Analysis

  • max time kernel
    71s
  • max time network
    144s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-04-2023 18:43

General

  • Target

    ec693ebfc84501bb5e2478dde9c8d04089bbac28c2e5aebb3addd2dea44639eb.exe

  • Size

    521KB

  • MD5

    4a88fd0cbf518859cc3d10db425b342d

  • SHA1

    6581770b039f316b5851695f2b166b3a67dd533d

  • SHA256

    ec693ebfc84501bb5e2478dde9c8d04089bbac28c2e5aebb3addd2dea44639eb

  • SHA512

    a0b3e260a9d89687572e64dbf98963eb098c0eff7e2e53d8c59365f845e9fc92bde39bb86bc06d4f39a269e71e716fb18f5e4040e9c6f9ec7cb1e1157a745db4

  • SSDEEP

    12288:/Mrvy902zWCnADxSvP6iezoxmyZYITHGB2UM2Tcd:QyLWAXvPKzZybT02UM

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec693ebfc84501bb5e2478dde9c8d04089bbac28c2e5aebb3addd2dea44639eb.exe
    "C:\Users\Admin\AppData\Local\Temp\ec693ebfc84501bb5e2478dde9c8d04089bbac28c2e5aebb3addd2dea44639eb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3640
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJj1617.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJj1617.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4180
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr759281.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr759281.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3916
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku680035.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku680035.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4900
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr970089.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr970089.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1380

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr970089.exe
    Filesize

    175KB

    MD5

    e09d77ae676b6a47e957f0c24cd11730

    SHA1

    43f72c52a13242f064b721c5f778159efb32a3b0

    SHA256

    a25b44e1fadc8bc776afec4b63b296ca9b39dc9c38c796d3b654848e517c8ca4

    SHA512

    31c220fc6eabe5a577def025ab509039251e0fb86d63b6349758fb99d95b1e1ebca4a5d1bf49696282e9e3fac3d16e2c32108453813dad3172fa5ceb36773b1a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr970089.exe
    Filesize

    175KB

    MD5

    e09d77ae676b6a47e957f0c24cd11730

    SHA1

    43f72c52a13242f064b721c5f778159efb32a3b0

    SHA256

    a25b44e1fadc8bc776afec4b63b296ca9b39dc9c38c796d3b654848e517c8ca4

    SHA512

    31c220fc6eabe5a577def025ab509039251e0fb86d63b6349758fb99d95b1e1ebca4a5d1bf49696282e9e3fac3d16e2c32108453813dad3172fa5ceb36773b1a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJj1617.exe
    Filesize

    379KB

    MD5

    90b609c9594d0e03d51237c1d8e3eb05

    SHA1

    05f7b31028394b503ea77e12f9f9cfcac0366863

    SHA256

    9626267afb98f0687a0a9e58de8ffc2334895c1b5759c7e23612979148841d9f

    SHA512

    ec180f30520e13bcc517a92576a9edcf10e5b83d0efbb37abbc1f5ad12f5b1b7f1333795dcf097b5d75195c8b6cf75015ed5b5be8644a4c6f0be815052ff0912

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJj1617.exe
    Filesize

    379KB

    MD5

    90b609c9594d0e03d51237c1d8e3eb05

    SHA1

    05f7b31028394b503ea77e12f9f9cfcac0366863

    SHA256

    9626267afb98f0687a0a9e58de8ffc2334895c1b5759c7e23612979148841d9f

    SHA512

    ec180f30520e13bcc517a92576a9edcf10e5b83d0efbb37abbc1f5ad12f5b1b7f1333795dcf097b5d75195c8b6cf75015ed5b5be8644a4c6f0be815052ff0912

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr759281.exe
    Filesize

    11KB

    MD5

    fcba57eb912a7429130882cf3940ccfb

    SHA1

    0af826f6a222e0033524f0dab2b1c60d53779def

    SHA256

    fbcd91c7e4806d9d688704776587472211b8a4ed797a19635ea396346ed8307b

    SHA512

    81103e327c575d6373b45e68b48aaa24d3ddab2d736e484a75f54f7a594b9fb8b574f2a47e1ac553c8f0f3d8d608118406d6dc41aa20e8817b94e969dae8e4a6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr759281.exe
    Filesize

    11KB

    MD5

    fcba57eb912a7429130882cf3940ccfb

    SHA1

    0af826f6a222e0033524f0dab2b1c60d53779def

    SHA256

    fbcd91c7e4806d9d688704776587472211b8a4ed797a19635ea396346ed8307b

    SHA512

    81103e327c575d6373b45e68b48aaa24d3ddab2d736e484a75f54f7a594b9fb8b574f2a47e1ac553c8f0f3d8d608118406d6dc41aa20e8817b94e969dae8e4a6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku680035.exe
    Filesize

