Analysis

  • max time kernel
    53s
  • max time network
    66s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-04-2023 19:17

General

  • Target

    659ed428114d2a8cf1b492c95a46b371b1531c5acc0257cec4acc0b7aa1a671a.exe

  • Size

    659KB

  • MD5

    f9428e751724949d58f4c9dccdce9ebe

  • SHA1

    0d842817e8fd753b9f3d62735a0658ad0753be93

  • SHA256

    659ed428114d2a8cf1b492c95a46b371b1531c5acc0257cec4acc0b7aa1a671a

  • SHA512

    2b1b2a54ec50a0f6104c7729335168efddcf17fffbf208a54627b379454311829a1194c26bc96b039520bc43983d255b483a90bf4b8f4fee6f34d5f359fb4ab3

  • SSDEEP

    12288:DMrEy90KoYKcwaq5evC4IRUwP48BcaZS2tzEpW6VR7xO:Xy6Ym5evtIRnP48Bi2tmZVy

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\659ed428114d2a8cf1b492c95a46b371b1531c5acc0257cec4acc0b7aa1a671a.exe
    "C:\Users\Admin\AppData\Local\Temp\659ed428114d2a8cf1b492c95a46b371b1531c5acc0257cec4acc0b7aa1a671a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un221871.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un221871.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2544
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4485.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4485.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2604
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4485.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4485.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:376
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4678.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4678.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4264
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si686719.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si686719.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2332

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si686719.exe

    Filesize

    175KB

    MD5

    e9118a190b61b8b7ca462a9972f96e73

    SHA1

    ef6000c98c2c7e30861af8fe4f19603ff784fbc5

    SHA256

    af5048f827cb6b3f65fba20a86b3823446950390c99b72a1a8e925522f1a7346

    SHA512

    e89fbbcb0c82d9feb30a6bf372821fc1f8b2564dce7258257f37b2479040b40b609ed5ecd498e179e633e58ba04d3cf9d8ce115b6ac97f1a57822990f44afb72

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si686719.exe

    Filesize

    175KB

    MD5

    e9118a190b61b8b7ca462a9972f96e73

    SHA1

    ef6000c98c2c7e30861af8fe4f19603ff784fbc5

    SHA256

    af5048f827cb6b3f65fba20a86b3823446950390c99b72a1a8e925522f1a7346

    SHA512

    e89fbbcb0c82d9feb30a6bf372821fc1f8b2564dce7258257f37b2479040b40b609ed5ecd498e179e633e58ba04d3cf9d8ce115b6ac97f1a57822990f44afb72

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un221871.exe

    Filesize

    517KB

    MD5

    fa595d02a1e12f6f29917f91827478f0

    SHA1

    2235843fec1799a7274bd8f361cf1fbb300a4307

    SHA256

    829f24d7351a56ef7eba4bfb13c9ec6fc1775b4ed17ba70422ec0e420dcd5059

    SHA512

    dc44dcc2a6db23feb6c4bdaf269fd9bf3660277205ac960751237f67fc0122ccec53db3643a90c827ec049c6093390def8f1b2b98977f13de219b60adba6a057

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un221871.exe

    Filesize

    517KB

    MD5

    fa595d02a1e12f6f29917f91827478f0

    SHA1

    2235843fec1799a7274bd8f361cf1fbb300a4307

    SHA256

    829f24d7351a56ef7eba4bfb13c9ec6fc1775b4ed17ba70422ec0e420dcd5059

    SHA512

    dc44dcc2a6db23feb6c4bdaf269fd9bf3660277205ac960751237f67fc0122ccec53db3643a90c827ec049c6093390def8f1b2b98977f13de219b60adba6a057

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4485.exe

    Filesize

    237KB

    MD5

    f1cedcd8d84a9fb0b2859dbbb92c9f70

    SHA1

    c31cd91c1fdf62ae91f73c57c6f13ae14cadda93

    SHA256

    9bf9655346b3984e1f5c859c39776318f43d6d21fc38ffae64c6bc732ccca3ec

    SHA512

    5926987beb0be1e8e194ff629aa9576c0f971aa8ed41e78dc715c19d9b2c66e742d815ac66a4c3f7db7c325dc047b2b342e690f3da95187380ff0d3df88f1b5a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4485.exe

