Analysis

  • max time kernel
    48s
  • max time network
    56s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 05:42

General

  • Target

    a4a234c51122265a1fd4e08c17c8d18ddbac4b7cd9524c0f7804513bcae6d473.exe

  • Size

    694KB

  • MD5

    f7e8068aae41d81072ff34806a68bc04

  • SHA1

    4908e6f896ad332e1be47939e4a085e3b9dc90fd

  • SHA256

    a4a234c51122265a1fd4e08c17c8d18ddbac4b7cd9524c0f7804513bcae6d473

  • SHA512

    792bd1c89a8afdf5c142e3b7bbbb3674206f5f6f78699d89663dc258847f3fc863ad44b8ab4a07f78e50916a70554ca541bb6437599267f3c3882fc7e85a7368

  • SSDEEP

    12288:+t0qsEAq3kh0snRy24PG5fgCo//RccvbiOpIWaEx7rOJZo+d+pOpB:NTPq0hpnUleChFDdp9aS7rOJ2G+EH

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4a234c51122265a1fd4e08c17c8d18ddbac4b7cd9524c0f7804513bcae6d473.exe
    "C:\Users\Admin\AppData\Local\Temp\a4a234c51122265a1fd4e08c17c8d18ddbac4b7cd9524c0f7804513bcae6d473.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zibm2610.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zibm2610.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2352
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr307728.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr307728.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3052
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku031366.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku031366.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2692
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr901123.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr901123.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4644

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr901123.exe

    Filesize

    175KB

    MD5

    a3b183310744431c1ae8c6a9e5a8c00c

    SHA1

    e14ba80f5a6c45928c2c1920d36aff461080361a

    SHA256

    10f1c5840d50c1b7f270e354b6f28280a1f19336b37735dfe10069ca7990b9dc

    SHA512

    48a2d4d43b4b4c71301a0feb33c6b4c702c6b4052b79b1b55790ada8dcf52850ad7746ee02d0b408e4390ac91e7f834fea4b03ad90324a03bcdf8df261fd95aa

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr901123.exe

    Filesize

    175KB

    MD5

    a3b183310744431c1ae8c6a9e5a8c00c

    SHA1

    e14ba80f5a6c45928c2c1920d36aff461080361a

    SHA256

    10f1c5840d50c1b7f270e354b6f28280a1f19336b37735dfe10069ca7990b9dc

    SHA512

    48a2d4d43b4b4c71301a0feb33c6b4c702c6b4052b79b1b55790ada8dcf52850ad7746ee02d0b408e4390ac91e7f834fea4b03ad90324a03bcdf8df261fd95aa

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zibm2610.exe

    Filesize

    388KB

    MD5

    7da91d63c271024c618c9988ce1f4604

    SHA1

    f2173e9758baffce0ad82ce1b73523b803de1f99

    SHA256

    403314199f08f27a5ddda772c8447ffc00b9034c49bd4e5d760a0446ae3ab3bc

    SHA512

    3b78c1493e26375ba7f8561dd92f59c00b63c21a88a08473393c77951547774e2c9ebb63d4ddb467b320c44c35060726d81fdb3bf453d9e18d0c3ad51edde387

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zibm2610.exe

    Filesize

    388KB

    MD5

    7da91d63c271024c618c9988ce1f4604

    SHA1

    f2173e9758baffce0ad82ce1b73523b803de1f99

    SHA256

    403314199f08f27a5ddda772c8447ffc00b9034c49bd4e5d760a0446ae3ab3bc

    SHA512

    3b78c1493e26375ba7f8561dd92f59c00b63c21a88a08473393c77951547774e2c9ebb63d4ddb467b320c44c35060726d81fdb3bf453d9e18d0c3ad51edde387

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr307728.exe

    Filesize

    11KB

    MD5

    5b143b7f6940e9de958b67626b1dbd87

    SHA1

    5ba04498673d2351a6be4139cb39f971a17fa3af

    SHA256

    0e19dc7d29ce59c27cb95ee236362e67132028eef5142897003a78a0395297d2

    SHA512

    bb35a3466ba62ab60d0861bf40be658dd2efbdd839aa4f4e7b3b631b2e39da4ab4674f583cd0319e143b4aa3c2bfd2b7988aaae790b7c3e7e6d4e2efcb04bcaa

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr307728.exe

    Filesize

    11KB

    MD5

    5b143b7f6940e9de958b67626b1dbd87

    SHA1

    5ba04498673d2351a6be4139cb39f971a17fa3af

    SHA256

    0e19dc7d29ce59c27cb95ee236362e67132028eef5142897003a78a0395297d2

    SHA512

    bb35a3466ba62ab60d0861bf40be658dd2efbdd839aa4f4e7b3b631b2e39da4ab4674f583cd0319e143b4aa3c2bfd2b7988aaae790b7c3e7e6d4e2efcb04bcaa

