Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01-04-2023 14:57

General

  • Target

    938e04bb7867e86926456a1f098fcd6c01f701603cd33114dcb6961d036ff2cc.exe

  • Size

    530KB

  • MD5

    5bebd341480796e42545b52b747ea9fa

  • SHA1

    a51a37635ac958b198255e6c028b189583ad69e8

  • SHA256

    938e04bb7867e86926456a1f098fcd6c01f701603cd33114dcb6961d036ff2cc

  • SHA512

    cfb9fa49a811296f1a2d25cc5cdf191460a31d43086d2db5eec050f172d74fa10d5c4f28964fc60ea2fd2cbfacbbac4a67ce2c20ded9028bf80fc4bc1a02d9cd

  • SSDEEP

    12288:mMrIy90+Xbg0LYp3IkYNZr6f8LtwFKwMQlqB/2dYXUPsc:CylnykVxwE/QEBUZ

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 36 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\938e04bb7867e86926456a1f098fcd6c01f701603cd33114dcb6961d036ff2cc.exe
    "C:\Users\Admin\AppData\Local\Temp\938e04bb7867e86926456a1f098fcd6c01f701603cd33114dcb6961d036ff2cc.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYg6900.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYg6900.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4936
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr388119.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr388119.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4692
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku681304.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku681304.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4176
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr423320.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr423320.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:768

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr423320.exe

    Filesize

    175KB

    MD5

    71c57d701ceba9537cd54208d77ee02b

    SHA1

    7f834ca9126388a025296bd8a4bb83c8b1a3c71d

    SHA256

    3a8f992f200d05f48b141656fe295d25eb2cce4fd2e5a796833e72be0d4186eb

    SHA512

    aff374920aeecb9db553233aed035f3e48a3ab64801ddb2c3f41afd9fc8b8bae0dd3f142f5a27a43b489db81d29fe6e18ecad4132e45bce18271df1c5a258cba

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr423320.exe

    Filesize

    175KB

    MD5

    71c57d701ceba9537cd54208d77ee02b

    SHA1

    7f834ca9126388a025296bd8a4bb83c8b1a3c71d

    SHA256

    3a8f992f200d05f48b141656fe295d25eb2cce4fd2e5a796833e72be0d4186eb

    SHA512

    aff374920aeecb9db553233aed035f3e48a3ab64801ddb2c3f41afd9fc8b8bae0dd3f142f5a27a43b489db81d29fe6e18ecad4132e45bce18271df1c5a258cba

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYg6900.exe

    Filesize

    388KB

    MD5

    40b492654674d354c914bf65aeacb99e

    SHA1

    87b0d5a54a105dbc7ba2b1b941b67a4184ac64a3

    SHA256

    3f2156904aa32f6f6ebe3efb3217fd3e17dda9863fab7cc3ca421e1728bc51e2

    SHA512

    9b927f0fe6cfdfd335b303c3122e64bbd87a48adc7d4b499327a739fe44285d59c6ed47e952de72a4cae83033e7f727e48e799a9f9e50624ecfd1b85abdd5b71

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYg6900.exe

    Filesize

    388KB

    MD5

    40b492654674d354c914bf65aeacb99e

    SHA1

    87b0d5a54a105dbc7ba2b1b941b67a4184ac64a3

    SHA256

    3f2156904aa32f6f6ebe3efb3217fd3e17dda9863fab7cc3ca421e1728bc51e2

    SHA512

    9b927f0fe6cfdfd335b303c3122e64bbd87a48adc7d4b499327a739fe44285d59c6ed47e952de72a4cae83033e7f727e48e799a9f9e50624ecfd1b85abdd5b71

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr388119.exe

    Filesize

    11KB

    MD5

    f1192cacffcfa84eb702b9ba7a3afeeb

    SHA1

    ca4e6ccf69873de09572dad637cb6fa05e201bd7

    SHA256

    3517a090418034893dac026a3440e3352e75bb58008542434e0fd2d7e0d14700

    SHA512

    1778b77dc634b22f73dcbd0a697c347ce7d9373d6d0029f6440414844108e87ae6543ab6124651489ad853c37ea9bfaf5dbf3cec365d85f1244f0c04a5d8dbb0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr388119.exe

    Filesize

    11KB

    MD5

    f1192cacffcfa84eb702b9ba7a3afeeb

    SHA1

    ca4e6ccf69873de09572dad637cb6fa05e201bd7

    SHA256

    3517a090418034893dac026a3440e3352e75bb58008542434e0fd2d7e0d14700

    SHA512

    1778b77dc634b22f73dcbd0a697c347ce7d9373d6d0029f6440414844108e87ae6543ab6124651489ad853c37ea9bfaf5dbf3cec365d85f1244f0c04a5d8dbb0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku681304.exe

