Analysis

  • max time kernel
    53s
  • max time network
    75s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 23:06

General

  • Target

    552b3025b4c6ae816c6103297fe1f28e31f878365d379dc09e1486376b0647f3.exe

  • Size

    700KB

  • MD5

    ea8b05d390c2acb08463fb87b8d3f928

  • SHA1

    af983b5130bba508448012a518e091af0e0b2cd3

  • SHA256

    552b3025b4c6ae816c6103297fe1f28e31f878365d379dc09e1486376b0647f3

  • SHA512

    cfac0429848b2bdecdb9fb670d5e753c09bb6b06f380424ede3ceeac315a98d90e8f1c3bb4b038af7e20091866afc557f552aadc5717c3e2f60c7b3cc1e3ab4b

  • SSDEEP

    12288:SMrTy90KIc0Kj5K0P9DGAcAZNkqOT8x3lx2fjT/YmE:ZyVj5jsqkY3lx2LUb

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\552b3025b4c6ae816c6103297fe1f28e31f878365d379dc09e1486376b0647f3.exe
    "C:\Users\Admin\AppData\Local\Temp\552b3025b4c6ae816c6103297fe1f28e31f878365d379dc09e1486376b0647f3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:8
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un196383.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un196383.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3568
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6872.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6872.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1012
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9176.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9176.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4780
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si276685.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si276685.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4588

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si276685.exe
    Filesize

    175KB

    MD5

    2fc3b3b5da3f70229ea56b9fc8f280a8

    SHA1

    42f8f6ea3655b2ff8c67571650b913eb2ca30afe

    SHA256

    406b0e7616db88ae9c2a335b1c07b08b00abee670298202fbe158dbbe5b32fa4

    SHA512

    7cf95cb470d5c20b9322a251c12920f677428ff6e5f1be22a589cbdbba606639c84adefd42a5e1d37706567b95f3b4db14164894e7f0e93cbbee815647b79a48

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si276685.exe
    Filesize

    175KB

    MD5

    2fc3b3b5da3f70229ea56b9fc8f280a8

    SHA1

    42f8f6ea3655b2ff8c67571650b913eb2ca30afe

    SHA256

    406b0e7616db88ae9c2a335b1c07b08b00abee670298202fbe158dbbe5b32fa4

    SHA512

    7cf95cb470d5c20b9322a251c12920f677428ff6e5f1be22a589cbdbba606639c84adefd42a5e1d37706567b95f3b4db14164894e7f0e93cbbee815647b79a48

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un196383.exe
    Filesize

    558KB

    MD5

    ddab96ec8f658aaccfeef55f9132c767

    SHA1

    a20bf4876b254e8dac6be16059d9ef2575eb282c

    SHA256

    e95c099a276de5c10b9f9cde13659e85dcb1c22868318c8a2ecd8907fd48e414

    SHA512

    d8efe3baea1ec9c6a0e9c527bf766ea53118c0e4bc591424585dcb157509b4d9267f7961785ffe4eccad84b0e0b32e8a5c16d6b96b148802fe3d45b1686847dd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un196383.exe
    Filesize

    558KB

    MD5

    ddab96ec8f658aaccfeef55f9132c767

    SHA1

    a20bf4876b254e8dac6be16059d9ef2575eb282c

    SHA256

    e95c099a276de5c10b9f9cde13659e85dcb1c22868318c8a2ecd8907fd48e414

    SHA512

    d8efe3baea1ec9c6a0e9c527bf766ea53118c0e4bc591424585dcb157509b4d9267f7961785ffe4eccad84b0e0b32e8a5c16d6b96b148802fe3d45b1686847dd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6872.exe
    Filesize

    307KB

    MD5

    d97f174d8d5f808a10635931815cff91

    SHA1

    ddecf50b35e6184d246a73941bf0ecd07c0c2ba1

    SHA256

    70358ce6fddb44a95509f4c29f11bcf92476f797b80fcd8fb88a5abe5c879a18

    SHA512

    3b3ca43f02473b6080a744048c6c3fec5f31a44c293829a94da50ed211b0526414d8aa8aa02bd3b5cf1c3be2b2dfbf5af1baf69c7aeda850b59efdc11df69d22

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6872.exe
    Filesize

    307KB

    MD5

    d97f174d8d5f808a10635931815cff91

    SHA1

    ddecf50b35e6184d246a73941bf0ecd07c0c2ba1

    SHA256

    70358ce6fddb44a95509f4c29f11bcf92476f797b80fcd8fb88a5abe5c879a18

    SHA512

    3b3ca43f02473b6080a744048c6c3fec5f31a44c293829a94da50ed211b0526414d8aa8aa02bd3b5cf1c3be2b2dfbf5af1baf69c7aeda850b59efdc11df69d22

