Analysis

  • max time kernel
    51s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01-04-2023 22:35

General

  • Target

    e97a7fd891bc303f961f4e5e8067542ed0ceb187586280deffbb053427285aad.exe

  • Size

    660KB

  • MD5

    563ae391f908ee1849378898ba357455

  • SHA1

    dfb86d856bb74652588a4bfbda0c1d1005efb387

  • SHA256

    e97a7fd891bc303f961f4e5e8067542ed0ceb187586280deffbb053427285aad

  • SHA512

    735cce8c30ec4a65efea6a66ea6a00ca28230ffac1bc3ad03cc64e3911d56401836d4377c3050ab01b6fc608d8120054467f9f3151c870ea2577d0bf319efd5f

  • SSDEEP

    12288:rMrwy90sklSMT7gT7SxF+d985IXbwof5KWa/lma8/Kj1Jp1ICKx:XyqwT7NldA9ma8/KRJp1ICKx

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e97a7fd891bc303f961f4e5e8067542ed0ceb187586280deffbb053427285aad.exe
    "C:\Users\Admin\AppData\Local\Temp\e97a7fd891bc303f961f4e5e8067542ed0ceb187586280deffbb053427285aad.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3632
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un555574.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un555574.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3656
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4947.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4947.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4584
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0940.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0940.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4164
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si867825.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si867825.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1200

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si867825.exe

    Filesize

    176KB

    MD5

    72fb96b5c65ff292d47f6b81c22f9607

    SHA1

    4a7b09166c0e56dec3ed6be71f640e1a007720dd

    SHA256

    6052673ef298839d83648b855a4136debd1502743c2f3d93203c00016f1da75a

    SHA512

    70aeae49fa841df8bb062ae8a494a75f6cb550f3215eea56817e5b5dfb004f5eab1f09199535a68711db4933003060e8ea0894b9df9c5e2cb46f4b3dfbeec80c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si867825.exe

    Filesize

    176KB

    MD5

    72fb96b5c65ff292d47f6b81c22f9607

    SHA1

    4a7b09166c0e56dec3ed6be71f640e1a007720dd

    SHA256

    6052673ef298839d83648b855a4136debd1502743c2f3d93203c00016f1da75a

    SHA512

    70aeae49fa841df8bb062ae8a494a75f6cb550f3215eea56817e5b5dfb004f5eab1f09199535a68711db4933003060e8ea0894b9df9c5e2cb46f4b3dfbeec80c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un555574.exe

    Filesize

    518KB

    MD5

    fee986de2fa0a2300226c0bc772f252e

    SHA1

    30afb900a518d8fe0c82a926c06516afd45d713d

    SHA256

    86ad58915ec03dd60b27f2c5ace80b27391c9ff97531f287faccc05e86a7c077

    SHA512

    70320cc18327ed85c1f83c4bf34c4832a35ef84ea21e599602e6f2ea0df268902b0e2055f289b315c4f9b79c63c6a00a047ab02ddf6851180b1d71437c2a5609

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un555574.exe

    Filesize

    518KB

    MD5

    fee986de2fa0a2300226c0bc772f252e

    SHA1

    30afb900a518d8fe0c82a926c06516afd45d713d

    SHA256

    86ad58915ec03dd60b27f2c5ace80b27391c9ff97531f287faccc05e86a7c077

    SHA512

    70320cc18327ed85c1f83c4bf34c4832a35ef84ea21e599602e6f2ea0df268902b0e2055f289b315c4f9b79c63c6a00a047ab02ddf6851180b1d71437c2a5609

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4947.exe

    Filesize

    376KB

    MD5

    cf49f90ad27cde4aae3a8cb0a01ebc11

    SHA1

    d29208b457f4fe0c2f448fea4bdbe8024c4227d7

    SHA256

    14ed4278846e98776c84f68155d9de642a373b0c22136b004da53215906b0c5a

    SHA512

    327724c4d61d0a0307aac4abb6712dd9147a7c8660bd926c1b199b86fe7dd225deb24145a44e8d651bf805ffeb2ae84ed4e9dc18a07e975060952ed5f10366b1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4947.exe

    Filesize

    376KB

    MD5

    cf49f90ad27cde4aae3a8cb0a01ebc11

    SHA1

    d29208b457f4fe0c2f448fea4bdbe8024c4227d7

    SHA256

    14ed4278846e98776c84f68155d9de642a373b0c22136b004da53215906b0c5a

    SHA512

    327724c4d61d0a0307aac4abb6712dd9147a7c8660bd926c1b199b86fe7dd225deb24145a44e8d651bf805ffeb2ae84ed4e9dc18a07e975060952ed5f10366b1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0940.exe

