Analysis

  • max time kernel
    49s
  • max time network
    56s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 08:18

General

  • Target

    0ae7852b91dd1199043cc98e363fc1af3fa6b94b46d19daa7af89f6e5bd93b2f.exe

  • Size

    694KB

  • MD5

    d512bc8a90daf72808e21e80924a7603

  • SHA1

    f429b91c7b81a9e409058135d779850837494a58

  • SHA256

    0ae7852b91dd1199043cc98e363fc1af3fa6b94b46d19daa7af89f6e5bd93b2f

  • SHA512

    74bad56afae57f8074c84747adb16b5432d9b9baadf97d8a482e3d04aeef3574593db327acc7ef0971fc922553dd5c38a1617d83b367c6bac91f063d5b4b0415

  • SSDEEP

    12288:ioK7SPhtwSwKdNGHv+3jk5I00xBFQjwnS1PEqvMTsPpD6WdpB:eu5tjwKd0HWzk5NcKZEqldFH

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ae7852b91dd1199043cc98e363fc1af3fa6b94b46d19daa7af89f6e5bd93b2f.exe
    "C:\Users\Admin\AppData\Local\Temp\0ae7852b91dd1199043cc98e363fc1af3fa6b94b46d19daa7af89f6e5bd93b2f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zibm2610.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zibm2610.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2324
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr307728.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr307728.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2576
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku031366.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku031366.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3064
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr901123.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr901123.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3096

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr901123.exe
    Filesize

    175KB

    MD5

    a3b183310744431c1ae8c6a9e5a8c00c

    SHA1

    e14ba80f5a6c45928c2c1920d36aff461080361a

    SHA256

    10f1c5840d50c1b7f270e354b6f28280a1f19336b37735dfe10069ca7990b9dc

    SHA512

    48a2d4d43b4b4c71301a0feb33c6b4c702c6b4052b79b1b55790ada8dcf52850ad7746ee02d0b408e4390ac91e7f834fea4b03ad90324a03bcdf8df261fd95aa

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr901123.exe
    Filesize

    175KB

    MD5

    a3b183310744431c1ae8c6a9e5a8c00c

    SHA1

    e14ba80f5a6c45928c2c1920d36aff461080361a

    SHA256

    10f1c5840d50c1b7f270e354b6f28280a1f19336b37735dfe10069ca7990b9dc

    SHA512

    48a2d4d43b4b4c71301a0feb33c6b4c702c6b4052b79b1b55790ada8dcf52850ad7746ee02d0b408e4390ac91e7f834fea4b03ad90324a03bcdf8df261fd95aa

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zibm2610.exe
    Filesize

    388KB

    MD5

    7da91d63c271024c618c9988ce1f4604

    SHA1

    f2173e9758baffce0ad82ce1b73523b803de1f99

    SHA256

    403314199f08f27a5ddda772c8447ffc00b9034c49bd4e5d760a0446ae3ab3bc

    SHA512

    3b78c1493e26375ba7f8561dd92f59c00b63c21a88a08473393c77951547774e2c9ebb63d4ddb467b320c44c35060726d81fdb3bf453d9e18d0c3ad51edde387

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zibm2610.exe
    Filesize

    388KB

    MD5

    7da91d63c271024c618c9988ce1f4604

    SHA1

    f2173e9758baffce0ad82ce1b73523b803de1f99

    SHA256

    403314199f08f27a5ddda772c8447ffc00b9034c49bd4e5d760a0446ae3ab3bc

    SHA512

    3b78c1493e26375ba7f8561dd92f59c00b63c21a88a08473393c77951547774e2c9ebb63d4ddb467b320c44c35060726d81fdb3bf453d9e18d0c3ad51edde387

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr307728.exe
    Filesize

    11KB

    MD5

    5b143b7f6940e9de958b67626b1dbd87

    SHA1

    5ba04498673d2351a6be4139cb39f971a17fa3af

    SHA256

    0e19dc7d29ce59c27cb95ee236362e67132028eef5142897003a78a0395297d2

    SHA512

    bb35a3466ba62ab60d0861bf40be658dd2efbdd839aa4f4e7b3b631b2e39da4ab4674f583cd0319e143b4aa3c2bfd2b7988aaae790b7c3e7e6d4e2efcb04bcaa

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr307728.exe
    Filesize

    11KB

    MD5

    5b143b7f6940e9de958b67626b1dbd87

    SHA1

    5ba04498673d2351a6be4139cb39f971a17fa3af

    SHA256

    0e19dc7d29ce59c27cb95ee236362e67132028eef5142897003a78a0395297d2

    SHA512

    bb35a3466ba62ab60d0861bf40be658dd2efbdd839aa4f4e7b3b631b2e39da4ab4674f583cd0319e143b4aa3c2bfd2b7988aaae790b7c3e7e6d4e2efcb04bcaa

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku031366.exe
    Filesize

    345KB

    MD5

    8a012bcfba83ac9642a3556bbbb63d03

    SHA1

    49c2d3e80367abd491353781d6596dd5eeb76962

    SHA256

    df403a44af2b45dcfdb80f7d89e8f186f41fce7fa4e819f8efa68b4e30b29613

    SHA512

    22f59aa00e0748f84d575cb67cb1ff1bdb6d45c1cf6ea6e377dea9c8759540375dc89e572bd4f500deeb23981d4a79de89fb6213cb6225df07c5e2a6b9c00518

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku031366.exe
    Filesize

    345KB

    MD5

    8a012bcfba83ac9642a3556bbbb63d03

    SHA1

    49c2d3e80367abd491353781d6596dd5eeb76962

    SHA256

    df403a44af2b45dcfdb80f7d89e8f186f41fce7fa4e819f8efa68b4e30b29613

    SHA512

    22f59aa00e0748f84d575cb67cb1ff1bdb6d45c1cf6ea6e377dea9c8759540375dc89e572bd4f500deeb23981d4a79de89fb6213cb6225df07c5e2a6b9c00518

