Analysis

  • max time kernel
    64s
  • max time network
    72s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-04-2023 21:27

General

  • Target

    32c00fd90dcabac67fb11a5e85fee3d9e26a2d8ca1cfd1ee219d65b4ee254194.exe

  • Size

    657KB

  • MD5

    00328bacdb23f7f6e97d201d5ea0d485

  • SHA1

    acfea07f9f8444c04fb55e861ce32a172fce60dd

  • SHA256

    32c00fd90dcabac67fb11a5e85fee3d9e26a2d8ca1cfd1ee219d65b4ee254194

  • SHA512

    b381b37b38f3debe11d8834c117108b41203d17b0afa3f26675c555a69ee3b0298401b02b6bcbe01c8c59ef1141dabab317ae97d1008317ea7b89cdb2fa1887c

  • SSDEEP

    12288:SMrDy90YYBwhZb1BncVRDtIQe5l9uWBLt84MWE8Q44azWKNC8vBQn4GtyE:1yoBm1SDt7eZhEP854jKY4Sx

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\32c00fd90dcabac67fb11a5e85fee3d9e26a2d8ca1cfd1ee219d65b4ee254194.exe
    "C:\Users\Admin\AppData\Local\Temp\32c00fd90dcabac67fb11a5e85fee3d9e26a2d8ca1cfd1ee219d65b4ee254194.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3624
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un724967.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un724967.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4468
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0066.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0066.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4924
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5713.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5713.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4824
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si816472.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si816472.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3088

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si816472.exe
    Filesize

    175KB

    MD5

    3621b1505d42d0433113a3c61e52612e

    SHA1

    f2e2c4a4f132b4f26be78f4f1b421198e2752113

    SHA256

    8b578dad213dfa7a504cc8feb63ab2d68da21f8211a26125b4bdb1c30c65bbb0

    SHA512

    9923f9deded577d14db501184631bd05e64470eb5273d1ef55252f9c2f12db0fceafeed48fe24d997ec652fd36bf18c8cbafa41f00afb3283ffc6bc1084f63a9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si816472.exe
    Filesize

    175KB

    MD5

    3621b1505d42d0433113a3c61e52612e

    SHA1

    f2e2c4a4f132b4f26be78f4f1b421198e2752113

    SHA256

    8b578dad213dfa7a504cc8feb63ab2d68da21f8211a26125b4bdb1c30c65bbb0

    SHA512

    9923f9deded577d14db501184631bd05e64470eb5273d1ef55252f9c2f12db0fceafeed48fe24d997ec652fd36bf18c8cbafa41f00afb3283ffc6bc1084f63a9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un724967.exe
    Filesize

    515KB

    MD5

    c960832f904b85dd871eb33c0fb180dd

    SHA1

    5630513a75be0a4646b2ccc8e2b90f54c5fe1c0f

    SHA256

    c2ee8e6c6af0442d5bf2d5eefdd4411244a7d952f6de2c6491c7f801b4f949b8

    SHA512

    3c7ebdcb412527adb1e3a8a4ad028ca0aee123b7a0c9d4a3753dcd69c258b5976f013150deb59d79c0835ea307ccf6ea9cb396263a5cbc1c772e60030624a001

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un724967.exe
    Filesize

    515KB

    MD5

    c960832f904b85dd871eb33c0fb180dd

    SHA1

    5630513a75be0a4646b2ccc8e2b90f54c5fe1c0f

    SHA256

    c2ee8e6c6af0442d5bf2d5eefdd4411244a7d952f6de2c6491c7f801b4f949b8

    SHA512

    3c7ebdcb412527adb1e3a8a4ad028ca0aee123b7a0c9d4a3753dcd69c258b5976f013150deb59d79c0835ea307ccf6ea9cb396263a5cbc1c772e60030624a001

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0066.exe
    Filesize

    235KB

    MD5

    02b4741c9b5eaf5a73c25453243a0868

    SHA1

    c01a160057d0781a680f5747564e0ee8e391dc35

    SHA256

    c77c3cd7f7fde6de8034e67338516c0c2a651bb32873740ed4e60be131752d03

    SHA512

    e736dd265f7694f4913950f9e951a98aa6b41536b7f6bee0b8a5552d8d46918b6213ddba5b8a2785b078ae878a228e78822488f490da02ff8d519c0afbf2cb5c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0066.exe
    Filesize

