Analysis

  • max time kernel
    53s
  • max time network
    71s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-04-2023 19:38

General

  • Target

    b4d00cf43419f2b4e409f80ef350368dc246a5c347fcb7484427ed15ad30c089.exe

  • Size

    521KB

  • MD5

    b6d82a516e43db23915cc559cd1d8e10

  • SHA1

    ba0da324aab98830c740e1ce4d652fe758fd482f

  • SHA256

    b4d00cf43419f2b4e409f80ef350368dc246a5c347fcb7484427ed15ad30c089

  • SHA512

    d64f6ed43d3e8e03fbcfc4c795771dd49b26b80807a3d14133b2f455b1f4a6a28e4ad6552ed435dfc332f8237cc86c7efb7aec4d72a602acc11ee6ebf6ed8ba7

  • SSDEEP

    12288:DMrJy907r1qz2hXkEH9sJtY8yu44vzWa+bzzh1iATu:eyEgqhvH65yH46a+Xj6

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 35 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4d00cf43419f2b4e409f80ef350368dc246a5c347fcb7484427ed15ad30c089.exe
    "C:\Users\Admin\AppData\Local\Temp\b4d00cf43419f2b4e409f80ef350368dc246a5c347fcb7484427ed15ad30c089.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:376
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRU7286.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRU7286.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3984
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr637139.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr637139.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4924
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku629072.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku629072.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2080
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr931035.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr931035.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4828

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr931035.exe

    Filesize

    175KB

    MD5

    bd754101b178f5dcb67f47eff40887f0

    SHA1

    ba8b8de34afc48f2e9557482fb2096887b5a341e

    SHA256

    1086e0b6d21a4450b133598c6e6e096db654257b851b003558b9abeafa2b1355

    SHA512

    d965e6fa93f1f89a90a74fb58c43e7f4ecbf826fe67b65bdbdad73fa940d326af353aebebd5877a9e4b392c88e539a234a8a8f032c72553cab2070c6dda79723

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr931035.exe

    Filesize

    175KB

    MD5

    bd754101b178f5dcb67f47eff40887f0

    SHA1

    ba8b8de34afc48f2e9557482fb2096887b5a341e

    SHA256

    1086e0b6d21a4450b133598c6e6e096db654257b851b003558b9abeafa2b1355

    SHA512

    d965e6fa93f1f89a90a74fb58c43e7f4ecbf826fe67b65bdbdad73fa940d326af353aebebd5877a9e4b392c88e539a234a8a8f032c72553cab2070c6dda79723

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRU7286.exe

    Filesize

    379KB

    MD5

    fca8c274b8a2af67af5ba35fcc385539

    SHA1

    d7f827832d8a724f6337f0eea48b9a66c7615241

    SHA256

    336489a3002c9b58ff37583afdcb0169309b7fdc0aacc26a69b7580956b8a8da

    SHA512

    e599b9f8f2687a93ae5d49b50f7e0bce9266380cce40a4caeb92d92c64daf94624064e752b6d90e7f38f9ccf95c5d2eea7812723016c3abb0c5a6119d1f9d75c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziRU7286.exe

    Filesize

    379KB

    MD5

    fca8c274b8a2af67af5ba35fcc385539

    SHA1

    d7f827832d8a724f6337f0eea48b9a66c7615241

    SHA256

    336489a3002c9b58ff37583afdcb0169309b7fdc0aacc26a69b7580956b8a8da

    SHA512

    e599b9f8f2687a93ae5d49b50f7e0bce9266380cce40a4caeb92d92c64daf94624064e752b6d90e7f38f9ccf95c5d2eea7812723016c3abb0c5a6119d1f9d75c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr637139.exe

    Filesize

    11KB

    MD5

    8b6ba4a9bce622ab6c2382f237094790

    SHA1

    5aa259129e10b8aebcc3901f358d7691a9c7b489

    SHA256

    5f45ef1c639aa7a86920811f451d3dfd28dda4072095a33f45211a948697f863

    SHA512

    24323f4e99ce982f339585ee3fd38557d17d75082e73db51b98cc07e65486c0a25e917282147123c7f65c5ec472fd4a42fffc7a47c5e6017880635d112bdd7c3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr637139.exe

    Filesize

    11KB

    MD5

    8b6ba4a9bce622ab6c2382f237094790

    SHA1

    5aa259129e10b8aebcc3901f358d7691a9c7b489

    SHA256

    5f45ef1c639aa7a86920811f451d3dfd28dda4072095a33f45211a948697f863

    SHA512

    24323f4e99ce982f339585ee3fd38557d17d75082e73db51b98cc07e65486c0a25e917282147123c7f65c5ec472fd4a42fffc7a47c5e6017880635d112bdd7c3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku629072.exe

    Filesize

    294KB

    MD5

    6d02a549d095d481f21f71d5ccc34194

    SHA1

    6125d0d28dd7943c1eb90b97f4808d2abadf4f47

    SHA256

    05591487d6da44b60e8e8b1e4659f8ebd5e8516b5be6e2c0cf73dac6b62c9a14

    SHA512

    7fc48ac37cc1b50412689aa9d8d2ef0eb7fea751afe8845da338aee894af19108bbe1b2bbda01c41c30e7ffa5c4210be6bad8a3fbe9c1e0c65ebebb88fcb122a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku629072.exe

    Filesize

    294KB

    MD5

    6d02a549d095d481f21f71d5ccc34194

    SHA1

    6125d0d28dd7943c1eb90b97f4808d2abadf4f47

    SHA256

    05591487d6da44b60e8e8b1e4659f8ebd5e8516b5be6e2c0cf73dac6b62c9a14

    SHA512

    7fc48ac37cc1b50412689aa9d8d2ef0eb7fea751afe8845da338aee894af19108bbe1b2bbda01c41c30e7ffa5c4210be6bad8a3fbe9c1e0c65ebebb88fcb122a

  • memory/2080-139-0x00000000004C0000-0x000000000050B000-memory.dmp

    Filesize

    300KB

  • memory/2080-140-0x0000000002060000-0x00000000020A6000-memory.dmp

    Filesize

    280KB

  • memory/2080-141-0x0000000004CA0000-0x000000000519E000-memory.dmp

    Filesize

    5.0MB

  • memory/2080-142-0x0000000002250000-0x0000000002294000-memory.dmp

    Filesize

    272KB

  • memory/2080-143-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-144-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-148-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-146-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-150-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-152-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-154-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-156-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-158-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-160-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-162-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-165-0x0000000004C90000-0x0000000004CA0000-memory.dmp

    Filesize

    64KB

  • memory/2080-164-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-168-0x0000000004C90000-0x0000000004CA0000-memory.dmp

    Filesize

    64KB

  • memory/2080-167-0x0000000004C90000-0x0000000004CA0000-memory.dmp

    Filesize

    64KB

  • memory/2080-171-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-173-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-169-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-175-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-177-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-179-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-181-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-183-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-185-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-189-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-187-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-191-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-193-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-195-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-197-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-199-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-201-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-203-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-205-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-207-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-209-0x0000000002250000-0x000000000228F000-memory.dmp

    Filesize

    252KB

  • memory/2080-1052-0x00000000057B0000-0x0000000005DB6000-memory.dmp

    Filesize

    6.0MB

  • memory/2080-1053-0x00000000051A0000-0x00000000052AA000-memory.dmp

    Filesize

    1.0MB

  • memory/2080-1054-0x00000000052D0000-0x00000000052E2000-memory.dmp

    Filesize

    72KB

  • memory/2080-1055-0x00000000052F0000-0x000000000532E000-memory.dmp

    Filesize

    248KB

  • memory/2080-1056-0x0000000005440000-0x000000000548B000-memory.dmp

    Filesize

    300KB

  • memory/2080-1057-0x0000000004C90000-0x0000000004CA0000-memory.dmp

    Filesize

    64KB

  • memory/2080-1058-0x00000000055D0000-0x0000000005636000-memory.dmp

    Filesize

    408KB

  • memory/2080-1060-0x00000000062A0000-0x0000000006332000-memory.dmp

    Filesize

    584KB

  • memory/2080-1061-0x00000000065B0000-0x0000000006626000-memory.dmp

    Filesize

    472KB

  • memory/2080-1063-0x0000000006630000-0x0000000006680000-memory.dmp

    Filesize

    320KB

  • memory/2080-1065-0x0000000004C90000-0x0000000004CA0000-memory.dmp

    Filesize

    64KB

  • memory/2080-1064-0x0000000004C90000-0x0000000004CA0000-memory.dmp

    Filesize

    64KB

  • memory/2080-1062-0x0000000004C90000-0x0000000004CA0000-memory.dmp

    Filesize

    64KB

  • memory/2080-1066-0x00000000066B0000-0x0000000006872000-memory.dmp

    Filesize

    1.8MB

  • memory/2080-1067-0x0000000006880000-0x0000000006DAC000-memory.dmp

    Filesize

    5.2MB

  • memory/2080-1068-0x0000000004C90000-0x0000000004CA0000-memory.dmp

    Filesize

    64KB

  • memory/4828-1074-0x0000000000410000-0x0000000000442000-memory.dmp

    Filesize

    200KB

  • memory/4828-1075-0x0000000004E80000-0x0000000004ECB000-memory.dmp

    Filesize

    300KB

  • memory/4828-1076-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

    Filesize

    64KB

  • memory/4924-133-0x00000000005E0000-0x00000000005EA000-memory.dmp

    Filesize

    40KB