Analysis

  • max time kernel
    50s
  • max time network
    58s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01/04/2023, 07:18

General

  • Target

    2d92f6ffcbc618e2f6167b1d87d7ccd65ecf882b7289b615f32d9aaa85010606.exe

  • Size

    530KB

  • MD5

    c4db4b0facd64a4ed30aced06bd16c42

  • SHA1

    e309a19fabf2535e98cce230c303a4655faf567c

  • SHA256

    2d92f6ffcbc618e2f6167b1d87d7ccd65ecf882b7289b615f32d9aaa85010606

  • SHA512

    19464325d6c27cd0948263b6d7914a6a785d241fa846d9c15dc2d17288d06e7c3755821866d27c6074796f37954b6782b3225061dc545f8ccc419d42ec734dbe

  • SSDEEP

    12288:cMrey90bgbVMGImhrc7Qv9P23KYDpY28HKzL+6w/7Gb0QLraH6:iyfRMGIyc62Zk6o7GZnaa

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2d92f6ffcbc618e2f6167b1d87d7ccd65ecf882b7289b615f32d9aaa85010606.exe
    "C:\Users\Admin\AppData\Local\Temp\2d92f6ffcbc618e2f6167b1d87d7ccd65ecf882b7289b615f32d9aaa85010606.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3192
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimz5139.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimz5139.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4120
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr638739.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr638739.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku753953.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku753953.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4560
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr221057.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr221057.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4600

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr221057.exe

    Filesize

    176KB

    MD5

    bf7ff324e2c405065bfb283ef9c141c5

    SHA1

    a982b6b3a80c842e77f446e307b6bfcd56d70fb6

    SHA256

    017341e12b2635419a78f7337c60de75a3181e53473fa7538f122c906b231d0b

    SHA512

    94e97860cf92fbceee04b767c8443a02da16b280fa4bb61121279bd4e540903517bb9ad3ecce9eaf544a3d2aa766eee1b66060d1428a8134a1fa29471e57e983

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr221057.exe

    Filesize

    176KB

    MD5

    bf7ff324e2c405065bfb283ef9c141c5

    SHA1

    a982b6b3a80c842e77f446e307b6bfcd56d70fb6

    SHA256

    017341e12b2635419a78f7337c60de75a3181e53473fa7538f122c906b231d0b

    SHA512

    94e97860cf92fbceee04b767c8443a02da16b280fa4bb61121279bd4e540903517bb9ad3ecce9eaf544a3d2aa766eee1b66060d1428a8134a1fa29471e57e983

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimz5139.exe

    Filesize

    388KB

    MD5

    8a8e6dd0e2f34d2cef503dc009cb7420

    SHA1

    a6b1482a0ad5b776754e9f2e4222d89c11f96aca

    SHA256

    9eaefecf2f3b6dfd900d698845fe1f91dc342e8c96b648e38628edbfac02f539

    SHA512

    17772de3c1826f8ade3e89d489f822f277ffbc1e44348dbe9b21135fc6f03eae3d16a9741c2b76e171c8f48c183074a1c6ea75eab71770e3c5a9200b9ce56fa0

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zimz5139.exe

    Filesize

    388KB

    MD5

    8a8e6dd0e2f34d2cef503dc009cb7420

    SHA1

    a6b1482a0ad5b776754e9f2e4222d89c11f96aca

    SHA256

    9eaefecf2f3b6dfd900d698845fe1f91dc342e8c96b648e38628edbfac02f539

    SHA512

    17772de3c1826f8ade3e89d489f822f277ffbc1e44348dbe9b21135fc6f03eae3d16a9741c2b76e171c8f48c183074a1c6ea75eab71770e3c5a9200b9ce56fa0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr638739.exe

    Filesize

    12KB

    MD5

    b4b9751a82354ef0ba90f8b05f51b471

    SHA1

    0110c5dec95cedfbc6e13b223280c250c661354a

    SHA256

    a0d04058cc787fbb266ec7a804c4ece03dfccfedd9dc243d0af14183e533b813

    SHA512

    c94729cc55dc517bb89a202e0db5f68b5b476548cc6ef7c79c0c1e45fab60fb03da48232e008b72907958baf726a9f0ccc17ad788d26defc7303070ec3615152

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr638739.exe

    Filesize

    12KB

    MD5

    b4b9751a82354ef0ba90f8b05f51b471

    SHA1

    0110c5dec95cedfbc6e13b223280c250c661354a

    SHA256

    a0d04058cc787fbb266ec7a804c4ece03dfccfedd9dc243d0af14183e533b813

    SHA512

    c94729cc55dc517bb89a202e0db5f68b5b476548cc6ef7c79c0c1e45fab60fb03da48232e008b72907958baf726a9f0ccc17ad788d26defc7303070ec3615152