    235KB

    MD5

    02b4741c9b5eaf5a73c25453243a0868

    SHA1

    c01a160057d0781a680f5747564e0ee8e391dc35

    SHA256

    c77c3cd7f7fde6de8034e67338516c0c2a651bb32873740ed4e60be131752d03

    SHA512

    e736dd265f7694f4913950f9e951a98aa6b41536b7f6bee0b8a5552d8d46918b6213ddba5b8a2785b078ae878a228e78822488f490da02ff8d519c0afbf2cb5c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5713.exe
    Filesize

    294KB

    MD5

    f47700d06deaeadb23f0185b4f36f397

    SHA1

    62ed337214f07319e9072cc472c1d053c970f993

    SHA256

    aa49a524d74b18603705c919d6dd8431e269be26549d6c0ee168bdccc7903a9e

    SHA512

    76e5a1ac53689a3e9f94570e9f75fb1ed68adb69d4b68a89511fd4cb20b0b010e55565d42e542605f0ee0fd222266e3a314e4eb4eaf8f8e57bdab4de4ea6ef0e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5713.exe
    Filesize

    294KB

    MD5

    f47700d06deaeadb23f0185b4f36f397

    SHA1

    62ed337214f07319e9072cc472c1d053c970f993

    SHA256

    aa49a524d74b18603705c919d6dd8431e269be26549d6c0ee168bdccc7903a9e

    SHA512

    76e5a1ac53689a3e9f94570e9f75fb1ed68adb69d4b68a89511fd4cb20b0b010e55565d42e542605f0ee0fd222266e3a314e4eb4eaf8f8e57bdab4de4ea6ef0e

