Analysis

  • max time kernel
    67s
  • max time network
    132s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27/03/2023, 22:28

General

  • Target

    9a56b2d456b304646af4ddaeb2352b44fbf0b58b479accdac63b414a9774c905.exe

  • Size

    700KB

  • MD5

    5b7fc61bda5baaf66159826c3f514963

  • SHA1

    aeeb7a426b395c531e1daa633bddfd31963849d6

  • SHA256

    9a56b2d456b304646af4ddaeb2352b44fbf0b58b479accdac63b414a9774c905

  • SHA512

    78de8d7c057b636163ff04568a2864a1060b3a9830c551c5377fef63683c0911d54557914c0000d499850d42527e3f2c7f9a2788d0839c39ff39424674ea68e3

  • SSDEEP

    12288:YMrny90qaH6jCir/c7kkndaqc5SuMyXuoxw2GJiiWueucFWbYI0Tb:vyXaHQ/c7kOa15SuMyXVUiiWue20Tb

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a56b2d456b304646af4ddaeb2352b44fbf0b58b479accdac63b414a9774c905.exe
    "C:\Users\Admin\AppData\Local\Temp\9a56b2d456b304646af4ddaeb2352b44fbf0b58b479accdac63b414a9774c905.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un101318.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un101318.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2268
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6580.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6580.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2624
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3435.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3435.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4416
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si302044.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si302044.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3772

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si302044.exe

    Filesize

    175KB

    MD5

    a1cbe4f381ef5fa47cc6c7db78063b8c

    SHA1

    dac3f265e8147f4bc29ca199ae9ddd18daeaaab9

    SHA256

    6a4203a083cd81f5bf95cadeebe4fa1f2d21321546c39f485dfbc9cfbe1a2aa7

    SHA512

    52846f391ed315844fe8c73fc3ae9ac962202f9e56c9ace18448067483545e0d6c059a8638541574195c526ed169db2391cd953349e1a0fe8ea659ad8d5164b3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si302044.exe

    Filesize

    175KB

    MD5

    a1cbe4f381ef5fa47cc6c7db78063b8c

    SHA1

    dac3f265e8147f4bc29ca199ae9ddd18daeaaab9

    SHA256

    6a4203a083cd81f5bf95cadeebe4fa1f2d21321546c39f485dfbc9cfbe1a2aa7

    SHA512

    52846f391ed315844fe8c73fc3ae9ac962202f9e56c9ace18448067483545e0d6c059a8638541574195c526ed169db2391cd953349e1a0fe8ea659ad8d5164b3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un101318.exe

    Filesize

    558KB

    MD5

    4ead3acff771562d53cbf8c6760ff7f7

    SHA1

    458b1dc14e7ac5a3feffc4a20dc2e28419f24306

    SHA256

    bf5dae5dc42a00c01b8db1fa3ca1c91e66d8be55e8e3c5764a4e228165743d7f

    SHA512

    a1f3af08f48c5aa7a3157023e09953f7de071030d9a10785cdafa3beaacc12091875252640102cad17f1309576e6ad2d00ce29b3390a6af979c793b53443c59e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un101318.exe

    Filesize

    558KB

    MD5

    4ead3acff771562d53cbf8c6760ff7f7

    SHA1

    458b1dc14e7ac5a3feffc4a20dc2e28419f24306

    SHA256

    bf5dae5dc42a00c01b8db1fa3ca1c91e66d8be55e8e3c5764a4e228165743d7f

    SHA512

    a1f3af08f48c5aa7a3157023e09953f7de071030d9a10785cdafa3beaacc12091875252640102cad17f1309576e6ad2d00ce29b3390a6af979c793b53443c59e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6580.exe

    Filesize

    307KB

    MD5

    7d2a6747753708c8eaabd5439c25d72f

    SHA1

    01382c22add0a566e11cc8d9ff3fee1e488167ed

    SHA256

    688c6c9e84db6f06d781a49464aafbc31dc2a679390b87c4ea3cee1e9ee920c3

    SHA512

    beaed3b4ffa672b91164aebc5466e215ed344b39ec01bd152cc57f2a1d3df37d8df182f62464e95028ac8702a3ba763553c841b41b98dd06fc7625e25e2e7b76

