Analysis

  • max time kernel
    52s
  • max time network
    63s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    31-03-2023 19:32

General

  • Target

    585ad79539ce384a84a0826fba64a70dc5305fbbb43a4bea570004c87e0e929d.exe

  • Size

    673KB

  • MD5

    3efa40677eca7c9e23e2545803128750

  • SHA1

    26f3e0c417ba44138a480b8c21b4b8b02503fa33

  • SHA256

    585ad79539ce384a84a0826fba64a70dc5305fbbb43a4bea570004c87e0e929d

  • SHA512

    5bd5a9dde28011a2aff18beceec28409ef7227c6cec46a72e97a688ec8b5800c7caae5ac5ac92bafe9f488f84455590478b159e526776e33160757f84bc8a1c4

  • SSDEEP

    12288:aMr4y90JjHBxABdrZWuRlCW9RebJ+okMaDKwVLdLOborUmPBUwc4cpj:OyKnA3reOGEdLWIobXyBUSGj

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\585ad79539ce384a84a0826fba64a70dc5305fbbb43a4bea570004c87e0e929d.exe
    "C:\Users\Admin\AppData\Local\Temp\585ad79539ce384a84a0826fba64a70dc5305fbbb43a4bea570004c87e0e929d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1012
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un811520.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un811520.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2592
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4134.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4134.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2688
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0896.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0896.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4748
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si123211.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si123211.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4428

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si123211.exe
    Filesize

    175KB

    MD5

    2a3d506fa1df72e552ac6fe2dface171

    SHA1

    1152109b0b781b6f976c6f6850fc28c2213d4cac

    SHA256

    20375385b26c1e8059f00ef90472d7c9c5bb96fad269d12edd066c2baf81e96f

    SHA512

    b34d8ef68b30782ee543fc95cae266b1e256105d36b856f8a2063023174d4f6ff4ffcd871c687b413b501d3dc610081d3202340ea9f53514d880aca4a5c874af

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si123211.exe
    Filesize

    175KB

    MD5

    2a3d506fa1df72e552ac6fe2dface171

    SHA1

    1152109b0b781b6f976c6f6850fc28c2213d4cac

    SHA256

    20375385b26c1e8059f00ef90472d7c9c5bb96fad269d12edd066c2baf81e96f

    SHA512

    b34d8ef68b30782ee543fc95cae266b1e256105d36b856f8a2063023174d4f6ff4ffcd871c687b413b501d3dc610081d3202340ea9f53514d880aca4a5c874af

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un811520.exe
    Filesize

    530KB

    MD5

    658ebce48a5b0828e5ad01fa6479b35e

    SHA1

    8e7fac720a7841fa876852f778c08996e97bf616

    SHA256

    6022d7e15fa7f7ec51736604f162f19f819812188e1bf39750631c5c9ae987b8

    SHA512

    388ccaf1f52413a7c95ef124aae9be8730e4dde6914e67a1d128430987f385e9006b9f7d2bfb135db6cc7901816ade67638b9b9dc02cb29c176e42f6f3245a11

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un811520.exe
    Filesize

    530KB

    MD5

    658ebce48a5b0828e5ad01fa6479b35e

    SHA1

    8e7fac720a7841fa876852f778c08996e97bf616

    SHA256

    6022d7e15fa7f7ec51736604f162f19f819812188e1bf39750631c5c9ae987b8

    SHA512

    388ccaf1f52413a7c95ef124aae9be8730e4dde6914e67a1d128430987f385e9006b9f7d2bfb135db6cc7901816ade67638b9b9dc02cb29c176e42f6f3245a11

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4134.exe
    Filesize

    260KB

    MD5

    890b2f900a6e0b3813495e052b7c6209

    SHA1

    86412b8497d67f839c1ad4f3237edf8c71e5081a

    SHA256

    291926507ae48f25be00aef1f01084016cb0a309bf5e2b2a02280fbf1c2f8350

    SHA512

    e387b8b4f502343971fe923fc54ef624acde5643837abbb86fe667f5cf8b6d5ba0a4a3247ce0651ab75c1a44b5f4e78a340cf71c94eb09c406b682628edcb8be

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4134.exe
    Filesize

    260KB

    MD5

    890b2f900a6e0b3813495e052b7c6209

    SHA1

    86412b8497d67f839c1ad4f3237edf8c71e5081a

    SHA256

    291926507ae48f25be00aef1f01084016cb0a309bf5e2b2a02280fbf1c2f8350

    SHA512

    e387b8b4f502343971fe923fc54ef624acde5643837abbb86fe667f5cf8b6d5ba0a4a3247ce0651ab75c1a44b5f4e78a340cf71c94eb09c406b682628edcb8be

