Analysis

  • max time kernel
    44s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    28-03-2023 06:36

General

  • Target

    29ef22d5305beface5035ca8eb7a4b86.exe

  • Size

    694KB

  • MD5

    29ef22d5305beface5035ca8eb7a4b86

  • SHA1

    5b3936e305fc5106d3e6a4139ff185d168a47ea7

  • SHA256

    32c38a7dce41299d632e5edda7ed579dad21c704025340c4dffdf1fd34dbcafc

  • SHA512

    45eceeb8eb666e5815db0da20066e82d63f0a7baee14b416722dd045c041f520cf54b80c5afade38a7fa6aadfbc1b5410c57c8e2765542420c8cceb28b2c873f

  • SSDEEP

    12288:It0qsEAq3kh0snRy24PG5fgCo//RccvbiOpIWaEx7rOJZo+d+pOpB:bTPq0hpnUleChFDdp9aS7rOJ2G+EH

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\29ef22d5305beface5035ca8eb7a4b86.exe
    "C:\Users\Admin\AppData\Local\Temp\29ef22d5305beface5035ca8eb7a4b86.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zibm2610.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zibm2610.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2024
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr307728.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr307728.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1280
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku031366.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku031366.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1420
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr901123.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr901123.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1500

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr901123.exe

    Filesize

    175KB

    MD5

    a3b183310744431c1ae8c6a9e5a8c00c

    SHA1

    e14ba80f5a6c45928c2c1920d36aff461080361a

    SHA256

    10f1c5840d50c1b7f270e354b6f28280a1f19336b37735dfe10069ca7990b9dc

    SHA512

    48a2d4d43b4b4c71301a0feb33c6b4c702c6b4052b79b1b55790ada8dcf52850ad7746ee02d0b408e4390ac91e7f834fea4b03ad90324a03bcdf8df261fd95aa

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr901123.exe

    Filesize

    175KB

    MD5

    a3b183310744431c1ae8c6a9e5a8c00c

    SHA1

    e14ba80f5a6c45928c2c1920d36aff461080361a

    SHA256

    10f1c5840d50c1b7f270e354b6f28280a1f19336b37735dfe10069ca7990b9dc

    SHA512

    48a2d4d43b4b4c71301a0feb33c6b4c702c6b4052b79b1b55790ada8dcf52850ad7746ee02d0b408e4390ac91e7f834fea4b03ad90324a03bcdf8df261fd95aa

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zibm2610.exe

    Filesize

    388KB

    MD5

    7da91d63c271024c618c9988ce1f4604

    SHA1

    f2173e9758baffce0ad82ce1b73523b803de1f99

    SHA256

    403314199f08f27a5ddda772c8447ffc00b9034c49bd4e5d760a0446ae3ab3bc

    SHA512

    3b78c1493e26375ba7f8561dd92f59c00b63c21a88a08473393c77951547774e2c9ebb63d4ddb467b320c44c35060726d81fdb3bf453d9e18d0c3ad51edde387

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zibm2610.exe

    Filesize

    388KB

    MD5

    7da91d63c271024c618c9988ce1f4604

    SHA1

    f2173e9758baffce0ad82ce1b73523b803de1f99

    SHA256

    403314199f08f27a5ddda772c8447ffc00b9034c49bd4e5d760a0446ae3ab3bc

    SHA512

    3b78c1493e26375ba7f8561dd92f59c00b63c21a88a08473393c77951547774e2c9ebb63d4ddb467b320c44c35060726d81fdb3bf453d9e18d0c3ad51edde387

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr307728.exe

    Filesize

    11KB

    MD5

    5b143b7f6940e9de958b67626b1dbd87

    SHA1

    5ba04498673d2351a6be4139cb39f971a17fa3af

    SHA256

    0e19dc7d29ce59c27cb95ee236362e67132028eef5142897003a78a0395297d2

    SHA512

    bb35a3466ba62ab60d0861bf40be658dd2efbdd839aa4f4e7b3b631b2e39da4ab4674f583cd0319e143b4aa3c2bfd2b7988aaae790b7c3e7e6d4e2efcb04bcaa

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr307728.exe

    Filesize

    11KB

    MD5

    5b143b7f6940e9de958b67626b1dbd87

    SHA1

    5ba04498673d2351a6be4139cb39f971a17fa3af

    SHA256

    0e19dc7d29ce59c27cb95ee236362e67132028eef5142897003a78a0395297d2

    SHA512

    bb35a3466ba62ab60d0861bf40be658dd2efbdd839aa4f4e7b3b631b2e39da4ab4674f583cd0319e143b4aa3c2bfd2b7988aaae790b7c3e7e6d4e2efcb04bcaa

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku031366.exe

    Filesize

    345KB

    MD5

    8a012bcfba83ac9642a3556bbbb63d03

    SHA1

    49c2d3e80367abd491353781d6596dd5eeb76962

    SHA256

    df403a44af2b45dcfdb80f7d89e8f186f41fce7fa4e819f8efa68b4e30b29613

    SHA512

    22f59aa00e0748f84d575cb67cb1ff1bdb6d45c1cf6ea6e377dea9c8759540375dc89e572bd4f500deeb23981d4a79de89fb6213cb6225df07c5e2a6b9c00518

