Analysis

  • max time kernel
    53s
  • max time network
    57s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-04-2023 22:32

General

  • Target

    cf5bb294379a2ac1f71b7df6850efad6aee1cd5e3ea9031b2001964016e7b0d1.exe

  • Size

    659KB

  • MD5

    d292e6876bd486d31e64083282eb5bac

  • SHA1

    ca06a29774e5d016b8dac35f7295c086f8da7a17

  • SHA256

    cf5bb294379a2ac1f71b7df6850efad6aee1cd5e3ea9031b2001964016e7b0d1

  • SHA512

    c2332578a9f336f3cd67a9da8cbf6108e9161edad03e6559cc86b30a3393ea52f95bafe268d6baf4b8191082d8820babfab3ab2e0f831e072c6f4b67b0bd9529

  • SSDEEP

    12288:rMrUy90lSog82wBtZ78Jm0TChqDVTEt59VrwCfwCfdBft/juesVHX:Ty5M2wuJXDDV4t5XJf9fDB5sV3

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf5bb294379a2ac1f71b7df6850efad6aee1cd5e3ea9031b2001964016e7b0d1.exe
    "C:\Users\Admin\AppData\Local\Temp\cf5bb294379a2ac1f71b7df6850efad6aee1cd5e3ea9031b2001964016e7b0d1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3152
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un144281.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un144281.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4456
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7099.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7099.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4980
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5596.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5596.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3140
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si709304.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si709304.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3740

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si709304.exe
    Filesize

    175KB

    MD5

    0fa97d8087d481b72a5496441d7bfbda

    SHA1

    f02aec923be0424c76e2c8253dfd795590cc9a63

    SHA256

    d184e31839ed9d266061a0e276be775c0389a2ec20886f6a45fbed8ee05bc68d

    SHA512

    5c0e50722764c416dffb9ebdd7e719a5334f735bebdc5f05d6ee9ab7aed5a10f865d24f321dcdb6c987917c65884e1698aa259a63406de74c1e1fe74867dc601

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si709304.exe
    Filesize

    175KB

    MD5

    0fa97d8087d481b72a5496441d7bfbda

    SHA1

    f02aec923be0424c76e2c8253dfd795590cc9a63

    SHA256

    d184e31839ed9d266061a0e276be775c0389a2ec20886f6a45fbed8ee05bc68d

    SHA512

    5c0e50722764c416dffb9ebdd7e719a5334f735bebdc5f05d6ee9ab7aed5a10f865d24f321dcdb6c987917c65884e1698aa259a63406de74c1e1fe74867dc601

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un144281.exe
    Filesize

    517KB

    MD5

    d0f479855b34a7fa9b9f3e90ffa85d9b

    SHA1

    aebb62ed1f5f42b6ff16b496c416802acfcd9fee

    SHA256

    85ced6b79e111808f1365b2f7a9eba71af434ba01045679460394b9b48e32987

    SHA512

    49a2b823dd4d7d3cf4760ce3d61496ed7bd8b70dfa7b39916def5bcf59fc9f8e7dafb4eb0f75b42cb6f6d16f11969f48b601c49f9660f626ece51e4a5b6fac29

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un144281.exe
    Filesize

    517KB

    MD5

    d0f479855b34a7fa9b9f3e90ffa85d9b

    SHA1

    aebb62ed1f5f42b6ff16b496c416802acfcd9fee

    SHA256

    85ced6b79e111808f1365b2f7a9eba71af434ba01045679460394b9b48e32987

    SHA512

    49a2b823dd4d7d3cf4760ce3d61496ed7bd8b70dfa7b39916def5bcf59fc9f8e7dafb4eb0f75b42cb6f6d16f11969f48b601c49f9660f626ece51e4a5b6fac29

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7099.exe
    Filesize

    237KB

    MD5

    163527450f5b6cc30b17b1abe16ee67b

    SHA1

    4ff2d244f0754371a4c8b4710fa5c3a286c73523

    SHA256

    b7a0301915c5af8f7f346f67c117e934ffa431c04a522c643c9dcb46e4206794

    SHA512

    4c595e9461c5ff55b3a682277619de0e4d9f12601e028f6e814f69fd9ad17e157c2dbe09cedad53a601a1f991c438e8d171220aa6cb6b37f9a1d97c57a5a2c84

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7099.exe
    Filesize

    237KB

    MD5

    163527450f5b6cc30b17b1abe16ee67b

    SHA1

    4ff2d244f0754371a4c8b4710fa5c3a286c73523

    SHA256

    b7a0301915c5af8f7f346f67c117e934ffa431c04a522c643c9dcb46e4206794

    SHA512

    4c595e9461c5ff55b3a682277619de0e4d9f12601e028f6e814f69fd9ad17e157c2dbe09cedad53a601a1f991c438e8d171220aa6cb6b37f9a1d97c57a5a2c84

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5596.exe
    Filesize

    295KB

    MD5

    675b770e922b4d5ba7d19f7e9510e887

    SHA1

    18a0a47d7fb0fc9ca6f11036d10edfcf2be47b66

    SHA256

    6dd4b4490b7619cd4810a4c23d74fef6b4d16204c96b3beb80e6285c6d53d2e2

    SHA512

    8eaa9c6cb6f1f20fa2aef3e032fdb539932e707aff9a4faa35473d2d3b1ba61ea166dd1ab90e9a475e4df19feb1fcaff54ccb0eb39320d0e1fa96be9ce82e4df

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5596.exe
    Filesize

    295KB

    MD5

    675b770e922b4d5ba7d19f7e9510e887

    SHA1

    18a0a47d7fb0fc9ca6f11036d10edfcf2be47b66

    SHA256

    6dd4b4490b7619cd4810a4c23d74fef6b4d16204c96b3beb80e6285c6d53d2e2

    SHA512

    8eaa9c6cb6f1f20fa2aef3e032fdb539932e707aff9a4faa35473d2d3b1ba61ea166dd1ab90e9a475e4df19feb1fcaff54ccb0eb39320d0e1fa96be9ce82e4df

  • memory/3140-1086-0x0000000005780000-0x0000000005D86000-memory.dmp
    Filesize

    6.0MB

  • memory/3140-1088-0x00000000052D0000-0x00000000052E2000-memory.dmp
    Filesize

    72KB

  • memory/3140-203-0x0000000000590000-0x00000000005DB000-memory.dmp
    Filesize

    300KB

  • memory/3140-204-0x0000000004B60000-0x0000000004B70000-memory.dmp
    Filesize

    64KB

  • memory/3140-208-0x0000000004B60000-0x0000000004B70000-memory.dmp
    Filesize

    64KB

  • memory/3140-206-0x0000000004B60000-0x0000000004B70000-memory.dmp
    Filesize

    64KB

  • memory/3140-1101-0x0000000004B60000-0x0000000004B70000-memory.dmp
    Filesize

    64KB

  • memory/3140-191-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/3140-1100-0x0000000006890000-0x0000000006DBC000-memory.dmp
    Filesize

    5.2MB

  • memory/3140-1099-0x00000000066A0000-0x0000000006862000-memory.dmp
    Filesize

    1.8MB

  • memory/3140-1098-0x0000000006630000-0x0000000006680000-memory.dmp
    Filesize

    320KB

  • memory/3140-1097-0x00000000065A0000-0x0000000006616000-memory.dmp
    Filesize

    472KB

  • memory/3140-1096-0x0000000004B60000-0x0000000004B70000-memory.dmp
    Filesize

    64KB

  • memory/3140-193-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/3140-1095-0x0000000004B60000-0x0000000004B70000-memory.dmp
    Filesize

    64KB

  • memory/3140-1094-0x0000000005670000-0x00000000056D6000-memory.dmp
    Filesize

    408KB

  • memory/3140-1093-0x00000000055D0000-0x0000000005662000-memory.dmp
    Filesize

    584KB

  • memory/3140-195-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/3140-1091-0x0000000005440000-0x000000000548B000-memory.dmp
    Filesize

