Analysis

  • max time kernel
    55s
  • max time network
    58s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-04-2023 18:09

General

  • Target

    d4a3ee13569b0b2dd5d7aa7d67687e13b5112edece8c1f5e065c253c005baa65.exe

  • Size

    660KB

  • MD5

    dd1bf08edc3a881d7ed769bd0df185e0

  • SHA1

    752ff03e7bd305e83844c31c0288c91db2b279d9

  • SHA256

    d4a3ee13569b0b2dd5d7aa7d67687e13b5112edece8c1f5e065c253c005baa65

  • SHA512

    3b78584a0d46beeecce9f3498aef6e22a1983fc7e27d1080f40014631ba691ad2ce730512754f8e07770b61f317aa0c4ab86b254bfb75b1a5baef44c96964864

  • SSDEEP

    12288:cMrWy905p1IC6KUo7QoqDXXsbWZSFGqh+l6ZbZv:aymrIC6KrRFGTsb

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d4a3ee13569b0b2dd5d7aa7d67687e13b5112edece8c1f5e065c253c005baa65.exe
    "C:\Users\Admin\AppData\Local\Temp\d4a3ee13569b0b2dd5d7aa7d67687e13b5112edece8c1f5e065c253c005baa65.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3704
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un560710.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un560710.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2240
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3543.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3543.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4596
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3543.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3543.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4924
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9850.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9850.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2500
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si449755.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si449755.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3084

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si449755.exe
    Filesize

    175KB

    MD5

    4d6fbea168ccc60e30a19f30d1eabf5b

    SHA1

    efed3dcfa77956e2918054948c54945b891e2bad

    SHA256

    4e252c53f013e8cabe8b31575e0355800a6fc4d22065618fca2b761874f46536

    SHA512

    8096f1fcf8192479862341c433717e6b9eeb5b28c3a30c36f1488d1ff56005ed93593d31c7cb73c164b215f4b0aab9040a13b1296efbfbde89d85ea0460f6b14

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si449755.exe
    Filesize

    175KB

    MD5

    4d6fbea168ccc60e30a19f30d1eabf5b

    SHA1

    efed3dcfa77956e2918054948c54945b891e2bad

    SHA256

    4e252c53f013e8cabe8b31575e0355800a6fc4d22065618fca2b761874f46536

    SHA512

    8096f1fcf8192479862341c433717e6b9eeb5b28c3a30c36f1488d1ff56005ed93593d31c7cb73c164b215f4b0aab9040a13b1296efbfbde89d85ea0460f6b14

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un560710.exe
    Filesize

    517KB

    MD5

    d4431b66f2b0d7a8c9a46ab728aa6d3b

    SHA1

    c039c2180e65dcf5c76661f0a2b6015362a9bc98

    SHA256

    bc15a5513086e6f85ca95584a42c4bf058c1683e49b3daf4086b0a3533c2158c

    SHA512

    d554e7378f8f7b84e7f994a62b066f5b02cab22a8336aa35cd3f7bee60d3c76f6027f0f25b7a89d39d4adbac327c0efad32502d2a427dfa0e0cf85ebfb830091

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un560710.exe
    Filesize

    517KB

    MD5

    d4431b66f2b0d7a8c9a46ab728aa6d3b

    SHA1

    c039c2180e65dcf5c76661f0a2b6015362a9bc98

    SHA256

    bc15a5513086e6f85ca95584a42c4bf058c1683e49b3daf4086b0a3533c2158c

    SHA512

    d554e7378f8f7b84e7f994a62b066f5b02cab22a8336aa35cd3f7bee60d3c76f6027f0f25b7a89d39d4adbac327c0efad32502d2a427dfa0e0cf85ebfb830091

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3543.exe
    Filesize

    237KB

    MD5

    e0dc6ced04b5a422e95f75193b52a411

    SHA1

    3d7f90a0c6697e65d9c33b6e8c227425f475bd1b

    SHA256

    11381703ffcf00ddc4eaf1890701c8035a6554cfad3d6d6c9b49e573c84deac5

    SHA512

    b46bbcf8f0af13ea7835af54ebf6b79b5238745e026541fb2c101b18f8b56eef23c4e85819a15bddd216751195bcf789841d04faa2753dafebdbc3ed82ed1dac

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3543.exe
    Filesize

    237KB

    MD5

    e0dc6ced04b5a422e95f75193b52a411

    SHA1

    3d7f90a0c6697e65d9c33b6e8c227425f475bd1b

    SHA256

    11381703ffcf00ddc4eaf1890701c8035a6554cfad3d6d6c9b49e573c84deac5

    SHA512

    b46bbcf8f0af13ea7835af54ebf6b79b5238745e026541fb2c101b18f8b56eef23c4e85819a15bddd216751195bcf789841d04faa2753dafebdbc3ed82ed1dac

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3543.exe
    Filesize

    237KB

    MD5

    e0dc6ced04b5a422e95f75193b52a411

    SHA1

    3d7f90a0c6697e65d9c33b6e8c227425f475bd1b

    SHA256

    11381703ffcf00ddc4eaf1890701c8035a6554cfad3d6d6c9b49e573c84deac5

    SHA512

    b46bbcf8f0af13ea7835af54ebf6b79b5238745e026541fb2c101b18f8b56eef23c4e85819a15bddd216751195bcf789841d04faa2753dafebdbc3ed82ed1dac