  • memory/3088-1113-0x0000000004F30000-0x0000000004F40000-memory.dmp
    Filesize

    64KB

  • memory/3088-1112-0x0000000005050000-0x000000000509B000-memory.dmp
    Filesize

    300KB

  • memory/3088-1111-0x0000000000610000-0x0000000000642000-memory.dmp
    Filesize

    200KB

  • memory/4824-1091-0x0000000004C90000-0x0000000004D9A000-memory.dmp
    Filesize

    1.0MB

  • memory/4824-1094-0x0000000002790000-0x00000000027DB000-memory.dmp
    Filesize

    300KB

  • memory/4824-1105-0x0000000004DD0000-0x0000000004DE0000-memory.dmp
    Filesize

    64KB

  • memory/4824-1104-0x0000000006750000-0x0000000006C7C000-memory.dmp
    Filesize

    5.2MB

  • memory/4824-1103-0x0000000006580000-0x0000000006742000-memory.dmp
    Filesize

    1.8MB

  • memory/4824-1102-0x00000000064F0000-0x0000000006540000-memory.dmp
    Filesize

    320KB

  • memory/4824-1101-0x0000000006460000-0x00000000064D6000-memory.dmp
    Filesize

    472KB

  • memory/4824-1100-0x0000000004DD0000-0x0000000004DE0000-memory.dmp
    Filesize

    64KB

  • memory/4824-1098-0x0000000005530000-0x0000000005596000-memory.dmp
    Filesize

    408KB

  • memory/4824-1097-0x0000000005490000-0x0000000005522000-memory.dmp
    Filesize

    584KB

  • memory/4824-1096-0x0000000004DD0000-0x0000000004DE0000-memory.dmp
    Filesize

    64KB

  • memory/4824-1095-0x0000000004DD0000-0x0000000004DE0000-memory.dmp
    Filesize

    64KB

  • memory/4824-1093-0x0000000002750000-0x000000000278E000-memory.dmp
    Filesize

    248KB

  • memory/4824-1092-0x0000000002500000-0x0000000002512000-memory.dmp
    Filesize

    72KB

  • memory/4824-1090-0x00000000058F0000-0x0000000005EF6000-memory.dmp
    Filesize

    6.0MB

  • memory/4824-217-0x00000000022C0000-0x00000000022FF000-memory.dmp
    Filesize

    252KB

  • memory/4824-215-0x00000000022C0000-0x00000000022FF000-memory.dmp
    Filesize

    252KB

  • memory/4824-213-0x00000000022C0000-0x00000000022FF000-memory.dmp
    Filesize

    252KB

  • memory/4824-211-0x00000000022C0000-0x00000000022FF000-memory.dmp
    Filesize

    252KB

  • memory/4824-209-0x00000000022C0000-0x00000000022FF000-memory.dmp
    Filesize

    252KB

  • memory/4824-207-0x00000000022C0000-0x00000000022FF000-memory.dmp
    Filesize

    252KB

  • memory/4824-205-0x00000000022C0000-0x00000000022FF000-memory.dmp
    Filesize

    252KB

  • memory/4824-180-0x0000000000590000-0x00000000005DB000-memory.dmp
    Filesize

    300KB

  • memory/4824-179-0x00000000020D0000-0x0000000002116000-memory.dmp
    Filesize

    280KB

  • memory/4824-181-0x0000000004DD0000-0x0000000004DE0000-memory.dmp
    Filesize

    64KB

  • memory/4824-182-0x00000000022C0000-0x0000000002304000-memory.dmp
    Filesize

    272KB

  • memory/4824-184-0x00000000022C0000-0x00000000022FF000-memory.dmp
    Filesize

    252KB

  • memory/4824-183-0x00000000022C0000-0x00000000022FF000-memory.dmp
    Filesize

    252KB

  • memory/4824-186-0x00000000022C0000-0x00000000022FF000-memory.dmp
    Filesize

    252KB

  • memory/4824-188-0x00000000022C0000-0x00000000022FF000-memory.dmp
    Filesize

    252KB

  • memory/4824-190-0x00000000022C0000-0x00000000022FF000-memory.dmp
    Filesize

    252KB

  • memory/4824-192-0x00000000022C0000-0x00000000022FF000-memory.dmp
    Filesize

    252KB

  • memory/4824-194-0x00000000022C0000-0x00000000022FF000-memory.dmp
    Filesize

    252KB

  • memory/4824-197-0x0000000004DD0000-0x0000000004DE0000-memory.dmp
    Filesize

    64KB

  • memory/4824-196-0x00000000022C0000-0x00000000022FF000-memory.dmp
    Filesize

    252KB

  • memory/4824-199-0x00000000022C0000-0x00000000022FF000-memory.dmp
    Filesize

    252KB

  • memory/4824-201-0x00000000022C0000-0x00000000022FF000-memory.dmp
    Filesize

    252KB

  • memory/4824-203-0x00000000022C0000-0x00000000022FF000-memory.dmp
    Filesize

    252KB

  • memory/4924-162-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4924-134-0x0000000002200000-0x000000000221A000-memory.dmp
    Filesize

    104KB

  • memory/4924-136-0x0000000004A40000-0x0000000004A50000-memory.dmp
    Filesize

    64KB

  • memory/4924-172-0x0000000004A40000-0x0000000004A50000-memory.dmp
    Filesize

    64KB

  • memory/4924-171-0x0000000004A40000-0x0000000004A50000-memory.dmp
    Filesize

    64KB

  • memory/4924-170-0x0000000004A40000-0x0000000004A50000-memory.dmp
    Filesize

    64KB

  • memory/4924-169-0x0000000000400000-0x00000000004A9000-memory.dmp
    Filesize

    676KB

  • memory/4924-168-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4924-138-0x0000000004A40000-0x0000000004A50000-memory.dmp
    Filesize

    64KB

  • memory/4924-166-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4924-164-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4924-142-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4924-174-0x0000000000400000-0x00000000004A9000-memory.dmp
    Filesize

    676KB

  • memory/4924-141-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4924-144-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4924-156-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4924-154-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4924-152-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4924-150-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4924-148-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4924-146-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4924-158-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4924-140-0x0000000004A40000-0x0000000004A50000-memory.dmp
    Filesize

    64KB

  • memory/4924-139-0x00000000049D0000-0x00000000049E8000-memory.dmp
    Filesize

    96KB

  • memory/4924-137-0x0000000004A50000-0x0000000004F4E000-memory.dmp
    Filesize

    5.0MB

  • memory/4924-135-0x0000000000580000-0x00000000005AD000-memory.dmp
    Filesize

    180KB

  • memory/4924-160-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB