Analysis

  • max time kernel
    51s
  • max time network
    53s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    31-03-2023 20:01

General

  • Target

    9e6777eaf05bed7ac73104f533db78629434064eaed33558f6ac42d0be623d49.exe

  • Size

    673KB

  • MD5

    74c5f5008b880ee81954365795082dcd

  • SHA1

    819f511278c489eed49ffe379d83e529001bdc8c

  • SHA256

    9e6777eaf05bed7ac73104f533db78629434064eaed33558f6ac42d0be623d49

  • SHA512

    e00a4c3150ba8ce6896f04ffceb8c8a3d4c68e052a21f4213a2f89d71354682ba20a58120579756f74c4c06b4df76c58a0c17a476f99c63b8c16d96a3c56f446

  • SSDEEP

    12288:3MrCy90ERdCTqBps3D4DnsXtITHozFKCXu9Ha5NfBRVJR30Obcr4mLtYQmFdc:hyzlk3UnsXeHQ/uta5lBRVJR7b5utlmg

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e6777eaf05bed7ac73104f533db78629434064eaed33558f6ac42d0be623d49.exe
    "C:\Users\Admin\AppData\Local\Temp\9e6777eaf05bed7ac73104f533db78629434064eaed33558f6ac42d0be623d49.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3244
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un910039.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un910039.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3388
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2642.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2642.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3324
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1923.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1923.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4104
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si815897.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si815897.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3860

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si815897.exe
    Filesize

    175KB

    MD5

    65cceed8c5d0d439c78e2286dc558769

    SHA1

    64ab3124cf5dcea557a8f9d395a41c57dd6da1f9

    SHA256

    e66c4cdcb09f6c233b0092e1437a30800c31218286ed3fba76029391e70eb4d3

    SHA512

    5f033404f2b25c709bc78954363837c7c8b47e96c89774cb7669a5b5ec54fc5992d894234278e64f5fac37c1b86f3577961fa1d583d44bf47688165edc0c0da8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si815897.exe
    Filesize

    175KB

    MD5

    65cceed8c5d0d439c78e2286dc558769

    SHA1

    64ab3124cf5dcea557a8f9d395a41c57dd6da1f9

    SHA256

    e66c4cdcb09f6c233b0092e1437a30800c31218286ed3fba76029391e70eb4d3

    SHA512

    5f033404f2b25c709bc78954363837c7c8b47e96c89774cb7669a5b5ec54fc5992d894234278e64f5fac37c1b86f3577961fa1d583d44bf47688165edc0c0da8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un910039.exe
    Filesize

    531KB

    MD5

    ba12d46cfa4fc4ce51e0508aad916d14

    SHA1

    95262d3a68a3a683e2f51521a7e613e63d76e1fd

    SHA256

    b0eee4118a1783d3cf4d544f275a442114271b1552d93b598b9749a48cb3d152

    SHA512

    28fddf791872ed90fe58abc8e8ad1d75db9a8092edb562f975be8a38de28e85573aa3353d6c64c50256fd0c42c0f05b4c4e35016b49e8dbd47523176ec1719ba

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un910039.exe
    Filesize

    531KB

    MD5

    ba12d46cfa4fc4ce51e0508aad916d14

    SHA1

    95262d3a68a3a683e2f51521a7e613e63d76e1fd

    SHA256

    b0eee4118a1783d3cf4d544f275a442114271b1552d93b598b9749a48cb3d152

    SHA512

    28fddf791872ed90fe58abc8e8ad1d75db9a8092edb562f975be8a38de28e85573aa3353d6c64c50256fd0c42c0f05b4c4e35016b49e8dbd47523176ec1719ba

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2642.exe
    Filesize

    260KB

    MD5

    72a204e58ebc39c8eb4160c75c88102e

    SHA1

    2f3820abe28c71b875d07e9ea682144c035306bc

    SHA256

    199a8172865bb5b784db064c7d3226fef0ad3771a8613c591c272aff2fac0719

    SHA512

    fb18bdbf1ff080787b1d2e0b074b14f45a661b2a52e92a175f085bb0debcce12e1da93266316efcf8165ea387f0c4e707d4ea9bf85b767466ca1aa9dda666566

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2642.exe
    Filesize

    260KB

    MD5

    72a204e58ebc39c8eb4160c75c88102e

    SHA1

    2f3820abe28c71b875d07e9ea682144c035306bc

    SHA256

    199a8172865bb5b784db064c7d3226fef0ad3771a8613c591c272aff2fac0719

    SHA512

    fb18bdbf1ff080787b1d2e0b074b14f45a661b2a52e92a175f085bb0debcce12e1da93266316efcf8165ea387f0c4e707d4ea9bf85b767466ca1aa9dda666566

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1923.exe
    Filesize

    318KB

    MD5

    6bbd836dd179890e074464aa881f5bc1

    SHA1

    cc55d3a6942b6f0fe5292b8a11d12a4219e9a9d0

    SHA256

    e2daca44ce104beee46810677f49941ba049776c2760a3b388382457e3899e13

    SHA512

    80db8481ebace67bfba42dee550be53988bece0d3b4acb3eb89e8ba80c3cc2f0c6655cf97bb34919adffcbe510445050221b30aeaaaf03a297dee273df43aaa2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1923.exe
    Filesize

    318KB

    MD5

    6bbd836dd179890e074464aa881f5bc1

    SHA1

    cc55d3a6942b6f0fe5292b8a11d12a4219e9a9d0

    SHA256

    e2daca44ce104beee46810677f49941ba049776c2760a3b388382457e3899e13

    SHA512

    80db8481ebace67bfba42dee550be53988bece0d3b4acb3eb89e8ba80c3cc2f0c6655cf97bb34919adffcbe510445050221b30aeaaaf03a297dee273df43aaa2

  • memory/3324-136-0x00000000005E0000-0x000000000060D000-memory.dmp
    Filesize

    180KB

  • memory/3324-137-0x0000000002130000-0x000000000214A000-memory.dmp
    Filesize

    104KB

  • memory/3324-138-0x0000000004CC0000-0x0000000004CD0000-memory.dmp
    Filesize

    64KB

  • memory/3324-139-0x0000000004CC0000-0x0000000004CD0000-memory.dmp
    Filesize

    64KB

  • memory/3324-140-0x0000000004CC0000-0x0000000004CD0000-memory.dmp
    Filesize

    64KB

  • memory/3324-141-0x0000000004CD0000-0x00000000051CE000-memory.dmp
    Filesize

    5.0MB

  • memory/3324-142-0x00000000025B0000-0x00000000025C8000-memory.dmp
    Filesize

    96KB

  • memory/3324-143-0x00000000025B0000-0x00000000025C2000-memory.dmp
    Filesize

    72KB

  • memory/3324-144-0x00000000025B0000-0x00000000025C2000-memory.dmp
    Filesize

    72KB

  • memory/3324-146-0x00000000025B0000-0x00000000025C2000-memory.dmp
    Filesize

    72KB

  • memory/3324-148-0x00000000025B0000-0x00000000025C2000-memory.dmp
    Filesize

    72KB

  • memory/3324-150-0x00000000025B0000-0x00000000025C2000-memory.dmp
    Filesize

    72KB

  • memory/3324-154-0x00000000025B0000-0x00000000025C2000-memory.dmp
    Filesize

    72KB

  • memory/3324-152-0x00000000025B0000-0x00000000025C2000-memory.dmp
    Filesize

    72KB

  • memory/3324-156-0x00000000025B0000-0x00000000025C2000-memory.dmp
    Filesize

    72KB

  • memory/3324-158-0x00000000025B0000-0x00000000025C2000-memory.dmp
    Filesize

    72KB

  • memory/3324-170-0x00000000025B0000-0x00000000025C2000-memory.dmp
    Filesize

    72KB

  • memory/3324-168-0x00000000025B0000-0x00000000025C2000-memory.dmp
    Filesize

    72KB

  • memory/3324-166-0x00000000025B0000-0x00000000025C2000-memory.dmp
    Filesize

    72KB

  • memory/3324-164-0x00000000025B0000-0x00000000025C2000-memory.dmp
    Filesize

    72KB

  • memory/3324-162-0x00000000025B0000-0x00000000025C2000-memory.dmp
    Filesize

    72KB

  • memory/3324-160-0x00000000025B0000-0x00000000025C2000-memory.dmp
    Filesize

    72KB

  • memory/3324-171-0x0000000000400000-0x00000000004B1000-memory.dmp
    Filesize

    708KB

  • memory/3324-173-0x0000000000400000-0x00000000004B1000-memory.dmp
    Filesize

    708KB

  • memory/3860-1112-0x00000000001D0000-0x0000000000202000-memory.dmp
    Filesize

    200KB

  • memory/3860-1114-0x0000000004D50000-0x0000000004D60000-memory.dmp
    Filesize

    64KB

  • memory/3860-1113-0x0000000004C10000-0x0000000004C5B000-memory.dmp
    Filesize

    300KB

  • memory/4104-181-0x0000000002560000-0x000000000259F000-memory.dmp
    Filesize

    252KB

  • memory/4104-259-0x0000000004B90000-0x0000000004BA0000-memory.dmp
    Filesize

    64KB

