Analysis

  • max time kernel
    52s
  • max time network
    54s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    01-04-2023 16:00

General

  • Target

    5adbeb665af651b67eccaa84f3bb6f8ae2d8f7e60f4719e76b08c65d5d8bb9f9.exe

  • Size

    659KB

  • MD5

    fbdc8b96f6cd66dd8cf0004115402459

  • SHA1

    bba4b4a695968244222cbab87e57af578ebb0903

  • SHA256

    5adbeb665af651b67eccaa84f3bb6f8ae2d8f7e60f4719e76b08c65d5d8bb9f9

  • SHA512

    4e4794ea11924f0e058b300dac78f133e4edebc20700a88da2276163c6b35aa2fa8100d60885176f75eb99be989798eb54a8afb6d8a2e3fa737da4690e903bec

  • SSDEEP

    12288:MMrAy90w4k4CLGqt2GNrO6qyGpKF5s4yvAjEspXsuKjlQoqBiUPidtUwiYV/Bw:syQE1dZO6qyVYvAjEsZUZQDDutUG/Bw

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5adbeb665af651b67eccaa84f3bb6f8ae2d8f7e60f4719e76b08c65d5d8bb9f9.exe
    "C:\Users\Admin\AppData\Local\Temp\5adbeb665af651b67eccaa84f3bb6f8ae2d8f7e60f4719e76b08c65d5d8bb9f9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4036
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un429305.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un429305.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8640.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8640.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3324
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5081.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5081.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2692
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si328054.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si328054.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3896

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si328054.exe

    Filesize

    175KB

    MD5

    b41d456c70f3f60f21dbb87fc524474f

    SHA1

    8327b3662770ea2d0a4b089895aa0ee1563faad1

    SHA256

    5e22e01f1efec0a8cc7a96bcfcf232965cf47ab4d75b02cc0c7dfdf3772ae962

    SHA512

    b4d4fce72cbb70606aad4af5d073f094567a790f019fd48efa6fa3c806bc6aaa1ea88554d494e1934f55c11534c0e2cab6bd1ed38d91ba940350d372e7f32e78

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si328054.exe

    Filesize

    175KB

    MD5

    b41d456c70f3f60f21dbb87fc524474f

    SHA1

    8327b3662770ea2d0a4b089895aa0ee1563faad1

    SHA256

    5e22e01f1efec0a8cc7a96bcfcf232965cf47ab4d75b02cc0c7dfdf3772ae962

    SHA512

    b4d4fce72cbb70606aad4af5d073f094567a790f019fd48efa6fa3c806bc6aaa1ea88554d494e1934f55c11534c0e2cab6bd1ed38d91ba940350d372e7f32e78

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un429305.exe

    Filesize

    516KB

    MD5

    7a4c8cb5928fbf3b2b3ec2f4edd7852c

    SHA1

    7e8426baf9c28e9b670c1629184884f759a5b0e7

    SHA256

    86e7b1b9ddcc19fc00dca1aad3af8c3a61c0abf1638f7b604622d9b307b91f23

    SHA512

    144b0674f9f52da4caa1e9812ae3de2620d6d4256317821a78552f535171fcd6ef4fddaaee7cfb6c2a196e8a90976cbd3ebbdd542b42e9c0d956b1b611dbdc7b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un429305.exe

    Filesize

    516KB

    MD5

    7a4c8cb5928fbf3b2b3ec2f4edd7852c

    SHA1

    7e8426baf9c28e9b670c1629184884f759a5b0e7

    SHA256

    86e7b1b9ddcc19fc00dca1aad3af8c3a61c0abf1638f7b604622d9b307b91f23

    SHA512

    144b0674f9f52da4caa1e9812ae3de2620d6d4256317821a78552f535171fcd6ef4fddaaee7cfb6c2a196e8a90976cbd3ebbdd542b42e9c0d956b1b611dbdc7b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8640.exe

    Filesize

    295KB

    MD5

    935a8f587c289f0306e88483f25f4dcb

    SHA1

    837a514c42d8781b3a55c6e9a848fef3dbb7e408

    SHA256

    ad75bb157b84547f8bb9220fe9f45406fb2c055a14ce642dfe8da2d99b09274a

    SHA512

    cefc367b53a5522e76c501ae1c14e554e93047e84f1a03112787c847c379a0cca97ba0f7067da886c64cabd743d35ebf8b671bd98034cebad5708a0c70adbddf

