Analysis

  • max time kernel
    70s
  • max time network
    103s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-04-2023 20:15

General

  • Target

    d52518b0ef2c2e424c75dd5919f034b56ab416a6099c36b0c74dd1d81f086bbb.exe

  • Size

    522KB

  • MD5

    450d62e09fc7f8932c284759a91821b7

  • SHA1

    95502d5a441623052b6ebd86188eb3ba2bcd1a52

  • SHA256

    d52518b0ef2c2e424c75dd5919f034b56ab416a6099c36b0c74dd1d81f086bbb

  • SHA512

    1c35bfcce4e09323917a3a711ab8ae13363c5db99de6b8c55855062149ee89d90096be7b57c7bc4126b56ee48a1fc72adfc242bb103996d3f05c99d69d8f11e2

  • SSDEEP

    12288:ZMr7y90TXZGplPFQln8AN4sYzWKOVxvWdpO:qyIZGbdAOsRKBpO

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d52518b0ef2c2e424c75dd5919f034b56ab416a6099c36b0c74dd1d81f086bbb.exe
    "C:\Users\Admin\AppData\Local\Temp\d52518b0ef2c2e424c75dd5919f034b56ab416a6099c36b0c74dd1d81f086bbb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4136
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJC6595.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJC6595.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3980
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr918378.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr918378.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4684
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku427726.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku427726.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4824
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr141946.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr141946.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4444

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr141946.exe
    Filesize

    175KB

    MD5

    9770df88484fb6ea91fdadf5c7f3efb5

    SHA1

    4923f243fba5b8c3a41d7e27b9840527d778be35

    SHA256

    274b57cd281fe6632d0152574b6e35e9a7f2ee00e624faba7e4f555f8c445ea3

    SHA512

    40f1ab4fe210cdd66481873af927025ea5a40473f93a51613786d500b753dfe57774ca408709ebafb4f3f32763699fa414a8a8d4f2ce53f33aff0628fef09aa6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr141946.exe
    Filesize

    175KB

    MD5

    9770df88484fb6ea91fdadf5c7f3efb5

    SHA1

    4923f243fba5b8c3a41d7e27b9840527d778be35

    SHA256

    274b57cd281fe6632d0152574b6e35e9a7f2ee00e624faba7e4f555f8c445ea3

    SHA512

    40f1ab4fe210cdd66481873af927025ea5a40473f93a51613786d500b753dfe57774ca408709ebafb4f3f32763699fa414a8a8d4f2ce53f33aff0628fef09aa6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJC6595.exe
    Filesize

    380KB

    MD5

    9cdc8d060990703f3297401007436648

    SHA1

    c72a46519929a8337a2daec8b3df717dcac15f95

    SHA256

    ce906ba112598361f240fb98c9618e2d54720b9cda5535cda75f90731de74200

    SHA512

    aaa91e17908c73980b5517a99446b527278b7d7b632d33d4ff8d62b2bab3e60ef5b1fa382ea107fb33eb5dc3c49c906ea6cf995c03a1d8fc22ad88371e9bd5c7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziJC6595.exe
    Filesize

    380KB

    MD5

    9cdc8d060990703f3297401007436648

    SHA1

    c72a46519929a8337a2daec8b3df717dcac15f95

    SHA256

    ce906ba112598361f240fb98c9618e2d54720b9cda5535cda75f90731de74200

    SHA512

    aaa91e17908c73980b5517a99446b527278b7d7b632d33d4ff8d62b2bab3e60ef5b1fa382ea107fb33eb5dc3c49c906ea6cf995c03a1d8fc22ad88371e9bd5c7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr918378.exe
    Filesize

    15KB

    MD5

    1a95f5ee01ce7a6d4851887e8694e2fd

    SHA1

    d6f2cce7e7090d53081dea2f86e4071d43da6a50

    SHA256

    237db52ece87f127f6d81244560ebd2b7ce5e56ea1fd988124fc61cf20abf469

    SHA512

    f9eb8ecffdc507203612d4d98fa57effd2253e59eee40a53391ae12ab5f8abfce83e7d29fd22a94a43b3ef77aa7784c79c0a786516c5a5bcb7f1ce0ff036ef6c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr918378.exe
    Filesize

    15KB

    MD5

    1a95f5ee01ce7a6d4851887e8694e2fd

    SHA1

    d6f2cce7e7090d53081dea2f86e4071d43da6a50

    SHA256

    237db52ece87f127f6d81244560ebd2b7ce5e56ea1fd988124fc61cf20abf469

    SHA512

    f9eb8ecffdc507203612d4d98fa57effd2253e59eee40a53391ae12ab5f8abfce83e7d29fd22a94a43b3ef77aa7784c79c0a786516c5a5bcb7f1ce0ff036ef6c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku427726.exe
    Filesize

