Analysis

  • max time kernel
    54s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02/04/2023, 19:02

General

  • Target

    a61e8fe2fee1ff069a807aa17cfce3a4e9cc7749d7d18ca1ed8f50a517e25669.exe

  • Size

    536KB

  • MD5

    de615502545409c2816cbf68fde24793

  • SHA1

    18ebe2f0c3aa00c35e2837a0eeeb1e9dbc02488f

  • SHA256

    a61e8fe2fee1ff069a807aa17cfce3a4e9cc7749d7d18ca1ed8f50a517e25669

  • SHA512

    5bf97e15a100d87d140e496719aca13999a02aac88eb15e89f6ab5b7a5b1d5cd69c4303cbad62c18fc05165cf33bdf797d0a571ec08142b72312af33deca1cc4

  • SSDEEP

    12288:aMrfy90/9sY30lJtEjQANYznW04LDsxLQMAcHsY:5ywmSEfENYN4A9J

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a61e8fe2fee1ff069a807aa17cfce3a4e9cc7749d7d18ca1ed8f50a517e25669.exe
    "C:\Users\Admin\AppData\Local\Temp\a61e8fe2fee1ff069a807aa17cfce3a4e9cc7749d7d18ca1ed8f50a517e25669.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:996
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziof0284.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziof0284.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3728
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr329149.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr329149.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4156
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku476592.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku476592.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3500
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr525455.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr525455.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2488

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr525455.exe

    Filesize

    175KB

    MD5

    b8df08e136c294e117d6843563c6cd0f

    SHA1

    9f63893c24f1af7f10ce2431a4c0e64a569a18d5

    SHA256

    862399f3989d036ab98bc6aeee37b3e60c82bfb1eeaaab5d74f576ecf13d4a45

    SHA512

    b1a8d483a37f5125f0a2779feff490a64fa3552c8d00845fc7c0e7c91d5e06746ffca2a87598183968e3991ea227b6b64a4bad35caba738c61fe5090a0dfb45b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr525455.exe

    Filesize

    175KB

    MD5

    b8df08e136c294e117d6843563c6cd0f

    SHA1

    9f63893c24f1af7f10ce2431a4c0e64a569a18d5

    SHA256

    862399f3989d036ab98bc6aeee37b3e60c82bfb1eeaaab5d74f576ecf13d4a45

    SHA512

    b1a8d483a37f5125f0a2779feff490a64fa3552c8d00845fc7c0e7c91d5e06746ffca2a87598183968e3991ea227b6b64a4bad35caba738c61fe5090a0dfb45b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziof0284.exe

    Filesize

    394KB

    MD5

    517aee8e37beda59bcdf437bffc98e2e

    SHA1

    0ff02b41fe3ab823d3707b053044801819eda8bc

    SHA256

    854dae1510b93cd2b909e7367beaed5f59a26b0c3774db90394d6bf9f922705c

    SHA512

    f183da5de6c6fe32b156cc53c844a5a8996dc5c2a0763eb3be2ced79286057a468d008d7e2fa458b8f4218e753f1e74b2430c7cc2e4ce9907c47a4f6ff651c38

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziof0284.exe

    Filesize

    394KB

    MD5

    517aee8e37beda59bcdf437bffc98e2e

    SHA1

    0ff02b41fe3ab823d3707b053044801819eda8bc

    SHA256

    854dae1510b93cd2b909e7367beaed5f59a26b0c3774db90394d6bf9f922705c

    SHA512

    f183da5de6c6fe32b156cc53c844a5a8996dc5c2a0763eb3be2ced79286057a468d008d7e2fa458b8f4218e753f1e74b2430c7cc2e4ce9907c47a4f6ff651c38

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr329149.exe

    Filesize

    13KB

    MD5

    93f1aae2f1fe5bb30a3312c566f15281

    SHA1

    4da51090aa2e49a722306a8384111601f3f86f67

    SHA256

    d290df5bc452eb1c9968552ebf8e243cbc2797233fb7c4ceba7f185b7852bfbb

    SHA512

    de9ea969ed792ce52a02bf00d2437f81bfd26bedf7e04f483bc031ba3303990f65ac269061d8561ffa41f0fd383b0cf742fba9b115295a962b288afb7231216d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr329149.exe