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9850.exe
    Filesize

    294KB

    MD5

    e5e4149b42dc21ac954161c3534bd193

    SHA1

    44ca531d32726ef9f31e1d424d0af9a938ae91b0

    SHA256

    24982efc4939b629abd2dbfe9fbd687d29b56cb9731ea99b05744c3d55fbbea6

    SHA512

    25c1dace53598026b32e25f01d96f220401b12da55981637f898340051847e6220170a1cac5fe64b0661a450308553a18823240886e2bbcf5c02e37b18c40f18

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9850.exe
    Filesize

    294KB

    MD5

    e5e4149b42dc21ac954161c3534bd193

    SHA1

    44ca531d32726ef9f31e1d424d0af9a938ae91b0

    SHA256

    24982efc4939b629abd2dbfe9fbd687d29b56cb9731ea99b05744c3d55fbbea6

    SHA512

    25c1dace53598026b32e25f01d96f220401b12da55981637f898340051847e6220170a1cac5fe64b0661a450308553a18823240886e2bbcf5c02e37b18c40f18

  • memory/2500-171-0x0000000000590000-0x00000000005DB000-memory.dmp
    Filesize

    300KB

  • memory/2500-1090-0x00000000051B0000-0x00000000051EE000-memory.dmp
    Filesize

    248KB

  • memory/2500-1107-0x0000000006750000-0x0000000006C7C000-memory.dmp
    Filesize

    5.2MB

  • memory/2500-1106-0x0000000006580000-0x0000000006742000-memory.dmp
    Filesize

    1.8MB

  • memory/2500-1105-0x0000000006410000-0x0000000006460000-memory.dmp
    Filesize

    320KB

  • memory/2500-1104-0x0000000006380000-0x00000000063F6000-memory.dmp
    Filesize

    472KB

  • memory/2500-1103-0x0000000004940000-0x0000000004950000-memory.dmp
    Filesize

    64KB

  • memory/2500-146-0x0000000004890000-0x00000000048D6000-memory.dmp
    Filesize

    280KB

  • memory/2500-1097-0x0000000004940000-0x0000000004950000-memory.dmp
    Filesize

    64KB

  • memory/2500-149-0x0000000004F50000-0x0000000004F94000-memory.dmp
    Filesize

    272KB

  • memory/2500-1098-0x0000000004940000-0x0000000004950000-memory.dmp
    Filesize

    64KB

  • memory/2500-153-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/2500-155-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/2500-1096-0x0000000004940000-0x0000000004950000-memory.dmp
    Filesize

    64KB

  • memory/2500-1095-0x0000000006170000-0x0000000006202000-memory.dmp
    Filesize

    584KB

  • memory/2500-159-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/2500-1094-0x0000000005490000-0x00000000054F6000-memory.dmp
    Filesize

    408KB

  • memory/2500-1091-0x0000000005300000-0x000000000534B000-memory.dmp
    Filesize

    300KB

  • memory/2500-163-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/2500-1089-0x0000000004940000-0x0000000004950000-memory.dmp
    Filesize

    64KB

  • memory/2500-167-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/2500-1088-0x0000000005190000-0x00000000051A2000-memory.dmp
    Filesize

    72KB

  • memory/2500-173-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/2500-177-0x0000000004940000-0x0000000004950000-memory.dmp
    Filesize

    64KB

  • memory/2500-1087-0x0000000005050000-0x000000000515A000-memory.dmp
    Filesize

    1.0MB

  • memory/2500-179-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/2500-1086-0x00000000055E0000-0x0000000005BE6000-memory.dmp
    Filesize

    6.0MB

  • memory/2500-180-0x0000000004940000-0x0000000004950000-memory.dmp
    Filesize

    64KB

  • memory/2500-174-0x0000000004940000-0x0000000004950000-memory.dmp
    Filesize

    64KB

  • memory/2500-209-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/2500-183-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/2500-211-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/2500-188-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/2500-191-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/2500-207-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/2500-195-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/2500-205-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/2500-203-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/2500-199-0x0000000004F50000-0x0000000004F8F000-memory.dmp
    Filesize

    252KB

  • memory/3084-1115-0x0000000004B80000-0x0000000004B90000-memory.dmp
    Filesize

    64KB

  • memory/3084-1114-0x0000000004CB0000-0x0000000004CFB000-memory.dmp
    Filesize

    300KB

  • memory/3084-1113-0x0000000000270000-0x00000000002A2000-memory.dmp
    Filesize

    200KB

  • memory/4596-134-0x00000000001D0000-0x00000000001FE000-memory.dmp
    Filesize

    184KB

  • memory/4924-154-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/4924-148-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/4924-181-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/4924-175-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/4924-169-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/4924-166-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/4924-135-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/4924-162-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/4924-158-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/4924-151-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/4924-201-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/4924-185-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/4924-147-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/4924-1102-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/4924-145-0x0000000004900000-0x0000000004918000-memory.dmp
    Filesize

    96KB

  • memory/4924-144-0x00000000049A0000-0x0000000004E9E000-memory.dmp
    Filesize

    5.0MB

  • memory/4924-143-0x0000000004990000-0x00000000049A0000-memory.dmp
    Filesize

    64KB

  • memory/4924-142-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/4924-141-0x0000000000850000-0x000000000086A000-memory.dmp
    Filesize

    104KB

  • memory/4924-133-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/4924-131-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/4924-190-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/4924-194-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/4924-197-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB