Analysis

  • max time kernel
    54s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 22:25

General

  • Target

    02bbb6b520a27b16237e0cc67d9a07f4bcce2f35b38064e60a16a0ee536e9042.exe

  • Size

    699KB

  • MD5

    481bef4c1c764bab725678be432ce10e

  • SHA1

    687b14d17555ec60c9b50dd73d40e93916d8fdde

  • SHA256

    02bbb6b520a27b16237e0cc67d9a07f4bcce2f35b38064e60a16a0ee536e9042

  • SHA512

    66dd4763c599c2cb90c9152d6e7680f5e241a6fb3d8c670a4846fdb7394fe525601003f42956cb8c4e76483d78825b48b94027baeba19819ed7bdabc36c95522

  • SSDEEP

    12288:LMrpy90J+ww2GAV6+89W37LlU/42Nifluej7p07vQCx:yyq+PAN89WLLlU/uflueHp0DJx

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\02bbb6b520a27b16237e0cc67d9a07f4bcce2f35b38064e60a16a0ee536e9042.exe
    "C:\Users\Admin\AppData\Local\Temp\02bbb6b520a27b16237e0cc67d9a07f4bcce2f35b38064e60a16a0ee536e9042.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5096
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un714887.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un714887.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4108
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1045.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1045.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4124
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8969.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8969.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3880
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si787062.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si787062.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1720

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si787062.exe

    Filesize

    175KB

    MD5

    0d39102a20fffad40eeecf55be36044e

    SHA1

    a621fe9bcb651c60bae773b495b0477ba5fad947

    SHA256

    ff3303ccd6baab95ab03578a796490d9b1f9f816a544ee3e1530e0ebe7ba2667

    SHA512

    643e21e0e549b3c709223cc7e4c63dcd61707396c4b38d4c2b343e75b350f7f48094e6c5f42f5fb237f90cbbd301b6e6449564f42c44e17c87bdd5ea646e60b2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si787062.exe

    Filesize

    175KB

    MD5

    0d39102a20fffad40eeecf55be36044e

    SHA1

    a621fe9bcb651c60bae773b495b0477ba5fad947

    SHA256

    ff3303ccd6baab95ab03578a796490d9b1f9f816a544ee3e1530e0ebe7ba2667

    SHA512

    643e21e0e549b3c709223cc7e4c63dcd61707396c4b38d4c2b343e75b350f7f48094e6c5f42f5fb237f90cbbd301b6e6449564f42c44e17c87bdd5ea646e60b2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un714887.exe

    Filesize

    557KB

    MD5

    c1864f8ca478a7062a79b5836facee4f

    SHA1

    ceb24e5dc26ab7419300744d0a8a4914bbac7457

    SHA256

    970adf9ede6e2f703becd6c8779efaf49976981dd3f11fed3be1362c489341f0

    SHA512

    6a120b544ca05884e32f0fe3835b36d1a18f4b5876a432e4c0e5332108c02c24175085bb48ee489037c2f105b75e2089e051a576b7d614d8ccfe61f44ea19e17

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un714887.exe

    Filesize

    557KB

    MD5

    c1864f8ca478a7062a79b5836facee4f

    SHA1

    ceb24e5dc26ab7419300744d0a8a4914bbac7457

    SHA256

    970adf9ede6e2f703becd6c8779efaf49976981dd3f11fed3be1362c489341f0

    SHA512

    6a120b544ca05884e32f0fe3835b36d1a18f4b5876a432e4c0e5332108c02c24175085bb48ee489037c2f105b75e2089e051a576b7d614d8ccfe61f44ea19e17

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1045.exe

    Filesize

    307KB

    MD5

    13ca8f1c0562f7ee569dcf967d897845

    SHA1

    b4d864dea7d7b19435a9913d439b139184004f73

    SHA256

    1342a3613a94a1930c65c75f8126824636fed22395517057ca827f454926352d

    SHA512

    67b66f6df19522a48c786703e1bf76b16e1123be41225faea1144bbc74422848c86ad01aad39d1dd20254e43e8632acb21a37f48f3debde4f9f0ec346545febc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1045.exe

