Analysis

  • max time kernel
    54s
  • max time network
    139s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    31-03-2023 19:13

General

  • Target

    278602048a85c5252e2dc520f9318353cc557115603cfebb9b7490b8badd943c.exe

  • Size

    676KB

  • MD5

    12bcea7ef50bed7ede4a3d379fef55dd

  • SHA1

    ae2bc96987a9b0e52dc651989e854b024dcdee87

  • SHA256

    278602048a85c5252e2dc520f9318353cc557115603cfebb9b7490b8badd943c

  • SHA512

    a73f10729bc5b6cb0312f73834a4c7693960321a89e0b49cace5f9b6154c71d5655e0308b07663c39147c1292224e179a2d2e588d58bd90115b7b7ffea807353

  • SSDEEP

    12288:VMr3y90sKOaI2FxNE3j22Z0ZbQkl5gFsi9S33HI2EyDp/O1uXm80rTKxZ:Sytz2FkS2ZEkkbgFdE3d2SvSTKv

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\278602048a85c5252e2dc520f9318353cc557115603cfebb9b7490b8badd943c.exe
    "C:\Users\Admin\AppData\Local\Temp\278602048a85c5252e2dc520f9318353cc557115603cfebb9b7490b8badd943c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un869728.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un869728.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3548
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6124.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6124.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2348
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7758.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7758.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4080
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si841959.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si841959.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4020

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si841959.exe
    Filesize

    175KB

    MD5

    2b1e8e34e4a599595b1782e50b63a353

    SHA1

    a45ac2618842ef9318b151d7d6a7982dc20a1ebf

    SHA256

    55d3852c8108199496a86da98736d0b3dc14f514e9ed590c24dfbf460978aa2f

    SHA512

    9625ba64a124ede3f751693ee4c907e747e7d1433936ca9ab9fa06464070d6d7447a47ecc18f92b6a1a63605883ce5ee09646f88e2d2715f7cfd76d678f4971c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si841959.exe
    Filesize

    175KB

    MD5

    2b1e8e34e4a599595b1782e50b63a353

    SHA1

    a45ac2618842ef9318b151d7d6a7982dc20a1ebf

    SHA256

    55d3852c8108199496a86da98736d0b3dc14f514e9ed590c24dfbf460978aa2f

    SHA512

    9625ba64a124ede3f751693ee4c907e747e7d1433936ca9ab9fa06464070d6d7447a47ecc18f92b6a1a63605883ce5ee09646f88e2d2715f7cfd76d678f4971c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un869728.exe
    Filesize

    534KB

    MD5

    9c46015e5f867161a622526041bd64e8

    SHA1

    cb9f2777cf8fc6ea19f2afc4fead6aa4be47d30d

    SHA256

    2c042d5209a2bf3b8467df5b92c80ce8e7563c36ea658cc0ee06b7082800b584

    SHA512

    d17a138c93aa6cdc22c7073be74ae18c854df4548214eb81c7a13713d1c9e7b6ae0010cc627151bcf8a64e8c6be36e1af86ae6202551a8445ad82bcf4de24a24

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un869728.exe
    Filesize

    534KB

    MD5

    9c46015e5f867161a622526041bd64e8

    SHA1

    cb9f2777cf8fc6ea19f2afc4fead6aa4be47d30d

    SHA256

    2c042d5209a2bf3b8467df5b92c80ce8e7563c36ea658cc0ee06b7082800b584

    SHA512

    d17a138c93aa6cdc22c7073be74ae18c854df4548214eb81c7a13713d1c9e7b6ae0010cc627151bcf8a64e8c6be36e1af86ae6202551a8445ad82bcf4de24a24

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6124.exe
    Filesize

    260KB

    MD5

    84e48eb0921756a5ccb1de573e8e2d02

    SHA1

    9073af7a66108d8faa6e203f8694c857fc7bb534

    SHA256

    6783862cdb63e2f1b6075a639bf0e3432d1d4ed5d11c57ebe2fe8e6d7ef71c80

    SHA512

    4b7b367d0f4690132586cd212559a4b8ae18175c335f205ba9d70b68f71a239a0a6656e14bf119363940969015d31fe1f7c86b7afdce2472aadc96095a819771

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6124.exe
    Filesize

    260KB

    MD5

    84e48eb0921756a5ccb1de573e8e2d02

    SHA1

    9073af7a66108d8faa6e203f8694c857fc7bb534

    SHA256

    6783862cdb63e2f1b6075a639bf0e3432d1d4ed5d11c57ebe2fe8e6d7ef71c80

    SHA512

    4b7b367d0f4690132586cd212559a4b8ae18175c335f205ba9d70b68f71a239a0a6656e14bf119363940969015d31fe1f7c86b7afdce2472aadc96095a819771

