Analysis

  • max time kernel
    50s
  • max time network
    140s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    31-03-2023 20:23

General

  • Target

    efcbd1af4190cb8f35b30fcfad852ae29b26194be807dd3c7e22c587788d383e.exe

  • Size

    673KB

  • MD5

    9617634223a3f383437da9083935d580

  • SHA1

    c9efb1567fb3dcc157f6819fae7fb5174e4c644e

  • SHA256

    efcbd1af4190cb8f35b30fcfad852ae29b26194be807dd3c7e22c587788d383e

  • SHA512

    ea75630b8d153ef4ef37462dc96056be8e51689e2fde692ae54d67fd5f467899e0e08de9bdc12c030e6fd050a94b7921f9687fb0221ddc9de144c4005586151d

  • SSDEEP

    12288:GMrwy90WSHTKYUdomalIRA3mbIzzvzf2a7mULqD2JSlqDs6hAtE:6yKKYUdoX2ERX77mUGDkRRqu

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 22 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\efcbd1af4190cb8f35b30fcfad852ae29b26194be807dd3c7e22c587788d383e.exe
    "C:\Users\Admin\AppData\Local\Temp\efcbd1af4190cb8f35b30fcfad852ae29b26194be807dd3c7e22c587788d383e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un245390.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un245390.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3548
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0296.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0296.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2348
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4134.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4134.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3928
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si930874.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si930874.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1524

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si930874.exe
    Filesize

    175KB

    MD5

    c5328cc0c8e26111eeb1a18559b47818

    SHA1

    c8a33a7a914f139d3625259fe74448e9e753770d

    SHA256

    6009254f6eb3531c3cca8507f40c2c2250857591d582b081fbde8ee56d1a5ee5

    SHA512

    d6c2e76e2a16008a9e8c0b244a222a8d1cc7684e20a064fbec2a7f40244bd3cc9dc276f3d57b05b601fd513cb0623e0ba53815662bac61eb560ca110ad4d79b1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si930874.exe
    Filesize

    175KB

    MD5

    c5328cc0c8e26111eeb1a18559b47818

    SHA1

    c8a33a7a914f139d3625259fe74448e9e753770d

    SHA256

    6009254f6eb3531c3cca8507f40c2c2250857591d582b081fbde8ee56d1a5ee5

    SHA512

    d6c2e76e2a16008a9e8c0b244a222a8d1cc7684e20a064fbec2a7f40244bd3cc9dc276f3d57b05b601fd513cb0623e0ba53815662bac61eb560ca110ad4d79b1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un245390.exe
    Filesize

    531KB

    MD5

    d64aeeb142f5c0a365d95927bfc07cd2

    SHA1

    9c5782963c4c1ab39b0af633c9ffac90f4ab1af9

    SHA256

    ccae0dbe7f908319b8f0141b386a50a440f9c6a63db57839379f9c3cbdb57d09

    SHA512

    ef2e4979f61592f48eb1d26e56d1193975d8600d78b77e28d098652191af6cb6e6c90cc71c8344742671cc2923652bbf00bee233a0f606b1df314339bf87de8b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un245390.exe
    Filesize

    531KB

    MD5

    d64aeeb142f5c0a365d95927bfc07cd2

    SHA1

    9c5782963c4c1ab39b0af633c9ffac90f4ab1af9

    SHA256

    ccae0dbe7f908319b8f0141b386a50a440f9c6a63db57839379f9c3cbdb57d09

    SHA512

    ef2e4979f61592f48eb1d26e56d1193975d8600d78b77e28d098652191af6cb6e6c90cc71c8344742671cc2923652bbf00bee233a0f606b1df314339bf87de8b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0296.exe
    Filesize

    260KB

    MD5

    6c1d6f058ab20c415abb34b705a708c6

    SHA1

    c917d6dd0319a6fff8fc1a6a2b14721d05ec3ddb

    SHA256

    f8261ca65937f9ff8c7e8de2ae52b22dcc51f70e34a74e41f4230067ce539258

    SHA512

    579abbc1415d1d299aec98f44371d3484f880fb2250726b5588cf987823adf0474f1da10d8f659905c5b299546a80baf389df0df260f325ff2ba7c7e295ab5ef

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0296.exe
    Filesize

    260KB

    MD5

    6c1d6f058ab20c415abb34b705a708c6

    SHA1

    c917d6dd0319a6fff8fc1a6a2b14721d05ec3ddb

    SHA256

    f8261ca65937f9ff8c7e8de2ae52b22dcc51f70e34a74e41f4230067ce539258

    SHA512

    579abbc1415d1d299aec98f44371d3484f880fb2250726b5588cf987823adf0474f1da10d8f659905c5b299546a80baf389df0df260f325ff2ba7c7e295ab5ef

