Analysis

  • max time kernel
    71s
  • max time network
    144s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    31-03-2023 20:26

General

  • Target

    d504fe1e2853fb3790e9ed99cba525c5f567a06027e5fb0386bd94b58e2e5048.exe

  • Size

    672KB

  • MD5

    85bbef838d6e0f0b4c21c2f144cca3e8

  • SHA1

    fef069ffba6755d36ce77d1200d94db86038c9b3

  • SHA256

    d504fe1e2853fb3790e9ed99cba525c5f567a06027e5fb0386bd94b58e2e5048

  • SHA512

    0ddf88acdd846c542885ab27769dcec7ff16a3ef9e21d10bc100a1547e517efe8d802626ff448248961b40356fb569f6a2213a82ceb839f478b456544e0af981

  • SSDEEP

    12288:7MrOy90EUhe3zxlxwzc/GzphGWITHoqFKCFuA0qaZ9PJO0Lqy++9pkSa0YFP:NyrBOzGDH9NuA0qazhO0GyzPkSa0QP

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d504fe1e2853fb3790e9ed99cba525c5f567a06027e5fb0386bd94b58e2e5048.exe
    "C:\Users\Admin\AppData\Local\Temp\d504fe1e2853fb3790e9ed99cba525c5f567a06027e5fb0386bd94b58e2e5048.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3664
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un021025.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un021025.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3644
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0404.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0404.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3916
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4627.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4627.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3544
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si054423.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si054423.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4596

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si054423.exe
    Filesize

    175KB

    MD5

    2cc81e124c0c0d6ab233683f92dbfb92

    SHA1

    5b95ea2e69c597125f8106acc8156cef6d2316b7

    SHA256

    b7492daf3d4a017b470420b2761e5bc4d7dc289f7771959ac87a811f2620b1e9

    SHA512

    771eb8dc84c57ac19ccccc4d081caf01f770fa7f0ea8acc1535eac99282714528a5730bf3cc8acf9e220a81d36bc339ab3ef9c6df9c24ad43fc6d064c12f2e8b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si054423.exe
    Filesize

    175KB

    MD5

    2cc81e124c0c0d6ab233683f92dbfb92

    SHA1

    5b95ea2e69c597125f8106acc8156cef6d2316b7

    SHA256

    b7492daf3d4a017b470420b2761e5bc4d7dc289f7771959ac87a811f2620b1e9

    SHA512

    771eb8dc84c57ac19ccccc4d081caf01f770fa7f0ea8acc1535eac99282714528a5730bf3cc8acf9e220a81d36bc339ab3ef9c6df9c24ad43fc6d064c12f2e8b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un021025.exe
    Filesize

    530KB

    MD5

    ccca9788d4c91e50ef324dfa339c063f

    SHA1

    c8be7b3776353420df99fbffd318f6a541353a7e

    SHA256

    5ecb3c0a5bae8ab9c8efbffed657f7792ab56daf50d9e42cc9286d573923cb61

    SHA512

    3779123fa95dc0708edeaf157b9a5d31258b2309c661f8d5862fed0fbc9ecb4f9a13f7694af9b535fe3c5b784430a2f9074f11b54a7e0f0a99269c9067258cdb

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un021025.exe
    Filesize

    530KB

    MD5

    ccca9788d4c91e50ef324dfa339c063f

    SHA1

    c8be7b3776353420df99fbffd318f6a541353a7e

    SHA256

    5ecb3c0a5bae8ab9c8efbffed657f7792ab56daf50d9e42cc9286d573923cb61

    SHA512

    3779123fa95dc0708edeaf157b9a5d31258b2309c661f8d5862fed0fbc9ecb4f9a13f7694af9b535fe3c5b784430a2f9074f11b54a7e0f0a99269c9067258cdb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0404.exe
    Filesize

    260KB

    MD5

    505e7d8083ee3ba04df495ba7a0a55ac

    SHA1

    6094ead7e748323d9d20ec77947e15374944a199

    SHA256

    50add21cc26446ba3d592b654ec724c7d676adbc67fe606e9072fde97b76ea7c

    SHA512

    98b682527c0d63fd392ecd0e6756df7f338c5261a016b5b1a2158b2da467c922a60713eb59b5960ec20fd71031b5c17ce87aa0e098d43a3db93a5e90d468d72f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0404.exe
    Filesize

    260KB

    MD5

    505e7d8083ee3ba04df495ba7a0a55ac

    SHA1

    6094ead7e748323d9d20ec77947e15374944a199

    SHA256

    50add21cc26446ba3d592b654ec724c7d676adbc67fe606e9072fde97b76ea7c

    SHA512

    98b682527c0d63fd392ecd0e6756df7f338c5261a016b5b1a2158b2da467c922a60713eb59b5960ec20fd71031b5c17ce87aa0e098d43a3db93a5e90d468d72f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4627.exe
    Filesize

    359KB

    MD5

    211a08f2567877afcc5cd88108e148c9

    SHA1

    8515761cc0fa5296d5f2b309ce334344cb2b5d82

    SHA256

    23debfac5e49a42b7fc988a97af287f1401bf8b53fabb2b5573bd7232bbe45bf

    SHA512

    afd42e580e18d3bfe5d211e68958b551f0d24a6d7cdc187291ab50dd9a1b308187fb3a02da193452f1f64a97edf539f3f290c4b7d2d21159a72db03f0586a4d5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4627.exe
    Filesize

    359KB

    MD5

    211a08f2567877afcc5cd88108e148c9

    SHA1

    8515761cc0fa5296d5f2b309ce334344cb2b5d82

    SHA256

    23debfac5e49a42b7fc988a97af287f1401bf8b53fabb2b5573bd7232bbe45bf

    SHA512

    afd42e580e18d3bfe5d211e68958b551f0d24a6d7cdc187291ab50dd9a1b308187fb3a02da193452f1f64a97edf539f3f290c4b7d2d21159a72db03f0586a4d5

  • memory/3544-1091-0x00000000067D0000-0x00000000067E2000-memory.dmp
    Filesize

    72KB

  • memory/3544-1089-0x0000000006C50000-0x0000000007256000-memory.dmp
    Filesize

    6.0MB

  • memory/3544-196-0x0000000006600000-0x000000000663F000-memory.dmp
    Filesize

    252KB

  • memory/3544-1105-0x0000000007ED0000-0x00000000083FC000-memory.dmp
    Filesize

    5.2MB

  • memory/3544-1104-0x0000000007D00000-0x0000000007EC2000-memory.dmp
    Filesize

    1.8MB

  • memory/3544-198-0x0000000006600000-0x000000000663F000-memory.dmp
    Filesize

    252KB

  • memory/3544-1103-0x0000000007C90000-0x0000000007CE0000-memory.dmp
    Filesize

    320KB

  • memory/3544-1102-0x0000000007C00000-0x0000000007C76000-memory.dmp
    Filesize

    472KB

  • memory/3544-1101-0x0000000003A20000-0x0000000003A30000-memory.dmp
    Filesize

    64KB

  • memory/3544-200-0x0000000006600000-0x000000000663F000-memory.dmp
    Filesize

    252KB

  • memory/3544-1100-0x0000000003A20000-0x0000000003A30000-memory.dmp
    Filesize

    64KB

  • memory/3544-1099-0x0000000003A20000-0x0000000003A30000-memory.dmp
    Filesize

    64KB

  • memory/3544-1098-0x0000000003A20000-0x0000000003A30000-memory.dmp
    Filesize

    64KB

  • memory/3544-1097-0x00000000077A0000-0x0000000007832000-memory.dmp
    Filesize

    584KB

  • memory/3544-1096-0x0000000006AD0000-0x0000000006B36000-memory.dmp
    Filesize

    408KB

  • memory/3544-1093-0x0000000003A20000-0x0000000003A30000-memory.dmp
    Filesize

    64KB

  • memory/3544-1094-0x0000000006940000-0x000000000698B000-memory.dmp
    Filesize

    300KB

  • memory/3544-1092-0x00000000067F0000-0x000000000682E000-memory.dmp
    Filesize

    248KB

  • memory/3544-1090-0x0000000006690000-0x000000000679A000-memory.dmp
    Filesize

    1.0MB

  • memory/3544-210-0x0000000006600000-0x000000000663F000-memory.dmp
    Filesize

    252KB

  • memory/3544-218-0x0000000003A20000-0x0000000003A30000-memory.dmp
    Filesize

    64KB

  • memory/3544-216-0x0000000003A20000-0x0000000003A30000-memory.dmp
    Filesize

    64KB

  • memory/3544-214-0x0000000003A20000-0x0000000003A30000-memory.dmp
    Filesize

    64KB

  • memory/3544-177-0x00000000039B0000-0x00000000039F6000-memory.dmp
    Filesize

    280KB

  • memory/3544-178-0x0000000006600000-0x0000000006644000-memory.dmp
    Filesize

    272KB

  • memory/3544-180-0x0000000006600000-0x000000000663F000-memory.dmp
    Filesize

    252KB

  • memory/3544-179-0x0000000006600000-0x000000000663F000-memory.dmp
    Filesize

    252KB

  • memory/3544-182-0x0000000006600000-0x000000000663F000-memory.dmp
    Filesize

    252KB

  • memory/3544-184-0x0000000006600000-0x000000000663F000-memory.dmp
    Filesize

    252KB

  • memory/3544-186-0x0000000006600000-0x000000000663F000-memory.dmp
    Filesize

    252KB

