Analysis

  • max time kernel
    54s
  • max time network
    65s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/04/2023, 17:07

General

  • Target

    c0fb8f7838de74a3e4ed8e8c3457d2821479d6d4a86883c6b410a329981c1c88.exe

  • Size

    666KB

  • MD5

    4db8fc1c49a40ce05ecb5eabb40c9e99

  • SHA1

    97661204b4f89c117dbd1aa92ebf73692be38e28

  • SHA256

    c0fb8f7838de74a3e4ed8e8c3457d2821479d6d4a86883c6b410a329981c1c88

  • SHA512

    d2032f7ae4dc69e7fb738f981cc620100aac8b29d8aa70db82b4af1e96aac0538be9c25e43c460ae5bc6e4a4416a7068403ac4109ae34b0a38a054d4167b2e24

  • SSDEEP

    12288:pMrQy90liNHtaw9DW6GJr/GHEMSKnppk+wgLi9qkvf2N8bUecf7qu4Zcr:5y6iSD7Ghdu1f2N8BI7q0

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0fb8f7838de74a3e4ed8e8c3457d2821479d6d4a86883c6b410a329981c1c88.exe
    "C:\Users\Admin\AppData\Local\Temp\c0fb8f7838de74a3e4ed8e8c3457d2821479d6d4a86883c6b410a329981c1c88.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4308
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un695175.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un695175.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3192
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5347.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5347.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4100
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7954.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7954.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3884
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si250704.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si250704.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4504

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si250704.exe

          Filesize

          175KB

          MD5

          fc91e291023632005b2dfd0966531f53

          SHA1

          635b7ec30c2e160e6c9df124d8e8e28cd96e05d6

          SHA256

          4932206a468861102c761017d644de4a6e6be2e1ba1edd2d03158ad2a4f43872

          SHA512

          baa95e816f03afd684156f765546a229bf99fc55aae231ea2eebbf6d4eba838a4928606d6429ac010717df8be81cf43d535206f62279da33cf5760e27e28ff06

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si250704.exe

          Filesize

          175KB

          MD5

          fc91e291023632005b2dfd0966531f53

          SHA1

          635b7ec30c2e160e6c9df124d8e8e28cd96e05d6

          SHA256

          4932206a468861102c761017d644de4a6e6be2e1ba1edd2d03158ad2a4f43872

          SHA512

          baa95e816f03afd684156f765546a229bf99fc55aae231ea2eebbf6d4eba838a4928606d6429ac010717df8be81cf43d535206f62279da33cf5760e27e28ff06

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un695175.exe

          Filesize

          524KB

          MD5

          070221ac61b18ca66d8f23362ccd1304

          SHA1

          5b3cdaafe47735da724c5bcfcf6b9f24bfcb91c3

          SHA256

          08f0ade4de91667d522ce9c4a853e0a00ab8e13b94ba039ee36a166caf40cfa2

          SHA512

          4127dbcb3ebc91f6b3e204d37bceda06b96b7a4a6710302a699b7b30ef675dfd17144b2460542e838541cabdb861a812b5f42e4dc8b0e390850ccd580c9781c0

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un695175.exe

          Filesize

          524KB

          MD5

          070221ac61b18ca66d8f23362ccd1304

          SHA1

          5b3cdaafe47735da724c5bcfcf6b9f24bfcb91c3

          SHA256

          08f0ade4de91667d522ce9c4a853e0a00ab8e13b94ba039ee36a166caf40cfa2

          SHA512

          4127dbcb3ebc91f6b3e204d37bceda06b96b7a4a6710302a699b7b30ef675dfd17144b2460542e838541cabdb861a812b5f42e4dc8b0e390850ccd580c9781c0

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5347.exe

          Filesize

          294KB

          MD5

          c85f19334dd1563b00c7e9a8c25581e9

          SHA1

          9b2da1c8b28cc6f150063f33497b8b08de874596

          SHA256

          7326365bd5a533127d3cffd334ee6676030725cae2ffa0904b5023a5cd858d20

          SHA512

          4b7cad109b4d307fa2a897c7a5f21f1a9c1040fefcb71d48c4e4fa8e842ea594f09e2750fbd9921780000c85c77a29a9666b85c955a21206afbd010e0542e246

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5347.exe

          Filesize

          294KB

          MD5

          c85f19334dd1563b00c7e9a8c25581e9

          SHA1

          9b2da1c8b28cc6f150063f33497b8b08de874596

          SHA256

          7326365bd5a533127d3cffd334ee6676030725cae2ffa0904b5023a5cd858d20

          SHA512

          4b7cad109b4d307fa2a897c7a5f21f1a9c1040fefcb71d48c4e4fa8e842ea594f09e2750fbd9921780000c85c77a29a9666b85c955a21206afbd010e0542e246