    294KB

    MD5

    88ee114179aa0a4a065926de816921f0

    SHA1

    f0eb680ef4ce04ea9167c8ebefa7bcb215b5747e

    SHA256

    f29d2758862b2b6aa759ca01679f3c930f4da28775d31124a62b75bb2b58831c

    SHA512

    a2edc44bbeda7bac62907befd96d02b099cae4d41bf530d0648a6e7943e8ddf859610a90256c708e7d47e92f15c8330ba491ad80299354118afc07381f2340d0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku427726.exe
    Filesize

    294KB

    MD5

    88ee114179aa0a4a065926de816921f0

    SHA1

    f0eb680ef4ce04ea9167c8ebefa7bcb215b5747e

    SHA256

    f29d2758862b2b6aa759ca01679f3c930f4da28775d31124a62b75bb2b58831c

    SHA512

    a2edc44bbeda7bac62907befd96d02b099cae4d41bf530d0648a6e7943e8ddf859610a90256c708e7d47e92f15c8330ba491ad80299354118afc07381f2340d0

  • memory/4444-1075-0x00000000007C0000-0x00000000007F2000-memory.dmp
    Filesize

    200KB

  • memory/4444-1076-0x0000000005200000-0x000000000524B000-memory.dmp
    Filesize

    300KB

  • memory/4444-1077-0x00000000053A0000-0x00000000053B0000-memory.dmp
    Filesize

    64KB

  • memory/4684-134-0x0000000000690000-0x000000000069A000-memory.dmp
    Filesize

    40KB

  • memory/4824-178-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-188-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-143-0x00000000004C0000-0x000000000050B000-memory.dmp
    Filesize

    300KB

  • memory/4824-145-0x0000000004B90000-0x0000000004BA0000-memory.dmp
    Filesize

    64KB

  • memory/4824-144-0x0000000004B90000-0x0000000004BA0000-memory.dmp
    Filesize

    64KB

  • memory/4824-146-0x0000000004B90000-0x0000000004BA0000-memory.dmp
    Filesize

    64KB

  • memory/4824-147-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-150-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-152-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-154-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-148-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-156-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-158-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-160-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-162-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-164-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-166-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-172-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-170-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-168-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-174-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-176-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-141-0x0000000004BA0000-0x000000000509E000-memory.dmp
    Filesize

    5.0MB

  • memory/4824-180-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-182-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-184-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-186-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-142-0x0000000004A20000-0x0000000004A64000-memory.dmp
    Filesize

    272KB

  • memory/4824-190-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-192-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-194-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-196-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-198-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-200-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-202-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-204-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-206-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-208-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-210-0x0000000004A20000-0x0000000004A5F000-memory.dmp
    Filesize

    252KB

  • memory/4824-1053-0x00000000051A0000-0x00000000057A6000-memory.dmp
    Filesize

    6.0MB

  • memory/4824-1054-0x00000000057B0000-0x00000000058BA000-memory.dmp
    Filesize

    1.0MB

  • memory/4824-1055-0x00000000058E0000-0x00000000058F2000-memory.dmp
    Filesize

    72KB

  • memory/4824-1056-0x0000000004B90000-0x0000000004BA0000-memory.dmp
    Filesize

    64KB

  • memory/4824-1057-0x0000000005900000-0x000000000593E000-memory.dmp
    Filesize

    248KB

  • memory/4824-1058-0x0000000005A50000-0x0000000005A9B000-memory.dmp
    Filesize

    300KB

  • memory/4824-1060-0x0000000005BE0000-0x0000000005C72000-memory.dmp
    Filesize

    584KB

  • memory/4824-1061-0x0000000005C80000-0x0000000005CE6000-memory.dmp
    Filesize

    408KB

  • memory/4824-1063-0x0000000004B90000-0x0000000004BA0000-memory.dmp
    Filesize

    64KB

  • memory/4824-1062-0x0000000004B90000-0x0000000004BA0000-memory.dmp
    Filesize

    64KB

  • memory/4824-1064-0x0000000004B90000-0x0000000004BA0000-memory.dmp
    Filesize

    64KB

  • memory/4824-1065-0x0000000006480000-0x00000000064F6000-memory.dmp
    Filesize

    472KB

  • memory/4824-140-0x0000000002640000-0x0000000002686000-memory.dmp
    Filesize

    280KB

  • memory/4824-1066-0x0000000006510000-0x0000000006560000-memory.dmp
    Filesize

    320KB

  • memory/4824-1067-0x0000000004B90000-0x0000000004BA0000-memory.dmp
    Filesize

    64KB

  • memory/4824-1068-0x0000000006580000-0x0000000006742000-memory.dmp
    Filesize

    1.8MB

  • memory/4824-1069-0x0000000006750000-0x0000000006C7C000-memory.dmp
    Filesize

    5.2MB