Analysis

  • max time kernel
    53s
  • max time network
    68s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    31-03-2023 20:40

General

  • Target

    913ec95ce0b8f6409bea020e5e1cba873c2239e01650415a32525b5cc0d5b6dd.exe

  • Size

    672KB

  • MD5

    62dd9da6c9d7288a1332cba5e24e2a39

  • SHA1

    528f1f357676367e4a130a7edbfabe41f7712731

  • SHA256

    913ec95ce0b8f6409bea020e5e1cba873c2239e01650415a32525b5cc0d5b6dd

  • SHA512

    2191497e2d705b093cc0d1eb2ba5c86649c88860303a28cdeb9f52c909323b8066957c83893360757199547b74a249eae6eb1abac168dce15d716b263e9d3b96

  • SSDEEP

    12288:vMrsy90m2sEyoiT/DQQZY0fgFpMBk9rduG8QJ3LquiItDV02q:/y5OiTLDG0fCMBk9YGJ3GupDPq

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\913ec95ce0b8f6409bea020e5e1cba873c2239e01650415a32525b5cc0d5b6dd.exe
    "C:\Users\Admin\AppData\Local\Temp\913ec95ce0b8f6409bea020e5e1cba873c2239e01650415a32525b5cc0d5b6dd.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un329431.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un329431.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2484
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7720.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7720.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2592
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6622.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6622.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2796
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si533172.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si533172.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3060

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si533172.exe
    Filesize

    175KB

    MD5

    b4bdd05c869792c840cd2088108f4eb9

    SHA1

    b6df9f03f7593c8359d55da4f8b6b36f47ac56ae

    SHA256

    fa242b269f3f0675375e7908d6684d915029f53b12d7920a5e79f1e6ae388e21

    SHA512

    6adb311e2f4c8d2f2846abaa1f0c5fb6285c3bb882c47c609ee68f3ba4997e4b7705a158c2a203dae85abc57736482a3950d40b0896af83cd36564cc2476fc90

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si533172.exe
    Filesize

    175KB

    MD5

    b4bdd05c869792c840cd2088108f4eb9

    SHA1

    b6df9f03f7593c8359d55da4f8b6b36f47ac56ae

    SHA256

    fa242b269f3f0675375e7908d6684d915029f53b12d7920a5e79f1e6ae388e21

    SHA512

    6adb311e2f4c8d2f2846abaa1f0c5fb6285c3bb882c47c609ee68f3ba4997e4b7705a158c2a203dae85abc57736482a3950d40b0896af83cd36564cc2476fc90

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un329431.exe
    Filesize

    530KB

    MD5

    1df5f927201918e0db2bbe4dcdb36da2

    SHA1

    fe8cfbcda0fb2ea3ae7b863dc3fcbf883c87c4ae

    SHA256

    0d7d488676e0406c8611d29a932dcc511f5972cd7b348f03f107f526fc425e8b

    SHA512

    f2e32adf050a62c3e5621045f5b4775abddc5252775a6e76f86273bd3844f63dc4ee0fdebff4fef36c0a518b82f7163e799c278f6b27b21d95bcd9f65c8f8541

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un329431.exe
    Filesize

    530KB

    MD5

    1df5f927201918e0db2bbe4dcdb36da2

    SHA1

    fe8cfbcda0fb2ea3ae7b863dc3fcbf883c87c4ae

    SHA256

    0d7d488676e0406c8611d29a932dcc511f5972cd7b348f03f107f526fc425e8b

    SHA512

    f2e32adf050a62c3e5621045f5b4775abddc5252775a6e76f86273bd3844f63dc4ee0fdebff4fef36c0a518b82f7163e799c278f6b27b21d95bcd9f65c8f8541

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7720.exe
    Filesize

    301KB

    MD5

    6e0b64cddcaf6c7380af58b4ec4ff64f

    SHA1

    669ed2bce426e0f1f2cd2860b694f9ee872db952

    SHA256

    88204d56b35661eb94b8a6ed5983f0a866ca2eff4b6fa0ab70e0770ae4c7611e

    SHA512

    8ef1094001bc00247c385cc576a373fc26a91b1d35f2595362e6d431a454f4c553016be1475868056099160279780a4a15d611a3cdaa9f34e06e4e6cd4321064

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7720.exe
    Filesize

    301KB

    MD5

    6e0b64cddcaf6c7380af58b4ec4ff64f

    SHA1

    669ed2bce426e0f1f2cd2860b694f9ee872db952

    SHA256

    88204d56b35661eb94b8a6ed5983f0a866ca2eff4b6fa0ab70e0770ae4c7611e

    SHA512

    8ef1094001bc00247c385cc576a373fc26a91b1d35f2595362e6d431a454f4c553016be1475868056099160279780a4a15d611a3cdaa9f34e06e4e6cd4321064

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6622.exe
    Filesize

    359KB

    MD5

    64a27ebbd74f9d0595a042b2cda69c6e

    SHA1

    5158428757b2892206e5f41a4c97bd585cf41ff8

    SHA256

    0da0a5560522d6402c5a4ab05794c138eca722d0bf6ce9c5dde414ac6232166f

    SHA512

    8e6235183977424509d635852e11883efc756f87f8030824694909eedbdbff1e62657bd937fad549c540605a6c905f467bca709debfe8bd7acf13b5349a5304b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6622.exe
    Filesize

    359KB

    MD5

    64a27ebbd74f9d0595a042b2cda69c6e

    SHA1

    5158428757b2892206e5f41a4c97bd585cf41ff8

    SHA256

    0da0a5560522d6402c5a4ab05794c138eca722d0bf6ce9c5dde414ac6232166f

    SHA512

    8e6235183977424509d635852e11883efc756f87f8030824694909eedbdbff1e62657bd937fad549c540605a6c905f467bca709debfe8bd7acf13b5349a5304b

  • memory/2592-136-0x0000000001BC0000-0x0000000001BED000-memory.dmp
    Filesize

    180KB

  • memory/2592-137-0x0000000003710000-0x000000000372A000-memory.dmp
    Filesize

    104KB

  • memory/2592-138-0x0000000006290000-0x000000000678E000-memory.dmp
    Filesize

    5.0MB

  • memory/2592-139-0x0000000003AB0000-0x0000000003AC8000-memory.dmp
    Filesize

    96KB

  • memory/2592-140-0x0000000006280000-0x0000000006290000-memory.dmp
    Filesize

    64KB

  • memory/2592-142-0x0000000006280000-0x0000000006290000-memory.dmp
    Filesize

    64KB

  • memory/2592-141-0x0000000006280000-0x0000000006290000-memory.dmp
    Filesize

    64KB

  • memory/2592-143-0x0000000003AB0000-0x0000000003AC2000-memory.dmp
    Filesize

    72KB

  • memory/2592-144-0x0000000003AB0000-0x0000000003AC2000-memory.dmp
    Filesize

    72KB

  • memory/2592-146-0x0000000003AB0000-0x0000000003AC2000-memory.dmp
    Filesize

    72KB

  • memory/2592-150-0x0000000003AB0000-0x0000000003AC2000-memory.dmp
    Filesize

    72KB

  • memory/2592-148-0x0000000003AB0000-0x0000000003AC2000-memory.dmp
    Filesize

    72KB

  • memory/2592-152-0x0000000003AB0000-0x0000000003AC2000-memory.dmp
    Filesize

    72KB

  • memory/2592-158-0x0000000003AB0000-0x0000000003AC2000-memory.dmp
    Filesize

    72KB

  • memory/2592-156-0x0000000003AB0000-0x0000000003AC2000-memory.dmp
    Filesize

    72KB

  • memory/2592-154-0x0000000003AB0000-0x0000000003AC2000-memory.dmp
    Filesize

    72KB

  • memory/2592-170-0x0000000003AB0000-0x0000000003AC2000-memory.dmp
    Filesize

    72KB

  • memory/2592-168-0x0000000003AB0000-0x0000000003AC2000-memory.dmp
    Filesize

    72KB

  • memory/2592-166-0x0000000003AB0000-0x0000000003AC2000-memory.dmp
    Filesize

    72KB

  • memory/2592-164-0x0000000003AB0000-0x0000000003AC2000-memory.dmp
    Filesize

    72KB

  • memory/2592-162-0x0000000003AB0000-0x0000000003AC2000-memory.dmp
    Filesize

    72KB

  • memory/2592-160-0x0000000003AB0000-0x0000000003AC2000-memory.dmp
    Filesize

    72KB

  • memory/2592-171-0x0000000000400000-0x0000000001AE3000-memory.dmp
    Filesize

    22.9MB

  • memory/2592-172-0x0000000006280000-0x0000000006290000-memory.dmp
    Filesize

    64KB

  • memory/2592-173-0x0000000006280000-0x0000000006290000-memory.dmp
    Filesize

    64KB

  • memory/2592-175-0x0000000000400000-0x0000000001AE3000-memory.dmp
    Filesize

    22.9MB

  • memory/2796-180-0x00000000037C0000-0x0000000003806000-memory.dmp
    Filesize

    280KB

  • memory/2796-181-0x0000000003B10000-0x0000000003B54000-memory.dmp
    Filesize

    272KB

  • memory/2796-182-0x0000000003B10000-0x0000000003B4F000-memory.dmp
    Filesize

    252KB

  • memory/2796-183-0x0000000003B10000-0x0000000003B4F000-memory.dmp
    Filesize

    252KB

