Analysis

  • max time kernel
    53s
  • max time network
    63s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    31-03-2023 19:35

General

  • Target

    f05e444e0eff783f000ebd86dd38c618e2e371b2e859524f7547f0373d3f4864.exe

  • Size

    672KB

  • MD5

    d17b34f8a5070d52e648368758bea7e3

  • SHA1

    c24e65a8aaf30dd17f1026ed82489af7b0674d8d

  • SHA256

    f05e444e0eff783f000ebd86dd38c618e2e371b2e859524f7547f0373d3f4864

  • SHA512

    cb99c24ea1664f16dd7123f789d498102a0306bf8f17e4045e627a479e88dd68ac0da39a6b81f16b07080f7a35572d7eede511d3bc2c96fddd892abd7acc0b06

  • SSDEEP

    12288:9Mroy90wDp6Q/dfTSP0DQa5c7HDb8ObYrQmK9P:9ynoA20DpW7jPbtf9P

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f05e444e0eff783f000ebd86dd38c618e2e371b2e859524f7547f0373d3f4864.exe
    "C:\Users\Admin\AppData\Local\Temp\f05e444e0eff783f000ebd86dd38c618e2e371b2e859524f7547f0373d3f4864.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1012
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un983286.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un983286.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2592
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0500.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0500.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2688
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5708.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5708.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4748
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si157850.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si157850.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4428

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si157850.exe
    Filesize

    175KB

    MD5

    7a292785a4f863b007487231fa112a57

    SHA1

    e1e60c4891300c1bad4d1a7b9dddd9326350af4d

    SHA256

    76a33c06d6159e991f908645ad6babea4aec9e07e78e79b490b2267ee4051f57

    SHA512

    0cd31d0bef0b5eeb44162232541491c05e1f88882a6b7ce1627abe4ff060cf6b0828905bbb509b152a6e39d6a124bee9d4183697f156f58d4b3608aab9867580

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si157850.exe
    Filesize

    175KB

    MD5

    7a292785a4f863b007487231fa112a57

    SHA1

    e1e60c4891300c1bad4d1a7b9dddd9326350af4d

    SHA256

    76a33c06d6159e991f908645ad6babea4aec9e07e78e79b490b2267ee4051f57

    SHA512

    0cd31d0bef0b5eeb44162232541491c05e1f88882a6b7ce1627abe4ff060cf6b0828905bbb509b152a6e39d6a124bee9d4183697f156f58d4b3608aab9867580

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un983286.exe
    Filesize

    530KB

    MD5

    3c073e3885512c4360b2a7904590255c

    SHA1

    596bde5b3febe186e375b352b3c4a0e34ec6b069

    SHA256

    ffb16aff9235f1d2e89c0a3fba4a690959780f3ecd5f1de05438532cc9ee1203

    SHA512

    d8bcd9aab1d6d7c38cb3076bb22fb783a8f1b4558e647ca7c699b9802dde8e7f73ea8bb9bd124e41b33446d81f8657f6f4effa2e0f65d4c7cdd569477e1522a1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un983286.exe
    Filesize

    530KB

    MD5

    3c073e3885512c4360b2a7904590255c

    SHA1

    596bde5b3febe186e375b352b3c4a0e34ec6b069

    SHA256

    ffb16aff9235f1d2e89c0a3fba4a690959780f3ecd5f1de05438532cc9ee1203

    SHA512

    d8bcd9aab1d6d7c38cb3076bb22fb783a8f1b4558e647ca7c699b9802dde8e7f73ea8bb9bd124e41b33446d81f8657f6f4effa2e0f65d4c7cdd569477e1522a1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0500.exe
    Filesize

    260KB

    MD5

    43761dfaa59243d4a099572d4cda729e

    SHA1

    99fbda6cfd23c9aea725c68c0360d90106ad0c82

    SHA256

    5e31128adacb17df3dc56607effbaf0352323f22b8051712baa7e52690e9ce1a

    SHA512

    5bdef139784e819ab041fa210e60b61fe6ffcc2760837c66ee02bf9152565f0b131bbc54ce22c2e41abc972580f59f779d5b41d709ea4da55c55055d4c218035

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0500.exe
    Filesize

    260KB

    MD5

    43761dfaa59243d4a099572d4cda729e

    SHA1

    99fbda6cfd23c9aea725c68c0360d90106ad0c82

    SHA256

    5e31128adacb17df3dc56607effbaf0352323f22b8051712baa7e52690e9ce1a

    SHA512

    5bdef139784e819ab041fa210e60b61fe6ffcc2760837c66ee02bf9152565f0b131bbc54ce22c2e41abc972580f59f779d5b41d709ea4da55c55055d4c218035

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5708.exe
    Filesize

    318KB

    MD5

    5df68a210512ce4239133934c3b47a88

    SHA1

    366e14b317db1ddd62f803efadb6120927bfe437

    SHA256

    8e0b99d2297cdd4cedf0e11a00bd41f782c95e098f6de9cdda3dd6c7e9a4b6da

    SHA512

    59bfd266b8c79743ac5cd2fd98c31698a41b91ae18db2094c6ba1ff5a9fbeebdd36290e41a2933cb4d92acc201f55d1806904e050a1485f22df09e04d36ff2dc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5708.exe
    Filesize

    318KB

    MD5

    5df68a210512ce4239133934c3b47a88

    SHA1

    366e14b317db1ddd62f803efadb6120927bfe437

    SHA256

    8e0b99d2297cdd4cedf0e11a00bd41f782c95e098f6de9cdda3dd6c7e9a4b6da

    SHA512

    59bfd266b8c79743ac5cd2fd98c31698a41b91ae18db2094c6ba1ff5a9fbeebdd36290e41a2933cb4d92acc201f55d1806904e050a1485f22df09e04d36ff2dc

  • memory/2688-149-0x0000000004AA0000-0x0000000004AB0000-memory.dmp
    Filesize

    64KB

  • memory/2688-158-0x0000000002500000-0x0000000002512000-memory.dmp
    Filesize

    72KB

  • memory/2688-138-0x0000000002500000-0x0000000002518000-memory.dmp
    Filesize

    96KB

  • memory/2688-139-0x0000000002500000-0x0000000002512000-memory.dmp
    Filesize

    72KB

  • memory/2688-140-0x0000000002500000-0x0000000002512000-memory.dmp
    Filesize

    72KB

  • memory/2688-143-0x0000000002500000-0x0000000002512000-memory.dmp
    Filesize

    72KB

  • memory/2688-142-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/2688-146-0x0000000002500000-0x0000000002512000-memory.dmp
    Filesize

    72KB

  • memory/2688-147-0x0000000004AA0000-0x0000000004AB0000-memory.dmp
    Filesize

    64KB

  • memory/2688-150-0x0000000002500000-0x0000000002512000-memory.dmp
    Filesize

    72KB

  • memory/2688-136-0x0000000002080000-0x000000000209A000-memory.dmp
    Filesize

    104KB

  • memory/2688-145-0x0000000004AA0000-0x0000000004AB0000-memory.dmp
    Filesize

    64KB

  • memory/2688-152-0x0000000002500000-0x0000000002512000-memory.dmp
    Filesize

    72KB

  • memory/2688-154-0x0000000002500000-0x0000000002512000-memory.dmp
    Filesize

    72KB

  • memory/2688-156-0x0000000002500000-0x0000000002512000-memory.dmp
    Filesize

    72KB

  • memory/2688-137-0x0000000004AB0000-0x0000000004FAE000-memory.dmp
    Filesize

    5.0MB

  • memory/2688-160-0x0000000002500000-0x0000000002512000-memory.dmp
    Filesize

    72KB

  • memory/2688-162-0x0000000002500000-0x0000000002512000-memory.dmp
    Filesize

    72KB

  • memory/2688-164-0x0000000002500000-0x0000000002512000-memory.dmp
    Filesize

    72KB

  • memory/2688-166-0x0000000002500000-0x0000000002512000-memory.dmp
    Filesize

    72KB

  • memory/2688-168-0x0000000002500000-0x0000000002512000-memory.dmp
    Filesize

    72KB

  • memory/2688-170-0x0000000002500000-0x0000000002512000-memory.dmp
    Filesize

    72KB

  • memory/2688-171-0x0000000000400000-0x00000000004B1000-memory.dmp
    Filesize

    708KB

  • memory/2688-172-0x0000000004AA0000-0x0000000004AB0000-memory.dmp
    Filesize

    64KB

  • memory/2688-173-0x0000000004AA0000-0x0000000004AB0000-memory.dmp
    Filesize

    64KB

  • memory/2688-174-0x0000000004AA0000-0x0000000004AB0000-memory.dmp
    Filesize

    64KB

  • memory/2688-176-0x0000000000400000-0x00000000004B1000-memory.dmp
    Filesize

    708KB

  • memory/4428-1115-0x0000000000F30000-0x0000000000F62000-memory.dmp
    Filesize

    200KB

  • memory/4428-1118-0x0000000005850000-0x0000000005860000-memory.dmp
    Filesize

    64KB

  • memory/4428-1117-0x0000000005850000-0x0000000005860000-memory.dmp
    Filesize

    64KB

  • memory/4428-1116-0x0000000005970000-0x00000000059BB000-memory.dmp
    Filesize

    300KB

  • memory/4748-183-0x0000000004960000-0x000000000499F000-memory.dmp
    Filesize

    252KB

  • memory/4748-404-0x0000000004A30000-0x0000000004A40000-memory.dmp
    Filesize

    64KB

  • memory/4748-188-0x0000000004960000-0x000000000499F000-memory.dmp
    Filesize

    252KB

  • memory/4748-190-0x0000000004960000-0x000000000499F000-memory.dmp
    Filesize

    252KB

  • memory/4748-194-0x0000000004960000-0x000000000499F000-memory.dmp
    Filesize

    252KB

  • memory/4748-192-0x0000000004960000-0x000000000499F000-memory.dmp
    Filesize

    252KB

  • memory/4748-196-0x0000000004960000-0x000000000499F000-memory.dmp
    Filesize

    252KB

  • memory/4748-200-0x0000000004960000-0x000000000499F000-memory.dmp
    Filesize

    252KB

  • memory/4748-198-0x0000000004960000-0x000000000499F000-memory.dmp
    Filesize

    252KB

  • memory/4748-202-0x0000000004960000-0x000000000499F000-memory.dmp
    Filesize

    252KB

  • memory/4748-204-0x0000000004960000-0x000000000499F000-memory.dmp
    Filesize

    252KB

  • memory/4748-206-0x0000000004960000-0x000000000499F000-memory.dmp
    Filesize

    252KB

  • memory/4748-208-0x0000000004960000-0x000000000499F000-memory.dmp
    Filesize

    252KB

  • memory/4748-214-0x0000000004960000-0x000000000499F000-memory.dmp
    Filesize

    252KB

  • memory/4748-216-0x0000000004960000-0x000000000499F000-memory.dmp
    Filesize

    252KB

  • memory/4748-212-0x0000000004960000-0x000000000499F000-memory.dmp
    Filesize

    252KB

  • memory/4748-210-0x0000000004960000-0x000000000499F000-memory.dmp
    Filesize

    252KB

  • memory/4748-400-0x00000000004C0000-0x000000000050B000-memory.dmp
    Filesize

    300KB

  • memory/4748-401-0x0000000004A30000-0x0000000004A40000-memory.dmp
    Filesize

    64KB

  • memory/4748-186-0x0000000004960000-0x000000000499F000-memory.dmp
    Filesize

    252KB

  • memory/4748-406-0x0000000004A30000-0x0000000004A40000-memory.dmp
    Filesize

    64KB

  • memory/4748-1093-0x0000000005650000-0x0000000005C56000-memory.dmp
    Filesize

    6.0MB

  • memory/4748-1094-0x0000000005050000-0x000000000515A000-memory.dmp
    Filesize

    1.0MB

  • memory/4748-1095-0x0000000005190000-0x00000000051A2000-memory.dmp
    Filesize

    72KB

  • memory/4748-1096-0x00000000051B0000-0x00000000051EE000-memory.dmp
    Filesize

    248KB

  • memory/4748-1097-0x0000000005300000-0x000000000534B000-memory.dmp
    Filesize

    300KB

  • memory/4748-1098-0x0000000004A30000-0x0000000004A40000-memory.dmp
    Filesize

    64KB

  • memory/4748-1100-0x0000000005490000-0x0000000005522000-memory.dmp
    Filesize

    584KB

  • memory/4748-1101-0x0000000005530000-0x0000000005596000-memory.dmp
    Filesize

    408KB

  • memory/4748-1102-0x0000000004A30000-0x0000000004A40000-memory.dmp
    Filesize

    64KB

  • memory/4748-1103-0x0000000004A30000-0x0000000004A40000-memory.dmp
    Filesize

    64KB

  • memory/4748-1104-0x0000000004A30000-0x0000000004A40000-memory.dmp
    Filesize

    64KB

  • memory/4748-1105-0x00000000088D0000-0x0000000008A92000-memory.dmp
    Filesize

    1.8MB

  • memory/4748-1106-0x0000000008AA0000-0x0000000008FCC000-memory.dmp
    Filesize

    5.2MB

  • memory/4748-184-0x0000000004960000-0x000000000499F000-memory.dmp
    Filesize

    252KB

  • memory/4748-182-0x0000000004960000-0x00000000049A4000-memory.dmp
    Filesize

    272KB

  • memory/4748-181-0x0000000002320000-0x0000000002366000-memory.dmp
    Filesize

    280KB

  • memory/4748-1107-0x00000000091B0000-0x0000000009226000-memory.dmp
    Filesize

    472KB

  • memory/4748-1108-0x0000000009230000-0x0000000009280000-memory.dmp
    Filesize

    320KB

  • memory/4748-1109-0x0000000004A30000-0x0000000004A40000-memory.dmp
    Filesize

    64KB