Analysis

  • max time kernel
    50s
  • max time network
    71s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    31-03-2023 18:13

General

  • Target

    261dea96d1a83a0c36aa2fc13b48c44da0892efd9b7c6ac2950beb620ad2726f.exe

  • Size

    672KB

  • MD5

    4410e7244639fdd1c9d458e543eba7b2

  • SHA1

    fc996c0709edd31981eca3a0f8966acb3deec576

  • SHA256

    261dea96d1a83a0c36aa2fc13b48c44da0892efd9b7c6ac2950beb620ad2726f

  • SHA512

    640d64ea1c05ad74efff707f354fcd0f0c6a816646a3d03cdae9c4f8307d25fe7988354add0b0ff24d4d065ac05644c384262abb307713d0910f9b5837991cbb

  • SSDEEP

    12288:FMrQy90lkpHXfuP+P3a8r1VBnZvcVlS96bzc1fC5HFt8gomHZ+Yb524pAcptQts:ByDHXk4ak1PZvAYMchoHFtdoRWP6+b

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 22 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\261dea96d1a83a0c36aa2fc13b48c44da0892efd9b7c6ac2950beb620ad2726f.exe
    "C:\Users\Admin\AppData\Local\Temp\261dea96d1a83a0c36aa2fc13b48c44da0892efd9b7c6ac2950beb620ad2726f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un668387.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un668387.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3924
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9965.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9965.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4960
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5731.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5731.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2576
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si199180.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si199180.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4188

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si199180.exe
    Filesize

    175KB

    MD5

    94c9e04b9e1144aac31ba0444e5a8a3f

    SHA1

    0eadd922f3b7ff67ffacc9ec39106c5b7c039f4b

    SHA256

    9bb5bc5db558c6767cb2d9607c793f6f5aa99fab49d0c277c388aa5a709b4439

    SHA512

    c0dd7d0fd2364d27dd68287cf6051b35c13f68ab6bb3f4381befd73d0994a302719651b72145af2518855dd845d3bcd97de5cb88ffeec81d4924e4a780886766

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si199180.exe
    Filesize

    175KB

    MD5

    94c9e04b9e1144aac31ba0444e5a8a3f

    SHA1

    0eadd922f3b7ff67ffacc9ec39106c5b7c039f4b

    SHA256

    9bb5bc5db558c6767cb2d9607c793f6f5aa99fab49d0c277c388aa5a709b4439

    SHA512

    c0dd7d0fd2364d27dd68287cf6051b35c13f68ab6bb3f4381befd73d0994a302719651b72145af2518855dd845d3bcd97de5cb88ffeec81d4924e4a780886766

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un668387.exe
    Filesize

    530KB

    MD5

    876fbcc3a75f4dcb3a4823a7c6b91361

    SHA1

    86384872566eb344cb67cf7a3e13a5387b080348

    SHA256

    f064903555bdfc98a5480b88b3dc37c6a8cddf5879fd4b63b71581cfd4670b7a

    SHA512

    517b347adf54567b3e77766b3a5a38d5c40fb6683d8b2d263b4cecdb2484caa5caff89baae116637f47ced59f33595ee3cf6c4d38f3d36fbe50bf9658f40cc01

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un668387.exe
    Filesize

    530KB

    MD5

    876fbcc3a75f4dcb3a4823a7c6b91361

    SHA1

    86384872566eb344cb67cf7a3e13a5387b080348

    SHA256

    f064903555bdfc98a5480b88b3dc37c6a8cddf5879fd4b63b71581cfd4670b7a

    SHA512

    517b347adf54567b3e77766b3a5a38d5c40fb6683d8b2d263b4cecdb2484caa5caff89baae116637f47ced59f33595ee3cf6c4d38f3d36fbe50bf9658f40cc01

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9965.exe
    Filesize

    259KB

    MD5

    2c3a50721c3c7555ad4303643d4c3979

    SHA1

    70b34edd7fcedaf290bb1cf3686cc81d8ac2a196

    SHA256

    3ecc2b4708d795ad69515f3aeb2e9939fb59966a61e4a1d73ae652b0d3f4c9c0

    SHA512

    355a55fe6ec13ad4078a7954e8764edf35cc06094b28c1a9a8725094cefd3ccff924497ab8d562a506c8bc5934aa80d4294ea44b1e24024a4a396ae54a500f9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9965.exe
    Filesize

    259KB

    MD5

    2c3a50721c3c7555ad4303643d4c3979

    SHA1

    70b34edd7fcedaf290bb1cf3686cc81d8ac2a196

    SHA256

    3ecc2b4708d795ad69515f3aeb2e9939fb59966a61e4a1d73ae652b0d3f4c9c0

    SHA512

    355a55fe6ec13ad4078a7954e8764edf35cc06094b28c1a9a8725094cefd3ccff924497ab8d562a506c8bc5934aa80d4294ea44b1e24024a4a396ae54a500f9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5731.exe
    Filesize

    318KB

    MD5

    e3f89614a82ec29cba1697d6f71e609e

    SHA1

    5cd3f2973c6b0c51a1d04865ccc7e5a54822d761

    SHA256

    2edb426fb0df00b1b2258a50f101add304d7b896622c18a612e6850504c689fc

    SHA512

    591af481650855a4ca973b708f5aba55c0e14d6a838a92020f10048bd5efbdfc9f3b4265cf029ac985e059fa50b1a95fb88cb00045a09d1b1371b39e56719ab4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5731.exe
    Filesize

    318KB

    MD5

    e3f89614a82ec29cba1697d6f71e609e

    SHA1

    5cd3f2973c6b0c51a1d04865ccc7e5a54822d761

    SHA256

    2edb426fb0df00b1b2258a50f101add304d7b896622c18a612e6850504c689fc

    SHA512

    591af481650855a4ca973b708f5aba55c0e14d6a838a92020f10048bd5efbdfc9f3b4265cf029ac985e059fa50b1a95fb88cb00045a09d1b1371b39e56719ab4

  • memory/2576-1088-0x00000000057A0000-0x00000000057B2000-memory.dmp
    Filesize

    72KB

  • memory/2576-1089-0x00000000057C0000-0x00000000057FE000-memory.dmp
    Filesize

    248KB

  • memory/2576-1102-0x0000000004B60000-0x0000000004B70000-memory.dmp
    Filesize

    64KB

  • memory/2576-1101-0x0000000006B00000-0x0000000006B50000-memory.dmp
    Filesize

    320KB

  • memory/2576-1100-0x0000000006A70000-0x0000000006AE6000-memory.dmp
    Filesize

    472KB

  • memory/2576-1099-0x0000000004B60000-0x0000000004B70000-memory.dmp
    Filesize

    64KB

  • memory/2576-1098-0x0000000004B60000-0x0000000004B70000-memory.dmp
    Filesize

    64KB

  • memory/2576-1097-0x0000000004B60000-0x0000000004B70000-memory.dmp
    Filesize

    64KB

  • memory/2576-1096-0x0000000006420000-0x000000000694C000-memory.dmp
    Filesize

    5.2MB

  • memory/2576-1095-0x0000000006250000-0x0000000006412000-memory.dmp
    Filesize

    1.8MB

  • memory/2576-1093-0x0000000006160000-0x00000000061F2000-memory.dmp
    Filesize

    584KB

  • memory/2576-1092-0x0000000005AA0000-0x0000000005B06000-memory.dmp
    Filesize

    408KB

  • memory/2576-1091-0x0000000005910000-0x000000000595B000-memory.dmp
    Filesize

    300KB

  • memory/2576-190-0x0000000004A70000-0x0000000004AAF000-memory.dmp
    Filesize

    252KB

  • memory/2576-1090-0x0000000004B60000-0x0000000004B70000-memory.dmp
    Filesize

    64KB

  • memory/2576-1087-0x0000000005680000-0x000000000578A000-memory.dmp
    Filesize

    1.0MB

  • memory/2576-1086-0x0000000005070000-0x0000000005676000-memory.dmp
    Filesize

    6.0MB

  • memory/2576-476-0x0000000004B60000-0x0000000004B70000-memory.dmp
    Filesize

    64KB

  • memory/2576-474-0x0000000004B60000-0x0000000004B70000-memory.dmp
    Filesize

    64KB

  • memory/2576-472-0x0000000004B60000-0x0000000004B70000-memory.dmp
    Filesize

    64KB

  • memory/2576-210-0x0000000004A70000-0x0000000004AAF000-memory.dmp
    Filesize

    252KB

  • memory/2576-208-0x0000000004A70000-0x0000000004AAF000-memory.dmp
    Filesize

    252KB

  • memory/2576-206-0x0000000004A70000-0x0000000004AAF000-memory.dmp
    Filesize

    252KB

  • memory/2576-174-0x00000000005B0000-0x00000000005FB000-memory.dmp
    Filesize

    300KB

  • memory/2576-192-0x0000000004A70000-0x0000000004AAF000-memory.dmp
    Filesize

    252KB

  • memory/2576-176-0x0000000004A70000-0x0000000004AB4000-memory.dmp
    Filesize

    272KB

  • memory/2576-177-0x0000000004A70000-0x0000000004AAF000-memory.dmp
    Filesize

    252KB

  • memory/2576-178-0x0000000004A70000-0x0000000004AAF000-memory.dmp
    Filesize

    252KB

  • memory/2576-180-0x0000000004A70000-0x0000000004AAF000-memory.dmp
    Filesize

    252KB

  • memory/2576-182-0x0000000004A70000-0x0000000004AAF000-memory.dmp
    Filesize

