Analysis

  • max time kernel
    28s
  • max time network
    30s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-04-2023 19:23

General

  • Target

    37279f6f736a66c075e8cfcc496dfc541995d59fb6dee18e040f5560b9a8f33f.exe

  • Size

    660KB

  • MD5

    59034de3a271e2b731bc3f934a3badd1

  • SHA1

    5000495a080a72ab8aad2ed15fd28d3a0a85e470

  • SHA256

    37279f6f736a66c075e8cfcc496dfc541995d59fb6dee18e040f5560b9a8f33f

  • SHA512

    0def0b330e365b38677f38d4c6ae94b301643ea1394a34cd32f0c46445c7339634090241aa75ac57216a6f614ce5900ad3e793209432c084506ef447100c2c1a

  • SSDEEP

    12288:bMrfy90ODyoGo1UdmR0nMoRF1sdW5YZSl1DdTl6l+:cyV1MmyJl1Bs0

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\37279f6f736a66c075e8cfcc496dfc541995d59fb6dee18e040f5560b9a8f33f.exe
    "C:\Users\Admin\AppData\Local\Temp\37279f6f736a66c075e8cfcc496dfc541995d59fb6dee18e040f5560b9a8f33f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5096
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un072904.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un072904.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4100
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0397.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0397.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4120
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0397.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0397.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5108
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8211.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8211.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4912
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si920073.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si920073.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4756

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si920073.exe

    Filesize

    175KB

    MD5

    bdaef4358a9dc8673a6b08a009f06c4d

    SHA1

    4cfb3ffc0827916b1203febd994f627cf077f767

    SHA256

    e47f1ba92d6375a024a262295d7b23fccb00ea538a347ede05766eca1adbfb3a

    SHA512

    6d34cd8475f40374ee7a10c9b13c5646c55840d6c9481adb7f716ed7ab6128ee82230905b29a4f4af7d8f378bdad5434245579fd8cc9295b9840bf5249e4a6c0

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si920073.exe

    Filesize

    175KB

    MD5

    bdaef4358a9dc8673a6b08a009f06c4d

    SHA1

    4cfb3ffc0827916b1203febd994f627cf077f767

    SHA256

    e47f1ba92d6375a024a262295d7b23fccb00ea538a347ede05766eca1adbfb3a

    SHA512

    6d34cd8475f40374ee7a10c9b13c5646c55840d6c9481adb7f716ed7ab6128ee82230905b29a4f4af7d8f378bdad5434245579fd8cc9295b9840bf5249e4a6c0

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un072904.exe

    Filesize

    517KB

    MD5

    e551663a685ca1f2180d9d449f31d9a8

    SHA1

    eb29a8c55fc06a694f93fc416b7a705cbbbeedc8

    SHA256

    b63a48945b0a515ab0e13ec3f78b7649dc07da3d6832c92eaed4b79b13ef8263

    SHA512

    fb862713744051016061587d59ff932fa894137a5099274642d667447906263483119335c760bcc922442464a00275aa2f32b6a90aee7a5685ab0863bd4ad998

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un072904.exe

    Filesize

    517KB

    MD5

    e551663a685ca1f2180d9d449f31d9a8

    SHA1

    eb29a8c55fc06a694f93fc416b7a705cbbbeedc8

    SHA256

    b63a48945b0a515ab0e13ec3f78b7649dc07da3d6832c92eaed4b79b13ef8263

    SHA512

    fb862713744051016061587d59ff932fa894137a5099274642d667447906263483119335c760bcc922442464a00275aa2f32b6a90aee7a5685ab0863bd4ad998

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0397.exe

    Filesize

    237KB

    MD5

    36aa717411e656e1eedd91282d093ebf

    SHA1

    2831da8066cf2e701a758407d44feb03c8d191dc

    SHA256

    aac842807a36acbdc0f54fb1e811ad6e682208edad42cd1d5feae6dec4dcc7f1

    SHA512

    4b27fa1176336947bf40391fe2b564a43572ffbf4b965cf4f02bba9dd716ff57d0ce1b75f4e133335d9a7d58280a2450e4e54c5ea0acb042736be17bda89b108

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0397.exe

    Filesize

    237KB

    MD5

    36aa717411e656e1eedd91282d093ebf

    SHA1

    2831da8066cf2e701a758407d44feb03c8d191dc

    SHA256

    aac842807a36acbdc0f54fb1e811ad6e682208edad42cd1d5feae6dec4dcc7f1

    SHA512

    4b27fa1176336947bf40391fe2b564a43572ffbf4b965cf4f02bba9dd716ff57d0ce1b75f4e133335d9a7d58280a2450e4e54c5ea0acb042736be17bda89b108

