Analysis

  • max time kernel
    86s
  • max time network
    90s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-04-2023 20:00

General

  • Target

    047d478ad86ec4656e058397cb6aef88b2d4df037faae6e5517a941091f69145.exe

  • Size

    657KB

  • MD5

    05fe2bea4c00fbac6a5746e0c49ef4a5

  • SHA1

    3c6f8bda371060669f2c597322fdd23a4df50e2d

  • SHA256

    047d478ad86ec4656e058397cb6aef88b2d4df037faae6e5517a941091f69145

  • SHA512

    1ee93a05f20eab23f322f35d9e5fa91a1ced64ff49b07327a836274da0003fb87ee64ce5cc3822eb518fc3d3d73d3cfd3345c8ff29a140359de9b5747abc839e

  • SSDEEP

    12288:2Mr5y90gLOfGOLVHW6NqOttqc7psm6Lt87RpTWe441zWKoM8vna3m:7yJKZFQutTWxhitWX4oKDm

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\047d478ad86ec4656e058397cb6aef88b2d4df037faae6e5517a941091f69145.exe
    "C:\Users\Admin\AppData\Local\Temp\047d478ad86ec4656e058397cb6aef88b2d4df037faae6e5517a941091f69145.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2452
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un124722.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un124722.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7889.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7889.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2988
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2476.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2476.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4708
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si859972.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si859972.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3068

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si859972.exe
    Filesize

    175KB

    MD5

    14fa40ee5fc83cc3b58f1707818d3b70

    SHA1

    20c9518fcdf719c08061b2e4a95d60f8d85b945f

    SHA256

    c88c26207e02a9ce06e78dc26c80e7ca5bac97f12d6e0e08cd1d382074dc2b73

    SHA512

    05b25cb4a75a1f42c71b78a2a32c351b1a411440a786bf6bca054c0bfe441181005fe614bfcf7a8235c65fe9b5960590299ffba7083aae6f19d985879367f4a3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si859972.exe
    Filesize

    175KB

    MD5

    14fa40ee5fc83cc3b58f1707818d3b70

    SHA1

    20c9518fcdf719c08061b2e4a95d60f8d85b945f

    SHA256

    c88c26207e02a9ce06e78dc26c80e7ca5bac97f12d6e0e08cd1d382074dc2b73

    SHA512

    05b25cb4a75a1f42c71b78a2a32c351b1a411440a786bf6bca054c0bfe441181005fe614bfcf7a8235c65fe9b5960590299ffba7083aae6f19d985879367f4a3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un124722.exe
    Filesize

    515KB

    MD5

    fd78b17faba3423973ba30b46a73b8b9

    SHA1

    b92132c8362ce60c47a1118491cfe901a4cc53c6

    SHA256

    2f7274055cabbb274bd9ecf3f293e7f96b08d799c61926465457879eed35dc77

    SHA512

    2e90f0d649e2ed3de0b28196fc0ba2d190cfa460d3013046491e010deeaf0bb26cb48abe75d9a83302d6ab5d6a81886253e709ccd2b4a181206a60c24b49d26f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un124722.exe
    Filesize

    515KB

    MD5

    fd78b17faba3423973ba30b46a73b8b9

    SHA1

    b92132c8362ce60c47a1118491cfe901a4cc53c6

    SHA256

    2f7274055cabbb274bd9ecf3f293e7f96b08d799c61926465457879eed35dc77

    SHA512

    2e90f0d649e2ed3de0b28196fc0ba2d190cfa460d3013046491e010deeaf0bb26cb48abe75d9a83302d6ab5d6a81886253e709ccd2b4a181206a60c24b49d26f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7889.exe
    Filesize

    235KB

    MD5

    5ca4e862fdf3a03ce667c393863320f6

    SHA1

    5dcf9f0623bf5fc58584e5e0523cbaf634cb121d

    SHA256

    25a093e7defc5217c144935d27b4816fc7f48059a6029d054d8e7e782f3ed947

    SHA512

    3495779c328f793dee87bc23b04883df110f64b0f95d3ebb08a4f31ae8650fd28d8da1d7abb7b9629943dd05a03a079eec4781e0ca824a7a9950f41b13a0b905

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7889.exe
    Filesize

    235KB

    MD5

    5ca4e862fdf3a03ce667c393863320f6

    SHA1

    5dcf9f0623bf5fc58584e5e0523cbaf634cb121d

    SHA256

    25a093e7defc5217c144935d27b4816fc7f48059a6029d054d8e7e782f3ed947

    SHA512

    3495779c328f793dee87bc23b04883df110f64b0f95d3ebb08a4f31ae8650fd28d8da1d7abb7b9629943dd05a03a079eec4781e0ca824a7a9950f41b13a0b905

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2476.exe
    Filesize

    294KB

    MD5

    6809f0c9c6b6fa27402b5a359ee9137c

    SHA1

    30eba30473849711726f44e8e0723e93cb5b8e9d

    SHA256

    c5de9fc8fe0c2e0b25aa2f64d4b225c89c8c8a459accec9530883abc79bf3708

    SHA512

    809a281a5e57c4b1a56978c8c9dda7150214db625cd845c8ac12a9852bb6f268e9166d3d59e9d0bfed8bbdd673e868600fc9442ca5fc2fa6974547f6bb8a0dee

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2476.exe
    Filesize

    294KB

    MD5

    6809f0c9c6b6fa27402b5a359ee9137c

    SHA1

    30eba30473849711726f44e8e0723e93cb5b8e9d

    SHA256

    c5de9fc8fe0c2e0b25aa2f64d4b225c89c8c8a459accec9530883abc79bf3708

    SHA512

    809a281a5e57c4b1a56978c8c9dda7150214db625cd845c8ac12a9852bb6f268e9166d3d59e9d0bfed8bbdd673e868600fc9442ca5fc2fa6974547f6bb8a0dee

  • memory/2988-136-0x0000000002120000-0x000000000213A000-memory.dmp
    Filesize

    104KB

  • memory/2988-137-0x0000000004C50000-0x000000000514E000-memory.dmp
    Filesize

    5.0MB

  • memory/2988-138-0x00000000021C0000-0x00000000021D8000-memory.dmp
    Filesize

    96KB

  • memory/2988-139-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/2988-140-0x0000000004C40000-0x0000000004C50000-memory.dmp
    Filesize

    64KB

  • memory/2988-141-0x0000000004C40000-0x0000000004C50000-memory.dmp
    Filesize

    64KB

  • memory/2988-142-0x00000000021C0000-0x00000000021D2000-memory.dmp
    Filesize

    72KB

  • memory/2988-143-0x00000000021C0000-0x00000000021D2000-memory.dmp
    Filesize

    72KB

  • memory/2988-147-0x00000000021C0000-0x00000000021D2000-memory.dmp
    Filesize

    72KB

  • memory/2988-145-0x00000000021C0000-0x00000000021D2000-memory.dmp
    Filesize

    72KB

  • memory/2988-149-0x00000000021C0000-0x00000000021D2000-memory.dmp
    Filesize

    72KB

  • memory/2988-151-0x00000000021C0000-0x00000000021D2000-memory.dmp
    Filesize

    72KB

  • memory/2988-153-0x00000000021C0000-0x00000000021D2000-memory.dmp
    Filesize

    72KB

  • memory/2988-159-0x00000000021C0000-0x00000000021D2000-memory.dmp
    Filesize

    72KB

  • memory/2988-157-0x00000000021C0000-0x00000000021D2000-memory.dmp
    Filesize

    72KB

  • memory/2988-163-0x00000000021C0000-0x00000000021D2000-memory.dmp
    Filesize

    72KB

  • memory/2988-165-0x00000000021C0000-0x00000000021D2000-memory.dmp
    Filesize

    72KB

  • memory/2988-161-0x00000000021C0000-0x00000000021D2000-memory.dmp
    Filesize

    72KB

  • memory/2988-169-0x00000000021C0000-0x00000000021D2000-memory.dmp
    Filesize

    72KB

  • memory/2988-167-0x00000000021C0000-0x00000000021D2000-memory.dmp
    Filesize

    72KB

  • memory/2988-155-0x00000000021C0000-0x00000000021D2000-memory.dmp
    Filesize

    72KB

  • memory/2988-170-0x0000000000400000-0x00000000004A9000-memory.dmp
    Filesize

    676KB

  • memory/2988-171-0x0000000004C40000-0x0000000004C50000-memory.dmp
    Filesize

    64KB

  • memory/2988-172-0x0000000004C40000-0x0000000004C50000-memory.dmp
    Filesize

    64KB

  • memory/2988-174-0x0000000000400000-0x00000000004A9000-memory.dmp
    Filesize

    676KB

  • memory/3068-1113-0x0000000000180000-0x00000000001B2000-memory.dmp
    Filesize

    200KB

  • memory/3068-1115-0x0000000004DA0000-0x0000000004DB0000-memory.dmp
    Filesize

    64KB

  • memory/3068-1114-0x0000000004BC0000-0x0000000004C0B000-memory.dmp
    Filesize

    300KB

  • memory/4708-184-0x00000000023D0000-0x000000000240F000-memory.dmp
    Filesize

    252KB

  • memory/4708-341-0x0000000004CB0000-0x0000000004CC0000-memory.dmp
    Filesize

    64KB

  • memory/4708-182-0x00000000023D0000-0x000000000240F000-memory.dmp
    Filesize

    252KB

  • memory/4708-186-0x00000000023D0000-0x000000000240F000-memory.dmp
    Filesize

    252KB

  • memory/4708-188-0x00000000023D0000-0x000000000240F000-memory.dmp
    Filesize

    252KB

  • memory/4708-190-0x00000000023D0000-0x000000000240F000-memory.dmp
    Filesize

    252KB

  • memory/4708-192-0x00000000023D0000-0x000000000240F000-memory.dmp
    Filesize

    252KB

  • memory/4708-194-0x00000000023D0000-0x000000000240F000-memory.dmp
    Filesize

    252KB

  • memory/4708-196-0x00000000023D0000-0x000000000240F000-memory.dmp
    Filesize

    252KB

  • memory/4708-198-0x00000000023D0000-0x000000000240F000-memory.dmp
    Filesize

    252KB

  • memory/4708-200-0x00000000023D0000-0x000000000240F000-memory.dmp
    Filesize

    252KB

  • memory/4708-202-0x00000000023D0000-0x000000000240F000-memory.dmp
    Filesize

    252KB

  • memory/4708-204-0x00000000023D0000-0x000000000240F000-memory.dmp
    Filesize

    252KB

  • memory/4708-206-0x00000000023D0000-0x000000000240F000-memory.dmp
    Filesize

    252KB

  • memory/4708-208-0x00000000023D0000-0x000000000240F000-memory.dmp
    Filesize

    252KB

  • memory/4708-210-0x00000000023D0000-0x000000000240F000-memory.dmp
    Filesize

    252KB

  • memory/4708-212-0x00000000023D0000-0x000000000240F000-memory.dmp
    Filesize

    252KB

  • memory/4708-214-0x00000000023D0000-0x000000000240F000-memory.dmp
    Filesize

    252KB

  • memory/4708-339-0x0000000000590000-0x00000000005DB000-memory.dmp
    Filesize

    300KB

  • memory/4708-181-0x00000000023D0000-0x000000000240F000-memory.dmp
    Filesize

    252KB

  • memory/4708-343-0x0000000004CB0000-0x0000000004CC0000-memory.dmp
    Filesize

    64KB

  • memory/4708-345-0x0000000004CB0000-0x0000000004CC0000-memory.dmp
    Filesize

    64KB

  • memory/4708-1091-0x00000000057D0000-0x0000000005DD6000-memory.dmp
    Filesize

    6.0MB

  • memory/4708-1092-0x00000000051C0000-0x00000000052CA000-memory.dmp
    Filesize

    1.0MB

  • memory/4708-1093-0x0000000002620000-0x0000000002632000-memory.dmp
    Filesize

    72KB

  • memory/4708-1094-0x0000000004BB0000-0x0000000004BEE000-memory.dmp
    Filesize

    248KB

  • memory/4708-1095-0x0000000004BF0000-0x0000000004C3B000-memory.dmp
    Filesize

    300KB

  • memory/4708-1096-0x0000000004CB0000-0x0000000004CC0000-memory.dmp
    Filesize

    64KB

  • memory/4708-1097-0x0000000005490000-0x0000000005522000-memory.dmp
    Filesize

    584KB

  • memory/4708-1098-0x0000000005530000-0x0000000005596000-memory.dmp
    Filesize

    408KB

  • memory/4708-1100-0x0000000004CB0000-0x0000000004CC0000-memory.dmp
    Filesize

    64KB

  • memory/4708-1101-0x0000000004CB0000-0x0000000004CC0000-memory.dmp
    Filesize

    64KB

  • memory/4708-1102-0x0000000004CB0000-0x0000000004CC0000-memory.dmp
    Filesize

    64KB

  • memory/4708-1103-0x0000000006340000-0x0000000006502000-memory.dmp
    Filesize

    1.8MB

  • memory/4708-1104-0x0000000006530000-0x0000000006A5C000-memory.dmp
    Filesize

    5.2MB

  • memory/4708-180-0x00000000023D0000-0x0000000002414000-memory.dmp
    Filesize

    272KB

  • memory/4708-179-0x0000000002310000-0x0000000002356000-memory.dmp
    Filesize

    280KB

  • memory/4708-1105-0x0000000004CB0000-0x0000000004CC0000-memory.dmp
    Filesize

    64KB

  • memory/4708-1106-0x0000000006B90000-0x0000000006C06000-memory.dmp
    Filesize

    472KB

  • memory/4708-1107-0x0000000006C10000-0x0000000006C60000-memory.dmp
    Filesize

    320KB