Analysis

  • max time kernel
    45s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05-04-2023 04:00

General

  • Target

    b917acc11bde080ad083210079ce978cf4d19b016a56148df44a49fc37fed34b.exe

  • Size

    677KB

  • MD5

    b851d75f35fa92846fa11daa164f5655

  • SHA1

    4b4189a0481c58544dbe4826ca80c4f34ca552b3

  • SHA256

    b917acc11bde080ad083210079ce978cf4d19b016a56148df44a49fc37fed34b

  • SHA512

    1b25e330a5bf7b8fc6bdb8e76d5a0a5210c943fb952b93c3c678fe4f8725c02650031eaa8cd84a8aad9a8d00803276ddaefe75d0689c1b5a5504b3f9880127fb

  • SSDEEP

    12288:ZMrUy90O6UocJ15NmPrgbVj6T3tby6DUOsXggMPWvGItJf/z:pyf6U115Nmze020U/ggM+jtx/z

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

spora

C2

176.113.115.145:4125

Attributes
  • auth_value

    441b39ab37774b2ca9931c31e1bc6071

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b917acc11bde080ad083210079ce978cf4d19b016a56148df44a49fc37fed34b.exe
    "C:\Users\Admin\AppData\Local\Temp\b917acc11bde080ad083210079ce978cf4d19b016a56148df44a49fc37fed34b.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un827843.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un827843.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1948
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2325.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2325.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:976
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4473.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4473.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:392
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si133702.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si133702.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1604

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si133702.exe
    Filesize

    175KB

    MD5

    bb6d43fa4ebafe62b98ec4dea4ff49d9

    SHA1

    d8188e664ac977f59d3ec26589e3cf67b1fab23b

    SHA256

    1d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89

    SHA512

    679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si133702.exe
    Filesize

    175KB

    MD5

    bb6d43fa4ebafe62b98ec4dea4ff49d9

    SHA1

    d8188e664ac977f59d3ec26589e3cf67b1fab23b

    SHA256

    1d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89

    SHA512

    679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un827843.exe
    Filesize

    535KB

    MD5

    d4aeda2a8f56936aee36ccfe3c925b81

    SHA1

    cd54afeba1274ddb9d6bd5ff4af78c8fe305e09f

    SHA256

    2cf3984eea7bd4769731d30f09cd949d55671b2ceed0f69f62c7dc7ae7712f54

    SHA512

    a00068385ce1d96e20b162db2bbfec46565ba699a9ebfbc5a3c515922714eef761f3feeb91153b00481a1f7596d0a8f085dddaefce68c9a7312e35eb56a19eda

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un827843.exe
    Filesize

    535KB

    MD5

    d4aeda2a8f56936aee36ccfe3c925b81

    SHA1

    cd54afeba1274ddb9d6bd5ff4af78c8fe305e09f

    SHA256

    2cf3984eea7bd4769731d30f09cd949d55671b2ceed0f69f62c7dc7ae7712f54

    SHA512

    a00068385ce1d96e20b162db2bbfec46565ba699a9ebfbc5a3c515922714eef761f3feeb91153b00481a1f7596d0a8f085dddaefce68c9a7312e35eb56a19eda

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2325.exe
    Filesize

    311KB

    MD5

    1fa2e9eea11c814a3e9538fe75d5cc86

    SHA1

    6c267f701406435ae56c46bb899576216f31766c

    SHA256

    d2b9bef38a101ffbbf68e3867d2eb6217c9cd97a6c80d7c0aee649ffe510c3c6

    SHA512

    a449c80cfe13f1390c94ec67ec7627dbabbb8c4260cd5bd309f8fb46608ed5fdb43a1d790174f015a693ffb36dc9626c68a81de4583f98227bbbab0f88a5070e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2325.exe
    Filesize

    311KB

    MD5

    1fa2e9eea11c814a3e9538fe75d5cc86

    SHA1

    6c267f701406435ae56c46bb899576216f31766c

    SHA256

    d2b9bef38a101ffbbf68e3867d2eb6217c9cd97a6c80d7c0aee649ffe510c3c6

    SHA512

    a449c80cfe13f1390c94ec67ec7627dbabbb8c4260cd5bd309f8fb46608ed5fdb43a1d790174f015a693ffb36dc9626c68a81de4583f98227bbbab0f88a5070e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2325.exe
    Filesize

    311KB

    MD5

    1fa2e9eea11c814a3e9538fe75d5cc86

    SHA1

    6c267f701406435ae56c46bb899576216f31766c

    SHA256

    d2b9bef38a101ffbbf68e3867d2eb6217c9cd97a6c80d7c0aee649ffe510c3c6

    SHA512

    a449c80cfe13f1390c94ec67ec7627dbabbb8c4260cd5bd309f8fb46608ed5fdb43a1d790174f015a693ffb36dc9626c68a81de4583f98227bbbab0f88a5070e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4473.exe
    Filesize

    370KB

    MD5

    20c0a5ac2530df5146eb925fded8b7a4

    SHA1

    df094dbdb9050f66300f8e6058714468bf1ac769

    SHA256

    dd5a3d5e88746aefd340f6ad09cd1f5d74f5a665acedd8decf2c4d83e6eac192

    SHA512

    980ee9aa79919fdecbd0f69ad1d06b8efb7234f05b56dde6d57307ad2c2cd62e1a86e1b1ef5e701e8a573e60fc0cd6c0324944be3ce8d4e7d4283506ae760e87

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4473.exe
    Filesize

    370KB

    MD5

    20c0a5ac2530df5146eb925fded8b7a4

    SHA1

    df094dbdb9050f66300f8e6058714468bf1ac769

    SHA256

    dd5a3d5e88746aefd340f6ad09cd1f5d74f5a665acedd8decf2c4d83e6eac192

    SHA512

    980ee9aa79919fdecbd0f69ad1d06b8efb7234f05b56dde6d57307ad2c2cd62e1a86e1b1ef5e701e8a573e60fc0cd6c0324944be3ce8d4e7d4283506ae760e87

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4473.exe
    Filesize

    370KB

    MD5

    20c0a5ac2530df5146eb925fded8b7a4

    SHA1

    df094dbdb9050f66300f8e6058714468bf1ac769

    SHA256

    dd5a3d5e88746aefd340f6ad09cd1f5d74f5a665acedd8decf2c4d83e6eac192

    SHA512

    980ee9aa79919fdecbd0f69ad1d06b8efb7234f05b56dde6d57307ad2c2cd62e1a86e1b1ef5e701e8a573e60fc0cd6c0324944be3ce8d4e7d4283506ae760e87

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\si133702.exe
    Filesize

    175KB

    MD5

    bb6d43fa4ebafe62b98ec4dea4ff49d9

    SHA1

    d8188e664ac977f59d3ec26589e3cf67b1fab23b

    SHA256

    1d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89

    SHA512

    679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\si133702.exe
    Filesize

    175KB

    MD5

    bb6d43fa4ebafe62b98ec4dea4ff49d9

    SHA1

    d8188e664ac977f59d3ec26589e3cf67b1fab23b

    SHA256

    1d1cdf01afc38fc6784a41fe8aa2f308ec44606d2d16c4edd9445813af33fe89

    SHA512

    679a0e394c5751020c38ceaba6a1bd1a33c558b8c9142fc796fa3570baa0ac082d099891451fde50249e165625b9738ead7321dccf2b2da567f3f7e3d4ee4644

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un827843.exe
    Filesize

    535KB

    MD5

    d4aeda2a8f56936aee36ccfe3c925b81

    SHA1

    cd54afeba1274ddb9d6bd5ff4af78c8fe305e09f

    SHA256

    2cf3984eea7bd4769731d30f09cd949d55671b2ceed0f69f62c7dc7ae7712f54

    SHA512

    a00068385ce1d96e20b162db2bbfec46565ba699a9ebfbc5a3c515922714eef761f3feeb91153b00481a1f7596d0a8f085dddaefce68c9a7312e35eb56a19eda

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un827843.exe
    Filesize

    535KB

    MD5

    d4aeda2a8f56936aee36ccfe3c925b81

    SHA1

    cd54afeba1274ddb9d6bd5ff4af78c8fe305e09f

    SHA256

    2cf3984eea7bd4769731d30f09cd949d55671b2ceed0f69f62c7dc7ae7712f54

    SHA512

    a00068385ce1d96e20b162db2bbfec46565ba699a9ebfbc5a3c515922714eef761f3feeb91153b00481a1f7596d0a8f085dddaefce68c9a7312e35eb56a19eda

