Analysis

  • max time kernel
    56s
  • max time network
    69s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 22:30

General

  • Target

    92bfb93d33bd04592b497463f01720131d6ba3359f7a4eff0eaf39449783a159.exe

  • Size

    699KB

  • MD5

    b522ef555d453dd30e677ce7260d1b29

  • SHA1

    01985586771d4540727c0afddb5974956a01b491

  • SHA256

    92bfb93d33bd04592b497463f01720131d6ba3359f7a4eff0eaf39449783a159

  • SHA512

    e8df93a92105ff5eace35fb674ebdbd2683dfb9d0e61cde7166d5563791fbe13a0f9c10fc2e28e01a7fe5cb7cc6f5885a7c0f890b3cc9c7d920456f95abf603e

  • SSDEEP

    12288:uMrJy90hxYEwtqipxvOQOE/Gm3NNhunA2H1Z5Mj7sfOXA1ZFH:fyCx2XpFOW/GENSA2VbMHsuCn

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\92bfb93d33bd04592b497463f01720131d6ba3359f7a4eff0eaf39449783a159.exe
    "C:\Users\Admin\AppData\Local\Temp\92bfb93d33bd04592b497463f01720131d6ba3359f7a4eff0eaf39449783a159.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un072789.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un072789.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8951.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8951.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1860
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2044.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2044.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1000
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si886222.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si886222.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4644

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si886222.exe

    Filesize

    175KB

    MD5

    3c20202628b76521b1b1036ec4f6a337

    SHA1

    2c7fe3225a8b372aff4a755294e4dc70401cbaaf

    SHA256

    4d8c2878e9c36463e2c072d32893a52f239632b44881f4996bb5e0285f610ab7

    SHA512

    3a842c0c5ca0fc087a8fc049e61d8c3e5de5328f86a17eeecce6dda0ef887febab56e4dd927cc68635cb220b16bb23b06244b55797f89fc9a6b22b39ef3f5ef9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si886222.exe

    Filesize

    175KB

    MD5

    3c20202628b76521b1b1036ec4f6a337

    SHA1

    2c7fe3225a8b372aff4a755294e4dc70401cbaaf

    SHA256

    4d8c2878e9c36463e2c072d32893a52f239632b44881f4996bb5e0285f610ab7

    SHA512

    3a842c0c5ca0fc087a8fc049e61d8c3e5de5328f86a17eeecce6dda0ef887febab56e4dd927cc68635cb220b16bb23b06244b55797f89fc9a6b22b39ef3f5ef9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un072789.exe

    Filesize

    558KB

    MD5

    fd63af94e93beeda6df4262b704ad077

    SHA1

    75b21bb42ffcd4a82d14ee0e2cc3c409c7e56bfa

    SHA256

    b946b1d8fbc7d29cbf06a06c03c3c4dca38c1d187ce1129cb5db7e31566cf45e

    SHA512

    61a6468f20d4407404e6496f8a370f675f8122307231acb231358d469565994cf926ade4d35c18b0ddadc7476ebd6c945805554adfb3b4e6434daa89b85b794a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un072789.exe

    Filesize

    558KB

    MD5

    fd63af94e93beeda6df4262b704ad077

    SHA1

    75b21bb42ffcd4a82d14ee0e2cc3c409c7e56bfa

    SHA256

    b946b1d8fbc7d29cbf06a06c03c3c4dca38c1d187ce1129cb5db7e31566cf45e

    SHA512

    61a6468f20d4407404e6496f8a370f675f8122307231acb231358d469565994cf926ade4d35c18b0ddadc7476ebd6c945805554adfb3b4e6434daa89b85b794a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8951.exe

