Analysis

  • max time kernel
    55s
  • max time network
    149s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    31-03-2023 20:19

General

  • Target

    085116b899aca9352e7a5582c7992ed4ac97738b0576afcd2fd087b44f75bf8d.exe

  • Size

    533KB

  • MD5

    483b4082d35720abd59c982fa45994bb

  • SHA1

    38bd48154e167ce9a1570227983c01559797b153

  • SHA256

    085116b899aca9352e7a5582c7992ed4ac97738b0576afcd2fd087b44f75bf8d

  • SHA512

    86f2450233dc57e5ed24218adc295223a1db666b8900a8e83b516e37fa45cb34174d7da03f099a3f57a0ca575ce9969fe8c97dd3b070fb856ae1397212073557

  • SSDEEP

    12288:RMrEy90S8fCxRjT563233LqH3UCfy4a7tZL:BySfCxp56G33GXy4ctx

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\085116b899aca9352e7a5582c7992ed4ac97738b0576afcd2fd087b44f75bf8d.exe
    "C:\Users\Admin\AppData\Local\Temp\085116b899aca9352e7a5582c7992ed4ac97738b0576afcd2fd087b44f75bf8d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHD5786.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHD5786.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2120
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr116880.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr116880.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4248
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku411847.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku411847.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4668
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr553165.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr553165.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1580

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr553165.exe
    Filesize

    175KB

    MD5

    4ae4e6ce495af0af0b3bb25467e585c9

    SHA1

    6d0de52751ffa25bae1d2b1a531a08a9b8f13c7a

    SHA256

    b81cdb896902143de069bd2bbc05cd621d544f1bef560e4f2055ed406e2017ba

    SHA512

    548e99ab748087cb0e743e574e36817d17bedaa23fc200e7d1ef53a27799a806651424398ade1a2e8879c76c5bed721adf120783d528cb9e36a8823cf4213e57

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr553165.exe
    Filesize

    175KB

    MD5

    4ae4e6ce495af0af0b3bb25467e585c9

    SHA1

    6d0de52751ffa25bae1d2b1a531a08a9b8f13c7a

    SHA256

    b81cdb896902143de069bd2bbc05cd621d544f1bef560e4f2055ed406e2017ba

    SHA512

    548e99ab748087cb0e743e574e36817d17bedaa23fc200e7d1ef53a27799a806651424398ade1a2e8879c76c5bed721adf120783d528cb9e36a8823cf4213e57

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHD5786.exe
    Filesize

    391KB

    MD5

    ebbfb2f923af7679d1880f9654545d83

    SHA1

    def2286997a413d2e0fb0ad0da2ebb014af8e595

    SHA256

    810353254806f1cd69545e6a6dfe4391c1b0715b0965ef9897a4fedc70059826

    SHA512

    597bd3ae7839f676ab53a7a011c93e5eee71bd5fd4406136e7ee6f3db15c614292e31837475c244d6f4edf01221316bc70b4fc10c123a54259e6262b079d8b90

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziHD5786.exe
    Filesize

    391KB

    MD5

    ebbfb2f923af7679d1880f9654545d83

    SHA1

    def2286997a413d2e0fb0ad0da2ebb014af8e595

    SHA256

    810353254806f1cd69545e6a6dfe4391c1b0715b0965ef9897a4fedc70059826

    SHA512

    597bd3ae7839f676ab53a7a011c93e5eee71bd5fd4406136e7ee6f3db15c614292e31837475c244d6f4edf01221316bc70b4fc10c123a54259e6262b079d8b90

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr116880.exe
    Filesize

    11KB

    MD5

    2d573d483075cfa25385b0cc73af87bd

    SHA1

    0c68fc1baa8e2b15c72ed4d4a6e4a6d618318196

    SHA256

    9b742919671663d980f9471d1f2b2891602d919182ae1909d4f00dba5e0f3ed1

    SHA512

    158f2b046df4cb29a4d17c4454cf73c4bd12ba5654d4bffe21813abba5b39e3bb12929b9d1bc78dd812c786129b42bbb559f8a19d444266a56be744c0d7bbe58

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr116880.exe
    Filesize

    11KB

    MD5

    2d573d483075cfa25385b0cc73af87bd

    SHA1

    0c68fc1baa8e2b15c72ed4d4a6e4a6d618318196

    SHA256

    9b742919671663d980f9471d1f2b2891602d919182ae1909d4f00dba5e0f3ed1

    SHA512

    158f2b046df4cb29a4d17c4454cf73c4bd12ba5654d4bffe21813abba5b39e3bb12929b9d1bc78dd812c786129b42bbb559f8a19d444266a56be744c0d7bbe58

