Analysis

  • max time kernel
    139s
  • max time network
    142s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-04-2023 19:13

General

  • Target

    01e730b597c945f95551d53fe13139aeabccc0b70248866747e1e7212fa0f344.exe

  • Size

    660KB

  • MD5

    147ab28a6555ebe95b37990a25604353

  • SHA1

    a0b141ab49ae9f0947ba6533f1349c3f956a2d84

  • SHA256

    01e730b597c945f95551d53fe13139aeabccc0b70248866747e1e7212fa0f344

  • SHA512

    2f6e99f151e5927164eafedeee590176f297d4060ff174258dcf38887b3e7789a3afca049bd70da16da7543eae94ae1fe43afca013655a92783fd3476fcd7e41

  • SSDEEP

    12288:NMrYy90TiVuzviVSJDl1nWoXHbtP6rwxLTZSKucPJl6mJ:hyazzC2DslKuYsmJ

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\01e730b597c945f95551d53fe13139aeabccc0b70248866747e1e7212fa0f344.exe
    "C:\Users\Admin\AppData\Local\Temp\01e730b597c945f95551d53fe13139aeabccc0b70248866747e1e7212fa0f344.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un726645.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un726645.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2112
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1676.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1676.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:5008
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1676.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1676.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3528
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9288.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9288.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2740
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si772471.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si772471.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4568

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si772471.exe
    Filesize

    175KB

    MD5

    f778d58be40e87599296d78180579ce5

    SHA1

    df7f503c94dbb6bbd69bab8a46defb6fc004f50f

    SHA256

    ee033fba5b4727d3a911fc98cf128539c7b24f3c634ee9e2049cb4017a32b0c4

    SHA512

    ace1a3885adf94490bfaa6f6f4e10b55088e2a4ca74c5c0e213d9cedf3963346dc429b9d9037342c0eb7bfb6313bd01b54cc05589df3ae7ee11c58c13ae57c55

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si772471.exe
    Filesize

    175KB

    MD5

    f778d58be40e87599296d78180579ce5

    SHA1

    df7f503c94dbb6bbd69bab8a46defb6fc004f50f

    SHA256

    ee033fba5b4727d3a911fc98cf128539c7b24f3c634ee9e2049cb4017a32b0c4

    SHA512

    ace1a3885adf94490bfaa6f6f4e10b55088e2a4ca74c5c0e213d9cedf3963346dc429b9d9037342c0eb7bfb6313bd01b54cc05589df3ae7ee11c58c13ae57c55

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un726645.exe
    Filesize

    517KB

    MD5

    ce78c73b645dd3e1b8ee6696eec4a646

    SHA1

    42c8088bee89d99a4717b68aff635b8cb65966ff

    SHA256

    232d6a9024df185b12ebd6a979c3a0525f427e16ac5028e38c8e53e0122db666

    SHA512

    a41dfac057b5e159a0977323a5cbced9ccd54358977da3cf0da738c2cd46f7520641e0c88649ca0f5c9775926a76da2f5ddcda419d75da71292441bac80a641f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un726645.exe
    Filesize

    517KB

    MD5

    ce78c73b645dd3e1b8ee6696eec4a646

    SHA1

    42c8088bee89d99a4717b68aff635b8cb65966ff

    SHA256

    232d6a9024df185b12ebd6a979c3a0525f427e16ac5028e38c8e53e0122db666

    SHA512

    a41dfac057b5e159a0977323a5cbced9ccd54358977da3cf0da738c2cd46f7520641e0c88649ca0f5c9775926a76da2f5ddcda419d75da71292441bac80a641f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1676.exe
    Filesize

    237KB

    MD5

    5fc3ea42379cf1a677dee37bec32ffb8

    SHA1

    fde22e5a795d6108caf903848ec1c5b1e4731876

    SHA256

    1ca29c515798ea1a94adfc8077e938ef94f93882ac3f918cf0ed279e02d811c2

    SHA512

    69f5331af1064a6d4b6c55fe9830b3b3c85542218fb90c76083851d61227d0a07f2bca0b5688f60b5371e31e88181a6f32214dd72746b92020e99457a1ad70bb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1676.exe
    Filesize

    237KB

    MD5

    5fc3ea42379cf1a677dee37bec32ffb8

    SHA1

    fde22e5a795d6108caf903848ec1c5b1e4731876

    SHA256

    1ca29c515798ea1a94adfc8077e938ef94f93882ac3f918cf0ed279e02d811c2

    SHA512

    69f5331af1064a6d4b6c55fe9830b3b3c85542218fb90c76083851d61227d0a07f2bca0b5688f60b5371e31e88181a6f32214dd72746b92020e99457a1ad70bb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1676.exe
    Filesize

    237KB

    MD5

    5fc3ea42379cf1a677dee37bec32ffb8

    SHA1

    fde22e5a795d6108caf903848ec1c5b1e4731876

    SHA256

    1ca29c515798ea1a94adfc8077e938ef94f93882ac3f918cf0ed279e02d811c2

    SHA512

    69f5331af1064a6d4b6c55fe9830b3b3c85542218fb90c76083851d61227d0a07f2bca0b5688f60b5371e31e88181a6f32214dd72746b92020e99457a1ad70bb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9288.exe
    Filesize

    294KB

    MD5

    02a892d16119f07471f435ba8c9c1e96

    SHA1

    5100f106e8fc6e3c159ecede1724116c896f73b4

    SHA256

    5c83588a617cb2814e7c48f68163d9faf4a50eca146a797c175095142d176cbf

    SHA512

    ce3d2df3f4e4f2daab4ee8586eed1c9e4f63862d1d52b0a16e4c165ad04fc20461cf7f319948b0073d7f7b6846c71e271bbd658947c9d279847dd8392e19084c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9288.exe
    Filesize

    294KB

    MD5

    02a892d16119f07471f435ba8c9c1e96

    SHA1

    5100f106e8fc6e3c159ecede1724116c896f73b4

    SHA256

    5c83588a617cb2814e7c48f68163d9faf4a50eca146a797c175095142d176cbf

    SHA512

    ce3d2df3f4e4f2daab4ee8586eed1c9e4f63862d1d52b0a16e4c165ad04fc20461cf7f319948b0073d7f7b6846c71e271bbd658947c9d279847dd8392e19084c