  • memory/3544-188-0x0000000006600000-0x000000000663F000-memory.dmp
    Filesize

    252KB

  • memory/3544-190-0x0000000006600000-0x000000000663F000-memory.dmp
    Filesize

    252KB

  • memory/3544-192-0x0000000006600000-0x000000000663F000-memory.dmp
    Filesize

    252KB

  • memory/3544-194-0x0000000006600000-0x000000000663F000-memory.dmp
    Filesize

    252KB

  • memory/3544-212-0x0000000006600000-0x000000000663F000-memory.dmp
    Filesize

    252KB

  • memory/3544-213-0x0000000001BD0000-0x0000000001C1B000-memory.dmp
    Filesize

    300KB

  • memory/3544-208-0x0000000006600000-0x000000000663F000-memory.dmp
    Filesize

    252KB

  • memory/3544-202-0x0000000006600000-0x000000000663F000-memory.dmp
    Filesize

    252KB

  • memory/3544-204-0x0000000006600000-0x000000000663F000-memory.dmp
    Filesize

    252KB

  • memory/3544-206-0x0000000006600000-0x000000000663F000-memory.dmp
    Filesize

    252KB

  • memory/3916-169-0x0000000000400000-0x00000000004B1000-memory.dmp
    Filesize

    708KB

  • memory/3916-160-0x0000000002590000-0x00000000025A2000-memory.dmp
    Filesize

    72KB

  • memory/3916-140-0x0000000002590000-0x00000000025A2000-memory.dmp
    Filesize

    72KB

  • memory/3916-146-0x0000000002590000-0x00000000025A2000-memory.dmp
    Filesize

    72KB

  • memory/3916-137-0x0000000004B30000-0x000000000502E000-memory.dmp
    Filesize

    5.0MB

  • memory/3916-138-0x0000000002590000-0x00000000025A8000-memory.dmp
    Filesize

    96KB

  • memory/3916-172-0x0000000000400000-0x00000000004B1000-memory.dmp
    Filesize

    708KB

  • memory/3916-170-0x0000000004B20000-0x0000000004B30000-memory.dmp
    Filesize

    64KB

  • memory/3916-139-0x0000000002590000-0x00000000025A2000-memory.dmp
    Filesize

    72KB

  • memory/3916-136-0x0000000002250000-0x000000000226A000-memory.dmp
    Filesize

    104KB

  • memory/3916-168-0x0000000004B20000-0x0000000004B30000-memory.dmp
    Filesize

    64KB

  • memory/3916-167-0x0000000004B20000-0x0000000004B30000-memory.dmp
    Filesize

    64KB

  • memory/3916-166-0x0000000002590000-0x00000000025A2000-memory.dmp
    Filesize

    72KB

  • memory/3916-164-0x0000000002590000-0x00000000025A2000-memory.dmp
    Filesize

    72KB

  • memory/3916-162-0x0000000002590000-0x00000000025A2000-memory.dmp
    Filesize

    72KB

  • memory/3916-154-0x0000000002590000-0x00000000025A2000-memory.dmp
    Filesize

    72KB

  • memory/3916-158-0x0000000002590000-0x00000000025A2000-memory.dmp
    Filesize

    72KB

  • memory/3916-156-0x0000000002590000-0x00000000025A2000-memory.dmp
    Filesize

    72KB

  • memory/3916-152-0x0000000002590000-0x00000000025A2000-memory.dmp
    Filesize

    72KB

  • memory/3916-150-0x0000000002590000-0x00000000025A2000-memory.dmp
    Filesize

    72KB

  • memory/3916-148-0x0000000002590000-0x00000000025A2000-memory.dmp
    Filesize

    72KB

  • memory/3916-142-0x0000000002590000-0x00000000025A2000-memory.dmp
    Filesize

    72KB

  • memory/3916-144-0x0000000002590000-0x00000000025A2000-memory.dmp
    Filesize

    72KB

  • memory/3916-135-0x0000000004B20000-0x0000000004B30000-memory.dmp
    Filesize

    64KB

  • memory/3916-134-0x00000000004C0000-0x00000000004ED000-memory.dmp
    Filesize

    180KB

  • memory/4596-1111-0x0000000000C70000-0x0000000000CA2000-memory.dmp
    Filesize

    200KB

  • memory/4596-1112-0x00000000054F0000-0x000000000553B000-memory.dmp
    Filesize

    300KB

  • memory/4596-1113-0x0000000005560000-0x0000000005570000-memory.dmp
    Filesize

    64KB

  • memory/4596-1114-0x0000000005560000-0x0000000005570000-memory.dmp
    Filesize

    64KB