Analysis

  • max time kernel
    51s
  • max time network
    150s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    03-04-2023 21:03

General

  • Target

    b92a5641461d03145155a3c1432b3e5827386466271351e65af8adab050e7024.exe

  • Size

    657KB

  • MD5

    b7f2c873ae275108c10031b162dc5efa

  • SHA1

    7c67fa7567f58ed2dfc4e48e9ed76bd16c780274

  • SHA256

    b92a5641461d03145155a3c1432b3e5827386466271351e65af8adab050e7024

  • SHA512

    0270022af341c7154d50a5bbb424c7e6b0b78a2793f77fda26bd0fce2eb9c2a9a8730be20c1439b5a40eeea1491f24ac81d65b482562971aeff4d7f61c70fff8

  • SSDEEP

    12288:UMr4y90+mnOmg8DoEVR1tECoTJOwYLt8aFxj4q44WzWKMu8vvMUIM:0y61oq1t5oTJpYhfZ4L4PKqM9M

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b92a5641461d03145155a3c1432b3e5827386466271351e65af8adab050e7024.exe
    "C:\Users\Admin\AppData\Local\Temp\b92a5641461d03145155a3c1432b3e5827386466271351e65af8adab050e7024.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:404
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un215058.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un215058.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3432
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1803.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1803.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1268
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9405.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9405.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2996
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si659782.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si659782.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2084

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si659782.exe
    Filesize

    175KB

    MD5

    4b411dd84f555ec1f611ea2025a29d1d

    SHA1

    f36a9b77d84ace20e880c625b0b797a04c88d5d0

    SHA256

    fbf09d99756182753858bd216ae910c7d94b94c39f060d79d9827645e5d4e6c7

    SHA512

    c971aa4676a459101cde17525fb7c7c185486b9c18299246a0c01b4fdb188395341f96f90b8cef43ddd2db0f6b82d0587dbf8061cf567fea8e7c0a91502f7e9f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si659782.exe
    Filesize

    175KB

    MD5

    4b411dd84f555ec1f611ea2025a29d1d

    SHA1

    f36a9b77d84ace20e880c625b0b797a04c88d5d0

    SHA256

    fbf09d99756182753858bd216ae910c7d94b94c39f060d79d9827645e5d4e6c7

    SHA512

    c971aa4676a459101cde17525fb7c7c185486b9c18299246a0c01b4fdb188395341f96f90b8cef43ddd2db0f6b82d0587dbf8061cf567fea8e7c0a91502f7e9f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un215058.exe
    Filesize

    515KB

    MD5

    5aa966aac632fe60634086affc8ad07d

    SHA1

    bce84acb3d50db33393f2e6ada1f051c1dd64fe2

    SHA256

    8aafa0af2d9c1732bcd77b8a17893859a45603e7793a8f94b917d1b92b4dcf19

    SHA512

    f2d12760bd06b355d395eeb233c2de7f27a5378d35dbac7f40d75fd645677b381af6e39cc9f78d05937c124147b7f099687f2659b3797bd06348c97a382a61c3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un215058.exe
    Filesize

    515KB

    MD5

    5aa966aac632fe60634086affc8ad07d

    SHA1

    bce84acb3d50db33393f2e6ada1f051c1dd64fe2

    SHA256

    8aafa0af2d9c1732bcd77b8a17893859a45603e7793a8f94b917d1b92b4dcf19

    SHA512

    f2d12760bd06b355d395eeb233c2de7f27a5378d35dbac7f40d75fd645677b381af6e39cc9f78d05937c124147b7f099687f2659b3797bd06348c97a382a61c3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1803.exe
    Filesize

    235KB

    MD5

    772d26b6dca6f4fc0fa55306cb9fe555

    SHA1

    9e8f682e392b8e570fc41a82fdf0bb825a592354

    SHA256

    1184e3b3d936b5e641959b4e281a3bf0fbcfb310751487ddeddbf6d7ce35ecda

    SHA512

    5d8b2d826452fb2a0289f1076b60b5cec713e4ba60e88ab3065185a67079e7f4709b812a951116b2dcc6087c18fe253068653e5b70612c4c74adef549ab9e6fd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1803.exe
    Filesize

    235KB

    MD5

    772d26b6dca6f4fc0fa55306cb9fe555

    SHA1

    9e8f682e392b8e570fc41a82fdf0bb825a592354

    SHA256

    1184e3b3d936b5e641959b4e281a3bf0fbcfb310751487ddeddbf6d7ce35ecda

    SHA512

    5d8b2d826452fb2a0289f1076b60b5cec713e4ba60e88ab3065185a67079e7f4709b812a951116b2dcc6087c18fe253068653e5b70612c4c74adef549ab9e6fd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9405.exe
    Filesize

