Analysis

  • max time kernel
    49s
  • max time network
    59s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03/04/2023, 13:44

General

  • Target

    e00b6bd7e6a9d46a84d4e314eb3dd5c89d19aff00af015b8038fa23cec52802a.exe

  • Size

    522KB

  • MD5

    d24021d05a74e90f5cb4848fa57fc207

  • SHA1

    f6b1ce344a3a764407909a9805df3701677ea60d

  • SHA256

    e00b6bd7e6a9d46a84d4e314eb3dd5c89d19aff00af015b8038fa23cec52802a

  • SHA512

    4970f22a5399f768d8d044a5be27cf28574c1af1338317c1ceb9edc689d26e17fb777334b3e26a3387435cc35b86b8fab10724d15994865b082d3a1dd098be78

  • SSDEEP

    12288:xMrRy90X+8KaTRC9Lq3tBRRgpWyfbga1OxuSo13KQ:Iyn8KSOqdfRgsmbJaa3l

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e00b6bd7e6a9d46a84d4e314eb3dd5c89d19aff00af015b8038fa23cec52802a.exe
    "C:\Users\Admin\AppData\Local\Temp\e00b6bd7e6a9d46a84d4e314eb3dd5c89d19aff00af015b8038fa23cec52802a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4028
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zikx4694.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zikx4694.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2776
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr229709.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr229709.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3292
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku142618.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku142618.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1416
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr437753.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr437753.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4752

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr437753.exe

    Filesize

    175KB

    MD5

    bb6d43fa4ebafe62b98ec4dea4ff49d9

    SHA1

    d8188e664ac977f59d3ec26589e3cf67b1fab23b

    SHA256

    1d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89

    SHA512

    679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr437753.exe

    Filesize

    175KB

    MD5

    bb6d43fa4ebafe62b98ec4dea4ff49d9

    SHA1

    d8188e664ac977f59d3ec26589e3cf67b1fab23b

    SHA256

    1d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89

    SHA512

    679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zikx4694.exe

    Filesize

    380KB

    MD5

    72d5f4df9a07a2cf5c903be250cd113e

    SHA1

    5f4b603f40bd6d72b9419318ff98c5d3b80ffdc5

    SHA256

    555f602c10bd5e14b4842cddd5e6cf0bc621b504509219af6f3e93f00c215608

    SHA512

    83911b382eddbe092640c539ffc8e3bb4d1153f22f24aec6293332f06ad4a05de92b7af2b9e65f293f59d0a744f65a63b9efe33ab2afe2064e4a94230bfb0053

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zikx4694.exe

    Filesize

    380KB

    MD5

    72d5f4df9a07a2cf5c903be250cd113e

    SHA1

    5f4b603f40bd6d72b9419318ff98c5d3b80ffdc5

    SHA256

    555f602c10bd5e14b4842cddd5e6cf0bc621b504509219af6f3e93f00c215608

    SHA512

    83911b382eddbe092640c539ffc8e3bb4d1153f22f24aec6293332f06ad4a05de92b7af2b9e65f293f59d0a744f65a63b9efe33ab2afe2064e4a94230bfb0053

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr229709.exe

    Filesize

    15KB

    MD5

    5fbb0d715e1d689765bebfe8e1190a2d

    SHA1

    597a7aa590594c66b264543e2943161a1449e41c

    SHA256

    3ae4ead9dfd21150c52dea2796d045f76ecb390cd948f6150192c9868e0417fe

    SHA512

    377559c70572fcc8efd0877879ddbf740745d4476db3df918d3994e334e6dff53e579cfc12939241f69d1cd76828a4393ac399e9716966bcba1a71730dd5702b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr229709.exe

    Filesize

    15KB

    MD5

    5fbb0d715e1d689765bebfe8e1190a2d

    SHA1

    597a7aa590594c66b264543e2943161a1449e41c

    SHA256

    3ae4ead9dfd21150c52dea2796d045f76ecb390cd948f6150192c9868e0417fe

    SHA512

    377559c70572fcc8efd0877879ddbf740745d4476db3df918d3994e334e6dff53e579cfc12939241f69d1cd76828a4393ac399e9716966bcba1a71730dd5702b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku142618.exe

    Filesize

    294KB

    MD5

    7e1d59ca3a5d866b0cd0151c93fcdfb8

    SHA1

    501b0e0ebf7e35a8f4192d6a01070df96cfc523e

    SHA256

    319c3f4acf181831b40eb383cd786958c760f051cbc7cbe27a09e3393cb70a6b

    SHA512

    5f5703414ce3861d80dcdc9b9549cfb9c0deed03a92849f57aa46b65eeb1a734dfe4d85702468803b1c51777b09e11f8011242f621eaa4d3a8333087a46c7cbc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku142618.exe

    Filesize

    294KB

    MD5

    7e1d59ca3a5d866b0cd0151c93fcdfb8

    SHA1

    501b0e0ebf7e35a8f4192d6a01070df96cfc523e

    SHA256

    319c3f4acf181831b40eb383cd786958c760f051cbc7cbe27a09e3393cb70a6b

    SHA512

    5f5703414ce3861d80dcdc9b9549cfb9c0deed03a92849f57aa46b65eeb1a734dfe4d85702468803b1c51777b09e11f8011242f621eaa4d3a8333087a46c7cbc

  • memory/1416-141-0x00000000006C0000-0x000000000070B000-memory.dmp

    Filesize

    300KB

  • memory/1416-142-0x0000000004A00000-0x0000000004A46000-memory.dmp

    Filesize

    280KB

  • memory/1416-143-0x0000000004AE0000-0x0000000004FDE000-memory.dmp

    Filesize

    5.0MB

  • memory/1416-144-0x0000000004A80000-0x0000000004AC4000-memory.dmp

    Filesize

    272KB

  • memory/1416-145-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

    Filesize

    64KB

  • memory/1416-146-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

    Filesize

    64KB

  • memory/1416-147-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

    Filesize

    64KB

  • memory/1416-148-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-149-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-151-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-153-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-155-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-157-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-159-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-161-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-163-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-165-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-167-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-169-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-171-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-173-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-175-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-177-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-179-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-181-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-183-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-185-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-187-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-189-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-191-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-193-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-195-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-197-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-199-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-201-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-203-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-205-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-207-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-209-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-211-0x0000000004A80000-0x0000000004ABF000-memory.dmp

    Filesize

    252KB

  • memory/1416-1054-0x00000000055F0000-0x0000000005BF6000-memory.dmp

    Filesize

    6.0MB

  • memory/1416-1055-0x0000000005050000-0x000000000515A000-memory.dmp

    Filesize

    1.0MB

  • memory/1416-1056-0x0000000005190000-0x00000000051A2000-memory.dmp

    Filesize

    72KB

  • memory/1416-1057-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

    Filesize

    64KB

  • memory/1416-1058-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/1416-1059-0x0000000005300000-0x000000000534B000-memory.dmp

    Filesize

    300KB

  • memory/1416-1061-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

    Filesize

    64KB

  • memory/1416-1062-0x0000000005490000-0x0000000005522000-memory.dmp

    Filesize

    584KB

  • memory/1416-1063-0x0000000005530000-0x0000000005596000-memory.dmp

    Filesize

    408KB

  • memory/1416-1064-0x0000000006210000-0x0000000006286000-memory.dmp

    Filesize

    472KB

  • memory/1416-1065-0x00000000062A0000-0x00000000062F0000-memory.dmp

    Filesize

    320KB

  • memory/1416-1066-0x0000000006440000-0x0000000006602000-memory.dmp

    Filesize

    1.8MB

  • memory/1416-1067-0x0000000006610000-0x0000000006B3C000-memory.dmp

    Filesize

    5.2MB

  • memory/1416-1068-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

    Filesize

    64KB

  • memory/3292-135-0x00000000000F0000-0x00000000000FA000-memory.dmp

    Filesize

    40KB

  • memory/4752-1075-0x0000000000A70000-0x0000000000AA2000-memory.dmp

    Filesize

    200KB

  • memory/4752-1076-0x0000000005300000-0x000000000534B000-memory.dmp

    Filesize

    300KB

  • memory/4752-1077-0x0000000005350000-0x0000000005360000-memory.dmp

    Filesize

    64KB