    Filesize

    307KB

    MD5

    13ca8f1c0562f7ee569dcf967d897845

    SHA1

    b4d864dea7d7b19435a9913d439b139184004f73

    SHA256

    1342a3613a94a1930c65c75f8126824636fed22395517057ca827f454926352d

    SHA512

    67b66f6df19522a48c786703e1bf76b16e1123be41225faea1144bbc74422848c86ad01aad39d1dd20254e43e8632acb21a37f48f3debde4f9f0ec346545febc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8969.exe

    Filesize

    365KB

    MD5

    767ea544a4b6261587f23535b079bcb1

    SHA1

    0ed472a2e2e3daa892c488036939de8cb286dfbd

    SHA256

    57ddb6d48a2bba40b2718a8b5d7d228058eb427dc7e7c0d064c51051edd8a93e

    SHA512

    caad3100433b15f3a38afe165c2fb6f4962fe5c63574355cbfcae4045a53227b9ccb5cbd9f96359568d23a73ca201d648e35c79b46e70db4d1683f435e667476

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8969.exe

    Filesize

    365KB

    MD5

    767ea544a4b6261587f23535b079bcb1

    SHA1

    0ed472a2e2e3daa892c488036939de8cb286dfbd

    SHA256

    57ddb6d48a2bba40b2718a8b5d7d228058eb427dc7e7c0d064c51051edd8a93e

    SHA512

    caad3100433b15f3a38afe165c2fb6f4962fe5c63574355cbfcae4045a53227b9ccb5cbd9f96359568d23a73ca201d648e35c79b46e70db4d1683f435e667476

