Analysis

  • max time kernel
    89s
  • max time network
    93s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-04-2023 22:28

General

  • Target

    6f69ddeae6e00815a5ba2bf44b17936323d6df71423971d328baabe0a72b8da3.exe

  • Size

    522KB

  • MD5

    34540ffe8a22f19fe0f20012b958eae1

  • SHA1

    85060045eb54700eab664554373840a40ba0eb1d

  • SHA256

    6f69ddeae6e00815a5ba2bf44b17936323d6df71423971d328baabe0a72b8da3

  • SHA512

    a412f9a59192de70b466e05d3f9697b46d21bfd629343588a83818bec195f78bb8f897bb4484d77daa215a2d45c4e514781bd6b65ab6f4538482798f66830209

  • SSDEEP

    12288:QYMr/y90jzL1TGeRtrwEvH/rwdshC7JRQ5iU:QXyfyrwEvH/OsY7Q5r

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6f69ddeae6e00815a5ba2bf44b17936323d6df71423971d328baabe0a72b8da3.exe
    "C:\Users\Admin\AppData\Local\Temp\6f69ddeae6e00815a5ba2bf44b17936323d6df71423971d328baabe0a72b8da3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4012
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLt2120.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLt2120.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr767380.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr767380.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4752
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku326442.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku326442.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4824
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr204691.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr204691.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4444

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr204691.exe
    Filesize

    175KB

    MD5

    f13c2dcb65d6b00dd6b8bc3d5103b9d1

    SHA1

    e7bc371130752f77f5a11e572c8071965f0b8e28

    SHA256

    d48021ab5d2266f014c68761192b44bdbe4557547b51014636149b5d8fa5e1ec

    SHA512

    9533041603cc08342df3a893a921735e1ceaa1b0482efc15e5013a86eeddee9d1c60ce7aa30a419d8ccbfb9476048ecfe2d80666f579a9d5b27100a540d12e80

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr204691.exe
    Filesize

    175KB

    MD5

    f13c2dcb65d6b00dd6b8bc3d5103b9d1

    SHA1

    e7bc371130752f77f5a11e572c8071965f0b8e28

    SHA256

    d48021ab5d2266f014c68761192b44bdbe4557547b51014636149b5d8fa5e1ec

    SHA512

    9533041603cc08342df3a893a921735e1ceaa1b0482efc15e5013a86eeddee9d1c60ce7aa30a419d8ccbfb9476048ecfe2d80666f579a9d5b27100a540d12e80

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLt2120.exe
    Filesize

    380KB

    MD5

    708dfd4b77b6d348aa08bfb38676d71a

    SHA1

    8aca9e91ae86996680606ed489efbfcaa48023aa

    SHA256

    75e152fe9c5ef6eaa9cfe804d6520c5128b3f6919bc1dabd682db8577ed7f806

    SHA512

    86a256486c4950ad4814f7e9f49d56c895a655dcf4fe8570ff2a82742b5178fc028295128f708412668d7f7d7c593d03aa75ee97bc3e7d0d229a9be4820c72ec

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziLt2120.exe
    Filesize

    380KB

    MD5

    708dfd4b77b6d348aa08bfb38676d71a

    SHA1

    8aca9e91ae86996680606ed489efbfcaa48023aa

    SHA256

    75e152fe9c5ef6eaa9cfe804d6520c5128b3f6919bc1dabd682db8577ed7f806

    SHA512

    86a256486c4950ad4814f7e9f49d56c895a655dcf4fe8570ff2a82742b5178fc028295128f708412668d7f7d7c593d03aa75ee97bc3e7d0d229a9be4820c72ec

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr767380.exe
    Filesize

    15KB

    MD5

    6f63d2536a49fc38c22d1e2a87a6fa4c

    SHA1

    f590e9a17e6dc17b626be1d35769d5f4b8817ee7

    SHA256

    f2ba94f87e838a2beb93afc4916f7277026da19b1ec1cb8d1a275853bc46237a

    SHA512

    21ea2394cc9ecdd44be73550260600f098a17416fe3cc9ee5f6decf1d920f93f66697c15937a2db28340e4a10c4b2437759ad7b96477a0c66b7d4a1205f67269

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr767380.exe
    Filesize

    15KB

    MD5

    6f63d2536a49fc38c22d1e2a87a6fa4c

    SHA1

    f590e9a17e6dc17b626be1d35769d5f4b8817ee7

    SHA256

    f2ba94f87e838a2beb93afc4916f7277026da19b1ec1cb8d1a275853bc46237a

    SHA512

    21ea2394cc9ecdd44be73550260600f098a17416fe3cc9ee5f6decf1d920f93f66697c15937a2db28340e4a10c4b2437759ad7b96477a0c66b7d4a1205f67269

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku326442.exe
    Filesize

    295KB

    MD5

    085084ac2d5227ef97aab9b4f86132c9

    SHA1

    3b9e715f54f173643666451ed032d5aa546cd9bd

    SHA256

    9a8d3a9024c8ce9d61d82f33fa0a4690d162d667afe09eebc62a4c9a0a537b69

    SHA512

    e7813203c3ae84262e52604de977735bd153a53a0d90f9265867eb2567905c64cd3b5c56b3939b73ddb82f4f64053bb470efba3dc6623e5fe8352c73498f9c34

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku326442.exe
    Filesize

    295KB

    MD5

    085084ac2d5227ef97aab9b4f86132c9

    SHA1

    3b9e715f54f173643666451ed032d5aa546cd9bd

    SHA256

    9a8d3a9024c8ce9d61d82f33fa0a4690d162d667afe09eebc62a4c9a0a537b69

    SHA512

    e7813203c3ae84262e52604de977735bd153a53a0d90f9265867eb2567905c64cd3b5c56b3939b73ddb82f4f64053bb470efba3dc6623e5fe8352c73498f9c34

  • memory/4444-1075-0x0000000000FE0000-0x0000000001012000-memory.dmp
    Filesize

    200KB

  • memory/4444-1076-0x0000000005900000-0x0000000005910000-memory.dmp
    Filesize

    64KB

  • memory/4444-1077-0x0000000005A20000-0x0000000005A6B000-memory.dmp
    Filesize

    300KB

  • memory/4752-134-0x0000000000740000-0x000000000074A000-memory.dmp
    Filesize

    40KB

  • memory/4824-178-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-190-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-143-0x00000000005E0000-0x000000000062B000-memory.dmp
    Filesize

    300KB

  • memory/4824-144-0x0000000004BD0000-0x0000000004BE0000-memory.dmp
    Filesize

    64KB

  • memory/4824-145-0x0000000004BD0000-0x0000000004BE0000-memory.dmp
    Filesize

    64KB

  • memory/4824-146-0x0000000004BD0000-0x0000000004BE0000-memory.dmp
    Filesize

    64KB

  • memory/4824-147-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-148-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-150-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-152-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-154-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-156-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-158-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-160-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-162-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-164-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-166-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-168-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-170-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-172-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-174-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-176-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-141-0x0000000004BE0000-0x00000000050DE000-memory.dmp
    Filesize

    5.0MB

  • memory/4824-180-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-182-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-184-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-188-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-142-0x00000000026E0000-0x0000000002724000-memory.dmp
    Filesize

    272KB

  • memory/4824-186-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-192-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-194-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-196-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-200-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-202-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-198-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-204-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-206-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-208-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-210-0x00000000026E0000-0x000000000271F000-memory.dmp
    Filesize

    252KB

  • memory/4824-1053-0x00000000051E0000-0x00000000057E6000-memory.dmp
    Filesize

    6.0MB

  • memory/4824-1054-0x00000000057F0000-0x00000000058FA000-memory.dmp
    Filesize

    1.0MB

  • memory/4824-1056-0x0000000004BD0000-0x0000000004BE0000-memory.dmp
    Filesize

    64KB

  • memory/4824-1055-0x0000000004BB0000-0x0000000004BC2000-memory.dmp
    Filesize

    72KB

  • memory/4824-1057-0x0000000005900000-0x000000000593E000-memory.dmp
    Filesize

    248KB

  • memory/4824-1058-0x0000000005A50000-0x0000000005A9B000-memory.dmp
    Filesize

    300KB

  • memory/4824-1060-0x0000000004BD0000-0x0000000004BE0000-memory.dmp
    Filesize

    64KB

  • memory/4824-1061-0x0000000004BD0000-0x0000000004BE0000-memory.dmp
    Filesize

    64KB

  • memory/4824-1062-0x0000000004BD0000-0x0000000004BE0000-memory.dmp
    Filesize

    64KB

  • memory/4824-1063-0x0000000005BE0000-0x0000000005C46000-memory.dmp
    Filesize

    408KB

  • memory/4824-1064-0x00000000062B0000-0x0000000006342000-memory.dmp
    Filesize

    584KB

  • memory/4824-1065-0x0000000004BD0000-0x0000000004BE0000-memory.dmp
    Filesize

    64KB

  • memory/4824-140-0x0000000002520000-0x0000000002566000-memory.dmp
    Filesize

    280KB

  • memory/4824-1066-0x0000000006480000-0x0000000006642000-memory.dmp
    Filesize

    1.8MB

  • memory/4824-1067-0x0000000006670000-0x0000000006B9C000-memory.dmp
    Filesize

    5.2MB

  • memory/4824-1068-0x0000000006CD0000-0x0000000006D46000-memory.dmp
    Filesize

    472KB

  • memory/4824-1069-0x0000000006D60000-0x0000000006DB0000-memory.dmp
    Filesize

    320KB