Analysis

  • max time kernel
    149s
  • max time network
    62s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01-04-2023 13:39

General

  • Target

    5d264870bc442154620779b72d3c4c52afd8c29c178718dd940f3184ed9a637c.exe

  • Size

    530KB

  • MD5

    b29316321ebc0d0822cc41b382cc91e4

  • SHA1

    8d27125fe7083989a8eb2dd6c359a1a89559a253

  • SHA256

    5d264870bc442154620779b72d3c4c52afd8c29c178718dd940f3184ed9a637c

  • SHA512

    8938b819933a9235df8b44b8d16d06314b18e016b42a0547ad29ca66bdda55e99877622c512f37eb2754843f916a8d4747bb8bcda02cc13e0a69fc651c6f040f

  • SSDEEP

    12288:SMr8y90WMTAcDMJ8ZYxCb1PVgwccZ66Qr936o0g80mzL:yylyKxCb1POfnr9q28lL

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 36 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d264870bc442154620779b72d3c4c52afd8c29c178718dd940f3184ed9a637c.exe
    "C:\Users\Admin\AppData\Local\Temp\5d264870bc442154620779b72d3c4c52afd8c29c178718dd940f3184ed9a637c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4152
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziqV3904.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziqV3904.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2132
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr154624.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr154624.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4556
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku496118.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku496118.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4888
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr838797.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr838797.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3080

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr838797.exe

    Filesize

    175KB

    MD5

    001ae1863ba1969706f1e5952991250c

    SHA1

    470c852b3400f93eb132fbdfdc4d4c0fe5674f7e

    SHA256

    dc547bf2c51ef26d9c2ccc78367e27c388739ebffcfdf985058c06fb06269bea

    SHA512

    08963d2facde2ac7ac1896b7faf4cb90a0860d94877ae7728990ea718da460a1630bd705d213c4a9cca3910f3e7246c3a4864c09e2052ac6a149530317312f81

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr838797.exe

    Filesize

    175KB

    MD5

    001ae1863ba1969706f1e5952991250c

    SHA1

    470c852b3400f93eb132fbdfdc4d4c0fe5674f7e

    SHA256

    dc547bf2c51ef26d9c2ccc78367e27c388739ebffcfdf985058c06fb06269bea

    SHA512

    08963d2facde2ac7ac1896b7faf4cb90a0860d94877ae7728990ea718da460a1630bd705d213c4a9cca3910f3e7246c3a4864c09e2052ac6a149530317312f81

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziqV3904.exe

    Filesize

    388KB

    MD5

    22fd0aa582756bf5cce2ac3762883cb7

    SHA1

    1991e7c26b5cf1c7b17d2dd74a93307382920182

    SHA256

    ff1e975eea150a1e6384da28b04f757c710c5a71108b452f46a8817d8f561252

    SHA512

    3a89b1e3486a65469620ba493bca6fed242b8cddba55f5137d27c4a74eb13c0c6fb9d96a5d831d9a02c458114f3f18ec95f9cfee8d6be06579e8d632dabc5530

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziqV3904.exe

    Filesize

    388KB

    MD5

    22fd0aa582756bf5cce2ac3762883cb7

    SHA1

    1991e7c26b5cf1c7b17d2dd74a93307382920182

    SHA256

    ff1e975eea150a1e6384da28b04f757c710c5a71108b452f46a8817d8f561252

    SHA512

    3a89b1e3486a65469620ba493bca6fed242b8cddba55f5137d27c4a74eb13c0c6fb9d96a5d831d9a02c458114f3f18ec95f9cfee8d6be06579e8d632dabc5530

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr154624.exe

    Filesize

    11KB

    MD5

    b968cb5ee58d2be7a39da9dbe566c5e2

    SHA1

    4c5aee95f0541f56342489494fb55f4540861903

    SHA256

    2706a36e942b9cc9fa797c7cf817d554238b8dfa1f71ef0fa6e3706382627356

    SHA512

    c8ec877350d9ac098b194c2b1a3ecec27f9d198e91064ab5a016879df16e8d5caaa9077ad210ffd623f0ffec9502ae00e4e312d577027f1ef2ab15af966f37c1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr154624.exe

    Filesize

    11KB

    MD5

    b968cb5ee58d2be7a39da9dbe566c5e2

    SHA1

    4c5aee95f0541f56342489494fb55f4540861903

    SHA256

    2706a36e942b9cc9fa797c7cf817d554238b8dfa1f71ef0fa6e3706382627356

    SHA512

    c8ec877350d9ac098b194c2b1a3ecec27f9d198e91064ab5a016879df16e8d5caaa9077ad210ffd623f0ffec9502ae00e4e312d577027f1ef2ab15af966f37c1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku496118.exe

