Analysis

  • max time kernel
    86s
  • max time network
    120s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/04/2023, 17:45

General

  • Target

    23541e0357ba5076e10534acfc480780ce8492986cfe0d4c0f91e21bfe13dc1a.exe

  • Size

    665KB

  • MD5

    51c9b9b06dbd7c274a92eab227082865

  • SHA1

    ae356e7c03b8f0981be29f145edbcdb7962e71cb

  • SHA256

    23541e0357ba5076e10534acfc480780ce8492986cfe0d4c0f91e21bfe13dc1a

  • SHA512

    c9910f2e2a29e3f20c21d7ee3673608508340f0d37fe2d767b7d586dd0fcf9b894650741f0999d8b206927aefbc4eaeaac44ab917ed64b15cd5db1ba15268152

  • SSDEEP

    12288:xMrqy90WjFPt6Wdj4PGt8/WF9o83+vDu+6tVHKpzHRy3NFbrld4LOCZZA:ryttlj4PqQWYru+6tVHKpdy3NFr4iCD

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23541e0357ba5076e10534acfc480780ce8492986cfe0d4c0f91e21bfe13dc1a.exe
    "C:\Users\Admin\AppData\Local\Temp\23541e0357ba5076e10534acfc480780ce8492986cfe0d4c0f91e21bfe13dc1a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un847035.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un847035.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3307.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3307.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2988
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7468.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7468.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4740
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si164929.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si164929.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3596

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si164929.exe

          Filesize

          175KB

          MD5

          80ee3bd1fae9f832f2b0d61d709e4d48

          SHA1

          505c0a8f96c625b9e85203352b0cfe009fd8b792

          SHA256

          861ba8f3696393283687f355b984f57eb70f2a565eccc552af656fedbba43d7c

          SHA512

          a113ed1d3a0d2fd08972c40afdf4fb5acf44c87c35fe255ac7e4d28af4d42b7efbe275555b05714ee8cb299bebf880618ad5f065508c61f92b36ed2136784620

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si164929.exe

          Filesize

          175KB

          MD5

          80ee3bd1fae9f832f2b0d61d709e4d48

          SHA1

          505c0a8f96c625b9e85203352b0cfe009fd8b792

          SHA256

          861ba8f3696393283687f355b984f57eb70f2a565eccc552af656fedbba43d7c

          SHA512

          a113ed1d3a0d2fd08972c40afdf4fb5acf44c87c35fe255ac7e4d28af4d42b7efbe275555b05714ee8cb299bebf880618ad5f065508c61f92b36ed2136784620

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un847035.exe

          Filesize

          523KB

          MD5

          3787d1fe058ade2f8925a69296824f46

          SHA1

          658bb1ec64bc00a25d72a22ec456dbe82ffdce63

          SHA256

          1ecf8d154a3462c79bc492e3d005e45fc96815aac6e4c1ae774411cae65d9a37

          SHA512

          d03b07a43247c563bbb01c8acd2f4610f377fad332e9af66c62fb7be2f17192c080bea35ffaaf801f2d7e48c70dde28260223a95a95d1e3280480118e742ecac

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un847035.exe

          Filesize

          523KB

          MD5

          3787d1fe058ade2f8925a69296824f46

          SHA1

          658bb1ec64bc00a25d72a22ec456dbe82ffdce63

          SHA256

          1ecf8d154a3462c79bc492e3d005e45fc96815aac6e4c1ae774411cae65d9a37

          SHA512

          d03b07a43247c563bbb01c8acd2f4610f377fad332e9af66c62fb7be2f17192c080bea35ffaaf801f2d7e48c70dde28260223a95a95d1e3280480118e742ecac

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3307.exe

          Filesize

          294KB

          MD5

          46b68083e8f287bb48d3ecc672cc481a

          SHA1

          3cfafbe4bd6b8eaa2b737f76c2d81166df5797d7

          SHA256

          29f9f1885b9b8b8f6ff1dca5e62758ce1606942cceebe6ad1fe9f4eb2e0bf857

          SHA512

          00b94411f5a21a23247563f710dd249e18b20db684bb153ae8ac1f89b7d46158e4633ca81f4d523ab946833af2e4df7036cf44e48d36ce80e5a73d5549d5c9a0

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3307.exe

          Filesize

          294KB

          MD5

          46b68083e8f287bb48d3ecc672cc481a

          SHA1

          3cfafbe4bd6b8eaa2b737f76c2d81166df5797d7

          SHA256

          29f9f1885b9b8b8f6ff1dca5e62758ce1606942cceebe6ad1fe9f4eb2e0bf857

          SHA512

          00b94411f5a21a23247563f710dd249e18b20db684bb153ae8ac1f89b7d46158e4633ca81f4d523ab946833af2e4df7036cf44e48d36ce80e5a73d5549d5c9a0