    294KB

    MD5

    18c84d08c6e91c6c334be29ca84e11a0

    SHA1

    7f3334e5d7cda695210f1e9fe4b19315f8e0979b

    SHA256

    07f8b7d0799921d61ea445aaddb1b00fb7f98ce9b3a431828827ce71e7e00d0d

    SHA512

    663c8dbbd11b74c724165f233ab4127b685440f3ae53cc29626d6e63ef0a13820266b0e9f2dfe0c5b027f935d674e746a0f59fa8e5852b0e50c1cef0fec1374c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9405.exe
    Filesize

    294KB

    MD5

    18c84d08c6e91c6c334be29ca84e11a0

    SHA1

    7f3334e5d7cda695210f1e9fe4b19315f8e0979b

    SHA256

    07f8b7d0799921d61ea445aaddb1b00fb7f98ce9b3a431828827ce71e7e00d0d

    SHA512

    663c8dbbd11b74c724165f233ab4127b685440f3ae53cc29626d6e63ef0a13820266b0e9f2dfe0c5b027f935d674e746a0f59fa8e5852b0e50c1cef0fec1374c

  • memory/1268-136-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/1268-137-0x00000000021A0000-0x00000000021BA000-memory.dmp
    Filesize

    104KB

  • memory/1268-138-0x0000000004D20000-0x000000000521E000-memory.dmp
    Filesize

    5.0MB

  • memory/1268-139-0x0000000002350000-0x0000000002368000-memory.dmp
    Filesize

    96KB

  • memory/1268-140-0x0000000002350000-0x0000000002362000-memory.dmp
    Filesize

    72KB

  • memory/1268-141-0x0000000002350000-0x0000000002362000-memory.dmp
    Filesize

    72KB

  • memory/1268-143-0x0000000002350000-0x0000000002362000-memory.dmp
    Filesize

    72KB

  • memory/1268-145-0x0000000002350000-0x0000000002362000-memory.dmp
    Filesize

    72KB

  • memory/1268-147-0x0000000002350000-0x0000000002362000-memory.dmp
    Filesize

    72KB

  • memory/1268-149-0x0000000002350000-0x0000000002362000-memory.dmp
    Filesize

    72KB

  • memory/1268-151-0x0000000002350000-0x0000000002362000-memory.dmp
    Filesize

    72KB

  • memory/1268-153-0x0000000002350000-0x0000000002362000-memory.dmp
    Filesize

    72KB

  • memory/1268-155-0x0000000002350000-0x0000000002362000-memory.dmp
    Filesize

    72KB

  • memory/1268-157-0x0000000002350000-0x0000000002362000-memory.dmp
    Filesize

    72KB

  • memory/1268-159-0x0000000002350000-0x0000000002362000-memory.dmp
    Filesize

    72KB

  • memory/1268-161-0x0000000002350000-0x0000000002362000-memory.dmp
    Filesize

    72KB

  • memory/1268-163-0x0000000002350000-0x0000000002362000-memory.dmp
    Filesize

    72KB

  • memory/1268-165-0x0000000002350000-0x0000000002362000-memory.dmp
    Filesize

    72KB

  • memory/1268-167-0x0000000002350000-0x0000000002362000-memory.dmp
    Filesize

    72KB

  • memory/1268-168-0x0000000004D10000-0x0000000004D20000-memory.dmp
    Filesize

    64KB

  • memory/1268-169-0x0000000004D10000-0x0000000004D20000-memory.dmp
    Filesize

    64KB

  • memory/1268-170-0x0000000004D10000-0x0000000004D20000-memory.dmp
    Filesize

    64KB

  • memory/1268-171-0x0000000000400000-0x00000000004A9000-memory.dmp
    Filesize

    676KB

  • memory/1268-173-0x0000000000400000-0x00000000004A9000-memory.dmp
    Filesize

    676KB

  • memory/2084-1112-0x0000000000640000-0x0000000000672000-memory.dmp
    Filesize

    200KB

  • memory/2084-1115-0x0000000004E90000-0x0000000004EA0000-memory.dmp
    Filesize

    64KB

  • memory/2084-1114-0x0000000004E90000-0x0000000004EA0000-memory.dmp
    Filesize

    64KB

  • memory/2084-1113-0x0000000005080000-0x00000000050CB000-memory.dmp
    Filesize

    300KB

  • memory/2996-185-0x0000000004FD0000-0x000000000500F000-memory.dmp
    Filesize

    252KB

  • memory/2996-215-0x0000000004FD0000-0x000000000500F000-memory.dmp
    Filesize

    252KB

