Analysis

  • max time kernel
    58s
  • max time network
    61s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 21:52

General

  • Target

    f83e761a6ad7256dd6086d18c7f7d060fb2b82fd37d3101a11bc68b1130d84e8.exe

  • Size

    701KB

  • MD5

    a3d482fe859d2d710e1334ca6baeb8e1

  • SHA1

    6a3bb999a945dffbb3e51c5405b005893cc50d03

  • SHA256

    f83e761a6ad7256dd6086d18c7f7d060fb2b82fd37d3101a11bc68b1130d84e8

  • SHA512

    adfcbe7b46cc4d33beaa82a68bbffc264360529f3aa418d32f834ab7486f7ce6c80778d3f2386e964eee387de83d27531156b6cc9efcaa02db41d449076ccb16

  • SSDEEP

    12288:/Mrvy90VonkWiO5bbY9ZuR4X6/VmNdPoTYD/mWfyehtanH0+/og:cyJnPNhV2oTz5ebkHZF

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f83e761a6ad7256dd6086d18c7f7d060fb2b82fd37d3101a11bc68b1130d84e8.exe
    "C:\Users\Admin\AppData\Local\Temp\f83e761a6ad7256dd6086d18c7f7d060fb2b82fd37d3101a11bc68b1130d84e8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2448
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un692642.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un692642.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6413.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6413.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3776
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8661.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8661.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4120
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si121732.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si121732.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4792

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si121732.exe

    Filesize

    175KB

    MD5

    e65acd526be6da8f6f3853a4697e055a

    SHA1

    14e8e8a7a9a988919ac724a9c32c358bfba2ce09

    SHA256

    b318d3112373935149a682d4a4565afda4f44cc8355e23837fcf491e91fb9353

    SHA512

    af05669e9bdfa1cc9a266badb182be0bb5fd49b7f61eeb997d62def87ef18d4797033d24d6561b408db96ec146e4620f6eeea3a633f6b5bd851121f1f87b1b15

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si121732.exe

    Filesize

    175KB

    MD5

    e65acd526be6da8f6f3853a4697e055a

    SHA1

    14e8e8a7a9a988919ac724a9c32c358bfba2ce09

    SHA256

    b318d3112373935149a682d4a4565afda4f44cc8355e23837fcf491e91fb9353

    SHA512

    af05669e9bdfa1cc9a266badb182be0bb5fd49b7f61eeb997d62def87ef18d4797033d24d6561b408db96ec146e4620f6eeea3a633f6b5bd851121f1f87b1b15

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un692642.exe

    Filesize

    558KB

    MD5

    8fc07e95f97444392383f44f265ece49

    SHA1

    53495d762fe2ddd9be510579b2c88691490633cc

    SHA256

    3ca58684d63bd727b19b0ca48debb06b83e9baa3fcf5ae39f64c5f7cda23bb1d

    SHA512

    f97570443896cf86962c805cfdb15bf83967be8622aa298140710180d2f869820cc03e5c73456c82b8041ae96e7631268a0aa21a40a54817fe872fd7b6beb250

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un692642.exe

    Filesize

    558KB

    MD5

    8fc07e95f97444392383f44f265ece49

    SHA1

    53495d762fe2ddd9be510579b2c88691490633cc

    SHA256

    3ca58684d63bd727b19b0ca48debb06b83e9baa3fcf5ae39f64c5f7cda23bb1d

    SHA512

    f97570443896cf86962c805cfdb15bf83967be8622aa298140710180d2f869820cc03e5c73456c82b8041ae96e7631268a0aa21a40a54817fe872fd7b6beb250

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6413.exe

    Filesize

    307KB

    MD5

    b6d1f30a4acbd67d7e6d547a9d6ff5d8

    SHA1

    924539bac145eb8c80192f35929d89b1fbcd14be

    SHA256

    6537651a78071a99a4b29f4f4740f325a5b2757c8ee944a22bc32da6ba15d17e

    SHA512

    3eed3eb77c148bb9fa593b4b683e371b8b8d45568b1e5ab7e09b2a35dbf707a999e2b2f5630bac81dce7c30c3da59cedae6a0a480ef50037904ed5fb2c255a3f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6413.exe

