Analysis

  • max time kernel
    52s
  • max time network
    67s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/04/2023, 14:01

General

  • Target

    dad02fe38f925593d8a5e3d2e4ac138ff0405a0b4d9822a8b2e849c1a9c08e5f.exe

  • Size

    537KB

  • MD5

    e66ee31a526e68915941cb6d51b8313d

  • SHA1

    7bb12f61dc434348a5a6c529fde2e02d2e56eecf

  • SHA256

    dad02fe38f925593d8a5e3d2e4ac138ff0405a0b4d9822a8b2e849c1a9c08e5f

  • SHA512

    ee9132de777d2d856372388968ccda088e7ab9edefdac3bc59ab5ba0ebf1ca76d38d7c640489e9970ce25a0fbbc32ba9e96645f93be4a782654a5f136189247e

  • SSDEEP

    12288:gMrjy90+qd/P7z3zzRGWjELfAkRSw0tUwaprRe1ARmzqDLsjW:zyGH7z3zzoENaprRe1Bz03

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dad02fe38f925593d8a5e3d2e4ac138ff0405a0b4d9822a8b2e849c1a9c08e5f.exe
    "C:\Users\Admin\AppData\Local\Temp\dad02fe38f925593d8a5e3d2e4ac138ff0405a0b4d9822a8b2e849c1a9c08e5f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQv6283.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQv6283.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1500
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr065771.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr065771.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1784
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku478877.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku478877.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1072
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr573893.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr573893.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2748

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr573893.exe

          Filesize

          175KB

          MD5

          2b1e8e34e4a599595b1782e50b63a353

          SHA1

          a45ac2618842ef9318b151d7d6a7982dc20a1ebf

          SHA256

          55d3852c8108199496a86da98736d0b3dc14f514e9ed590c24dfbf460978aa2f

          SHA512

          9625ba64a124ede3f751693ee4c907e747e7d1433936ca9ab9fa06464070d6d7447a47ecc18f92b6a1a63605883ce5ee09646f88e2d2715f7cfd76d678f4971c

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr573893.exe

          Filesize

          175KB

          MD5

          2b1e8e34e4a599595b1782e50b63a353

          SHA1

          a45ac2618842ef9318b151d7d6a7982dc20a1ebf

          SHA256

          55d3852c8108199496a86da98736d0b3dc14f514e9ed590c24dfbf460978aa2f

          SHA512

          9625ba64a124ede3f751693ee4c907e747e7d1433936ca9ab9fa06464070d6d7447a47ecc18f92b6a1a63605883ce5ee09646f88e2d2715f7cfd76d678f4971c

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQv6283.exe

          Filesize

          395KB

          MD5

          9a8fbc9bd25c47697dbead69c5911e53

          SHA1

          c55db5e1f575181167c5bac59b16f9a1ccb52281

          SHA256

          8d93f89c36cbb91b72e8af2f22bdc3e69490c98c28d622b9998edbec13c73b94

          SHA512

          61463d265f8ec1a66194ae44ed99ef9d1031bb79a63a37c413bfea704c375b0f8c35ea933f95043c483b56cbe1e730bfeb3c2fa093ba9acc7a27b774990b42f4

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziQv6283.exe

          Filesize

          395KB

          MD5

          9a8fbc9bd25c47697dbead69c5911e53

          SHA1

          c55db5e1f575181167c5bac59b16f9a1ccb52281

          SHA256

          8d93f89c36cbb91b72e8af2f22bdc3e69490c98c28d622b9998edbec13c73b94

          SHA512

          61463d265f8ec1a66194ae44ed99ef9d1031bb79a63a37c413bfea704c375b0f8c35ea933f95043c483b56cbe1e730bfeb3c2fa093ba9acc7a27b774990b42f4

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr065771.exe

          Filesize

          13KB

          MD5

          757c6bced6602de05ee92c180ca2b7ab

          SHA1

          69e65c2f44a3cd5f38c7f541e75a1ef8c302b67c

          SHA256

          a76589c3b7bc5645ef4255650879f2ccea2c65d7f69eb11b77b27417d4fa20a9

          SHA512

          858b83c68b61a0180e91d832e5b1082b36ba1e4e12f01c355cd54e6846e5445a3ac4f8856b8dbf2bc03de6ee01c82e661eda1e4949dc14b0714ca36e4e8f5e4b

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr065771.exe

          Filesize

          13KB

          MD5

          757c6bced6602de05ee92c180ca2b7ab

          SHA1

          69e65c2f44a3cd5f38c7f541e75a1ef8c302b67c

          SHA256

          a76589c3b7bc5645ef4255650879f2ccea2c65d7f69eb11b77b27417d4fa20a9

          SHA512

          858b83c68b61a0180e91d832e5b1082b36ba1e4e12f01c355cd54e6846e5445a3ac4f8856b8dbf2bc03de6ee01c82e661eda1e4949dc14b0714ca36e4e8f5e4b

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku478877.exe

          Filesize

          353KB

          MD5

          df12e4230e7faa8eeb29697fc5ca2ac2

          SHA1

          1e30ea37c14a3fd5600ee8a436e9f0e004c5b9df

          SHA256

          a412882dd594587d05b9d5304906367e32d2fb5e129bc403601586724409d33c

          SHA512

          378c26b02d4667c1db36112536f59f40a864a7e617b8f28c85d5bb7333116606b28b28d38eebc982048337371c3ab85a4149564fc8977bdc6d33da1b8e1f0031

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku478877.exe

          Filesize

          353KB

          MD5

          df12e4230e7faa8eeb29697fc5ca2ac2

          SHA1

          1e30ea37c14a3fd5600ee8a436e9f0e004c5b9df

          SHA256

          a412882dd594587d05b9d5304906367e32d2fb5e129bc403601586724409d33c

          SHA512

          378c26b02d4667c1db36112536f59f40a864a7e617b8f28c85d5bb7333116606b28b28d38eebc982048337371c3ab85a4149564fc8977bdc6d33da1b8e1f0031

        • memory/1072-141-0x0000000000C20000-0x0000000000C66000-memory.dmp

          Filesize

          280KB

        • memory/1072-142-0x0000000004F20000-0x000000000541E000-memory.dmp

          Filesize

          5.0MB

        • memory/1072-143-0x0000000004D80000-0x0000000004DC4000-memory.dmp

          Filesize

          272KB

        • memory/1072-144-0x0000000000810000-0x000000000085B000-memory.dmp

          Filesize

          300KB

        • memory/1072-145-0x0000000004F10000-0x0000000004F20000-memory.dmp

          Filesize

          64KB

        • memory/1072-146-0x0000000004F10000-0x0000000004F20000-memory.dmp

          Filesize

          64KB

        • memory/1072-147-0x0000000004F10000-0x0000000004F20000-memory.dmp

          Filesize

          64KB

        • memory/1072-148-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-149-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-151-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-153-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-155-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-157-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-159-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-161-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-163-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-165-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-167-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-169-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-171-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-173-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-175-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-177-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-179-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-181-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-183-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-185-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-187-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-189-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-191-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-195-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-193-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-197-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-199-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-201-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-203-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-205-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-207-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-209-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-211-0x0000000004D80000-0x0000000004DBF000-memory.dmp

          Filesize

          252KB

        • memory/1072-1054-0x0000000005A30000-0x0000000006036000-memory.dmp

          Filesize

          6.0MB

        • memory/1072-1055-0x0000000005420000-0x000000000552A000-memory.dmp

          Filesize

          1.0MB

        • memory/1072-1056-0x0000000004EC0000-0x0000000004ED2000-memory.dmp

          Filesize

          72KB

        • memory/1072-1057-0x0000000005530000-0x000000000556E000-memory.dmp

          Filesize

          248KB

        • memory/1072-1058-0x0000000005670000-0x00000000056BB000-memory.dmp

          Filesize

          300KB

        • memory/1072-1059-0x0000000004F10000-0x0000000004F20000-memory.dmp

          Filesize

          64KB

        • memory/1072-1061-0x00000000057E0000-0x0000000005872000-memory.dmp

          Filesize

          584KB

        • memory/1072-1062-0x0000000005880000-0x00000000058E6000-memory.dmp

          Filesize

          408KB

        • memory/1072-1063-0x0000000004F10000-0x0000000004F20000-memory.dmp

          Filesize

          64KB

        • memory/1072-1064-0x0000000004F10000-0x0000000004F20000-memory.dmp

          Filesize

          64KB

        • memory/1072-1065-0x0000000006590000-0x0000000006606000-memory.dmp

          Filesize

          472KB

        • memory/1072-1066-0x0000000006620000-0x0000000006670000-memory.dmp

          Filesize

          320KB

        • memory/1072-1067-0x0000000006670000-0x0000000006832000-memory.dmp

          Filesize

          1.8MB

        • memory/1072-1068-0x0000000006860000-0x0000000006D8C000-memory.dmp

          Filesize

          5.2MB

        • memory/1072-1069-0x0000000004F10000-0x0000000004F20000-memory.dmp

          Filesize

          64KB

        • memory/1784-135-0x0000000000B10000-0x0000000000B1A000-memory.dmp

          Filesize

          40KB

        • memory/2748-1075-0x00000000003A0000-0x00000000003D2000-memory.dmp

          Filesize

          200KB

        • memory/2748-1076-0x0000000004CB0000-0x0000000004CFB000-memory.dmp

          Filesize

          300KB

        • memory/2748-1077-0x0000000004F40000-0x0000000004F50000-memory.dmp

          Filesize

          64KB