  • memory/2740-162-0x0000000002640000-0x000000000267F000-memory.dmp
    Filesize

    252KB

  • memory/2740-165-0x0000000002640000-0x000000000267F000-memory.dmp
    Filesize

    252KB

  • memory/2740-1113-0x0000000004BF0000-0x0000000004C00000-memory.dmp
    Filesize

    64KB

  • memory/2740-1112-0x0000000006560000-0x0000000006A8C000-memory.dmp
    Filesize

    5.2MB

  • memory/2740-1111-0x0000000006390000-0x0000000006552000-memory.dmp
    Filesize

    1.8MB

  • memory/2740-1106-0x0000000004BF0000-0x0000000004C00000-memory.dmp
    Filesize

    64KB

  • memory/2740-149-0x0000000000900000-0x0000000000946000-memory.dmp
    Filesize

    280KB

  • memory/2740-1105-0x0000000005670000-0x00000000056D6000-memory.dmp
    Filesize

    408KB

  • memory/2740-152-0x0000000002640000-0x0000000002684000-memory.dmp
    Filesize

    272KB

  • memory/2740-1115-0x0000000006D40000-0x0000000006D90000-memory.dmp
    Filesize

    320KB

  • memory/2740-1104-0x00000000055D0000-0x0000000005662000-memory.dmp
    Filesize

    584KB

  • memory/2740-155-0x00000000004C0000-0x000000000050B000-memory.dmp
    Filesize

    300KB

  • memory/2740-156-0x0000000004BF0000-0x0000000004C00000-memory.dmp
    Filesize

    64KB

  • memory/2740-202-0x0000000002640000-0x000000000267F000-memory.dmp
    Filesize

    252KB

  • memory/2740-1103-0x0000000004BF0000-0x0000000004C00000-memory.dmp
    Filesize

    64KB

  • memory/2740-160-0x0000000002640000-0x000000000267F000-memory.dmp
    Filesize

    252KB

  • memory/2740-1102-0x0000000004BF0000-0x0000000004C00000-memory.dmp
    Filesize

    64KB

  • memory/2740-158-0x0000000004BF0000-0x0000000004C00000-memory.dmp
    Filesize

    64KB

  • memory/2740-1097-0x0000000005450000-0x000000000549B000-memory.dmp
    Filesize

    300KB

  • memory/2740-1114-0x0000000006CC0000-0x0000000006D36000-memory.dmp
    Filesize

    472KB

  • memory/2740-169-0x0000000002640000-0x000000000267F000-memory.dmp
    Filesize

    252KB

  • memory/2740-1096-0x0000000005310000-0x000000000534E000-memory.dmp
    Filesize

    248KB

  • memory/2740-1095-0x0000000004BB0000-0x0000000004BC2000-memory.dmp
    Filesize

    72KB

  • memory/2740-172-0x0000000002640000-0x000000000267F000-memory.dmp
    Filesize

    252KB

  • memory/2740-177-0x0000000002640000-0x000000000267F000-memory.dmp
    Filesize

    252KB

  • memory/2740-1094-0x0000000005200000-0x000000000530A000-memory.dmp
    Filesize

    1.0MB

  • memory/2740-181-0x0000000002640000-0x000000000267F000-memory.dmp
    Filesize

    252KB

  • memory/2740-1093-0x0000000005810000-0x0000000005E16000-memory.dmp
    Filesize

    6.0MB

  • memory/2740-185-0x0000000002640000-0x000000000267F000-memory.dmp
    Filesize

    252KB

  • memory/2740-218-0x0000000002640000-0x000000000267F000-memory.dmp
    Filesize

    252KB

  • memory/2740-216-0x0000000002640000-0x000000000267F000-memory.dmp
    Filesize

    252KB

  • memory/2740-189-0x0000000002640000-0x000000000267F000-memory.dmp
    Filesize

    252KB

  • memory/2740-214-0x0000000002640000-0x000000000267F000-memory.dmp
    Filesize

    252KB

  • memory/2740-193-0x0000000002640000-0x000000000267F000-memory.dmp
    Filesize

    252KB

  • memory/2740-211-0x0000000002640000-0x000000000267F000-memory.dmp
    Filesize

    252KB

  • memory/2740-197-0x0000000002640000-0x000000000267F000-memory.dmp
    Filesize

    252KB

  • memory/2740-205-0x0000000004BF0000-0x0000000004C00000-memory.dmp
    Filesize

    64KB

  • memory/2740-206-0x0000000002640000-0x000000000267F000-memory.dmp
    Filesize

    252KB

  • memory/3528-154-0x0000000004970000-0x0000000004980000-memory.dmp
    Filesize

    64KB

  • memory/3528-1100-0x0000000004970000-0x0000000004980000-memory.dmp
    Filesize

    64KB

  • memory/3528-199-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/3528-209-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/3528-196-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/3528-192-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/3528-188-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/3528-212-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/3528-184-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/3528-180-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/3528-176-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/3528-173-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/3528-168-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/3528-157-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/3528-1101-0x0000000004970000-0x0000000004980000-memory.dmp
    Filesize

    64KB

  • memory/3528-203-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/3528-159-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/3528-164-0x0000000004900000-0x0000000004912000-memory.dmp
    Filesize

    72KB

  • memory/3528-151-0x0000000004970000-0x0000000004980000-memory.dmp
    Filesize

    64KB

  • memory/3528-153-0x0000000004970000-0x0000000004980000-memory.dmp
    Filesize

    64KB

  • memory/3528-150-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/3528-1110-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/3528-148-0x0000000004900000-0x0000000004918000-memory.dmp
    Filesize

    96KB

  • memory/3528-147-0x0000000004980000-0x0000000004E7E000-memory.dmp
    Filesize

    5.0MB

  • memory/3528-146-0x0000000004860000-0x000000000487A000-memory.dmp
    Filesize

    104KB

  • memory/3528-141-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/3528-139-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/3528-136-0x0000000000400000-0x0000000000430000-memory.dmp
    Filesize

    192KB

  • memory/4568-1121-0x0000000000950000-0x0000000000982000-memory.dmp
    Filesize

    200KB

  • memory/4568-1122-0x0000000005390000-0x00000000053DB000-memory.dmp
    Filesize

    300KB

  • memory/4568-1123-0x00000000054A0000-0x00000000054B0000-memory.dmp
    Filesize

    64KB

  • memory/5008-137-0x00000000001D0000-0x00000000001FE000-memory.dmp
    Filesize

    184KB