Analysis

  • max time kernel
    54s
  • max time network
    72s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 21:38

General

  • Target

    527b6330923fc0dbcc9c673d4a3d46a23f0865a8c14fdae986b1505fae88cc40.exe

  • Size

    700KB

  • MD5

    a75cd6eb7d6470611bb6c529f6ced8e1

  • SHA1

    7b2d31688f1b246ea0b6f432e1242eb8b789a2ff

  • SHA256

    527b6330923fc0dbcc9c673d4a3d46a23f0865a8c14fdae986b1505fae88cc40

  • SHA512

    bb3cf8e6432b12f420a4f17b8b735f880be06e67761a3f1e24975a4f69e0a59c34b2f03ec0ee2a6e379b95ee8ce35dc687fc695d7d967ba8696eed087825143c

  • SSDEEP

    12288:QMruy90YkmmEhMM9DNYcAk8F5sPgq6UxPLjGfPwYkC7Ck1:uyF5mFNk8zsPB6UFEPwLC7Z1

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 23 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\527b6330923fc0dbcc9c673d4a3d46a23f0865a8c14fdae986b1505fae88cc40.exe
    "C:\Users\Admin\AppData\Local\Temp\527b6330923fc0dbcc9c673d4a3d46a23f0865a8c14fdae986b1505fae88cc40.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un415629.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un415629.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3276
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4861.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4861.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3748
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0302.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0302.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2032
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si848725.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si848725.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3156

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si848725.exe

    Filesize

    175KB

    MD5

    a45a35496ef11c9b3b17d934ce9b901a

    SHA1

    58a1002cd0a7a660336f6581e4f19407705edc3e

    SHA256

    38016703e867bd6c7af35e0063f556d6f5006b55ff8533cd2b0eb1a3033e06f5

    SHA512

    6689ffb64190d80fde2557422c9843185e61bba61ed4e0b7446e62156d82c18c3fb6d7c494d06aa37afdad2c1eeb2950b7628ac76d7bda5b586422e2f0e38100

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si848725.exe

    Filesize

    175KB

    MD5

    a45a35496ef11c9b3b17d934ce9b901a

    SHA1

    58a1002cd0a7a660336f6581e4f19407705edc3e

    SHA256

    38016703e867bd6c7af35e0063f556d6f5006b55ff8533cd2b0eb1a3033e06f5

    SHA512

    6689ffb64190d80fde2557422c9843185e61bba61ed4e0b7446e62156d82c18c3fb6d7c494d06aa37afdad2c1eeb2950b7628ac76d7bda5b586422e2f0e38100

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un415629.exe

    Filesize

    558KB

    MD5

    08673c2c734253029280fc7fdda305f1

    SHA1

    d76bd8a2026cee5f988bf2a49549ec41f6d38457

    SHA256

    5c58e01e7aaee091a35a271ca3cc83693a1af4c8988236596a9d9aa7c11ece87

    SHA512

    e556859fc560ec2537001bd5b57f2fc987bc145b937a2bc17b21a4dac974f0d36b00364a0b41a3192702bb08232465f9d907c9060aa49737442d1f70d2ae448e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un415629.exe

    Filesize

    558KB

    MD5

    08673c2c734253029280fc7fdda305f1

    SHA1

    d76bd8a2026cee5f988bf2a49549ec41f6d38457

    SHA256

    5c58e01e7aaee091a35a271ca3cc83693a1af4c8988236596a9d9aa7c11ece87

    SHA512

    e556859fc560ec2537001bd5b57f2fc987bc145b937a2bc17b21a4dac974f0d36b00364a0b41a3192702bb08232465f9d907c9060aa49737442d1f70d2ae448e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4861.exe

    Filesize

    307KB

    MD5

    9f94dbd8ac86b6ffb23515258c93de2c

    SHA1

    065556d31c637bc05b2872a71ff1a641abc09034

    SHA256

    cc9e73307ccd7595903319298d7f872c3261833a7a6b6080c983478a5c8a6ce9

    SHA512

    2741d8a470b0b2cffd60e65806977f4f3dc3654332701556a559ab2738abddc0c69b1bf23dd5a9a6925b1f9cb2300432f6ab38a5c2e85855454b702ece5e8f1d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4861.exe

    Filesize

    307KB

    MD5

    9f94dbd8ac86b6ffb23515258c93de2c

    SHA1

    065556d31c637bc05b2872a71ff1a641abc09034

    SHA256

    cc9e73307ccd7595903319298d7f872c3261833a7a6b6080c983478a5c8a6ce9

    SHA512

    2741d8a470b0b2cffd60e65806977f4f3dc3654332701556a559ab2738abddc0c69b1bf23dd5a9a6925b1f9cb2300432f6ab38a5c2e85855454b702ece5e8f1d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0302.exe

    Filesize

    365KB

    MD5

    383f8dbfaaf5c2458544ac59ee4fb6a7

    SHA1

    50301b32ad7df7aae22ecd43898970e3a73ac280

    SHA256

    f28b2844cbac41c1661d53e49f859685fa9cb47d8cb67ca122496fa92d1c8e68

    SHA512

    a7bedeb1c858daa1094815c855f2af403c8771d6cc7730a6fc862df9fcbfd15beacedfc0adda4d7a9f1e4fa76149dacb5c99ff07344ea07595bd3e365c725499

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0302.exe

    Filesize

    365KB

    MD5

    383f8dbfaaf5c2458544ac59ee4fb6a7

    SHA1

    50301b32ad7df7aae22ecd43898970e3a73ac280

    SHA256

    f28b2844cbac41c1661d53e49f859685fa9cb47d8cb67ca122496fa92d1c8e68

    SHA512

    a7bedeb1c858daa1094815c855f2af403c8771d6cc7730a6fc862df9fcbfd15beacedfc0adda4d7a9f1e4fa76149dacb5c99ff07344ea07595bd3e365c725499

  • memory/2032-1092-0x0000000005530000-0x0000000005542000-memory.dmp

    Filesize

    72KB

  • memory/2032-178-0x00000000020B0000-0x00000000020FB000-memory.dmp

    Filesize

    300KB

  • memory/2032-506-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/2032-214-0x0000000005200000-0x000000000523F000-memory.dmp

    Filesize

    252KB

  • memory/2032-212-0x0000000005200000-0x000000000523F000-memory.dmp

    Filesize

    252KB

  • memory/2032-198-0x0000000005200000-0x000000000523F000-memory.dmp

    Filesize

    252KB

  • memory/2032-210-0x0000000005200000-0x000000000523F000-memory.dmp

    Filesize

    252KB

  • memory/2032-1107-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/2032-1106-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/2032-1105-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/2032-200-0x0000000005200000-0x000000000523F000-memory.dmp

    Filesize

    252KB

  • memory/2032-1104-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/2032-1103-0x00000000068A0000-0x0000000006DCC000-memory.dmp

    Filesize

    5.2MB

  • memory/2032-1102-0x00000000066C0000-0x0000000006882000-memory.dmp

    Filesize

    1.8MB

  • memory/2032-1101-0x0000000006640000-0x0000000006690000-memory.dmp

    Filesize

    320KB

  • memory/2032-1100-0x00000000020B0000-0x00000000020FB000-memory.dmp

    Filesize

    300KB

  • memory/2032-1099-0x00000000065A0000-0x0000000006616000-memory.dmp

    Filesize

    472KB

  • memory/2032-1097-0x00000000058D0000-0x0000000005936000-memory.dmp

    Filesize

    408KB

  • memory/2032-1096-0x0000000005830000-0x00000000058C2000-memory.dmp

    Filesize

    584KB

  • memory/2032-1095-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/2032-1094-0x00000000056A0000-0x00000000056EB000-memory.dmp

    Filesize

    300KB

  • memory/2032-1093-0x0000000005550000-0x000000000558E000-memory.dmp

    Filesize

    248KB

  • memory/2032-1091-0x00000000053F0000-0x00000000054FA000-memory.dmp

    Filesize

    1.0MB

  • memory/2032-507-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/2032-179-0x0000000004B00000-0x0000000004B46000-memory.dmp

