Analysis

  • max time kernel
    56s
  • max time network
    72s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 23:11

General

  • Target

    30ded69f910608bef986b4340812a5ca85ac0c6e0c77f3a5bb982783b7336b32.exe

  • Size

    700KB

  • MD5

    2f857698c91a4d887f08487e80286d0d

  • SHA1

    3e6d4e165006ebb41db4a05066e0b7bf5dd03489

  • SHA256

    30ded69f910608bef986b4340812a5ca85ac0c6e0c77f3a5bb982783b7336b32

  • SHA512

    941ff21158f1dfd38d0fa97c2f18ec31f5f9a369ffd0de1f8ba564235c9a209681fd150a402d90f47e4d81a9d51e6cced2c89d9fadfb933129475f2ab26d9911

  • SSDEEP

    12288:eMrdy90rlH3O0nq8SuTg99DoHcAu8F3F/ztXW4RwJEMP1hoRhCewG:Ly0XvqR4geu8VB44yJEMt5ewG

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\30ded69f910608bef986b4340812a5ca85ac0c6e0c77f3a5bb982783b7336b32.exe
    "C:\Users\Admin\AppData\Local\Temp\30ded69f910608bef986b4340812a5ca85ac0c6e0c77f3a5bb982783b7336b32.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4540
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un923937.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un923937.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5028
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2294.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2294.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1860
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7350.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7350.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3932
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si899921.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si899921.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3788

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si899921.exe
    Filesize

    175KB

    MD5

    8453d4a8e076adf8e39a68e2388dcde8

    SHA1

    b047a6f119bc7d27d5a50e71223f18925d51049a

    SHA256

    55bdad6036e61e16ae34e7f356f8c63a9ce90ae520103330bad4ebea9f9cb7d2

    SHA512

    0a4024177dc0c246bab8ef71b28e397fce6228f0439bcc887194e89e6a0160e763cbe1b0bd4966d927d0c046acfafba99222dcc79eff69f19d543a48047debab

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si899921.exe
    Filesize

    175KB

    MD5

    8453d4a8e076adf8e39a68e2388dcde8

    SHA1

    b047a6f119bc7d27d5a50e71223f18925d51049a

    SHA256

    55bdad6036e61e16ae34e7f356f8c63a9ce90ae520103330bad4ebea9f9cb7d2

    SHA512

    0a4024177dc0c246bab8ef71b28e397fce6228f0439bcc887194e89e6a0160e763cbe1b0bd4966d927d0c046acfafba99222dcc79eff69f19d543a48047debab

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un923937.exe
    Filesize

    558KB

    MD5

    1b235ae60ddf648186a3c5a8dfd0dbc6

    SHA1

    a364d0fef2b5688d73aeed8747669411fd06f0d1

    SHA256

    1db172ea2142a0b6c9a53d68419bb9a88df4a4c0a0ce503845e85ddf343a3387

    SHA512

    636b609a801df9fa9cc010fe26f3c02e939ae70858959dd958ec5e38445133fdcf0e92c53bf22dc767aad963c76d6ba230bd98a3858426e1a98d9ed29c815516

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un923937.exe
    Filesize

    558KB

    MD5

    1b235ae60ddf648186a3c5a8dfd0dbc6

    SHA1

    a364d0fef2b5688d73aeed8747669411fd06f0d1

    SHA256

    1db172ea2142a0b6c9a53d68419bb9a88df4a4c0a0ce503845e85ddf343a3387

    SHA512

    636b609a801df9fa9cc010fe26f3c02e939ae70858959dd958ec5e38445133fdcf0e92c53bf22dc767aad963c76d6ba230bd98a3858426e1a98d9ed29c815516

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2294.exe
    Filesize

    307KB

    MD5

    8569ef2fc06413d84d67bf324c98c3ed

    SHA1

    8b6013658e0f0cd8f2cfae65b3e8a1417ecf9d8c

    SHA256

    e0fd5d7b1a8fe5537e2ba31e264658d70fc2431785b70e598c7b35e3440cfa15

    SHA512

    7ad57b1da77616f737e23b4821d418e33a57c332d93ef73bff5b085d8465b71079efd78e672647c600f505016b2ef314a4f360262dc09230fa619b1cba527376

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2294.exe
    Filesize

    307KB

    MD5

    8569ef2fc06413d84d67bf324c98c3ed

    SHA1

    8b6013658e0f0cd8f2cfae65b3e8a1417ecf9d8c

    SHA256

    e0fd5d7b1a8fe5537e2ba31e264658d70fc2431785b70e598c7b35e3440cfa15

    SHA512

    7ad57b1da77616f737e23b4821d418e33a57c332d93ef73bff5b085d8465b71079efd78e672647c600f505016b2ef314a4f360262dc09230fa619b1cba527376

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7350.exe
    Filesize

    365KB

    MD5

    21f7c904d244f75fa07b06796c3229e9

    SHA1

    ce16b67f52138aeb515b998411ca273a7b9208c2

    SHA256

    a6c9913d581f31d3e9511825bb249d788e9b9e4c670de14f09abab4fc83aa057

    SHA512

    9b62b045909e3236395cc2c3b078defa8781c88b60bdb0561e09726771dae7cd7f2c28e84e6cbd539c0f0215541ed83f1bcacf6c2fd2375beec91827182d5139

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7350.exe
    Filesize

    365KB

    MD5

    21f7c904d244f75fa07b06796c3229e9

    SHA1

    ce16b67f52138aeb515b998411ca273a7b9208c2

    SHA256

    a6c9913d581f31d3e9511825bb249d788e9b9e4c670de14f09abab4fc83aa057

    SHA512

    9b62b045909e3236395cc2c3b078defa8781c88b60bdb0561e09726771dae7cd7f2c28e84e6cbd539c0f0215541ed83f1bcacf6c2fd2375beec91827182d5139

  • memory/1860-144-0x0000000004C50000-0x0000000004C62000-memory.dmp
    Filesize

    72KB

  • memory/1860-154-0x0000000004C50000-0x0000000004C62000-memory.dmp
    Filesize

    72KB

  • memory/1860-134-0x0000000004C50000-0x0000000004C68000-memory.dmp
    Filesize

    96KB

  • memory/1860-135-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/1860-136-0x0000000004CB0000-0x0000000004CC0000-memory.dmp
    Filesize

    64KB

  • memory/1860-137-0x0000000004CB0000-0x0000000004CC0000-memory.dmp
    Filesize

    64KB

  • memory/1860-138-0x0000000004CB0000-0x0000000004CC0000-memory.dmp
    Filesize

    64KB

  • memory/1860-139-0x0000000004C50000-0x0000000004C62000-memory.dmp
    Filesize

    72KB

  • memory/1860-142-0x0000000004C50000-0x0000000004C62000-memory.dmp
    Filesize

    72KB

  • memory/1860-140-0x0000000004C50000-0x0000000004C62000-memory.dmp
    Filesize

    72KB

  • memory/1860-132-0x0000000002290000-0x00000000022AA000-memory.dmp
    Filesize

    104KB

  • memory/1860-146-0x0000000004C50000-0x0000000004C62000-memory.dmp
    Filesize

    72KB

  • memory/1860-148-0x0000000004C50000-0x0000000004C62000-memory.dmp
    Filesize

    72KB

  • memory/1860-150-0x0000000004C50000-0x0000000004C62000-memory.dmp
    Filesize

    72KB

  • memory/1860-152-0x0000000004C50000-0x0000000004C62000-memory.dmp
    Filesize

    72KB

  • memory/1860-133-0x0000000004CC0000-0x00000000051BE000-memory.dmp
    Filesize

    5.0MB

  • memory/1860-156-0x0000000004C50000-0x0000000004C62000-memory.dmp
    Filesize

    72KB

  • memory/1860-158-0x0000000004C50000-0x0000000004C62000-memory.dmp
    Filesize

    72KB

  • memory/1860-160-0x0000000004C50000-0x0000000004C62000-memory.dmp
    Filesize

    72KB

  • memory/1860-162-0x0000000004C50000-0x0000000004C62000-memory.dmp
    Filesize

    72KB

  • memory/1860-164-0x0000000004C50000-0x0000000004C62000-memory.dmp
    Filesize

    72KB

  • memory/1860-166-0x0000000004C50000-0x0000000004C62000-memory.dmp
    Filesize

    72KB

  • memory/1860-167-0x0000000000400000-0x000000000070F000-memory.dmp
    Filesize

    3.1MB

  • memory/1860-168-0x0000000004CB0000-0x0000000004CC0000-memory.dmp
    Filesize

    64KB

  • memory/1860-169-0x0000000004CB0000-0x0000000004CC0000-memory.dmp
    Filesize

    64KB

  • memory/1860-170-0x0000000004CB0000-0x0000000004CC0000-memory.dmp
    Filesize

    64KB

  • memory/1860-172-0x0000000000400000-0x000000000070F000-memory.dmp
    Filesize

    3.1MB

  • memory/3788-1111-0x00000000006B0000-0x00000000006E2000-memory.dmp
    Filesize

    200KB

  • memory/3788-1114-0x0000000004F30000-0x0000000004F40000-memory.dmp
    Filesize

    64KB

  • memory/3788-1113-0x00000000050F0000-0x000000000513B000-memory.dmp
    Filesize

    300KB

  • memory/3788-1112-0x0000000004F30000-0x0000000004F40000-memory.dmp
    Filesize

    64KB

  • memory/3932-179-0x0000000002880000-0x00000000028BF000-memory.dmp
    Filesize

    252KB

  • memory/3932-218-0x00000000028D0000-0x00000000028E0000-memory.dmp
    Filesize

    64KB

  • memory/3932-184-0x0000000002880000-0x00000000028BF000-memory.dmp
    Filesize

    252KB

  • memory/3932-186-0x0000000002880000-0x00000000028BF000-memory.dmp
    Filesize

    252KB

  • memory/3932-188-0x0000000002880000-0x00000000028BF000-memory.dmp
    Filesize

    252KB

  • memory/3932-190-0x0000000002880000-0x00000000028BF000-memory.dmp
    Filesize

    252KB

  • memory/3932-192-0x0000000002880000-0x00000000028BF000-memory.dmp
    Filesize

    252KB

  • memory/3932-194-0x0000000002880000-0x00000000028BF000-memory.dmp
    Filesize

    252KB

  • memory/3932-196-0x0000000002880000-0x00000000028BF000-memory.dmp
    Filesize

    252KB

  • memory/3932-198-0x0000000002880000-0x00000000028BF000-memory.dmp
    Filesize

    252KB

  • memory/3932-200-0x0000000002880000-0x00000000028BF000-memory.dmp
    Filesize

    252KB

  • memory/3932-202-0x0000000002880000-0x00000000028BF000-memory.dmp
    Filesize

    252KB

  • memory/3932-204-0x0000000002880000-0x00000000028BF000-memory.dmp
    Filesize

    252KB

  • memory/3932-206-0x0000000002880000-0x00000000028BF000-memory.dmp
    Filesize

    252KB

  • memory/3932-208-0x0000000002880000-0x00000000028BF000-memory.dmp
    Filesize

    252KB

  • memory/3932-210-0x0000000002880000-0x00000000028BF000-memory.dmp
    Filesize

    252KB

  • memory/3932-212-0x0000000002880000-0x00000000028BF000-memory.dmp
    Filesize

    252KB

  • memory/3932-215-0x00000000007F0000-0x000000000083B000-memory.dmp
    Filesize

    300KB

  • memory/3932-217-0x00000000028D0000-0x00000000028E0000-memory.dmp
    Filesize

    64KB

  • memory/3932-182-0x0000000002880000-0x00000000028BF000-memory.dmp
    Filesize

    252KB

  • memory/3932-220-0x00000000028D0000-0x00000000028E0000-memory.dmp
    Filesize

    64KB

  • memory/3932-1089-0x00000000059B0000-0x0000000005FB6000-memory.dmp
    Filesize

    6.0MB

  • memory/3932-1090-0x00000000053F0000-0x00000000054FA000-memory.dmp
    Filesize

    1.0MB

  • memory/3932-1091-0x0000000005530000-0x0000000005542000-memory.dmp
    Filesize

    72KB

  • memory/3932-1092-0x00000000028D0000-0x00000000028E0000-memory.dmp
    Filesize

    64KB

  • memory/3932-1093-0x0000000005550000-0x000000000558E000-memory.dmp
    Filesize

    248KB

  • memory/3932-1094-0x00000000056A0000-0x00000000056EB000-memory.dmp
    Filesize

    300KB

  • memory/3932-1095-0x0000000005830000-0x00000000058C2000-memory.dmp
    Filesize

    584KB

  • memory/3932-1096-0x00000000058D0000-0x0000000005936000-memory.dmp
    Filesize

    408KB

  • memory/3932-1097-0x00000000065C0000-0x0000000006636000-memory.dmp
    Filesize

    472KB

  • memory/3932-1098-0x0000000006640000-0x0000000006690000-memory.dmp
    Filesize

    320KB

  • memory/3932-1100-0x00000000028D0000-0x00000000028E0000-memory.dmp
    Filesize

    64KB

  • memory/3932-1101-0x00000000028D0000-0x00000000028E0000-memory.dmp
    Filesize

    64KB

  • memory/3932-1102-0x00000000028D0000-0x00000000028E0000-memory.dmp
    Filesize

    64KB

  • memory/3932-180-0x0000000002880000-0x00000000028BF000-memory.dmp
    Filesize

    252KB

  • memory/3932-178-0x0000000002880000-0x00000000028C4000-memory.dmp
    Filesize

    272KB

  • memory/3932-177-0x0000000002520000-0x0000000002566000-memory.dmp
    Filesize

    280KB

  • memory/3932-1103-0x00000000028D0000-0x00000000028E0000-memory.dmp
    Filesize

    64KB

  • memory/3932-1104-0x0000000006940000-0x0000000006B02000-memory.dmp
    Filesize

    1.8MB

  • memory/3932-1105-0x0000000006B30000-0x000000000705C000-memory.dmp
    Filesize

    5.2MB