Analysis

  • max time kernel
    55s
  • max time network
    65s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02-04-2023 06:35

General

  • Target

    98d3126bdf53362ba47bd2f2418d2bf626898652d7fafc63fff9f8cf676639b4.exe

  • Size

    659KB

  • MD5

    1fa3d6a4e919077d9617f75b7d65f629

  • SHA1

    0c118c870d1a3ef21ccbe6485407e3b0efa06052

  • SHA256

    98d3126bdf53362ba47bd2f2418d2bf626898652d7fafc63fff9f8cf676639b4

  • SHA512

    4430501aaf537b267e342312907b5b51bbaccb5531bc5bfddb0bf18cc420e9d573180306114c7a17305de754d2e82c229200c6588b685bf9053d2eb5f2fa2cd3

  • SSDEEP

    12288:dMriy90lGEujaU07pGLsGW60BUguHzRe9Ohk7EkF+6tiMGSNq9:LyJtwQL06PdFHh+EE3t7GSNc

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98d3126bdf53362ba47bd2f2418d2bf626898652d7fafc63fff9f8cf676639b4.exe
    "C:\Users\Admin\AppData\Local\Temp\98d3126bdf53362ba47bd2f2418d2bf626898652d7fafc63fff9f8cf676639b4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un181824.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un181824.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2388
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4803.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4803.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2516
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3329.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3329.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2808
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si726868.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si726868.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4072

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si726868.exe

    Filesize

    176KB

    MD5

    7a126abf27f74bb2c3c504a73203ce2b

    SHA1

    60723a0347717ceb750a3042fc254fcf2e868c53

    SHA256

    096c257f25ed9cec83067693114f5a95b16c6c575dc413918553585839c80475

    SHA512

    a3bcc51b679b51509f32a182c74fb4c519a888c297bd31dd2174d377900f69236c76b7b6f77feaf16fcfe02ffd184629493304d6bbc429431d1490ed47e704c5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si726868.exe

    Filesize

    176KB

    MD5

    7a126abf27f74bb2c3c504a73203ce2b

    SHA1

    60723a0347717ceb750a3042fc254fcf2e868c53

    SHA256

    096c257f25ed9cec83067693114f5a95b16c6c575dc413918553585839c80475

    SHA512

    a3bcc51b679b51509f32a182c74fb4c519a888c297bd31dd2174d377900f69236c76b7b6f77feaf16fcfe02ffd184629493304d6bbc429431d1490ed47e704c5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un181824.exe

    Filesize

    518KB

    MD5

    33425e6a1634ebf5a47386027a99139a

    SHA1

    0cf2b1087c1ab13770fe00e0ff2d4d883ffa8799

    SHA256

    099d223fd13e863a9d0054c2030b83b827b1af12ab3b25a6348602f1aa2e243f

    SHA512

    3a27051c3d8a9f0ac2f145ab935bc2bb1d4c12c5c1e650349736d7c3730ab038063231d7073d17ca248f7b3c3d82bb70c7bf96572261895b2ae1b325b0267f34

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un181824.exe

    Filesize

    518KB

    MD5

    33425e6a1634ebf5a47386027a99139a

    SHA1

    0cf2b1087c1ab13770fe00e0ff2d4d883ffa8799

    SHA256

    099d223fd13e863a9d0054c2030b83b827b1af12ab3b25a6348602f1aa2e243f

    SHA512

    3a27051c3d8a9f0ac2f145ab935bc2bb1d4c12c5c1e650349736d7c3730ab038063231d7073d17ca248f7b3c3d82bb70c7bf96572261895b2ae1b325b0267f34

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4803.exe

    Filesize

    376KB

    MD5

    d53dccf8a7020792a23de6ff12f2e44e

    SHA1

    cbbb10151eede5889f871e1793ff17301451dba1

    SHA256

    e8d6afa01e734651cbdecff41b8af063b8c9938965bd08be15adc4b73162600c

    SHA512

    099e976409dca6d94f106fc4cb4839bc4f8f2dd650250d16522e608d2489b5ed7d3c12f4bb4adbc885491f18ba6613cd968f7ff85e8074cb5a6f5102617363e3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4803.exe

    Filesize

    376KB

    MD5

    d53dccf8a7020792a23de6ff12f2e44e

    SHA1

    cbbb10151eede5889f871e1793ff17301451dba1

    SHA256

    e8d6afa01e734651cbdecff41b8af063b8c9938965bd08be15adc4b73162600c

    SHA512

    099e976409dca6d94f106fc4cb4839bc4f8f2dd650250d16522e608d2489b5ed7d3c12f4bb4adbc885491f18ba6613cd968f7ff85e8074cb5a6f5102617363e3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3329.exe

    Filesize

    434KB

    MD5

    651b0c8756c14c22a2ce0a1003a41955

    SHA1

    f84790c961bda7ba9063dac714c3163a3b482856

    SHA256

    7f61bd8fdcd80e5f61df4c2eb36742c4a927532c1c54b78dfee0ff5fd1692793

    SHA512

    73575382b06558ee35eefde01339cf7f70b9f3355479f7a09c03b48efd220fd4ba25cce32e7ba3e8a487715f6c9883231e57e334b22f80f4df2b7986d16f55ea

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3329.exe

    Filesize

    434KB

    MD5

    651b0c8756c14c22a2ce0a1003a41955

    SHA1

    f84790c961bda7ba9063dac714c3163a3b482856

    SHA256

    7f61bd8fdcd80e5f61df4c2eb36742c4a927532c1c54b78dfee0ff5fd1692793

    SHA512

    73575382b06558ee35eefde01339cf7f70b9f3355479f7a09c03b48efd220fd4ba25cce32e7ba3e8a487715f6c9883231e57e334b22f80f4df2b7986d16f55ea

  • memory/2516-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2516-137-0x0000000002590000-0x00000000025AA000-memory.dmp

    Filesize

    104KB

  • memory/2516-138-0x0000000004EC0000-0x00000000053BE000-memory.dmp

    Filesize

    5.0MB

  • memory/2516-139-0x0000000004D40000-0x0000000004D58000-memory.dmp

    Filesize

    96KB

  • memory/2516-143-0x0000000004D40000-0x0000000004D52000-memory.dmp

    Filesize

    72KB

  • memory/2516-141-0x0000000004D40000-0x0000000004D52000-memory.dmp

    Filesize

    72KB

  • memory/2516-140-0x0000000004D40000-0x0000000004D52000-memory.dmp

    Filesize

    72KB

  • memory/2516-149-0x0000000004D40000-0x0000000004D52000-memory.dmp

    Filesize

    72KB

  • memory/2516-147-0x0000000004D40000-0x0000000004D52000-memory.dmp

    Filesize

    72KB

  • memory/2516-145-0x0000000004D40000-0x0000000004D52000-memory.dmp

    Filesize

    72KB

  • memory/2516-157-0x0000000004D40000-0x0000000004D52000-memory.dmp

    Filesize

    72KB

  • memory/2516-161-0x0000000004D40000-0x0000000004D52000-memory.dmp

    Filesize

    72KB

  • memory/2516-159-0x0000000004D40000-0x0000000004D52000-memory.dmp

    Filesize

    72KB

  • memory/2516-165-0x0000000004D40000-0x0000000004D52000-memory.dmp

    Filesize

    72KB

  • memory/2516-163-0x0000000004D40000-0x0000000004D52000-memory.dmp

    Filesize

    72KB

  • memory/2516-167-0x0000000004D40000-0x0000000004D52000-memory.dmp

    Filesize

    72KB

  • memory/2516-155-0x0000000004D40000-0x0000000004D52000-memory.dmp

    Filesize

    72KB

  • memory/2516-153-0x0000000004D40000-0x0000000004D52000-memory.dmp

    Filesize

    72KB

  • memory/2516-151-0x0000000004D40000-0x0000000004D52000-memory.dmp

    Filesize

    72KB

  • memory/2516-168-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/2516-169-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/2516-170-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/2516-171-0x0000000000400000-0x0000000000813000-memory.dmp

    Filesize

    4.1MB

  • memory/2516-173-0x0000000000400000-0x0000000000813000-memory.dmp

    Filesize

    4.1MB

  • memory/2808-178-0x00000000027D0000-0x0000000002816000-memory.dmp

    Filesize

    280KB

  • memory/2808-179-0x0000000002880000-0x00000000028C4000-memory.dmp

    Filesize

    272KB

  • memory/2808-181-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/2808-180-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/2808-184-0x0000000002220000-0x000000000226B000-memory.dmp

    Filesize

    300KB

  • memory/2808-183-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/2808-187-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/2808-188-0x0000000002850000-0x0000000002860000-memory.dmp

    Filesize

    64KB

  • memory/2808-191-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/2808-190-0x0000000002850000-0x0000000002860000-memory.dmp

    Filesize

    64KB

  • memory/2808-186-0x0000000002850000-0x0000000002860000-memory.dmp

    Filesize

    64KB

  • memory/2808-193-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/2808-195-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/2808-197-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/2808-199-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/2808-201-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/2808-203-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/2808-205-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/2808-207-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/2808-209-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/2808-211-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/2808-213-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/2808-215-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/2808-217-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/2808-1090-0x00000000053A0000-0x00000000059A6000-memory.dmp

    Filesize

    6.0MB

  • memory/2808-1091-0x00000000059D0000-0x0000000005ADA000-memory.dmp

    Filesize

    1.0MB

  • memory/2808-1092-0x0000000005B10000-0x0000000005B22000-memory.dmp

    Filesize

    72KB

  • memory/2808-1093-0x0000000005B30000-0x0000000005B6E000-memory.dmp

    Filesize

    248KB

  • memory/2808-1094-0x0000000002850000-0x0000000002860000-memory.dmp

    Filesize

    64KB

  • memory/2808-1095-0x0000000005C80000-0x0000000005CCB000-memory.dmp

    Filesize

    300KB

  • memory/2808-1097-0x0000000005E10000-0x0000000005E76000-memory.dmp

    Filesize

    408KB

  • memory/2808-1098-0x00000000064D0000-0x0000000006562000-memory.dmp

    Filesize

    584KB

  • memory/2808-1099-0x0000000002850000-0x0000000002860000-memory.dmp

    Filesize

    64KB

  • memory/2808-1100-0x0000000002850000-0x0000000002860000-memory.dmp

    Filesize

    64KB

  • memory/2808-1101-0x0000000002850000-0x0000000002860000-memory.dmp

    Filesize

    64KB

  • memory/2808-1102-0x00000000066B0000-0x0000000006872000-memory.dmp

    Filesize

    1.8MB

  • memory/2808-1103-0x0000000006880000-0x0000000006DAC000-memory.dmp

    Filesize

    5.2MB

  • memory/2808-1104-0x0000000007040000-0x00000000070B6000-memory.dmp

    Filesize

    472KB

  • memory/2808-1105-0x00000000070C0000-0x0000000007110000-memory.dmp

    Filesize

    320KB

  • memory/2808-1106-0x0000000002850000-0x0000000002860000-memory.dmp

    Filesize

    64KB

  • memory/4072-1112-0x0000000000050000-0x0000000000082000-memory.dmp

    Filesize

    200KB

  • memory/4072-1113-0x0000000004A90000-0x0000000004ADB000-memory.dmp

    Filesize

    300KB

  • memory/4072-1114-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

    Filesize

    64KB