Analysis

  • max time kernel
    50s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-04-2023 19:45

General

  • Target

    15374da20bec58fe3df321d818de00b723cbc88d9116820f68a98184ffa0e30d.exe

  • Size

    658KB

  • MD5

    b6c27a89a992898202908990d91521b6

  • SHA1

    2b41fa772eedfa6f6c5d512360d965456fabd350

  • SHA256

    15374da20bec58fe3df321d818de00b723cbc88d9116820f68a98184ffa0e30d

  • SHA512

    4f3f3486b1c4fe927a91074809bcced48062638d742e4d4af25df342998ce8aafd28b709893fb7e379b2ac02b5f8a2cdd4342e1c8d867a28ec5f1c178d2dbdff

  • SSDEEP

    12288:bMrey90tq1CYKuRzADt91PZ9tBmeQXwavp2E444lzWKBt8v7Bq9v85:dygq1CY7zQ1PbtcLjvwER4YKA5

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15374da20bec58fe3df321d818de00b723cbc88d9116820f68a98184ffa0e30d.exe
    "C:\Users\Admin\AppData\Local\Temp\15374da20bec58fe3df321d818de00b723cbc88d9116820f68a98184ffa0e30d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2036
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un850609.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un850609.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2308
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3805.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3805.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2416
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9652.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9652.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4872
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si958588.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si958588.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4264

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si958588.exe
    Filesize

    175KB

    MD5

    35fdac542a3f77827ef76f8bea24b8c2

    SHA1

    084f85849affab49b59541363a8b6514e2f52647

    SHA256

    4f56b3cbc95304831d063f1288713bc0ca64034a5505bd679fa313f04e40a095

    SHA512

    71b29ef7786e96c4b5c34862b86cf404dc964d782ba04b105288cc7cb3d3cd3d8b25183fb1d99a2e845c22118968cb1cec3828ff5d3335e07808a070cd421453

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si958588.exe
    Filesize

    175KB

    MD5

    35fdac542a3f77827ef76f8bea24b8c2

    SHA1

    084f85849affab49b59541363a8b6514e2f52647

    SHA256

    4f56b3cbc95304831d063f1288713bc0ca64034a5505bd679fa313f04e40a095

    SHA512

    71b29ef7786e96c4b5c34862b86cf404dc964d782ba04b105288cc7cb3d3cd3d8b25183fb1d99a2e845c22118968cb1cec3828ff5d3335e07808a070cd421453

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un850609.exe
    Filesize

    516KB

    MD5

    02a5c3a1180e05a184fb7b238ba90758

    SHA1

    14990a6efde8f92e57b8cd9fd8f8b99e0c37771e

    SHA256

    203869d7854458a4b59b4e043787778b767f0d848a6ca1221339ef5e7e7f38f8

    SHA512

    9f6e669db60068f83a2281c9f033b4e4636e1ccd0c9cd49d79d2a6f768d743dfa357d0db9923c6bae02348128bdd5d03a5a6a28e0170ad1bf7b58a73a12e2146

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un850609.exe
    Filesize

    516KB

    MD5

    02a5c3a1180e05a184fb7b238ba90758

    SHA1

    14990a6efde8f92e57b8cd9fd8f8b99e0c37771e

    SHA256

    203869d7854458a4b59b4e043787778b767f0d848a6ca1221339ef5e7e7f38f8

    SHA512

    9f6e669db60068f83a2281c9f033b4e4636e1ccd0c9cd49d79d2a6f768d743dfa357d0db9923c6bae02348128bdd5d03a5a6a28e0170ad1bf7b58a73a12e2146

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3805.exe
    Filesize

    235KB

    MD5

    96ccc1daf8a7a7a3f82eeb3afd27c33e

    SHA1

    c18fb23694bcc515a918865b1f986d4de0663745

    SHA256

    638c77fcf7dfef5d465719564967e56f0e3234754cd4e39a8f2e9e60193205f7

    SHA512

    68c74fa654c9a5d509e8fcf62b71ff362963fda3bb3eebc7cf81f27a194a092cf1fa66e0610a60073b3415b5e25cd859b8ceeb3130bfc31cfb9be1a8d41385d3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3805.exe
    Filesize

    235KB

    MD5

    96ccc1daf8a7a7a3f82eeb3afd27c33e

    SHA1

    c18fb23694bcc515a918865b1f986d4de0663745

    SHA256

    638c77fcf7dfef5d465719564967e56f0e3234754cd4e39a8f2e9e60193205f7

    SHA512

    68c74fa654c9a5d509e8fcf62b71ff362963fda3bb3eebc7cf81f27a194a092cf1fa66e0610a60073b3415b5e25cd859b8ceeb3130bfc31cfb9be1a8d41385d3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9652.exe
    Filesize

    294KB

    MD5

    f80e2ed7beaa5552cb320f9e6dee74bd

    SHA1

    4b3f891b362475a13065029f124f00bee65ac314

    SHA256

    a747a0ea559a7d08f391b2e4543f82c51c17a8d6aaed831fa2ec5d7b231a6cb1

    SHA512

    5afa8d388698332cf85f9a3533e73393050420f108ae8d4b62a255c0d98320e6ed3b900d643e50f150e598b05f0b3403a3134e1a84f0e897356107d146e1687b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9652.exe
    Filesize