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7954.exe

          Filesize

          353KB

          MD5

          e37d00975bfc7fc0d5a2a7cf7e91ab88

          SHA1

          0c3cfdbdcfcec5b483d9699a983132c1ff618cc3

          SHA256

          526793ce6223b7791f543eff3bb4ec62ad18471319cecc778ef8344eda46039e

          SHA512

          791cd75fa4d53806d9f7ab34f9101b2429b7b506295d508d24089f557160aea39710cfb44713721948cec2adf7dede95805af0289b3c2068849d82e9fce83082

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7954.exe

          Filesize

          353KB

          MD5

          e37d00975bfc7fc0d5a2a7cf7e91ab88

          SHA1

          0c3cfdbdcfcec5b483d9699a983132c1ff618cc3

          SHA256

          526793ce6223b7791f543eff3bb4ec62ad18471319cecc778ef8344eda46039e

          SHA512

          791cd75fa4d53806d9f7ab34f9101b2429b7b506295d508d24089f557160aea39710cfb44713721948cec2adf7dede95805af0289b3c2068849d82e9fce83082

        • memory/3884-1092-0x0000000005AA0000-0x00000000060A6000-memory.dmp

          Filesize

          6.0MB

        • memory/3884-219-0x00000000028A0000-0x00000000028DF000-memory.dmp

          Filesize

          252KB

        • memory/3884-1108-0x00000000071D0000-0x0000000007220000-memory.dmp

          Filesize

          320KB

        • memory/3884-1107-0x0000000007150000-0x00000000071C6000-memory.dmp

          Filesize

          472KB

        • memory/3884-1106-0x0000000002930000-0x0000000002940000-memory.dmp

          Filesize

          64KB

        • memory/3884-1105-0x0000000002930000-0x0000000002940000-memory.dmp

          Filesize

          64KB

        • memory/3884-191-0x00000000028A0000-0x00000000028DF000-memory.dmp

          Filesize

          252KB

        • memory/3884-1104-0x0000000002930000-0x0000000002940000-memory.dmp

          Filesize

          64KB

        • memory/3884-1103-0x0000000002930000-0x0000000002940000-memory.dmp

          Filesize

          64KB

        • memory/3884-195-0x00000000028A0000-0x00000000028DF000-memory.dmp

          Filesize

          252KB

        • memory/3884-1102-0x00000000068C0000-0x0000000006DEC000-memory.dmp

          Filesize

          5.2MB

        • memory/3884-1101-0x00000000066F0000-0x00000000068B2000-memory.dmp

          Filesize

          1.8MB

        • memory/3884-1099-0x00000000065F0000-0x0000000006682000-memory.dmp

          Filesize

          584KB

        • memory/3884-1098-0x0000000005920000-0x0000000005986000-memory.dmp

          Filesize

          408KB

        • memory/3884-1097-0x0000000002930000-0x0000000002940000-memory.dmp

          Filesize

          64KB

        • memory/3884-1096-0x0000000005790000-0x00000000057DB000-memory.dmp

          Filesize

          300KB

        • memory/3884-1095-0x0000000005640000-0x000000000567E000-memory.dmp

          Filesize

          248KB

        • memory/3884-1094-0x0000000005620000-0x0000000005632000-memory.dmp

          Filesize

          72KB

        • memory/3884-1093-0x00000000054E0000-0x00000000055EA000-memory.dmp

          Filesize

          1.0MB

        • memory/3884-193-0x00000000028A0000-0x00000000028DF000-memory.dmp

          Filesize

          252KB

        • memory/3884-217-0x00000000028A0000-0x00000000028DF000-memory.dmp

          Filesize

          252KB

        • memory/3884-215-0x00000000028A0000-0x00000000028DF000-memory.dmp

          Filesize

          252KB

        • memory/3884-213-0x00000000028A0000-0x00000000028DF000-memory.dmp

          Filesize

          252KB

        • memory/3884-211-0x00000000028A0000-0x00000000028DF000-memory.dmp

          Filesize

          252KB

        • memory/3884-209-0x00000000028A0000-0x00000000028DF000-memory.dmp

          Filesize

          252KB

        • memory/3884-180-0x00000000025E0000-0x0000000002626000-memory.dmp

          Filesize

          280KB

        • memory/3884-181-0x00000000028A0000-0x00000000028E4000-memory.dmp

          Filesize

          272KB

        • memory/3884-182-0x0000000000810000-0x000000000085B000-memory.dmp

          Filesize

          300KB

        • memory/3884-183-0x0000000002930000-0x0000000002940000-memory.dmp

          Filesize

          64KB

        • memory/3884-184-0x0000000002930000-0x0000000002940000-memory.dmp

          Filesize

          64KB

        • memory/3884-185-0x00000000028A0000-0x00000000028DF000-memory.dmp

          Filesize

          252KB

        • memory/3884-187-0x00000000028A0000-0x00000000028DF000-memory.dmp

          Filesize

          252KB

        • memory/3884-186-0x0000000002930000-0x0000000002940000-memory.dmp

          Filesize

          64KB

        • memory/3884-189-0x00000000028A0000-0x00000000028DF000-memory.dmp

          Filesize

          252KB

        • memory/3884-207-0x00000000028A0000-0x00000000028DF000-memory.dmp

          Filesize

          252KB

        • memory/3884-203-0x00000000028A0000-0x00000000028DF000-memory.dmp

          Filesize

          252KB

        • memory/3884-205-0x00000000028A0000-0x00000000028DF000-memory.dmp

          Filesize

          252KB

        • memory/3884-197-0x00000000028A0000-0x00000000028DF000-memory.dmp

          Filesize

          252KB

        • memory/3884-199-0x00000000028A0000-0x00000000028DF000-memory.dmp

          Filesize

          252KB

        • memory/3884-201-0x00000000028A0000-0x00000000028DF000-memory.dmp

          Filesize

          252KB

        • memory/4100-170-0x0000000000400000-0x00000000007FE000-memory.dmp

          Filesize

          4.0MB

        • memory/4100-153-0x00000000026B0000-0x00000000026C2000-memory.dmp

          Filesize

          72KB

        • memory/4100-147-0x00000000026B0000-0x00000000026C2000-memory.dmp

          Filesize

          72KB

        • memory/4100-138-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB

        • memory/4100-139-0x00000000028E0000-0x00000000028F0000-memory.dmp

          Filesize

          64KB

        • memory/4100-175-0x0000000000400000-0x00000000007FE000-memory.dmp

          Filesize

          4.0MB

        • memory/4100-173-0x00000000028E0000-0x00000000028F0000-memory.dmp

          Filesize

          64KB

        • memory/4100-172-0x00000000028E0000-0x00000000028F0000-memory.dmp

          Filesize

          64KB

        • memory/4100-171-0x00000000028E0000-0x00000000028F0000-memory.dmp

          Filesize

          64KB

        • memory/4100-137-0x00000000026B0000-0x00000000026C8000-memory.dmp

          Filesize

          96KB

        • memory/4100-140-0x00000000028E0000-0x00000000028F0000-memory.dmp

          Filesize

          64KB

        • memory/4100-169-0x00000000026B0000-0x00000000026C2000-memory.dmp

          Filesize

          72KB

        • memory/4100-167-0x00000000026B0000-0x00000000026C2000-memory.dmp

          Filesize

          72KB

        • memory/4100-165-0x00000000026B0000-0x00000000026C2000-memory.dmp

          Filesize

          72KB

        • memory/4100-163-0x00000000026B0000-0x00000000026C2000-memory.dmp

          Filesize

          72KB

        • memory/4100-161-0x00000000026B0000-0x00000000026C2000-memory.dmp

          Filesize

          72KB

        • memory/4100-159-0x00000000026B0000-0x00000000026C2000-memory.dmp

          Filesize

          72KB

        • memory/4100-157-0x00000000026B0000-0x00000000026C2000-memory.dmp

          Filesize

          72KB

        • memory/4100-155-0x00000000026B0000-0x00000000026C2000-memory.dmp

          Filesize

          72KB

        • memory/4100-151-0x00000000026B0000-0x00000000026C2000-memory.dmp

          Filesize

          72KB

        • memory/4100-149-0x00000000026B0000-0x00000000026C2000-memory.dmp

          Filesize

          72KB

        • memory/4100-145-0x00000000026B0000-0x00000000026C2000-memory.dmp

          Filesize

          72KB

        • memory/4100-143-0x00000000026B0000-0x00000000026C2000-memory.dmp

          Filesize

          72KB

        • memory/4100-142-0x00000000026B0000-0x00000000026C2000-memory.dmp

          Filesize

          72KB

        • memory/4100-141-0x00000000028E0000-0x00000000028F0000-memory.dmp

          Filesize

          64KB

        • memory/4100-136-0x0000000004F40000-0x000000000543E000-memory.dmp

          Filesize

          5.0MB

        • memory/4100-135-0x0000000002510000-0x000000000252A000-memory.dmp

          Filesize

          104KB

        • memory/4504-1114-0x0000000000140000-0x0000000000172000-memory.dmp

          Filesize

          200KB

        • memory/4504-1115-0x0000000004B80000-0x0000000004BCB000-memory.dmp

          Filesize

          300KB

        • memory/4504-1116-0x00000000049A0000-0x00000000049B0000-memory.dmp

          Filesize

          64KB