Analysis

  • max time kernel
    53s
  • max time network
    58s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-04-2023 20:03

General

  • Target

    592b59abbe836153ee83a93d7dd963a21d87e49e19759d757f03cc648617d6f7.exe

  • Size

    657KB

  • MD5

    f1ff39901712575b2b8ffe0af54eb85a

  • SHA1

    f21b9d7fb398cc6779d9f4e9a65f5dbdd8bd95c0

  • SHA256

    592b59abbe836153ee83a93d7dd963a21d87e49e19759d757f03cc648617d6f7

  • SHA512

    1fd9a551657e6835ace423403de128041e4f7a8792b05b72b42711d12d9688db46241b487e9b347951cc75f5bd3bac5b2e2858edb94bfefe73bf17058b6e9fb4

  • SSDEEP

    12288:TMrYy90IIiXYqVCHat+6kWCPQLt8RnU2We44WzWKVA8vCBO:Xy3tdHhqVWX4PKgO

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\592b59abbe836153ee83a93d7dd963a21d87e49e19759d757f03cc648617d6f7.exe
    "C:\Users\Admin\AppData\Local\Temp\592b59abbe836153ee83a93d7dd963a21d87e49e19759d757f03cc648617d6f7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un381522.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un381522.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3384
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2833.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2833.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4244
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1812.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1812.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2828
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si476435.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si476435.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4904

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si476435.exe
    Filesize

    175KB

    MD5

    01408dfc7a8a176df578dbdd2efa2fdd

    SHA1

    92881097ab167c519e52f7bef8fe3dd067d499a8

    SHA256

    f672221e0517fd59051cb20cbd5d98365d5340316bada6b95d7ebefe3ec0723e

    SHA512

    238dfab24af8777f6f7856d5587a00b6f0bbb351d6d925a9add88c06cb0ea95c4713606e75092d243e947602c7e965de3cdb53789a1a50ecc07f49f98ba2527d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si476435.exe
    Filesize

    175KB

    MD5

    01408dfc7a8a176df578dbdd2efa2fdd

    SHA1

    92881097ab167c519e52f7bef8fe3dd067d499a8

    SHA256

    f672221e0517fd59051cb20cbd5d98365d5340316bada6b95d7ebefe3ec0723e

    SHA512

    238dfab24af8777f6f7856d5587a00b6f0bbb351d6d925a9add88c06cb0ea95c4713606e75092d243e947602c7e965de3cdb53789a1a50ecc07f49f98ba2527d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un381522.exe
    Filesize

    515KB

    MD5

    8267dd2c4b1ac00e631f5a027e1acdcf

    SHA1

    467157c64134dfa0af2d58b69b8b7604266dcdf7

    SHA256

    26bad643bb8eddf794af7c07350ab763247671d9fdfee14cc5fa9e75d46851c8

    SHA512

    1ef3f1d3a1d68ac0566f581d983f2c59ddee6d14916ca05323dd20be8694ef552e00a9ea5a026e436675cdf9a22b1f5c4c63fd639ac8fb16ea6ac59b153e1f85

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un381522.exe
    Filesize

    515KB

    MD5

    8267dd2c4b1ac00e631f5a027e1acdcf

    SHA1

    467157c64134dfa0af2d58b69b8b7604266dcdf7

    SHA256

    26bad643bb8eddf794af7c07350ab763247671d9fdfee14cc5fa9e75d46851c8

    SHA512

    1ef3f1d3a1d68ac0566f581d983f2c59ddee6d14916ca05323dd20be8694ef552e00a9ea5a026e436675cdf9a22b1f5c4c63fd639ac8fb16ea6ac59b153e1f85

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2833.exe
    Filesize

    235KB

    MD5

    d06a340edb8798aa42a7d69ae7907c57

    SHA1

    bd31ace68355920dfc462d60f1b349eff056c7be

    SHA256

    2527fb2ca4350090f2bcb7805197a894ec7e37915eccf476d2e8c137543ecbcf

    SHA512

    12705f0cabfe515aa6e85a08fb70444663083589b670502a48e4ec78676e962124843f0fe4eb12368096d522dea376ae5b4e7afa2adc85260cb965ee06fe0582

