Analysis

  • max time kernel
    58s
  • max time network
    72s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01/04/2023, 14:52

General

  • Target

    cf6145fce156810f68329b15c1e9ac6951dbc67ebb32ff8149a38c63af66e6ed.exe

  • Size

    530KB

  • MD5

    76315ad3045dd58e1c40834f91e36708

  • SHA1

    c88f5e6d260b88f159ef47f79c84f357e44ccc52

  • SHA256

    cf6145fce156810f68329b15c1e9ac6951dbc67ebb32ff8149a38c63af66e6ed

  • SHA512

    0e34013e2525aa461d55f989e86db941f55718bf0d9f232b7b21584da320041991037e3ca6b22bfb46f96cab06316249bf26affee3a9474bd363a5a909eff50a

  • SSDEEP

    12288:6Mruy90AGRaBm6vm97h1jCQgf0+EqAwKy/QzqBbFTqHkW86FYP:gyTasxvG7s0+EqANaQWmY68

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf6145fce156810f68329b15c1e9ac6951dbc67ebb32ff8149a38c63af66e6ed.exe
    "C:\Users\Admin\AppData\Local\Temp\cf6145fce156810f68329b15c1e9ac6951dbc67ebb32ff8149a38c63af66e6ed.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3992
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPY1084.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPY1084.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3840
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr795347.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr795347.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4920
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku711835.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku711835.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2116
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr045559.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr045559.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4816

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr045559.exe

          Filesize

          175KB

          MD5

          6ded39b3a52e5a99ad5c7d16e73a6b65

          SHA1

          46f2e47ad04111dd075f89ad82d2d8a5b57818f2

          SHA256

          173d063350cd9a952527eda2b7e3067bc0c9d8bd1042bcae6217305a2a53c162

          SHA512

          f3a0fb73e3e98ce6ffe7a626ff0808885d9f273ec0cfd4f2e885d47bcad59607e5d12646af8fa4806467ab4103ad0782a9c6b2a7de4540d7443b50428c0636d1

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr045559.exe

          Filesize

          175KB

          MD5

          6ded39b3a52e5a99ad5c7d16e73a6b65

          SHA1

          46f2e47ad04111dd075f89ad82d2d8a5b57818f2

          SHA256

          173d063350cd9a952527eda2b7e3067bc0c9d8bd1042bcae6217305a2a53c162

          SHA512

          f3a0fb73e3e98ce6ffe7a626ff0808885d9f273ec0cfd4f2e885d47bcad59607e5d12646af8fa4806467ab4103ad0782a9c6b2a7de4540d7443b50428c0636d1

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPY1084.exe

          Filesize

          388KB

          MD5

          ee8ce3cc0ba67fecd3e06087f87474da

          SHA1

          7c8d579d04d82294e8dee6342da01e0fbda46cae

          SHA256

          3ecdb5ae22814ff183907d77606376ae1abaaaf6b69248faeff2269a846c8341

          SHA512

          fa11ed7235c34160a330a32edc87587adbef522b40a63122d77061ccb6fb8888beb923bd34bc25c5865e0392189c7608c14b26722b36d866945b46c1db98f61d

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPY1084.exe

          Filesize

          388KB

          MD5

          ee8ce3cc0ba67fecd3e06087f87474da

          SHA1

          7c8d579d04d82294e8dee6342da01e0fbda46cae

          SHA256

          3ecdb5ae22814ff183907d77606376ae1abaaaf6b69248faeff2269a846c8341

          SHA512

          fa11ed7235c34160a330a32edc87587adbef522b40a63122d77061ccb6fb8888beb923bd34bc25c5865e0392189c7608c14b26722b36d866945b46c1db98f61d

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr795347.exe

          Filesize

          11KB

          MD5

          37e2a66b42c4fe831687ff9ab9df4c26

          SHA1

          5ab6dace7ae92427986c98a4851ccee3997b83be

          SHA256

          bf1f0306c54b28f012253c033d68e92867b877ffd217f63cae4c766488ee5801

          SHA512

          877cc32e344218d6332baa67b45490e554efd1cc7521773acb448368df85ac3fe5d2c3343b4219fffcdeb40990e039603527cb63acaac2790064f154f51af637

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr795347.exe

          Filesize

          11KB

          MD5

          37e2a66b42c4fe831687ff9ab9df4c26

          SHA1

          5ab6dace7ae92427986c98a4851ccee3997b83be

          SHA256

          bf1f0306c54b28f012253c033d68e92867b877ffd217f63cae4c766488ee5801

          SHA512

          877cc32e344218d6332baa67b45490e554efd1cc7521773acb448368df85ac3fe5d2c3343b4219fffcdeb40990e039603527cb63acaac2790064f154f51af637

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku711835.exe

          Filesize

          354KB

          MD5

          d1ab43bf9b3215ec9019b57f91532c84

          SHA1

          2076259fa39864362f28491a61b4b87624ecc408

          SHA256

          6da7d45e99ce6a00f9b907fa7ef93a6b01a991700da03a7fc02a690624940811

          SHA512

          901c41acae27129ced362babaf0070d8c52ed72346d5debf7628ad7ddb89ab0f93c9f143a9026872d3e082f2f9cd63b1bc4f6b81f62fb913f49f187cf83b7ed1

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku711835.exe

          Filesize

          354KB

          MD5

          d1ab43bf9b3215ec9019b57f91532c84

          SHA1

          2076259fa39864362f28491a61b4b87624ecc408

          SHA256

          6da7d45e99ce6a00f9b907fa7ef93a6b01a991700da03a7fc02a690624940811

          SHA512

          901c41acae27129ced362babaf0070d8c52ed72346d5debf7628ad7ddb89ab0f93c9f143a9026872d3e082f2f9cd63b1bc4f6b81f62fb913f49f187cf83b7ed1

        • memory/2116-139-0x0000000004940000-0x0000000004986000-memory.dmp

          Filesize

          280KB

        • memory/2116-140-0x0000000007300000-0x00000000077FE000-memory.dmp

          Filesize

          5.0MB

        • memory/2116-141-0x0000000002B90000-0x0000000002BDB000-memory.dmp

          Filesize

          300KB

        • memory/2116-144-0x00000000072F0000-0x0000000007300000-memory.dmp

          Filesize

          64KB

        • memory/2116-143-0x0000000004CB0000-0x0000000004CF4000-memory.dmp

          Filesize

          272KB

        • memory/2116-145-0x00000000072F0000-0x0000000007300000-memory.dmp

          Filesize

          64KB

        • memory/2116-142-0x00000000072F0000-0x0000000007300000-memory.dmp

          Filesize

          64KB

        • memory/2116-146-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-147-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-149-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-151-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-153-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-155-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-157-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-159-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-161-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-163-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-165-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-167-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-169-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-171-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-173-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-175-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-177-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-179-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-181-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-183-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-185-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-187-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-189-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-191-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-193-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-195-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-197-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-199-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-201-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-203-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-205-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-207-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-209-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

          Filesize

          252KB

        • memory/2116-1052-0x0000000007E10000-0x0000000008416000-memory.dmp

          Filesize

          6.0MB

        • memory/2116-1053-0x0000000007800000-0x000000000790A000-memory.dmp

          Filesize

          1.0MB

        • memory/2116-1054-0x0000000007240000-0x0000000007252000-memory.dmp

          Filesize

          72KB

        • memory/2116-1055-0x0000000007260000-0x000000000729E000-memory.dmp

          Filesize

          248KB

        • memory/2116-1056-0x0000000007A10000-0x0000000007A5B000-memory.dmp

          Filesize

          300KB

        • memory/2116-1057-0x00000000072F0000-0x0000000007300000-memory.dmp

          Filesize

          64KB

        • memory/2116-1059-0x0000000007B60000-0x0000000007BC6000-memory.dmp

          Filesize

          408KB

        • memory/2116-1060-0x00000000072F0000-0x0000000007300000-memory.dmp

          Filesize

          64KB

        • memory/2116-1061-0x00000000072F0000-0x0000000007300000-memory.dmp

          Filesize

          64KB

        • memory/2116-1062-0x00000000072F0000-0x0000000007300000-memory.dmp

          Filesize

          64KB

        • memory/2116-1063-0x0000000008980000-0x0000000008A12000-memory.dmp

          Filesize

          584KB

        • memory/2116-1064-0x0000000008B50000-0x0000000008BC6000-memory.dmp

          Filesize

          472KB

        • memory/2116-1065-0x0000000008BE0000-0x0000000008C30000-memory.dmp

          Filesize

          320KB

        • memory/2116-1066-0x00000000072F0000-0x0000000007300000-memory.dmp

          Filesize

          64KB

        • memory/2116-1067-0x0000000008D90000-0x0000000008F52000-memory.dmp

          Filesize

          1.8MB

        • memory/2116-1068-0x0000000008F60000-0x000000000948C000-memory.dmp

          Filesize

          5.2MB

        • memory/4816-1074-0x0000000000AA0000-0x0000000000AD2000-memory.dmp

          Filesize

          200KB

        • memory/4816-1075-0x00000000054E0000-0x000000000552B000-memory.dmp

          Filesize

          300KB

        • memory/4816-1076-0x0000000005610000-0x0000000005620000-memory.dmp

          Filesize

          64KB

        • memory/4920-133-0x00000000007D0000-0x00000000007DA000-memory.dmp

          Filesize

          40KB