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4134.exe
    Filesize

    359KB

    MD5

    cec17e64c87aefbc788ee54b6cec2af9

    SHA1

    67f810d51731999dd778330be93227d641043456

    SHA256

    3227f18262008263b9f2f55ea38c41a8c904b6228877e50c693ae5af26c1f720

    SHA512

    3be362a670bd2b785123b0aba0e07ad312d9b75ca474f587f26a2b2760c6f6fe73f7c1e861e69f8933573a2e5b91cea14d5f1125d78a3cedde08129e9f6e00bb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4134.exe
    Filesize

    359KB

    MD5

    cec17e64c87aefbc788ee54b6cec2af9

    SHA1

    67f810d51731999dd778330be93227d641043456

    SHA256

    3227f18262008263b9f2f55ea38c41a8c904b6228877e50c693ae5af26c1f720

    SHA512

    3be362a670bd2b785123b0aba0e07ad312d9b75ca474f587f26a2b2760c6f6fe73f7c1e861e69f8933573a2e5b91cea14d5f1125d78a3cedde08129e9f6e00bb

  • memory/1524-1107-0x00000000004C0000-0x00000000004F2000-memory.dmp
    Filesize

    200KB

  • memory/1524-1108-0x0000000004D20000-0x0000000004D30000-memory.dmp
    Filesize

    64KB

  • memory/1524-1109-0x0000000004F00000-0x0000000004F4B000-memory.dmp
    Filesize

    300KB

  • memory/1524-1110-0x0000000004D20000-0x0000000004D30000-memory.dmp
    Filesize

    64KB

  • memory/2348-144-0x00000000023B0000-0x00000000023C2000-memory.dmp
    Filesize

    72KB

  • memory/2348-154-0x00000000023B0000-0x00000000023C2000-memory.dmp
    Filesize

    72KB

  • memory/2348-136-0x00000000023B0000-0x00000000023C2000-memory.dmp
    Filesize

    72KB

  • memory/2348-138-0x00000000023B0000-0x00000000023C2000-memory.dmp
    Filesize

    72KB

  • memory/2348-140-0x00000000023B0000-0x00000000023C2000-memory.dmp
    Filesize

    72KB

  • memory/2348-142-0x00000000023B0000-0x00000000023C2000-memory.dmp
    Filesize

    72KB

  • memory/2348-134-0x00000000023B0000-0x00000000023C8000-memory.dmp
    Filesize

    96KB

  • memory/2348-146-0x00000000023B0000-0x00000000023C2000-memory.dmp
    Filesize

    72KB

  • memory/2348-148-0x00000000023B0000-0x00000000023C2000-memory.dmp
    Filesize

    72KB

  • memory/2348-150-0x00000000023B0000-0x00000000023C2000-memory.dmp
    Filesize

    72KB

  • memory/2348-152-0x00000000023B0000-0x00000000023C2000-memory.dmp
    Filesize

    72KB

  • memory/2348-135-0x00000000023B0000-0x00000000023C2000-memory.dmp
    Filesize

    72KB

  • memory/2348-156-0x00000000023B0000-0x00000000023C2000-memory.dmp
    Filesize

    72KB

  • memory/2348-158-0x00000000023B0000-0x00000000023C2000-memory.dmp
    Filesize

    72KB

  • memory/2348-160-0x00000000023B0000-0x00000000023C2000-memory.dmp
    Filesize

    72KB

  • memory/2348-162-0x00000000023B0000-0x00000000023C2000-memory.dmp
    Filesize

    72KB

  • memory/2348-163-0x00000000006D0000-0x00000000006E0000-memory.dmp
    Filesize

    64KB

  • memory/2348-164-0x00000000006D0000-0x00000000006E0000-memory.dmp
    Filesize

    64KB

  • memory/2348-165-0x00000000006D0000-0x00000000006E0000-memory.dmp
    Filesize

    64KB

  • memory/2348-166-0x0000000000400000-0x00000000004B1000-memory.dmp
    Filesize

    708KB

  • memory/2348-168-0x0000000000400000-0x00000000004B1000-memory.dmp
    Filesize

    708KB

  • memory/2348-133-0x0000000004A90000-0x0000000004F8E000-memory.dmp
    Filesize

    5.0MB

  • memory/2348-132-0x0000000000960000-0x000000000097A000-memory.dmp
    Filesize

    104KB

  • memory/2348-131-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/3928-180-0x00000000065E0000-0x000000000661F000-memory.dmp
    Filesize