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2833.exe
    Filesize

    235KB

    MD5

    d06a340edb8798aa42a7d69ae7907c57

    SHA1

    bd31ace68355920dfc462d60f1b349eff056c7be

    SHA256

    2527fb2ca4350090f2bcb7805197a894ec7e37915eccf476d2e8c137543ecbcf

    SHA512

    12705f0cabfe515aa6e85a08fb70444663083589b670502a48e4ec78676e962124843f0fe4eb12368096d522dea376ae5b4e7afa2adc85260cb965ee06fe0582

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1812.exe
    Filesize

    294KB

    MD5

    1ca1a4a02f6aab95c37c156b69007102

    SHA1

    7378f07f15f90dd227bee55d1cf53f0e14633751

    SHA256

    2682843448838c59c832738360e957a9680c491f2ad175b736ae5fcb99c3d877

    SHA512

    9a69865b91c2e903c7285b0d79425f25e873c1f9f3c8abc3a347df54ef06670b8b4cd0d3e317af88d034d400ee179a538761a155c5f19c504badffc88d83bd5f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1812.exe
    Filesize

    294KB

    MD5

    1ca1a4a02f6aab95c37c156b69007102

    SHA1

    7378f07f15f90dd227bee55d1cf53f0e14633751

    SHA256

    2682843448838c59c832738360e957a9680c491f2ad175b736ae5fcb99c3d877

    SHA512

    9a69865b91c2e903c7285b0d79425f25e873c1f9f3c8abc3a347df54ef06670b8b4cd0d3e317af88d034d400ee179a538761a155c5f19c504badffc88d83bd5f

