Analysis

  • max time kernel
    56s
  • max time network
    180s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 22:17

General

  • Target

    0aecf11fb98a5045f666edc9e6e68faf0bd14b12ced0a6428f537ee0cc8a8d92.exe

  • Size

    696KB

  • MD5

    bee9dc99215683e165d22a7db4fd2056

  • SHA1

    5df6371475f7f0ccd792546fdc69789e8a776aba

  • SHA256

    0aecf11fb98a5045f666edc9e6e68faf0bd14b12ced0a6428f537ee0cc8a8d92

  • SHA512

    739c1d0488108faebfbecf8242fd52f78f360f0235906e45ce5dbd4f70e3bc8c09141ace9db5c4a85469a991819e0025292bef8e7f9b0749f8823fdd2ef9510d

  • SSDEEP

    12288:DMruy901YOD1IGtQxfAVrSYv3pxov7OyP1KYuzqb5JJ1K1BfhGQo:5ySDIGtQxg3Mv7OyP1x6q1FAZA

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0aecf11fb98a5045f666edc9e6e68faf0bd14b12ced0a6428f537ee0cc8a8d92.exe
    "C:\Users\Admin\AppData\Local\Temp\0aecf11fb98a5045f666edc9e6e68faf0bd14b12ced0a6428f537ee0cc8a8d92.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3540
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un270818.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un270818.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4188
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2440.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2440.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4376
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8401.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8401.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3064
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si919824.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si919824.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4568

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si919824.exe

    Filesize

    175KB

    MD5

    b0aa0d4ab5e87d34c1c274818726bef3

    SHA1

    d0807f84d2790bcaecac670d4b65dad67e421244

    SHA256

    2823bab5b1522fbb332133fb4ea6da2ec5e2af8d039d190af123fad73f702aa5

    SHA512

    cad890de094f7faa2171954689706140fb2cd0721f0ab173deb44655d8e9a68d43075c526e623c5f166d3ae1e8bc8510899481cd496057606345008a957469f9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si919824.exe

    Filesize

    175KB

    MD5

    b0aa0d4ab5e87d34c1c274818726bef3

    SHA1

    d0807f84d2790bcaecac670d4b65dad67e421244

    SHA256

    2823bab5b1522fbb332133fb4ea6da2ec5e2af8d039d190af123fad73f702aa5

    SHA512

    cad890de094f7faa2171954689706140fb2cd0721f0ab173deb44655d8e9a68d43075c526e623c5f166d3ae1e8bc8510899481cd496057606345008a957469f9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un270818.exe

    Filesize

    554KB

    MD5

    c400b703688b53db9de1d9d9fad421d2

    SHA1

    b2ec48a21fa09c5b7af98728dc3fdd1849f7213b

    SHA256

    15a0527410f1ed7967374a12ce96ae481cc4cefb60d53223c04b0dac12ba1de4

    SHA512

    1e46b0b38c4e68983d69cba9ec5bdc1f06d1628584c2df70cd268e8d21df0f38564f72111082fe07abafccc558786ba590058260f27b4cab5e96cca35fc6de3e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un270818.exe

    Filesize

    554KB

    MD5

    c400b703688b53db9de1d9d9fad421d2

    SHA1

    b2ec48a21fa09c5b7af98728dc3fdd1849f7213b

    SHA256

    15a0527410f1ed7967374a12ce96ae481cc4cefb60d53223c04b0dac12ba1de4

    SHA512

    1e46b0b38c4e68983d69cba9ec5bdc1f06d1628584c2df70cd268e8d21df0f38564f72111082fe07abafccc558786ba590058260f27b4cab5e96cca35fc6de3e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2440.exe

    Filesize

    308KB

    MD5

    f8b92159c49c12355886085d2e345a5d

    SHA1

    c590bd7699bb584be49f8063def3eb186eb7c66a

    SHA256

    8205bb6dae1a705fe936462892a1a7d4bf2d23e3f095cc054a8b5afeeb9ad974

    SHA512

    e8e78c593d050d6a8de1c0d82687eb3ecdb87c9e9114736625e9cd11c4b48136112f0565f281bc30ae918afc71aadfceabc7c292171bc302999e14d11a40770f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2440.exe

    Filesize

    308KB

    MD5

    f8b92159c49c12355886085d2e345a5d

    SHA1

    c590bd7699bb584be49f8063def3eb186eb7c66a

    SHA256

    8205bb6dae1a705fe936462892a1a7d4bf2d23e3f095cc054a8b5afeeb9ad974

    SHA512

    e8e78c593d050d6a8de1c0d82687eb3ecdb87c9e9114736625e9cd11c4b48136112f0565f281bc30ae918afc71aadfceabc7c292171bc302999e14d11a40770f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8401.exe