    Filesize

    13KB

    MD5

    93f1aae2f1fe5bb30a3312c566f15281

    SHA1

    4da51090aa2e49a722306a8384111601f3f86f67

    SHA256

    d290df5bc452eb1c9968552ebf8e243cbc2797233fb7c4ceba7f185b7852bfbb

    SHA512

    de9ea969ed792ce52a02bf00d2437f81bfd26bedf7e04f483bc031ba3303990f65ac269061d8561ffa41f0fd383b0cf742fba9b115295a962b288afb7231216d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku476592.exe

    Filesize

    353KB

    MD5

    b799dcdeee9cb9eae0819cc640877af1

    SHA1

    6cd145de0266396439506283ec154592131ec92a

    SHA256

    63b5cff83282599093be04fc73233f1d5461669ee408a4a56177a8fb65b2d138

    SHA512

    c2a1d494c7fe267439702deed6063d2be4882660cc1e3a222dcf85882bd056ba3313707a208bd50906ae3f156d4b7173c1078e2cfaf0871779706edf49303cf0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku476592.exe

    Filesize

    353KB

    MD5

    b799dcdeee9cb9eae0819cc640877af1

    SHA1

    6cd145de0266396439506283ec154592131ec92a

    SHA256

    63b5cff83282599093be04fc73233f1d5461669ee408a4a56177a8fb65b2d138

    SHA512

    c2a1d494c7fe267439702deed6063d2be4882660cc1e3a222dcf85882bd056ba3313707a208bd50906ae3f156d4b7173c1078e2cfaf0871779706edf49303cf0

  • memory/2488-1074-0x0000000000780000-0x00000000007B2000-memory.dmp

    Filesize

    200KB

  • memory/2488-1075-0x00000000051C0000-0x000000000520B000-memory.dmp

    Filesize

    300KB

  • memory/2488-1076-0x0000000005090000-0x00000000050A0000-memory.dmp

    Filesize

    64KB

  • memory/3500-176-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-188-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-145-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/3500-144-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/3500-143-0x00000000008E0000-0x000000000092B000-memory.dmp

    Filesize

    300KB

  • memory/3500-146-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/3500-147-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-148-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-150-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-152-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-154-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-156-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-158-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-160-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-162-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-164-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-166-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-168-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-170-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-172-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-174-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-141-0x0000000004EE0000-0x00000000053DE000-memory.dmp

    Filesize

    5.0MB

  • memory/3500-178-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-180-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-182-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-184-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-190-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-142-0x0000000002890000-0x00000000028D4000-memory.dmp

    Filesize

    272KB

  • memory/3500-186-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-192-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-194-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-196-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-198-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-200-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-202-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-204-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-206-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-208-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-210-0x0000000002890000-0x00000000028CF000-memory.dmp

    Filesize

    252KB

  • memory/3500-1053-0x00000000053E0000-0x00000000059E6000-memory.dmp

    Filesize

    6.0MB

  • memory/3500-1054-0x00000000059F0000-0x0000000005AFA000-memory.dmp

    Filesize

    1.0MB

  • memory/3500-1055-0x0000000005B00000-0x0000000005B12000-memory.dmp

    Filesize

    72KB

  • memory/3500-1056-0x0000000005B20000-0x0000000005B5E000-memory.dmp

    Filesize

    248KB

  • memory/3500-1057-0x0000000005C60000-0x0000000005CAB000-memory.dmp

    Filesize

    300KB

  • memory/3500-1058-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/3500-1060-0x0000000005DF0000-0x0000000005E56000-memory.dmp

    Filesize

    408KB

  • memory/3500-1061-0x00000000064B0000-0x0000000006542000-memory.dmp

    Filesize

    584KB

  • memory/3500-1062-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/3500-1063-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/3500-1064-0x0000000006680000-0x00000000066F6000-memory.dmp

    Filesize

    472KB

  • memory/3500-140-0x00000000026F0000-0x0000000002736000-memory.dmp

    Filesize

    280KB

  • memory/3500-1065-0x0000000006700000-0x0000000006750000-memory.dmp

    Filesize

    320KB

  • memory/3500-1066-0x00000000068C0000-0x0000000006A82000-memory.dmp

    Filesize

    1.8MB

  • memory/3500-1067-0x0000000006AA0000-0x0000000006FCC000-memory.dmp

    Filesize

    5.2MB

  • memory/3500-1068-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/4156-134-0x0000000000E70000-0x0000000000E7A000-memory.dmp

    Filesize

    40KB