Analysis

  • max time kernel
    52s
  • max time network
    78s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-04-2023 21:43

General

  • Target

    25c085d801a4cd8efbad4fb376455c8bc8d7db93b3c69a421ca715a7c9df78cd.exe

  • Size

    658KB

  • MD5

    7df7203bb397ee1fe3beb46ef92ef8cc

  • SHA1

    147ae8358964f47dce0ad8703239c8db273cef14

  • SHA256

    25c085d801a4cd8efbad4fb376455c8bc8d7db93b3c69a421ca715a7c9df78cd

  • SHA512

    ced232138f3296946b5cdfb0f81938d50d6693f78f0b349956693398e9dfa074779cfe99f631655b2c6879327f7ae37f351a973834bee5303530c4080a17d7f4

  • SSDEEP

    12288:dMrjy90kJZq5TSGpPt5W/QnR001LxiKkKE744KzWKaJ8ve5TPwIXK:ayvJHGVtQInRP18WEk4TKmBwI6

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25c085d801a4cd8efbad4fb376455c8bc8d7db93b3c69a421ca715a7c9df78cd.exe
    "C:\Users\Admin\AppData\Local\Temp\25c085d801a4cd8efbad4fb376455c8bc8d7db93b3c69a421ca715a7c9df78cd.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4120
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un515817.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un515817.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4456
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9868.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9868.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3148
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4321.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4321.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4532
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si256244.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si256244.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4884

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si256244.exe
    Filesize

    175KB

    MD5

    e214e730e4b0c767632064cbe94f5319

    SHA1

    1f19115f2b13b55daf5bbf25ac1c7b6420715409

    SHA256

    6ebbcb77f820866efef72e57cac6cf921bf7770aedf544de59a9be8a7ec8ba3c

    SHA512

    fefa6645eb08058969b023431179a4051e92857eb797b09cef91fdb7fe5d07906ab90f5079d7359ee143d50360dac4ad1f980ab7acfe41d94f44d747323937d9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si256244.exe
    Filesize

    175KB

    MD5

    e214e730e4b0c767632064cbe94f5319

    SHA1

    1f19115f2b13b55daf5bbf25ac1c7b6420715409

    SHA256

    6ebbcb77f820866efef72e57cac6cf921bf7770aedf544de59a9be8a7ec8ba3c

    SHA512

    fefa6645eb08058969b023431179a4051e92857eb797b09cef91fdb7fe5d07906ab90f5079d7359ee143d50360dac4ad1f980ab7acfe41d94f44d747323937d9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un515817.exe
    Filesize

    516KB

    MD5

    886007e1fa9ebbeafcda5cc3b0f0f7cf

    SHA1

    d91571d6ace5e1493a4197dbe80bac9ae887bfee

    SHA256

    f783d18a2d413561b593412edd0753d5a0593faed906eacb019b43536ecdd9b3

    SHA512

    506b8cd1099766b4bc417a82841e656a68a05daa9a361d08eaf46f46f7c59301a89a01704934ae3acef57e617657e91d80d786491602354b68ce1bff667a049a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un515817.exe
    Filesize

    516KB

    MD5

    886007e1fa9ebbeafcda5cc3b0f0f7cf

    SHA1

    d91571d6ace5e1493a4197dbe80bac9ae887bfee

    SHA256

    f783d18a2d413561b593412edd0753d5a0593faed906eacb019b43536ecdd9b3

    SHA512

    506b8cd1099766b4bc417a82841e656a68a05daa9a361d08eaf46f46f7c59301a89a01704934ae3acef57e617657e91d80d786491602354b68ce1bff667a049a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9868.exe
    Filesize

    235KB

    MD5

    d8e073ed26905fa12937a32ca2ef3490

    SHA1

    5ea76aaade90bc25e076ff47b241b94948c38405

    SHA256

    80fc76792814e778adf73531dba4a53b43ae391c457ed3007a9018d4e6bfa3e2

    SHA512

    aee8b2ded36a9834a48e42e61d981076d9090c8240d087b39c9b0f5646ecbf058b2bf3b9e7302e0b0dd14c047188a1d380ed04375073805ebc7c5dd452462a1f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9868.exe
    Filesize

    235KB

    MD5

    d8e073ed26905fa12937a32ca2ef3490

    SHA1

    5ea76aaade90bc25e076ff47b241b94948c38405

    SHA256

    80fc76792814e778adf73531dba4a53b43ae391c457ed3007a9018d4e6bfa3e2

    SHA512

    aee8b2ded36a9834a48e42e61d981076d9090c8240d087b39c9b0f5646ecbf058b2bf3b9e7302e0b0dd14c047188a1d380ed04375073805ebc7c5dd452462a1f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4321.exe
    Filesize

    294KB

    MD5

    a52554eb6dbdf46e67e67b66f7b7e12b

    SHA1

    b87f01ce6efb81d55e8745a35d888d2462fe725b

    SHA256

    5f4b1470ff5ad8985168ddefac3a745355d398634fd31f573f4d9d0c035bb6a2

    SHA512

    9cb8ff5679d8ee2a48ec0a2f879c8a4fb692095ad1fde54894e1e420a1223e37fd45b6a87856218a7ea6e48d0694b2ba2fb4da3759599a9fc34dda21fa38b099

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4321.exe
    Filesize

    294KB

    MD5

    a52554eb6dbdf46e67e67b66f7b7e12b

    SHA1

    b87f01ce6efb81d55e8745a35d888d2462fe725b

    SHA256

    5f4b1470ff5ad8985168ddefac3a745355d398634fd31f573f4d9d0c035bb6a2

    SHA512

    9cb8ff5679d8ee2a48ec0a2f879c8a4fb692095ad1fde54894e1e420a1223e37fd45b6a87856218a7ea6e48d0694b2ba2fb4da3759599a9fc34dda21fa38b099

  • memory/3148-136-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/3148-135-0x0000000002330000-0x000000000234A000-memory.dmp
    Filesize

    104KB

  • memory/3148-137-0x0000000004AF0000-0x0000000004B00000-memory.dmp
    Filesize

    64KB

  • memory/3148-138-0x0000000004B00000-0x0000000004FFE000-memory.dmp
    Filesize

    5.0MB

  • memory/3148-139-0x00000000023E0000-0x00000000023F8000-memory.dmp
    Filesize

    96KB

  • memory/3148-141-0x00000000023E0000-0x00000000023F2000-memory.dmp
    Filesize

    72KB

  • memory/3148-140-0x00000000023E0000-0x00000000023F2000-memory.dmp
    Filesize

    72KB

  • memory/3148-143-0x00000000023E0000-0x00000000023F2000-memory.dmp
    Filesize

    72KB

  • memory/3148-145-0x00000000023E0000-0x00000000023F2000-memory.dmp
    Filesize

    72KB

  • memory/3148-147-0x00000000023E0000-0x00000000023F2000-memory.dmp
    Filesize

    72KB

  • memory/3148-149-0x00000000023E0000-0x00000000023F2000-memory.dmp
    Filesize

    72KB

  • memory/3148-151-0x00000000023E0000-0x00000000023F2000-memory.dmp
    Filesize

    72KB

  • memory/3148-153-0x00000000023E0000-0x00000000023F2000-memory.dmp
    Filesize

    72KB

  • memory/3148-155-0x00000000023E0000-0x00000000023F2000-memory.dmp
    Filesize

    72KB

  • memory/3148-157-0x00000000023E0000-0x00000000023F2000-memory.dmp
    Filesize

    72KB

  • memory/3148-159-0x00000000023E0000-0x00000000023F2000-memory.dmp
    Filesize

    72KB

  • memory/3148-161-0x00000000023E0000-0x00000000023F2000-memory.dmp
    Filesize

    72KB

  • memory/3148-163-0x00000000023E0000-0x00000000023F2000-memory.dmp
    Filesize

    72KB

  • memory/3148-165-0x00000000023E0000-0x00000000023F2000-memory.dmp
    Filesize

    72KB

  • memory/3148-167-0x00000000023E0000-0x00000000023F2000-memory.dmp
    Filesize

    72KB

  • memory/3148-168-0x0000000004AF0000-0x0000000004B00000-memory.dmp
    Filesize

    64KB

  • memory/3148-169-0x0000000004AF0000-0x0000000004B00000-memory.dmp
    Filesize

    64KB

  • memory/3148-170-0x0000000000400000-0x00000000004A9000-memory.dmp
    Filesize

    676KB

  • memory/3148-171-0x0000000004AF0000-0x0000000004B00000-memory.dmp
    Filesize

    64KB

  • memory/3148-173-0x0000000000400000-0x00000000004A9000-memory.dmp
    Filesize

    676KB

  • memory/4532-178-0x00000000048B0000-0x00000000048F6000-memory.dmp
    Filesize

    280KB

  • memory/4532-179-0x0000000004FB0000-0x0000000004FF4000-memory.dmp
    Filesize

    272KB

  • memory/4532-180-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4532-181-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4532-183-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4532-185-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4532-187-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4532-189-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4532-191-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4532-193-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4532-195-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4532-198-0x00000000005A0000-0x00000000005EB000-memory.dmp
    Filesize

    300KB

  • memory/4532-202-0x0000000004920000-0x0000000004930000-memory.dmp
    Filesize

    64KB

  • memory/4532-200-0x0000000004920000-0x0000000004930000-memory.dmp
    Filesize

    64KB

  • memory/4532-201-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4532-205-0x0000000004920000-0x0000000004930000-memory.dmp
    Filesize

    64KB

  • memory/4532-204-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4532-197-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4532-207-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4532-209-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4532-211-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4532-213-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4532-215-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4532-217-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4532-1090-0x0000000005130000-0x0000000005736000-memory.dmp
    Filesize

    6.0MB

  • memory/4532-1091-0x00000000057A0000-0x00000000058AA000-memory.dmp
    Filesize

    1.0MB

  • memory/4532-1092-0x00000000058E0000-0x00000000058F2000-memory.dmp
    Filesize

    72KB

  • memory/4532-1093-0x0000000005900000-0x000000000593E000-memory.dmp
    Filesize

    248KB

  • memory/4532-1094-0x0000000004920000-0x0000000004930000-memory.dmp
    Filesize

    64KB

  • memory/4532-1095-0x0000000005A50000-0x0000000005A9B000-memory.dmp
    Filesize

    300KB

  • memory/4532-1097-0x0000000005BE0000-0x0000000005C72000-memory.dmp
    Filesize

    584KB

  • memory/4532-1098-0x0000000005C80000-0x0000000005CE6000-memory.dmp
    Filesize

    408KB

  • memory/4532-1099-0x0000000004920000-0x0000000004930000-memory.dmp
    Filesize

    64KB

  • memory/4532-1100-0x0000000004920000-0x0000000004930000-memory.dmp
    Filesize

    64KB

  • memory/4532-1101-0x0000000004920000-0x0000000004930000-memory.dmp
    Filesize

    64KB

  • memory/4532-1102-0x0000000006480000-0x00000000064F6000-memory.dmp
    Filesize

    472KB

  • memory/4532-1103-0x0000000006500000-0x0000000006550000-memory.dmp
    Filesize

    320KB

  • memory/4532-1104-0x0000000004920000-0x0000000004930000-memory.dmp
    Filesize

    64KB

  • memory/4532-1105-0x0000000006580000-0x0000000006742000-memory.dmp
    Filesize

    1.8MB

  • memory/4532-1106-0x0000000006750000-0x0000000006C7C000-memory.dmp
    Filesize

    5.2MB

  • memory/4884-1112-0x00000000001E0000-0x0000000000212000-memory.dmp
    Filesize

    200KB

  • memory/4884-1113-0x0000000004C20000-0x0000000004C6B000-memory.dmp
    Filesize

    300KB

  • memory/4884-1114-0x0000000004A10000-0x0000000004A20000-memory.dmp
    Filesize

    64KB