Analysis

  • max time kernel
    50s
  • max time network
    153s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 23:09

General

  • Target

    dca580bef314c51ade6f16de7af455495160577741634b9e03b9a5c82689311e.exe

  • Size

    700KB

  • MD5

    ce42d057ce6b8a461febb5d0db05aa17

  • SHA1

    5f32ca3e1f9ea2dd9980d8cab5295402ba010afa

  • SHA256

    dca580bef314c51ade6f16de7af455495160577741634b9e03b9a5c82689311e

  • SHA512

    751379fb91eaca371a50e122b13976f198302f0d820e8879cb0eff02e6001ee33646020702aea2ec272a242a42a657f6ace3458851fbb8db1fa8e0b6cd2eb0ef

  • SSDEEP

    12288:uMrTy901ZfgduhpL79DzIcAgA8FHz0jCIwVtC7jiasSaz87ZRkbqK93:9yCb+gA8dYIVo7jiqaSRkbl3

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dca580bef314c51ade6f16de7af455495160577741634b9e03b9a5c82689311e.exe
    "C:\Users\Admin\AppData\Local\Temp\dca580bef314c51ade6f16de7af455495160577741634b9e03b9a5c82689311e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5048
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un013105.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un013105.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1688
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4114.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4114.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2096
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2454.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2454.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4460
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si711383.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si711383.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4752

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si711383.exe
    Filesize

    175KB

    MD5

    d872e7b7cad0ad035da933239d81c6b8

    SHA1

    2c0aadee420b8ec043548f2fe648b7a41e704b80

    SHA256

    7eb3aba8feb6d59d00d4f19f1e224d002860103298877046bdaa58f4ba563219

    SHA512

    52c3b53d6b0109ef53337736dc33137c22a469bc0e8effb21b8e7149c1b8ce96703bc89ddeeed4c1c87cc390798698f11ee9450dca68ad666e9fa85837418e59

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si711383.exe
    Filesize

    175KB

    MD5

    d872e7b7cad0ad035da933239d81c6b8

    SHA1

    2c0aadee420b8ec043548f2fe648b7a41e704b80

    SHA256

    7eb3aba8feb6d59d00d4f19f1e224d002860103298877046bdaa58f4ba563219

    SHA512

    52c3b53d6b0109ef53337736dc33137c22a469bc0e8effb21b8e7149c1b8ce96703bc89ddeeed4c1c87cc390798698f11ee9450dca68ad666e9fa85837418e59

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un013105.exe
    Filesize

    558KB

    MD5

    d2731c6dcf6757f1baf00e5b73891bef

    SHA1

    4b6ff63b0794d214afb416532390093cf116d05f

    SHA256

    192bd3e40d935f03217cd9a6dde87310a1a3871b75e5719d30867c9ae2a1df48

    SHA512

    230e77fd3ac1057f81223428d21cd5b1cfda6a983d0380c6e231679e9bb0fe9fa98e3cc562ad4307c3bdfe3a5503dbcab42a524505c9ca280f093c6199b56df9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un013105.exe
    Filesize

    558KB

    MD5

    d2731c6dcf6757f1baf00e5b73891bef

    SHA1

    4b6ff63b0794d214afb416532390093cf116d05f

    SHA256

    192bd3e40d935f03217cd9a6dde87310a1a3871b75e5719d30867c9ae2a1df48

    SHA512

    230e77fd3ac1057f81223428d21cd5b1cfda6a983d0380c6e231679e9bb0fe9fa98e3cc562ad4307c3bdfe3a5503dbcab42a524505c9ca280f093c6199b56df9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4114.exe
    Filesize

    307KB

    MD5

    655f43376a1f82cfcdfd76a48549dc42

    SHA1

    9c276eea106882f3a0bbd968a615bda0e6e6f810

    SHA256

    16110a0b8a86ef1679115d3a1de7ed21f4665fa55dbf2e97d915da6beaa66771

    SHA512

    a40e271e889055d8bd384ee8ca4519f6ebd6725af4b57520daccd84cd6c32cd8809f7451256cfd61a96b4493d7c7ec8ccfd5dae326e49fcd9e3bb2d8eaf197f0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4114.exe
    Filesize

    307KB

    MD5

    655f43376a1f82cfcdfd76a48549dc42

    SHA1

    9c276eea106882f3a0bbd968a615bda0e6e6f810

    SHA256

    16110a0b8a86ef1679115d3a1de7ed21f4665fa55dbf2e97d915da6beaa66771

    SHA512

    a40e271e889055d8bd384ee8ca4519f6ebd6725af4b57520daccd84cd6c32cd8809f7451256cfd61a96b4493d7c7ec8ccfd5dae326e49fcd9e3bb2d8eaf197f0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2454.exe
    Filesize

    365KB

    MD5

    d894dcc45c9a5832146efd54e83af277

    SHA1

    80974516e2d1929805daf9a2d8ea9be4c69bcf20

    SHA256

    3097d9f124d7014b81e56377bffc09c2fc79a4a2281039d50f4bb1e70c5aa16c

    SHA512

    0d1062d32aa074569538d2f94ac84d74d77a97c69939cdc1ee06937b466ed187c8fed3ebaaa0bd16a768e900e3e5d889b259592c309fa5b3d07de29940b2fb3d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2454.exe
    Filesize

    365KB

    MD5

    d894dcc45c9a5832146efd54e83af277

    SHA1

    80974516e2d1929805daf9a2d8ea9be4c69bcf20

    SHA256

    3097d9f124d7014b81e56377bffc09c2fc79a4a2281039d50f4bb1e70c5aa16c

    SHA512

    0d1062d32aa074569538d2f94ac84d74d77a97c69939cdc1ee06937b466ed187c8fed3ebaaa0bd16a768e900e3e5d889b259592c309fa5b3d07de29940b2fb3d

  • memory/2096-136-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/2096-137-0x0000000000930000-0x000000000094A000-memory.dmp
    Filesize

    104KB

  • memory/2096-138-0x0000000004E70000-0x000000000536E000-memory.dmp
    Filesize

    5.0MB

  • memory/2096-139-0x00000000024F0000-0x0000000002508000-memory.dmp
    Filesize

    96KB

  • memory/2096-140-0x0000000004E60000-0x0000000004E70000-memory.dmp
    Filesize

    64KB

  • memory/2096-141-0x0000000004E60000-0x0000000004E70000-memory.dmp
    Filesize

    64KB

  • memory/2096-142-0x00000000024F0000-0x0000000002502000-memory.dmp
    Filesize

    72KB

  • memory/2096-143-0x00000000024F0000-0x0000000002502000-memory.dmp
    Filesize

    72KB

  • memory/2096-145-0x00000000024F0000-0x0000000002502000-memory.dmp
    Filesize

    72KB

  • memory/2096-147-0x00000000024F0000-0x0000000002502000-memory.dmp
    Filesize

    72KB

  • memory/2096-149-0x00000000024F0000-0x0000000002502000-memory.dmp
    Filesize

    72KB

  • memory/2096-151-0x00000000024F0000-0x0000000002502000-memory.dmp
    Filesize

    72KB

  • memory/2096-153-0x00000000024F0000-0x0000000002502000-memory.dmp
    Filesize

    72KB

  • memory/2096-155-0x00000000024F0000-0x0000000002502000-memory.dmp
    Filesize

    72KB

  • memory/2096-157-0x00000000024F0000-0x0000000002502000-memory.dmp
    Filesize

    72KB

  • memory/2096-159-0x00000000024F0000-0x0000000002502000-memory.dmp
    Filesize

    72KB

  • memory/2096-161-0x00000000024F0000-0x0000000002502000-memory.dmp
    Filesize

    72KB

  • memory/2096-163-0x00000000024F0000-0x0000000002502000-memory.dmp
    Filesize

    72KB

  • memory/2096-165-0x00000000024F0000-0x0000000002502000-memory.dmp
    Filesize

    72KB

  • memory/2096-169-0x00000000024F0000-0x0000000002502000-memory.dmp
    Filesize

    72KB

  • memory/2096-167-0x00000000024F0000-0x0000000002502000-memory.dmp
    Filesize

    72KB

  • memory/2096-170-0x0000000000400000-0x000000000070F000-memory.dmp
    Filesize

    3.1MB

  • memory/2096-172-0x0000000000400000-0x000000000070F000-memory.dmp
    Filesize

    3.1MB

  • memory/4460-177-0x0000000004C00000-0x0000000004C46000-memory.dmp
    Filesize

    280KB

  • memory/4460-178-0x0000000005190000-0x00000000051D4000-memory.dmp
    Filesize

    272KB

  • memory/4460-179-0x0000000005190000-0x00000000051CF000-memory.dmp
    Filesize

    252KB

  • memory/4460-180-0x0000000005190000-0x00000000051CF000-memory.dmp
    Filesize

    252KB

  • memory/4460-182-0x0000000005190000-0x00000000051CF000-memory.dmp
    Filesize

    252KB

  • memory/4460-184-0x0000000005190000-0x00000000051CF000-memory.dmp
    Filesize

    252KB

  • memory/4460-186-0x0000000005190000-0x00000000051CF000-memory.dmp
    Filesize

    252KB

  • memory/4460-188-0x0000000005190000-0x00000000051CF000-memory.dmp
    Filesize

    252KB

  • memory/4460-190-0x0000000005190000-0x00000000051CF000-memory.dmp
    Filesize

    252KB

  • memory/4460-192-0x0000000005190000-0x00000000051CF000-memory.dmp
    Filesize

    252KB

  • memory/4460-194-0x0000000005190000-0x00000000051CF000-memory.dmp
    Filesize

    252KB

  • memory/4460-196-0x0000000005190000-0x00000000051CF000-memory.dmp
    Filesize

    252KB

  • memory/4460-198-0x0000000005190000-0x00000000051CF000-memory.dmp
    Filesize

    252KB

  • memory/4460-200-0x0000000005190000-0x00000000051CF000-memory.dmp
    Filesize

    252KB

  • memory/4460-202-0x0000000005190000-0x00000000051CF000-memory.dmp
    Filesize

    252KB

  • memory/4460-204-0x0000000005190000-0x00000000051CF000-memory.dmp
    Filesize

    252KB

  • memory/4460-206-0x0000000005190000-0x00000000051CF000-memory.dmp
    Filesize

    252KB

  • memory/4460-210-0x0000000005190000-0x00000000051CF000-memory.dmp
    Filesize

    252KB

  • memory/4460-208-0x0000000005190000-0x00000000051CF000-memory.dmp
    Filesize

    252KB

  • memory/4460-212-0x0000000005190000-0x00000000051CF000-memory.dmp
    Filesize

    252KB

  • memory/4460-280-0x00000000007F0000-0x000000000083B000-memory.dmp
    Filesize

    300KB

  • memory/4460-281-0x0000000002410000-0x0000000002420000-memory.dmp
    Filesize

    64KB

  • memory/4460-283-0x0000000002410000-0x0000000002420000-memory.dmp
    Filesize

    64KB

  • memory/4460-285-0x0000000002410000-0x0000000002420000-memory.dmp
    Filesize

    64KB

  • memory/4460-1089-0x0000000005230000-0x0000000005836000-memory.dmp
    Filesize

    6.0MB

  • memory/4460-1090-0x00000000058C0000-0x00000000059CA000-memory.dmp
    Filesize

    1.0MB

  • memory/4460-1091-0x0000000005A00000-0x0000000005A12000-memory.dmp
    Filesize

    72KB

  • memory/4460-1092-0x0000000005A20000-0x0000000005A5E000-memory.dmp
    Filesize

    248KB

  • memory/4460-1093-0x0000000005B70000-0x0000000005BBB000-memory.dmp
    Filesize

    300KB

  • memory/4460-1094-0x0000000002410000-0x0000000002420000-memory.dmp
    Filesize

    64KB

  • memory/4460-1096-0x0000000005D00000-0x0000000005D92000-memory.dmp
    Filesize

    584KB

  • memory/4460-1097-0x0000000005DA0000-0x0000000005E06000-memory.dmp
    Filesize

    408KB

  • memory/4460-1098-0x0000000002410000-0x0000000002420000-memory.dmp
    Filesize

    64KB

  • memory/4460-1099-0x0000000002410000-0x0000000002420000-memory.dmp
    Filesize

    64KB

  • memory/4460-1100-0x0000000002410000-0x0000000002420000-memory.dmp
    Filesize

    64KB

  • memory/4460-1101-0x0000000006460000-0x00000000064D6000-memory.dmp
    Filesize

    472KB

  • memory/4460-1102-0x0000000006500000-0x0000000006550000-memory.dmp
    Filesize

    320KB

  • memory/4460-1103-0x0000000002410000-0x0000000002420000-memory.dmp
    Filesize

    64KB

  • memory/4460-1104-0x0000000007950000-0x0000000007B12000-memory.dmp
    Filesize

    1.8MB

  • memory/4460-1105-0x0000000007B20000-0x000000000804C000-memory.dmp
    Filesize

    5.2MB

  • memory/4752-1111-0x0000000000E40000-0x0000000000E72000-memory.dmp
    Filesize

    200KB

  • memory/4752-1112-0x0000000005880000-0x00000000058CB000-memory.dmp
    Filesize

    300KB

  • memory/4752-1113-0x0000000005A50000-0x0000000005A60000-memory.dmp
    Filesize

    64KB

  • memory/4752-1114-0x0000000005A50000-0x0000000005A60000-memory.dmp
    Filesize

    64KB