Analysis

  • max time kernel
    54s
  • max time network
    72s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/04/2023, 04:55

General

  • Target

    9cd8ad4ad4df44b89a5c47afe154fc2c2c19256efb29b88348d9c8fe40482b7a.exe

  • Size

    537KB

  • MD5

    c3faa8874e649b95309fefb75bd1b51e

  • SHA1

    6b0d8779714449f874578265f812f13fd3775374

  • SHA256

    9cd8ad4ad4df44b89a5c47afe154fc2c2c19256efb29b88348d9c8fe40482b7a

  • SHA512

    4921eb9d7c4e833ecdb19cadef126a7aeba62fac86d75252d6c9b8bd2e378bce605f57574bbfe96daea988bcecbb9213404a826a73d0f07005d13a539dd0e26f

  • SSDEEP

    12288:aMrGy90GccDQP+BDj0UJwxiUc2Hswo7Jbkfzqpx39KU:gyZcsXwxiQMwoZkfmP9X

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9cd8ad4ad4df44b89a5c47afe154fc2c2c19256efb29b88348d9c8fe40482b7a.exe
    "C:\Users\Admin\AppData\Local\Temp\9cd8ad4ad4df44b89a5c47afe154fc2c2c19256efb29b88348d9c8fe40482b7a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4092
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYE3066.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYE3066.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1504
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr622396.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr622396.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4064
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku136001.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku136001.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4188
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr866493.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr866493.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4764

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr866493.exe

          Filesize

          176KB

          MD5

          578a33d37138578896c584a952c00bcf

          SHA1

          13f9acf63bb258bc318c31a64f37df52f6109c36

          SHA256

          40321c30cb7d49ad729c3a00717313b5274fd461a4dee41aaa9950e7ff9714f8

          SHA512

          e747059b02d9bdee1ac6eef6ca7d1e67b5936074ace3ef66cba6e1ac6c7fbf6a0818a608289ddab9f9e75385661d611ec26ec9c57fb9e71ffb8802633f547b8b

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr866493.exe

          Filesize

          176KB

          MD5

          578a33d37138578896c584a952c00bcf

          SHA1

          13f9acf63bb258bc318c31a64f37df52f6109c36

          SHA256

          40321c30cb7d49ad729c3a00717313b5274fd461a4dee41aaa9950e7ff9714f8

          SHA512

          e747059b02d9bdee1ac6eef6ca7d1e67b5936074ace3ef66cba6e1ac6c7fbf6a0818a608289ddab9f9e75385661d611ec26ec9c57fb9e71ffb8802633f547b8b

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYE3066.exe

          Filesize

          395KB

          MD5

          d7f926e60afd1b29ae700be95942673c

          SHA1

          78065c115f82b8689d387cf1c56b9562c05f208e

          SHA256

          16e1a6bb58c57ad2e888ecc2c6770547bb033665c8183f50cc385c82af1bed04

          SHA512

          dea36ac26bb0d536bf46ec073dba8b98ea65fe06a8d266e4e4e320f6f2e34fe73aef7afd636ab1b2389a82abe063c082af057eae4ed2c87ad5e31d86707e99bd

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziYE3066.exe

          Filesize

          395KB

          MD5

          d7f926e60afd1b29ae700be95942673c

          SHA1

          78065c115f82b8689d387cf1c56b9562c05f208e

          SHA256

          16e1a6bb58c57ad2e888ecc2c6770547bb033665c8183f50cc385c82af1bed04

          SHA512

          dea36ac26bb0d536bf46ec073dba8b98ea65fe06a8d266e4e4e320f6f2e34fe73aef7afd636ab1b2389a82abe063c082af057eae4ed2c87ad5e31d86707e99bd

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr622396.exe

          Filesize

          14KB

          MD5

          60944c9ba63b8f281422b2c485872a29

          SHA1

          1ae76780920176758d1b102a27ef65210ea3f64d

          SHA256

          60b1c6d85cb3ccbbd7219f62cdb4386793ada819482925e410634a2c2b016f3c

          SHA512

          29efaa82d90b2cbce68878fa413c679ff668466c5c6b979ed496365420c8174301a98daecf4721d2976b8c64a088ed0c991c8228aa0d598752ac695880c8b5c4

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr622396.exe

          Filesize

          14KB

          MD5

          60944c9ba63b8f281422b2c485872a29

          SHA1

          1ae76780920176758d1b102a27ef65210ea3f64d

          SHA256

          60b1c6d85cb3ccbbd7219f62cdb4386793ada819482925e410634a2c2b016f3c

          SHA512

          29efaa82d90b2cbce68878fa413c679ff668466c5c6b979ed496365420c8174301a98daecf4721d2976b8c64a088ed0c991c8228aa0d598752ac695880c8b5c4

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku136001.exe

          Filesize

          352KB

          MD5

          7bebc18ba50482e17d93116dbb2e6021

          SHA1

          e27ab9d1e2784fadec3d6b91ff60a9f170ce28a4

          SHA256

          011243c981e5040aaa63e9966729bcb752837e6bff5276fb11c284e5106e7bbc

          SHA512

          47c36bf091e67c8e89c9e111a3fbef581f1eac04c0fccc8177e92614055992de52a1392ecee726353c090a10be3090e6267b83acdccb07a08bda5b9a4a96c962

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku136001.exe

          Filesize

          352KB

          MD5

          7bebc18ba50482e17d93116dbb2e6021

          SHA1

          e27ab9d1e2784fadec3d6b91ff60a9f170ce28a4

          SHA256

          011243c981e5040aaa63e9966729bcb752837e6bff5276fb11c284e5106e7bbc

          SHA512

          47c36bf091e67c8e89c9e111a3fbef581f1eac04c0fccc8177e92614055992de52a1392ecee726353c090a10be3090e6267b83acdccb07a08bda5b9a4a96c962

        • memory/4064-133-0x0000000000880000-0x000000000088A000-memory.dmp

          Filesize

          40KB

        • memory/4188-139-0x0000000000810000-0x000000000085B000-memory.dmp

          Filesize

          300KB

        • memory/4188-140-0x0000000002890000-0x00000000028D6000-memory.dmp

          Filesize

          280KB

        • memory/4188-141-0x0000000004ED0000-0x00000000053CE000-memory.dmp

          Filesize

          5.0MB

        • memory/4188-142-0x0000000002910000-0x0000000002954000-memory.dmp

          Filesize

          272KB

        • memory/4188-143-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

          Filesize

          64KB

        • memory/4188-144-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

          Filesize

          64KB

        • memory/4188-145-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

          Filesize

          64KB

        • memory/4188-146-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-147-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-149-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-151-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-153-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-155-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-157-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-159-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-161-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-163-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-165-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-167-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-169-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-171-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-173-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-175-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-177-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-179-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-181-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-183-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-185-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-187-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-189-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-191-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-193-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-195-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-197-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-199-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-201-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-203-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-205-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-207-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-209-0x0000000002910000-0x000000000294F000-memory.dmp

          Filesize

          252KB

        • memory/4188-1052-0x00000000054D0000-0x0000000005AD6000-memory.dmp

          Filesize

          6.0MB

        • memory/4188-1053-0x0000000005AF0000-0x0000000005BFA000-memory.dmp

          Filesize

          1.0MB

        • memory/4188-1054-0x0000000005C30000-0x0000000005C42000-memory.dmp

          Filesize

          72KB

        • memory/4188-1055-0x0000000005C50000-0x0000000005C8E000-memory.dmp

          Filesize

          248KB

        • memory/4188-1056-0x0000000005DA0000-0x0000000005DEB000-memory.dmp

          Filesize

          300KB

        • memory/4188-1058-0x0000000005F30000-0x0000000005FC2000-memory.dmp

          Filesize

          584KB

        • memory/4188-1059-0x0000000005FD0000-0x0000000006036000-memory.dmp

          Filesize

          408KB

        • memory/4188-1060-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

          Filesize

          64KB

        • memory/4188-1061-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

          Filesize

          64KB

        • memory/4188-1062-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

          Filesize

          64KB

        • memory/4188-1063-0x0000000006910000-0x0000000006986000-memory.dmp

          Filesize

          472KB

        • memory/4188-1064-0x00000000069A0000-0x00000000069F0000-memory.dmp

          Filesize

          320KB

        • memory/4188-1065-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

          Filesize

          64KB

        • memory/4188-1066-0x0000000006A00000-0x0000000006BC2000-memory.dmp

          Filesize

          1.8MB

        • memory/4188-1067-0x0000000006BE0000-0x000000000710C000-memory.dmp

          Filesize

          5.2MB

        • memory/4764-1073-0x00000000001D0000-0x0000000000202000-memory.dmp

          Filesize

          200KB

        • memory/4764-1074-0x0000000004AB0000-0x0000000004AFB000-memory.dmp

          Filesize

          300KB

        • memory/4764-1075-0x0000000004A40000-0x0000000004A50000-memory.dmp

          Filesize

          64KB