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0397.exe

    Filesize

    237KB

    MD5

    36aa717411e656e1eedd91282d093ebf

    SHA1

    2831da8066cf2e701a758407d44feb03c8d191dc

    SHA256

    aac842807a36acbdc0f54fb1e811ad6e682208edad42cd1d5feae6dec4dcc7f1

    SHA512

    4b27fa1176336947bf40391fe2b564a43572ffbf4b965cf4f02bba9dd716ff57d0ce1b75f4e133335d9a7d58280a2450e4e54c5ea0acb042736be17bda89b108

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8211.exe

    Filesize

    294KB

    MD5

    ea11ef8324cf8b06aca58545d0f9d9ba

    SHA1

    69abaf275a95dde4643580de33c5dd75cd0c0d6e

    SHA256

    37775b6114fa7132f99f0fe1b815665364728a09256bbea3bfa33994f307be0b

    SHA512

    9b93d39350adcc93bd1938950480d10a09285819f16c1f2150f0e612854c027948b06b2e87d6ea828a4c1fbecac7f20e7d5487b1d6ee8147a6a813919a253dcd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8211.exe

    Filesize

    294KB

    MD5

    ea11ef8324cf8b06aca58545d0f9d9ba

    SHA1

    69abaf275a95dde4643580de33c5dd75cd0c0d6e

    SHA256

    37775b6114fa7132f99f0fe1b815665364728a09256bbea3bfa33994f307be0b

    SHA512

    9b93d39350adcc93bd1938950480d10a09285819f16c1f2150f0e612854c027948b06b2e87d6ea828a4c1fbecac7f20e7d5487b1d6ee8147a6a813919a253dcd

  • memory/4120-137-0x00000000004B0000-0x00000000004DE000-memory.dmp

    Filesize

    184KB

  • memory/4756-1121-0x0000000000620000-0x0000000000652000-memory.dmp

    Filesize

    200KB

  • memory/4756-1122-0x0000000004EA0000-0x0000000004EEB000-memory.dmp

    Filesize

    300KB

  • memory/4756-1123-0x0000000004EF0000-0x0000000004F00000-memory.dmp

    Filesize

    64KB

  • memory/4912-1095-0x0000000005300000-0x000000000534B000-memory.dmp

    Filesize

    300KB

  • memory/4912-1098-0x0000000005490000-0x00000000054F6000-memory.dmp

    Filesize

    408KB

  • memory/4912-1115-0x0000000007820000-0x0000000007D4C000-memory.dmp

    Filesize

    5.2MB

  • memory/4912-1114-0x0000000007650000-0x0000000007812000-memory.dmp

    Filesize

    1.8MB

  • memory/4912-1113-0x0000000007600000-0x0000000007650000-memory.dmp

    Filesize

    320KB

  • memory/4912-151-0x0000000002230000-0x0000000002276000-memory.dmp

    Filesize

    280KB

  • memory/4912-1112-0x00000000044B0000-0x0000000004526000-memory.dmp

    Filesize

    472KB

  • memory/4912-1111-0x0000000002420000-0x0000000002430000-memory.dmp

    Filesize

    64KB

  • memory/4912-1110-0x0000000002420000-0x0000000002430000-memory.dmp

    Filesize

    64KB

  • memory/4912-156-0x0000000004F90000-0x0000000004FD4000-memory.dmp

    Filesize

    272KB

  • memory/4912-1109-0x0000000002420000-0x0000000002430000-memory.dmp

    Filesize

    64KB

  • memory/4912-1108-0x0000000002420000-0x0000000002430000-memory.dmp

    Filesize

    64KB

  • memory/4912-1099-0x0000000006160000-0x00000000061F2000-memory.dmp

    Filesize

    584KB

  • memory/4912-1096-0x0000000002420000-0x0000000002430000-memory.dmp

    Filesize

    64KB

  • memory/4912-1094-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/4912-1093-0x0000000005190000-0x00000000051A2000-memory.dmp

