Analysis

  • max time kernel
    54s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    31-03-2023 19:29

General

  • Target

    7e7f8f9b45ece976df436c895808584b70452e28415e0c39bce63cb94aaa7675.exe

  • Size

    534KB

  • MD5

    a063547aef264ff55b0221bd1862a1a0

  • SHA1

    c51be7a93832b317b48ad44565154bc438e4b2dc

  • SHA256

    7e7f8f9b45ece976df436c895808584b70452e28415e0c39bce63cb94aaa7675

  • SHA512

    57d545a5c4e2366414b1e2f55a979493237479c398742999c07f1dbd05d8289065f79a0adc39c744f1e32cc69b362d4b67130d4fac384d9e756050275792325a

  • SSDEEP

    12288:yMriy90ItTEkjF0bs4itRueMeWoTOboro6zqgdxLg5EKjXO:UyXtPjFmViyzbd2xLMO

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7e7f8f9b45ece976df436c895808584b70452e28415e0c39bce63cb94aaa7675.exe
    "C:\Users\Admin\AppData\Local\Temp\7e7f8f9b45ece976df436c895808584b70452e28415e0c39bce63cb94aaa7675.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwd9282.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwd9282.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3728
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr019925.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr019925.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4156
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku647182.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku647182.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4508
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr743003.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr743003.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1908

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr743003.exe
    Filesize

    175KB

    MD5

    e9fad0f36eb4229d3d947539be497714

    SHA1

    34e1a0602b98a1ca1780455310ab487340edebcb

    SHA256

    b3e8234eee23bf1363d302fe3ecefe7dcaedfb98ced8aaf69851948679ac6efe

    SHA512

    11d71df26dbc4ed19897c4fdee499c1e3b8d94e1beae3a0e77dd4bd8c25785f5760bfbf916bdee4715464ee2cf0c1684f852e4797f7682e143a8b0f7edffd72d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr743003.exe
    Filesize

    175KB

    MD5

    e9fad0f36eb4229d3d947539be497714

    SHA1

    34e1a0602b98a1ca1780455310ab487340edebcb

    SHA256

    b3e8234eee23bf1363d302fe3ecefe7dcaedfb98ced8aaf69851948679ac6efe

    SHA512

    11d71df26dbc4ed19897c4fdee499c1e3b8d94e1beae3a0e77dd4bd8c25785f5760bfbf916bdee4715464ee2cf0c1684f852e4797f7682e143a8b0f7edffd72d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwd9282.exe
    Filesize

    391KB

    MD5

    fe478fe2bd5185f48663a6cf984e80da

    SHA1

    12690ab7dc0070e3d97d6772986034b89f13e471

    SHA256

    39166eedd3b2de87b36fcc7a0f2bd82db7785d79ce01f801c71817ecc41ac13b

    SHA512

    fb54c8b348ebd99e52d8bde5b8bc3ddbd7fbe37d98b600fcf86c61408860263a614e142be3878b75580311f31aa3ec7a01c4204c49a6c69adcc3cb4e2fd525ab

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziwd9282.exe
    Filesize

    391KB

    MD5

    fe478fe2bd5185f48663a6cf984e80da

    SHA1

    12690ab7dc0070e3d97d6772986034b89f13e471

    SHA256

    39166eedd3b2de87b36fcc7a0f2bd82db7785d79ce01f801c71817ecc41ac13b

    SHA512

    fb54c8b348ebd99e52d8bde5b8bc3ddbd7fbe37d98b600fcf86c61408860263a614e142be3878b75580311f31aa3ec7a01c4204c49a6c69adcc3cb4e2fd525ab

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr019925.exe
    Filesize

    11KB

    MD5

    8c46d01cbe11c7aff20c735bfe65b339

    SHA1

    64eab0ec7c759127c13d08ae907b6950a58242a7

    SHA256

    8c3b10334c4a4655a182884bf985d4d84f5156c9f0dc47bdd93238f0476e0751

    SHA512

    028025dc852a3c21c7b16743cc63c4934fa334df551c50d55b9cbfe6c384ebd4eab6428315dac8bc401f4b00eeadae757161aed82ca8d5ae14a0ffde11ae0067

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr019925.exe
    Filesize

    11KB

    MD5

    8c46d01cbe11c7aff20c735bfe65b339

    SHA1

    64eab0ec7c759127c13d08ae907b6950a58242a7

    SHA256

    8c3b10334c4a4655a182884bf985d4d84f5156c9f0dc47bdd93238f0476e0751

    SHA512

    028025dc852a3c21c7b16743cc63c4934fa334df551c50d55b9cbfe6c384ebd4eab6428315dac8bc401f4b00eeadae757161aed82ca8d5ae14a0ffde11ae0067