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8640.exe

    Filesize

    295KB

    MD5

    935a8f587c289f0306e88483f25f4dcb

    SHA1

    837a514c42d8781b3a55c6e9a848fef3dbb7e408

    SHA256

    ad75bb157b84547f8bb9220fe9f45406fb2c055a14ce642dfe8da2d99b09274a

    SHA512

    cefc367b53a5522e76c501ae1c14e554e93047e84f1a03112787c847c379a0cca97ba0f7067da886c64cabd743d35ebf8b671bd98034cebad5708a0c70adbddf

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5081.exe

    Filesize

    354KB

    MD5

    58f923dadfa19617ff4287d0113eb929

    SHA1

    40752857476a54cdc5a67d51b00a2cc55407d0b7

    SHA256

    edbf8013b1b7dd50be0d47c542b7a6827fd373255f94cffbd9532a84cfd43cea

    SHA512

    67675f05a69b735d005df78e983652ae44e7482c7cb99a0514be1e063099e1d71037c6ec60672ca428a68e3c864156f8e7b35815461e10bdf029614e4d3ffdb0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5081.exe

    Filesize

    354KB

    MD5

    58f923dadfa19617ff4287d0113eb929

    SHA1

    40752857476a54cdc5a67d51b00a2cc55407d0b7

    SHA256

    edbf8013b1b7dd50be0d47c542b7a6827fd373255f94cffbd9532a84cfd43cea

    SHA512

    67675f05a69b735d005df78e983652ae44e7482c7cb99a0514be1e063099e1d71037c6ec60672ca428a68e3c864156f8e7b35815461e10bdf029614e4d3ffdb0