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7468.exe

          Filesize

          353KB

          MD5

          96231e9bd222d92b579024f9e5b4e06f

          SHA1

          e89f18a36619eff8619073df7917640e07c8bc65

          SHA256

          39318a299cfdee809ad8418dc56d883fd338af7f4531eb9107f0bf579c7e5456

          SHA512

          f175cbac43034bd4b884490611f07ce95c55e04e19b0831cbcc2f5c4053d25ce150fcbf8ac6c1bee938c18c9b9fa73059803876d8e0e7f483622d0f9109d6ec4

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7468.exe

          Filesize

          353KB

          MD5

          96231e9bd222d92b579024f9e5b4e06f

          SHA1

          e89f18a36619eff8619073df7917640e07c8bc65

          SHA256

          39318a299cfdee809ad8418dc56d883fd338af7f4531eb9107f0bf579c7e5456

          SHA512

          f175cbac43034bd4b884490611f07ce95c55e04e19b0831cbcc2f5c4053d25ce150fcbf8ac6c1bee938c18c9b9fa73059803876d8e0e7f483622d0f9109d6ec4

        • memory/2988-136-0x0000000002840000-0x000000000285A000-memory.dmp

          Filesize

          104KB

        • memory/2988-137-0x0000000004D60000-0x000000000525E000-memory.dmp

          Filesize

          5.0MB

        • memory/2988-138-0x0000000004D30000-0x0000000004D48000-memory.dmp

          Filesize

          96KB

        • memory/2988-139-0x0000000000800000-0x000000000082D000-memory.dmp

          Filesize

          180KB

        • memory/2988-140-0x0000000004D50000-0x0000000004D60000-memory.dmp

          Filesize

          64KB

        • memory/2988-141-0x0000000004D50000-0x0000000004D60000-memory.dmp

          Filesize

          64KB

        • memory/2988-142-0x0000000004D50000-0x0000000004D60000-memory.dmp

          Filesize

          64KB

        • memory/2988-143-0x0000000004D30000-0x0000000004D42000-memory.dmp

          Filesize

          72KB

        • memory/2988-144-0x0000000004D30000-0x0000000004D42000-memory.dmp

          Filesize

          72KB

        • memory/2988-146-0x0000000004D30000-0x0000000004D42000-memory.dmp

          Filesize

          72KB

        • memory/2988-148-0x0000000004D30000-0x0000000004D42000-memory.dmp

          Filesize

          72KB

        • memory/2988-150-0x0000000004D30000-0x0000000004D42000-memory.dmp

          Filesize

          72KB

        • memory/2988-152-0x0000000004D30000-0x0000000004D42000-memory.dmp

          Filesize

          72KB

        • memory/2988-154-0x0000000004D30000-0x0000000004D42000-memory.dmp

          Filesize

          72KB

        • memory/2988-156-0x0000000004D30000-0x0000000004D42000-memory.dmp

          Filesize

          72KB

        • memory/2988-158-0x0000000004D30000-0x0000000004D42000-memory.dmp

          Filesize

          72KB

        • memory/2988-160-0x0000000004D30000-0x0000000004D42000-memory.dmp

          Filesize

          72KB

        • memory/2988-162-0x0000000004D30000-0x0000000004D42000-memory.dmp

          Filesize

          72KB

        • memory/2988-164-0x0000000004D30000-0x0000000004D42000-memory.dmp

          Filesize

          72KB

        • memory/2988-166-0x0000000004D30000-0x0000000004D42000-memory.dmp

          Filesize

          72KB

        • memory/2988-168-0x0000000004D30000-0x0000000004D42000-memory.dmp

          Filesize

          72KB

        • memory/2988-170-0x0000000004D30000-0x0000000004D42000-memory.dmp

          Filesize

          72KB

        • memory/2988-171-0x0000000000400000-0x00000000007FE000-memory.dmp

          Filesize

          4.0MB

        • memory/2988-172-0x0000000004D50000-0x0000000004D60000-memory.dmp

          Filesize

          64KB

        • memory/2988-174-0x0000000000400000-0x00000000007FE000-memory.dmp

          Filesize

          4.0MB

        • memory/3596-1113-0x0000000000D90000-0x0000000000DC2000-memory.dmp

          Filesize

          200KB

        • memory/3596-1115-0x0000000005980000-0x0000000005990000-memory.dmp

          Filesize

          64KB

        • memory/3596-1114-0x00000000057E0000-0x000000000582B000-memory.dmp

          Filesize

          300KB

        • memory/4740-184-0x0000000004D90000-0x0000000004DCF000-memory.dmp

          Filesize

          252KB

        • memory/4740-297-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

          Filesize

          64KB

