Analysis

  • max time kernel
    53s
  • max time network
    56s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02-04-2023 03:39

General

  • Target

    2fb47a402d6b363fda8730f065c73f2af1585e22ed9b73d14026264863c4e2fb.exe

  • Size

    530KB

  • MD5

    29a14432fe5834b83cb77c4de4ee26eb

  • SHA1

    3402d26e2207cc6abf9897be0e7d308031b0b101

  • SHA256

    2fb47a402d6b363fda8730f065c73f2af1585e22ed9b73d14026264863c4e2fb

  • SHA512

    2c824e5b22e4c51b7b0c582fe096b2a02d0dd773a43fa0014ec9cff92089e0094eb0108a40395f6f183f405e325715cff47fb6d3c8439bf7cb8d322b180a3084

  • SSDEEP

    12288:AMrYy90tlYQx3KipQLFaLtFpuXDT27F3GYbJNiBOBJBylYz:Iy4lvVBImtL8T271GKiBO7ByCz

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2fb47a402d6b363fda8730f065c73f2af1585e22ed9b73d14026264863c4e2fb.exe
    "C:\Users\Admin\AppData\Local\Temp\2fb47a402d6b363fda8730f065c73f2af1585e22ed9b73d14026264863c4e2fb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3200
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRH7666.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRH7666.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr897539.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr897539.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3324
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku125899.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku125899.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2552
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr285711.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr285711.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3052

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr285711.exe

    Filesize

    176KB

    MD5

    ee222f26afc75f047fbb80db7b3d74d8

    SHA1

    7db971904e6d728bc1dd8669b3a66c43d6796670

    SHA256

    6419de487ffbf91d6b4b7e0fef06351af78a4315cf50a8a40bc48b03382508b1

    SHA512

    de82294f737ff02629443cc8ea173cd804b1557f2478a3b6ea60e24b361a54d93a14b64d1664d04abe7fbe09f3328c4d0f394524ab19b33bfceaf74bfa7894e5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr285711.exe

    Filesize

    176KB

    MD5

    ee222f26afc75f047fbb80db7b3d74d8

    SHA1

    7db971904e6d728bc1dd8669b3a66c43d6796670

    SHA256

    6419de487ffbf91d6b4b7e0fef06351af78a4315cf50a8a40bc48b03382508b1

    SHA512

    de82294f737ff02629443cc8ea173cd804b1557f2478a3b6ea60e24b361a54d93a14b64d1664d04abe7fbe09f3328c4d0f394524ab19b33bfceaf74bfa7894e5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRH7666.exe

    Filesize

    388KB

    MD5

    62da3ffb1fc8a183de459e3af2961d2a

    SHA1

    f30d1be90f53c6cdc8020a5cc5a1413fc1c0527c

    SHA256

    44ef8a52d1331930ad392327e9fa4bc11572ef7e6af9ac3106cb4abc21b4b994

    SHA512

    9b490e10994995e2d7023265011a98314b7ff609748b40338faa2a21c7018820872a8d5732cb3ee33997b12a37ef55ee07d95b13e62d38661dbfd9f781f478de

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRH7666.exe

    Filesize

    388KB

    MD5

    62da3ffb1fc8a183de459e3af2961d2a

    SHA1

    f30d1be90f53c6cdc8020a5cc5a1413fc1c0527c

    SHA256

    44ef8a52d1331930ad392327e9fa4bc11572ef7e6af9ac3106cb4abc21b4b994

    SHA512

    9b490e10994995e2d7023265011a98314b7ff609748b40338faa2a21c7018820872a8d5732cb3ee33997b12a37ef55ee07d95b13e62d38661dbfd9f781f478de

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr897539.exe

    Filesize

    12KB

    MD5

    fcf7c6340707f582e561faaaaba95b55

    SHA1

    53dd28821a141f314bfbe2243c1561401466cc1e

    SHA256

    36474df79e8e5733dd915c62ace7d7e0a57cf3b7a68efd1df4f49d08f5800bdc

    SHA512

    f311ddcb7df9d446b7bb1ae25aa86200f9f0fd3a95dbf02233baa13548b870493bef294c05890cd15c3c5017176d08aef0154163c781aeb7b626f4c3abf6bb25

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr897539.exe

    Filesize

    12KB

    MD5

    fcf7c6340707f582e561faaaaba95b55

    SHA1

    53dd28821a141f314bfbe2243c1561401466cc1e

    SHA256

    36474df79e8e5733dd915c62ace7d7e0a57cf3b7a68efd1df4f49d08f5800bdc

    SHA512

    f311ddcb7df9d446b7bb1ae25aa86200f9f0fd3a95dbf02233baa13548b870493bef294c05890cd15c3c5017176d08aef0154163c781aeb7b626f4c3abf6bb25

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku125899.exe

    Filesize

    435KB

    MD5

    ac2bb665ead08f2ea3b56641098c846e

    SHA1

    13a9a1f1de19b497c705615413474ecbbd44dba6

    SHA256

    4981d9cd4244aa70e396b0b8d7efda060f78463a01588bc21fa7b4599993cb3c

    SHA512

    305022ef588d68ba6a293961fa0de1f1eb6dc33f03d919b5a07f61e989acf698c823f5ca41d00bb5da097108cdd58d6f8ddf4d0231c0d77ca8395486acbed827

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku125899.exe

    Filesize

    435KB

    MD5

    ac2bb665ead08f2ea3b56641098c846e

    SHA1

    13a9a1f1de19b497c705615413474ecbbd44dba6

    SHA256

    4981d9cd4244aa70e396b0b8d7efda060f78463a01588bc21fa7b4599993cb3c

    SHA512

    305022ef588d68ba6a293961fa0de1f1eb6dc33f03d919b5a07f61e989acf698c823f5ca41d00bb5da097108cdd58d6f8ddf4d0231c0d77ca8395486acbed827

  • memory/2552-141-0x00000000022E0000-0x000000000232B000-memory.dmp

    Filesize

    300KB

  • memory/2552-142-0x0000000004220000-0x0000000004230000-memory.dmp

    Filesize

    64KB

  • memory/2552-143-0x0000000004180000-0x00000000041C6000-memory.dmp

    Filesize

    280KB

  • memory/2552-144-0x0000000006880000-0x0000000006D7E000-memory.dmp

    Filesize

    5.0MB

  • memory/2552-145-0x0000000006D80000-0x0000000006DC4000-memory.dmp

    Filesize

    272KB

  • memory/2552-146-0x0000000004220000-0x0000000004230000-memory.dmp

    Filesize

    64KB

  • memory/2552-147-0x0000000004220000-0x0000000004230000-memory.dmp

    Filesize

    64KB

  • memory/2552-148-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-149-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-151-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-153-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-155-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-157-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-159-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-161-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-163-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-165-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-167-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-169-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-171-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-173-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-175-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-177-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-179-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-181-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-183-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-185-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-187-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-189-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-191-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-193-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-195-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-197-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-199-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-201-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-203-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-205-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-207-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-209-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-211-0x0000000006D80000-0x0000000006DBF000-memory.dmp

    Filesize

    252KB

  • memory/2552-1054-0x0000000006DF0000-0x00000000073F6000-memory.dmp

    Filesize

    6.0MB

  • memory/2552-1055-0x0000000007480000-0x000000000758A000-memory.dmp

    Filesize

    1.0MB

  • memory/2552-1056-0x00000000075C0000-0x00000000075D2000-memory.dmp

    Filesize

    72KB

  • memory/2552-1057-0x00000000075E0000-0x000000000761E000-memory.dmp

    Filesize

    248KB

  • memory/2552-1059-0x0000000004220000-0x0000000004230000-memory.dmp

    Filesize

    64KB

  • memory/2552-1058-0x0000000007730000-0x000000000777B000-memory.dmp

    Filesize

    300KB

  • memory/2552-1061-0x0000000004220000-0x0000000004230000-memory.dmp

    Filesize

    64KB

  • memory/2552-1062-0x0000000004220000-0x0000000004230000-memory.dmp

    Filesize

    64KB

  • memory/2552-1063-0x0000000004220000-0x0000000004230000-memory.dmp

    Filesize

    64KB

  • memory/2552-1064-0x00000000078C0000-0x0000000007952000-memory.dmp

    Filesize

    584KB

  • memory/2552-1065-0x0000000007960000-0x00000000079C6000-memory.dmp

    Filesize

    408KB

  • memory/2552-1066-0x0000000008060000-0x0000000008222000-memory.dmp

    Filesize

    1.8MB

  • memory/2552-1067-0x0000000008240000-0x000000000876C000-memory.dmp

    Filesize

    5.2MB

  • memory/2552-1068-0x0000000004220000-0x0000000004230000-memory.dmp

    Filesize

    64KB

  • memory/2552-1069-0x00000000089C0000-0x0000000008A36000-memory.dmp

    Filesize

    472KB

  • memory/2552-1070-0x0000000008A40000-0x0000000008A90000-memory.dmp

    Filesize

    320KB

  • memory/3052-1077-0x0000000000D20000-0x0000000000D52000-memory.dmp

    Filesize

    200KB

  • memory/3052-1078-0x0000000005760000-0x00000000057AB000-memory.dmp

    Filesize

    300KB

  • memory/3052-1079-0x00000000058B0000-0x00000000058C0000-memory.dmp

    Filesize

    64KB

  • memory/3324-135-0x0000000000680000-0x000000000068A000-memory.dmp

    Filesize

    40KB