    Filesize

    72KB

  • memory/4912-1092-0x0000000005050000-0x000000000515A000-memory.dmp

    Filesize

    1.0MB

  • memory/4912-1091-0x00000000055E0000-0x0000000005BE6000-memory.dmp

    Filesize

    6.0MB

  • memory/4912-216-0x0000000004F90000-0x0000000004FCF000-memory.dmp

    Filesize

    252KB

  • memory/4912-214-0x0000000004F90000-0x0000000004FCF000-memory.dmp

    Filesize

    252KB

  • memory/4912-212-0x0000000004F90000-0x0000000004FCF000-memory.dmp

    Filesize

    252KB

  • memory/4912-210-0x0000000004F90000-0x0000000004FCF000-memory.dmp

    Filesize

    252KB

  • memory/4912-181-0x0000000004F90000-0x0000000004FCF000-memory.dmp

    Filesize

    252KB

  • memory/4912-182-0x0000000004F90000-0x0000000004FCF000-memory.dmp

    Filesize

    252KB

  • memory/4912-184-0x0000000004F90000-0x0000000004FCF000-memory.dmp

    Filesize

    252KB

  • memory/4912-186-0x0000000004F90000-0x0000000004FCF000-memory.dmp

    Filesize

    252KB

  • memory/4912-188-0x0000000004F90000-0x0000000004FCF000-memory.dmp

    Filesize

    252KB

  • memory/4912-190-0x0000000004F90000-0x0000000004FCF000-memory.dmp

    Filesize

    252KB

  • memory/4912-192-0x0000000004F90000-0x0000000004FCF000-memory.dmp

    Filesize

    252KB

  • memory/4912-194-0x0000000004F90000-0x0000000004FCF000-memory.dmp

    Filesize

    252KB

  • memory/4912-195-0x00000000004C0000-0x000000000050B000-memory.dmp

    Filesize

    300KB

  • memory/4912-197-0x0000000002420000-0x0000000002430000-memory.dmp

    Filesize

    64KB

  • memory/4912-198-0x0000000004F90000-0x0000000004FCF000-memory.dmp

    Filesize

    252KB

  • memory/4912-199-0x0000000002420000-0x0000000002430000-memory.dmp

    Filesize

    64KB

  • memory/4912-202-0x0000000002420000-0x0000000002430000-memory.dmp

    Filesize

    64KB

  • memory/4912-201-0x0000000004F90000-0x0000000004FCF000-memory.dmp

    Filesize

    252KB

  • memory/4912-204-0x0000000004F90000-0x0000000004FCF000-memory.dmp

    Filesize

    252KB

  • memory/4912-206-0x0000000004F90000-0x0000000004FCF000-memory.dmp

    Filesize

    252KB

  • memory/4912-208-0x0000000004F90000-0x0000000004FCF000-memory.dmp

    Filesize

    252KB

  • memory/5108-1103-0x0000000004A70000-0x0000000004A80000-memory.dmp

    Filesize

    64KB

  • memory/5108-170-0x00000000024B0000-0x00000000024C2000-memory.dmp

    Filesize

    72KB

  • memory/5108-180-0x00000000024B0000-0x00000000024C2000-memory.dmp

    Filesize

    72KB

  • memory/5108-174-0x00000000024B0000-0x00000000024C2000-memory.dmp

    Filesize

    72KB

  • memory/5108-1107-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/5108-172-0x00000000024B0000-0x00000000024C2000-memory.dmp

    Filesize

    72KB

  • memory/5108-168-0x00000000024B0000-0x00000000024C2000-memory.dmp

    Filesize

    72KB

  • memory/5108-166-0x00000000024B0000-0x00000000024C2000-memory.dmp

    Filesize

    72KB

  • memory/5108-145-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/5108-164-0x00000000024B0000-0x00000000024C2000-memory.dmp

    Filesize

    72KB

  • memory/5108-148-0x00000000024B0000-0x00000000024C8000-memory.dmp

    Filesize

    96KB

  • memory/5108-160-0x00000000024B0000-0x00000000024C2000-memory.dmp

    Filesize

    72KB

  • memory/5108-1101-0x0000000004A70000-0x0000000004A80000-memory.dmp

    Filesize

    64KB

  • memory/5108-1102-0x0000000004A70000-0x0000000004A80000-memory.dmp

    Filesize

    64KB

  • memory/5108-176-0x00000000024B0000-0x00000000024C2000-memory.dmp

    Filesize

    72KB

  • memory/5108-178-0x00000000024B0000-0x00000000024C2000-memory.dmp

    Filesize

    72KB

  • memory/5108-162-0x00000000024B0000-0x00000000024C2000-memory.dmp

    Filesize

    72KB

  • memory/5108-158-0x00000000024B0000-0x00000000024C2000-memory.dmp

    Filesize

    72KB

  • memory/5108-155-0x00000000024B0000-0x00000000024C2000-memory.dmp

    Filesize

    72KB

  • memory/5108-153-0x00000000024B0000-0x00000000024C2000-memory.dmp

    Filesize

    72KB

  • memory/5108-152-0x00000000024B0000-0x00000000024C2000-memory.dmp

    Filesize

    72KB

  • memory/5108-150-0x0000000004A70000-0x0000000004A80000-memory.dmp

    Filesize

    64KB

  • memory/5108-149-0x0000000004A70000-0x0000000004A80000-memory.dmp

    Filesize

    64KB

  • memory/5108-147-0x0000000004A70000-0x0000000004A80000-memory.dmp

    Filesize

    64KB

  • memory/5108-146-0x0000000004A80000-0x0000000004F7E000-memory.dmp

    Filesize

    5.0MB

  • memory/5108-144-0x0000000000540000-0x000000000055A000-memory.dmp

    Filesize

    104KB

  • memory/5108-138-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/5108-136-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/5108-134-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB