Analysis

  • max time kernel
    52s
  • max time network
    76s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    31-03-2023 20:09

General

  • Target

    8896c5e40d6b15db370ab0122e85f5ecd05a0b2d8ca9799d268de4ca2d72df64.exe

  • Size

    673KB

  • MD5

    fe1022d860e4e528e32ffcbcc660310e

  • SHA1

    01ddc32efb278e620c734632ec957c7196f1d0cc

  • SHA256

    8896c5e40d6b15db370ab0122e85f5ecd05a0b2d8ca9799d268de4ca2d72df64

  • SHA512

    bf680a49e39900c3844d44608d26846e1a12ecc030fd79974a87c976569ddad7ab5415f0858d6326cfd28e74842752d7d11ebfeae7e7a26c315423c48c8b3341

  • SSDEEP

    12288:oMrey90den2Nt18kh3t4rxCleW9R7bJ+oCwFReve6zLOborTmau+ElkrtkyYS:WyDWnh3t4r1OVErwACbcLu+5tpYS

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8896c5e40d6b15db370ab0122e85f5ecd05a0b2d8ca9799d268de4ca2d72df64.exe
    "C:\Users\Admin\AppData\Local\Temp\8896c5e40d6b15db370ab0122e85f5ecd05a0b2d8ca9799d268de4ca2d72df64.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:8
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un571603.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un571603.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4100
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5188.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5188.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1012
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4732.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4732.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4744
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si606505.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si606505.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4840

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si606505.exe
    Filesize

    175KB

    MD5

    f727263d187ee1e3fd424db10e5eb666

    SHA1

    afbc6e83a7c33148b75d8a20561e682554a73da3

    SHA256

    8aad11c9d22890fb2ddd2b965d043f0918a7ffef9dda41ea740775718035fa94

    SHA512

    5ae9bb8f9d12538aa10d0549eb3751e0754fa40b946f0fb4faddd71f242802a4443102285c55bf2803102c33dd9c24150b118a72a6a0cb82f232e2b55f643ae5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si606505.exe
    Filesize

    175KB

    MD5

    f727263d187ee1e3fd424db10e5eb666

    SHA1

    afbc6e83a7c33148b75d8a20561e682554a73da3

    SHA256

    8aad11c9d22890fb2ddd2b965d043f0918a7ffef9dda41ea740775718035fa94

    SHA512

    5ae9bb8f9d12538aa10d0549eb3751e0754fa40b946f0fb4faddd71f242802a4443102285c55bf2803102c33dd9c24150b118a72a6a0cb82f232e2b55f643ae5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un571603.exe
    Filesize

    530KB

    MD5

    e2f0bd36401843e2fb531f40bce97e0a

    SHA1

    497d15bc7d41443d1561035053e38ee479bc45a3

    SHA256

    50b150084ba04a769630c85d735d6bfd44b936637e552c1ce01f737d92957963

    SHA512

    e8e17b6425f19a5e25a6e7878df471b170c8ae01629c0345427841785c373d6cc1a91c4c2765005d4cc2a728c1dc1b34fac7822eddacea46978428ca22325a2d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un571603.exe
    Filesize

    530KB

    MD5

    e2f0bd36401843e2fb531f40bce97e0a

    SHA1

    497d15bc7d41443d1561035053e38ee479bc45a3

    SHA256

    50b150084ba04a769630c85d735d6bfd44b936637e552c1ce01f737d92957963

    SHA512

    e8e17b6425f19a5e25a6e7878df471b170c8ae01629c0345427841785c373d6cc1a91c4c2765005d4cc2a728c1dc1b34fac7822eddacea46978428ca22325a2d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5188.exe
    Filesize

    260KB

    MD5

    a6ffc9d4e8f6763e9232f33815e72bb9

    SHA1

    e6ae5dae1f493d45c0d635c21a71f4186c9add20

    SHA256

    6d5465a491134d2a318e958aacefd58504d0fe4c7820974dc3c8a9f6b896640c

    SHA512

    fcd88cc6b95225f36e111d8be6e4d607c4616760debe09c3191e5fa7bd861bfcf527014d89d9930c2dbd353d5417ef8cd8702eca92da897be9b653b69fc62de6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5188.exe
    Filesize

    260KB

    MD5

    a6ffc9d4e8f6763e9232f33815e72bb9

    SHA1

    e6ae5dae1f493d45c0d635c21a71f4186c9add20

    SHA256

    6d5465a491134d2a318e958aacefd58504d0fe4c7820974dc3c8a9f6b896640c

    SHA512

    fcd88cc6b95225f36e111d8be6e4d607c4616760debe09c3191e5fa7bd861bfcf527014d89d9930c2dbd353d5417ef8cd8702eca92da897be9b653b69fc62de6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4732.exe
    Filesize

    318KB

    MD5

    54f5eda53e3308f03783e28ef7e3b3df

    SHA1

    1d1817ec2fd622164213266da2f74a8ea2f6256e

    SHA256

    a40a9fcb1a469a23e8b65254a77a6ca3855560b4e1b3578a34b956a1a17030c6

    SHA512

    ccba589a563caca589c9004e08940f2fc5a47bc1495441878d3f92d861d327b36d8130c6fa44bae20b0d2619c23d7596889064ce8479acb92bdba2b31818f93a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4732.exe
    Filesize

    318KB

    MD5

    54f5eda53e3308f03783e28ef7e3b3df

    SHA1

    1d1817ec2fd622164213266da2f74a8ea2f6256e

    SHA256

    a40a9fcb1a469a23e8b65254a77a6ca3855560b4e1b3578a34b956a1a17030c6

    SHA512

    ccba589a563caca589c9004e08940f2fc5a47bc1495441878d3f92d861d327b36d8130c6fa44bae20b0d2619c23d7596889064ce8479acb92bdba2b31818f93a

  • memory/1012-135-0x0000000002140000-0x000000000215A000-memory.dmp
    Filesize

    104KB

  • memory/1012-136-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/1012-137-0x00000000049D0000-0x00000000049E0000-memory.dmp
    Filesize

    64KB

  • memory/1012-138-0x00000000049E0000-0x0000000004EDE000-memory.dmp
    Filesize

    5.0MB

  • memory/1012-139-0x0000000004EF0000-0x0000000004F08000-memory.dmp
    Filesize

    96KB

  • memory/1012-140-0x0000000004EF0000-0x0000000004F02000-memory.dmp
    Filesize

    72KB

  • memory/1012-141-0x0000000004EF0000-0x0000000004F02000-memory.dmp
    Filesize

    72KB

  • memory/1012-143-0x0000000004EF0000-0x0000000004F02000-memory.dmp
    Filesize

    72KB

  • memory/1012-145-0x0000000004EF0000-0x0000000004F02000-memory.dmp
    Filesize

    72KB

  • memory/1012-147-0x0000000004EF0000-0x0000000004F02000-memory.dmp
    Filesize

    72KB

  • memory/1012-149-0x0000000004EF0000-0x0000000004F02000-memory.dmp
    Filesize

    72KB

  • memory/1012-151-0x0000000004EF0000-0x0000000004F02000-memory.dmp
    Filesize

    72KB

  • memory/1012-153-0x0000000004EF0000-0x0000000004F02000-memory.dmp
    Filesize

    72KB

  • memory/1012-155-0x0000000004EF0000-0x0000000004F02000-memory.dmp
    Filesize

    72KB

  • memory/1012-157-0x0000000004EF0000-0x0000000004F02000-memory.dmp
    Filesize

    72KB

  • memory/1012-165-0x0000000004EF0000-0x0000000004F02000-memory.dmp
    Filesize

    72KB

  • memory/1012-163-0x0000000004EF0000-0x0000000004F02000-memory.dmp
    Filesize

    72KB

  • memory/1012-161-0x0000000004EF0000-0x0000000004F02000-memory.dmp
    Filesize

    72KB

  • memory/1012-159-0x0000000004EF0000-0x0000000004F02000-memory.dmp
    Filesize

    72KB

  • memory/1012-167-0x0000000004EF0000-0x0000000004F02000-memory.dmp
    Filesize

    72KB

  • memory/1012-168-0x0000000000400000-0x00000000004B1000-memory.dmp
    Filesize

    708KB

  • memory/1012-170-0x0000000000400000-0x00000000004B1000-memory.dmp
    Filesize

    708KB

  • memory/4744-175-0x0000000002410000-0x0000000002456000-memory.dmp
    Filesize

    280KB

  • memory/4744-176-0x0000000004A30000-0x0000000004A74000-memory.dmp
    Filesize

    272KB

  • memory/4744-177-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4744-178-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4744-182-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4744-180-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4744-184-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4744-186-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4744-188-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4744-190-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4744-192-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4744-194-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4744-196-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4744-198-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4744-200-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4744-202-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4744-204-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4744-206-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4744-208-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4744-210-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4744-341-0x00000000005B0000-0x00000000005FB000-memory.dmp
    Filesize

    300KB

  • memory/4744-344-0x0000000004B10000-0x0000000004B20000-memory.dmp
    Filesize

    64KB

  • memory/4744-347-0x0000000004B10000-0x0000000004B20000-memory.dmp
    Filesize

    64KB

  • memory/4744-349-0x0000000004B10000-0x0000000004B20000-memory.dmp
    Filesize

    64KB

  • memory/4744-1087-0x0000000005730000-0x0000000005D36000-memory.dmp
    Filesize

    6.0MB

  • memory/4744-1088-0x0000000005190000-0x000000000529A000-memory.dmp
    Filesize

    1.0MB

  • memory/4744-1089-0x00000000052D0000-0x00000000052E2000-memory.dmp
    Filesize

    72KB

  • memory/4744-1091-0x00000000052F0000-0x000000000532E000-memory.dmp
    Filesize

    248KB

  • memory/4744-1090-0x0000000004B10000-0x0000000004B20000-memory.dmp
    Filesize

    64KB

  • memory/4744-1092-0x0000000005440000-0x000000000548B000-memory.dmp
    Filesize

    300KB

  • memory/4744-1093-0x00000000055D0000-0x0000000005636000-memory.dmp
    Filesize

    408KB

  • memory/4744-1094-0x00000000062A0000-0x0000000006332000-memory.dmp
    Filesize

    584KB

  • memory/4744-1095-0x00000000063A0000-0x0000000006562000-memory.dmp
    Filesize

    1.8MB

  • memory/4744-1097-0x0000000006570000-0x0000000006A9C000-memory.dmp
    Filesize

    5.2MB

  • memory/4744-1098-0x0000000006BC0000-0x0000000006C36000-memory.dmp
    Filesize

    472KB

  • memory/4744-1099-0x0000000006C40000-0x0000000006C90000-memory.dmp
    Filesize

    320KB

  • memory/4744-1100-0x0000000004B10000-0x0000000004B20000-memory.dmp
    Filesize

    64KB

  • memory/4744-1101-0x0000000004B10000-0x0000000004B20000-memory.dmp
    Filesize

    64KB

  • memory/4744-1102-0x0000000004B10000-0x0000000004B20000-memory.dmp
    Filesize

    64KB

  • memory/4744-1103-0x0000000004B10000-0x0000000004B20000-memory.dmp
    Filesize

    64KB

  • memory/4840-1109-0x0000000000970000-0x00000000009A2000-memory.dmp
    Filesize

    200KB

  • memory/4840-1110-0x00000000053B0000-0x00000000053FB000-memory.dmp
    Filesize

    300KB

  • memory/4840-1111-0x00000000051B0000-0x00000000051C0000-memory.dmp
    Filesize

    64KB

  • memory/4840-1112-0x00000000051B0000-0x00000000051C0000-memory.dmp
    Filesize

    64KB