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku031366.exe

    Filesize

    345KB

    MD5

    8a012bcfba83ac9642a3556bbbb63d03

    SHA1

    49c2d3e80367abd491353781d6596dd5eeb76962

    SHA256

    df403a44af2b45dcfdb80f7d89e8f186f41fce7fa4e819f8efa68b4e30b29613

    SHA512

    22f59aa00e0748f84d575cb67cb1ff1bdb6d45c1cf6ea6e377dea9c8759540375dc89e572bd4f500deeb23981d4a79de89fb6213cb6225df07c5e2a6b9c00518

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku031366.exe

    Filesize

    345KB

    MD5

    8a012bcfba83ac9642a3556bbbb63d03

    SHA1

    49c2d3e80367abd491353781d6596dd5eeb76962

    SHA256

    df403a44af2b45dcfdb80f7d89e8f186f41fce7fa4e819f8efa68b4e30b29613

    SHA512

    22f59aa00e0748f84d575cb67cb1ff1bdb6d45c1cf6ea6e377dea9c8759540375dc89e572bd4f500deeb23981d4a79de89fb6213cb6225df07c5e2a6b9c00518

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\lr901123.exe

    Filesize

    175KB

    MD5

    a3b183310744431c1ae8c6a9e5a8c00c

    SHA1

    e14ba80f5a6c45928c2c1920d36aff461080361a

    SHA256

    10f1c5840d50c1b7f270e354b6f28280a1f19336b37735dfe10069ca7990b9dc

    SHA512

    48a2d4d43b4b4c71301a0feb33c6b4c702c6b4052b79b1b55790ada8dcf52850ad7746ee02d0b408e4390ac91e7f834fea4b03ad90324a03bcdf8df261fd95aa

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\zibm2610.exe

    Filesize

    388KB

    MD5

    7da91d63c271024c618c9988ce1f4604

    SHA1

    f2173e9758baffce0ad82ce1b73523b803de1f99

    SHA256

    403314199f08f27a5ddda772c8447ffc00b9034c49bd4e5d760a0446ae3ab3bc

    SHA512

    3b78c1493e26375ba7f8561dd92f59c00b63c21a88a08473393c77951547774e2c9ebb63d4ddb467b320c44c35060726d81fdb3bf453d9e18d0c3ad51edde387

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\zibm2610.exe

    Filesize

    388KB

    MD5

    7da91d63c271024c618c9988ce1f4604

    SHA1

    f2173e9758baffce0ad82ce1b73523b803de1f99

    SHA256

    403314199f08f27a5ddda772c8447ffc00b9034c49bd4e5d760a0446ae3ab3bc

    SHA512

    3b78c1493e26375ba7f8561dd92f59c00b63c21a88a08473393c77951547774e2c9ebb63d4ddb467b320c44c35060726d81fdb3bf453d9e18d0c3ad51edde387

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\jr307728.exe

    Filesize

    11KB

    MD5

    5b143b7f6940e9de958b67626b1dbd87

    SHA1

    5ba04498673d2351a6be4139cb39f971a17fa3af

    SHA256

    0e19dc7d29ce59c27cb95ee236362e67132028eef5142897003a78a0395297d2

    SHA512

    bb35a3466ba62ab60d0861bf40be658dd2efbdd839aa4f4e7b3b631b2e39da4ab4674f583cd0319e143b4aa3c2bfd2b7988aaae790b7c3e7e6d4e2efcb04bcaa

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ku031366.exe

    Filesize

    345KB

    MD5

    8a012bcfba83ac9642a3556bbbb63d03

    SHA1

    49c2d3e80367abd491353781d6596dd5eeb76962

    SHA256

    df403a44af2b45dcfdb80f7d89e8f186f41fce7fa4e819f8efa68b4e30b29613

    SHA512

    22f59aa00e0748f84d575cb67cb1ff1bdb6d45c1cf6ea6e377dea9c8759540375dc89e572bd4f500deeb23981d4a79de89fb6213cb6225df07c5e2a6b9c00518

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ku031366.exe

    Filesize

    345KB

    MD5

    8a012bcfba83ac9642a3556bbbb63d03

    SHA1

    49c2d3e80367abd491353781d6596dd5eeb76962

    SHA256

    df403a44af2b45dcfdb80f7d89e8f186f41fce7fa4e819f8efa68b4e30b29613

    SHA512

    22f59aa00e0748f84d575cb67cb1ff1bdb6d45c1cf6ea6e377dea9c8759540375dc89e572bd4f500deeb23981d4a79de89fb6213cb6225df07c5e2a6b9c00518

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ku031366.exe

    Filesize

    345KB

    MD5

    8a012bcfba83ac9642a3556bbbb63d03

    SHA1

    49c2d3e80367abd491353781d6596dd5eeb76962

    SHA256

    df403a44af2b45dcfdb80f7d89e8f186f41fce7fa4e819f8efa68b4e30b29613

    SHA512

    22f59aa00e0748f84d575cb67cb1ff1bdb6d45c1cf6ea6e377dea9c8759540375dc89e572bd4f500deeb23981d4a79de89fb6213cb6225df07c5e2a6b9c00518

  • memory/1280-74-0x00000000008E0000-0x00000000008EA000-memory.dmp

    Filesize

    40KB

  • memory/1420-104-0x0000000003700000-0x000000000373F000-memory.dmp

    Filesize

    252KB

  • memory/1420-124-0x0000000003700000-0x000000000373F000-memory.dmp

    Filesize

    252KB

  • memory/1420-89-0x00000000060E0000-0x0000000006120000-memory.dmp

    Filesize

    256KB

  • memory/1420-90-0x0000000003700000-0x0000000003744000-memory.dmp

    Filesize

    272KB

  • memory/1420-91-0x0000000003700000-0x000000000373F000-memory.dmp

    Filesize

    252KB

  • memory/1420-92-0x0000000003700000-0x000000000373F000-memory.dmp

    Filesize

    252KB

  • memory/1420-94-0x0000000003700000-0x000000000373F000-memory.dmp

    Filesize

    252KB

  • memory/1420-96-0x0000000003700000-0x000000000373F000-memory.dmp

    Filesize

    252KB

  • memory/1420-98-0x0000000003700000-0x000000000373F000-memory.dmp

    Filesize

    252KB

  • memory/1420-100-0x0000000003700000-0x000000000373F000-memory.dmp

    Filesize

    252KB

  • memory/1420-102-0x0000000003700000-0x000000000373F000-memory.dmp

    Filesize

    252KB

  • memory/1420-87-0x0000000001EB0000-0x0000000001EFB000-memory.dmp

    Filesize

    300KB

  • memory/1420-106-0x0000000003700000-0x000000000373F000-memory.dmp

    Filesize

    252KB

  • memory/1420-108-0x0000000003700000-0x000000000373F000-memory.dmp

    Filesize

    252KB

  • memory/1420-110-0x0000000003700000-0x000000000373F000-memory.dmp

    Filesize

    252KB

  • memory/1420-112-0x0000000003700000-0x000000000373F000-memory.dmp

    Filesize

    252KB

  • memory/1420-114-0x0000000003700000-0x000000000373F000-memory.dmp

    Filesize

    252KB

  • memory/1420-116-0x0000000003700000-0x000000000373F000-memory.dmp

    Filesize

    252KB

  • memory/1420-118-0x0000000003700000-0x000000000373F000-memory.dmp

    Filesize

    252KB

  • memory/1420-120-0x0000000003700000-0x000000000373F000-memory.dmp

    Filesize

    252KB

  • memory/1420-122-0x0000000003700000-0x000000000373F000-memory.dmp

    Filesize

    252KB

  • memory/1420-88-0x00000000060E0000-0x0000000006120000-memory.dmp

    Filesize

    256KB

  • memory/1420-126-0x0000000003700000-0x000000000373F000-memory.dmp

    Filesize

    252KB

  • memory/1420-128-0x0000000003700000-0x000000000373F000-memory.dmp

    Filesize

    252KB

  • memory/1420-130-0x0000000003700000-0x000000000373F000-memory.dmp

    Filesize

    252KB

  • memory/1420-132-0x0000000003700000-0x000000000373F000-memory.dmp

    Filesize

    252KB

  • memory/1420-134-0x0000000003700000-0x000000000373F000-memory.dmp

    Filesize

    252KB

  • memory/1420-136-0x0000000003700000-0x000000000373F000-memory.dmp

    Filesize

    252KB

  • memory/1420-138-0x0000000003700000-0x000000000373F000-memory.dmp

    Filesize

    252KB

  • memory/1420-140-0x0000000003700000-0x000000000373F000-memory.dmp

    Filesize

    252KB

  • memory/1420-142-0x0000000003700000-0x000000000373F000-memory.dmp

    Filesize

    252KB

  • memory/1420-144-0x0000000003700000-0x000000000373F000-memory.dmp

    Filesize

    252KB

  • memory/1420-146-0x0000000003700000-0x000000000373F000-memory.dmp

    Filesize

    252KB

  • memory/1420-148-0x0000000003700000-0x000000000373F000-memory.dmp

    Filesize

    252KB

  • memory/1420-150-0x0000000003700000-0x000000000373F000-memory.dmp

    Filesize

    252KB

  • memory/1420-152-0x0000000003700000-0x000000000373F000-memory.dmp

    Filesize

    252KB

  • memory/1420-998-0x00000000060E0000-0x0000000006120000-memory.dmp

    Filesize

    256KB

  • memory/1420-86-0x00000000035B0000-0x00000000035F6000-memory.dmp

    Filesize

    280KB

  • memory/1500-1007-0x00000000012E0000-0x0000000001312000-memory.dmp

    Filesize

    200KB

  • memory/1500-1008-0x0000000000DD0000-0x0000000000E10000-memory.dmp

    Filesize

    256KB

  • memory/2028-75-0x0000000000400000-0x0000000002BDB000-memory.dmp

    Filesize

    39.9MB

  • memory/2028-67-0x00000000043A0000-0x0000000004426000-memory.dmp

    Filesize

    536KB