Analysis

  • max time kernel
    93s
  • max time network
    96s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-04-2023 18:52

General

  • Target

    5ba82fe1bb136c168efd1ead7db912c57dc2008c42c0c01c46d75b5600084f7f.exe

  • Size

    521KB

  • MD5

    1977bb6592b7c48dbaf104b2e8f4812f

  • SHA1

    3cdfee1e9054294803eeadef2c2d4eca5763e558

  • SHA256

    5ba82fe1bb136c168efd1ead7db912c57dc2008c42c0c01c46d75b5600084f7f

  • SHA512

    36c3eca51200ff3709bb85c35de9f6a8b5803983beb2571a28c16790ccd560c7203ce2ead8059a1019fe7524a5a67c7a28f20b3a805d3cc619540fbc97f156b8

  • SSDEEP

    12288:tMrLy90A+RW0rVBhX2fHHn8BPompYfmIyb4:+yirbZucBPowQ

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ba82fe1bb136c168efd1ead7db912c57dc2008c42c0c01c46d75b5600084f7f.exe
    "C:\Users\Admin\AppData\Local\Temp\5ba82fe1bb136c168efd1ead7db912c57dc2008c42c0c01c46d75b5600084f7f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:708
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziBB1531.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziBB1531.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1168
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr695552.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr695552.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4972
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku956009.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku956009.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1588
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr557699.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr557699.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1076

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr557699.exe

    Filesize

    175KB

    MD5

    585250fbd34b21e84c46b2de0f43dded

    SHA1

    8f2e17ade0bc19690d66290df9c261dbaddc5224

    SHA256

    f07451b2edb347203b6f247369cd3575db750be968bd113011bb94e08cf82541

    SHA512

    b8465d478c85359815b86cebf0f4f6d191c9b956a09aef497daba34b9bec54cc26d8b495ed6c235c16d0dde57361fde301e9a877dbe77b1beaa446394c27dd48

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr557699.exe

    Filesize

    175KB

    MD5

    585250fbd34b21e84c46b2de0f43dded

    SHA1

    8f2e17ade0bc19690d66290df9c261dbaddc5224

    SHA256

    f07451b2edb347203b6f247369cd3575db750be968bd113011bb94e08cf82541

    SHA512

    b8465d478c85359815b86cebf0f4f6d191c9b956a09aef497daba34b9bec54cc26d8b495ed6c235c16d0dde57361fde301e9a877dbe77b1beaa446394c27dd48

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziBB1531.exe

    Filesize

    379KB

    MD5

    8e39c53fa9f63915e0ca731e4788e47d

    SHA1

    67dac1509d14b48e3583f671e98dbc9213f6432f

    SHA256

    30232078751e20de173d75bea4f83137db2d0dbeea54297260bd38d750682b21

    SHA512

    a5d4fc40bbfd8357a544ff87906f9dea4b14d035b7347675c7efc63615fba96e0da27789208c007a6fa00e53a8a1692f5c21f8eaf46e36dd5171cfe8e4903171

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziBB1531.exe

    Filesize

    379KB

    MD5

    8e39c53fa9f63915e0ca731e4788e47d

    SHA1

    67dac1509d14b48e3583f671e98dbc9213f6432f

    SHA256

    30232078751e20de173d75bea4f83137db2d0dbeea54297260bd38d750682b21

    SHA512

    a5d4fc40bbfd8357a544ff87906f9dea4b14d035b7347675c7efc63615fba96e0da27789208c007a6fa00e53a8a1692f5c21f8eaf46e36dd5171cfe8e4903171

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr695552.exe

    Filesize

    11KB

    MD5

    11a1ba6e28be263b50495e9a47f16a19

    SHA1

    850f8ef1d5f2f175139d2695527b2a5df884dc22

    SHA256

    a54c0739c864ce9abf353c292826393288656323ee726abf1e5ac365970f1039

    SHA512

    ad70264fb2b4b20b6c46a8994ad6dd263c10d5be0e615abdc50fa65a144c8707a1e461933ed895b02b342aecb6395a16fa5ea714a760333573b8d19dc6c54e3d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr695552.exe

    Filesize

    11KB

    MD5

    11a1ba6e28be263b50495e9a47f16a19

    SHA1

    850f8ef1d5f2f175139d2695527b2a5df884dc22

    SHA256

    a54c0739c864ce9abf353c292826393288656323ee726abf1e5ac365970f1039

    SHA512

    ad70264fb2b4b20b6c46a8994ad6dd263c10d5be0e615abdc50fa65a144c8707a1e461933ed895b02b342aecb6395a16fa5ea714a760333573b8d19dc6c54e3d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku956009.exe

