Analysis

  • max time kernel
    55s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/04/2023, 04:54

General

  • Target

    3f4bbaa3d49ad90d3b537326f827766f60fa50dbdd5f2c4769df85da7a5953cb.exe

  • Size

    531KB

  • MD5

    bea396cd89d8e21ebe945f6725acc678

  • SHA1

    8622ced4d8bce9dd00b32d0ffa44214f0ce3323b

  • SHA256

    3f4bbaa3d49ad90d3b537326f827766f60fa50dbdd5f2c4769df85da7a5953cb

  • SHA512

    5b4340b37bde92db560c33224d5c40c577975b853bacbfd9ed945e00acbbabf75ced9edf26116019ebe36bd0af2ac7f1cf27db5a05db02758820b79e8cf603e8

  • SSDEEP

    12288:bMrWy902As3+g/d1BKyaUDu4g6+uXld2MUflxApnL8w:dyOGSAd2Lflx6Iw

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f4bbaa3d49ad90d3b537326f827766f60fa50dbdd5f2c4769df85da7a5953cb.exe
    "C:\Users\Admin\AppData\Local\Temp\3f4bbaa3d49ad90d3b537326f827766f60fa50dbdd5f2c4769df85da7a5953cb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4108
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNx1932.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNx1932.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:384
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr486582.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr486582.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4504
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku233432.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku233432.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4596
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr212832.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr212832.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4556

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr212832.exe

          Filesize

          176KB

          MD5

          c651332e6d0ffe9637ee1cd30446667e

          SHA1

          8115e32cc1cc0d82903ee7b7505bdcb2f3e20a05

          SHA256

          d796fb01e1c36fa946b80fc3cc6a5746b61b3348d91594c059d0358b93c93b46

          SHA512

          32200f29cf3f06633e7fde9620432e5e857ad3c6fcfe479fe8a7179d6863c2afece40b76eeb5ef4d9653bab3b77ace7e2ca21fed991c97fb3c9b2a0dcc2a1e8b

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr212832.exe

          Filesize

          176KB

          MD5

          c651332e6d0ffe9637ee1cd30446667e

          SHA1

          8115e32cc1cc0d82903ee7b7505bdcb2f3e20a05

          SHA256

          d796fb01e1c36fa946b80fc3cc6a5746b61b3348d91594c059d0358b93c93b46

          SHA512

          32200f29cf3f06633e7fde9620432e5e857ad3c6fcfe479fe8a7179d6863c2afece40b76eeb5ef4d9653bab3b77ace7e2ca21fed991c97fb3c9b2a0dcc2a1e8b

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNx1932.exe

          Filesize

          389KB

          MD5

          7fa72b079c8ba8c264d9a77736e17f43

          SHA1

          7e01ce43a4bcb8a260d41315c41eddce6ebcdafe

          SHA256

          7cf0b958e3a4c0d892c6ef91a25d7268e47efeea19bc8d3153dce9b8fe2ea9c7

          SHA512

          92c4786ba3abe4122614e44b5e3a9c3440160f2b1f54e30c1c30a2a1531c693ec57d07a8c3950caded239190c15f42b6dbd8399349f5d7706619ad48898e290c

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziNx1932.exe

          Filesize

          389KB

          MD5

          7fa72b079c8ba8c264d9a77736e17f43

          SHA1

          7e01ce43a4bcb8a260d41315c41eddce6ebcdafe

          SHA256

          7cf0b958e3a4c0d892c6ef91a25d7268e47efeea19bc8d3153dce9b8fe2ea9c7

          SHA512

          92c4786ba3abe4122614e44b5e3a9c3440160f2b1f54e30c1c30a2a1531c693ec57d07a8c3950caded239190c15f42b6dbd8399349f5d7706619ad48898e290c

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr486582.exe

          Filesize

          12KB

          MD5

          2f68d4ad30142c3303a461608773ebbf

          SHA1

          8fb39ab02927a18919ac41b1cec2b39a69d50cec

          SHA256

          63e87be853e2e896a77fb4b670c7e9b6902545eec151a41afb48504235628c87

          SHA512

          1cedccc354c1cd101ed581d27dd596574c169855bd9dc7634b9f9b7fae00f574b4f268ef6678b753167265ff22900145ff58c656e9de4bf97545fa09a72f904f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr486582.exe

          Filesize

          12KB

          MD5

          2f68d4ad30142c3303a461608773ebbf

          SHA1

          8fb39ab02927a18919ac41b1cec2b39a69d50cec

          SHA256

          63e87be853e2e896a77fb4b670c7e9b6902545eec151a41afb48504235628c87

          SHA512

          1cedccc354c1cd101ed581d27dd596574c169855bd9dc7634b9f9b7fae00f574b4f268ef6678b753167265ff22900145ff58c656e9de4bf97545fa09a72f904f