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6580.exe

    Filesize

    307KB

    MD5

    7d2a6747753708c8eaabd5439c25d72f

    SHA1

    01382c22add0a566e11cc8d9ff3fee1e488167ed

    SHA256

    688c6c9e84db6f06d781a49464aafbc31dc2a679390b87c4ea3cee1e9ee920c3

    SHA512

    beaed3b4ffa672b91164aebc5466e215ed344b39ec01bd152cc57f2a1d3df37d8df182f62464e95028ac8702a3ba763553c841b41b98dd06fc7625e25e2e7b76

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3435.exe

    Filesize

    365KB

    MD5

    ffbe7292ec8b792a8c61f37592906eb9

    SHA1

    00cbd1186cfc1b17738bb38fecc34d573820a26d

    SHA256

    0758a2fa1aa828f13e6330cc9c7110d516bc4527920527873064a9f303ff3de4

    SHA512

    d6705c0c95bfd443ef4cfa1457374df2bea0aef07ac05fce0e2c02d5a65c3cc845d2cf3ada3ee74b60f75fdc9d31a71fb8f305caaa17fac8c6c889bf022df47d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3435.exe

    Filesize

    365KB

    MD5

    ffbe7292ec8b792a8c61f37592906eb9

    SHA1

    00cbd1186cfc1b17738bb38fecc34d573820a26d

    SHA256

    0758a2fa1aa828f13e6330cc9c7110d516bc4527920527873064a9f303ff3de4

    SHA512

    d6705c0c95bfd443ef4cfa1457374df2bea0aef07ac05fce0e2c02d5a65c3cc845d2cf3ada3ee74b60f75fdc9d31a71fb8f305caaa17fac8c6c889bf022df47d

  • memory/2624-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2624-137-0x00000000022F0000-0x000000000230A000-memory.dmp

    Filesize

    104KB

  • memory/2624-138-0x0000000004E10000-0x000000000530E000-memory.dmp

    Filesize

    5.0MB

  • memory/2624-139-0x0000000004E00000-0x0000000004E10000-memory.dmp

    Filesize

    64KB

  • memory/2624-140-0x0000000002450000-0x0000000002468000-memory.dmp

    Filesize

    96KB

  • memory/2624-141-0x0000000002450000-0x0000000002462000-memory.dmp

    Filesize

    72KB

  • memory/2624-144-0x0000000002450000-0x0000000002462000-memory.dmp

    Filesize

    72KB

  • memory/2624-146-0x0000000002450000-0x0000000002462000-memory.dmp

    Filesize

    72KB

  • memory/2624-142-0x0000000002450000-0x0000000002462000-memory.dmp

    Filesize

    72KB

  • memory/2624-148-0x0000000002450000-0x0000000002462000-memory.dmp

    Filesize

    72KB

  • memory/2624-150-0x0000000002450000-0x0000000002462000-memory.dmp

    Filesize

    72KB

  • memory/2624-152-0x0000000002450000-0x0000000002462000-memory.dmp

    Filesize

    72KB

  • memory/2624-154-0x0000000002450000-0x0000000002462000-memory.dmp

    Filesize

    72KB

  • memory/2624-156-0x0000000002450000-0x0000000002462000-memory.dmp

    Filesize

    72KB

  • memory/2624-158-0x0000000002450000-0x0000000002462000-memory.dmp

    Filesize

    72KB

  • memory/2624-160-0x0000000002450000-0x0000000002462000-memory.dmp

    Filesize

    72KB

  • memory/2624-162-0x0000000002450000-0x0000000002462000-memory.dmp

    Filesize

    72KB

  • memory/2624-164-0x0000000002450000-0x0000000002462000-memory.dmp

    Filesize

    72KB

  • memory/2624-166-0x0000000002450000-0x0000000002462000-memory.dmp

    Filesize

    72KB

  • memory/2624-168-0x0000000002450000-0x0000000002462000-memory.dmp

    Filesize

    72KB

  • memory/2624-169-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/2624-171-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/3772-1110-0x0000000000790000-0x00000000007C2000-memory.dmp