    Filesize

    307KB

    MD5

    b6d1f30a4acbd67d7e6d547a9d6ff5d8

    SHA1

    924539bac145eb8c80192f35929d89b1fbcd14be

    SHA256

    6537651a78071a99a4b29f4f4740f325a5b2757c8ee944a22bc32da6ba15d17e

    SHA512

    3eed3eb77c148bb9fa593b4b683e371b8b8d45568b1e5ab7e09b2a35dbf707a999e2b2f5630bac81dce7c30c3da59cedae6a0a480ef50037904ed5fb2c255a3f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8661.exe

    Filesize

    365KB

    MD5

    0fc9571cbd69153877bb474829ba719b

    SHA1

    585d4cab340dc75f7df5bf973d4a724bb5f306b2

    SHA256

    358f77e10ad6f5650ef6a570023e4efe9281025fd11796a7efa66ffbe217ceb2

    SHA512

    d854c25a584e94e710b1f335f9bfab80ae9228c1f6199464edc154cfecf653638f4b13051e7b4f9e042b4759ae7c2d039ab614ee00c6abf5008e053e4e9f6cdf

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8661.exe

    Filesize

    365KB

    MD5

    0fc9571cbd69153877bb474829ba719b

    SHA1

    585d4cab340dc75f7df5bf973d4a724bb5f306b2

    SHA256

    358f77e10ad6f5650ef6a570023e4efe9281025fd11796a7efa66ffbe217ceb2

    SHA512

    d854c25a584e94e710b1f335f9bfab80ae9228c1f6199464edc154cfecf653638f4b13051e7b4f9e042b4759ae7c2d039ab614ee00c6abf5008e053e4e9f6cdf

  • memory/3776-136-0x0000000000810000-0x000000000083D000-memory.dmp

    Filesize

    180KB

  • memory/3776-137-0x0000000002760000-0x000000000277A000-memory.dmp

    Filesize

    104KB

  • memory/3776-138-0x0000000004CA0000-0x000000000519E000-memory.dmp

    Filesize

    5.0MB

  • memory/3776-139-0x0000000004C30000-0x0000000004C48000-memory.dmp

    Filesize

    96KB

  • memory/3776-140-0x0000000004C90000-0x0000000004CA0000-memory.dmp

    Filesize

    64KB

  • memory/3776-141-0x0000000004C90000-0x0000000004CA0000-memory.dmp

    Filesize

    64KB

  • memory/3776-142-0x0000000004C90000-0x0000000004CA0000-memory.dmp

    Filesize

    64KB

  • memory/3776-143-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/3776-144-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/3776-146-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/3776-148-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/3776-150-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/3776-152-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/3776-154-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/3776-156-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/3776-158-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/3776-160-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/3776-162-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/3776-164-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/3776-166-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/3776-168-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/3776-170-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/3776-171-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/3776-172-0x0000000004C90000-0x0000000004CA0000-memory.dmp

    Filesize

    64KB

  • memory/3776-173-0x0000000004C90000-0x0000000004CA0000-memory.dmp

    Filesize

    64KB

  • memory/3776-174-0x0000000004C90000-0x0000000004CA0000-memory.dmp

    Filesize

    64KB

  • memory/3776-176-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4120-181-0x00000000023D0000-0x0000000002416000-memory.dmp

