Analysis

  • max time kernel
    49s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-04-2023 21:36

General

  • Target

    85384c16ab053a9db5aaab3128b174d7af4001a6a0c41e5b05548e3546081089.exe

  • Size

    659KB

  • MD5

    793a3826bb9d018ee270f6c7c11d633d

  • SHA1

    39aa389940d94f610a71659fe517444061c7b52c

  • SHA256

    85384c16ab053a9db5aaab3128b174d7af4001a6a0c41e5b05548e3546081089

  • SHA512

    32318f84b2353bc87781dab214c0a196ee13985823340ea43759faca633a42119063d93ae6eeb4b680d5da9cba0a6316dd335956d8c65893e0fedc643e49177f

  • SSDEEP

    12288:pMrmy90p9TDYpeQWwG+pO0CQKlra5zOtpotAmhDkVrfRnT44GzWK0P8vYvXIvZRn:nyA9EWwk0qagt0mVtns4/K6X8RKg

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 22 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85384c16ab053a9db5aaab3128b174d7af4001a6a0c41e5b05548e3546081089.exe
    "C:\Users\Admin\AppData\Local\Temp\85384c16ab053a9db5aaab3128b174d7af4001a6a0c41e5b05548e3546081089.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3480
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un646771.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un646771.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3996
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9678.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9678.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3508
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6348.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6348.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4768
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si955647.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si955647.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3684

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si955647.exe

    Filesize

    175KB

    MD5

    d7f811f4f890ad58498a5f81815aa57a

    SHA1

    6bb8207ce4c5c6f3cabf0c0327e9d056b6b07cf4

    SHA256

    58b9e8856b4e86ebb1b7281cb1c81419402e8a1d5734dd775b6f71f07eb5383d

    SHA512

    0dc9d0a2364c4b9b99c02ddc9d76f7845aa18bd5886c1fbde88ee9e3b1f76fb6141efb8b50a2b0ecb0c0256a15c1323b1bbe9949a8672e8e9763df50817a9435

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si955647.exe

    Filesize

    175KB

    MD5

    d7f811f4f890ad58498a5f81815aa57a

    SHA1

    6bb8207ce4c5c6f3cabf0c0327e9d056b6b07cf4

    SHA256

    58b9e8856b4e86ebb1b7281cb1c81419402e8a1d5734dd775b6f71f07eb5383d

    SHA512

    0dc9d0a2364c4b9b99c02ddc9d76f7845aa18bd5886c1fbde88ee9e3b1f76fb6141efb8b50a2b0ecb0c0256a15c1323b1bbe9949a8672e8e9763df50817a9435

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un646771.exe

    Filesize

    516KB

    MD5

    7f6efc27b6981beb4cc8fdb560553d5a

    SHA1

    f36f744da6332e40d4df27d33069194d5d82a722

    SHA256

    1f0e3c9e8e8269dd5fb78d2a2fa2ff9fae1782f3ebc28929f5ec3b2e06cc2610

    SHA512

    ccca528f9be5245e7a0243b05ddce76e054c5d5f6a119cb740bb73c2a17302e6ec501fa38669d4dde827d5b116b13080ead8f0e3ca4da8e83687f5b6fb7ffc4a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un646771.exe

    Filesize

    516KB

    MD5

    7f6efc27b6981beb4cc8fdb560553d5a

    SHA1

    f36f744da6332e40d4df27d33069194d5d82a722

    SHA256

    1f0e3c9e8e8269dd5fb78d2a2fa2ff9fae1782f3ebc28929f5ec3b2e06cc2610

    SHA512

    ccca528f9be5245e7a0243b05ddce76e054c5d5f6a119cb740bb73c2a17302e6ec501fa38669d4dde827d5b116b13080ead8f0e3ca4da8e83687f5b6fb7ffc4a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9678.exe