  • memory/4104-183-0x0000000002560000-0x000000000259F000-memory.dmp
    Filesize

    252KB

  • memory/4104-185-0x0000000002560000-0x000000000259F000-memory.dmp
    Filesize

    252KB

  • memory/4104-187-0x0000000002560000-0x000000000259F000-memory.dmp
    Filesize

    252KB

  • memory/4104-189-0x0000000002560000-0x000000000259F000-memory.dmp
    Filesize

    252KB

  • memory/4104-191-0x0000000002560000-0x000000000259F000-memory.dmp
    Filesize

    252KB

  • memory/4104-193-0x0000000002560000-0x000000000259F000-memory.dmp
    Filesize

    252KB

  • memory/4104-195-0x0000000002560000-0x000000000259F000-memory.dmp
    Filesize

    252KB

  • memory/4104-197-0x0000000002560000-0x000000000259F000-memory.dmp
    Filesize

    252KB

  • memory/4104-199-0x0000000002560000-0x000000000259F000-memory.dmp
    Filesize

    252KB

  • memory/4104-201-0x0000000002560000-0x000000000259F000-memory.dmp
    Filesize

    252KB

  • memory/4104-203-0x0000000002560000-0x000000000259F000-memory.dmp
    Filesize

    252KB

  • memory/4104-205-0x0000000002560000-0x000000000259F000-memory.dmp
    Filesize

    252KB

  • memory/4104-207-0x0000000002560000-0x000000000259F000-memory.dmp
    Filesize

    252KB

  • memory/4104-209-0x0000000002560000-0x000000000259F000-memory.dmp
    Filesize

    252KB

  • memory/4104-211-0x0000000002560000-0x000000000259F000-memory.dmp
    Filesize

    252KB

  • memory/4104-213-0x0000000002560000-0x000000000259F000-memory.dmp
    Filesize

    252KB

  • memory/4104-258-0x0000000000590000-0x00000000005DB000-memory.dmp
    Filesize

    300KB

  • memory/4104-180-0x0000000002560000-0x000000000259F000-memory.dmp
    Filesize

    252KB

  • memory/4104-261-0x0000000004B90000-0x0000000004BA0000-memory.dmp
    Filesize

    64KB

  • memory/4104-263-0x0000000004B90000-0x0000000004BA0000-memory.dmp
    Filesize

    64KB

  • memory/4104-1090-0x00000000056B0000-0x0000000005CB6000-memory.dmp
    Filesize

    6.0MB

  • memory/4104-1091-0x00000000050A0000-0x00000000051AA000-memory.dmp
    Filesize

    1.0MB

  • memory/4104-1092-0x0000000004B70000-0x0000000004B82000-memory.dmp
    Filesize

    72KB

  • memory/4104-1093-0x00000000051B0000-0x00000000051EE000-memory.dmp
    Filesize

    248KB

  • memory/4104-1094-0x0000000005300000-0x000000000534B000-memory.dmp
    Filesize

    300KB

  • memory/4104-1095-0x0000000004B90000-0x0000000004BA0000-memory.dmp
    Filesize

    64KB

  • memory/4104-1097-0x0000000004B90000-0x0000000004BA0000-memory.dmp
    Filesize

    64KB

  • memory/4104-1098-0x0000000004B90000-0x0000000004BA0000-memory.dmp
    Filesize

    64KB

  • memory/4104-1099-0x0000000004B90000-0x0000000004BA0000-memory.dmp
    Filesize

    64KB

  • memory/4104-1100-0x0000000005490000-0x0000000005522000-memory.dmp
    Filesize

    584KB

  • memory/4104-1101-0x0000000005530000-0x0000000005596000-memory.dmp
    Filesize

    408KB

  • memory/4104-1102-0x0000000006340000-0x0000000006502000-memory.dmp
    Filesize

    1.8MB

  • memory/4104-1103-0x0000000006510000-0x0000000006A3C000-memory.dmp
    Filesize

    5.2MB

  • memory/4104-179-0x0000000002560000-0x00000000025A4000-memory.dmp
    Filesize

    272KB

  • memory/4104-178-0x00000000024B0000-0x00000000024F6000-memory.dmp
    Filesize

    280KB

  • memory/4104-1104-0x0000000004B90000-0x0000000004BA0000-memory.dmp
    Filesize

    64KB

  • memory/4104-1105-0x0000000006CB0000-0x0000000006D26000-memory.dmp
    Filesize

    472KB

  • memory/4104-1106-0x0000000006D40000-0x0000000006D90000-memory.dmp
    Filesize

    320KB