  • memory/2060-138-0x0000000006930000-0x00000000069B6000-memory.dmp
    Filesize

    536KB

  • memory/2060-140-0x0000000000400000-0x0000000002BDB000-memory.dmp
    Filesize

    39.9MB

  • memory/2576-139-0x0000000000A60000-0x0000000000A6A000-memory.dmp
    Filesize

    40KB

  • memory/3064-181-0x0000000003B90000-0x0000000003BCF000-memory.dmp
    Filesize

    252KB

  • memory/3064-193-0x0000000003B90000-0x0000000003BCF000-memory.dmp
    Filesize

    252KB

  • memory/3064-150-0x0000000003B90000-0x0000000003BD4000-memory.dmp
    Filesize

    272KB

  • memory/3064-149-0x0000000006150000-0x0000000006160000-memory.dmp
    Filesize

    64KB

  • memory/3064-148-0x0000000001B40000-0x0000000001B8B000-memory.dmp
    Filesize

    300KB

  • memory/3064-151-0x0000000006150000-0x0000000006160000-memory.dmp
    Filesize

    64KB

  • memory/3064-152-0x0000000003B90000-0x0000000003BCF000-memory.dmp
    Filesize

    252KB

  • memory/3064-153-0x0000000003B90000-0x0000000003BCF000-memory.dmp
    Filesize

    252KB

  • memory/3064-155-0x0000000003B90000-0x0000000003BCF000-memory.dmp
    Filesize

    252KB

  • memory/3064-157-0x0000000003B90000-0x0000000003BCF000-memory.dmp
    Filesize

    252KB

  • memory/3064-159-0x0000000003B90000-0x0000000003BCF000-memory.dmp
    Filesize

    252KB

  • memory/3064-161-0x0000000003B90000-0x0000000003BCF000-memory.dmp
    Filesize

    252KB

  • memory/3064-163-0x0000000003B90000-0x0000000003BCF000-memory.dmp
    Filesize

    252KB

  • memory/3064-165-0x0000000003B90000-0x0000000003BCF000-memory.dmp
    Filesize

    252KB

  • memory/3064-167-0x0000000003B90000-0x0000000003BCF000-memory.dmp
    Filesize

    252KB

  • memory/3064-169-0x0000000003B90000-0x0000000003BCF000-memory.dmp
    Filesize

    252KB

  • memory/3064-171-0x0000000003B90000-0x0000000003BCF000-memory.dmp
    Filesize

    252KB

  • memory/3064-173-0x0000000003B90000-0x0000000003BCF000-memory.dmp
    Filesize

    252KB

  • memory/3064-175-0x0000000003B90000-0x0000000003BCF000-memory.dmp
    Filesize

    252KB

  • memory/3064-177-0x0000000003B90000-0x0000000003BCF000-memory.dmp
    Filesize

    252KB

  • memory/3064-179-0x0000000003B90000-0x0000000003BCF000-memory.dmp
    Filesize

    252KB

  • memory/3064-146-0x0000000003B10000-0x0000000003B56000-memory.dmp
    Filesize

    280KB

  • memory/3064-183-0x0000000003B90000-0x0000000003BCF000-memory.dmp
    Filesize

    252KB

  • memory/3064-185-0x0000000003B90000-0x0000000003BCF000-memory.dmp
    Filesize

    252KB

  • memory/3064-187-0x0000000003B90000-0x0000000003BCF000-memory.dmp
    Filesize

    252KB

  • memory/3064-189-0x0000000003B90000-0x0000000003BCF000-memory.dmp
    Filesize

    252KB

  • memory/3064-191-0x0000000003B90000-0x0000000003BCF000-memory.dmp
    Filesize

    252KB

  • memory/3064-147-0x0000000006160000-0x000000000665E000-memory.dmp
    Filesize

    5.0MB

  • memory/3064-195-0x0000000003B90000-0x0000000003BCF000-memory.dmp
    Filesize

    252KB

  • memory/3064-197-0x0000000003B90000-0x0000000003BCF000-memory.dmp
    Filesize

    252KB

  • memory/3064-199-0x0000000003B90000-0x0000000003BCF000-memory.dmp
    Filesize

    252KB

  • memory/3064-201-0x0000000003B90000-0x0000000003BCF000-memory.dmp
    Filesize

    252KB

  • memory/3064-203-0x0000000003B90000-0x0000000003BCF000-memory.dmp
    Filesize

    252KB

  • memory/3064-205-0x0000000003B90000-0x0000000003BCF000-memory.dmp
    Filesize

    252KB

  • memory/3064-207-0x0000000003B90000-0x0000000003BCF000-memory.dmp
    Filesize

    252KB

  • memory/3064-211-0x0000000003B90000-0x0000000003BCF000-memory.dmp
    Filesize

    252KB

  • memory/3064-209-0x0000000003B90000-0x0000000003BCF000-memory.dmp
    Filesize

    252KB

  • memory/3064-213-0x0000000003B90000-0x0000000003BCF000-memory.dmp
    Filesize

    252KB

  • memory/3064-1058-0x0000000006660000-0x0000000006C66000-memory.dmp
    Filesize

    6.0MB

  • memory/3064-1059-0x0000000006C70000-0x0000000006D7A000-memory.dmp
    Filesize

    1.0MB

  • memory/3064-1060-0x00000000060E0000-0x00000000060F2000-memory.dmp
    Filesize

    72KB

  • memory/3064-1061-0x0000000006150000-0x0000000006160000-memory.dmp
    Filesize

    64KB

  • memory/3064-1062-0x0000000006100000-0x000000000613E000-memory.dmp
    Filesize

    248KB

  • memory/3064-1063-0x0000000006E80000-0x0000000006ECB000-memory.dmp
    Filesize

    300KB

  • memory/3064-1066-0x0000000007010000-0x00000000070A2000-memory.dmp
    Filesize

    584KB

  • memory/3064-1067-0x00000000070B0000-0x0000000007116000-memory.dmp
    Filesize

    408KB

  • memory/3064-1068-0x0000000006150000-0x0000000006160000-memory.dmp
    Filesize

    64KB

  • memory/3064-1069-0x0000000006150000-0x0000000006160000-memory.dmp
    Filesize

    64KB

  • memory/3064-1070-0x00000000078C0000-0x0000000007A82000-memory.dmp
    Filesize

    1.8MB

  • memory/3064-1071-0x0000000007A90000-0x0000000007FBC000-memory.dmp
    Filesize

    5.2MB

  • memory/3064-1072-0x0000000008110000-0x0000000008186000-memory.dmp
    Filesize

    472KB

  • memory/3064-1073-0x0000000008190000-0x00000000081E0000-memory.dmp
    Filesize

    320KB

  • memory/3064-1075-0x0000000006150000-0x0000000006160000-memory.dmp
    Filesize

    64KB

  • memory/3096-1081-0x0000000000930000-0x0000000000962000-memory.dmp
    Filesize

    200KB

  • memory/3096-1082-0x0000000005360000-0x00000000053AB000-memory.dmp
    Filesize

    300KB

  • memory/3096-1083-0x00000000054F0000-0x0000000005500000-memory.dmp
    Filesize

    64KB