    Filesize

    354KB

    MD5

    c46dd5efa96b0d986d8a566b4caf27dc

    SHA1

    05b8de95a828a8a9bf1e1e18ada09cb9ecc67223

    SHA256

    0982f1c6820878fa7767f3feaa2633caef4a43b153c3cceab055e23afff3bb81

    SHA512

    59a1fa0c47bc42541ef18d038497254a3d26dc24e95c7b1055549b7239cbcb2fc9f827e3ae6b6b55733e48c9b6492aee9d452ebd4f91c2ee6c0b4db3effb58e8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku681304.exe

    Filesize

    354KB

    MD5

    c46dd5efa96b0d986d8a566b4caf27dc

    SHA1

    05b8de95a828a8a9bf1e1e18ada09cb9ecc67223

    SHA256

    0982f1c6820878fa7767f3feaa2633caef4a43b153c3cceab055e23afff3bb81

    SHA512

    59a1fa0c47bc42541ef18d038497254a3d26dc24e95c7b1055549b7239cbcb2fc9f827e3ae6b6b55733e48c9b6492aee9d452ebd4f91c2ee6c0b4db3effb58e8

  • memory/768-1076-0x0000000000FE0000-0x0000000001012000-memory.dmp

    Filesize

    200KB

  • memory/768-1077-0x0000000005900000-0x0000000005910000-memory.dmp

    Filesize

    64KB

  • memory/768-1078-0x0000000005A20000-0x0000000005A6B000-memory.dmp

    Filesize

    300KB

  • memory/4176-181-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-193-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-144-0x00000000070F0000-0x0000000007134000-memory.dmp

    Filesize

    272KB

  • memory/4176-146-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-145-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-148-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-150-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-152-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-155-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-156-0x0000000007180000-0x0000000007190000-memory.dmp

    Filesize

    64KB

  • memory/4176-157-0x0000000007180000-0x0000000007190000-memory.dmp

    Filesize

    64KB

  • memory/4176-154-0x0000000007180000-0x0000000007190000-memory.dmp

    Filesize

    64KB

  • memory/4176-159-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-161-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-163-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-165-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-167-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-169-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-171-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-173-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-175-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-177-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-179-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-142-0x0000000004750000-0x0000000004796000-memory.dmp

    Filesize

    280KB

  • memory/4176-183-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-185-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-187-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-189-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-191-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-143-0x0000000007190000-0x000000000768E000-memory.dmp

    Filesize

    5.0MB

  • memory/4176-195-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-197-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-199-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-201-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-203-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-205-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-207-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-209-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-211-0x00000000070F0000-0x000000000712F000-memory.dmp

    Filesize

    252KB

  • memory/4176-1054-0x0000000007CB0000-0x00000000082B6000-memory.dmp

    Filesize

    6.0MB

  • memory/4176-1055-0x0000000007720000-0x000000000782A000-memory.dmp

    Filesize

    1.0MB

  • memory/4176-1056-0x0000000007860000-0x0000000007872000-memory.dmp

    Filesize

    72KB

  • memory/4176-1057-0x0000000007880000-0x00000000078BE000-memory.dmp

    Filesize

    248KB

  • memory/4176-1058-0x00000000079D0000-0x0000000007A1B000-memory.dmp

    Filesize

    300KB

  • memory/4176-1059-0x0000000007180000-0x0000000007190000-memory.dmp

    Filesize

    64KB

  • memory/4176-1061-0x0000000007B60000-0x0000000007BC6000-memory.dmp

    Filesize

    408KB

  • memory/4176-1062-0x0000000007180000-0x0000000007190000-memory.dmp

    Filesize

    64KB

  • memory/4176-1063-0x0000000007180000-0x0000000007190000-memory.dmp

    Filesize

    64KB

  • memory/4176-1064-0x0000000007180000-0x0000000007190000-memory.dmp

    Filesize

    64KB

  • memory/4176-1065-0x0000000008840000-0x00000000088D2000-memory.dmp

    Filesize

    584KB

  • memory/4176-1066-0x0000000008A10000-0x0000000008BD2000-memory.dmp

    Filesize

    1.8MB

  • memory/4176-141-0x0000000002C80000-0x0000000002CCB000-memory.dmp

    Filesize

    300KB

  • memory/4176-1067-0x0000000008C00000-0x000000000912C000-memory.dmp

    Filesize

    5.2MB

  • memory/4176-1068-0x0000000009260000-0x00000000092D6000-memory.dmp

    Filesize

    472KB

  • memory/4176-1069-0x00000000092E0000-0x0000000009330000-memory.dmp

    Filesize

    320KB

  • memory/4176-1070-0x0000000007180000-0x0000000007190000-memory.dmp

    Filesize

    64KB

  • memory/4692-135-0x00000000009F0000-0x00000000009FA000-memory.dmp

    Filesize

    40KB