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku031366.exe

    Filesize

    345KB

    MD5

    8a012bcfba83ac9642a3556bbbb63d03

    SHA1

    49c2d3e80367abd491353781d6596dd5eeb76962

    SHA256

    df403a44af2b45dcfdb80f7d89e8f186f41fce7fa4e819f8efa68b4e30b29613

    SHA512

    22f59aa00e0748f84d575cb67cb1ff1bdb6d45c1cf6ea6e377dea9c8759540375dc89e572bd4f500deeb23981d4a79de89fb6213cb6225df07c5e2a6b9c00518

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku031366.exe

    Filesize

    345KB

    MD5

    8a012bcfba83ac9642a3556bbbb63d03

    SHA1

    49c2d3e80367abd491353781d6596dd5eeb76962

    SHA256

    df403a44af2b45dcfdb80f7d89e8f186f41fce7fa4e819f8efa68b4e30b29613

    SHA512

    22f59aa00e0748f84d575cb67cb1ff1bdb6d45c1cf6ea6e377dea9c8759540375dc89e572bd4f500deeb23981d4a79de89fb6213cb6225df07c5e2a6b9c00518

  • memory/2076-138-0x0000000006960000-0x00000000069E6000-memory.dmp

    Filesize

    536KB

  • memory/2076-140-0x0000000000400000-0x0000000002BDB000-memory.dmp

    Filesize

    39.9MB

  • memory/2692-186-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2692-196-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2692-148-0x0000000005FD0000-0x00000000064CE000-memory.dmp

    Filesize

    5.0MB

  • memory/2692-149-0x00000000038A0000-0x00000000038B0000-memory.dmp

    Filesize

    64KB

  • memory/2692-151-0x00000000064D0000-0x0000000006514000-memory.dmp

    Filesize

    272KB

  • memory/2692-150-0x00000000038A0000-0x00000000038B0000-memory.dmp

    Filesize

    64KB

  • memory/2692-152-0x00000000038A0000-0x00000000038B0000-memory.dmp

    Filesize

    64KB

  • memory/2692-153-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2692-154-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2692-156-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2692-158-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2692-160-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2692-162-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2692-164-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2692-166-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2692-168-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2692-170-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2692-172-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2692-174-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2692-176-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2692-178-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2692-180-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2692-182-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2692-184-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2692-146-0x0000000001A30000-0x0000000001A7B000-memory.dmp

    Filesize

    300KB

  • memory/2692-188-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2692-190-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2692-192-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2692-194-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2692-147-0x0000000003860000-0x00000000038A6000-memory.dmp

    Filesize

    280KB

  • memory/2692-198-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2692-200-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2692-202-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2692-204-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2692-206-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2692-208-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2692-210-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2692-212-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2692-214-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2692-1059-0x0000000006540000-0x0000000006B46000-memory.dmp

    Filesize

    6.0MB

  • memory/2692-1060-0x0000000006BD0000-0x0000000006CDA000-memory.dmp

    Filesize

    1.0MB

  • memory/2692-1061-0x0000000006D10000-0x0000000006D22000-memory.dmp

    Filesize

    72KB

  • memory/2692-1062-0x00000000038A0000-0x00000000038B0000-memory.dmp

    Filesize

    64KB

  • memory/2692-1063-0x0000000006D30000-0x0000000006D6E000-memory.dmp

    Filesize

    248KB

  • memory/2692-1064-0x0000000006E80000-0x0000000006ECB000-memory.dmp

    Filesize

    300KB

  • memory/2692-1067-0x0000000007010000-0x00000000070A2000-memory.dmp

    Filesize

    584KB

  • memory/2692-1068-0x00000000070B0000-0x0000000007116000-memory.dmp

    Filesize

    408KB

  • memory/2692-1069-0x00000000038A0000-0x00000000038B0000-memory.dmp

    Filesize

    64KB

  • memory/2692-1070-0x00000000038A0000-0x00000000038B0000-memory.dmp

    Filesize

    64KB

  • memory/2692-1071-0x00000000038A0000-0x00000000038B0000-memory.dmp

    Filesize

    64KB

  • memory/2692-1072-0x00000000077B0000-0x0000000007972000-memory.dmp

    Filesize

    1.8MB

  • memory/2692-1073-0x0000000007980000-0x0000000007EAC000-memory.dmp

    Filesize

    5.2MB

  • memory/2692-1074-0x0000000007FE0000-0x0000000008056000-memory.dmp

    Filesize

    472KB

  • memory/2692-1075-0x0000000008070000-0x00000000080C0000-memory.dmp

    Filesize

    320KB

  • memory/2692-1077-0x00000000038A0000-0x00000000038B0000-memory.dmp

    Filesize

    64KB

  • memory/3052-139-0x00000000005B0000-0x00000000005BA000-memory.dmp

    Filesize

    40KB

  • memory/4644-1083-0x0000000000970000-0x00000000009A2000-memory.dmp

    Filesize

    200KB

  • memory/4644-1084-0x00000000053A0000-0x00000000053EB000-memory.dmp

    Filesize

    300KB

  • memory/4644-1085-0x00000000051B0000-0x00000000051C0000-memory.dmp

    Filesize

    64KB