Analysis

  • max time kernel
    54s
  • max time network
    153s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-04-2023 21:49

General

  • Target

    5557dbed136aae5576e71398ddd85d1642307a32ce0916a12c86abc40bea5295.exe

  • Size

    522KB

  • MD5

    efa14e5bc9e75b2421b25968a18500cd

  • SHA1

    a6cadca7874c9015bcfe7ebf8799c1d33a4e110d

  • SHA256

    5557dbed136aae5576e71398ddd85d1642307a32ce0916a12c86abc40bea5295

  • SHA512

    2c6668b5ad5c8982d25c2ed8853e44189f1440e312982d04a13e2a59d7d9fb9670aac42bce09368b608d568ca3d217f63f1e1375e6298d17b525265252ee3b6d

  • SSDEEP

    12288:sMrdy90atgktKCZZjKrw1thCrJufErflo08C:RyftguZ+itYrp4C

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5557dbed136aae5576e71398ddd85d1642307a32ce0916a12c86abc40bea5295.exe
    "C:\Users\Admin\AppData\Local\Temp\5557dbed136aae5576e71398ddd85d1642307a32ce0916a12c86abc40bea5295.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4108
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihd8796.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihd8796.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2488
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr083395.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr083395.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2128
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku867868.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku867868.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4416
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr411341.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr411341.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2784

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr411341.exe
    Filesize

    175KB

    MD5

    788e9b64e63e05d62cd933ee1891514e

    SHA1

    b7a0b595078731407d873c09a1a69a499917cf53

    SHA256

    4a90774d12309de280cf529e0121bd59be97580bf4ad625468fb55aa8d2e3d3a

    SHA512

    81ee49b2fa5b509fa824ba58b7d02da51cb775ce9a0553b9347c10545fd036e7603efa08eb3871a85dbfe1fe05094d19032ff7ab6c89dc02b19b4feb4cec2e86

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr411341.exe
    Filesize

    175KB

    MD5

    788e9b64e63e05d62cd933ee1891514e

    SHA1

    b7a0b595078731407d873c09a1a69a499917cf53

    SHA256

    4a90774d12309de280cf529e0121bd59be97580bf4ad625468fb55aa8d2e3d3a

    SHA512

    81ee49b2fa5b509fa824ba58b7d02da51cb775ce9a0553b9347c10545fd036e7603efa08eb3871a85dbfe1fe05094d19032ff7ab6c89dc02b19b4feb4cec2e86

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihd8796.exe
    Filesize

    380KB

    MD5

    7b735eea60834ca68d57ab4b61ada094

    SHA1

    1a4269826682af659e9a2ac56a714626e8c3cbe4

    SHA256

    be239ca492d21048df54e3620bb5e964aedeee1495c0d51297fa25510a670633

    SHA512

    e844b09a2637d837069b5348e6afe6a2e27d367ddee0f63c738fe77b36811bce7651de8a472d382b7a170deb765193ef52692fb3a0706df93ee5b3e3ba2d5b84

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zihd8796.exe
    Filesize

    380KB

    MD5

    7b735eea60834ca68d57ab4b61ada094

    SHA1

    1a4269826682af659e9a2ac56a714626e8c3cbe4

    SHA256

    be239ca492d21048df54e3620bb5e964aedeee1495c0d51297fa25510a670633

    SHA512

    e844b09a2637d837069b5348e6afe6a2e27d367ddee0f63c738fe77b36811bce7651de8a472d382b7a170deb765193ef52692fb3a0706df93ee5b3e3ba2d5b84

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr083395.exe
    Filesize

    15KB

    MD5

    785900820e473d575f91e484ca0e7bee

    SHA1

    68a967bfa868d7311996c6b048e1c450c69074f3

    SHA256

    6248671551a4e0f3e3a8029d0c539bbd0ca2a19cdaa48850046db23a73470b80

    SHA512

    450c46b567557bd1365264e1c13a87dffda742b573a493fdf990625b6695ee2dd8e718abe747240edde0c861d756ef21f94890d643d0149cd7961920ec271ba8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr083395.exe
    Filesize

    15KB

    MD5

    785900820e473d575f91e484ca0e7bee

    SHA1

    68a967bfa868d7311996c6b048e1c450c69074f3

    SHA256

    6248671551a4e0f3e3a8029d0c539bbd0ca2a19cdaa48850046db23a73470b80

    SHA512

    450c46b567557bd1365264e1c13a87dffda742b573a493fdf990625b6695ee2dd8e718abe747240edde0c861d756ef21f94890d643d0149cd7961920ec271ba8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku867868.exe
    Filesize