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku647182.exe
    Filesize

    318KB

    MD5

    684aa7e98aecc291d1e12a457855c4e2

    SHA1

    8470974275dcf0c1c638aa6a16571acd158c1b1f

    SHA256

    f1c44f01def8d9c281c23d720df3ed11a6c6ccec38cd3a6bc057d2a4907a1378

    SHA512

    609d8aedf3ba2a831e088c34db9bfa66d2b475343af5cac736e369f2435e5e29dd1bae420d59143c26d511e5fb4f92bb6f489339910fcf408406d3281b2807e0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku647182.exe
    Filesize

    318KB

    MD5

    684aa7e98aecc291d1e12a457855c4e2

    SHA1

    8470974275dcf0c1c638aa6a16571acd158c1b1f

    SHA256

    f1c44f01def8d9c281c23d720df3ed11a6c6ccec38cd3a6bc057d2a4907a1378

    SHA512

    609d8aedf3ba2a831e088c34db9bfa66d2b475343af5cac736e369f2435e5e29dd1bae420d59143c26d511e5fb4f92bb6f489339910fcf408406d3281b2807e0

  • memory/1908-1071-0x0000000000500000-0x0000000000532000-memory.dmp
    Filesize

    200KB

  • memory/1908-1072-0x0000000004F40000-0x0000000004F8B000-memory.dmp
    Filesize

    300KB

  • memory/1908-1074-0x00000000050B0000-0x00000000050C0000-memory.dmp
    Filesize

    64KB

  • memory/1908-1073-0x00000000050B0000-0x00000000050C0000-memory.dmp
    Filesize

    64KB

  • memory/4156-134-0x0000000000A20000-0x0000000000A2A000-memory.dmp
    Filesize

    40KB

  • memory/4508-176-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-188-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-144-0x0000000002610000-0x0000000002654000-memory.dmp
    Filesize

    272KB

  • memory/4508-145-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-146-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-148-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-150-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-152-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-154-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-156-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-158-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-160-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-162-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-164-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-166-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-168-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-170-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-172-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-174-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-142-0x0000000004C20000-0x0000000004C30000-memory.dmp
    Filesize

    64KB

  • memory/4508-178-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-180-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-182-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-184-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-186-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-143-0x0000000004C30000-0x000000000512E000-memory.dmp
    Filesize

    5.0MB

  • memory/4508-190-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-192-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-194-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-196-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-198-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-200-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-202-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-204-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-206-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-208-0x0000000002610000-0x000000000264F000-memory.dmp
    Filesize

    252KB

  • memory/4508-1051-0x0000000005130000-0x0000000005736000-memory.dmp
    Filesize

    6.0MB

  • memory/4508-1052-0x00000000057A0000-0x00000000058AA000-memory.dmp
    Filesize

    1.0MB

  • memory/4508-1053-0x00000000058E0000-0x00000000058F2000-memory.dmp
    Filesize

    72KB

  • memory/4508-1054-0x0000000005900000-0x000000000593E000-memory.dmp
    Filesize

    248KB

  • memory/4508-1055-0x0000000005A50000-0x0000000005A9B000-memory.dmp
    Filesize

    300KB

  • memory/4508-1056-0x0000000004C20000-0x0000000004C30000-memory.dmp
    Filesize

    64KB

  • memory/4508-1058-0x0000000005BE0000-0x0000000005C46000-memory.dmp
    Filesize

    408KB

  • memory/4508-1059-0x00000000062A0000-0x0000000006332000-memory.dmp
    Filesize

    584KB

  • memory/4508-1060-0x0000000006490000-0x0000000006652000-memory.dmp
    Filesize

    1.8MB

  • memory/4508-141-0x0000000000590000-0x00000000005DB000-memory.dmp
    Filesize

    300KB

  • memory/4508-140-0x0000000002160000-0x00000000021A6000-memory.dmp
    Filesize

    280KB

  • memory/4508-1061-0x0000000006670000-0x0000000006B9C000-memory.dmp
    Filesize

    5.2MB

  • memory/4508-1062-0x0000000004C20000-0x0000000004C30000-memory.dmp
    Filesize

    64KB

  • memory/4508-1064-0x0000000006E10000-0x0000000006E86000-memory.dmp
    Filesize

    472KB

  • memory/4508-1065-0x0000000006EA0000-0x0000000006EF0000-memory.dmp
    Filesize

    320KB