  • memory/2828-1093-0x0000000005190000-0x000000000529A000-memory.dmp
    Filesize

    1.0MB

  • memory/2828-1092-0x0000000005750000-0x0000000005D56000-memory.dmp
    Filesize

    6.0MB

  • memory/2828-193-0x00000000024C0000-0x00000000024FF000-memory.dmp
    Filesize

    252KB

  • memory/2828-1108-0x0000000006790000-0x0000000006CBC000-memory.dmp
    Filesize

    5.2MB

  • memory/2828-1107-0x00000000065C0000-0x0000000006782000-memory.dmp
    Filesize

    1.8MB

  • memory/2828-195-0x00000000024C0000-0x00000000024FF000-memory.dmp
    Filesize

    252KB

  • memory/2828-1106-0x0000000006550000-0x00000000065A0000-memory.dmp
    Filesize

    320KB

  • memory/2828-1105-0x00000000064C0000-0x0000000006536000-memory.dmp
    Filesize

    472KB

  • memory/2828-1104-0x0000000002500000-0x0000000002510000-memory.dmp
    Filesize

    64KB

  • memory/2828-197-0x00000000024C0000-0x00000000024FF000-memory.dmp
    Filesize

    252KB

  • memory/2828-1103-0x0000000005670000-0x00000000056D6000-memory.dmp
    Filesize

    408KB

  • memory/2828-1102-0x00000000055D0000-0x0000000005662000-memory.dmp
    Filesize

    584KB

  • memory/2828-1101-0x0000000002500000-0x0000000002510000-memory.dmp
    Filesize

    64KB

  • memory/2828-1100-0x0000000002500000-0x0000000002510000-memory.dmp
    Filesize

    64KB

  • memory/2828-1099-0x0000000002500000-0x0000000002510000-memory.dmp
    Filesize

    64KB

  • memory/2828-1097-0x0000000005440000-0x000000000548B000-memory.dmp
    Filesize

    300KB

  • memory/2828-1096-0x00000000052F0000-0x000000000532E000-memory.dmp
    Filesize

    248KB

  • memory/2828-1095-0x0000000002500000-0x0000000002510000-memory.dmp
    Filesize

    64KB

  • memory/2828-1094-0x00000000052D0000-0x00000000052E2000-memory.dmp
    Filesize

    72KB

  • memory/2828-205-0x00000000024C0000-0x00000000024FF000-memory.dmp
    Filesize

    252KB

  • memory/2828-219-0x00000000024C0000-0x00000000024FF000-memory.dmp
    Filesize

    252KB

  • memory/2828-217-0x00000000024C0000-0x00000000024FF000-memory.dmp
    Filesize

    252KB

  • memory/2828-215-0x00000000024C0000-0x00000000024FF000-memory.dmp
    Filesize

    252KB

  • memory/2828-213-0x00000000024C0000-0x00000000024FF000-memory.dmp
    Filesize

    252KB

  • memory/2828-180-0x0000000002240000-0x0000000002286000-memory.dmp
    Filesize

    280KB

  • memory/2828-181-0x00000000024C0000-0x0000000002504000-memory.dmp
    Filesize

    272KB

  • memory/2828-182-0x00000000004C0000-0x000000000050B000-memory.dmp
    Filesize

    300KB

  • memory/2828-184-0x00000000024C0000-0x00000000024FF000-memory.dmp
    Filesize

    252KB

  • memory/2828-186-0x00000000024C0000-0x00000000024FF000-memory.dmp
    Filesize

    252KB

  • memory/2828-187-0x0000000002500000-0x0000000002510000-memory.dmp
    Filesize

    64KB

  • memory/2828-189-0x00000000024C0000-0x00000000024FF000-memory.dmp
    Filesize

    252KB

  • memory/2828-185-0x0000000002500000-0x0000000002510000-memory.dmp
    Filesize

    64KB

  • memory/2828-183-0x0000000002500000-0x0000000002510000-memory.dmp
    Filesize

    64KB

  • memory/2828-191-0x00000000024C0000-0x00000000024FF000-memory.dmp
    Filesize

    252KB

  • memory/2828-211-0x00000000024C0000-0x00000000024FF000-memory.dmp
    Filesize

    252KB

  • memory/2828-209-0x00000000024C0000-0x00000000024FF000-memory.dmp
    Filesize

    252KB

  • memory/2828-207-0x00000000024C0000-0x00000000024FF000-memory.dmp
    Filesize

    252KB

  • memory/2828-199-0x00000000024C0000-0x00000000024FF000-memory.dmp
    Filesize

    252KB

  • memory/2828-201-0x00000000024C0000-0x00000000024FF000-memory.dmp
    Filesize

    252KB

  • memory/2828-203-0x00000000024C0000-0x00000000024FF000-memory.dmp
    Filesize

    252KB

  • memory/4244-171-0x0000000000400000-0x00000000004A9000-memory.dmp
    Filesize

    676KB

  • memory/4244-154-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4244-146-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4244-136-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/4244-139-0x0000000004B10000-0x000000000500E000-memory.dmp
    Filesize

    5.0MB

  • memory/4244-140-0x00000000049D0000-0x00000000049E8000-memory.dmp
    Filesize

    96KB

  • memory/4244-175-0x0000000000400000-0x00000000004A9000-memory.dmp
    Filesize

    676KB

  • memory/4244-173-0x0000000004B00000-0x0000000004B10000-memory.dmp
    Filesize

    64KB

  • memory/4244-172-0x0000000004B00000-0x0000000004B10000-memory.dmp
    Filesize

    64KB

  • memory/4244-138-0x0000000004B00000-0x0000000004B10000-memory.dmp
    Filesize

    64KB

  • memory/4244-141-0x0000000004B00000-0x0000000004B10000-memory.dmp
    Filesize

    64KB

  • memory/4244-170-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4244-168-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4244-166-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4244-164-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4244-162-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4244-160-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4244-158-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4244-156-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4244-152-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4244-150-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4244-148-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4244-144-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4244-143-0x00000000049D0000-0x00000000049E2000-memory.dmp
    Filesize

    72KB

  • memory/4244-137-0x0000000002430000-0x000000000244A000-memory.dmp
    Filesize

    104KB

  • memory/4244-142-0x0000000004B00000-0x0000000004B10000-memory.dmp
    Filesize

    64KB

  • memory/4904-1114-0x0000000000150000-0x0000000000182000-memory.dmp
    Filesize

    200KB

  • memory/4904-1115-0x0000000004CC0000-0x0000000004CD0000-memory.dmp
    Filesize

    64KB

  • memory/4904-1116-0x0000000004B90000-0x0000000004BDB000-memory.dmp
    Filesize

    300KB