  • memory/2996-183-0x0000000004FD0000-0x000000000500F000-memory.dmp
    Filesize

    252KB

  • memory/2996-187-0x0000000004FD0000-0x000000000500F000-memory.dmp
    Filesize

    252KB

  • memory/2996-189-0x0000000004FD0000-0x000000000500F000-memory.dmp
    Filesize

    252KB

  • memory/2996-191-0x0000000004FD0000-0x000000000500F000-memory.dmp
    Filesize

    252KB

  • memory/2996-193-0x00000000005E0000-0x000000000062B000-memory.dmp
    Filesize

    300KB

  • memory/2996-194-0x0000000004FD0000-0x000000000500F000-memory.dmp
    Filesize

    252KB

  • memory/2996-197-0x0000000004FD0000-0x000000000500F000-memory.dmp
    Filesize

    252KB

  • memory/2996-195-0x0000000004AC0000-0x0000000004AD0000-memory.dmp
    Filesize

    64KB

  • memory/2996-198-0x0000000004AC0000-0x0000000004AD0000-memory.dmp
    Filesize

    64KB

  • memory/2996-201-0x0000000004FD0000-0x000000000500F000-memory.dmp
    Filesize

    252KB

  • memory/2996-200-0x0000000004AC0000-0x0000000004AD0000-memory.dmp
    Filesize

    64KB

  • memory/2996-203-0x0000000004FD0000-0x000000000500F000-memory.dmp
    Filesize

    252KB

  • memory/2996-205-0x0000000004FD0000-0x000000000500F000-memory.dmp
    Filesize

    252KB

  • memory/2996-207-0x0000000004FD0000-0x000000000500F000-memory.dmp
    Filesize

    252KB

  • memory/2996-209-0x0000000004FD0000-0x000000000500F000-memory.dmp
    Filesize

    252KB

  • memory/2996-211-0x0000000004FD0000-0x000000000500F000-memory.dmp
    Filesize

    252KB

  • memory/2996-213-0x0000000004FD0000-0x000000000500F000-memory.dmp
    Filesize

    252KB

  • memory/2996-180-0x0000000004FD0000-0x000000000500F000-memory.dmp
    Filesize

    252KB

  • memory/2996-217-0x0000000004FD0000-0x000000000500F000-memory.dmp
    Filesize

    252KB

  • memory/2996-1090-0x0000000005620000-0x0000000005C26000-memory.dmp
    Filesize

    6.0MB

  • memory/2996-1091-0x0000000005050000-0x000000000515A000-memory.dmp
    Filesize

    1.0MB

  • memory/2996-1092-0x0000000005190000-0x00000000051A2000-memory.dmp
    Filesize

    72KB

  • memory/2996-1093-0x0000000004AC0000-0x0000000004AD0000-memory.dmp
    Filesize

    64KB

  • memory/2996-1094-0x00000000051B0000-0x00000000051EE000-memory.dmp
    Filesize

    248KB

  • memory/2996-1095-0x0000000005300000-0x000000000534B000-memory.dmp
    Filesize

    300KB

  • memory/2996-1097-0x0000000005490000-0x00000000054F6000-memory.dmp
    Filesize

    408KB

  • memory/2996-1098-0x0000000006040000-0x00000000060D2000-memory.dmp
    Filesize

    584KB

  • memory/2996-1099-0x0000000004AC0000-0x0000000004AD0000-memory.dmp
    Filesize

    64KB

  • memory/2996-1100-0x0000000004AC0000-0x0000000004AD0000-memory.dmp
    Filesize

    64KB

  • memory/2996-1101-0x0000000004AC0000-0x0000000004AD0000-memory.dmp
    Filesize

    64KB

  • memory/2996-1102-0x0000000006250000-0x00000000062C6000-memory.dmp
    Filesize

    472KB

  • memory/2996-1103-0x00000000062D0000-0x0000000006320000-memory.dmp
    Filesize

    320KB

  • memory/2996-181-0x0000000004FD0000-0x000000000500F000-memory.dmp
    Filesize

    252KB

  • memory/2996-179-0x0000000004FD0000-0x0000000005014000-memory.dmp
    Filesize

    272KB

  • memory/2996-178-0x0000000004A10000-0x0000000004A56000-memory.dmp
    Filesize

    280KB

  • memory/2996-1104-0x0000000004AC0000-0x0000000004AD0000-memory.dmp
    Filesize

    64KB

  • memory/2996-1105-0x0000000007830000-0x00000000079F2000-memory.dmp
    Filesize

    1.8MB

  • memory/2996-1106-0x0000000007A00000-0x0000000007F2C000-memory.dmp
    Filesize

    5.2MB