Analysis

  • max time kernel
    54s
  • max time network
    57s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 22:08

General

  • Target

    8d26c36d7aad4c6cf8ded7f4ef66b8f19698d927ff59f4efe6ebd4e03a09b87a.exe

  • Size

    699KB

  • MD5

    afeab8491cc55a906e832b0a9f4c3516

  • SHA1

    6360a04d8965a99b9fe5c4c2ede8264422e10d12

  • SHA256

    8d26c36d7aad4c6cf8ded7f4ef66b8f19698d927ff59f4efe6ebd4e03a09b87a

  • SHA512

    e0dc2966f4d2df832e86af1577e6f14c5856c0413308082ffd0c9de02bfee147a3db942a56a6e114a287bffaced4ae33f5a8ec82da09df8e6539617c21840c28

  • SSDEEP

    12288:UMrVy90dlZoa7WWm0p9DoNcAQg8F5lMN/ZiNXBV+1QaAeoSe+r:RyAVEQg8zlMNRiNX6CaAfgr

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d26c36d7aad4c6cf8ded7f4ef66b8f19698d927ff59f4efe6ebd4e03a09b87a.exe
    "C:\Users\Admin\AppData\Local\Temp\8d26c36d7aad4c6cf8ded7f4ef66b8f19698d927ff59f4efe6ebd4e03a09b87a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un359920.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un359920.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2432
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3596.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3596.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2588
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6089.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6089.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4384
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si855656.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si855656.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3900

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si855656.exe

    Filesize

    175KB

    MD5

    cc21a698513f5a6d54a189ca87138b5d

    SHA1

    ddffe978623b1ce01628107e9abfbf70b4464a79

    SHA256

    1d45c2bf736928d1be827ddfc0464bbc27549374b7512eb6d3ee45d52ca08fdb

    SHA512

    ad9fb364d60b79c87395e335860504324fd900098bf9e5788ffbe0332a8fdd01c1dd40e5976c82d76644bfa638c31233e9bcd57c172432a19e11c8cf1be1ffb2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si855656.exe

    Filesize

    175KB

    MD5

    cc21a698513f5a6d54a189ca87138b5d

    SHA1

    ddffe978623b1ce01628107e9abfbf70b4464a79

    SHA256

    1d45c2bf736928d1be827ddfc0464bbc27549374b7512eb6d3ee45d52ca08fdb

    SHA512

    ad9fb364d60b79c87395e335860504324fd900098bf9e5788ffbe0332a8fdd01c1dd40e5976c82d76644bfa638c31233e9bcd57c172432a19e11c8cf1be1ffb2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un359920.exe

    Filesize

    558KB

    MD5

    efb19515ca19f69e752d781a97e4e212

    SHA1

    f9a6e5c9bc8637dcfc5ab3c434137def719fa948

    SHA256

    f5122b9035a1a977ec64bc8fd4ce5c4014cfd1b1c0500fecb348c1b734a37087

    SHA512

    836fb39a283848581d7483129cb9578ad3b8d23502940f890b641c33629a0d0d9966adc2d90d9cfa1b041426c2f2fd47b3e8e07ce0e032512e3b0de7e276702e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un359920.exe

    Filesize

    558KB

    MD5

    efb19515ca19f69e752d781a97e4e212

    SHA1

    f9a6e5c9bc8637dcfc5ab3c434137def719fa948

    SHA256

    f5122b9035a1a977ec64bc8fd4ce5c4014cfd1b1c0500fecb348c1b734a37087

    SHA512

    836fb39a283848581d7483129cb9578ad3b8d23502940f890b641c33629a0d0d9966adc2d90d9cfa1b041426c2f2fd47b3e8e07ce0e032512e3b0de7e276702e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3596.exe

    Filesize

    307KB

    MD5

    3d97b82b583b776fbdeaad67c51b9462

    SHA1

    9237b8e0aef485b872763acdb5adb8ac7c539e00

    SHA256

    5ac5dfcadb5073e66db650664714a7a34313e855fb1aa88aaab3da41126581c1

    SHA512

    775b6844378f3d9c80ab1f7c1ae6a39b428045fcebca2961fd5d857a1c1bf46cc6fd0a58bd779fcb0e024c8112593649374708d9a575e1e952579e9cf4405e0f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3596.exe

    Filesize

    307KB

    MD5

    3d97b82b583b776fbdeaad67c51b9462

    SHA1

    9237b8e0aef485b872763acdb5adb8ac7c539e00

    SHA256

    5ac5dfcadb5073e66db650664714a7a34313e855fb1aa88aaab3da41126581c1

    SHA512

    775b6844378f3d9c80ab1f7c1ae6a39b428045fcebca2961fd5d857a1c1bf46cc6fd0a58bd779fcb0e024c8112593649374708d9a575e1e952579e9cf4405e0f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6089.exe

    Filesize

    365KB

    MD5

    d45e5d94aeed35fd6598ba73ac50ced8

    SHA1

    ff458e286d3756892272bfebd55b83f1fbb7b0fb

    SHA256

    d1f4074bd732be08f2ab83519beb3ce4432042ac7c2ae7d415ae04809cf322a3

    SHA512

    a4318de9d4fc92bd02380e74accf497b70eefd7ee48a73a0725860d30ff03a85bdadb5a82697f065964f7e370b9ccfd5c590f21fc449690e2bcde32f7ad369f3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6089.exe