    Filesize

    237KB

    MD5

    f1cedcd8d84a9fb0b2859dbbb92c9f70

    SHA1

    c31cd91c1fdf62ae91f73c57c6f13ae14cadda93

    SHA256

    9bf9655346b3984e1f5c859c39776318f43d6d21fc38ffae64c6bc732ccca3ec

    SHA512

    5926987beb0be1e8e194ff629aa9576c0f971aa8ed41e78dc715c19d9b2c66e742d815ac66a4c3f7db7c325dc047b2b342e690f3da95187380ff0d3df88f1b5a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4485.exe

    Filesize

    237KB

    MD5

    f1cedcd8d84a9fb0b2859dbbb92c9f70

    SHA1

    c31cd91c1fdf62ae91f73c57c6f13ae14cadda93

    SHA256

    9bf9655346b3984e1f5c859c39776318f43d6d21fc38ffae64c6bc732ccca3ec

    SHA512

    5926987beb0be1e8e194ff629aa9576c0f971aa8ed41e78dc715c19d9b2c66e742d815ac66a4c3f7db7c325dc047b2b342e690f3da95187380ff0d3df88f1b5a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4678.exe

    Filesize

    294KB

    MD5

    881e2f431c396967071e295bb7e71ddb

    SHA1

    d1fa9aaf59b94cd5d94e0bf09095534fca820410

    SHA256

    2ab6793794f87e49409a65fa75ad3d3c935be3223a5c641aff7ef643dfdb650d

    SHA512

    62eaf38b38516ca818518bea1136b387c643d566b9f60bc1f4a8e1ad6e833be2f91c906b661db6cc1ebf7e371da058208074c2fa3f1c1f410de17d29b528afae

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4678.exe

    Filesize

    294KB

    MD5

    881e2f431c396967071e295bb7e71ddb

    SHA1

    d1fa9aaf59b94cd5d94e0bf09095534fca820410

    SHA256

    2ab6793794f87e49409a65fa75ad3d3c935be3223a5c641aff7ef643dfdb650d

    SHA512

    62eaf38b38516ca818518bea1136b387c643d566b9f60bc1f4a8e1ad6e833be2f91c906b661db6cc1ebf7e371da058208074c2fa3f1c1f410de17d29b528afae

  • memory/376-1112-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/376-165-0x0000000002350000-0x0000000002360000-memory.dmp

    Filesize

    64KB

  • memory/376-146-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/376-147-0x0000000002310000-0x000000000232A000-memory.dmp

    Filesize

    104KB

  • memory/376-148-0x0000000004AB0000-0x0000000004FAE000-memory.dmp

    Filesize

    5.0MB

  • memory/376-149-0x00000000023B0000-0x00000000023C8000-memory.dmp

    Filesize

    96KB

  • memory/376-201-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/376-151-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/376-152-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/376-140-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/376-155-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/376-197-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/376-157-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/376-136-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/376-162-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/376-207-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/376-167-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/376-189-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/376-139-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/376-168-0x0000000002350000-0x0000000002360000-memory.dmp

    Filesize

    64KB

  • memory/376-171-0x0000000002350000-0x0000000002360000-memory.dmp

    Filesize

    64KB

  • memory/376-193-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/376-1104-0x0000000002350000-0x0000000002360000-memory.dmp

    Filesize

    64KB

  • memory/376-1105-0x0000000002350000-0x0000000002360000-memory.dmp

    Filesize

    64KB

  • memory/376-173-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/376-179-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/376-1103-0x0000000002350000-0x0000000002360000-memory.dmp

    Filesize

    64KB

  • memory/376-210-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/376-185-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/2332-1125-0x0000000004AE0000-0x0000000004B2B000-memory.dmp