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7758.exe
    Filesize

    318KB

    MD5

    ccd08edd41c19eaa001749bf12f8af2a

    SHA1

    320991ae61680bb23d5f6c96559f06e184800d91

    SHA256

    1a1c8505ccbe4d605c78922ed0dd696c8f4e15e7c72cd8d385fd1b30e6a5a534

    SHA512

    5aa4303003b3ae65716692c68a92c088153c554f1f312c6cc01ddc682eb92ccb59113898dd7da4bbcb7672dc0a19a4d7bb8a7654c9cdefeadf764a86d6514e83

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7758.exe
    Filesize

    318KB

    MD5

    ccd08edd41c19eaa001749bf12f8af2a

    SHA1

    320991ae61680bb23d5f6c96559f06e184800d91

    SHA256

    1a1c8505ccbe4d605c78922ed0dd696c8f4e15e7c72cd8d385fd1b30e6a5a534

    SHA512

    5aa4303003b3ae65716692c68a92c088153c554f1f312c6cc01ddc682eb92ccb59113898dd7da4bbcb7672dc0a19a4d7bb8a7654c9cdefeadf764a86d6514e83

  • memory/2348-131-0x00000000021E0000-0x00000000021FA000-memory.dmp
    Filesize

    104KB

  • memory/2348-132-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/2348-133-0x0000000004C80000-0x0000000004C90000-memory.dmp
    Filesize

    64KB

  • memory/2348-134-0x0000000004C90000-0x000000000518E000-memory.dmp
    Filesize

    5.0MB

  • memory/2348-135-0x0000000002270000-0x0000000002288000-memory.dmp
    Filesize

    96KB

  • memory/2348-136-0x0000000002270000-0x0000000002282000-memory.dmp
    Filesize

    72KB

  • memory/2348-137-0x0000000002270000-0x0000000002282000-memory.dmp
    Filesize

    72KB

  • memory/2348-139-0x0000000002270000-0x0000000002282000-memory.dmp
    Filesize

    72KB

  • memory/2348-141-0x0000000002270000-0x0000000002282000-memory.dmp
    Filesize

    72KB

  • memory/2348-143-0x0000000002270000-0x0000000002282000-memory.dmp
    Filesize

    72KB

  • memory/2348-145-0x0000000002270000-0x0000000002282000-memory.dmp
    Filesize

    72KB

  • memory/2348-147-0x0000000002270000-0x0000000002282000-memory.dmp
    Filesize

    72KB

  • memory/2348-149-0x0000000002270000-0x0000000002282000-memory.dmp
    Filesize

    72KB

  • memory/2348-151-0x0000000002270000-0x0000000002282000-memory.dmp
    Filesize

    72KB

  • memory/2348-153-0x0000000002270000-0x0000000002282000-memory.dmp
    Filesize

    72KB

  • memory/2348-155-0x0000000002270000-0x0000000002282000-memory.dmp
    Filesize

    72KB

  • memory/2348-157-0x0000000002270000-0x0000000002282000-memory.dmp
    Filesize

    72KB

  • memory/2348-159-0x0000000002270000-0x0000000002282000-memory.dmp
    Filesize

    72KB

  • memory/2348-161-0x0000000002270000-0x0000000002282000-memory.dmp
    Filesize

    72KB

  • memory/2348-163-0x0000000002270000-0x0000000002282000-memory.dmp
    Filesize

    72KB

  • memory/2348-164-0x0000000004C80000-0x0000000004C90000-memory.dmp
    Filesize

    64KB

  • memory/2348-165-0x0000000004C80000-0x0000000004C90000-memory.dmp
    Filesize

    64KB

  • memory/2348-166-0x0000000000400000-0x00000000004B1000-memory.dmp
    Filesize

    708KB

  • memory/2348-167-0x0000000004C80000-0x0000000004C90000-memory.dmp
    Filesize

    64KB

  • memory/2348-169-0x0000000000400000-0x00000000004B1000-memory.dmp
    Filesize

    708KB

  • memory/4020-1108-0x0000000000920000-0x0000000000952000-memory.dmp
    Filesize

    200KB

  • memory/4020-1111-0x00000000051C0000-0x00000000051D0000-memory.dmp
    Filesize

    64KB

  • memory/4020-1110-0x0000000005360000-0x00000000053AB000-memory.dmp
    Filesize

    300KB

  • memory/4020-1109-0x00000000051C0000-0x00000000051D0000-memory.dmp
    Filesize

    64KB

  • memory/4080-179-0x0000000004980000-0x00000000049BF000-memory.dmp
    Filesize

    252KB

  • memory/4080-236-0x00000000049C0000-0x00000000049D0000-memory.dmp
    Filesize

    64KB

  • memory/4080-181-0x0000000004980000-0x00000000049BF000-memory.dmp
    Filesize

    252KB

  • memory/4080-183-0x0000000004980000-0x00000000049BF000-memory.dmp
    Filesize

    252KB

  • memory/4080-185-0x0000000004980000-0x00000000049BF000-memory.dmp
    Filesize

    252KB

  • memory/4080-187-0x0000000004980000-0x00000000049BF000-memory.dmp
    Filesize

    252KB

  • memory/4080-189-0x0000000004980000-0x00000000049BF000-memory.dmp
    Filesize

    252KB

  • memory/4080-191-0x0000000004980000-0x00000000049BF000-memory.dmp
    Filesize

    252KB

  • memory/4080-193-0x0000000004980000-0x00000000049BF000-memory.dmp
    Filesize

    252KB

  • memory/4080-195-0x0000000004980000-0x00000000049BF000-memory.dmp
    Filesize

    252KB

  • memory/4080-197-0x0000000004980000-0x00000000049BF000-memory.dmp
    Filesize

    252KB

  • memory/4080-199-0x0000000004980000-0x00000000049BF000-memory.dmp
    Filesize

    252KB

  • memory/4080-201-0x0000000004980000-0x00000000049BF000-memory.dmp
    Filesize

    252KB

  • memory/4080-203-0x0000000004980000-0x00000000049BF000-memory.dmp
    Filesize

    252KB

  • memory/4080-205-0x0000000004980000-0x00000000049BF000-memory.dmp
    Filesize

    252KB

  • memory/4080-207-0x0000000004980000-0x00000000049BF000-memory.dmp
    Filesize

    252KB

  • memory/4080-209-0x0000000004980000-0x00000000049BF000-memory.dmp
    Filesize

    252KB

  • memory/4080-235-0x00000000004C0000-0x000000000050B000-memory.dmp
    Filesize

    300KB

  • memory/4080-239-0x00000000049C0000-0x00000000049D0000-memory.dmp
    Filesize

    64KB

  • memory/4080-177-0x0000000004980000-0x00000000049BF000-memory.dmp
    Filesize

    252KB

  • memory/4080-240-0x00000000049C0000-0x00000000049D0000-memory.dmp
    Filesize

    64KB

  • memory/4080-1086-0x0000000004FD0000-0x00000000055D6000-memory.dmp
    Filesize

    6.0MB

  • memory/4080-1087-0x0000000005660000-0x000000000576A000-memory.dmp
    Filesize

    1.0MB

  • memory/4080-1088-0x00000000057A0000-0x00000000057B2000-memory.dmp
    Filesize

    72KB

  • memory/4080-1089-0x00000000057C0000-0x00000000057FE000-memory.dmp
    Filesize

    248KB

  • memory/4080-1090-0x00000000049C0000-0x00000000049D0000-memory.dmp
    Filesize

    64KB

  • memory/4080-1091-0x0000000005910000-0x000000000595B000-memory.dmp
    Filesize

    300KB

  • memory/4080-1092-0x0000000005AA0000-0x0000000005B06000-memory.dmp
    Filesize

    408KB

  • memory/4080-1093-0x0000000006170000-0x0000000006202000-memory.dmp
    Filesize

    584KB

  • memory/4080-1094-0x0000000006210000-0x0000000006286000-memory.dmp
    Filesize

    472KB

  • memory/4080-1095-0x00000000062A0000-0x00000000062F0000-memory.dmp
    Filesize

    320KB

  • memory/4080-1097-0x0000000006560000-0x0000000006722000-memory.dmp
    Filesize

    1.8MB

  • memory/4080-1098-0x0000000006750000-0x0000000006C7C000-memory.dmp
    Filesize

    5.2MB

  • memory/4080-1100-0x00000000049C0000-0x00000000049D0000-memory.dmp
    Filesize

    64KB

  • memory/4080-176-0x0000000004980000-0x00000000049BF000-memory.dmp
    Filesize

    252KB

  • memory/4080-175-0x0000000004980000-0x00000000049C4000-memory.dmp
    Filesize

    272KB

  • memory/4080-174-0x0000000002370000-0x00000000023B6000-memory.dmp
    Filesize

    280KB

  • memory/4080-1101-0x00000000049C0000-0x00000000049D0000-memory.dmp
    Filesize

    64KB

  • memory/4080-1099-0x00000000049C0000-0x00000000049D0000-memory.dmp
    Filesize

    64KB

  • memory/4080-1102-0x00000000049C0000-0x00000000049D0000-memory.dmp
    Filesize

    64KB