  • memory/2796-185-0x0000000003B10000-0x0000000003B4F000-memory.dmp
    Filesize

    252KB

  • memory/2796-187-0x0000000003B10000-0x0000000003B4F000-memory.dmp
    Filesize

    252KB

  • memory/2796-188-0x0000000001BD0000-0x0000000001C1B000-memory.dmp
    Filesize

    300KB

  • memory/2796-190-0x00000000061E0000-0x00000000061F0000-memory.dmp
    Filesize

    64KB

  • memory/2796-191-0x00000000061E0000-0x00000000061F0000-memory.dmp
    Filesize

    64KB

  • memory/2796-193-0x00000000061E0000-0x00000000061F0000-memory.dmp
    Filesize

    64KB

  • memory/2796-195-0x0000000003B10000-0x0000000003B4F000-memory.dmp
    Filesize

    252KB

  • memory/2796-197-0x0000000003B10000-0x0000000003B4F000-memory.dmp
    Filesize

    252KB

  • memory/2796-199-0x0000000003B10000-0x0000000003B4F000-memory.dmp
    Filesize

    252KB

  • memory/2796-192-0x0000000003B10000-0x0000000003B4F000-memory.dmp
    Filesize

    252KB

  • memory/2796-201-0x0000000003B10000-0x0000000003B4F000-memory.dmp
    Filesize

    252KB

  • memory/2796-203-0x0000000003B10000-0x0000000003B4F000-memory.dmp
    Filesize

    252KB

  • memory/2796-205-0x0000000003B10000-0x0000000003B4F000-memory.dmp
    Filesize

    252KB

  • memory/2796-207-0x0000000003B10000-0x0000000003B4F000-memory.dmp
    Filesize

    252KB

  • memory/2796-209-0x0000000003B10000-0x0000000003B4F000-memory.dmp
    Filesize

    252KB

  • memory/2796-211-0x0000000003B10000-0x0000000003B4F000-memory.dmp
    Filesize

    252KB

  • memory/2796-213-0x0000000003B10000-0x0000000003B4F000-memory.dmp
    Filesize

    252KB

  • memory/2796-215-0x0000000003B10000-0x0000000003B4F000-memory.dmp
    Filesize

    252KB

  • memory/2796-217-0x0000000003B10000-0x0000000003B4F000-memory.dmp
    Filesize

    252KB

  • memory/2796-219-0x0000000003B10000-0x0000000003B4F000-memory.dmp
    Filesize

    252KB

  • memory/2796-1092-0x00000000066F0000-0x0000000006CF6000-memory.dmp
    Filesize

    6.0MB

  • memory/2796-1093-0x0000000006D00000-0x0000000006E0A000-memory.dmp
    Filesize

    1.0MB

  • memory/2796-1094-0x00000000061B0000-0x00000000061C2000-memory.dmp
    Filesize

    72KB

  • memory/2796-1095-0x0000000006E10000-0x0000000006E4E000-memory.dmp
    Filesize

    248KB

  • memory/2796-1096-0x0000000006F50000-0x0000000006F9B000-memory.dmp
    Filesize

    300KB

  • memory/2796-1097-0x00000000061E0000-0x00000000061F0000-memory.dmp
    Filesize

    64KB

  • memory/2796-1099-0x00000000070E0000-0x0000000007146000-memory.dmp
    Filesize

    408KB

  • memory/2796-1100-0x00000000061E0000-0x00000000061F0000-memory.dmp
    Filesize

    64KB

  • memory/2796-1101-0x00000000061E0000-0x00000000061F0000-memory.dmp
    Filesize

    64KB

  • memory/2796-1102-0x00000000061E0000-0x00000000061F0000-memory.dmp
    Filesize

    64KB

  • memory/2796-1103-0x0000000007680000-0x0000000007712000-memory.dmp
    Filesize

    584KB

  • memory/2796-1104-0x0000000007890000-0x0000000007906000-memory.dmp
    Filesize

    472KB

  • memory/2796-1105-0x0000000007910000-0x0000000007960000-memory.dmp
    Filesize

    320KB

  • memory/2796-1106-0x0000000007AC0000-0x0000000007C82000-memory.dmp
    Filesize

    1.8MB

  • memory/2796-1107-0x0000000007C90000-0x00000000081BC000-memory.dmp
    Filesize

    5.2MB

  • memory/2796-1108-0x00000000061E0000-0x00000000061F0000-memory.dmp
    Filesize

    64KB

  • memory/3060-1114-0x00000000002B0000-0x00000000002E2000-memory.dmp
    Filesize

    200KB

  • memory/3060-1115-0x0000000004B90000-0x0000000004BDB000-memory.dmp
    Filesize

    300KB

  • memory/3060-1116-0x0000000004B80000-0x0000000004B90000-memory.dmp
    Filesize

    64KB