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku411847.exe
    Filesize

    359KB

    MD5

    80ea6481ccd3339d337c86632e54c844

    SHA1

    480798fb4666b264d06a3fa198d1dd56af6d9997

    SHA256

    507e768168e0292e84969406f2069c0a4ba275ff7c40588020787f4ed1dd61b1

    SHA512

    bab10b0a75e3de26857127456dd3ad0ffa85dc145d4be96630799463780e709797ccce25a7d53cb67a08b74d1a711942dcbc5aa13e148a95b321a8827a918ed2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku411847.exe
    Filesize

    359KB

    MD5

    80ea6481ccd3339d337c86632e54c844

    SHA1

    480798fb4666b264d06a3fa198d1dd56af6d9997

    SHA256

    507e768168e0292e84969406f2069c0a4ba275ff7c40588020787f4ed1dd61b1

    SHA512

    bab10b0a75e3de26857127456dd3ad0ffa85dc145d4be96630799463780e709797ccce25a7d53cb67a08b74d1a711942dcbc5aa13e148a95b321a8827a918ed2

  • memory/1580-1075-0x0000000000250000-0x0000000000282000-memory.dmp
    Filesize

    200KB

  • memory/1580-1076-0x0000000004C90000-0x0000000004CDB000-memory.dmp
    Filesize

    300KB

  • memory/1580-1077-0x0000000004DF0000-0x0000000004E00000-memory.dmp
    Filesize

    64KB

  • memory/4248-134-0x0000000000540000-0x000000000054A000-memory.dmp
    Filesize

    40KB

  • memory/4668-178-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-188-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-142-0x0000000001BD0000-0x0000000001C1B000-memory.dmp
    Filesize

    300KB

  • memory/4668-146-0x0000000006120000-0x0000000006130000-memory.dmp
    Filesize

    64KB

  • memory/4668-145-0x0000000006120000-0x0000000006130000-memory.dmp
    Filesize

    64KB

  • memory/4668-144-0x00000000060D0000-0x0000000006114000-memory.dmp
    Filesize

    272KB

  • memory/4668-147-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-148-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-150-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-152-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-154-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-156-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-158-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-160-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-162-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-164-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-166-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-168-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-170-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-172-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-174-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-180-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-141-0x0000000006130000-0x000000000662E000-memory.dmp
    Filesize

    5.0MB

  • memory/4668-176-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-182-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-184-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-186-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-143-0x0000000006120000-0x0000000006130000-memory.dmp
    Filesize

    64KB

  • memory/4668-190-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-192-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-194-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-196-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-198-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-200-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-202-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-204-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-206-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-208-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-210-0x00000000060D0000-0x000000000610F000-memory.dmp
    Filesize

    252KB

  • memory/4668-1053-0x0000000006D80000-0x0000000007386000-memory.dmp
    Filesize

    6.0MB

  • memory/4668-1054-0x00000000067D0000-0x00000000068DA000-memory.dmp
    Filesize

    1.0MB

  • memory/4668-1055-0x0000000006910000-0x0000000006922000-memory.dmp
    Filesize

    72KB

  • memory/4668-1056-0x0000000006120000-0x0000000006130000-memory.dmp
    Filesize

    64KB

  • memory/4668-1057-0x0000000006930000-0x000000000696E000-memory.dmp
    Filesize

    248KB

  • memory/4668-1058-0x0000000006A80000-0x0000000006ACB000-memory.dmp
    Filesize

    300KB

  • memory/4668-1060-0x0000000006C10000-0x0000000006C76000-memory.dmp
    Filesize

    408KB

  • memory/4668-1061-0x00000000078E0000-0x0000000007972000-memory.dmp
    Filesize

    584KB

  • memory/4668-1062-0x0000000006120000-0x0000000006130000-memory.dmp
    Filesize

    64KB

  • memory/4668-1063-0x0000000006120000-0x0000000006130000-memory.dmp
    Filesize

    64KB

  • memory/4668-1064-0x0000000006120000-0x0000000006130000-memory.dmp
    Filesize

    64KB

  • memory/4668-1065-0x0000000007AD0000-0x0000000007C92000-memory.dmp
    Filesize

    1.8MB

  • memory/4668-140-0x00000000039F0000-0x0000000003A36000-memory.dmp
    Filesize

    280KB

  • memory/4668-1066-0x0000000007CB0000-0x00000000081DC000-memory.dmp
    Filesize

    5.2MB

  • memory/4668-1067-0x0000000006120000-0x0000000006130000-memory.dmp
    Filesize

    64KB

  • memory/4668-1068-0x0000000008450000-0x00000000084C6000-memory.dmp
    Filesize

    472KB

  • memory/4668-1069-0x00000000084E0000-0x0000000008530000-memory.dmp
    Filesize

    320KB