    Filesize

    355KB

    MD5

    0c2c0387eb0b2076100d8cc350eabd8c

    SHA1

    9ed6dd4c1eaa4634d02b3408bfee6fc53b2c0257

    SHA256

    66a7dd787fca45b2e125a0ba3809fc9ebf5eb6bc425bf0cb396f9b1d870934a5

    SHA512

    fadcd2a8a1e467a836a2d413140fa06f7f06a3b0a96b8cfe72d034e36247bc9b70cf0eb5799e8ac5aaeca85f8473ea2cbfad75114b357cdc4a8a2b7e8b7f7dee

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku496118.exe

    Filesize

    355KB

    MD5

    0c2c0387eb0b2076100d8cc350eabd8c

    SHA1

    9ed6dd4c1eaa4634d02b3408bfee6fc53b2c0257

    SHA256

    66a7dd787fca45b2e125a0ba3809fc9ebf5eb6bc425bf0cb396f9b1d870934a5

    SHA512

    fadcd2a8a1e467a836a2d413140fa06f7f06a3b0a96b8cfe72d034e36247bc9b70cf0eb5799e8ac5aaeca85f8473ea2cbfad75114b357cdc4a8a2b7e8b7f7dee

  • memory/3080-1075-0x00000000008D0000-0x0000000000902000-memory.dmp

    Filesize

    200KB

  • memory/3080-1076-0x0000000005310000-0x000000000535B000-memory.dmp

    Filesize

    300KB

  • memory/3080-1078-0x00000000054B0000-0x00000000054C0000-memory.dmp

    Filesize

    64KB

  • memory/3080-1077-0x00000000054B0000-0x00000000054C0000-memory.dmp

    Filesize

    64KB

  • memory/4556-134-0x0000000000C00000-0x0000000000C0A000-memory.dmp

    Filesize

    40KB

  • memory/4888-178-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-190-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-144-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-145-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-147-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-149-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-151-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-153-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-155-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-158-0x0000000004990000-0x00000000049A0000-memory.dmp

    Filesize

    64KB

  • memory/4888-157-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-160-0x0000000004990000-0x00000000049A0000-memory.dmp

    Filesize

    64KB

  • memory/4888-162-0x0000000004990000-0x00000000049A0000-memory.dmp

    Filesize

    64KB

  • memory/4888-161-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-164-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-166-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-168-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-170-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-172-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-174-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-176-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-142-0x0000000007140000-0x000000000763E000-memory.dmp

    Filesize

    5.0MB

  • memory/4888-180-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-182-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-184-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-186-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-188-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-143-0x0000000007680000-0x00000000076C4000-memory.dmp

    Filesize

    272KB

  • memory/4888-192-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-194-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-196-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-198-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-200-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-202-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-204-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-206-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-208-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-210-0x0000000007680000-0x00000000076BF000-memory.dmp

    Filesize

    252KB

  • memory/4888-1053-0x0000000007E10000-0x0000000008416000-memory.dmp

    Filesize

    6.0MB

  • memory/4888-1054-0x0000000007860000-0x000000000796A000-memory.dmp

    Filesize

    1.0MB

  • memory/4888-1055-0x00000000079A0000-0x00000000079B2000-memory.dmp

    Filesize

    72KB

  • memory/4888-1056-0x00000000079C0000-0x00000000079FE000-memory.dmp

    Filesize

    248KB

  • memory/4888-1057-0x0000000004990000-0x00000000049A0000-memory.dmp

    Filesize

    64KB

  • memory/4888-1058-0x0000000007B10000-0x0000000007B5B000-memory.dmp

    Filesize

    300KB

  • memory/4888-1060-0x0000000007CA0000-0x0000000007D06000-memory.dmp

    Filesize

    408KB

  • memory/4888-1061-0x0000000008970000-0x0000000008A02000-memory.dmp

    Filesize

    584KB

  • memory/4888-1062-0x0000000008B60000-0x0000000008D22000-memory.dmp

    Filesize

    1.8MB

  • memory/4888-1063-0x0000000008D30000-0x000000000925C000-memory.dmp

    Filesize

    5.2MB

  • memory/4888-1064-0x0000000004990000-0x00000000049A0000-memory.dmp

    Filesize

    64KB

  • memory/4888-1065-0x0000000004990000-0x00000000049A0000-memory.dmp

    Filesize

    64KB

  • memory/4888-141-0x0000000004BE0000-0x0000000004C26000-memory.dmp

    Filesize

    280KB

  • memory/4888-140-0x0000000002B90000-0x0000000002BDB000-memory.dmp

    Filesize

    300KB

  • memory/4888-1066-0x0000000004990000-0x00000000049A0000-memory.dmp

    Filesize

    64KB

  • memory/4888-1067-0x00000000094D0000-0x0000000009546000-memory.dmp

    Filesize

    472KB

  • memory/4888-1068-0x0000000009550000-0x00000000095A0000-memory.dmp

    Filesize

    320KB

  • memory/4888-1069-0x0000000004990000-0x00000000049A0000-memory.dmp

    Filesize

    64KB