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku233432.exe

          Filesize

          435KB

          MD5

          ef3ecfe3830ea670084b361ebc175089

          SHA1

          7befb40429ea8de0995433df3cef22dc58795bfa

          SHA256

          d235051f03c7ef73662b74511d0931a5229e209e6c2465f80ac7df44c177cd0e

          SHA512

          1f23bf09c9c12650c6a33c727e58f266fe704eb3c44fab68987010942801eedf53bf743789eabac123465d6aa4098af3ae76b2d4f92c7842bc3940c8778d42ad

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku233432.exe

          Filesize

          435KB

          MD5

          ef3ecfe3830ea670084b361ebc175089

          SHA1

          7befb40429ea8de0995433df3cef22dc58795bfa

          SHA256

          d235051f03c7ef73662b74511d0931a5229e209e6c2465f80ac7df44c177cd0e

          SHA512

          1f23bf09c9c12650c6a33c727e58f266fe704eb3c44fab68987010942801eedf53bf743789eabac123465d6aa4098af3ae76b2d4f92c7842bc3940c8778d42ad

        • memory/4504-133-0x00000000006F0000-0x00000000006FA000-memory.dmp

          Filesize

          40KB

        • memory/4556-1072-0x0000000000BD0000-0x0000000000C02000-memory.dmp

          Filesize

          200KB

        • memory/4556-1073-0x0000000005610000-0x000000000565B000-memory.dmp

          Filesize

          300KB

        • memory/4556-1074-0x0000000005490000-0x00000000054A0000-memory.dmp

          Filesize

          64KB

        • memory/4596-173-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-187-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-143-0x0000000004310000-0x0000000004354000-memory.dmp

          Filesize

          272KB

        • memory/4596-144-0x0000000004060000-0x0000000004070000-memory.dmp

          Filesize

          64KB

        • memory/4596-145-0x0000000004060000-0x0000000004070000-memory.dmp

          Filesize

          64KB

        • memory/4596-142-0x0000000004060000-0x0000000004070000-memory.dmp

          Filesize

          64KB

        • memory/4596-146-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-147-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-149-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-151-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-153-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-155-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-157-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-159-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-161-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-163-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-165-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-167-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-169-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-171-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-140-0x0000000006960000-0x0000000006E5E000-memory.dmp

          Filesize

          5.0MB

        • memory/4596-175-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-177-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-179-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-181-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-183-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-185-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-141-0x00000000023E0000-0x000000000242B000-memory.dmp

          Filesize

          300KB

        • memory/4596-189-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-191-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-193-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-195-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-197-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-199-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-201-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-203-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-205-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-207-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-209-0x0000000004310000-0x000000000434F000-memory.dmp

          Filesize

          252KB

        • memory/4596-1052-0x0000000007470000-0x0000000007A76000-memory.dmp

          Filesize

          6.0MB

        • memory/4596-1053-0x0000000006E70000-0x0000000006F7A000-memory.dmp

          Filesize

          1.0MB

        • memory/4596-1054-0x0000000006FB0000-0x0000000006FC2000-memory.dmp

          Filesize

          72KB

        • memory/4596-1055-0x0000000006FD0000-0x000000000700E000-memory.dmp

          Filesize

          248KB

        • memory/4596-1056-0x0000000007120000-0x000000000716B000-memory.dmp

          Filesize

          300KB

        • memory/4596-1057-0x0000000004060000-0x0000000004070000-memory.dmp

          Filesize

          64KB

        • memory/4596-1059-0x0000000004060000-0x0000000004070000-memory.dmp

          Filesize

          64KB

        • memory/4596-1060-0x00000000073B0000-0x0000000007416000-memory.dmp

          Filesize

          408KB

        • memory/4596-1061-0x0000000008080000-0x0000000008112000-memory.dmp

          Filesize

          584KB

        • memory/4596-139-0x0000000004070000-0x00000000040B6000-memory.dmp

          Filesize

          280KB

        • memory/4596-1062-0x0000000008120000-0x0000000008196000-memory.dmp

          Filesize

          472KB

        • memory/4596-1063-0x00000000081C0000-0x0000000008210000-memory.dmp

          Filesize

          320KB

        • memory/4596-1065-0x0000000008350000-0x0000000008512000-memory.dmp

          Filesize

          1.8MB

        • memory/4596-1066-0x0000000008520000-0x0000000008A4C000-memory.dmp

          Filesize

          5.2MB