    Filesize

    307KB

    MD5

    eb9044750aee5dc556bf01c9ea74b357

    SHA1

    2c2e88b93991c9459b0af1fd8a53b03ca9c7c4ad

    SHA256

    35fd605d210c59c508b9e8dd37819f50debe05cb8441dfa4932f0ddc9b1de260

    SHA512

    137ba7ebe7a00cd94f39bd1960880b5bb7f1c735930c7cd93edc03741ef30b84f84a052bf6f9deda919f3bb06e5fd10ffb7333325973fa99121806bebea7d7c7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8951.exe

    Filesize

    307KB

    MD5

    eb9044750aee5dc556bf01c9ea74b357

    SHA1

    2c2e88b93991c9459b0af1fd8a53b03ca9c7c4ad

    SHA256

    35fd605d210c59c508b9e8dd37819f50debe05cb8441dfa4932f0ddc9b1de260

    SHA512

    137ba7ebe7a00cd94f39bd1960880b5bb7f1c735930c7cd93edc03741ef30b84f84a052bf6f9deda919f3bb06e5fd10ffb7333325973fa99121806bebea7d7c7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2044.exe

    Filesize

    365KB

    MD5

    8335334ff4896bc29a0140e59617df91

    SHA1

    95a42645d791a86e888dd8a1139457910bf7d5b1

    SHA256

    f8e526c49503b62e448443222ff1c814a724e736fdb363bde8cc3d0931e6a1be

    SHA512

    aee386412be5a4e49b51058d879193ea12602edf3ba1d9e6dfb331cd29702de420dc37fe96fa3f993a05bb603895f99cd9afb4e4dc0639be574069b486f3daca

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2044.exe

    Filesize

    365KB

    MD5

    8335334ff4896bc29a0140e59617df91

    SHA1

    95a42645d791a86e888dd8a1139457910bf7d5b1

    SHA256

    f8e526c49503b62e448443222ff1c814a724e736fdb363bde8cc3d0931e6a1be

    SHA512

    aee386412be5a4e49b51058d879193ea12602edf3ba1d9e6dfb331cd29702de420dc37fe96fa3f993a05bb603895f99cd9afb4e4dc0639be574069b486f3daca

  • memory/1000-1090-0x00000000052A0000-0x00000000058A6000-memory.dmp

    Filesize

    6.0MB

  • memory/1000-1091-0x00000000058C0000-0x00000000059CA000-memory.dmp

    Filesize

    1.0MB

  • memory/1000-1106-0x0000000002480000-0x0000000002490000-memory.dmp

    Filesize

    64KB

  • memory/1000-1105-0x00000000068B0000-0x0000000006DDC000-memory.dmp

    Filesize

    5.2MB

  • memory/1000-1104-0x00000000066D0000-0x0000000006892000-memory.dmp

    Filesize

    1.8MB

  • memory/1000-1103-0x0000000006670000-0x00000000066C0000-memory.dmp

    Filesize

    320KB

  • memory/1000-1102-0x00000000065F0000-0x0000000006666000-memory.dmp

    Filesize

    472KB

  • memory/1000-189-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/1000-1101-0x0000000002480000-0x0000000002490000-memory.dmp

    Filesize

    64KB

  • memory/1000-1100-0x0000000002480000-0x0000000002490000-memory.dmp

    Filesize

    64KB

  • memory/1000-1099-0x0000000002480000-0x0000000002490000-memory.dmp

    Filesize

    64KB

  • memory/1000-1098-0x0000000005DA0000-0x0000000005E06000-memory.dmp

    Filesize

    408KB

  • memory/1000-1097-0x0000000005D00000-0x0000000005D92000-memory.dmp

    Filesize

    584KB

  • memory/1000-193-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/1000-1095-0x0000000005B70000-0x0000000005BBB000-memory.dmp

    Filesize

    300KB

  • memory/1000-1094-0x0000000005A20000-0x0000000005A5E000-memory.dmp

    Filesize

    248KB

  • memory/1000-1093-0x0000000002480000-0x0000000002490000-memory.dmp

    Filesize

    64KB

  • memory/1000-195-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/1000-1092-0x0000000005A00000-0x0000000005A12000-memory.dmp

    Filesize

    72KB

  • memory/1000-207-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/1000-217-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/1000-215-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/1000-178-0x00000000024D0000-0x0000000002516000-memory.dmp

    Filesize

    280KB

  • memory/1000-179-0x0000000002550000-0x0000000002594000-memory.dmp

    Filesize

    272KB

  • memory/1000-180-0x0000000000720000-0x000000000076B000-memory.dmp

    Filesize

    300KB

  • memory/1000-181-0x0000000002480000-0x0000000002490000-memory.dmp

    Filesize

    64KB

  • memory/1000-182-0x0000000002480000-0x0000000002490000-memory.dmp

    Filesize

    64KB

  • memory/1000-183-0x0000000002480000-0x0000000002490000-memory.dmp

    Filesize

    64KB

  • memory/1000-184-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/1000-185-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/1000-187-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/1000-191-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/1000-213-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/1000-211-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/1000-209-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/1000-197-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/1000-199-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/1000-201-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/1000-203-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/1000-205-0x0000000002550000-0x000000000258F000-memory.dmp

    Filesize

    252KB

  • memory/1860-169-0x0000000002200000-0x0000000002210000-memory.dmp

    Filesize

    64KB

  • memory/1860-170-0x0000000002200000-0x0000000002210000-memory.dmp

    Filesize

    64KB

  • memory/1860-165-0x0000000005170000-0x0000000005182000-memory.dmp

    Filesize

    72KB

  • memory/1860-153-0x0000000005170000-0x0000000005182000-memory.dmp

    Filesize

    72KB

  • memory/1860-139-0x0000000005170000-0x0000000005188000-memory.dmp

    Filesize

    96KB

  • memory/1860-140-0x0000000005170000-0x0000000005182000-memory.dmp

    Filesize

    72KB

  • memory/1860-138-0x0000000004C70000-0x000000000516E000-memory.dmp

    Filesize

    5.0MB

  • memory/1860-173-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/1860-171-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/1860-143-0x0000000005170000-0x0000000005182000-memory.dmp

    Filesize

    72KB

  • memory/1860-168-0x0000000002200000-0x0000000002210000-memory.dmp

    Filesize

    64KB

  • memory/1860-167-0x0000000005170000-0x0000000005182000-memory.dmp

    Filesize

    72KB

  • memory/1860-163-0x0000000005170000-0x0000000005182000-memory.dmp

    Filesize

    72KB

  • memory/1860-161-0x0000000005170000-0x0000000005182000-memory.dmp

    Filesize

    72KB

  • memory/1860-159-0x0000000005170000-0x0000000005182000-memory.dmp

    Filesize

    72KB

  • memory/1860-157-0x0000000005170000-0x0000000005182000-memory.dmp

    Filesize

    72KB

  • memory/1860-155-0x0000000005170000-0x0000000005182000-memory.dmp

    Filesize

    72KB

  • memory/1860-151-0x0000000005170000-0x0000000005182000-memory.dmp

    Filesize

    72KB

  • memory/1860-149-0x0000000005170000-0x0000000005182000-memory.dmp

    Filesize

    72KB

  • memory/1860-147-0x0000000005170000-0x0000000005182000-memory.dmp

    Filesize

    72KB

  • memory/1860-145-0x0000000005170000-0x0000000005182000-memory.dmp

    Filesize

    72KB

  • memory/1860-141-0x0000000005170000-0x0000000005182000-memory.dmp

    Filesize

    72KB

  • memory/1860-137-0x0000000002230000-0x000000000224A000-memory.dmp

    Filesize

    104KB

  • memory/1860-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4644-1112-0x0000000000C70000-0x0000000000CA2000-memory.dmp

    Filesize

    200KB

  • memory/4644-1113-0x00000000056B0000-0x00000000056FB000-memory.dmp

    Filesize

    300KB

  • memory/4644-1114-0x0000000005500000-0x0000000005510000-memory.dmp

    Filesize

    64KB