        • memory/4740-181-0x0000000004D90000-0x0000000004DCF000-memory.dmp

          Filesize

          252KB

        • memory/4740-186-0x0000000004D90000-0x0000000004DCF000-memory.dmp

          Filesize

          252KB

        • memory/4740-188-0x0000000004D90000-0x0000000004DCF000-memory.dmp

          Filesize

          252KB

        • memory/4740-190-0x0000000004D90000-0x0000000004DCF000-memory.dmp

          Filesize

          252KB

        • memory/4740-192-0x0000000004D90000-0x0000000004DCF000-memory.dmp

          Filesize

          252KB

        • memory/4740-194-0x0000000004D90000-0x0000000004DCF000-memory.dmp

          Filesize

          252KB

        • memory/4740-196-0x0000000004D90000-0x0000000004DCF000-memory.dmp

          Filesize

          252KB

        • memory/4740-198-0x0000000004D90000-0x0000000004DCF000-memory.dmp

          Filesize

          252KB

        • memory/4740-200-0x0000000004D90000-0x0000000004DCF000-memory.dmp

          Filesize

          252KB

        • memory/4740-202-0x0000000004D90000-0x0000000004DCF000-memory.dmp

          Filesize

          252KB

        • memory/4740-204-0x0000000004D90000-0x0000000004DCF000-memory.dmp

          Filesize

          252KB

        • memory/4740-206-0x0000000004D90000-0x0000000004DCF000-memory.dmp

          Filesize

          252KB

        • memory/4740-208-0x0000000004D90000-0x0000000004DCF000-memory.dmp

          Filesize

          252KB

        • memory/4740-210-0x0000000004D90000-0x0000000004DCF000-memory.dmp

          Filesize

          252KB

        • memory/4740-212-0x0000000004D90000-0x0000000004DCF000-memory.dmp

          Filesize

          252KB

        • memory/4740-214-0x0000000004D90000-0x0000000004DCF000-memory.dmp

          Filesize

          252KB

        • memory/4740-295-0x0000000000810000-0x000000000085B000-memory.dmp

          Filesize

          300KB

        • memory/4740-182-0x0000000004D90000-0x0000000004DCF000-memory.dmp

          Filesize

          252KB

        • memory/4740-299-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

          Filesize

          64KB

        • memory/4740-302-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

          Filesize

          64KB

        • memory/4740-1091-0x0000000005A00000-0x0000000006006000-memory.dmp

          Filesize

          6.0MB

        • memory/4740-1092-0x00000000053F0000-0x00000000054FA000-memory.dmp

          Filesize

          1.0MB

        • memory/4740-1093-0x0000000004EC0000-0x0000000004ED2000-memory.dmp

          Filesize

          72KB

        • memory/4740-1094-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

          Filesize

          64KB

        • memory/4740-1095-0x0000000005500000-0x000000000553E000-memory.dmp

          Filesize

          248KB

        • memory/4740-1096-0x0000000005650000-0x000000000569B000-memory.dmp

          Filesize

          300KB

        • memory/4740-1098-0x00000000057E0000-0x0000000005846000-memory.dmp

          Filesize

          408KB

        • memory/4740-1099-0x00000000064D0000-0x0000000006562000-memory.dmp

          Filesize

          584KB

        • memory/4740-1100-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

          Filesize

          64KB

        • memory/4740-1101-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

          Filesize

          64KB

        • memory/4740-1102-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

          Filesize

          64KB

        • memory/4740-1103-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

          Filesize

          64KB

        • memory/4740-1104-0x00000000067D0000-0x0000000006846000-memory.dmp

          Filesize

          472KB

        • memory/4740-180-0x0000000004D90000-0x0000000004DD4000-memory.dmp

          Filesize

          272KB

        • memory/4740-179-0x0000000004D10000-0x0000000004D56000-memory.dmp

          Filesize

          280KB

        • memory/4740-1105-0x0000000006860000-0x00000000068B0000-memory.dmp

          Filesize

          320KB

        • memory/4740-1106-0x00000000068D0000-0x0000000006A92000-memory.dmp

          Filesize

          1.8MB

        • memory/4740-1107-0x0000000006AA0000-0x0000000006FCC000-memory.dmp

          Filesize

          5.2MB