    Filesize

    280KB

  • memory/2032-180-0x0000000005200000-0x0000000005244000-memory.dmp

    Filesize

    272KB

  • memory/2032-181-0x0000000005200000-0x000000000523F000-memory.dmp

    Filesize

    252KB

  • memory/2032-182-0x0000000005200000-0x000000000523F000-memory.dmp

    Filesize

    252KB

  • memory/2032-184-0x0000000005200000-0x000000000523F000-memory.dmp

    Filesize

    252KB

  • memory/2032-196-0x0000000005200000-0x000000000523F000-memory.dmp

    Filesize

    252KB

  • memory/2032-188-0x0000000005200000-0x000000000523F000-memory.dmp

    Filesize

    252KB

  • memory/2032-190-0x0000000005200000-0x000000000523F000-memory.dmp

    Filesize

    252KB

  • memory/2032-192-0x0000000005200000-0x000000000523F000-memory.dmp

    Filesize

    252KB

  • memory/2032-194-0x0000000005200000-0x000000000523F000-memory.dmp

    Filesize

    252KB

  • memory/2032-186-0x0000000005200000-0x000000000523F000-memory.dmp

    Filesize

    252KB

  • memory/2032-1090-0x0000000005990000-0x0000000005F96000-memory.dmp

    Filesize

    6.0MB

  • memory/2032-510-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/2032-202-0x0000000005200000-0x000000000523F000-memory.dmp

    Filesize

    252KB

  • memory/2032-204-0x0000000005200000-0x000000000523F000-memory.dmp

    Filesize

    252KB

  • memory/2032-206-0x0000000005200000-0x000000000523F000-memory.dmp

    Filesize

    252KB

  • memory/2032-208-0x0000000005200000-0x000000000523F000-memory.dmp

    Filesize

    252KB

  • memory/3156-1113-0x0000000000590000-0x00000000005C2000-memory.dmp

    Filesize

    200KB

  • memory/3156-1114-0x0000000004E80000-0x0000000004E90000-memory.dmp

    Filesize

    64KB

  • memory/3156-1115-0x0000000004E10000-0x0000000004E5B000-memory.dmp

    Filesize

    300KB

  • memory/3156-1116-0x0000000004E80000-0x0000000004E90000-memory.dmp

    Filesize

    64KB

  • memory/3748-170-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/3748-157-0x0000000002310000-0x0000000002322000-memory.dmp

    Filesize

    72KB

  • memory/3748-147-0x0000000002310000-0x0000000002322000-memory.dmp

    Filesize

    72KB

  • memory/3748-138-0x0000000004F30000-0x000000000542E000-memory.dmp

    Filesize

    5.0MB

  • memory/3748-137-0x0000000002210000-0x000000000222A000-memory.dmp

    Filesize

    104KB

  • memory/3748-139-0x0000000002310000-0x0000000002328000-memory.dmp

    Filesize

    96KB

  • memory/3748-173-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/3748-171-0x0000000004F20000-0x0000000004F30000-memory.dmp

    Filesize

    64KB

  • memory/3748-141-0x0000000002310000-0x0000000002322000-memory.dmp

    Filesize

    72KB

  • memory/3748-169-0x0000000004F20000-0x0000000004F30000-memory.dmp

    Filesize

    64KB

  • memory/3748-168-0x0000000004F20000-0x0000000004F30000-memory.dmp

    Filesize

    64KB

  • memory/3748-167-0x0000000002310000-0x0000000002322000-memory.dmp

    Filesize

    72KB

  • memory/3748-165-0x0000000002310000-0x0000000002322000-memory.dmp

    Filesize

    72KB

  • memory/3748-163-0x0000000002310000-0x0000000002322000-memory.dmp

    Filesize

    72KB

  • memory/3748-161-0x0000000002310000-0x0000000002322000-memory.dmp

    Filesize

    72KB

  • memory/3748-159-0x0000000002310000-0x0000000002322000-memory.dmp

    Filesize

    72KB

  • memory/3748-155-0x0000000002310000-0x0000000002322000-memory.dmp

    Filesize

    72KB

  • memory/3748-153-0x0000000002310000-0x0000000002322000-memory.dmp

    Filesize

    72KB

  • memory/3748-151-0x0000000002310000-0x0000000002322000-memory.dmp

    Filesize

    72KB

  • memory/3748-136-0x0000000004F20000-0x0000000004F30000-memory.dmp

    Filesize

    64KB

  • memory/3748-135-0x0000000000710000-0x000000000073D000-memory.dmp

    Filesize

    180KB

  • memory/3748-149-0x0000000002310000-0x0000000002322000-memory.dmp

    Filesize

    72KB

  • memory/3748-145-0x0000000002310000-0x0000000002322000-memory.dmp

    Filesize

    72KB

  • memory/3748-140-0x0000000002310000-0x0000000002322000-memory.dmp

    Filesize

    72KB

  • memory/3748-143-0x0000000002310000-0x0000000002322000-memory.dmp

    Filesize

    72KB