Analysis

  • max time kernel
    53s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02-04-2023 20:31

General

  • Target

    a633315c5acb9c7aec11aed8454c4286c1b95d0d23a35da132d6e7501e81ed07.exe

  • Size

    536KB

  • MD5

    3f606784b2bc2b2aa5546ae4115bfd79

  • SHA1

    35f196d4eead00597d33e6a8890c1af5113d3f19

  • SHA256

    a633315c5acb9c7aec11aed8454c4286c1b95d0d23a35da132d6e7501e81ed07

  • SHA512

    6bd4cce65405b26d56a52f3c5b12c82ed3e62ac585c6fdbeeb708b4fbb1bfa896b71acfdda3f92f57741446dfe7a1387989fd63250d6b9492bb94232ed485ef8

  • SSDEEP

    12288:dMrey90oxiG/2ShO1z8u8GN+zjyqrLsBYQc:jypj+S87ZN+Zrulc

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a633315c5acb9c7aec11aed8454c4286c1b95d0d23a35da132d6e7501e81ed07.exe
    "C:\Users\Admin\AppData\Local\Temp\a633315c5acb9c7aec11aed8454c4286c1b95d0d23a35da132d6e7501e81ed07.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziye3502.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziye3502.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3280
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr791474.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr791474.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3396
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku292423.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku292423.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3404
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr284252.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr284252.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1548

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr284252.exe

    Filesize

    175KB

    MD5

    ff8e40a54e81566afe3539b0d45504b8

    SHA1

    1f9dd25e0e5f68dd749c827f3b5842016f9572c4

    SHA256

    3a40de706144a84bc04c43903697186c015f99f97c02d055fc53c24c968f79e8

    SHA512

    7dd77ea570b47bf15f27c35e44b291d27f4037d026f103b994e5b5463ca3634e1b54946cb1e329ba361868ac4b0be9b4d4be45887b369bef0282de6d10348eee

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr284252.exe

    Filesize

    175KB

    MD5

    ff8e40a54e81566afe3539b0d45504b8

    SHA1

    1f9dd25e0e5f68dd749c827f3b5842016f9572c4

    SHA256

    3a40de706144a84bc04c43903697186c015f99f97c02d055fc53c24c968f79e8

    SHA512

    7dd77ea570b47bf15f27c35e44b291d27f4037d026f103b994e5b5463ca3634e1b54946cb1e329ba361868ac4b0be9b4d4be45887b369bef0282de6d10348eee

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziye3502.exe

    Filesize

    394KB

    MD5

    4526752661f13bd6d940e6f7df2142a1

    SHA1

    e13075ff8fc336e3ec191e1983c2114c6699a647

    SHA256

    47a3b8a45c6b12c2d5a3e65d389bce3cd3d744319f5c71cddcb8b67fdb03166d

    SHA512

    e69e8446f8be8ebdedb7d85619b39c3353941e93c304f8967cb63ab57de207214a873b814985d56c1cce48c75ccaf8406ad6d1ae62a91cc6afcf9506159aad34

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziye3502.exe

    Filesize

    394KB

    MD5

    4526752661f13bd6d940e6f7df2142a1

    SHA1

    e13075ff8fc336e3ec191e1983c2114c6699a647

    SHA256

    47a3b8a45c6b12c2d5a3e65d389bce3cd3d744319f5c71cddcb8b67fdb03166d

    SHA512

    e69e8446f8be8ebdedb7d85619b39c3353941e93c304f8967cb63ab57de207214a873b814985d56c1cce48c75ccaf8406ad6d1ae62a91cc6afcf9506159aad34

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr791474.exe

    Filesize

    13KB

    MD5

    1b1b3d51477db83537ed04f88b66db00

    SHA1

    11ed2efc66102f4b90ed4255c2f065bbb9436a4a

    SHA256

    f856bf45f40f0efcd60acc3185d17998b83aad4e78cc348078409492f115232f

    SHA512

    dfdf5094973a9904e85222466b09f001ec682cbf5113bcf2331a1d65b542c2bd5e23452b543c98f11d8a666bbb9575f11b07c2301231d5c19f7a2821c70b90b1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr791474.exe