    300KB

  • memory/3140-1090-0x00000000052F0000-0x000000000532E000-memory.dmp
    Filesize

    248KB

  • memory/3140-1089-0x0000000004B60000-0x0000000004B70000-memory.dmp
    Filesize

    64KB

  • memory/3140-209-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/3140-174-0x00000000049B0000-0x00000000049F6000-memory.dmp
    Filesize

    280KB

  • memory/3140-175-0x0000000004A30000-0x0000000004A74000-memory.dmp
    Filesize

    272KB

  • memory/3140-177-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/3140-176-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/3140-179-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/3140-181-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/3140-183-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/3140-185-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/3140-187-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/3140-189-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/3140-1087-0x0000000005190000-0x000000000529A000-memory.dmp
    Filesize

    1.0MB

  • memory/3140-213-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/3140-211-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/3140-197-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/3140-199-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/3140-201-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/3140-205-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/3740-1107-0x00000000005A0000-0x00000000005D2000-memory.dmp
    Filesize

    200KB

  • memory/3740-1108-0x0000000004FE0000-0x000000000502B000-memory.dmp
    Filesize

    300KB

  • memory/3740-1109-0x0000000004E40000-0x0000000004E50000-memory.dmp
    Filesize

    64KB

  • memory/3740-1111-0x0000000004E40000-0x0000000004E50000-memory.dmp
    Filesize

    64KB

  • memory/4980-165-0x0000000004EE0000-0x0000000004EF2000-memory.dmp
    Filesize

    72KB

  • memory/4980-166-0x0000000000400000-0x00000000004A9000-memory.dmp
    Filesize

    676KB

  • memory/4980-159-0x0000000004EE0000-0x0000000004EF2000-memory.dmp
    Filesize

    72KB

  • memory/4980-134-0x0000000004990000-0x00000000049A0000-memory.dmp
    Filesize

    64KB

  • memory/4980-147-0x0000000004EE0000-0x0000000004EF2000-memory.dmp
    Filesize

    72KB

  • memory/4980-135-0x0000000004990000-0x00000000049A0000-memory.dmp
    Filesize

    64KB

  • memory/4980-136-0x00000000049A0000-0x0000000004E9E000-memory.dmp
    Filesize

    5.0MB

  • memory/4980-169-0x0000000000400000-0x00000000004A9000-memory.dmp
    Filesize

    676KB

  • memory/4980-167-0x0000000004990000-0x00000000049A0000-memory.dmp
    Filesize

    64KB

  • memory/4980-137-0x0000000004EE0000-0x0000000004EF8000-memory.dmp
    Filesize

    96KB

  • memory/4980-163-0x0000000004EE0000-0x0000000004EF2000-memory.dmp
    Filesize

    72KB

  • memory/4980-161-0x0000000004EE0000-0x0000000004EF2000-memory.dmp
    Filesize

    72KB

  • memory/4980-157-0x0000000004EE0000-0x0000000004EF2000-memory.dmp
    Filesize

    72KB

  • memory/4980-155-0x0000000004EE0000-0x0000000004EF2000-memory.dmp
    Filesize

    72KB

  • memory/4980-153-0x0000000004EE0000-0x0000000004EF2000-memory.dmp
    Filesize

    72KB

  • memory/4980-151-0x0000000004EE0000-0x0000000004EF2000-memory.dmp
    Filesize

    72KB

  • memory/4980-149-0x0000000004EE0000-0x0000000004EF2000-memory.dmp
    Filesize

    72KB

  • memory/4980-145-0x0000000004EE0000-0x0000000004EF2000-memory.dmp
    Filesize

    72KB

  • memory/4980-133-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/4980-132-0x00000000023F0000-0x000000000240A000-memory.dmp
    Filesize

    104KB

  • memory/4980-143-0x0000000004EE0000-0x0000000004EF2000-memory.dmp
    Filesize

    72KB

  • memory/4980-141-0x0000000004EE0000-0x0000000004EF2000-memory.dmp
    Filesize

    72KB

  • memory/4980-139-0x0000000004EE0000-0x0000000004EF2000-memory.dmp
    Filesize

    72KB

  • memory/4980-138-0x0000000004EE0000-0x0000000004EF2000-memory.dmp
    Filesize

    72KB