    252KB

  • memory/2576-184-0x0000000004A70000-0x0000000004AAF000-memory.dmp
    Filesize

    252KB

  • memory/2576-186-0x0000000004A70000-0x0000000004AAF000-memory.dmp
    Filesize

    252KB

  • memory/2576-204-0x0000000004A70000-0x0000000004AAF000-memory.dmp
    Filesize

    252KB

  • memory/2576-188-0x0000000004A70000-0x0000000004AAF000-memory.dmp
    Filesize

    252KB

  • memory/2576-175-0x00000000049F0000-0x0000000004A36000-memory.dmp
    Filesize

    280KB

  • memory/2576-194-0x0000000004A70000-0x0000000004AAF000-memory.dmp
    Filesize

    252KB

  • memory/2576-196-0x0000000004A70000-0x0000000004AAF000-memory.dmp
    Filesize

    252KB

  • memory/2576-198-0x0000000004A70000-0x0000000004AAF000-memory.dmp
    Filesize

    252KB

  • memory/2576-200-0x0000000004A70000-0x0000000004AAF000-memory.dmp
    Filesize

    252KB

  • memory/2576-202-0x0000000004A70000-0x0000000004AAF000-memory.dmp
    Filesize

    252KB

  • memory/4188-1108-0x0000000000200000-0x0000000000232000-memory.dmp
    Filesize

    200KB

  • memory/4188-1110-0x0000000004AE0000-0x0000000004AF0000-memory.dmp
    Filesize

    64KB

  • memory/4188-1109-0x0000000004A80000-0x0000000004ACB000-memory.dmp
    Filesize

    300KB

  • memory/4960-169-0x0000000000400000-0x00000000004B1000-memory.dmp
    Filesize

    708KB

  • memory/4960-148-0x0000000004EF0000-0x0000000004F02000-memory.dmp
    Filesize

    72KB

  • memory/4960-166-0x00000000008F0000-0x0000000000900000-memory.dmp
    Filesize

    64KB

  • memory/4960-165-0x0000000000400000-0x00000000004B1000-memory.dmp
    Filesize

    708KB

  • memory/4960-164-0x0000000004EF0000-0x0000000004F02000-memory.dmp
    Filesize

    72KB

  • memory/4960-162-0x0000000004EF0000-0x0000000004F02000-memory.dmp
    Filesize

    72KB

  • memory/4960-133-0x0000000004EF0000-0x0000000004F08000-memory.dmp
    Filesize

    96KB

  • memory/4960-150-0x0000000004EF0000-0x0000000004F02000-memory.dmp
    Filesize

    72KB

  • memory/4960-160-0x0000000004EF0000-0x0000000004F02000-memory.dmp
    Filesize

    72KB

  • memory/4960-156-0x0000000004EF0000-0x0000000004F02000-memory.dmp
    Filesize

    72KB

  • memory/4960-134-0x00000000004C0000-0x00000000004ED000-memory.dmp
    Filesize

    180KB

  • memory/4960-158-0x0000000004EF0000-0x0000000004F02000-memory.dmp
    Filesize

    72KB

  • memory/4960-136-0x00000000008F0000-0x0000000000900000-memory.dmp
    Filesize

    64KB

  • memory/4960-167-0x00000000008F0000-0x0000000000900000-memory.dmp
    Filesize

    64KB

  • memory/4960-146-0x0000000004EF0000-0x0000000004F02000-memory.dmp
    Filesize

    72KB

  • memory/4960-144-0x0000000004EF0000-0x0000000004F02000-memory.dmp
    Filesize

    72KB

  • memory/4960-142-0x0000000004EF0000-0x0000000004F02000-memory.dmp
    Filesize

    72KB

  • memory/4960-140-0x0000000004EF0000-0x0000000004F02000-memory.dmp
    Filesize

    72KB

  • memory/4960-138-0x0000000004EF0000-0x0000000004F02000-memory.dmp
    Filesize

    72KB

  • memory/4960-137-0x0000000004EF0000-0x0000000004F02000-memory.dmp
    Filesize

    72KB

  • memory/4960-132-0x00000000049D0000-0x0000000004ECE000-memory.dmp
    Filesize

    5.0MB

  • memory/4960-131-0x0000000002370000-0x000000000238A000-memory.dmp
    Filesize

    104KB

  • memory/4960-152-0x0000000004EF0000-0x0000000004F02000-memory.dmp
    Filesize

    72KB

  • memory/4960-135-0x00000000008F0000-0x0000000000900000-memory.dmp
    Filesize

    64KB

  • memory/4960-154-0x0000000004EF0000-0x0000000004F02000-memory.dmp
    Filesize

    72KB