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2325.exe
    Filesize

    311KB

    MD5

    1fa2e9eea11c814a3e9538fe75d5cc86

    SHA1

    6c267f701406435ae56c46bb899576216f31766c

    SHA256

    d2b9bef38a101ffbbf68e3867d2eb6217c9cd97a6c80d7c0aee649ffe510c3c6

    SHA512

    a449c80cfe13f1390c94ec67ec7627dbabbb8c4260cd5bd309f8fb46608ed5fdb43a1d790174f015a693ffb36dc9626c68a81de4583f98227bbbab0f88a5070e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2325.exe
    Filesize

    311KB

    MD5

    1fa2e9eea11c814a3e9538fe75d5cc86

    SHA1

    6c267f701406435ae56c46bb899576216f31766c

    SHA256

    d2b9bef38a101ffbbf68e3867d2eb6217c9cd97a6c80d7c0aee649ffe510c3c6

    SHA512

    a449c80cfe13f1390c94ec67ec7627dbabbb8c4260cd5bd309f8fb46608ed5fdb43a1d790174f015a693ffb36dc9626c68a81de4583f98227bbbab0f88a5070e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2325.exe
    Filesize

    311KB

    MD5

    1fa2e9eea11c814a3e9538fe75d5cc86

    SHA1

    6c267f701406435ae56c46bb899576216f31766c

    SHA256

    d2b9bef38a101ffbbf68e3867d2eb6217c9cd97a6c80d7c0aee649ffe510c3c6

    SHA512

    a449c80cfe13f1390c94ec67ec7627dbabbb8c4260cd5bd309f8fb46608ed5fdb43a1d790174f015a693ffb36dc9626c68a81de4583f98227bbbab0f88a5070e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4473.exe
    Filesize

    370KB

    MD5

    20c0a5ac2530df5146eb925fded8b7a4

    SHA1

    df094dbdb9050f66300f8e6058714468bf1ac769

    SHA256

    dd5a3d5e88746aefd340f6ad09cd1f5d74f5a665acedd8decf2c4d83e6eac192

    SHA512

    980ee9aa79919fdecbd0f69ad1d06b8efb7234f05b56dde6d57307ad2c2cd62e1a86e1b1ef5e701e8a573e60fc0cd6c0324944be3ce8d4e7d4283506ae760e87

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4473.exe
    Filesize

    370KB

    MD5

    20c0a5ac2530df5146eb925fded8b7a4

    SHA1

    df094dbdb9050f66300f8e6058714468bf1ac769

    SHA256

    dd5a3d5e88746aefd340f6ad09cd1f5d74f5a665acedd8decf2c4d83e6eac192

    SHA512

    980ee9aa79919fdecbd0f69ad1d06b8efb7234f05b56dde6d57307ad2c2cd62e1a86e1b1ef5e701e8a573e60fc0cd6c0324944be3ce8d4e7d4283506ae760e87

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4473.exe
    Filesize

    370KB

    MD5

    20c0a5ac2530df5146eb925fded8b7a4

    SHA1

    df094dbdb9050f66300f8e6058714468bf1ac769

    SHA256

    dd5a3d5e88746aefd340f6ad09cd1f5d74f5a665acedd8decf2c4d83e6eac192

    SHA512

    980ee9aa79919fdecbd0f69ad1d06b8efb7234f05b56dde6d57307ad2c2cd62e1a86e1b1ef5e701e8a573e60fc0cd6c0324944be3ce8d4e7d4283506ae760e87

  • memory/392-141-0x00000000026D0000-0x000000000270F000-memory.dmp
    Filesize

    252KB

  • memory/392-154-0x00000000026D0000-0x000000000270F000-memory.dmp
    Filesize

    252KB

  • memory/392-1033-0x0000000004FD0000-0x0000000005010000-memory.dmp
    Filesize

    256KB

  • memory/392-160-0x00000000026D0000-0x000000000270F000-memory.dmp
    Filesize

    252KB

  • memory/392-158-0x00000000026D0000-0x000000000270F000-memory.dmp
    Filesize

    252KB

  • memory/392-156-0x00000000026D0000-0x000000000270F000-memory.dmp
    Filesize

    252KB

  • memory/392-149-0x00000000026D0000-0x000000000270F000-memory.dmp
    Filesize

    252KB

  • memory/392-153-0x0000000004FD0000-0x0000000005010000-memory.dmp
    Filesize

    256KB

  • memory/392-152-0x0000000004FD0000-0x0000000005010000-memory.dmp
    Filesize

    256KB

  • memory/392-150-0x00000000002A0000-0x00000000002EB000-memory.dmp
    Filesize

    300KB

  • memory/392-147-0x00000000026D0000-0x000000000270F000-memory.dmp
    Filesize

    252KB

  • memory/392-145-0x00000000026D0000-0x000000000270F000-memory.dmp
    Filesize

    252KB

  • memory/392-143-0x00000000026D0000-0x000000000270F000-memory.dmp
    Filesize

    252KB

  • memory/392-139-0x00000000026D0000-0x000000000270F000-memory.dmp
    Filesize

    252KB

  • memory/392-137-0x00000000026D0000-0x000000000270F000-memory.dmp
    Filesize

    252KB

  • memory/392-135-0x00000000026D0000-0x000000000270F000-memory.dmp
    Filesize

    252KB

  • memory/392-133-0x00000000026D0000-0x000000000270F000-memory.dmp
    Filesize

    252KB

  • memory/392-122-0x0000000002570000-0x00000000025B6000-memory.dmp
    Filesize

    280KB

  • memory/392-123-0x00000000026D0000-0x0000000002714000-memory.dmp
    Filesize

    272KB

  • memory/392-124-0x00000000026D0000-0x000000000270F000-memory.dmp
    Filesize

    252KB

  • memory/392-125-0x00000000026D0000-0x000000000270F000-memory.dmp
    Filesize

    252KB

  • memory/392-127-0x00000000026D0000-0x000000000270F000-memory.dmp
    Filesize

    252KB

  • memory/392-129-0x00000000026D0000-0x000000000270F000-memory.dmp
    Filesize

    252KB

  • memory/392-131-0x00000000026D0000-0x000000000270F000-memory.dmp
    Filesize

    252KB

  • memory/976-97-0x0000000000D00000-0x0000000000D12000-memory.dmp
    Filesize

    72KB

  • memory/976-99-0x0000000000D00000-0x0000000000D12000-memory.dmp
    Filesize

    72KB

  • memory/976-85-0x0000000000D00000-0x0000000000D12000-memory.dmp
    Filesize

    72KB

  • memory/976-91-0x0000000000D00000-0x0000000000D12000-memory.dmp
    Filesize

    72KB

  • memory/976-83-0x0000000000D00000-0x0000000000D12000-memory.dmp
    Filesize

    72KB

  • memory/976-93-0x0000000000D00000-0x0000000000D12000-memory.dmp
    Filesize

    72KB

  • memory/976-95-0x0000000000D00000-0x0000000000D12000-memory.dmp
    Filesize

    72KB

  • memory/976-111-0x0000000000400000-0x0000000000802000-memory.dmp
    Filesize

    4.0MB

  • memory/976-110-0x0000000000400000-0x0000000000802000-memory.dmp
    Filesize

    4.0MB

  • memory/976-107-0x0000000000D00000-0x0000000000D12000-memory.dmp
    Filesize

    72KB

  • memory/976-89-0x0000000000D00000-0x0000000000D12000-memory.dmp
    Filesize

    72KB

  • memory/976-109-0x0000000004DF0000-0x0000000004E30000-memory.dmp
    Filesize

    256KB

  • memory/976-108-0x0000000000810000-0x000000000083D000-memory.dmp
    Filesize

    180KB

  • memory/976-105-0x0000000000D00000-0x0000000000D12000-memory.dmp
    Filesize

    72KB

  • memory/976-103-0x0000000000D00000-0x0000000000D12000-memory.dmp
    Filesize

    72KB

  • memory/976-101-0x0000000000D00000-0x0000000000D12000-memory.dmp
    Filesize

    72KB

  • memory/976-87-0x0000000000D00000-0x0000000000D12000-memory.dmp
    Filesize

    72KB

  • memory/976-81-0x0000000000D00000-0x0000000000D12000-memory.dmp
    Filesize

    72KB

  • memory/976-80-0x0000000000D00000-0x0000000000D12000-memory.dmp
    Filesize

    72KB

  • memory/976-79-0x0000000000D00000-0x0000000000D18000-memory.dmp
    Filesize

    96KB

  • memory/976-78-0x0000000000C80000-0x0000000000C9A000-memory.dmp
    Filesize

    104KB

  • memory/1604-1042-0x0000000000CA0000-0x0000000000CD2000-memory.dmp
    Filesize

    200KB

  • memory/1604-1043-0x0000000004F50000-0x0000000004F90000-memory.dmp
    Filesize

    256KB