    Filesize

    366KB

    MD5

    b949a30018b5cd5a9162a52e32ce008e

    SHA1

    24b630854436711740f5f0db82aea3f116f47ab9

    SHA256

    800642d5c4732fab640635f3e0220f6bc61854dab394f31f347f85b065155c8d

    SHA512

    9188796e10c346a06ad046fee805c7c2bc981f5d2b1b2358c8ec4cdb048d1e6fe9bc370a4e84a3129fbfcc6d1bfbf130801b9884b8fe242f107d9137591794ac

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8401.exe

    Filesize

    366KB

    MD5

    b949a30018b5cd5a9162a52e32ce008e

    SHA1

    24b630854436711740f5f0db82aea3f116f47ab9

    SHA256

    800642d5c4732fab640635f3e0220f6bc61854dab394f31f347f85b065155c8d

    SHA512

    9188796e10c346a06ad046fee805c7c2bc981f5d2b1b2358c8ec4cdb048d1e6fe9bc370a4e84a3129fbfcc6d1bfbf130801b9884b8fe242f107d9137591794ac

  • memory/3064-1089-0x00000000053C0000-0x00000000059C6000-memory.dmp

    Filesize

    6.0MB

  • memory/3064-1090-0x0000000004DA0000-0x0000000004EAA000-memory.dmp

    Filesize

    1.0MB

  • memory/3064-1105-0x0000000008200000-0x0000000008250000-memory.dmp

    Filesize

    320KB

  • memory/3064-188-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3064-1104-0x00000000025E0000-0x0000000002656000-memory.dmp

    Filesize

    472KB

  • memory/3064-191-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/3064-1103-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/3064-1102-0x00000000068D0000-0x0000000006DFC000-memory.dmp

    Filesize

    5.2MB

  • memory/3064-1101-0x00000000066E0000-0x00000000068A2000-memory.dmp

    Filesize

    1.8MB

  • memory/3064-1100-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/3064-1099-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/3064-1098-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/3064-1097-0x00000000063D0000-0x0000000006462000-memory.dmp

    Filesize

    584KB

  • memory/3064-1095-0x0000000005D00000-0x0000000005D66000-memory.dmp

    Filesize

    408KB

  • memory/3064-1094-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/3064-1093-0x0000000005B70000-0x0000000005BBB000-memory.dmp

    Filesize

    300KB

  • memory/3064-1092-0x0000000005A20000-0x0000000005A5E000-memory.dmp

    Filesize

    248KB

  • memory/3064-1091-0x0000000005A00000-0x0000000005A12000-memory.dmp

    Filesize

    72KB

  • memory/3064-192-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3064-200-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3064-216-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3064-214-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3064-212-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3064-210-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3064-208-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3064-177-0x00000000027E0000-0x0000000002826000-memory.dmp

    Filesize

    280KB

  • memory/3064-178-0x0000000004CE0000-0x0000000004D24000-memory.dmp

    Filesize

    272KB

  • memory/3064-179-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3064-180-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3064-182-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3064-184-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3064-186-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/3064-187-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/3064-189-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/3064-206-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3064-204-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3064-202-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3064-194-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3064-196-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3064-198-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/4376-167-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4376-137-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4376-145-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4376-141-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4376-135-0x00000000026E0000-0x00000000026F8000-memory.dmp

    Filesize

    96KB

  • memory/4376-136-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4376-172-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4376-170-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/4376-169-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/4376-134-0x0000000004E30000-0x000000000532E000-memory.dmp

    Filesize

    5.0MB

  • memory/4376-168-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/4376-166-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/4376-163-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4376-165-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/4376-164-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/4376-161-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4376-159-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4376-157-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4376-155-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4376-153-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4376-151-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4376-149-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4376-147-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4376-143-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4376-139-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4376-133-0x0000000002670000-0x000000000268A000-memory.dmp

    Filesize

    104KB

  • memory/4376-132-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4568-1111-0x0000000000220000-0x0000000000252000-memory.dmp

    Filesize

    200KB

  • memory/4568-1112-0x0000000004C60000-0x0000000004CAB000-memory.dmp

    Filesize

    300KB

  • memory/4568-1113-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

    Filesize

    64KB

  • memory/4568-1114-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

    Filesize

    64KB