    Filesize

    13KB

    MD5

    1b1b3d51477db83537ed04f88b66db00

    SHA1

    11ed2efc66102f4b90ed4255c2f065bbb9436a4a

    SHA256

    f856bf45f40f0efcd60acc3185d17998b83aad4e78cc348078409492f115232f

    SHA512

    dfdf5094973a9904e85222466b09f001ec682cbf5113bcf2331a1d65b542c2bd5e23452b543c98f11d8a666bbb9575f11b07c2301231d5c19f7a2821c70b90b1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku292423.exe

    Filesize

    353KB

    MD5

    1680ff15db94ceaaddc47e2667fe92ee

    SHA1

    99e5e929a1b5747be8672b1e169cd9fccbae2461

    SHA256

    b9364ddc4025e376caffd5b85005e0719c918c33741cff84eb646acd152f310e

    SHA512

    df7216b0e9d3343020b821a6209472b83bfb4a93fec95387c39be5c5a706ab859e7c6160e49b31ed1ff57d509d06ddf1818cc8d3d366536137b0087149bcfb65

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku292423.exe

    Filesize

    353KB

    MD5

    1680ff15db94ceaaddc47e2667fe92ee

    SHA1

    99e5e929a1b5747be8672b1e169cd9fccbae2461

    SHA256

    b9364ddc4025e376caffd5b85005e0719c918c33741cff84eb646acd152f310e

    SHA512

    df7216b0e9d3343020b821a6209472b83bfb4a93fec95387c39be5c5a706ab859e7c6160e49b31ed1ff57d509d06ddf1818cc8d3d366536137b0087149bcfb65

  • memory/1548-1074-0x00000000006C0000-0x00000000006F2000-memory.dmp

    Filesize

    200KB

  • memory/1548-1075-0x0000000005120000-0x000000000516B000-memory.dmp

    Filesize

    300KB

  • memory/1548-1076-0x0000000004F30000-0x0000000004F40000-memory.dmp

    Filesize

    64KB

  • memory/3396-135-0x0000000000200000-0x000000000020A000-memory.dmp

    Filesize

    40KB

  • memory/3404-175-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-189-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-144-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/3404-145-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/3404-146-0x0000000004F80000-0x000000000547E000-memory.dmp

    Filesize

    5.0MB

  • memory/3404-147-0x0000000002700000-0x0000000002744000-memory.dmp

    Filesize

    272KB

  • memory/3404-148-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-149-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-151-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-153-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-155-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-157-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-159-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-161-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-163-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-165-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-167-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-169-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-171-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-173-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-142-0x0000000002540000-0x0000000002586000-memory.dmp

    Filesize

    280KB

  • memory/3404-177-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-179-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-181-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-183-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-185-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-187-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-143-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/3404-191-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-193-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-195-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-197-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-199-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-201-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-203-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-205-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-207-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-209-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-211-0x0000000002700000-0x000000000273F000-memory.dmp

    Filesize

    252KB

  • memory/3404-1054-0x0000000005480000-0x0000000005A86000-memory.dmp

    Filesize

    6.0MB

  • memory/3404-1055-0x0000000005A90000-0x0000000005B9A000-memory.dmp

    Filesize

    1.0MB

  • memory/3404-1056-0x0000000004EC0000-0x0000000004ED2000-memory.dmp

    Filesize

    72KB

  • memory/3404-1057-0x0000000004EE0000-0x0000000004F1E000-memory.dmp

    Filesize

    248KB

  • memory/3404-1058-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/3404-1059-0x0000000005CA0000-0x0000000005CEB000-memory.dmp

    Filesize

    300KB

  • memory/3404-1061-0x0000000005DF0000-0x0000000005E56000-memory.dmp

    Filesize

    408KB

  • memory/3404-1062-0x00000000064B0000-0x0000000006542000-memory.dmp

    Filesize

    584KB

  • memory/3404-1063-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/3404-141-0x0000000000910000-0x000000000095B000-memory.dmp

    Filesize

    300KB

  • memory/3404-1064-0x0000000006570000-0x00000000065E6000-memory.dmp

    Filesize

    472KB

  • memory/3404-1065-0x0000000006600000-0x0000000006650000-memory.dmp

    Filesize

    320KB

  • memory/3404-1067-0x0000000007B80000-0x0000000007D42000-memory.dmp

    Filesize

    1.8MB

  • memory/3404-1068-0x0000000007D50000-0x000000000827C000-memory.dmp

    Filesize

    5.2MB