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0896.exe
    Filesize

    318KB

    MD5

    06a021eb4bb8e7afb3fe440416861ade

    SHA1

    a01001199ac9e96bcb9fe8e10ac5e0025c562c0f

    SHA256

    90a1ceaa09fb6605f41bba17a881598180c8cce13768aab8646bfd746dd4256c

    SHA512

    2902ef10de18db01830adffec753fa2ac791aa764fcbcf94ce0b1898004207e95cb114b2c4a50335f9b7febd11f63cefd77cba1c3fdf8a7bb81c15703705fa4b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0896.exe
    Filesize

    318KB

    MD5

    06a021eb4bb8e7afb3fe440416861ade

    SHA1

    a01001199ac9e96bcb9fe8e10ac5e0025c562c0f

    SHA256

    90a1ceaa09fb6605f41bba17a881598180c8cce13768aab8646bfd746dd4256c

    SHA512

    2902ef10de18db01830adffec753fa2ac791aa764fcbcf94ce0b1898004207e95cb114b2c4a50335f9b7febd11f63cefd77cba1c3fdf8a7bb81c15703705fa4b

  • memory/2688-164-0x0000000002490000-0x00000000024A2000-memory.dmp
    Filesize

    72KB

  • memory/2688-160-0x0000000002490000-0x00000000024A2000-memory.dmp
    Filesize

    72KB

  • memory/2688-138-0x0000000002490000-0x00000000024A8000-memory.dmp
    Filesize

    96KB

  • memory/2688-139-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/2688-140-0x0000000004BD0000-0x0000000004BE0000-memory.dmp
    Filesize

    64KB

  • memory/2688-142-0x0000000004BD0000-0x0000000004BE0000-memory.dmp
    Filesize

    64KB

  • memory/2688-141-0x0000000004BD0000-0x0000000004BE0000-memory.dmp
    Filesize

    64KB

  • memory/2688-143-0x0000000002490000-0x00000000024A2000-memory.dmp
    Filesize

    72KB

  • memory/2688-146-0x0000000002490000-0x00000000024A2000-memory.dmp
    Filesize

    72KB

  • memory/2688-144-0x0000000002490000-0x00000000024A2000-memory.dmp
    Filesize

    72KB

  • memory/2688-136-0x00000000007E0000-0x00000000007FA000-memory.dmp
    Filesize

    104KB

  • memory/2688-170-0x0000000002490000-0x00000000024A2000-memory.dmp
    Filesize

    72KB

  • memory/2688-168-0x0000000002490000-0x00000000024A2000-memory.dmp
    Filesize

    72KB

  • memory/2688-166-0x0000000002490000-0x00000000024A2000-memory.dmp
    Filesize

    72KB

  • memory/2688-162-0x0000000002490000-0x00000000024A2000-memory.dmp
    Filesize

    72KB

  • memory/2688-137-0x0000000004BE0000-0x00000000050DE000-memory.dmp
    Filesize

    5.0MB

  • memory/2688-158-0x0000000002490000-0x00000000024A2000-memory.dmp
    Filesize

    72KB

  • memory/2688-156-0x0000000002490000-0x00000000024A2000-memory.dmp
    Filesize

    72KB

  • memory/2688-154-0x0000000002490000-0x00000000024A2000-memory.dmp
    Filesize

    72KB

  • memory/2688-152-0x0000000002490000-0x00000000024A2000-memory.dmp
    Filesize

    72KB

  • memory/2688-150-0x0000000002490000-0x00000000024A2000-memory.dmp
    Filesize

    72KB

  • memory/2688-148-0x0000000002490000-0x00000000024A2000-memory.dmp
    Filesize

    72KB

  • memory/2688-171-0x0000000000400000-0x00000000004B1000-memory.dmp
    Filesize

    708KB

  • memory/2688-172-0x0000000004BD0000-0x0000000004BE0000-memory.dmp
    Filesize

    64KB

  • memory/2688-173-0x0000000004BD0000-0x0000000004BE0000-memory.dmp
    Filesize

    64KB

  • memory/2688-174-0x0000000004BD0000-0x0000000004BE0000-memory.dmp
    Filesize

    64KB

  • memory/2688-176-0x0000000000400000-0x00000000004B1000-memory.dmp
    Filesize

    708KB

  • memory/4428-1115-0x0000000000440000-0x0000000000472000-memory.dmp
    Filesize

    200KB

  • memory/4428-1118-0x0000000004CB0000-0x0000000004CC0000-memory.dmp
    Filesize

    64KB

  • memory/4428-1117-0x0000000004CB0000-0x0000000004CC0000-memory.dmp
    Filesize

    64KB

  • memory/4428-1116-0x0000000004D20000-0x0000000004D6B000-memory.dmp
    Filesize

    300KB

  • memory/4748-183-0x0000000002410000-0x000000000244F000-memory.dmp
    Filesize

    252KB

  • memory/4748-359-0x0000000004CC0000-0x0000000004CD0000-memory.dmp
    Filesize

    64KB

  • memory/4748-188-0x0000000002410000-0x000000000244F000-memory.dmp
    Filesize

    252KB

  • memory/4748-190-0x0000000002410000-0x000000000244F000-memory.dmp
    Filesize

    252KB

  • memory/4748-192-0x0000000002410000-0x000000000244F000-memory.dmp
    Filesize

    252KB

  • memory/4748-194-0x0000000002410000-0x000000000244F000-memory.dmp
    Filesize

    252KB

  • memory/4748-196-0x0000000002410000-0x000000000244F000-memory.dmp
    Filesize

    252KB

  • memory/4748-200-0x0000000002410000-0x000000000244F000-memory.dmp
    Filesize

    252KB

  • memory/4748-198-0x0000000002410000-0x000000000244F000-memory.dmp
    Filesize

    252KB

  • memory/4748-202-0x0000000002410000-0x000000000244F000-memory.dmp
    Filesize

    252KB

  • memory/4748-206-0x0000000002410000-0x000000000244F000-memory.dmp
    Filesize

    252KB

  • memory/4748-204-0x0000000002410000-0x000000000244F000-memory.dmp
    Filesize

    252KB

  • memory/4748-208-0x0000000002410000-0x000000000244F000-memory.dmp
    Filesize

    252KB

  • memory/4748-210-0x0000000002410000-0x000000000244F000-memory.dmp
    Filesize

    252KB

  • memory/4748-212-0x0000000002410000-0x000000000244F000-memory.dmp
    Filesize

    252KB

  • memory/4748-214-0x0000000002410000-0x000000000244F000-memory.dmp
    Filesize

    252KB

  • memory/4748-216-0x0000000002410000-0x000000000244F000-memory.dmp
    Filesize

    252KB

  • memory/4748-355-0x00000000004C0000-0x000000000050B000-memory.dmp
    Filesize

    300KB

  • memory/4748-357-0x0000000004CC0000-0x0000000004CD0000-memory.dmp
    Filesize

    64KB

  • memory/4748-186-0x0000000002410000-0x000000000244F000-memory.dmp
    Filesize

    252KB

  • memory/4748-361-0x0000000004CC0000-0x0000000004CD0000-memory.dmp
    Filesize

    64KB

  • memory/4748-1093-0x00000000057E0000-0x0000000005DE6000-memory.dmp
    Filesize

    6.0MB

  • memory/4748-1094-0x00000000051D0000-0x00000000052DA000-memory.dmp
    Filesize

    1.0MB

  • memory/4748-1095-0x0000000002620000-0x0000000002632000-memory.dmp
    Filesize

    72KB

  • memory/4748-1096-0x0000000002640000-0x000000000267E000-memory.dmp
    Filesize

    248KB

  • memory/4748-1097-0x0000000004C10000-0x0000000004C5B000-memory.dmp
    Filesize

    300KB

  • memory/4748-1098-0x0000000004CC0000-0x0000000004CD0000-memory.dmp
    Filesize

    64KB

  • memory/4748-1100-0x0000000005490000-0x0000000005522000-memory.dmp
    Filesize

    584KB

  • memory/4748-1101-0x0000000005530000-0x0000000005596000-memory.dmp
    Filesize

    408KB

  • memory/4748-1102-0x0000000006330000-0x00000000063A6000-memory.dmp
    Filesize

    472KB

  • memory/4748-1103-0x00000000063B0000-0x0000000006400000-memory.dmp
    Filesize

    320KB

  • memory/4748-1104-0x0000000006430000-0x00000000065F2000-memory.dmp
    Filesize

    1.8MB

  • memory/4748-1105-0x0000000004CC0000-0x0000000004CD0000-memory.dmp
    Filesize

    64KB

  • memory/4748-1106-0x0000000004CC0000-0x0000000004CD0000-memory.dmp
    Filesize

    64KB

  • memory/4748-184-0x0000000002410000-0x000000000244F000-memory.dmp
    Filesize

    252KB

  • memory/4748-182-0x0000000002410000-0x0000000002454000-memory.dmp
    Filesize

    272KB

  • memory/4748-181-0x0000000002100000-0x0000000002146000-memory.dmp
    Filesize

    280KB

  • memory/4748-1107-0x0000000004CC0000-0x0000000004CD0000-memory.dmp
    Filesize

    64KB

  • memory/4748-1108-0x0000000006600000-0x0000000006B2C000-memory.dmp
    Filesize

    5.2MB

  • memory/4748-1109-0x0000000004CC0000-0x0000000004CD0000-memory.dmp
    Filesize

    64KB