Analysis

  • max time kernel
    53s
  • max time network
    74s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-04-2023 18:27

General

  • Target

    5d9a1436091f1942624103d9f82764b7fab96a1f1b45c4f6bb9ffed9d25dd6e3.exe

  • Size

    660KB

  • MD5

    accdb0f2dce61f07fc9a9688297ef1ba

  • SHA1

    e2dda670ec514e9d89685109491bb8d91aa0df20

  • SHA256

    5d9a1436091f1942624103d9f82764b7fab96a1f1b45c4f6bb9ffed9d25dd6e3

  • SHA512

    4d58b2600db05b75259b3f7079bbb4f4d960ef25707e71cb842e86a7bbd7c582f443a60c519089f533ec25ba2fa69215d9840f82a47e389d3b76fe775b064759

  • SSDEEP

    12288:dMrwy90gMxkSnuwBQMctDZzQCUT6GP/y/8egZSmxwxtl6QX:py7mbucbcTU2GS/7DmxOsi

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5d9a1436091f1942624103d9f82764b7fab96a1f1b45c4f6bb9ffed9d25dd6e3.exe
    "C:\Users\Admin\AppData\Local\Temp\5d9a1436091f1942624103d9f82764b7fab96a1f1b45c4f6bb9ffed9d25dd6e3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4452
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un013903.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un013903.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5044
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7310.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7310.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4472
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7310.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7310.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1780
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1088.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1088.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4716
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si667265.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si667265.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4968

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si667265.exe

    Filesize

    175KB

    MD5

    1bcd70c4b25dc008630e1028ec832724

    SHA1

    c19a320318e96d8acdf55151d71ed792c45ee60c

    SHA256

    7d1bfe7445b94243257c34b41c7a9023867ed1fa3f626eecaead4b0a12789c7b

    SHA512

    fbc65a76a8b862f894788f13fc1d6eae8f8a492c3336692cb67490b4d5a6e02f90fa029209bd1f6449fe198fed80381edbd423a7a9b04322e47b3e1b7a742af1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si667265.exe

    Filesize

    175KB

    MD5

    1bcd70c4b25dc008630e1028ec832724

    SHA1

    c19a320318e96d8acdf55151d71ed792c45ee60c

    SHA256

    7d1bfe7445b94243257c34b41c7a9023867ed1fa3f626eecaead4b0a12789c7b

    SHA512

    fbc65a76a8b862f894788f13fc1d6eae8f8a492c3336692cb67490b4d5a6e02f90fa029209bd1f6449fe198fed80381edbd423a7a9b04322e47b3e1b7a742af1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un013903.exe

    Filesize

    518KB

    MD5

    10b4e4817d433bdbbaafaaf05f4ca54d

    SHA1

    d8bfc0d7203dab7f7ee548f56028f65c29acc38f

    SHA256

    ccca6f3d8b291d7896674cf98c6be811ab3e50814e3625e2c454ba230d07add4

    SHA512

    258eaa5d1b08a09700c01ff8aa49db84821e33fa942b03ef5b369c2c49e6f5e63df102e6ed3e57586ffc8c20a7628a601621652ecb5febc957f350c143e1c411

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un013903.exe

    Filesize

    518KB

    MD5

    10b4e4817d433bdbbaafaaf05f4ca54d

    SHA1

    d8bfc0d7203dab7f7ee548f56028f65c29acc38f

    SHA256

    ccca6f3d8b291d7896674cf98c6be811ab3e50814e3625e2c454ba230d07add4

    SHA512

    258eaa5d1b08a09700c01ff8aa49db84821e33fa942b03ef5b369c2c49e6f5e63df102e6ed3e57586ffc8c20a7628a601621652ecb5febc957f350c143e1c411

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7310.exe

    Filesize

    237KB

    MD5

    f72fa26d1e3e8913b45ec4c7dd75d91a

    SHA1

    232712fe99115866e3732db9064bfcd58a1d99ee

    SHA256

    8ac3de7c87a2e4e9e711b2ff824f2867477d6e6f6d6377314cb0c0590696dea8

    SHA512

    795e37c23a4a75476174060728f4f52617813ecca96cf2ed5af2a312ad572e688d8111560ee9bbb45af4c36b70d607f0295ea400b5b4a73b9aef81c1a7e1dfd3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7310.exe