    Filesize

    434KB

    MD5

    402efffee349a0458666a81652eae001

    SHA1

    6eb2e09d49a9a854a0a34f6015f4d05aa4c5b8b5

    SHA256

    b71ba963d8ff1ab50f3753416daef2ed04c5fa21430e2ca6051d0684d70a2780

    SHA512

    e7f9d7195fe27396d3e80c1b29cf8dabbf523d0e148e28d20cb9773ab5f560d5cd6ba82177460609c979a25f9b1f187b7a0bb0a2c150f290c7192759b6551cad

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0940.exe

    Filesize

    434KB

    MD5

    402efffee349a0458666a81652eae001

    SHA1

    6eb2e09d49a9a854a0a34f6015f4d05aa4c5b8b5

    SHA256

    b71ba963d8ff1ab50f3753416daef2ed04c5fa21430e2ca6051d0684d70a2780

    SHA512

    e7f9d7195fe27396d3e80c1b29cf8dabbf523d0e148e28d20cb9773ab5f560d5cd6ba82177460609c979a25f9b1f187b7a0bb0a2c150f290c7192759b6551cad

  • memory/1200-1117-0x0000000005410000-0x0000000005420000-memory.dmp

    Filesize

    64KB

  • memory/1200-1116-0x00000000052A0000-0x00000000052EB000-memory.dmp

    Filesize

    300KB

  • memory/1200-1115-0x0000000005410000-0x0000000005420000-memory.dmp

    Filesize

    64KB

  • memory/1200-1114-0x0000000000860000-0x0000000000892000-memory.dmp

    Filesize

    200KB

  • memory/4164-1092-0x0000000005270000-0x0000000005876000-memory.dmp

    Filesize

    6.0MB

  • memory/4164-1096-0x0000000002250000-0x0000000002260000-memory.dmp

    Filesize

    64KB

  • memory/4164-1108-0x0000000006850000-0x0000000006D7C000-memory.dmp

    Filesize

    5.2MB

  • memory/4164-1107-0x0000000006670000-0x0000000006832000-memory.dmp

    Filesize

    1.8MB

  • memory/4164-1106-0x0000000002250000-0x0000000002260000-memory.dmp

    Filesize

    64KB

  • memory/4164-1105-0x0000000006610000-0x0000000006660000-memory.dmp

    Filesize

    320KB

  • memory/4164-1104-0x0000000006590000-0x0000000006606000-memory.dmp

    Filesize

    472KB

  • memory/4164-1103-0x0000000002250000-0x0000000002260000-memory.dmp

    Filesize

    64KB

  • memory/4164-1102-0x0000000002250000-0x0000000002260000-memory.dmp

    Filesize

    64KB

  • memory/4164-1101-0x0000000002250000-0x0000000002260000-memory.dmp

    Filesize

    64KB

  • memory/4164-1100-0x0000000006260000-0x00000000062F2000-memory.dmp

    Filesize

    584KB

  • memory/4164-1099-0x0000000005BA0000-0x0000000005C06000-memory.dmp

    Filesize

    408KB

  • memory/4164-1097-0x00000000027A0000-0x00000000027EB000-memory.dmp

    Filesize

    300KB

  • memory/4164-1095-0x0000000002740000-0x000000000277E000-memory.dmp

    Filesize

    248KB

  • memory/4164-1094-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/4164-1093-0x0000000005880000-0x000000000598A000-memory.dmp