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9176.exe
    Filesize

    365KB

    MD5

    cc46179549220ccb857bb5898e2c571d

    SHA1

    2544ba3a0b28282f81234bd512551d81bd6cebda

    SHA256

    460913b6b37cdb262d7bdf22797f569eefe23a3081a46c4e5b68a2dd11008c39

    SHA512

    b1899c417d4374289aa561eac7b628c694d1df1263d4f7e28f06a292795a4c1ba9b40e7b5e990f46b4ac5a13a9894cc56e943c45bdc9a3746b4cb41ace7f5dba

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9176.exe
    Filesize

    365KB

    MD5

    cc46179549220ccb857bb5898e2c571d

    SHA1

    2544ba3a0b28282f81234bd512551d81bd6cebda

    SHA256

    460913b6b37cdb262d7bdf22797f569eefe23a3081a46c4e5b68a2dd11008c39

    SHA512

    b1899c417d4374289aa561eac7b628c694d1df1263d4f7e28f06a292795a4c1ba9b40e7b5e990f46b4ac5a13a9894cc56e943c45bdc9a3746b4cb41ace7f5dba

  • memory/1012-135-0x00000000025F0000-0x000000000260A000-memory.dmp
    Filesize

    104KB

  • memory/1012-136-0x0000000004C70000-0x000000000516E000-memory.dmp
    Filesize

    5.0MB

  • memory/1012-137-0x00000000027F0000-0x0000000002808000-memory.dmp
    Filesize

    96KB

  • memory/1012-138-0x00000000007E0000-0x000000000080D000-memory.dmp
    Filesize

    180KB

  • memory/1012-139-0x0000000002430000-0x0000000002440000-memory.dmp
    Filesize

    64KB

  • memory/1012-140-0x0000000002430000-0x0000000002440000-memory.dmp
    Filesize

    64KB

  • memory/1012-141-0x00000000027F0000-0x0000000002802000-memory.dmp
    Filesize

    72KB

  • memory/1012-142-0x00000000027F0000-0x0000000002802000-memory.dmp
    Filesize

    72KB

  • memory/1012-144-0x00000000027F0000-0x0000000002802000-memory.dmp
    Filesize

    72KB

  • memory/1012-146-0x00000000027F0000-0x0000000002802000-memory.dmp
    Filesize

    72KB

  • memory/1012-148-0x00000000027F0000-0x0000000002802000-memory.dmp
    Filesize

    72KB

  • memory/1012-150-0x00000000027F0000-0x0000000002802000-memory.dmp
    Filesize

    72KB

  • memory/1012-152-0x00000000027F0000-0x0000000002802000-memory.dmp
    Filesize

    72KB

  • memory/1012-154-0x00000000027F0000-0x0000000002802000-memory.dmp
    Filesize

    72KB

  • memory/1012-156-0x00000000027F0000-0x0000000002802000-memory.dmp
    Filesize

    72KB

  • memory/1012-158-0x00000000027F0000-0x0000000002802000-memory.dmp
    Filesize

    72KB

  • memory/1012-160-0x00000000027F0000-0x0000000002802000-memory.dmp
    Filesize

    72KB

  • memory/1012-162-0x00000000027F0000-0x0000000002802000-memory.dmp
    Filesize

    72KB

  • memory/1012-164-0x00000000027F0000-0x0000000002802000-memory.dmp
    Filesize

    72KB

  • memory/1012-166-0x00000000027F0000-0x0000000002802000-memory.dmp
    Filesize

    72KB

  • memory/1012-168-0x00000000027F0000-0x0000000002802000-memory.dmp
    Filesize

    72KB

  • memory/1012-169-0x0000000000400000-0x000000000070F000-memory.dmp
    Filesize

    3.1MB

  • memory/1012-170-0x0000000002430000-0x0000000002440000-memory.dmp
    Filesize

    64KB

  • memory/1012-172-0x0000000000400000-0x000000000070F000-memory.dmp
    Filesize

    3.1MB

  • memory/4588-1111-0x0000000000E50000-0x0000000000E82000-memory.dmp
    Filesize

    200KB

  • memory/4588-1113-0x0000000005A00000-0x0000000005A10000-memory.dmp
    Filesize

    64KB

  • memory/4588-1112-0x0000000005890000-0x00000000058DB000-memory.dmp
    Filesize

    300KB

  • memory/4780-182-0x00000000051D0000-0x000000000520F000-memory.dmp
    Filesize

    252KB

  • memory/4780-230-0x0000000004CC0000-0x0000000004CD0000-memory.dmp
    Filesize

    64KB