    Filesize

    280KB

  • memory/4120-182-0x00000000027D0000-0x0000000002814000-memory.dmp

    Filesize

    272KB

  • memory/4120-183-0x00000000027D0000-0x000000000280F000-memory.dmp

    Filesize

    252KB

  • memory/4120-184-0x00000000027D0000-0x000000000280F000-memory.dmp

    Filesize

    252KB

  • memory/4120-186-0x00000000027D0000-0x000000000280F000-memory.dmp

    Filesize

    252KB

  • memory/4120-188-0x00000000027D0000-0x000000000280F000-memory.dmp

    Filesize

    252KB

  • memory/4120-190-0x00000000027D0000-0x000000000280F000-memory.dmp

    Filesize

    252KB

  • memory/4120-192-0x00000000027D0000-0x000000000280F000-memory.dmp

    Filesize

    252KB

  • memory/4120-194-0x00000000027D0000-0x000000000280F000-memory.dmp

    Filesize

    252KB

  • memory/4120-196-0x00000000027D0000-0x000000000280F000-memory.dmp

    Filesize

    252KB

  • memory/4120-198-0x00000000027D0000-0x000000000280F000-memory.dmp

    Filesize

    252KB

  • memory/4120-200-0x00000000027D0000-0x000000000280F000-memory.dmp

    Filesize

    252KB

  • memory/4120-202-0x00000000027D0000-0x000000000280F000-memory.dmp

    Filesize

    252KB

  • memory/4120-204-0x00000000027D0000-0x000000000280F000-memory.dmp

    Filesize

    252KB

  • memory/4120-206-0x00000000027D0000-0x000000000280F000-memory.dmp

    Filesize

    252KB

  • memory/4120-208-0x00000000027D0000-0x000000000280F000-memory.dmp

    Filesize

    252KB

  • memory/4120-210-0x00000000027D0000-0x000000000280F000-memory.dmp

    Filesize

    252KB

  • memory/4120-212-0x00000000027D0000-0x000000000280F000-memory.dmp

    Filesize

    252KB

  • memory/4120-214-0x00000000027D0000-0x000000000280F000-memory.dmp

    Filesize

    252KB

  • memory/4120-216-0x00000000027D0000-0x000000000280F000-memory.dmp

    Filesize

    252KB

  • memory/4120-407-0x0000000000720000-0x000000000076B000-memory.dmp

    Filesize

    300KB

  • memory/4120-408-0x0000000004F30000-0x0000000004F40000-memory.dmp

    Filesize

    64KB

  • memory/4120-410-0x0000000004F30000-0x0000000004F40000-memory.dmp

    Filesize

    64KB

  • memory/4120-411-0x0000000004F30000-0x0000000004F40000-memory.dmp

    Filesize

    64KB

  • memory/4120-1093-0x0000000005440000-0x0000000005A46000-memory.dmp

    Filesize

    6.0MB

  • memory/4120-1094-0x0000000004DA0000-0x0000000004EAA000-memory.dmp

    Filesize

    1.0MB

  • memory/4120-1095-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

    Filesize

    72KB

  • memory/4120-1096-0x0000000005A50000-0x0000000005A8E000-memory.dmp

    Filesize

    248KB

  • memory/4120-1097-0x0000000004F30000-0x0000000004F40000-memory.dmp

    Filesize

    64KB

  • memory/4120-1098-0x0000000005B90000-0x0000000005BDB000-memory.dmp

    Filesize

    300KB

  • memory/4120-1100-0x0000000005D00000-0x0000000005D92000-memory.dmp

    Filesize

    584KB

  • memory/4120-1101-0x0000000005DA0000-0x0000000005E06000-memory.dmp

    Filesize

    408KB

  • memory/4120-1102-0x0000000004F30000-0x0000000004F40000-memory.dmp

    Filesize

    64KB

  • memory/4120-1103-0x0000000004F30000-0x0000000004F40000-memory.dmp

    Filesize

    64KB

  • memory/4120-1104-0x0000000004F30000-0x0000000004F40000-memory.dmp

    Filesize

    64KB

  • memory/4120-1105-0x00000000064A0000-0x0000000006662000-memory.dmp

    Filesize

    1.8MB

  • memory/4120-1106-0x0000000006670000-0x0000000006B9C000-memory.dmp

    Filesize

    5.2MB

  • memory/4120-1107-0x0000000004F30000-0x0000000004F40000-memory.dmp

    Filesize

    64KB

  • memory/4120-1108-0x0000000007060000-0x00000000070D6000-memory.dmp

    Filesize

    472KB

  • memory/4120-1109-0x00000000070E0000-0x0000000007130000-memory.dmp

    Filesize

    320KB

  • memory/4792-1115-0x0000000000E20000-0x0000000000E52000-memory.dmp

    Filesize

    200KB

  • memory/4792-1116-0x00000000056E0000-0x000000000572B000-memory.dmp

    Filesize

    300KB

  • memory/4792-1117-0x00000000056D0000-0x00000000056E0000-memory.dmp

    Filesize

    64KB