesize

    64KB

  • memory/2152-1079-0x00000000056A0000-0x00000000056EB000-memory.dmp
    Filesize

    300KB

  • memory/3868-134-0x0000000000700000-0x000000000070A000-memory.dmp
    Filesize

    40KB

  • memory/4832-185-0x0000000003850000-0x0000000003860000-memory.dmp
    Filesize

    64KB

  • memory/4832-198-0x0000000006500000-0x000000000653F000-memory.dmp
    Filesize

    252KB

  • memory/4832-147-0x0000000006500000-0x000000000653F000-memory.dmp
    Filesize

    252KB

  • memory/4832-150-0x0000000006500000-0x000000000653F000-memory.dmp
    Filesize

    252KB

  • memory/4832-148-0x0000000006500000-0x000000000653F000-memory.dmp
    Filesize

    252KB

  • memory/4832-152-0x0000000006500000-0x000000000653F000-memory.dmp
    Filesize

    252KB

  • memory/4832-154-0x0000000006500000-0x000000000653F000-memory.dmp
    Filesize

    252KB

  • memory/4832-156-0x0000000006500000-0x000000000653F000-memory.dmp
    Filesize

    252KB

  • memory/4832-158-0x0000000006500000-0x000000000653F000-memory.dmp
    Filesize

    252KB

  • memory/4832-160-0x0000000006500000-0x000000000653F000-memory.dmp
    Filesize

    252KB

  • memory/4832-164-0x0000000006500000-0x000000000653F000-memory.dmp
    Filesize

    252KB

  • memory/4832-162-0x0000000006500000-0x000000000653F000-memory.dmp
    Filesize

    252KB

  • memory/4832-166-0x0000000006500000-0x000000000653F000-memory.dmp
    Filesize

    252KB

  • memory/4832-168-0x0000000006500000-0x000000000653F000-memory.dmp
    Filesize

    252KB

  • memory/4832-170-0x0000000006500000-0x000000000653F000-memory.dmp
    Filesize

    252KB

  • memory/4832-172-0x0000000006500000-0x000000000653F000-memory.dmp
    Filesize

    252KB

  • memory/4832-174-0x0000000006500000-0x000000000653F000-memory.dmp
    Filesize

    252KB

  • memory/4832-176-0x0000000006500000-0x000000000653F000-memory.dmp
    Filesize

    252KB

  • memory/4832-178-0x0000000006500000-0x000000000653F000-memory.dmp
    Filesize

    252KB

  • memory/4832-180-0x0000000006500000-0x000000000653F000-memory.dmp
    Filesize

    252KB

  • memory/4832-182-0x0000000006500000-0x000000000653F000-memory.dmp
    Filesize

    252KB

  • memory/4832-145-0x0000000005FC0000-0x00000000064BE000-memory.dmp
    Filesize

    5.0MB

  • memory/4832-184-0x0000000006500000-0x000000000653F000-memory.dmp
    Filesize

    252KB

  • memory/4832-187-0x0000000003850000-0x0000000003860000-memory.dmp
    Filesize

    64KB

  • memory/4832-188-0x0000000006500000-0x000000000653F000-memory.dmp
    Filesize

    252KB

  • memory/4832-190-0x0000000006500000-0x000000000653F000-memory.dmp
    Filesize

    252KB

  • memory/4832-192-0x0000000006500000-0x000000000653F000-memory.dmp
    Filesize

    252KB

  • memory/4832-194-0x0000000006500000-0x000000000653F000-memory.dmp
    Filesize

    252KB

  • memory/4832-196-0x0000000006500000-0x000000000653F000-memory.dmp
    Filesize

    252KB

  • memory/4832-146-0x0000000006500000-0x0000000006544000-memory.dmp
    Filesize

    272KB

  • memory/4832-200-0x0000000006500000-0x000000000653F000-memory.dmp
    Filesize

    252KB

  • memory/4832-202-0x0000000006500000-0x000000000653F000-memory.dmp
    Filesize

    252KB

  • memory/4832-204-0x0000000006500000-0x000000000653F000-memory.dmp
    Filesize

    252KB

  • memory/4832-206-0x0000000006500000-0x000000000653F000-memory.dmp
    Filesize

    252KB

  • memory/4832-208-0x0000000006500000-0x000000000653F000-memory.dmp
    Filesize

    252KB

  • memory/4832-210-0x0000000006500000-0x000000000653F000-memory.dmp
    Filesize

    252KB

  • memory/4832-1055-0x0000000006C90000-0x0000000007296000-memory.dmp
    Filesize

    6.0MB

  • memory/4832-1056-0x0000000006700000-0x000000000680A000-memory.dmp
    Filesize

    1.0MB

  • memory/4832-1057-0x0000000006840000-0x0000000006852000-memory.dmp
    Filesize

    72KB

  • memory/4832-1058-0x0000000006860000-0x000000000689E000-memory.dmp
    Filesize

    248KB

  • memory/4832-1059-0x00000000069B0000-0x00000000069FB000-memory.dmp
    Filesize

    300KB

  • memory/4832-1060-0x0000000003850000-0x0000000003860000-memory.dmp
    Filesize

    64KB

  • memory/4832-1062-0x0000000006B40000-0x0000000006BD2000-memory.dmp
    Filesize

    584KB

  • memory/4832-1063-0x0000000006BE0000-0x0000000006C46000-memory.dmp
    Filesize

    408KB

  • memory/4832-1065-0x0000000003850000-0x0000000003860000-memory.dmp
    Filesize

    64KB

  • memory/4832-1066-0x0000000003850000-0x0000000003860000-memory.dmp
    Filesize

    64KB

  • memory/4832-1067-0x0000000003850000-0x0000000003860000-memory.dmp
    Filesize

    64KB

  • memory/4832-1068-0x0000000007900000-0x0000000007AC2000-memory.dmp
    Filesize

    1.8MB

  • memory/4832-1069-0x0000000007AE0000-0x000000000800C000-memory.dmp
    Filesize

    5.2MB

  • memory/4832-143-0x0000000003850000-0x0000000003860000-memory.dmp
    Filesize

    64KB

  • memory/4832-144-0x00000000037B0000-0x00000000037F6000-memory.dmp
    Filesize

    280KB

  • memory/4832-142-0x0000000001BA0000-0x0000000001BEB000-memory.dmp
    Filesize

    300KB

  • memory/4832-1070-0x0000000003850000-0x0000000003860000-memory.dmp
    Filesize

    64KB

  • memory/4832-1071-0x0000000008130000-0x00000000081A6000-memory.dmp
    Filesize

    472KB

  • memory/4832-1072-0x00000000081C0000-0x0000000008210000-memory.dmp
    Filesize

    320KB

  • memory/5104-135-0x0000000004500000-0x0000000004586000-memory.dmp
    Filesize

    536KB

  • memory/5104-136-0x0000000000400000-0x0000000000769000-memory.dmp
    Filesize

    3.4MB