  • memory/1720-1116-0x0000000004A40000-0x0000000004A50000-memory.dmp

    Filesize

    64KB

  • memory/1720-1115-0x0000000004A40000-0x0000000004A50000-memory.dmp

    Filesize

    64KB

  • memory/1720-1114-0x0000000004BE0000-0x0000000004C2B000-memory.dmp

    Filesize

    300KB

  • memory/1720-1113-0x00000000001A0000-0x00000000001D2000-memory.dmp

    Filesize

    200KB

  • memory/3880-1091-0x0000000005890000-0x0000000005E96000-memory.dmp

    Filesize

    6.0MB

  • memory/3880-1095-0x0000000005410000-0x000000000544E000-memory.dmp

    Filesize

    248KB

  • memory/3880-1107-0x0000000007A20000-0x0000000007F4C000-memory.dmp

    Filesize

    5.2MB

  • memory/3880-1106-0x0000000007850000-0x0000000007A12000-memory.dmp

    Filesize

    1.8MB

  • memory/3880-1105-0x00000000027B0000-0x00000000027C0000-memory.dmp

    Filesize

    64KB

  • memory/3880-1104-0x00000000027B0000-0x00000000027C0000-memory.dmp

    Filesize

    64KB

  • memory/3880-1103-0x00000000027B0000-0x00000000027C0000-memory.dmp

    Filesize

    64KB

  • memory/3880-1102-0x00000000027B0000-0x00000000027C0000-memory.dmp

    Filesize

    64KB

  • memory/3880-1100-0x0000000006500000-0x0000000006550000-memory.dmp

    Filesize

    320KB

  • memory/3880-1099-0x0000000006460000-0x00000000064D6000-memory.dmp

    Filesize

    472KB

  • memory/3880-1098-0x0000000005790000-0x00000000057F6000-memory.dmp

    Filesize

    408KB

  • memory/3880-1097-0x00000000056F0000-0x0000000005782000-memory.dmp

    Filesize

    584KB

  • memory/3880-1096-0x0000000005560000-0x00000000055AB000-memory.dmp

    Filesize

    300KB

  • memory/3880-1094-0x00000000027B0000-0x00000000027C0000-memory.dmp

    Filesize

    64KB

  • memory/3880-1093-0x00000000053F0000-0x0000000005402000-memory.dmp

    Filesize

    72KB

  • memory/3880-1092-0x00000000052C0000-0x00000000053CA000-memory.dmp

    Filesize

    1.0MB

  • memory/3880-221-0x00000000027B0000-0x00000000027C0000-memory.dmp

    Filesize

    64KB

  • memory/3880-219-0x00000000027B0000-0x00000000027C0000-memory.dmp

    Filesize

    64KB

  • memory/3880-213-0x0000000000720000-0x000000000076B000-memory.dmp

    Filesize

    300KB

  • memory/3880-216-0x00000000027B0000-0x00000000027C0000-memory.dmp

    Filesize

    64KB

  • memory/3880-215-0x00000000027C0000-0x00000000027FF000-memory.dmp

    Filesize

    252KB

  • memory/3880-179-0x00000000023E0000-0x0000000002426000-memory.dmp

    Filesize

    280KB

  • memory/3880-180-0x00000000027C0000-0x0000000002804000-memory.dmp

    Filesize

    272KB

  • memory/3880-181-0x00000000027C0000-0x00000000027FF000-memory.dmp

    Filesize

    252KB

  • memory/3880-182-0x00000000027C0000-0x00000000027FF000-memory.dmp

    Filesize

    252KB

  • memory/3880-184-0x00000000027C0000-0x00000000027FF000-memory.dmp

    Filesize

    252KB

  • memory/3880-186-0x00000000027C0000-0x00000000027FF000-memory.dmp

    Filesize

    252KB

  • memory/3880-188-0x00000000027C0000-0x00000000027FF000-memory.dmp

    Filesize

    252KB

  • memory/3880-190-0x00000000027C0000-0x00000000027FF000-memory.dmp

    Filesize

    252KB

  • memory/3880-192-0x00000000027C0000-0x00000000027FF000-memory.dmp

    Filesize

    252KB

  • memory/3880-194-0x00000000027C0000-0x00000000027FF000-memory.dmp

    Filesize

    252KB

  • memory/3880-196-0x00000000027C0000-0x00000000027FF000-memory.dmp

    Filesize

    252KB

  • memory/3880-198-0x00000000027C0000-0x00000000027FF000-memory.dmp

    Filesize

    252KB

  • memory/3880-200-0x00000000027C0000-0x00000000027FF000-memory.dmp

    Filesize

    252KB

  • memory/3880-202-0x00000000027C0000-0x00000000027FF000-memory.dmp

    Filesize

    252KB

  • memory/3880-204-0x00000000027C0000-0x00000000027FF000-memory.dmp

    Filesize

    252KB

  • memory/3880-206-0x00000000027C0000-0x00000000027FF000-memory.dmp

    Filesize

    252KB

  • memory/3880-208-0x00000000027C0000-0x00000000027FF000-memory.dmp

    Filesize

    252KB

  • memory/3880-210-0x00000000027C0000-0x00000000027FF000-memory.dmp

    Filesize

    252KB

  • memory/3880-212-0x00000000027C0000-0x00000000027FF000-memory.dmp

    Filesize

    252KB

  • memory/4124-162-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/4124-134-0x00000000022F0000-0x000000000230A000-memory.dmp

    Filesize

    104KB

  • memory/4124-141-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/4124-172-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/4124-171-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/4124-140-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/4124-170-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/4124-169-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4124-168-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/4124-144-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/4124-166-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/4124-164-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/4124-174-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4124-142-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/4124-139-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/4124-156-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/4124-154-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/4124-152-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/4124-150-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/4124-148-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/4124-146-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/4124-158-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB

  • memory/4124-138-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/4124-137-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4124-136-0x00000000023B0000-0x00000000023C8000-memory.dmp

    Filesize

    96KB

  • memory/4124-135-0x0000000004F80000-0x000000000547E000-memory.dmp

    Filesize

    5.0MB

  • memory/4124-160-0x00000000023B0000-0x00000000023C2000-memory.dmp

    Filesize

    72KB