Analysis

  • max time kernel
    43s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    28-03-2023 08:26

General

  • Target

    56023227c8946e1b954c03a5f2f08915.exe

  • Size

    694KB

  • MD5

    56023227c8946e1b954c03a5f2f08915

  • SHA1

    5763e0b9937a38c487890f1d8c194422239e9c9d

  • SHA256

    a9a3d706b6613786203e321fd54fc9988843dcfdd823279657f811cdb80bfb66

  • SHA512

    9d54f8fe2016263ab9e1f7facbd7e024eb26c13b0f3f0d447ff76cf292bf2cccaa9ab37432b9903eabf9c77a5113bb102f678c4f81da9866a6160db46321eca4

  • SSDEEP

    12288:BoK7SPhtwSwKdNGHv+3jk5I00xBFQjwnS1PEqvMTsPpD6WdpB:ru5tjwKd0HWzk5NcKZEqldFH

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\56023227c8946e1b954c03a5f2f08915.exe
    "C:\Users\Admin\AppData\Local\Temp\56023227c8946e1b954c03a5f2f08915.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1616
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zibm2610.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zibm2610.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1500
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr307728.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr307728.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:776
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku031366.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku031366.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:672
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr901123.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr901123.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1308

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr901123.exe
    Filesize

    175KB

    MD5

    a3b183310744431c1ae8c6a9e5a8c00c

    SHA1

    e14ba80f5a6c45928c2c1920d36aff461080361a

    SHA256

    10f1c5840d50c1b7f270e354b6f28280a1f19336b37735dfe10069ca7990b9dc

    SHA512

    48a2d4d43b4b4c71301a0feb33c6b4c702c6b4052b79b1b55790ada8dcf52850ad7746ee02d0b408e4390ac91e7f834fea4b03ad90324a03bcdf8df261fd95aa

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr901123.exe
    Filesize

    175KB

    MD5

    a3b183310744431c1ae8c6a9e5a8c00c

    SHA1

    e14ba80f5a6c45928c2c1920d36aff461080361a

    SHA256

    10f1c5840d50c1b7f270e354b6f28280a1f19336b37735dfe10069ca7990b9dc

    SHA512

    48a2d4d43b4b4c71301a0feb33c6b4c702c6b4052b79b1b55790ada8dcf52850ad7746ee02d0b408e4390ac91e7f834fea4b03ad90324a03bcdf8df261fd95aa

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zibm2610.exe
    Filesize

    388KB

    MD5

    7da91d63c271024c618c9988ce1f4604

    SHA1

    f2173e9758baffce0ad82ce1b73523b803de1f99

    SHA256

    403314199f08f27a5ddda772c8447ffc00b9034c49bd4e5d760a0446ae3ab3bc

    SHA512

    3b78c1493e26375ba7f8561dd92f59c00b63c21a88a08473393c77951547774e2c9ebb63d4ddb467b320c44c35060726d81fdb3bf453d9e18d0c3ad51edde387

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zibm2610.exe
    Filesize

    388KB

    MD5

    7da91d63c271024c618c9988ce1f4604

    SHA1

    f2173e9758baffce0ad82ce1b73523b803de1f99

    SHA256

    403314199f08f27a5ddda772c8447ffc00b9034c49bd4e5d760a0446ae3ab3bc

    SHA512

    3b78c1493e26375ba7f8561dd92f59c00b63c21a88a08473393c77951547774e2c9ebb63d4ddb467b320c44c35060726d81fdb3bf453d9e18d0c3ad51edde387

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr307728.exe
    Filesize

    11KB

    MD5

    5b143b7f6940e9de958b67626b1dbd87

    SHA1

    5ba04498673d2351a6be4139cb39f971a17fa3af

    SHA256

    0e19dc7d29ce59c27cb95ee236362e67132028eef5142897003a78a0395297d2

    SHA512

    bb35a3466ba62ab60d0861bf40be658dd2efbdd839aa4f4e7b3b631b2e39da4ab4674f583cd0319e143b4aa3c2bfd2b7988aaae790b7c3e7e6d4e2efcb04bcaa