    294KB

    MD5

    f80e2ed7beaa5552cb320f9e6dee74bd

    SHA1

    4b3f891b362475a13065029f124f00bee65ac314

    SHA256

    a747a0ea559a7d08f391b2e4543f82c51c17a8d6aaed831fa2ec5d7b231a6cb1

    SHA512

    5afa8d388698332cf85f9a3533e73393050420f108ae8d4b62a255c0d98320e6ed3b900d643e50f150e598b05f0b3403a3134e1a84f0e897356107d146e1687b

  • memory/2416-136-0x0000000002190000-0x00000000021AA000-memory.dmp
    Filesize

    104KB

  • memory/2416-137-0x0000000004B90000-0x000000000508E000-memory.dmp
    Filesize

    5.0MB

  • memory/2416-138-0x00000000049D0000-0x00000000049E8000-memory.dmp
    Filesize

    96KB

  • memory/2416-139-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/2416-140-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/2416-142-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/2416-144-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/2416-146-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/2416-148-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/2416-150-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/2416-152-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/2416-154-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/2416-158-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/2416-164-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/2416-166-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/2416-162-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/2416-160-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/2416-156-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/2416-168-0x0000000004B80000-0x0000000004B90000-memory.dmp
    Filesize

    64KB

  • memory/2416-169-0x0000000004B80000-0x0000000004B90000-memory.dmp
    Filesize

    64KB

  • memory/2416-170-0x0000000004B80000-0x0000000004B90000-memory.dmp
    Filesize

    64KB

  • memory/2416-167-0x0000000000580000-0x00000000005AD000-memory.dmp
    Filesize

    180KB

  • memory/2416-171-0x0000000000400000-0x00000000004A9000-memory.dmp
    Filesize

    676KB

  • memory/2416-173-0x0000000000400000-0x00000000004A9000-memory.dmp
    Filesize

    676KB

  • memory/4264-1112-0x0000000000F00000-0x0000000000F32000-memory.dmp
    Filesize

    200KB

  • memory/4264-1114-0x0000000005B00000-0x0000000005B10000-memory.dmp
    Filesize

    64KB

  • memory/4264-1113-0x0000000005940000-0x000000000598B000-memory.dmp
    Filesize

    300KB

  • memory/4872-181-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4872-213-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4872-183-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4872-185-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4872-187-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4872-189-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4872-191-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4872-193-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4872-196-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4872-195-0x0000000000590000-0x00000000005DB000-memory.dmp
    Filesize

    300KB

  • memory/4872-199-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4872-198-0x0000000004AB0000-0x0000000004AC0000-memory.dmp
    Filesize

    64KB

  • memory/4872-202-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4872-203-0x0000000004AB0000-0x0000000004AC0000-memory.dmp
    Filesize

    64KB

  • memory/4872-205-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4872-201-0x0000000004AB0000-0x0000000004AC0000-memory.dmp
    Filesize

    64KB

  • memory/4872-207-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4872-209-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4872-211-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4872-180-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4872-215-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4872-217-0x0000000004A30000-0x0000000004A6F000-memory.dmp
    Filesize

    252KB

  • memory/4872-1090-0x00000000055E0000-0x0000000005BE6000-memory.dmp
    Filesize

    6.0MB

  • memory/4872-1091-0x0000000005050000-0x000000000515A000-memory.dmp
    Filesize

    1.0MB

  • memory/4872-1092-0x0000000005190000-0x00000000051A2000-memory.dmp
    Filesize

    72KB

  • memory/4872-1093-0x00000000051B0000-0x00000000051EE000-memory.dmp
    Filesize

    248KB

  • memory/4872-1094-0x0000000004AB0000-0x0000000004AC0000-memory.dmp
    Filesize

    64KB

  • memory/4872-1095-0x0000000005300000-0x000000000534B000-memory.dmp
    Filesize

    300KB

  • memory/4872-1097-0x0000000005490000-0x0000000005522000-memory.dmp
    Filesize

    584KB

  • memory/4872-1098-0x0000000005530000-0x0000000005596000-memory.dmp
    Filesize

    408KB

  • memory/4872-1099-0x0000000004AB0000-0x0000000004AC0000-memory.dmp
    Filesize

    64KB

  • memory/4872-1100-0x0000000004AB0000-0x0000000004AC0000-memory.dmp
    Filesize

    64KB

  • memory/4872-1101-0x0000000004AB0000-0x0000000004AC0000-memory.dmp
    Filesize

    64KB

  • memory/4872-1102-0x00000000065D0000-0x0000000006646000-memory.dmp
    Filesize

    472KB

  • memory/4872-1103-0x0000000006650000-0x00000000066A0000-memory.dmp
    Filesize

    320KB

  • memory/4872-179-0x0000000004A30000-0x0000000004A74000-memory.dmp
    Filesize

    272KB

  • memory/4872-178-0x00000000021A0000-0x00000000021E6000-memory.dmp
    Filesize

    280KB

  • memory/4872-1104-0x0000000004AB0000-0x0000000004AC0000-memory.dmp
    Filesize

    64KB

  • memory/4872-1105-0x00000000066C0000-0x0000000006882000-memory.dmp
    Filesize

    1.8MB

  • memory/4872-1106-0x0000000006890000-0x0000000006DBC000-memory.dmp
    Filesize

    5.2MB