    Filesize

    1.0MB

  • memory/4164-307-0x0000000002250000-0x0000000002260000-memory.dmp

    Filesize

    64KB

  • memory/4164-304-0x0000000002250000-0x0000000002260000-memory.dmp

    Filesize

    64KB

  • memory/4164-300-0x00000000005C0000-0x000000000060B000-memory.dmp

    Filesize

    300KB

  • memory/4164-302-0x0000000002250000-0x0000000002260000-memory.dmp

    Filesize

    64KB

  • memory/4164-215-0x00000000023C0000-0x00000000023FF000-memory.dmp

    Filesize

    252KB

  • memory/4164-180-0x00000000021D0000-0x0000000002216000-memory.dmp

    Filesize

    280KB

  • memory/4164-181-0x00000000023C0000-0x0000000002404000-memory.dmp

    Filesize

    272KB

  • memory/4164-182-0x00000000023C0000-0x00000000023FF000-memory.dmp

    Filesize

    252KB

  • memory/4164-183-0x00000000023C0000-0x00000000023FF000-memory.dmp

    Filesize

    252KB

  • memory/4164-185-0x00000000023C0000-0x00000000023FF000-memory.dmp

    Filesize

    252KB

  • memory/4164-189-0x00000000023C0000-0x00000000023FF000-memory.dmp

    Filesize

    252KB

  • memory/4164-187-0x00000000023C0000-0x00000000023FF000-memory.dmp

    Filesize

    252KB

  • memory/4164-191-0x00000000023C0000-0x00000000023FF000-memory.dmp

    Filesize

    252KB

  • memory/4164-193-0x00000000023C0000-0x00000000023FF000-memory.dmp

    Filesize

    252KB

  • memory/4164-195-0x00000000023C0000-0x00000000023FF000-memory.dmp

    Filesize

    252KB

  • memory/4164-197-0x00000000023C0000-0x00000000023FF000-memory.dmp

    Filesize

    252KB

  • memory/4164-199-0x00000000023C0000-0x00000000023FF000-memory.dmp

    Filesize

    252KB

  • memory/4164-201-0x00000000023C0000-0x00000000023FF000-memory.dmp

    Filesize

    252KB

  • memory/4164-203-0x00000000023C0000-0x00000000023FF000-memory.dmp

    Filesize

    252KB

  • memory/4164-205-0x00000000023C0000-0x00000000023FF000-memory.dmp

    Filesize

    252KB

  • memory/4164-207-0x00000000023C0000-0x00000000023FF000-memory.dmp

    Filesize

    252KB

  • memory/4164-209-0x00000000023C0000-0x00000000023FF000-memory.dmp

    Filesize

    252KB

  • memory/4164-211-0x00000000023C0000-0x00000000023FF000-memory.dmp

    Filesize

    252KB

  • memory/4164-213-0x00000000023C0000-0x00000000023FF000-memory.dmp

    Filesize

    252KB

  • memory/4584-163-0x0000000002580000-0x0000000002592000-memory.dmp

    Filesize

    72KB

  • memory/4584-135-0x0000000002500000-0x000000000251A000-memory.dmp

    Filesize

    104KB

  • memory/4584-142-0x0000000002580000-0x0000000002592000-memory.dmp

    Filesize

    72KB

  • memory/4584-173-0x0000000002570000-0x0000000002580000-memory.dmp

    Filesize

    64KB

  • memory/4584-172-0x0000000002570000-0x0000000002580000-memory.dmp

    Filesize

    64KB

  • memory/4584-139-0x0000000002570000-0x0000000002580000-memory.dmp

    Filesize

    64KB

  • memory/4584-171-0x0000000002570000-0x0000000002580000-memory.dmp

    Filesize

    64KB

  • memory/4584-170-0x0000000000400000-0x00000000005A3000-memory.dmp

    Filesize

    1.6MB

  • memory/4584-169-0x0000000002580000-0x0000000002592000-memory.dmp

    Filesize

    72KB

  • memory/4584-145-0x0000000002580000-0x0000000002592000-memory.dmp

    Filesize

    72KB

  • memory/4584-167-0x0000000002580000-0x0000000002592000-memory.dmp

    Filesize

    72KB

  • memory/4584-165-0x0000000002580000-0x0000000002592000-memory.dmp

    Filesize

    72KB

  • memory/4584-175-0x0000000000400000-0x00000000005A3000-memory.dmp

    Filesize

    1.6MB

  • memory/4584-143-0x0000000002580000-0x0000000002592000-memory.dmp

    Filesize

    72KB

  • memory/4584-141-0x0000000002580000-0x0000000002598000-memory.dmp

    Filesize

    96KB

  • memory/4584-157-0x0000000002580000-0x0000000002592000-memory.dmp

    Filesize

    72KB

  • memory/4584-155-0x0000000002580000-0x0000000002592000-memory.dmp

    Filesize

    72KB

  • memory/4584-153-0x0000000002580000-0x0000000002592000-memory.dmp

    Filesize

    72KB

  • memory/4584-151-0x0000000002580000-0x0000000002592000-memory.dmp

    Filesize

    72KB

  • memory/4584-149-0x0000000002580000-0x0000000002592000-memory.dmp

    Filesize

    72KB

  • memory/4584-147-0x0000000002580000-0x0000000002592000-memory.dmp

    Filesize

    72KB

  • memory/4584-159-0x0000000002580000-0x0000000002592000-memory.dmp

    Filesize

    72KB

  • memory/4584-140-0x0000000002570000-0x0000000002580000-memory.dmp

    Filesize

    64KB

  • memory/4584-138-0x0000000002570000-0x0000000002580000-memory.dmp

    Filesize

    64KB

  • memory/4584-137-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4584-136-0x0000000004C10000-0x000000000510E000-memory.dmp

    Filesize

    5.0MB

  • memory/4584-161-0x0000000002580000-0x0000000002592000-memory.dmp

    Filesize

    72KB