  • memory/2692-218-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

    Filesize

    252KB

  • memory/2692-1093-0x0000000007E70000-0x0000000007E82000-memory.dmp

    Filesize

    72KB

  • memory/2692-1106-0x0000000008F60000-0x000000000948C000-memory.dmp

    Filesize

    5.2MB

  • memory/2692-1105-0x0000000008D90000-0x0000000008F52000-memory.dmp

    Filesize

    1.8MB

  • memory/2692-1103-0x0000000008BC0000-0x0000000008C10000-memory.dmp

    Filesize

    320KB

  • memory/2692-1102-0x0000000008B30000-0x0000000008BA6000-memory.dmp

    Filesize

    472KB

  • memory/2692-1101-0x0000000008210000-0x0000000008276000-memory.dmp

    Filesize

    408KB

  • memory/2692-1100-0x0000000008170000-0x0000000008202000-memory.dmp

    Filesize

    584KB

  • memory/2692-1099-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

    Filesize

    64KB

  • memory/2692-1098-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

    Filesize

    64KB

  • memory/2692-1097-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

    Filesize

    64KB

  • memory/2692-1095-0x0000000007FE0000-0x000000000802B000-memory.dmp

    Filesize

    300KB

  • memory/2692-1094-0x0000000007E90000-0x0000000007ECE000-memory.dmp

    Filesize

    248KB

  • memory/2692-195-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

    Filesize

    252KB

  • memory/2692-1092-0x0000000007D30000-0x0000000007E3A000-memory.dmp

    Filesize

    1.0MB

  • memory/2692-1091-0x00000000076E0000-0x0000000007CE6000-memory.dmp

    Filesize

    6.0MB

  • memory/2692-214-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

    Filesize

    64KB

  • memory/2692-216-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

    Filesize

    252KB

  • memory/2692-212-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

    Filesize

    252KB

  • memory/2692-213-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

    Filesize

    64KB

  • memory/2692-211-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

    Filesize

    64KB

  • memory/2692-209-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

    Filesize

    252KB

  • memory/2692-207-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

    Filesize

    252KB

  • memory/2692-179-0x0000000002C80000-0x0000000002CCB000-memory.dmp

    Filesize

    300KB

  • memory/2692-180-0x0000000004A00000-0x0000000004A46000-memory.dmp

    Filesize

    280KB

  • memory/2692-181-0x0000000004AE0000-0x0000000004B24000-memory.dmp

    Filesize

    272KB

  • memory/2692-182-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

    Filesize

    252KB

  • memory/2692-183-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

    Filesize

    252KB

  • memory/2692-185-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

    Filesize

    252KB

  • memory/2692-187-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

    Filesize

    252KB

  • memory/2692-197-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

    Filesize

    252KB

  • memory/2692-191-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

    Filesize

    252KB

  • memory/2692-203-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

    Filesize

    252KB

  • memory/2692-205-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

    Filesize

    252KB

  • memory/2692-189-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

    Filesize

    252KB

  • memory/2692-199-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

    Filesize

    252KB

  • memory/2692-201-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

    Filesize

    252KB

  • memory/2692-193-0x0000000004AE0000-0x0000000004B1F000-memory.dmp

    Filesize

    252KB

  • memory/3324-174-0x0000000000400000-0x0000000002B78000-memory.dmp

    Filesize

    39.5MB

  • memory/3324-146-0x0000000004910000-0x0000000004922000-memory.dmp

    Filesize

    72KB

  • memory/3324-140-0x00000000071E0000-0x00000000071F0000-memory.dmp

    Filesize

    64KB

  • memory/3324-156-0x0000000004910000-0x0000000004922000-memory.dmp

    Filesize

    72KB

  • memory/3324-172-0x00000000071E0000-0x00000000071F0000-memory.dmp

    Filesize

    64KB

  • memory/3324-171-0x0000000000400000-0x0000000002B78000-memory.dmp

    Filesize

    39.5MB

  • memory/3324-170-0x0000000004910000-0x0000000004922000-memory.dmp

    Filesize

    72KB

  • memory/3324-168-0x0000000004910000-0x0000000004922000-memory.dmp

    Filesize

    72KB

  • memory/3324-138-0x00000000071E0000-0x00000000071F0000-memory.dmp

    Filesize

    64KB

  • memory/3324-166-0x0000000004910000-0x0000000004922000-memory.dmp

    Filesize

    72KB

  • memory/3324-154-0x0000000004910000-0x0000000004922000-memory.dmp

    Filesize

    72KB

  • memory/3324-141-0x00000000071F0000-0x00000000076EE000-memory.dmp

    Filesize

    5.0MB

  • memory/3324-160-0x0000000004910000-0x0000000004922000-memory.dmp

    Filesize

    72KB

  • memory/3324-139-0x00000000071E0000-0x00000000071F0000-memory.dmp

    Filesize

    64KB

  • memory/3324-148-0x0000000004910000-0x0000000004922000-memory.dmp

    Filesize

    72KB

  • memory/3324-164-0x0000000004910000-0x0000000004922000-memory.dmp

    Filesize

    72KB

  • memory/3324-152-0x0000000004910000-0x0000000004922000-memory.dmp

    Filesize

    72KB

  • memory/3324-150-0x0000000004910000-0x0000000004922000-memory.dmp

    Filesize

    72KB

  • memory/3324-162-0x0000000004910000-0x0000000004922000-memory.dmp

    Filesize

    72KB

  • memory/3324-158-0x0000000004910000-0x0000000004922000-memory.dmp

    Filesize

    72KB

  • memory/3324-144-0x0000000004910000-0x0000000004922000-memory.dmp

    Filesize

    72KB

  • memory/3324-143-0x0000000004910000-0x0000000004922000-memory.dmp

    Filesize

    72KB

  • memory/3324-142-0x0000000004910000-0x0000000004928000-memory.dmp

    Filesize

    96KB

  • memory/3324-137-0x0000000002F80000-0x0000000002F9A000-memory.dmp

    Filesize

    104KB

  • memory/3324-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/3896-1112-0x0000000000030000-0x0000000000062000-memory.dmp

    Filesize

    200KB

  • memory/3896-1113-0x0000000004A70000-0x0000000004ABB000-memory.dmp

    Filesize

    300KB

  • memory/3896-1114-0x00000000048B0000-0x00000000048C0000-memory.dmp

    Filesize

    64KB