    252KB

  • memory/3928-236-0x0000000005FD0000-0x0000000005FE0000-memory.dmp
    Filesize

    64KB

  • memory/3928-178-0x00000000065E0000-0x000000000661F000-memory.dmp
    Filesize

    252KB

  • memory/3928-182-0x00000000065E0000-0x000000000661F000-memory.dmp
    Filesize

    252KB

  • memory/3928-184-0x00000000065E0000-0x000000000661F000-memory.dmp
    Filesize

    252KB

  • memory/3928-186-0x00000000065E0000-0x000000000661F000-memory.dmp
    Filesize

    252KB

  • memory/3928-188-0x00000000065E0000-0x000000000661F000-memory.dmp
    Filesize

    252KB

  • memory/3928-190-0x00000000065E0000-0x000000000661F000-memory.dmp
    Filesize

    252KB

  • memory/3928-192-0x00000000065E0000-0x000000000661F000-memory.dmp
    Filesize

    252KB

  • memory/3928-194-0x00000000065E0000-0x000000000661F000-memory.dmp
    Filesize

    252KB

  • memory/3928-196-0x00000000065E0000-0x000000000661F000-memory.dmp
    Filesize

    252KB

  • memory/3928-198-0x00000000065E0000-0x000000000661F000-memory.dmp
    Filesize

    252KB

  • memory/3928-200-0x00000000065E0000-0x000000000661F000-memory.dmp
    Filesize

    252KB

  • memory/3928-202-0x00000000065E0000-0x000000000661F000-memory.dmp
    Filesize

    252KB

  • memory/3928-204-0x00000000065E0000-0x000000000661F000-memory.dmp
    Filesize

    252KB

  • memory/3928-208-0x00000000065E0000-0x000000000661F000-memory.dmp
    Filesize

    252KB

  • memory/3928-206-0x00000000065E0000-0x000000000661F000-memory.dmp
    Filesize

    252KB

  • memory/3928-230-0x00000000034D0000-0x000000000351B000-memory.dmp
    Filesize

    300KB

  • memory/3928-232-0x0000000005FD0000-0x0000000005FE0000-memory.dmp
    Filesize

    64KB

  • memory/3928-176-0x00000000065E0000-0x000000000661F000-memory.dmp
    Filesize

    252KB

  • memory/3928-234-0x0000000005FD0000-0x0000000005FE0000-memory.dmp
    Filesize

    64KB

  • memory/3928-1085-0x0000000006760000-0x0000000006D66000-memory.dmp
    Filesize

    6.0MB

  • memory/3928-1086-0x0000000006DE0000-0x0000000006EEA000-memory.dmp
    Filesize

    1.0MB

  • memory/3928-1087-0x0000000006F20000-0x0000000006F32000-memory.dmp
    Filesize

    72KB

  • memory/3928-1088-0x0000000006F40000-0x0000000006F7E000-memory.dmp
    Filesize

    248KB

  • memory/3928-1089-0x0000000007090000-0x00000000070DB000-memory.dmp
    Filesize

    300KB

  • memory/3928-1090-0x0000000005FD0000-0x0000000005FE0000-memory.dmp
    Filesize

    64KB

  • memory/3928-1091-0x0000000007220000-0x0000000007286000-memory.dmp
    Filesize

    408KB

  • memory/3928-1092-0x00000000078E0000-0x0000000007972000-memory.dmp
    Filesize

    584KB

  • memory/3928-1094-0x0000000007980000-0x00000000079F6000-memory.dmp
    Filesize

    472KB

  • memory/3928-1095-0x0000000007A20000-0x0000000007A70000-memory.dmp
    Filesize

    320KB

  • memory/3928-1096-0x0000000007AA0000-0x0000000007C62000-memory.dmp
    Filesize

    1.8MB

  • memory/3928-1097-0x0000000007C90000-0x00000000081BC000-memory.dmp
    Filesize

    5.2MB

  • memory/3928-1098-0x0000000005FD0000-0x0000000005FE0000-memory.dmp
    Filesize

    64KB

  • memory/3928-175-0x00000000065E0000-0x000000000661F000-memory.dmp
    Filesize

    252KB

  • memory/3928-174-0x00000000065E0000-0x0000000006624000-memory.dmp
    Filesize

    272KB

  • memory/3928-173-0x00000000037C0000-0x0000000003806000-memory.dmp
    Filesize

    280KB

  • memory/3928-1100-0x0000000005FD0000-0x0000000005FE0000-memory.dmp
    Filesize

    64KB

  • memory/3928-1099-0x0000000005FD0000-0x0000000005FE0000-memory.dmp
    Filesize

    64KB

  • memory/3928-1101-0x0000000005FD0000-0x0000000005FE0000-memory.dmp
    Filesize

    64KB