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku753953.exe

    Filesize

    342KB

    MD5

    3256d15667b206db287b08d5acee2b0f

    SHA1

    d45ef2cc1abf9718baf2317c3ac38edd4f758571

    SHA256

    1dafad64aa58228c87ec5e11bfb2b60f6d292901a4bf14ac5c42878f70fbefc6

    SHA512

    3b4a1eeb28e3ffd634632e412c30213a5278c9a25e8f59d85d9d9e4e6bf3713a9f08a4a42d322d5a80ee2730df650d955e6389bb7eccff346726b785a56fa480

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku753953.exe

    Filesize

    342KB

    MD5

    3256d15667b206db287b08d5acee2b0f

    SHA1

    d45ef2cc1abf9718baf2317c3ac38edd4f758571

    SHA256

    1dafad64aa58228c87ec5e11bfb2b60f6d292901a4bf14ac5c42878f70fbefc6

    SHA512

    3b4a1eeb28e3ffd634632e412c30213a5278c9a25e8f59d85d9d9e4e6bf3713a9f08a4a42d322d5a80ee2730df650d955e6389bb7eccff346726b785a56fa480

  • memory/4116-132-0x0000000000550000-0x000000000055A000-memory.dmp

    Filesize

    40KB

  • memory/4116-133-0x0000000000B10000-0x0000000000B99000-memory.dmp

    Filesize

    548KB

  • memory/4116-135-0x0000000000B10000-0x0000000000B99000-memory.dmp

    Filesize

    548KB

  • memory/4560-140-0x0000000004810000-0x0000000004856000-memory.dmp

    Filesize

    280KB

  • memory/4560-141-0x0000000002B90000-0x0000000002BDB000-memory.dmp

    Filesize

    300KB

  • memory/4560-142-0x0000000007520000-0x0000000007530000-memory.dmp

    Filesize

    64KB

  • memory/4560-143-0x0000000007530000-0x0000000007A2E000-memory.dmp

    Filesize

    5.0MB

  • memory/4560-144-0x0000000004B90000-0x0000000004BD4000-memory.dmp

    Filesize

    272KB

  • memory/4560-154-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4560-152-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4560-160-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4560-158-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4560-156-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4560-166-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4560-175-0x0000000007520000-0x0000000007530000-memory.dmp

    Filesize

    64KB

  • memory/4560-182-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4560-184-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4560-188-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4560-196-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4560-204-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4560-208-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4560-206-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4560-202-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4560-200-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4560-198-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4560-194-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4560-192-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4560-190-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4560-186-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4560-180-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4560-178-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4560-176-0x0000000007520000-0x0000000007530000-memory.dmp

    Filesize

    64KB

  • memory/4560-174-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4560-172-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4560-170-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4560-168-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4560-164-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4560-162-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4560-150-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4560-148-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4560-146-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4560-145-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/4560-1053-0x0000000007A30000-0x0000000008036000-memory.dmp

    Filesize

    6.0MB

  • memory/4560-1054-0x00000000073A0000-0x00000000074AA000-memory.dmp

    Filesize

    1.0MB

  • memory/4560-1055-0x0000000004CE0000-0x0000000004CF2000-memory.dmp

    Filesize

    72KB

  • memory/4560-1056-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/4560-1057-0x0000000007520000-0x0000000007530000-memory.dmp

    Filesize

    64KB

  • memory/4560-1058-0x0000000004E80000-0x0000000004ECB000-memory.dmp

    Filesize

    300KB

  • memory/4560-1060-0x0000000007520000-0x0000000007530000-memory.dmp

    Filesize

    64KB

  • memory/4560-1061-0x0000000007520000-0x0000000007530000-memory.dmp

    Filesize

    64KB

  • memory/4560-1062-0x0000000007520000-0x0000000007530000-memory.dmp

    Filesize

    64KB

  • memory/4560-1063-0x0000000008170000-0x0000000008202000-memory.dmp

    Filesize

    584KB

  • memory/4560-1064-0x0000000008210000-0x0000000008276000-memory.dmp

    Filesize

    408KB

  • memory/4560-1065-0x0000000008A10000-0x0000000008BD2000-memory.dmp

    Filesize

    1.8MB

  • memory/4560-1066-0x0000000008BE0000-0x000000000910C000-memory.dmp

    Filesize

    5.2MB

  • memory/4560-1067-0x0000000007520000-0x0000000007530000-memory.dmp

    Filesize

    64KB

  • memory/4560-1068-0x0000000009240000-0x00000000092B6000-memory.dmp

    Filesize

    472KB

  • memory/4560-1069-0x00000000092D0000-0x0000000009320000-memory.dmp

    Filesize

    320KB

  • memory/4600-1076-0x0000000000010000-0x0000000000042000-memory.dmp

    Filesize

    200KB

  • memory/4600-1077-0x0000000004A50000-0x0000000004A9B000-memory.dmp

    Filesize

    300KB

  • memory/4600-1078-0x00000000048D0000-0x00000000048E0000-memory.dmp

    Filesize

    64KB