    Filesize

    237KB

    MD5

    f72fa26d1e3e8913b45ec4c7dd75d91a

    SHA1

    232712fe99115866e3732db9064bfcd58a1d99ee

    SHA256

    8ac3de7c87a2e4e9e711b2ff824f2867477d6e6f6d6377314cb0c0590696dea8

    SHA512

    795e37c23a4a75476174060728f4f52617813ecca96cf2ed5af2a312ad572e688d8111560ee9bbb45af4c36b70d607f0295ea400b5b4a73b9aef81c1a7e1dfd3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7310.exe

    Filesize

    237KB

    MD5

    f72fa26d1e3e8913b45ec4c7dd75d91a

    SHA1

    232712fe99115866e3732db9064bfcd58a1d99ee

    SHA256

    8ac3de7c87a2e4e9e711b2ff824f2867477d6e6f6d6377314cb0c0590696dea8

    SHA512

    795e37c23a4a75476174060728f4f52617813ecca96cf2ed5af2a312ad572e688d8111560ee9bbb45af4c36b70d607f0295ea400b5b4a73b9aef81c1a7e1dfd3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1088.exe

    Filesize

    294KB

    MD5

    173b81d815b01b5105050d2b0371925c

    SHA1

    8d690dab9982a00ac0b02dbab396ba7b2e84da87

    SHA256

    203688982ec70d633596a6833ecb1af28001d22db386157817b6218cd55aabec

    SHA512

    0daea010d332884400ec6b8d10c1114d0abaeaa9280cc57859681a867ee727d8a3bbca2e40c097e7dfe58b932a1c4cf071f021840ff49fadc72e9e8a760261c6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1088.exe

    Filesize

    294KB

    MD5

    173b81d815b01b5105050d2b0371925c

    SHA1

    8d690dab9982a00ac0b02dbab396ba7b2e84da87

    SHA256

    203688982ec70d633596a6833ecb1af28001d22db386157817b6218cd55aabec

    SHA512

    0daea010d332884400ec6b8d10c1114d0abaeaa9280cc57859681a867ee727d8a3bbca2e40c097e7dfe58b932a1c4cf071f021840ff49fadc72e9e8a760261c6

  • memory/1780-154-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/1780-1111-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/1780-145-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/1780-146-0x0000000002060000-0x000000000207A000-memory.dmp

    Filesize

    104KB

  • memory/1780-147-0x0000000004B50000-0x000000000504E000-memory.dmp

    Filesize

    5.0MB

  • memory/1780-148-0x00000000023B0000-0x00000000023C8000-memory.dmp

    Filesize

    96KB

  • memory/1780-138-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/1780-150-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/1780-151-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/1780-190-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/1780-186-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/1780-156-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/1780-158-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/1780-161-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/1780-165-0x0000000004B40000-0x0000000004B50000-memory.dmp

    Filesize

    64KB

  • memory/1780-139-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/1780-1104-0x0000000004B40000-0x0000000004B50000-memory.dmp

    Filesize

    64KB

  • memory/1780-1103-0x0000000004B40000-0x0000000004B50000-memory.dmp

    Filesize

    64KB

  • memory/1780-167-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/1780-172-0x0000000004B40000-0x0000000004B50000-memory.dmp

    Filesize

    64KB

  • memory/1780-1102-0x0000000004B40000-0x0000000004B50000-memory.dmp

    Filesize

    64KB

  • memory/1780-168-0x0000000004B40000-0x0000000004B50000-memory.dmp

    Filesize

    64KB

  • memory/1780-173-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/1780-206-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/1780-202-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/1780-198-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/1780-194-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/1780-179-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/1780-135-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/4472-137-0x00000000005B0000-0x00000000005DE000-memory.dmp

