Analysis

  • max time kernel
    57s
  • max time network
    143s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    31-03-2023 19:53

General

  • Target

    9ea18bc3e4ff417d639996481dfdb435cbaecada26582bcb064a99cf5cee9fd8.exe

  • Size

    672KB

  • MD5

    16c507619dbdf237b60f2257412d02c3

  • SHA1

    e2a23df8139d0aa744fc548a963974c4096e85d4

  • SHA256

    9ea18bc3e4ff417d639996481dfdb435cbaecada26582bcb064a99cf5cee9fd8

  • SHA512

    d60adc53294edc6d3cce20329604b30236e2384eca11a4d21c648c2c8cde1c9fcbbd0c63a1a15b9c8ef47c147f05be139bbcbd458845e76ec037c4a0a3497713

  • SSDEEP

    12288:+MrUy90WhiMbsxFJ8WuifL/+0woBBosQOb8rym1epyPYzs:Oy3iMAbXtnrxbnsepy3

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9ea18bc3e4ff417d639996481dfdb435cbaecada26582bcb064a99cf5cee9fd8.exe
    "C:\Users\Admin\AppData\Local\Temp\9ea18bc3e4ff417d639996481dfdb435cbaecada26582bcb064a99cf5cee9fd8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4668
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un455193.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un455193.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4968
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2317.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2317.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2124
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8787.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8787.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1412
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si477100.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si477100.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4580

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si477100.exe
    Filesize

    175KB

    MD5

    96a0a0a068d686ec9621f3b0622f61cc

    SHA1

    01d7100238ca7db848e9c6f314409f7b0f8b8de8

    SHA256

    b4dec2d608708428a62d8da0af4534e32ab9c86f0639497a93a61a37d46fc5e2

    SHA512

    31130f95a4294623d04d8a107e54ef6ec9764e20ebef9adbbbde9dcf97e5b7d8075b9c6d3b713c44494f3d540ed497d710f8adaf6803cf2d4d5129c6d4933ea3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si477100.exe
    Filesize

    175KB

    MD5

    96a0a0a068d686ec9621f3b0622f61cc

    SHA1

    01d7100238ca7db848e9c6f314409f7b0f8b8de8

    SHA256

    b4dec2d608708428a62d8da0af4534e32ab9c86f0639497a93a61a37d46fc5e2

    SHA512

    31130f95a4294623d04d8a107e54ef6ec9764e20ebef9adbbbde9dcf97e5b7d8075b9c6d3b713c44494f3d540ed497d710f8adaf6803cf2d4d5129c6d4933ea3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un455193.exe
    Filesize

    530KB

    MD5

    b5bfd17bebcd1208571996a3013b219f

    SHA1

    587fccc81a59e4125f66d9ae7b779296e4e3a611

    SHA256

    684a02d030c597052792431b98492a87bbab617bdc0c46b6cce3cc16ff983ab8

    SHA512

    28077a1640c7832a726553758863572ec7c3782c234e719d75496adb328903e03437c5e801dde12d176fc89f8635b625dc8dcc08ac9ae9ce94e4595bc690b647

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un455193.exe
    Filesize

    530KB

    MD5

    b5bfd17bebcd1208571996a3013b219f

    SHA1

    587fccc81a59e4125f66d9ae7b779296e4e3a611

    SHA256

    684a02d030c597052792431b98492a87bbab617bdc0c46b6cce3cc16ff983ab8

    SHA512

    28077a1640c7832a726553758863572ec7c3782c234e719d75496adb328903e03437c5e801dde12d176fc89f8635b625dc8dcc08ac9ae9ce94e4595bc690b647

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2317.exe
    Filesize

    260KB

    MD5

    3207f1dc33437c112077489a1e1551c5

    SHA1

    cde0d8905fea98daa62f0cd1baceaf6695de5b3a

    SHA256

    b9957fd4d48c124ed15fff1024d46bed87c01654938fc5ed6afc5f7df0911b8b

    SHA512

    bb665385854b59f4d15080c7c937e2a0277ffbde7e7805b4f56478fa8a30ed817a1a6d1879ccdb041ca64cd065356b6e206a09b45fefe907e2c103ca9370df92

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2317.exe
    Filesize

    260KB

    MD5

    3207f1dc33437c112077489a1e1551c5

    SHA1

    cde0d8905fea98daa62f0cd1baceaf6695de5b3a

    SHA256

    b9957fd4d48c124ed15fff1024d46bed87c01654938fc5ed6afc5f7df0911b8b

    SHA512

    bb665385854b59f4d15080c7c937e2a0277ffbde7e7805b4f56478fa8a30ed817a1a6d1879ccdb041ca64cd065356b6e206a09b45fefe907e2c103ca9370df92

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8787.exe
    Filesize

    318KB

    MD5

    87ddc80b1dafcf584d607a4f520a34c5

    SHA1

    2911b2065bd271b3569fd132078020d288841889

    SHA256

    4a936972aae17290e713d786dcc13dc2f293724167d30eb18c3975683b4987cb

    SHA512

    1cee5203538bf1366f25e12d80201e473af981e4faa60f74d05eda464afcf79c0bdadea4a027822e42a9cc41f5ece9bec56d71d40d77974ca4df765bbf6da362

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8787.exe
    Filesize

    318KB

    MD5

    87ddc80b1dafcf584d607a4f520a34c5

    SHA1

    2911b2065bd271b3569fd132078020d288841889

    SHA256

    4a936972aae17290e713d786dcc13dc2f293724167d30eb18c3975683b4987cb

    SHA512

    1cee5203538bf1366f25e12d80201e473af981e4faa60f74d05eda464afcf79c0bdadea4a027822e42a9cc41f5ece9bec56d71d40d77974ca4df765bbf6da362

  • memory/1412-1088-0x0000000004A70000-0x0000000004A80000-memory.dmp
    Filesize

    64KB

  • memory/1412-1089-0x0000000005900000-0x000000000593E000-memory.dmp
    Filesize

    248KB

  • memory/1412-1101-0x0000000009390000-0x00000000093E0000-memory.dmp
    Filesize

    320KB

  • memory/1412-1100-0x0000000009310000-0x0000000009386000-memory.dmp
    Filesize

    472KB

  • memory/1412-1099-0x0000000008D20000-0x000000000924C000-memory.dmp
    Filesize

    5.2MB

  • memory/1412-1098-0x0000000008B50000-0x0000000008D12000-memory.dmp
    Filesize

    1.8MB

  • memory/1412-1097-0x0000000004A70000-0x0000000004A80000-memory.dmp
    Filesize

    64KB

  • memory/1412-1096-0x0000000004A70000-0x0000000004A80000-memory.dmp
    Filesize

    64KB

  • memory/1412-1095-0x0000000004A70000-0x0000000004A80000-memory.dmp
    Filesize

    64KB

  • memory/1412-1094-0x0000000004A70000-0x0000000004A80000-memory.dmp
    Filesize

    64KB

  • memory/1412-1092-0x00000000062A0000-0x0000000006332000-memory.dmp
    Filesize

    584KB

  • memory/1412-1091-0x0000000005BE0000-0x0000000005C46000-memory.dmp
    Filesize

    408KB

  • memory/1412-1090-0x0000000005A90000-0x0000000005ADB000-memory.dmp
    Filesize

    300KB

  • memory/1412-192-0x00000000024D0000-0x000000000250F000-memory.dmp
    Filesize

    252KB

  • memory/1412-1087-0x00000000058E0000-0x00000000058F2000-memory.dmp
    Filesize

    72KB

  • memory/1412-1086-0x00000000057A0000-0x00000000058AA000-memory.dmp
    Filesize

    1.0MB

  • memory/1412-1085-0x0000000005180000-0x0000000005786000-memory.dmp
    Filesize

    6.0MB

  • memory/1412-436-0x0000000004A70000-0x0000000004A80000-memory.dmp
    Filesize

    64KB

  • memory/1412-434-0x0000000004A70000-0x0000000004A80000-memory.dmp
    Filesize

    64KB

  • memory/1412-430-0x0000000000590000-0x00000000005DB000-memory.dmp
    Filesize

    300KB

  • memory/1412-432-0x0000000004A70000-0x0000000004A80000-memory.dmp
    Filesize

    64KB

  • memory/1412-208-0x00000000024D0000-0x000000000250F000-memory.dmp
    Filesize

    252KB

  • memory/1412-173-0x0000000000770000-0x00000000007B6000-memory.dmp
    Filesize

    280KB

  • memory/1412-174-0x00000000024D0000-0x0000000002514000-memory.dmp
    Filesize

    272KB

  • memory/1412-194-0x00000000024D0000-0x000000000250F000-memory.dmp
    Filesize

    252KB

  • memory/1412-178-0x00000000024D0000-0x000000000250F000-memory.dmp
    Filesize

    252KB

  • memory/1412-176-0x00000000024D0000-0x000000000250F000-memory.dmp
    Filesize

    252KB

  • memory/1412-180-0x00000000024D0000-0x000000000250F000-memory.dmp
    Filesize

    252KB

  • memory/1412-182-0x00000000024D0000-0x000000000250F000-memory.dmp
    Filesize

    252KB

  • memory/1412-184-0x00000000024D0000-0x000000000250F000-memory.dmp
    Filesize

    252KB

  • memory/1412-186-0x00000000024D0000-0x000000000250F000-memory.dmp
    Filesize

    252KB

  • memory/1412-188-0x00000000024D0000-0x000000000250F000-memory.dmp
    Filesize

    252KB

  • memory/1412-206-0x00000000024D0000-0x000000000250F000-memory.dmp
    Filesize

    252KB

  • memory/1412-190-0x00000000024D0000-0x000000000250F000-memory.dmp
    Filesize

    252KB

  • memory/1412-175-0x00000000024D0000-0x000000000250F000-memory.dmp
    Filesize

    252KB

  • memory/1412-196-0x00000000024D0000-0x000000000250F000-memory.dmp
    Filesize

    252KB

  • memory/1412-198-0x00000000024D0000-0x000000000250F000-memory.dmp
    Filesize

    252KB

  • memory/1412-200-0x00000000024D0000-0x000000000250F000-memory.dmp
    Filesize

    252KB

  • memory/1412-202-0x00000000024D0000-0x000000000250F000-memory.dmp
    Filesize

    252KB

  • memory/1412-204-0x00000000024D0000-0x000000000250F000-memory.dmp
    Filesize

    252KB

  • memory/2124-168-0x0000000000400000-0x00000000004B1000-memory.dmp
    Filesize

    708KB

  • memory/2124-140-0x00000000022A0000-0x00000000022B2000-memory.dmp
    Filesize

    72KB

  • memory/2124-135-0x0000000004A10000-0x0000000004F0E000-memory.dmp
    Filesize

    5.0MB

  • memory/2124-150-0x00000000022A0000-0x00000000022B2000-memory.dmp
    Filesize

    72KB

  • memory/2124-166-0x0000000002250000-0x0000000002260000-memory.dmp
    Filesize

    64KB

  • memory/2124-165-0x0000000000400000-0x00000000004B1000-memory.dmp
    Filesize

    708KB

  • memory/2124-164-0x00000000022A0000-0x00000000022B2000-memory.dmp
    Filesize

    72KB

  • memory/2124-160-0x00000000022A0000-0x00000000022B2000-memory.dmp
    Filesize

    72KB

  • memory/2124-162-0x00000000022A0000-0x00000000022B2000-memory.dmp
    Filesize

    72KB

  • memory/2124-133-0x0000000002250000-0x0000000002260000-memory.dmp
    Filesize

    64KB

  • memory/2124-148-0x00000000022A0000-0x00000000022B2000-memory.dmp
    Filesize

    72KB

  • memory/2124-156-0x00000000022A0000-0x00000000022B2000-memory.dmp
    Filesize

    72KB

  • memory/2124-154-0x00000000022A0000-0x00000000022B2000-memory.dmp
    Filesize

    72KB

  • memory/2124-134-0x0000000002250000-0x0000000002260000-memory.dmp
    Filesize

    64KB

  • memory/2124-142-0x00000000022A0000-0x00000000022B2000-memory.dmp
    Filesize

    72KB

  • memory/2124-136-0x00000000022A0000-0x00000000022B8000-memory.dmp
    Filesize

    96KB

  • memory/2124-146-0x00000000022A0000-0x00000000022B2000-memory.dmp
    Filesize

    72KB

  • memory/2124-144-0x00000000022A0000-0x00000000022B2000-memory.dmp
    Filesize

    72KB

  • memory/2124-158-0x00000000022A0000-0x00000000022B2000-memory.dmp
    Filesize

    72KB

  • memory/2124-152-0x00000000022A0000-0x00000000022B2000-memory.dmp
    Filesize

    72KB

  • memory/2124-138-0x00000000022A0000-0x00000000022B2000-memory.dmp
    Filesize

    72KB

  • memory/2124-137-0x00000000022A0000-0x00000000022B2000-memory.dmp
    Filesize

    72KB

  • memory/2124-132-0x0000000000590000-0x00000000005BD000-memory.dmp
    Filesize

    180KB

  • memory/2124-131-0x00000000021A0000-0x00000000021BA000-memory.dmp
    Filesize

    104KB

  • memory/4580-1107-0x0000000000190000-0x00000000001C2000-memory.dmp
    Filesize

    200KB

  • memory/4580-1108-0x0000000004BD0000-0x0000000004C1B000-memory.dmp
    Filesize

    300KB

  • memory/4580-1109-0x0000000004D30000-0x0000000004D40000-memory.dmp
    Filesize

    64KB

  • memory/4580-1110-0x0000000004D30000-0x0000000004D40000-memory.dmp
    Filesize

    64KB