Analysis

  • max time kernel
    68s
  • max time network
    131s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/04/2023, 02:47

General

  • Target

    3f20a1fb3b8c2707d5edef492cca736870d5d2a7d7cd5f728c979d5034a32064.exe

  • Size

    530KB

  • MD5

    ff1b74a6191ba4e95479aca88efa0476

  • SHA1

    f6d7f050ff76c8f7774be0e4907f22869b1aa5a9

  • SHA256

    3f20a1fb3b8c2707d5edef492cca736870d5d2a7d7cd5f728c979d5034a32064

  • SHA512

    a059d5cdab74f058c606f9049dd44935c5ccca85ee978fd763df1fe62ba9f792fca1a098361c4e4b33374a9dc31576cb199930d45855410a8e083408d6e8b9a9

  • SSDEEP

    12288:/Mrqy90WPynDSEvDYvgxvgT+lf5KXa/9lCU7m2vLAhm:Vy7PyFvDYvgxBASlCU7m2DA0

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f20a1fb3b8c2707d5edef492cca736870d5d2a7d7cd5f728c979d5034a32064.exe
    "C:\Users\Admin\AppData\Local\Temp\3f20a1fb3b8c2707d5edef492cca736870d5d2a7d7cd5f728c979d5034a32064.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2052
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWl2706.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWl2706.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2368
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr697718.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr697718.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2664
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku682269.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku682269.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2788
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr563572.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr563572.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4788

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr563572.exe

    Filesize

    176KB

    MD5

    2fac3ec1adfc93d02f71d66fa8553113

    SHA1

    40476002ffad33c56f4ac7dd568a5b4d6baedbf3

    SHA256

    88dd012f640cf3ed5d08884a2ecaaa0cf9716b8c332f7fa39ca2863f586b06c0

    SHA512

    1440d0d201ed4149f22cbdec399ea7ba3d73ccc2c024ecc987d25391a9ac0a043f7bab1f80c786615cc047cb00cf1d4b4b912f407d93b44df6cd7408c0c7584e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr563572.exe

    Filesize

    176KB

    MD5

    2fac3ec1adfc93d02f71d66fa8553113

    SHA1

    40476002ffad33c56f4ac7dd568a5b4d6baedbf3

    SHA256

    88dd012f640cf3ed5d08884a2ecaaa0cf9716b8c332f7fa39ca2863f586b06c0

    SHA512

    1440d0d201ed4149f22cbdec399ea7ba3d73ccc2c024ecc987d25391a9ac0a043f7bab1f80c786615cc047cb00cf1d4b4b912f407d93b44df6cd7408c0c7584e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWl2706.exe

    Filesize

    388KB

    MD5

    c5abc7da4e4d8aa73941b535ea11e745

    SHA1

    c26a052a797d7cfd847a33e142bab6f9e30446fc

    SHA256

    14b915521631cb9816205d8e8f2c73ef46a0c0643437f6e3d587614131bf613a

    SHA512

    985bb4b29a98c0a12bacedce3a049206b94266d0c1b9fd119b89ca697c51c0dd54f28cf28840b1234d2a1e961c9c316da4d78f43cd2bf58555f9b229a6997263

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziWl2706.exe

    Filesize

    388KB

    MD5

    c5abc7da4e4d8aa73941b535ea11e745

    SHA1

    c26a052a797d7cfd847a33e142bab6f9e30446fc

    SHA256

    14b915521631cb9816205d8e8f2c73ef46a0c0643437f6e3d587614131bf613a

    SHA512

    985bb4b29a98c0a12bacedce3a049206b94266d0c1b9fd119b89ca697c51c0dd54f28cf28840b1234d2a1e961c9c316da4d78f43cd2bf58555f9b229a6997263

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr697718.exe

    Filesize

    12KB

    MD5

    3b1e808e1fffc7080300b70f6a533b10

    SHA1

    92a751551133ee641f67eefb9c2999026955fd07

    SHA256

    1c516f2f1356143d94e92500926afa66fa5700d80928716bd5abc2140f3abdae

    SHA512

    0a03cc1a50fc82b59294d6c0d7544816b449a0262af70bdfa06eabf12fec7b72bc809d8cf3fed8001a158fd13cb23282f7e9cca9e49ca4575d61101be5bf1957

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr697718.exe

    Filesize

    12KB

    MD5

    3b1e808e1fffc7080300b70f6a533b10

    SHA1

    92a751551133ee641f67eefb9c2999026955fd07

    SHA256

    1c516f2f1356143d94e92500926afa66fa5700d80928716bd5abc2140f3abdae

    SHA512

    0a03cc1a50fc82b59294d6c0d7544816b449a0262af70bdfa06eabf12fec7b72bc809d8cf3fed8001a158fd13cb23282f7e9cca9e49ca4575d61101be5bf1957

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku682269.exe

    Filesize

    434KB

    MD5

    423595fc4302bab7cf0b6ef32a8f260d

    SHA1

    3833cc89d553ca384bda1953bd91016ca6084e4e

    SHA256

    0056c6cd23621ea1bb11dec8aa37358bc6a228b2b7f916d166a994b80f65fb87

    SHA512

    db31d61eb8deb8a7a13daa8bb45ae6591ca90a390b294f2e3b897ba0eef71d28afcdb016715df0e69868583eff65b1ab9e124a804d1916d3203a6fbfaa51f954

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku682269.exe

    Filesize

    434KB

    MD5

    423595fc4302bab7cf0b6ef32a8f260d

    SHA1

    3833cc89d553ca384bda1953bd91016ca6084e4e

    SHA256

    0056c6cd23621ea1bb11dec8aa37358bc6a228b2b7f916d166a994b80f65fb87

    SHA512

    db31d61eb8deb8a7a13daa8bb45ae6591ca90a390b294f2e3b897ba0eef71d28afcdb016715df0e69868583eff65b1ab9e124a804d1916d3203a6fbfaa51f954

  • memory/2664-135-0x0000000000BD0000-0x0000000000BDA000-memory.dmp

    Filesize

    40KB

  • memory/2788-141-0x0000000002680000-0x00000000026C6000-memory.dmp

    Filesize

    280KB

  • memory/2788-142-0x0000000004D60000-0x000000000525E000-memory.dmp

    Filesize

    5.0MB

  • memory/2788-143-0x0000000004B80000-0x0000000004BC4000-memory.dmp

    Filesize

    272KB

  • memory/2788-145-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-144-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-146-0x00000000005C0000-0x000000000060B000-memory.dmp

    Filesize

    300KB

  • memory/2788-148-0x0000000004D50000-0x0000000004D60000-memory.dmp

    Filesize

    64KB

  • memory/2788-149-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-150-0x0000000004D50000-0x0000000004D60000-memory.dmp

    Filesize

    64KB

  • memory/2788-162-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-164-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-172-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-170-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-174-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-168-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-166-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-184-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-188-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-200-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-202-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-210-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-208-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-206-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-204-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-198-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-196-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-194-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-192-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-190-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-186-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-182-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-180-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-178-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-176-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-160-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-158-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-156-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-154-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-152-0x0000000004B80000-0x0000000004BBF000-memory.dmp

    Filesize

    252KB

  • memory/2788-1053-0x0000000005260000-0x0000000005866000-memory.dmp

    Filesize

    6.0MB

  • memory/2788-1054-0x0000000004C40000-0x0000000004D4A000-memory.dmp

    Filesize

    1.0MB

  • memory/2788-1055-0x00000000058A0000-0x00000000058B2000-memory.dmp

    Filesize

    72KB

  • memory/2788-1056-0x00000000058C0000-0x00000000058FE000-memory.dmp

    Filesize

    248KB

  • memory/2788-1057-0x0000000005A10000-0x0000000005A5B000-memory.dmp

    Filesize

    300KB

  • memory/2788-1059-0x0000000005BA0000-0x0000000005C32000-memory.dmp

    Filesize

    584KB

  • memory/2788-1060-0x0000000005C40000-0x0000000005CA6000-memory.dmp

    Filesize

    408KB

  • memory/2788-1061-0x0000000004D50000-0x0000000004D60000-memory.dmp

    Filesize

    64KB

  • memory/2788-1062-0x0000000004D50000-0x0000000004D60000-memory.dmp

    Filesize

    64KB

  • memory/2788-1063-0x0000000004D50000-0x0000000004D60000-memory.dmp

    Filesize

    64KB

  • memory/2788-1064-0x0000000006450000-0x0000000006612000-memory.dmp

    Filesize

    1.8MB

  • memory/2788-1065-0x0000000006630000-0x0000000006B5C000-memory.dmp

    Filesize

    5.2MB

  • memory/2788-1066-0x0000000004D50000-0x0000000004D60000-memory.dmp

    Filesize

    64KB

  • memory/2788-1068-0x0000000006D10000-0x0000000006D60000-memory.dmp

    Filesize

    320KB

  • memory/2788-1067-0x0000000006C90000-0x0000000006D06000-memory.dmp

    Filesize

    472KB

  • memory/4788-1074-0x0000000000F10000-0x0000000000F42000-memory.dmp

    Filesize

    200KB

  • memory/4788-1075-0x0000000005820000-0x000000000586B000-memory.dmp

    Filesize

    300KB

  • memory/4788-1076-0x0000000005890000-0x00000000058A0000-memory.dmp

    Filesize

    64KB