    Filesize

    184KB

  • memory/4716-192-0x0000000002640000-0x000000000267F000-memory.dmp

    Filesize

    252KB

  • memory/4716-1096-0x0000000005300000-0x000000000534B000-memory.dmp

    Filesize

    300KB

  • memory/4716-177-0x0000000002640000-0x000000000267F000-memory.dmp

    Filesize

    252KB

  • memory/4716-178-0x00000000023B0000-0x00000000023C0000-memory.dmp

    Filesize

    64KB

  • memory/4716-195-0x0000000002640000-0x000000000267F000-memory.dmp

    Filesize

    252KB

  • memory/4716-184-0x00000000023B0000-0x00000000023C0000-memory.dmp

    Filesize

    64KB

  • memory/4716-199-0x0000000002640000-0x000000000267F000-memory.dmp

    Filesize

    252KB

  • memory/4716-182-0x0000000002640000-0x000000000267F000-memory.dmp

    Filesize

    252KB

  • memory/4716-203-0x0000000002640000-0x000000000267F000-memory.dmp

    Filesize

    252KB

  • memory/4716-181-0x00000000023B0000-0x00000000023C0000-memory.dmp

    Filesize

    64KB

  • memory/4716-207-0x0000000002640000-0x000000000267F000-memory.dmp

    Filesize

    252KB

  • memory/4716-175-0x0000000000590000-0x00000000005DB000-memory.dmp

    Filesize

    300KB

  • memory/4716-209-0x0000000002640000-0x000000000267F000-memory.dmp

    Filesize

    252KB

  • memory/4716-211-0x0000000002640000-0x000000000267F000-memory.dmp

    Filesize

    252KB

  • memory/4716-213-0x0000000002640000-0x000000000267F000-memory.dmp

    Filesize

    252KB

  • memory/4716-215-0x0000000002640000-0x000000000267F000-memory.dmp

    Filesize

    252KB

  • memory/4716-217-0x0000000002640000-0x000000000267F000-memory.dmp

    Filesize

    252KB

  • memory/4716-1092-0x0000000005690000-0x0000000005C96000-memory.dmp

    Filesize

    6.0MB

  • memory/4716-1093-0x0000000005080000-0x000000000518A000-memory.dmp

    Filesize

    1.0MB

  • memory/4716-1094-0x0000000005190000-0x00000000051A2000-memory.dmp

    Filesize

    72KB

  • memory/4716-1095-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4716-188-0x0000000002640000-0x000000000267F000-memory.dmp

    Filesize

    252KB

  • memory/4716-1097-0x00000000023B0000-0x00000000023C0000-memory.dmp

    Filesize

    64KB

  • memory/4716-1098-0x0000000005490000-0x0000000005522000-memory.dmp

    Filesize

    584KB

  • memory/4716-1099-0x0000000005530000-0x0000000005596000-memory.dmp

    Filesize

    408KB

  • memory/4716-171-0x0000000002640000-0x000000000267F000-memory.dmp

    Filesize

    252KB

  • memory/4716-166-0x0000000002640000-0x000000000267F000-memory.dmp

    Filesize

    252KB

  • memory/4716-160-0x0000000002640000-0x000000000267F000-memory.dmp

    Filesize

    252KB

  • memory/4716-1105-0x00000000023B0000-0x00000000023C0000-memory.dmp

    Filesize

    64KB

  • memory/4716-1106-0x00000000023B0000-0x00000000023C0000-memory.dmp

    Filesize

    64KB

  • memory/4716-1107-0x00000000023B0000-0x00000000023C0000-memory.dmp

    Filesize

    64KB

  • memory/4716-162-0x0000000002640000-0x000000000267F000-memory.dmp

    Filesize

    252KB

  • memory/4716-1112-0x0000000006240000-0x0000000006402000-memory.dmp

    Filesize

    1.8MB

  • memory/4716-1113-0x0000000006420000-0x000000000694C000-memory.dmp

    Filesize

    5.2MB

  • memory/4716-1114-0x00000000023B0000-0x00000000023C0000-memory.dmp

    Filesize

    64KB

  • memory/4716-1115-0x0000000006CC0000-0x0000000006D36000-memory.dmp

    Filesize

    472KB

  • memory/4716-1116-0x0000000006D50000-0x0000000006DA0000-memory.dmp

    Filesize

    320KB

  • memory/4716-153-0x0000000002640000-0x0000000002684000-memory.dmp

    Filesize

    272KB

  • memory/4716-149-0x0000000002360000-0x00000000023A6000-memory.dmp

    Filesize

    280KB

  • memory/4968-1122-0x0000000000430000-0x0000000000462000-memory.dmp

    Filesize

    200KB

  • memory/4968-1123-0x0000000004E70000-0x0000000004EBB000-memory.dmp

    Filesize

    300KB

  • memory/4968-1124-0x0000000005050000-0x0000000005060000-memory.dmp

    Filesize

    64KB

  • memory/4968-1125-0x0000000005050000-0x0000000005060000-memory.dmp

    Filesize

    64KB