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr307728.exe
    Filesize

    11KB

    MD5

    5b143b7f6940e9de958b67626b1dbd87

    SHA1

    5ba04498673d2351a6be4139cb39f971a17fa3af

    SHA256

    0e19dc7d29ce59c27cb95ee236362e67132028eef5142897003a78a0395297d2

    SHA512

    bb35a3466ba62ab60d0861bf40be658dd2efbdd839aa4f4e7b3b631b2e39da4ab4674f583cd0319e143b4aa3c2bfd2b7988aaae790b7c3e7e6d4e2efcb04bcaa

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku031366.exe
    Filesize

    345KB

    MD5

    8a012bcfba83ac9642a3556bbbb63d03

    SHA1

    49c2d3e80367abd491353781d6596dd5eeb76962

    SHA256

    df403a44af2b45dcfdb80f7d89e8f186f41fce7fa4e819f8efa68b4e30b29613

    SHA512

    22f59aa00e0748f84d575cb67cb1ff1bdb6d45c1cf6ea6e377dea9c8759540375dc89e572bd4f500deeb23981d4a79de89fb6213cb6225df07c5e2a6b9c00518

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku031366.exe
    Filesize

    345KB

    MD5

    8a012bcfba83ac9642a3556bbbb63d03

    SHA1

    49c2d3e80367abd491353781d6596dd5eeb76962

    SHA256

    df403a44af2b45dcfdb80f7d89e8f186f41fce7fa4e819f8efa68b4e30b29613

    SHA512

    22f59aa00e0748f84d575cb67cb1ff1bdb6d45c1cf6ea6e377dea9c8759540375dc89e572bd4f500deeb23981d4a79de89fb6213cb6225df07c5e2a6b9c00518

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku031366.exe
    Filesize

    345KB

    MD5

    8a012bcfba83ac9642a3556bbbb63d03

    SHA1

    49c2d3e80367abd491353781d6596dd5eeb76962

    SHA256

    df403a44af2b45dcfdb80f7d89e8f186f41fce7fa4e819f8efa68b4e30b29613

    SHA512

    22f59aa00e0748f84d575cb67cb1ff1bdb6d45c1cf6ea6e377dea9c8759540375dc89e572bd4f500deeb23981d4a79de89fb6213cb6225df07c5e2a6b9c00518

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\lr901123.exe
    Filesize

    175KB

    MD5

    a3b183310744431c1ae8c6a9e5a8c00c

    SHA1

    e14ba80f5a6c45928c2c1920d36aff461080361a

    SHA256

    10f1c5840d50c1b7f270e354b6f28280a1f19336b37735dfe10069ca7990b9dc

    SHA512

    48a2d4d43b4b4c71301a0feb33c6b4c702c6b4052b79b1b55790ada8dcf52850ad7746ee02d0b408e4390ac91e7f834fea4b03ad90324a03bcdf8df261fd95aa

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\zibm2610.exe
    Filesize

    388KB

    MD5

    7da91d63c271024c618c9988ce1f4604

    SHA1

    f2173e9758baffce0ad82ce1b73523b803de1f99

    SHA256

    403314199f08f27a5ddda772c8447ffc00b9034c49bd4e5d760a0446ae3ab3bc

    SHA512

    3b78c1493e26375ba7f8561dd92f59c00b63c21a88a08473393c77951547774e2c9ebb63d4ddb467b320c44c35060726d81fdb3bf453d9e18d0c3ad51edde387

