Analysis

  • max time kernel
    52s
  • max time network
    74s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-04-2023 21:46

General

  • Target

    0c951c4b35430c4a724f8b525444b62bd909ca11e4dd86fb401e17b934b4f791.exe

  • Size

    657KB

  • MD5

    332350d8c35eff59c5ac56e27ca627b6

  • SHA1

    0788abec754871df3dc24786d92d1dbb58ff12b8

  • SHA256

    0c951c4b35430c4a724f8b525444b62bd909ca11e4dd86fb401e17b934b4f791

  • SHA512

    bce04eaf7c92440cb5a6841e703164be9786bca246ca425f2c2fa518f7711d285e64c99b9fdf0aa00985a0963aa98239bc4b56b24ed3b22b34eef3e8cf38b0d2

  • SSDEEP

    12288:EMrty90o4oOsHpoO6t49mo/NzALt8wl/Pys44ezWKvI8vjGK:ByP7OtW0h5nyt4nKLGK

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c951c4b35430c4a724f8b525444b62bd909ca11e4dd86fb401e17b934b4f791.exe
    "C:\Users\Admin\AppData\Local\Temp\0c951c4b35430c4a724f8b525444b62bd909ca11e4dd86fb401e17b934b4f791.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5104
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un583611.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un583611.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3624
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1514.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1514.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3440
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8095.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8095.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1864
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si644038.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si644038.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1444

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si644038.exe
    Filesize

    175KB

    MD5

    6644de9f3d56bf950e8fc4a4c655621d

    SHA1

    7b0f7baa96d0291c177177887668d528e9753005

    SHA256

    ce671d1767064366974c2e4eb6a6fc4c24c95485357e44e8433d16ff1439aa9b

    SHA512

    a52f88898730dcdc90979fbadf01228633d1b6047e0fad0b477696d389e7b7cb0e915f87e0415b42e1529c3fae67271723f05b8c8909bdb40785625a509599f5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si644038.exe
    Filesize

    175KB

    MD5

    6644de9f3d56bf950e8fc4a4c655621d

    SHA1

    7b0f7baa96d0291c177177887668d528e9753005

    SHA256

    ce671d1767064366974c2e4eb6a6fc4c24c95485357e44e8433d16ff1439aa9b

    SHA512

    a52f88898730dcdc90979fbadf01228633d1b6047e0fad0b477696d389e7b7cb0e915f87e0415b42e1529c3fae67271723f05b8c8909bdb40785625a509599f5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un583611.exe
    Filesize

    515KB

    MD5

    351d2ead108779465c2e16dd16e83ee9

    SHA1

    3489006fe1be996b79da66024eae070dbff2bb0b

    SHA256

    d9a752c8da1d4bf8c0ea8ad0ea56f9b514204356735607ae7cae0539775e116b

    SHA512

    85e09c04c63b8550c1014b014bbe921a2fc02ef7385262a8a150dac2341673526cfa7bcb4222b57cb1e822b2bffe9c8d68e5adcc8b5eddf428384ccbeca430c1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un583611.exe
    Filesize

    515KB

    MD5

    351d2ead108779465c2e16dd16e83ee9

    SHA1

    3489006fe1be996b79da66024eae070dbff2bb0b

    SHA256

    d9a752c8da1d4bf8c0ea8ad0ea56f9b514204356735607ae7cae0539775e116b

    SHA512

    85e09c04c63b8550c1014b014bbe921a2fc02ef7385262a8a150dac2341673526cfa7bcb4222b57cb1e822b2bffe9c8d68e5adcc8b5eddf428384ccbeca430c1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1514.exe
    Filesize

    235KB

    MD5

    1407b99ed5f5ce5aa71403a4b3cbe505

    SHA1

    f76dc827fb4db5903ca3ecdd268a7e06facd90b0

    SHA256

    e8131c5a6b4ce1acc9137e8659c5a1cea9d912a43531f2c99a43674bd200c18f

    SHA512

    d32c51cb55add47989cfffc4e8b374580ce4b2b6fd7662f412ee3b493384c08356bad37b5a3eaa444e8951898f45c4987ee22863068c53ed3833f7ea54de95f9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1514.exe
    Filesize

    235KB

    MD5

    1407b99ed5f5ce5aa71403a4b3cbe505

    SHA1

    f76dc827fb4db5903ca3ecdd268a7e06facd90b0

    SHA256

    e8131c5a6b4ce1acc9137e8659c5a1cea9d912a43531f2c99a43674bd200c18f

    SHA512

    d32c51cb55add47989cfffc4e8b374580ce4b2b6fd7662f412ee3b493384c08356bad37b5a3eaa444e8951898f45c4987ee22863068c53ed3833f7ea54de95f9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8095.exe
    Filesize

    294KB

    MD5

    c5ae65058b61c0281b68243685b2c05b

    SHA1

    d8f06c5678dac10128f51d403278c4c1f9730223

    SHA256

    ada4ca0885de37484e1e8f4bdd4e0c48e3ee628fa9a118c6b1c4e506c5dc18da

    SHA512

    97f983766f9db6eb953d7503c86bfb63cf7b59df16f3c9f93ffa2d8379f4cd15c6953a3dffe6ae6ad665f5431935fb715a5d312994b18fdf8d1555a36a122bef

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8095.exe
    Filesize

    294KB

    MD5

    c5ae65058b61c0281b68243685b2c05b

    SHA1

    d8f06c5678dac10128f51d403278c4c1f9730223

    SHA256

    ada4ca0885de37484e1e8f4bdd4e0c48e3ee628fa9a118c6b1c4e506c5dc18da

    SHA512

    97f983766f9db6eb953d7503c86bfb63cf7b59df16f3c9f93ffa2d8379f4cd15c6953a3dffe6ae6ad665f5431935fb715a5d312994b18fdf8d1555a36a122bef

  • memory/1444-1113-0x0000000004D40000-0x0000000004D50000-memory.dmp
    Filesize

    64KB

  • memory/1444-1112-0x0000000004EF0000-0x0000000004F3B000-memory.dmp
    Filesize

    300KB

  • memory/1444-1111-0x00000000004B0000-0x00000000004E2000-memory.dmp
    Filesize

    200KB

  • memory/1864-1089-0x00000000057E0000-0x0000000005DE6000-memory.dmp
    Filesize

    6.0MB

  • memory/1864-1092-0x0000000005300000-0x000000000533E000-memory.dmp
    Filesize

    248KB

  • memory/1864-1105-0x0000000006D60000-0x0000000006DB0000-memory.dmp
    Filesize

    320KB

  • memory/1864-1104-0x0000000006CD0000-0x0000000006D46000-memory.dmp
    Filesize

    472KB

  • memory/1864-1103-0x0000000006670000-0x0000000006B9C000-memory.dmp
    Filesize

    5.2MB

  • memory/1864-1102-0x00000000064A0000-0x0000000006662000-memory.dmp
    Filesize

    1.8MB

  • memory/1864-1101-0x0000000004AC0000-0x0000000004AD0000-memory.dmp
    Filesize

    64KB

  • memory/1864-1100-0x0000000004AC0000-0x0000000004AD0000-memory.dmp
    Filesize

    64KB

  • memory/1864-1099-0x0000000004AC0000-0x0000000004AD0000-memory.dmp
    Filesize

    64KB

  • memory/1864-1098-0x0000000004AC0000-0x0000000004AD0000-memory.dmp
    Filesize

    64KB

  • memory/1864-1097-0x0000000006180000-0x0000000006212000-memory.dmp
    Filesize

    584KB

  • memory/1864-1096-0x00000000055D0000-0x0000000005636000-memory.dmp
    Filesize

    408KB

  • memory/1864-1094-0x0000000004AC0000-0x0000000004AD0000-memory.dmp
    Filesize

    64KB

  • memory/1864-1093-0x0000000005440000-0x000000000548B000-memory.dmp
    Filesize

    300KB

  • memory/1864-1091-0x00000000052E0000-0x00000000052F2000-memory.dmp
    Filesize

    72KB

  • memory/1864-1090-0x00000000051D0000-0x00000000052DA000-memory.dmp
    Filesize

    1.0MB

  • memory/1864-216-0x0000000002450000-0x000000000248F000-memory.dmp
    Filesize

    252KB

  • memory/1864-214-0x0000000002450000-0x000000000248F000-memory.dmp
    Filesize

    252KB

  • memory/1864-210-0x0000000002450000-0x000000000248F000-memory.dmp
    Filesize

    252KB

  • memory/1864-212-0x0000000004AC0000-0x0000000004AD0000-memory.dmp
    Filesize

    64KB

  • memory/1864-211-0x0000000004AC0000-0x0000000004AD0000-memory.dmp
    Filesize

    64KB

  • memory/1864-209-0x0000000004AC0000-0x0000000004AD0000-memory.dmp
    Filesize

    64KB

  • memory/1864-177-0x00000000009A0000-0x00000000009E6000-memory.dmp
    Filesize

    280KB

  • memory/1864-178-0x0000000002450000-0x0000000002494000-memory.dmp
    Filesize

    272KB

  • memory/1864-180-0x0000000002450000-0x000000000248F000-memory.dmp
    Filesize

    252KB

  • memory/1864-179-0x0000000002450000-0x000000000248F000-memory.dmp
    Filesize

    252KB

  • memory/1864-182-0x0000000002450000-0x000000000248F000-memory.dmp
    Filesize

    252KB

  • memory/1864-184-0x0000000002450000-0x000000000248F000-memory.dmp