    Filesize

    365KB

    MD5

    d45e5d94aeed35fd6598ba73ac50ced8

    SHA1

    ff458e286d3756892272bfebd55b83f1fbb7b0fb

    SHA256

    d1f4074bd732be08f2ab83519beb3ce4432042ac7c2ae7d415ae04809cf322a3

    SHA512

    a4318de9d4fc92bd02380e74accf497b70eefd7ee48a73a0725860d30ff03a85bdadb5a82697f065964f7e370b9ccfd5c590f21fc449690e2bcde32f7ad369f3

  • memory/2588-136-0x00000000022D0000-0x00000000022EA000-memory.dmp

    Filesize

    104KB

  • memory/2588-137-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2588-138-0x0000000004F60000-0x0000000004F70000-memory.dmp

    Filesize

    64KB

  • memory/2588-139-0x0000000004F70000-0x000000000546E000-memory.dmp

    Filesize

    5.0MB

  • memory/2588-140-0x00000000024C0000-0x00000000024D8000-memory.dmp

    Filesize

    96KB

  • memory/2588-141-0x0000000004F60000-0x0000000004F70000-memory.dmp

    Filesize

    64KB

  • memory/2588-142-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/2588-143-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/2588-145-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/2588-147-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/2588-149-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/2588-151-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/2588-153-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/2588-155-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/2588-157-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/2588-159-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/2588-161-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/2588-163-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/2588-165-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/2588-167-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/2588-169-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/2588-170-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/2588-171-0x0000000004F60000-0x0000000004F70000-memory.dmp

    Filesize

    64KB

  • memory/2588-172-0x0000000004F60000-0x0000000004F70000-memory.dmp

    Filesize

    64KB

  • memory/2588-173-0x0000000004F60000-0x0000000004F70000-memory.dmp

    Filesize

    64KB

  • memory/2588-175-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/3900-1114-0x00000000005B0000-0x00000000005E2000-memory.dmp

    Filesize

    200KB

  • memory/3900-1116-0x0000000005140000-0x0000000005150000-memory.dmp

    Filesize

    64KB

  • memory/3900-1115-0x0000000004FF0000-0x000000000503B000-memory.dmp

    Filesize

    300KB

  • memory/4384-183-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4384-330-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/4384-185-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4384-187-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4384-189-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4384-191-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4384-193-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4384-195-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4384-197-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4384-199-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4384-201-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4384-203-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4384-205-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4384-207-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4384-209-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4384-211-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4384-213-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4384-215-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4384-332-0x00000000009A0000-0x00000000009B0000-memory.dmp

    Filesize

    64KB

  • memory/4384-182-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4384-334-0x00000000009A0000-0x00000000009B0000-memory.dmp

    Filesize

    64KB

  • memory/4384-337-0x00000000009A0000-0x00000000009B0000-memory.dmp

    Filesize

    64KB

  • memory/4384-1092-0x0000000005840000-0x0000000005E46000-memory.dmp

    Filesize

    6.0MB

  • memory/4384-1093-0x00000000052B0000-0x00000000053BA000-memory.dmp

    Filesize

    1.0MB

  • memory/4384-1094-0x00000000053F0000-0x0000000005402000-memory.dmp

    Filesize

    72KB

  • memory/4384-1095-0x0000000005410000-0x000000000544E000-memory.dmp

    Filesize

    248KB

  • memory/4384-1096-0x0000000005560000-0x00000000055AB000-memory.dmp

    Filesize

    300KB

  • memory/4384-1097-0x00000000009A0000-0x00000000009B0000-memory.dmp

    Filesize

    64KB

  • memory/4384-1099-0x00000000009A0000-0x00000000009B0000-memory.dmp

    Filesize

    64KB

  • memory/4384-1100-0x00000000009A0000-0x00000000009B0000-memory.dmp

    Filesize

    64KB

  • memory/4384-1101-0x00000000009A0000-0x00000000009B0000-memory.dmp

    Filesize

    64KB

  • memory/4384-1102-0x00000000056F0000-0x0000000005782000-memory.dmp

    Filesize

    584KB

  • memory/4384-1103-0x0000000005790000-0x00000000057F6000-memory.dmp

    Filesize

    408KB

  • memory/4384-1104-0x0000000006480000-0x00000000064F6000-memory.dmp

    Filesize

    472KB

  • memory/4384-1105-0x0000000006510000-0x0000000006560000-memory.dmp

    Filesize

    320KB

  • memory/4384-181-0x00000000051C0000-0x0000000005204000-memory.dmp

    Filesize

    272KB

  • memory/4384-180-0x00000000025D0000-0x0000000002616000-memory.dmp

    Filesize

    280KB

  • memory/4384-1106-0x00000000009A0000-0x00000000009B0000-memory.dmp

    Filesize

    64KB

  • memory/4384-1107-0x00000000065A0000-0x0000000006762000-memory.dmp

    Filesize

    1.8MB

  • memory/4384-1108-0x0000000006770000-0x0000000006C9C000-memory.dmp

    Filesize

    5.2MB