  • memory/4780-179-0x00000000051D0000-0x000000000520F000-memory.dmp
    Filesize

    252KB

  • memory/4780-184-0x00000000051D0000-0x000000000520F000-memory.dmp
    Filesize

    252KB

  • memory/4780-186-0x00000000051D0000-0x000000000520F000-memory.dmp
    Filesize

    252KB

  • memory/4780-188-0x00000000051D0000-0x000000000520F000-memory.dmp
    Filesize

    252KB

  • memory/4780-190-0x00000000051D0000-0x000000000520F000-memory.dmp
    Filesize

    252KB

  • memory/4780-192-0x00000000051D0000-0x000000000520F000-memory.dmp
    Filesize

    252KB

  • memory/4780-194-0x00000000051D0000-0x000000000520F000-memory.dmp
    Filesize

    252KB

  • memory/4780-196-0x00000000051D0000-0x000000000520F000-memory.dmp
    Filesize

    252KB

  • memory/4780-198-0x00000000051D0000-0x000000000520F000-memory.dmp
    Filesize

    252KB

  • memory/4780-200-0x00000000051D0000-0x000000000520F000-memory.dmp
    Filesize

    252KB

  • memory/4780-202-0x00000000051D0000-0x000000000520F000-memory.dmp
    Filesize

    252KB

  • memory/4780-204-0x00000000051D0000-0x000000000520F000-memory.dmp
    Filesize

    252KB

  • memory/4780-206-0x00000000051D0000-0x000000000520F000-memory.dmp
    Filesize

    252KB

  • memory/4780-208-0x00000000051D0000-0x000000000520F000-memory.dmp
    Filesize

    252KB

  • memory/4780-210-0x00000000051D0000-0x000000000520F000-memory.dmp
    Filesize

    252KB

  • memory/4780-212-0x00000000051D0000-0x000000000520F000-memory.dmp
    Filesize

    252KB

  • memory/4780-226-0x00000000007F0000-0x000000000083B000-memory.dmp
    Filesize

    300KB

  • memory/4780-180-0x00000000051D0000-0x000000000520F000-memory.dmp
    Filesize

    252KB

  • memory/4780-228-0x0000000004CC0000-0x0000000004CD0000-memory.dmp
    Filesize

    64KB

  • memory/4780-231-0x0000000004CC0000-0x0000000004CD0000-memory.dmp
    Filesize

    64KB

  • memory/4780-1089-0x0000000005980000-0x0000000005F86000-memory.dmp
    Filesize

    6.0MB

  • memory/4780-1090-0x00000000053F0000-0x00000000054FA000-memory.dmp
    Filesize

    1.0MB

  • memory/4780-1091-0x0000000005530000-0x0000000005542000-memory.dmp
    Filesize

    72KB

  • memory/4780-1092-0x0000000004CC0000-0x0000000004CD0000-memory.dmp
    Filesize

    64KB

  • memory/4780-1093-0x0000000005550000-0x000000000558E000-memory.dmp
    Filesize

    248KB

  • memory/4780-1094-0x00000000056A0000-0x00000000056EB000-memory.dmp
    Filesize

    300KB

  • memory/4780-1095-0x0000000005830000-0x00000000058C2000-memory.dmp
    Filesize

    584KB

  • memory/4780-1096-0x00000000058D0000-0x0000000005936000-memory.dmp
    Filesize

    408KB

  • memory/4780-1098-0x0000000006820000-0x0000000006896000-memory.dmp
    Filesize

    472KB

  • memory/4780-1099-0x00000000068A0000-0x00000000068F0000-memory.dmp
    Filesize

    320KB

  • memory/4780-1100-0x0000000004CC0000-0x0000000004CD0000-memory.dmp
    Filesize

    64KB

  • memory/4780-1101-0x0000000004CC0000-0x0000000004CD0000-memory.dmp
    Filesize

    64KB

  • memory/4780-1102-0x0000000004CC0000-0x0000000004CD0000-memory.dmp
    Filesize

    64KB

  • memory/4780-178-0x00000000051D0000-0x0000000005214000-memory.dmp
    Filesize

    272KB

  • memory/4780-177-0x0000000004C10000-0x0000000004C56000-memory.dmp
    Filesize

    280KB

  • memory/4780-1103-0x0000000004CC0000-0x0000000004CD0000-memory.dmp
    Filesize

    64KB

  • memory/4780-1104-0x0000000006A60000-0x0000000006C22000-memory.dmp
    Filesize

    1.8MB

  • memory/4780-1105-0x0000000006C30000-0x000000000715C000-memory.dmp
    Filesize

    5.2MB