    Filesize

    300KB

  • memory/2332-1123-0x0000000000260000-0x0000000000292000-memory.dmp

    Filesize

    200KB

  • memory/2332-1124-0x0000000004B30000-0x0000000004B40000-memory.dmp

    Filesize

    64KB

  • memory/2332-1126-0x0000000004B30000-0x0000000004B40000-memory.dmp

    Filesize

    64KB

  • memory/2604-138-0x00000000001D0000-0x00000000001FE000-memory.dmp

    Filesize

    184KB

  • memory/4264-190-0x0000000004FE0000-0x000000000501F000-memory.dmp

    Filesize

    252KB

  • memory/4264-198-0x0000000004FE0000-0x000000000501F000-memory.dmp

    Filesize

    252KB

  • memory/4264-202-0x0000000004FE0000-0x000000000501F000-memory.dmp

    Filesize

    252KB

  • memory/4264-194-0x0000000004FE0000-0x000000000501F000-memory.dmp

    Filesize

    252KB

  • memory/4264-183-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

    Filesize

    64KB

  • memory/4264-205-0x0000000004FE0000-0x000000000501F000-memory.dmp

    Filesize

    252KB

  • memory/4264-186-0x0000000004FE0000-0x000000000501F000-memory.dmp

    Filesize

    252KB

  • memory/4264-209-0x0000000004FE0000-0x000000000501F000-memory.dmp

    Filesize

    252KB

  • memory/4264-181-0x0000000004FE0000-0x000000000501F000-memory.dmp

    Filesize

    252KB

  • memory/4264-212-0x0000000004FE0000-0x000000000501F000-memory.dmp

    Filesize

    252KB

  • memory/4264-214-0x0000000004FE0000-0x000000000501F000-memory.dmp

    Filesize

    252KB

  • memory/4264-216-0x0000000004FE0000-0x000000000501F000-memory.dmp

    Filesize

    252KB

  • memory/4264-218-0x0000000004FE0000-0x000000000501F000-memory.dmp

    Filesize

    252KB

  • memory/4264-1093-0x0000000005020000-0x0000000005626000-memory.dmp

    Filesize

    6.0MB

  • memory/4264-1094-0x0000000005670000-0x000000000577A000-memory.dmp

    Filesize

    1.0MB

  • memory/4264-1095-0x00000000057A0000-0x00000000057B2000-memory.dmp

    Filesize

    72KB

  • memory/4264-1096-0x0000000005800000-0x000000000583E000-memory.dmp

    Filesize

    248KB

  • memory/4264-1097-0x0000000005940000-0x000000000598B000-memory.dmp

    Filesize

    300KB

  • memory/4264-1098-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

    Filesize

    64KB

  • memory/4264-1101-0x0000000005AA0000-0x0000000005B32000-memory.dmp

    Filesize

    584KB

  • memory/4264-1102-0x0000000005B40000-0x0000000005BA6000-memory.dmp

    Filesize

    408KB

  • memory/4264-180-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

    Filesize

    64KB

  • memory/4264-175-0x0000000004FE0000-0x000000000501F000-memory.dmp

    Filesize

    252KB

  • memory/4264-177-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

    Filesize

    64KB

  • memory/4264-1106-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

    Filesize

    64KB

  • memory/4264-1107-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

    Filesize

    64KB

  • memory/4264-1108-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

    Filesize

    64KB

  • memory/4264-174-0x0000000000590000-0x00000000005DB000-memory.dmp

    Filesize

    300KB

  • memory/4264-1113-0x0000000006370000-0x0000000006532000-memory.dmp

    Filesize

    1.8MB

  • memory/4264-1114-0x0000000006550000-0x0000000006A7C000-memory.dmp

    Filesize

    5.2MB

  • memory/4264-1115-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

    Filesize

    64KB

  • memory/4264-1116-0x00000000023A0000-0x0000000002416000-memory.dmp

    Filesize

    472KB

  • memory/4264-1117-0x0000000007E70000-0x0000000007EC0000-memory.dmp

    Filesize

    320KB

  • memory/4264-169-0x0000000004FE0000-0x000000000501F000-memory.dmp

    Filesize

    252KB

  • memory/4264-163-0x0000000004FE0000-0x000000000501F000-memory.dmp

    Filesize

    252KB

  • memory/4264-160-0x0000000004FE0000-0x000000000501F000-memory.dmp

    Filesize

    252KB

  • memory/4264-158-0x0000000004FE0000-0x000000000501F000-memory.dmp

    Filesize

    252KB

  • memory/4264-153-0x0000000004FE0000-0x0000000005024000-memory.dmp

    Filesize

    272KB

  • memory/4264-150-0x0000000004A50000-0x0000000004A96000-memory.dmp

    Filesize

    280KB