    Filesize

    200KB

  • memory/3772-1112-0x0000000005380000-0x0000000005390000-memory.dmp

    Filesize

    64KB

  • memory/3772-1111-0x00000000051D0000-0x000000000521B000-memory.dmp

    Filesize

    300KB

  • memory/4416-183-0x0000000004C90000-0x0000000004CCF000-memory.dmp

    Filesize

    252KB

  • memory/4416-217-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/4416-181-0x0000000004C90000-0x0000000004CCF000-memory.dmp

    Filesize

    252KB

  • memory/4416-178-0x0000000004C90000-0x0000000004CCF000-memory.dmp

    Filesize

    252KB

  • memory/4416-185-0x0000000004C90000-0x0000000004CCF000-memory.dmp

    Filesize

    252KB

  • memory/4416-187-0x0000000004C90000-0x0000000004CCF000-memory.dmp

    Filesize

    252KB

  • memory/4416-189-0x0000000004C90000-0x0000000004CCF000-memory.dmp

    Filesize

    252KB

  • memory/4416-191-0x0000000004C90000-0x0000000004CCF000-memory.dmp

    Filesize

    252KB

  • memory/4416-193-0x0000000004C90000-0x0000000004CCF000-memory.dmp

    Filesize

    252KB

  • memory/4416-195-0x0000000004C90000-0x0000000004CCF000-memory.dmp

    Filesize

    252KB

  • memory/4416-197-0x0000000004C90000-0x0000000004CCF000-memory.dmp

    Filesize

    252KB

  • memory/4416-199-0x0000000004C90000-0x0000000004CCF000-memory.dmp

    Filesize

    252KB

  • memory/4416-201-0x0000000004C90000-0x0000000004CCF000-memory.dmp

    Filesize

    252KB

  • memory/4416-203-0x0000000004C90000-0x0000000004CCF000-memory.dmp

    Filesize

    252KB

  • memory/4416-205-0x0000000004C90000-0x0000000004CCF000-memory.dmp

    Filesize

    252KB

  • memory/4416-207-0x0000000004C90000-0x0000000004CCF000-memory.dmp

    Filesize

    252KB

  • memory/4416-209-0x0000000004C90000-0x0000000004CCF000-memory.dmp

    Filesize

    252KB

  • memory/4416-211-0x0000000004C90000-0x0000000004CCF000-memory.dmp

    Filesize

    252KB

  • memory/4416-213-0x0000000000750000-0x000000000079B000-memory.dmp

    Filesize

    300KB

  • memory/4416-179-0x0000000004C90000-0x0000000004CCF000-memory.dmp

    Filesize

    252KB

  • memory/4416-215-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/4416-219-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/4416-1088-0x0000000005230000-0x0000000005836000-memory.dmp

    Filesize

    6.0MB

  • memory/4416-1089-0x00000000058C0000-0x00000000059CA000-memory.dmp

    Filesize

    1.0MB

  • memory/4416-1090-0x0000000005A00000-0x0000000005A12000-memory.dmp

    Filesize

    72KB

  • memory/4416-1091-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/4416-1092-0x0000000005A20000-0x0000000005A5E000-memory.dmp

    Filesize

    248KB

  • memory/4416-1093-0x0000000005B70000-0x0000000005BBB000-memory.dmp

    Filesize

    300KB

  • memory/4416-1095-0x0000000005D00000-0x0000000005D66000-memory.dmp

    Filesize

    408KB

  • memory/4416-1096-0x00000000063C0000-0x0000000006452000-memory.dmp

    Filesize

    584KB

  • memory/4416-1098-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/4416-1097-0x00000000064A0000-0x0000000006662000-memory.dmp

    Filesize

    1.8MB

  • memory/4416-1099-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/4416-1100-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/4416-1101-0x0000000006680000-0x0000000006BAC000-memory.dmp

    Filesize

    5.2MB

  • memory/4416-177-0x0000000004C90000-0x0000000004CD4000-memory.dmp

    Filesize

    272KB

  • memory/4416-176-0x0000000004C10000-0x0000000004C56000-memory.dmp

    Filesize

    280KB

  • memory/4416-1102-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/4416-1103-0x0000000007050000-0x00000000070C6000-memory.dmp

    Filesize

    472KB

  • memory/4416-1104-0x00000000070E0000-0x0000000007130000-memory.dmp

    Filesize

    320KB