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\zibm2610.exe
    Filesize

    388KB

    MD5

    7da91d63c271024c618c9988ce1f4604

    SHA1

    f2173e9758baffce0ad82ce1b73523b803de1f99

    SHA256

    403314199f08f27a5ddda772c8447ffc00b9034c49bd4e5d760a0446ae3ab3bc

    SHA512

    3b78c1493e26375ba7f8561dd92f59c00b63c21a88a08473393c77951547774e2c9ebb63d4ddb467b320c44c35060726d81fdb3bf453d9e18d0c3ad51edde387

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\jr307728.exe
    Filesize

    11KB

    MD5

    5b143b7f6940e9de958b67626b1dbd87

    SHA1

    5ba04498673d2351a6be4139cb39f971a17fa3af

    SHA256

    0e19dc7d29ce59c27cb95ee236362e67132028eef5142897003a78a0395297d2

    SHA512

    bb35a3466ba62ab60d0861bf40be658dd2efbdd839aa4f4e7b3b631b2e39da4ab4674f583cd0319e143b4aa3c2bfd2b7988aaae790b7c3e7e6d4e2efcb04bcaa

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ku031366.exe
    Filesize

    345KB

    MD5

    8a012bcfba83ac9642a3556bbbb63d03

    SHA1

    49c2d3e80367abd491353781d6596dd5eeb76962

    SHA256

    df403a44af2b45dcfdb80f7d89e8f186f41fce7fa4e819f8efa68b4e30b29613

    SHA512

    22f59aa00e0748f84d575cb67cb1ff1bdb6d45c1cf6ea6e377dea9c8759540375dc89e572bd4f500deeb23981d4a79de89fb6213cb6225df07c5e2a6b9c00518

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ku031366.exe
    Filesize

    345KB

    MD5

    8a012bcfba83ac9642a3556bbbb63d03

    SHA1

    49c2d3e80367abd491353781d6596dd5eeb76962

    SHA256

    df403a44af2b45dcfdb80f7d89e8f186f41fce7fa4e819f8efa68b4e30b29613

    SHA512

    22f59aa00e0748f84d575cb67cb1ff1bdb6d45c1cf6ea6e377dea9c8759540375dc89e572bd4f500deeb23981d4a79de89fb6213cb6225df07c5e2a6b9c00518

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\ku031366.exe
    Filesize

    345KB

    MD5

    8a012bcfba83ac9642a3556bbbb63d03

    SHA1

    49c2d3e80367abd491353781d6596dd5eeb76962

    SHA256

    df403a44af2b45dcfdb80f7d89e8f186f41fce7fa4e819f8efa68b4e30b29613

    SHA512

    22f59aa00e0748f84d575cb67cb1ff1bdb6d45c1cf6ea6e377dea9c8759540375dc89e572bd4f500deeb23981d4a79de89fb6213cb6225df07c5e2a6b9c00518

  • memory/672-103-0x00000000036A0000-0x00000000036DF000-memory.dmp
    Filesize

    252KB

  • memory/672-122-0x00000000036A0000-0x00000000036DF000-memory.dmp
    Filesize

    252KB

  • memory/672-88-0x00000000036A0000-0x00000000036DF000-memory.dmp
    Filesize

    252KB

  • memory/672-89-0x00000000036A0000-0x00000000036DF000-memory.dmp
    Filesize

    252KB

  • memory/672-91-0x00000000036A0000-0x00000000036DF000-memory.dmp
    Filesize

    252KB

  • memory/672-93-0x00000000036A0000-0x00000000036DF000-memory.dmp
    Filesize

    252KB

  • memory/672-95-0x00000000036A0000-0x00000000036DF000-memory.dmp
    Filesize

    252KB

  • memory/672-97-0x00000000036A0000-0x00000000036DF000-memory.dmp
    Filesize

    252KB

  • memory/672-100-0x0000000000280000-0x00000000002CB000-memory.dmp
    Filesize

    300KB

  • memory/672-101-0x00000000038A0000-0x00000000038E0000-memory.dmp
    Filesize

    256KB

  • memory/672-99-0x00000000036A0000-0x00000000036DF000-memory.dmp
    Filesize

    252KB

  • memory/672-104-0x00000000038A0000-0x00000000038E0000-memory.dmp
    Filesize

    256KB

  • memory/672-86-0x0000000001E20000-0x0000000001E66000-memory.dmp
    Filesize

    280KB

  • memory/672-106-0x00000000036A0000-0x00000000036DF000-memory.dmp
    Filesize

    252KB

  • memory/672-108-0x00000000036A0000-0x00000000036DF000-memory.dmp
    Filesize

    252KB

  • memory/672-110-0x00000000036A0000-0x00000000036DF000-memory.dmp
    Filesize

    252KB

  • memory/672-112-0x00000000036A0000-0x00000000036DF000-memory.dmp
    Filesize

    252KB

  • memory/672-114-0x00000000036A0000-0x00000000036DF000-memory.dmp
    Filesize

    252KB

  • memory/672-116-0x00000000036A0000-0x00000000036DF000-memory.dmp
    Filesize

    252KB

  • memory/672-118-0x00000000036A0000-0x00000000036DF000-memory.dmp
    Filesize

    252KB

  • memory/672-120-0x00000000036A0000-0x00000000036DF000-memory.dmp
    Filesize

    252KB

  • memory/672-87-0x00000000036A0000-0x00000000036E4000-memory.dmp
    Filesize

    272KB

  • memory/672-124-0x00000000036A0000-0x00000000036DF000-memory.dmp
    Filesize

    252KB

  • memory/672-126-0x00000000036A0000-0x00000000036DF000-memory.dmp
    Filesize

    252KB

  • memory/672-128-0x00000000036A0000-0x00000000036DF000-memory.dmp
    Filesize

    252KB

  • memory/672-130-0x00000000036A0000-0x00000000036DF000-memory.dmp
    Filesize

    252KB

  • memory/672-132-0x00000000036A0000-0x00000000036DF000-memory.dmp
    Filesize

    252KB

  • memory/672-134-0x00000000036A0000-0x00000000036DF000-memory.dmp
    Filesize

    252KB

  • memory/672-136-0x00000000036A0000-0x00000000036DF000-memory.dmp
    Filesize

    252KB

  • memory/672-138-0x00000000036A0000-0x00000000036DF000-memory.dmp
    Filesize

    252KB

  • memory/672-140-0x00000000036A0000-0x00000000036DF000-memory.dmp
    Filesize

    252KB

  • memory/672-142-0x00000000036A0000-0x00000000036DF000-memory.dmp
    Filesize

    252KB

  • memory/672-144-0x00000000036A0000-0x00000000036DF000-memory.dmp
    Filesize

    252KB

  • memory/672-146-0x00000000036A0000-0x00000000036DF000-memory.dmp
    Filesize

    252KB

  • memory/672-148-0x00000000036A0000-0x00000000036DF000-memory.dmp
    Filesize

    252KB

  • memory/672-150-0x00000000036A0000-0x00000000036DF000-memory.dmp
    Filesize

    252KB

  • memory/672-152-0x00000000036A0000-0x00000000036DF000-memory.dmp
    Filesize

    252KB

  • memory/672-998-0x00000000038A0000-0x00000000038E0000-memory.dmp
    Filesize

    256KB

  • memory/776-74-0x0000000000030000-0x000000000003A000-memory.dmp
    Filesize

    40KB

  • memory/1308-1007-0x0000000000110000-0x0000000000142000-memory.dmp
    Filesize

    200KB

  • memory/1308-1008-0x0000000004710000-0x0000000004750000-memory.dmp
    Filesize

    256KB

  • memory/1616-75-0x0000000000400000-0x0000000002BDB000-memory.dmp
    Filesize

    39.9MB

  • memory/1616-64-0x0000000000230000-0x00000000002B6000-memory.dmp
    Filesize

    536KB