    Filesize

    294KB

    MD5

    a7fbd9625f9141a21737c4ad241ffa55

    SHA1

    06293c158b3982a85a6a98bc8250e723bf04c785

    SHA256

    a94850263c9725faa14f8ecf610435aed013085a3ddacfd4dfb0c4c3a71040ad

    SHA512

    59541bf6703a37f605664f52ef5d207cd7d5dbca2fd6a1457a4f394588389f7468a7bade4e9fcb32cf71eb187db3b4c04b7bd50ca4f29b666287168acfb6f10b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku956009.exe

    Filesize

    294KB

    MD5

    a7fbd9625f9141a21737c4ad241ffa55

    SHA1

    06293c158b3982a85a6a98bc8250e723bf04c785

    SHA256

    a94850263c9725faa14f8ecf610435aed013085a3ddacfd4dfb0c4c3a71040ad

    SHA512

    59541bf6703a37f605664f52ef5d207cd7d5dbca2fd6a1457a4f394588389f7468a7bade4e9fcb32cf71eb187db3b4c04b7bd50ca4f29b666287168acfb6f10b

  • memory/1076-1076-0x0000000000AE0000-0x0000000000B12000-memory.dmp

    Filesize

    200KB

  • memory/1076-1077-0x0000000005520000-0x000000000556B000-memory.dmp

    Filesize

    300KB

  • memory/1076-1078-0x00000000056B0000-0x00000000056C0000-memory.dmp

    Filesize

    64KB

  • memory/1588-181-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-193-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-145-0x0000000004C20000-0x0000000004C30000-memory.dmp

    Filesize

    64KB

  • memory/1588-143-0x0000000004C20000-0x0000000004C30000-memory.dmp

    Filesize

    64KB

  • memory/1588-147-0x00000000023D0000-0x0000000002414000-memory.dmp

    Filesize

    272KB

  • memory/1588-146-0x0000000004C20000-0x0000000004C30000-memory.dmp

    Filesize

    64KB

  • memory/1588-148-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-149-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-151-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-153-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-155-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-157-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-159-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-161-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-163-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-165-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-167-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-169-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-171-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-173-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-175-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-177-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-179-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-142-0x0000000000590000-0x00000000005DB000-memory.dmp

    Filesize

    300KB

  • memory/1588-183-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-185-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-187-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-189-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-191-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-144-0x0000000004C30000-0x000000000512E000-memory.dmp

    Filesize

    5.0MB

  • memory/1588-195-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-197-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-199-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-201-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-203-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-205-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-207-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-209-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-211-0x00000000023D0000-0x000000000240F000-memory.dmp

    Filesize

    252KB

  • memory/1588-1054-0x0000000005130000-0x0000000005736000-memory.dmp

    Filesize

    6.0MB

  • memory/1588-1055-0x0000000005740000-0x000000000584A000-memory.dmp

    Filesize

    1.0MB

  • memory/1588-1056-0x0000000004B70000-0x0000000004B82000-memory.dmp

    Filesize

    72KB

  • memory/1588-1057-0x0000000004B90000-0x0000000004BCE000-memory.dmp

    Filesize

    248KB

  • memory/1588-1058-0x0000000005950000-0x000000000599B000-memory.dmp

    Filesize

    300KB

  • memory/1588-1059-0x0000000004C20000-0x0000000004C30000-memory.dmp

    Filesize

    64KB

  • memory/1588-1061-0x0000000004C20000-0x0000000004C30000-memory.dmp

    Filesize

    64KB

  • memory/1588-1062-0x0000000004C20000-0x0000000004C30000-memory.dmp

    Filesize

    64KB

  • memory/1588-1063-0x0000000004C20000-0x0000000004C30000-memory.dmp

    Filesize

    64KB

  • memory/1588-1064-0x0000000005AA0000-0x0000000005B32000-memory.dmp

    Filesize

    584KB

  • memory/1588-1065-0x0000000005B40000-0x0000000005BA6000-memory.dmp

    Filesize

    408KB

  • memory/1588-1066-0x0000000006220000-0x0000000006296000-memory.dmp

    Filesize

    472KB

  • memory/1588-141-0x0000000002240000-0x0000000002286000-memory.dmp

    Filesize

    280KB

  • memory/1588-1067-0x00000000062B0000-0x0000000006300000-memory.dmp

    Filesize

    320KB

  • memory/1588-1068-0x0000000006580000-0x0000000006742000-memory.dmp

    Filesize

    1.8MB

  • memory/1588-1069-0x0000000006750000-0x0000000006C7C000-memory.dmp

    Filesize

    5.2MB

  • memory/1588-1070-0x0000000004C20000-0x0000000004C30000-memory.dmp

    Filesize

    64KB

  • memory/4972-135-0x0000000000450000-0x000000000045A000-memory.dmp

    Filesize

    40KB