    295KB

    MD5

    108048601049807b76aacae2403016de

    SHA1

    4ff6f03f0eb128e186313a69fa2981602ebd1d6d

    SHA256

    a18f85f0a64ebef7b04c36c0da9deaccac9f7a93bc8267967653c532e92ea12d

    SHA512

    04a0c2b4bf4a9aecdd45f593d31629d73571719f38652746e35a22de347b1962d57338373126dcfd405a7d6f762597bb4215e41402ccc2bbbdf11511eed26144

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku867868.exe
    Filesize

    295KB

    MD5

    108048601049807b76aacae2403016de

    SHA1

    4ff6f03f0eb128e186313a69fa2981602ebd1d6d

    SHA256

    a18f85f0a64ebef7b04c36c0da9deaccac9f7a93bc8267967653c532e92ea12d

    SHA512

    04a0c2b4bf4a9aecdd45f593d31629d73571719f38652746e35a22de347b1962d57338373126dcfd405a7d6f762597bb4215e41402ccc2bbbdf11511eed26144

  • memory/2128-133-0x0000000000BB0000-0x0000000000BBA000-memory.dmp
    Filesize

    40KB

  • memory/2784-1074-0x0000000000530000-0x0000000000562000-memory.dmp
    Filesize

    200KB

  • memory/2784-1075-0x0000000004F70000-0x0000000004FBB000-memory.dmp
    Filesize

    300KB

  • memory/2784-1076-0x0000000004DB0000-0x0000000004DC0000-memory.dmp
    Filesize

    64KB

  • memory/4416-177-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-187-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-142-0x0000000002130000-0x0000000002174000-memory.dmp
    Filesize

    272KB

  • memory/4416-144-0x0000000004C50000-0x0000000004C60000-memory.dmp
    Filesize

    64KB

  • memory/4416-143-0x0000000004C50000-0x0000000004C60000-memory.dmp
    Filesize

    64KB

  • memory/4416-145-0x0000000004C50000-0x0000000004C60000-memory.dmp
    Filesize

    64KB

  • memory/4416-146-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-149-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-151-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-147-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-153-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-155-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-157-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-159-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-161-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-163-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-165-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-167-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-169-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-171-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-173-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-175-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-140-0x0000000002080000-0x00000000020C6000-memory.dmp
    Filesize

    280KB

  • memory/4416-179-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-181-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-183-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-185-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-141-0x0000000004C60000-0x000000000515E000-memory.dmp
    Filesize

    5.0MB

  • memory/4416-189-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-191-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-193-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-195-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-197-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-199-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-201-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-203-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-205-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-207-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-209-0x0000000002130000-0x000000000216F000-memory.dmp
    Filesize

    252KB

  • memory/4416-1052-0x0000000005770000-0x0000000005D76000-memory.dmp
    Filesize

    6.0MB

  • memory/4416-1053-0x0000000005190000-0x000000000529A000-memory.dmp
    Filesize

    1.0MB

  • memory/4416-1054-0x00000000052D0000-0x00000000052E2000-memory.dmp
    Filesize

    72KB

  • memory/4416-1055-0x00000000052F0000-0x000000000532E000-memory.dmp
    Filesize

    248KB

  • memory/4416-1056-0x0000000005440000-0x000000000548B000-memory.dmp
    Filesize

    300KB

  • memory/4416-1057-0x0000000004C50000-0x0000000004C60000-memory.dmp
    Filesize

    64KB

  • memory/4416-1059-0x00000000055D0000-0x0000000005662000-memory.dmp
    Filesize

    584KB

  • memory/4416-1060-0x0000000004C50000-0x0000000004C60000-memory.dmp
    Filesize

    64KB

  • memory/4416-1061-0x0000000004C50000-0x0000000004C60000-memory.dmp
    Filesize

    64KB

  • memory/4416-1062-0x0000000004C50000-0x0000000004C60000-memory.dmp
    Filesize

    64KB

  • memory/4416-1063-0x0000000005670000-0x00000000056D6000-memory.dmp
    Filesize

    408KB

  • memory/4416-1064-0x0000000006700000-0x00000000068C2000-memory.dmp
    Filesize

    1.8MB

  • memory/4416-139-0x0000000000590000-0x00000000005DB000-memory.dmp
    Filesize

    300KB

  • memory/4416-1065-0x00000000068F0000-0x0000000006E1C000-memory.dmp
    Filesize

    5.2MB

  • memory/4416-1066-0x0000000004C50000-0x0000000004C60000-memory.dmp
    Filesize

    64KB

  • memory/4416-1067-0x0000000006F60000-0x0000000006FD6000-memory.dmp
    Filesize

    472KB

  • memory/4416-1068-0x0000000006FE0000-0x0000000007030000-memory.dmp
    Filesize

    320KB