    Filesize

    235KB

    MD5

    9d853047861ec23acc2ae9aa4ac52296

    SHA1

    8e37fd9e8d6dab5e867412cf5b546f2a1ad82b74

    SHA256

    316469ec552a4173918c7455a324fc790387ca7842969aa0973c006c522c9860

    SHA512

    d1cfdcc5c52a6b6dd1934d9b55b9e42fbc2276101918008509fc856f07c3065366b8f38ca36ff78dcf996daf8e2354c80b7cd33394430013bfdf7fa6a3bd2cea

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9678.exe

    Filesize

    235KB

    MD5

    9d853047861ec23acc2ae9aa4ac52296

    SHA1

    8e37fd9e8d6dab5e867412cf5b546f2a1ad82b74

    SHA256

    316469ec552a4173918c7455a324fc790387ca7842969aa0973c006c522c9860

    SHA512

    d1cfdcc5c52a6b6dd1934d9b55b9e42fbc2276101918008509fc856f07c3065366b8f38ca36ff78dcf996daf8e2354c80b7cd33394430013bfdf7fa6a3bd2cea

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6348.exe

    Filesize

    294KB

    MD5

    9dcfcee5fca67c6500258a9a6bfff901

    SHA1

    4d20d02cf309f72938d72230038765749daab53e

    SHA256

    1b15547b2313fd61bd911597de56ef3dff6c918001b17a19cb96a42fbcd96bfa

    SHA512

    55c3c17d1f4af3cc45ad0736044a41fe3d7cc1fde97ee3dbcb17a3ee10eab2476f37a60d400c20d08e84507d1782b576bd2291078ef8a1c11a2a206ebb8ef334

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6348.exe

    Filesize

    294KB

    MD5

    9dcfcee5fca67c6500258a9a6bfff901

    SHA1

    4d20d02cf309f72938d72230038765749daab53e

    SHA256

    1b15547b2313fd61bd911597de56ef3dff6c918001b17a19cb96a42fbcd96bfa

    SHA512

    55c3c17d1f4af3cc45ad0736044a41fe3d7cc1fde97ee3dbcb17a3ee10eab2476f37a60d400c20d08e84507d1782b576bd2291078ef8a1c11a2a206ebb8ef334

  • memory/3508-132-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/3508-133-0x0000000000750000-0x000000000076A000-memory.dmp

    Filesize

    104KB

  • memory/3508-134-0x0000000004CD0000-0x00000000051CE000-memory.dmp

    Filesize

    5.0MB

  • memory/3508-135-0x00000000021C0000-0x00000000021D8000-memory.dmp

    Filesize

    96KB

  • memory/3508-136-0x00000000021C0000-0x00000000021D2000-memory.dmp

    Filesize

    72KB

  • memory/3508-137-0x00000000021C0000-0x00000000021D2000-memory.dmp

    Filesize

    72KB

  • memory/3508-139-0x00000000021C0000-0x00000000021D2000-memory.dmp

    Filesize

    72KB

  • memory/3508-141-0x00000000021C0000-0x00000000021D2000-memory.dmp

    Filesize

    72KB

  • memory/3508-143-0x00000000021C0000-0x00000000021D2000-memory.dmp

    Filesize

    72KB

  • memory/3508-144-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

    Filesize

    64KB

  • memory/3508-147-0x00000000021C0000-0x00000000021D2000-memory.dmp

    Filesize

    72KB

  • memory/3508-146-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

    Filesize

    64KB

  • memory/3508-149-0x00000000021C0000-0x00000000021D2000-memory.dmp

    Filesize

    72KB

  • memory/3508-151-0x00000000021C0000-0x00000000021D2000-memory.dmp

    Filesize

    72KB

  • memory/3508-153-0x00000000021C0000-0x00000000021D2000-memory.dmp

    Filesize

    72KB

  • memory/3508-155-0x00000000021C0000-0x00000000021D2000-memory.dmp

    Filesize

    72KB

  • memory/3508-157-0x00000000021C0000-0x00000000021D2000-memory.dmp

    Filesize

    72KB

  • memory/3508-159-0x00000000021C0000-0x00000000021D2000-memory.dmp

    Filesize

    72KB

  • memory/3508-161-0x00000000021C0000-0x00000000021D2000-memory.dmp

    Filesize

    72KB

  • memory/3508-163-0x00000000021C0000-0x00000000021D2000-memory.dmp

    Filesize

    72KB

  • memory/3508-165-0x00000000021C0000-0x00000000021D2000-memory.dmp

    Filesize

    72KB

  • memory/3508-166-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/3508-167-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

    Filesize

    64KB

  • memory/3508-168-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

    Filesize

    64KB

  • memory/3508-169-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

    Filesize

    64KB

  • memory/3508-171-0x0000000000400000-0x00000000004A9000-memory.dmp

    Filesize

    676KB

  • memory/3684-1109-0x0000000000A50000-0x0000000000A82000-memory.dmp

    Filesize

    200KB

  • memory/3684-1111-0x00000000055D0000-0x00000000055E0000-memory.dmp

    Filesize

    64KB

  • memory/3684-1110-0x0000000005490000-0x00000000054DB000-memory.dmp

    Filesize

    300KB

  • memory/4768-179-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4768-211-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4768-181-0x0000000000590000-0x00000000005DB000-memory.dmp

    Filesize

    300KB

  • memory/4768-182-0x0000000004C20000-0x0000000004C30000-memory.dmp

    Filesize

    64KB

  • memory/4768-183-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4768-184-0x0000000004C20000-0x0000000004C30000-memory.dmp

    Filesize

    64KB

  • memory/4768-186-0x0000000004C20000-0x0000000004C30000-memory.dmp

    Filesize

    64KB

  • memory/4768-187-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4768-189-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4768-191-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4768-193-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4768-195-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4768-199-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4768-197-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4768-201-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4768-203-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4768-205-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4768-207-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4768-209-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4768-178-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4768-213-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4768-215-0x00000000023B0000-0x00000000023EF000-memory.dmp

    Filesize

    252KB

  • memory/4768-1088-0x0000000005230000-0x0000000005836000-memory.dmp

    Filesize

    6.0MB

  • memory/4768-1089-0x0000000005840000-0x000000000594A000-memory.dmp

    Filesize

    1.0MB

  • memory/4768-1090-0x0000000004BB0000-0x0000000004BC2000-memory.dmp

    Filesize

    72KB

  • memory/4768-1091-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

    Filesize

    248KB

  • memory/4768-1092-0x0000000005A50000-0x0000000005A9B000-memory.dmp

    Filesize

    300KB

  • memory/4768-1093-0x0000000004C20000-0x0000000004C30000-memory.dmp

    Filesize

    64KB

  • memory/4768-1096-0x0000000004C20000-0x0000000004C30000-memory.dmp

    Filesize

    64KB

  • memory/4768-1095-0x0000000004C20000-0x0000000004C30000-memory.dmp

    Filesize

    64KB

  • memory/4768-1097-0x0000000004C20000-0x0000000004C30000-memory.dmp

    Filesize

    64KB

  • memory/4768-1098-0x0000000005BE0000-0x0000000005C46000-memory.dmp

    Filesize

    408KB

  • memory/4768-1099-0x00000000062A0000-0x0000000006332000-memory.dmp

    Filesize

    584KB

  • memory/4768-1100-0x0000000006360000-0x00000000063D6000-memory.dmp

    Filesize

    472KB

  • memory/4768-177-0x00000000023B0000-0x00000000023F4000-memory.dmp

    Filesize

    272KB

  • memory/4768-176-0x0000000002140000-0x0000000002186000-memory.dmp

    Filesize

    280KB

  • memory/4768-1101-0x00000000063F0000-0x0000000006440000-memory.dmp

    Filesize

    320KB

  • memory/4768-1102-0x0000000006580000-0x0000000006742000-memory.dmp

    Filesize

    1.8MB

  • memory/4768-1103-0x0000000006750000-0x0000000006C7C000-memory.dmp

    Filesize

    5.2MB