    294KB

    MD5

    10af2267e442db4274f5e4b473409191

    SHA1

    d2e784b3fa76c8029436fb6bde31188c9ecaa836

    SHA256

    1a25e83fed6414bbbd8781160dcc926d50134a5e016eca673b8d14ec4e5f6240

    SHA512

    9930d367280fcbc6767ec73515313527a4d7bbf9a998d601b71368399e4ec17a8446bbe9071e56505686d24525c45688ed04467df72e7b10e346eb742032efc2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku680035.exe
    Filesize

    294KB

    MD5

    10af2267e442db4274f5e4b473409191

    SHA1

    d2e784b3fa76c8029436fb6bde31188c9ecaa836

    SHA256

    1a25e83fed6414bbbd8781160dcc926d50134a5e016eca673b8d14ec4e5f6240

    SHA512

    9930d367280fcbc6767ec73515313527a4d7bbf9a998d601b71368399e4ec17a8446bbe9071e56505686d24525c45688ed04467df72e7b10e346eb742032efc2

  • memory/1380-1074-0x0000000000110000-0x0000000000142000-memory.dmp
    Filesize

    200KB

  • memory/1380-1076-0x00000000049D0000-0x00000000049E0000-memory.dmp
    Filesize

    64KB

  • memory/1380-1077-0x00000000049D0000-0x00000000049E0000-memory.dmp
    Filesize

    64KB

  • memory/1380-1075-0x0000000004B50000-0x0000000004B9B000-memory.dmp
    Filesize

    300KB

  • memory/3916-133-0x0000000000BE0000-0x0000000000BEA000-memory.dmp
    Filesize

    40KB

  • memory/4900-177-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-189-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-144-0x0000000004AA0000-0x0000000004AB0000-memory.dmp
    Filesize

    64KB

  • memory/4900-143-0x0000000004AA0000-0x0000000004AB0000-memory.dmp
    Filesize

    64KB

  • memory/4900-145-0x0000000004FB0000-0x0000000004FF4000-memory.dmp
    Filesize

    272KB

  • memory/4900-146-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-147-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-149-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-151-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-153-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-155-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-157-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-159-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-161-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-163-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-165-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-167-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-169-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-171-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-173-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-175-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-140-0x0000000000590000-0x00000000005DB000-memory.dmp
    Filesize

    300KB

  • memory/4900-179-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-181-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-183-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-185-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-187-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-142-0x0000000004AA0000-0x0000000004AB0000-memory.dmp
    Filesize

    64KB

  • memory/4900-191-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-193-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-195-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-197-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-199-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-201-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-203-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-205-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-207-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-209-0x0000000004FB0000-0x0000000004FEF000-memory.dmp
    Filesize

    252KB

  • memory/4900-1052-0x0000000005600000-0x0000000005C06000-memory.dmp
    Filesize

    6.0MB

  • memory/4900-1053-0x0000000005050000-0x000000000515A000-memory.dmp
    Filesize

    1.0MB

  • memory/4900-1054-0x0000000005190000-0x00000000051A2000-memory.dmp
    Filesize

    72KB

  • memory/4900-1055-0x0000000004AA0000-0x0000000004AB0000-memory.dmp
    Filesize

    64KB

  • memory/4900-1056-0x00000000051B0000-0x00000000051EE000-memory.dmp
    Filesize

    248KB

  • memory/4900-1057-0x0000000005300000-0x000000000534B000-memory.dmp
    Filesize

    300KB

  • memory/4900-1059-0x0000000005490000-0x00000000054F6000-memory.dmp
    Filesize

    408KB

  • memory/4900-1060-0x0000000006160000-0x00000000061F2000-memory.dmp
    Filesize

    584KB

  • memory/4900-1061-0x0000000004AA0000-0x0000000004AB0000-memory.dmp
    Filesize

    64KB

  • memory/4900-1062-0x0000000004AA0000-0x0000000004AB0000-memory.dmp
    Filesize

    64KB

  • memory/4900-1063-0x0000000004AA0000-0x0000000004AB0000-memory.dmp
    Filesize

    64KB

  • memory/4900-1064-0x0000000004AA0000-0x0000000004AB0000-memory.dmp
    Filesize

    64KB

  • memory/4900-141-0x0000000004AB0000-0x0000000004FAE000-memory.dmp
    Filesize

    5.0MB

  • memory/4900-139-0x00000000023D0000-0x0000000002416000-memory.dmp
    Filesize

    280KB

  • memory/4900-1065-0x0000000006390000-0x0000000006552000-memory.dmp
    Filesize

    1.8MB

  • memory/4900-1066-0x0000000006570000-0x0000000006A9C000-memory.dmp
    Filesize

    5.2MB

  • memory/4900-1067-0x0000000004570000-0x00000000045E6000-memory.dmp
    Filesize

    472KB

  • memory/4900-1068-0x0000000007FA0000-0x0000000007FF0000-memory.dmp
    Filesize

    320KB