    Filesize

    252KB

  • memory/1864-186-0x0000000002450000-0x000000000248F000-memory.dmp
    Filesize

    252KB

  • memory/1864-188-0x0000000002450000-0x000000000248F000-memory.dmp
    Filesize

    252KB

  • memory/1864-190-0x0000000002450000-0x000000000248F000-memory.dmp
    Filesize

    252KB

  • memory/1864-192-0x0000000002450000-0x000000000248F000-memory.dmp
    Filesize

    252KB

  • memory/1864-194-0x0000000002450000-0x000000000248F000-memory.dmp
    Filesize

    252KB

  • memory/1864-196-0x0000000002450000-0x000000000248F000-memory.dmp
    Filesize

    252KB

  • memory/1864-198-0x0000000002450000-0x000000000248F000-memory.dmp
    Filesize

    252KB

  • memory/1864-200-0x0000000002450000-0x000000000248F000-memory.dmp
    Filesize

    252KB

  • memory/1864-202-0x0000000002450000-0x000000000248F000-memory.dmp
    Filesize

    252KB

  • memory/1864-204-0x0000000002450000-0x000000000248F000-memory.dmp
    Filesize

    252KB

  • memory/1864-207-0x0000000000590000-0x00000000005DB000-memory.dmp
    Filesize

    300KB

  • memory/1864-206-0x0000000002450000-0x000000000248F000-memory.dmp
    Filesize

    252KB

  • memory/3440-160-0x0000000002500000-0x0000000002512000-memory.dmp
    Filesize

    72KB

  • memory/3440-132-0x0000000002180000-0x000000000219A000-memory.dmp
    Filesize

    104KB

  • memory/3440-138-0x00000000024E0000-0x00000000024F0000-memory.dmp
    Filesize

    64KB

  • memory/3440-170-0x00000000024E0000-0x00000000024F0000-memory.dmp
    Filesize

    64KB

  • memory/3440-169-0x00000000024E0000-0x00000000024F0000-memory.dmp
    Filesize

    64KB

  • memory/3440-168-0x00000000024E0000-0x00000000024F0000-memory.dmp
    Filesize

    64KB

  • memory/3440-137-0x00000000024E0000-0x00000000024F0000-memory.dmp
    Filesize

    64KB

  • memory/3440-167-0x0000000000400000-0x00000000004A9000-memory.dmp
    Filesize

    676KB

  • memory/3440-166-0x0000000002500000-0x0000000002512000-memory.dmp
    Filesize

    72KB

  • memory/3440-140-0x0000000002500000-0x0000000002512000-memory.dmp
    Filesize

    72KB

  • memory/3440-164-0x0000000002500000-0x0000000002512000-memory.dmp
    Filesize

    72KB

  • memory/3440-162-0x0000000002500000-0x0000000002512000-memory.dmp
    Filesize

    72KB

  • memory/3440-172-0x0000000000400000-0x00000000004A9000-memory.dmp
    Filesize

    676KB

  • memory/3440-139-0x0000000002500000-0x0000000002512000-memory.dmp
    Filesize

    72KB

  • memory/3440-142-0x0000000002500000-0x0000000002512000-memory.dmp
    Filesize

    72KB

  • memory/3440-154-0x0000000002500000-0x0000000002512000-memory.dmp
    Filesize

    72KB

  • memory/3440-152-0x0000000002500000-0x0000000002512000-memory.dmp
    Filesize

    72KB

  • memory/3440-150-0x0000000002500000-0x0000000002512000-memory.dmp
    Filesize

    72KB

  • memory/3440-148-0x0000000002500000-0x0000000002512000-memory.dmp
    Filesize

    72KB

  • memory/3440-146-0x0000000002500000-0x0000000002512000-memory.dmp
    Filesize

    72KB

  • memory/3440-144-0x0000000002500000-0x0000000002512000-memory.dmp
    Filesize

    72KB

  • memory/3440-156-0x0000000002500000-0x0000000002512000-memory.dmp
    Filesize

    72KB

  • memory/3440-136-0x00000000024E0000-0x00000000024F0000-memory.dmp
    Filesize

    64KB

  • memory/3440-135-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/3440-134-0x0000000002500000-0x0000000002518000-memory.dmp
    Filesize

    96KB

  • memory/3440-133-0x0000000004A20000-0x0000000004F1E000-memory.dmp
    Filesize

    5.0MB

  • memory/3440-158-0x0000000002500000-0x0000000002512000-memory.dmp
    Filesize

    72KB