Analysis

  • max time kernel
    55s
  • max time network
    65s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/04/2023, 06:46

General

  • Target

    cfcc57f3dc6bf9dbda9dd2db160af8f1eeae50e105004239a34833d087878b42.exe

  • Size

    660KB

  • MD5

    ad49faeb13e608b302f9c595e44d0c45

  • SHA1

    ba2ce77ac82350011e74460dbd46a9bab00c6b56

  • SHA256

    cfcc57f3dc6bf9dbda9dd2db160af8f1eeae50e105004239a34833d087878b42

  • SHA512

    e7457a049b0714662ef4ac979b07ba0c559a5cb42801d7027e41f094ad0d70e445d33cc467f9870fa13cb47362de99d0904d645faac21d3835f05aede31cb913

  • SSDEEP

    12288:6Mrfy90SZE+PzXtnykj35AmZRHt5cqN2RmIm:pyXZnBGSHt5c20m

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cfcc57f3dc6bf9dbda9dd2db160af8f1eeae50e105004239a34833d087878b42.exe
    "C:\Users\Admin\AppData\Local\Temp\cfcc57f3dc6bf9dbda9dd2db160af8f1eeae50e105004239a34833d087878b42.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2320
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un470226.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un470226.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2420
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0854.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0854.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2672
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2886.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2886.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3656
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si413288.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si413288.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3220

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si413288.exe

          Filesize

          176KB

          MD5

          ad306887a097d3311bba000df540d52a

          SHA1

          155789ee8d154ec4066b64efed056c3b3121115b

          SHA256

          d16bfb7fa6e17608048c3681302cd26632ab1f6697de0174d52eb855876a05b8

          SHA512

          ed76da42ce73db0b5a5520c37e26077d6e8600b46d3dac9b48df23890d767e2fb4bef5ab9e248cdf3359023c39b2222e7577a7a04df7b7bbd5262cebd463cc42

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si413288.exe

          Filesize

          176KB

          MD5

          ad306887a097d3311bba000df540d52a

          SHA1

          155789ee8d154ec4066b64efed056c3b3121115b

          SHA256

          d16bfb7fa6e17608048c3681302cd26632ab1f6697de0174d52eb855876a05b8

          SHA512

          ed76da42ce73db0b5a5520c37e26077d6e8600b46d3dac9b48df23890d767e2fb4bef5ab9e248cdf3359023c39b2222e7577a7a04df7b7bbd5262cebd463cc42

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un470226.exe

          Filesize

          518KB

          MD5

          23676fd16b7f5105b02970a1cc56e895

          SHA1

          af25e91e5d0c7032968703c3ed05ec733eb2e048

          SHA256

          45ca79e4ece5b56da90454c89d03f4753a61da64805d39a4738494e3e1b3eee1

          SHA512

          d05adb696322248956158af259dc0ba950844cf3e6aaef9df43688c627a17972afd2c47546113ca113629c3f957f1e17f89e4a01994e614e2b2f50a549ba5510

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un470226.exe

          Filesize

          518KB

          MD5

          23676fd16b7f5105b02970a1cc56e895

          SHA1

          af25e91e5d0c7032968703c3ed05ec733eb2e048

          SHA256

          45ca79e4ece5b56da90454c89d03f4753a61da64805d39a4738494e3e1b3eee1

          SHA512

          d05adb696322248956158af259dc0ba950844cf3e6aaef9df43688c627a17972afd2c47546113ca113629c3f957f1e17f89e4a01994e614e2b2f50a549ba5510

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0854.exe

          Filesize

          237KB

          MD5

          459b317eeec5f8194d92105ad58ac0c6

          SHA1

          e9ed10ecc57230410313394738bf0dbde37bbe9e

          SHA256

          bbed870480c20f2fe5adadec5e83128d346e8f404f68339aa82d7170e2dea8fa

          SHA512

          cecbac05a990b5e9d446f57f61e60aba3d9642a6860bf57aca6b82f60a360ca2cadc4686f8421ca41525beee1b176ae969d6d2be48e7c038b77e490c0a7e0eb4

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0854.exe

          Filesize

          237KB

          MD5

          459b317eeec5f8194d92105ad58ac0c6

          SHA1

          e9ed10ecc57230410313394738bf0dbde37bbe9e

          SHA256

          bbed870480c20f2fe5adadec5e83128d346e8f404f68339aa82d7170e2dea8fa

          SHA512

          cecbac05a990b5e9d446f57f61e60aba3d9642a6860bf57aca6b82f60a360ca2cadc4686f8421ca41525beee1b176ae969d6d2be48e7c038b77e490c0a7e0eb4

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2886.exe

          Filesize

          295KB

          MD5

          1f2c9b137c258fa515e718e67f3b4d60

          SHA1

          9c730f1659a1a03d6fb0ef92568c4c33847a637b

          SHA256

          e977ecc5e57bfdccd09ad2856d4e045aa355e49c643b00d8e80a2856835c6441

          SHA512

          2e4eac91d728b312b600551f991cdf0e90c37722ae68160754ea08f073b0da390111f41bc43702ae3f17699db5ed039d9fcdaa1fe1efd420cfa04459e5700886

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2886.exe

          Filesize

          295KB

          MD5

          1f2c9b137c258fa515e718e67f3b4d60

          SHA1

          9c730f1659a1a03d6fb0ef92568c4c33847a637b

          SHA256

          e977ecc5e57bfdccd09ad2856d4e045aa355e49c643b00d8e80a2856835c6441

          SHA512

          2e4eac91d728b312b600551f991cdf0e90c37722ae68160754ea08f073b0da390111f41bc43702ae3f17699db5ed039d9fcdaa1fe1efd420cfa04459e5700886

        • memory/2672-136-0x0000000000710000-0x000000000072A000-memory.dmp

          Filesize

          104KB

        • memory/2672-137-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB

        • memory/2672-138-0x0000000004C50000-0x0000000004C60000-memory.dmp

          Filesize

          64KB

        • memory/2672-139-0x0000000004C60000-0x000000000515E000-memory.dmp

          Filesize

          5.0MB

        • memory/2672-140-0x0000000002480000-0x0000000002498000-memory.dmp

          Filesize

          96KB

        • memory/2672-141-0x0000000002480000-0x0000000002492000-memory.dmp

          Filesize

          72KB

        • memory/2672-142-0x0000000002480000-0x0000000002492000-memory.dmp

          Filesize

          72KB

        • memory/2672-144-0x0000000002480000-0x0000000002492000-memory.dmp

          Filesize

          72KB

        • memory/2672-146-0x0000000002480000-0x0000000002492000-memory.dmp

          Filesize

          72KB

        • memory/2672-148-0x0000000002480000-0x0000000002492000-memory.dmp

          Filesize

          72KB

        • memory/2672-150-0x0000000002480000-0x0000000002492000-memory.dmp

          Filesize

          72KB

        • memory/2672-152-0x0000000002480000-0x0000000002492000-memory.dmp

          Filesize

          72KB

        • memory/2672-154-0x0000000002480000-0x0000000002492000-memory.dmp

          Filesize

          72KB

        • memory/2672-156-0x0000000002480000-0x0000000002492000-memory.dmp

          Filesize

          72KB

        • memory/2672-158-0x0000000002480000-0x0000000002492000-memory.dmp

          Filesize

          72KB

        • memory/2672-160-0x0000000002480000-0x0000000002492000-memory.dmp

          Filesize

          72KB

        • memory/2672-162-0x0000000002480000-0x0000000002492000-memory.dmp

          Filesize

          72KB

        • memory/2672-164-0x0000000002480000-0x0000000002492000-memory.dmp

          Filesize

          72KB

        • memory/2672-166-0x0000000002480000-0x0000000002492000-memory.dmp

          Filesize

          72KB

        • memory/2672-168-0x0000000002480000-0x0000000002492000-memory.dmp

          Filesize

          72KB

        • memory/2672-169-0x0000000004C50000-0x0000000004C60000-memory.dmp

          Filesize

          64KB

        • memory/2672-170-0x0000000004C50000-0x0000000004C60000-memory.dmp

          Filesize

          64KB

        • memory/2672-171-0x0000000000400000-0x00000000004AA000-memory.dmp

          Filesize

          680KB

        • memory/2672-172-0x0000000004C50000-0x0000000004C60000-memory.dmp

          Filesize

          64KB

        • memory/2672-174-0x0000000000400000-0x00000000004AA000-memory.dmp

          Filesize

          680KB

        • memory/3220-1113-0x0000000000A90000-0x0000000000AC2000-memory.dmp

          Filesize

          200KB

        • memory/3220-1116-0x0000000005680000-0x0000000005690000-memory.dmp

          Filesize

          64KB

        • memory/3220-1115-0x0000000005680000-0x0000000005690000-memory.dmp

          Filesize

          64KB

        • memory/3220-1114-0x00000000054D0000-0x000000000551B000-memory.dmp

          Filesize

          300KB

        • memory/3656-184-0x0000000004F30000-0x0000000004F6F000-memory.dmp

          Filesize

          252KB

        • memory/3656-217-0x0000000002290000-0x00000000022A0000-memory.dmp

          Filesize

          64KB

        • memory/3656-186-0x0000000004F30000-0x0000000004F6F000-memory.dmp

          Filesize

          252KB

        • memory/3656-188-0x0000000004F30000-0x0000000004F6F000-memory.dmp

          Filesize

          252KB

        • memory/3656-190-0x0000000004F30000-0x0000000004F6F000-memory.dmp

          Filesize

          252KB

        • memory/3656-192-0x0000000004F30000-0x0000000004F6F000-memory.dmp

          Filesize

          252KB

        • memory/3656-194-0x0000000004F30000-0x0000000004F6F000-memory.dmp

          Filesize

          252KB

        • memory/3656-196-0x0000000004F30000-0x0000000004F6F000-memory.dmp

          Filesize

          252KB

        • memory/3656-198-0x0000000004F30000-0x0000000004F6F000-memory.dmp

          Filesize

          252KB

        • memory/3656-200-0x0000000004F30000-0x0000000004F6F000-memory.dmp

          Filesize

          252KB

        • memory/3656-202-0x0000000004F30000-0x0000000004F6F000-memory.dmp

          Filesize

          252KB

        • memory/3656-204-0x0000000004F30000-0x0000000004F6F000-memory.dmp

          Filesize

          252KB

        • memory/3656-206-0x0000000004F30000-0x0000000004F6F000-memory.dmp

          Filesize

          252KB

        • memory/3656-208-0x0000000004F30000-0x0000000004F6F000-memory.dmp

          Filesize

          252KB

        • memory/3656-211-0x0000000001F90000-0x0000000001FDB000-memory.dmp

          Filesize

          300KB

        • memory/3656-212-0x0000000002290000-0x00000000022A0000-memory.dmp

          Filesize

          64KB

        • memory/3656-210-0x0000000004F30000-0x0000000004F6F000-memory.dmp

          Filesize

          252KB

        • memory/3656-215-0x0000000004F30000-0x0000000004F6F000-memory.dmp

          Filesize

          252KB

        • memory/3656-214-0x0000000002290000-0x00000000022A0000-memory.dmp

          Filesize

          64KB

        • memory/3656-182-0x0000000004F30000-0x0000000004F6F000-memory.dmp

          Filesize

          252KB

        • memory/3656-218-0x0000000004F30000-0x0000000004F6F000-memory.dmp

          Filesize

          252KB

        • memory/3656-1091-0x0000000004FD0000-0x00000000055D6000-memory.dmp

          Filesize

          6.0MB

        • memory/3656-1092-0x0000000005660000-0x000000000576A000-memory.dmp

          Filesize

          1.0MB

        • memory/3656-1093-0x00000000057A0000-0x00000000057B2000-memory.dmp

          Filesize

          72KB

        • memory/3656-1094-0x00000000057C0000-0x00000000057FE000-memory.dmp

          Filesize

          248KB

        • memory/3656-1095-0x0000000002290000-0x00000000022A0000-memory.dmp

          Filesize

          64KB

        • memory/3656-1096-0x0000000005910000-0x000000000595B000-memory.dmp

          Filesize

          300KB

        • memory/3656-1098-0x0000000005AA0000-0x0000000005B32000-memory.dmp

          Filesize

          584KB

        • memory/3656-1099-0x0000000005B40000-0x0000000005BA6000-memory.dmp

          Filesize

          408KB

        • memory/3656-1100-0x0000000002290000-0x00000000022A0000-memory.dmp

          Filesize

          64KB

        • memory/3656-1101-0x0000000002290000-0x00000000022A0000-memory.dmp

          Filesize

          64KB

        • memory/3656-1102-0x0000000002290000-0x00000000022A0000-memory.dmp

          Filesize

          64KB

        • memory/3656-1103-0x0000000006320000-0x0000000006396000-memory.dmp

          Filesize

          472KB

        • memory/3656-1104-0x00000000063B0000-0x0000000006400000-memory.dmp

          Filesize

          320KB

        • memory/3656-181-0x0000000004F30000-0x0000000004F6F000-memory.dmp

          Filesize

          252KB

        • memory/3656-180-0x0000000004F30000-0x0000000004F74000-memory.dmp

          Filesize

          272KB

        • memory/3656-179-0x00000000023F0000-0x0000000002436000-memory.dmp

          Filesize

          280KB

        • memory/3656-1105-0x00000000066C0000-0x0000000006882000-memory.dmp

          Filesize

          1.8MB

        • memory/3656-1106-0x0000000006890000-0x0000000006DBC000-memory.dmp

          Filesize

          5.2MB

        • memory/3656-1107-0x0000000002290000-0x00000000022A0000-memory.dmp

          Filesize

          64KB