Analysis

  • max time kernel
    68s
  • max time network
    131s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 22:52

General

  • Target

    83ee7466d9c88027a51e4759c2d2a43c795450b236a4c8e24833ad55718f66dd.exe

  • Size

    699KB

  • MD5

    647429c01f43a89170f674f9edfc6f06

  • SHA1

    38f608d17bb6cc0d628a600e87bf3ef1e5c898f4

  • SHA256

    83ee7466d9c88027a51e4759c2d2a43c795450b236a4c8e24833ad55718f66dd

  • SHA512

    196bea0299cb76d1f6737fdbc1ffe4ac4d09a59a39a82ce5e1c8eca11f7a15048b99f6c88167566c33f1614975e98d8c886d850d0630f798734ab38453069cf3

  • SSDEEP

    12288:MMrVy90/YhxnSFEUQw6A79DHicAD0CdOpq6r9GFgxj7dDMKqsH0Al:py8YhpSmvZgCdcvcFsHdDMYh

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83ee7466d9c88027a51e4759c2d2a43c795450b236a4c8e24833ad55718f66dd.exe
    "C:\Users\Admin\AppData\Local\Temp\83ee7466d9c88027a51e4759c2d2a43c795450b236a4c8e24833ad55718f66dd.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un569710.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un569710.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2268
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7003.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7003.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2624
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8796.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8796.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4740
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si488006.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si488006.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1340

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si488006.exe

    Filesize

    175KB

    MD5

    fc9f5ae939daef5701bb1b823fbcb2b8

    SHA1

    a45f260e6473477effa600c50c968950bf5c86ac

    SHA256

    aecf3f4d520a6a9940d4e1fd8c590693372b435142458fc5a9c0001669dd6c23

    SHA512

    3fc86d83a0fb75be830f98f77dde19b4ab456b547908d125c1e1770203c7efb64bc5cd02eafbb2c7187096bf4c71d48e9bc4e68a4c530154bec301ae60562b9c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si488006.exe

    Filesize

    175KB

    MD5

    fc9f5ae939daef5701bb1b823fbcb2b8

    SHA1

    a45f260e6473477effa600c50c968950bf5c86ac

    SHA256

    aecf3f4d520a6a9940d4e1fd8c590693372b435142458fc5a9c0001669dd6c23

    SHA512

    3fc86d83a0fb75be830f98f77dde19b4ab456b547908d125c1e1770203c7efb64bc5cd02eafbb2c7187096bf4c71d48e9bc4e68a4c530154bec301ae60562b9c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un569710.exe

    Filesize

    557KB

    MD5

    ec4603e9f124594d8c1d438696e946ce

    SHA1

    f03e1c670381ff95ee52cf861234f18ce6a6dc23

    SHA256

    de56f38bd451d29d7c9fcb8cf08c025a4eb4c4147ecfc2ac35787336667a4eda

    SHA512

    62a968eb2b1dbc1273b0317ccdaef2ee4cc02affd42cb46d4801c10dedf5e4097393495c1d443c1ce73dae588b9997a757d4252a21b501750a552b2696df065d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un569710.exe

    Filesize

    557KB

    MD5

    ec4603e9f124594d8c1d438696e946ce

    SHA1

    f03e1c670381ff95ee52cf861234f18ce6a6dc23

    SHA256

    de56f38bd451d29d7c9fcb8cf08c025a4eb4c4147ecfc2ac35787336667a4eda

    SHA512

    62a968eb2b1dbc1273b0317ccdaef2ee4cc02affd42cb46d4801c10dedf5e4097393495c1d443c1ce73dae588b9997a757d4252a21b501750a552b2696df065d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7003.exe

    Filesize

    307KB

    MD5

    c017e410ca54ed6a4a4bcbea8f2e961b

    SHA1

    9f51c525d6e3cf4b09d5dbe4279f5cef579beb61

    SHA256

    b65f514ca58f50c38faa4ba39cb84015bc60abf0882af576f4e38f619edf1a2e

    SHA512

    f4a9c595fd3fbaa14bc18ca1a0decb907c72e25d313f79155bee998c530742d4232510520ad517a56b8bdb2aca9448b8cd9d511b6d79f210ed4489c3a48c12b3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7003.exe

    Filesize

    307KB

    MD5

    c017e410ca54ed6a4a4bcbea8f2e961b

    SHA1

    9f51c525d6e3cf4b09d5dbe4279f5cef579beb61

    SHA256

    b65f514ca58f50c38faa4ba39cb84015bc60abf0882af576f4e38f619edf1a2e

    SHA512

    f4a9c595fd3fbaa14bc18ca1a0decb907c72e25d313f79155bee998c530742d4232510520ad517a56b8bdb2aca9448b8cd9d511b6d79f210ed4489c3a48c12b3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8796.exe

    Filesize

    365KB

    MD5

    cec31fa2797ffdf3fce7660896a3a805

    SHA1

    8e840047474696ac99a0eae48b73251920907f7f

    SHA256

    43a41628ed9ce33d140a3e7725e6640774aca572be9943e2c7045f41bf365c14

    SHA512

    0c8903d4dba3d2c767aa1b9259518cfcc3e262edcd360e246a9d8fb02be6bd9bc7d021304e6b02430004e597f102033ab47ae8a7b81c70d4ed6549346953e70f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8796.exe

    Filesize

    365KB

    MD5

    cec31fa2797ffdf3fce7660896a3a805

    SHA1

    8e840047474696ac99a0eae48b73251920907f7f

    SHA256

    43a41628ed9ce33d140a3e7725e6640774aca572be9943e2c7045f41bf365c14

    SHA512

    0c8903d4dba3d2c767aa1b9259518cfcc3e262edcd360e246a9d8fb02be6bd9bc7d021304e6b02430004e597f102033ab47ae8a7b81c70d4ed6549346953e70f

  • memory/1340-1115-0x0000000000CA0000-0x0000000000CD2000-memory.dmp

    Filesize

    200KB

  • memory/1340-1116-0x00000000056E0000-0x000000000572B000-memory.dmp

    Filesize

    300KB

  • memory/1340-1117-0x00000000057F0000-0x0000000005800000-memory.dmp

    Filesize

    64KB

  • memory/2624-146-0x00000000025B0000-0x00000000025C2000-memory.dmp

    Filesize

    72KB

  • memory/2624-158-0x00000000025B0000-0x00000000025C2000-memory.dmp

    Filesize

    72KB

  • memory/2624-140-0x0000000004F30000-0x0000000004F40000-memory.dmp

    Filesize

    64KB

  • memory/2624-141-0x0000000004F30000-0x0000000004F40000-memory.dmp

    Filesize

    64KB

  • memory/2624-142-0x0000000004F30000-0x0000000004F40000-memory.dmp

    Filesize

    64KB

  • memory/2624-143-0x00000000025B0000-0x00000000025C2000-memory.dmp

    Filesize

    72KB

  • memory/2624-144-0x00000000025B0000-0x00000000025C2000-memory.dmp

    Filesize

    72KB

  • memory/2624-138-0x0000000004F40000-0x000000000543E000-memory.dmp

    Filesize

    5.0MB

  • memory/2624-148-0x00000000025B0000-0x00000000025C2000-memory.dmp

    Filesize

    72KB

  • memory/2624-150-0x00000000025B0000-0x00000000025C2000-memory.dmp

    Filesize

    72KB

  • memory/2624-152-0x00000000025B0000-0x00000000025C2000-memory.dmp

    Filesize

    72KB

  • memory/2624-154-0x00000000025B0000-0x00000000025C2000-memory.dmp

    Filesize

    72KB

  • memory/2624-156-0x00000000025B0000-0x00000000025C2000-memory.dmp

    Filesize

    72KB

  • memory/2624-139-0x00000000025B0000-0x00000000025C8000-memory.dmp

    Filesize

    96KB

  • memory/2624-160-0x00000000025B0000-0x00000000025C2000-memory.dmp

    Filesize

    72KB

  • memory/2624-162-0x00000000025B0000-0x00000000025C2000-memory.dmp

    Filesize

    72KB

  • memory/2624-164-0x00000000025B0000-0x00000000025C2000-memory.dmp

    Filesize

    72KB

  • memory/2624-166-0x00000000025B0000-0x00000000025C2000-memory.dmp

    Filesize

    72KB

  • memory/2624-168-0x00000000025B0000-0x00000000025C2000-memory.dmp

    Filesize

    72KB

  • memory/2624-170-0x00000000025B0000-0x00000000025C2000-memory.dmp

    Filesize

    72KB

  • memory/2624-171-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/2624-172-0x0000000004F30000-0x0000000004F40000-memory.dmp

    Filesize

    64KB

  • memory/2624-173-0x0000000004F30000-0x0000000004F40000-memory.dmp

    Filesize

    64KB

  • memory/2624-174-0x0000000004F30000-0x0000000004F40000-memory.dmp

    Filesize

    64KB

  • memory/2624-176-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/2624-137-0x0000000000C70000-0x0000000000C8A000-memory.dmp

    Filesize

    104KB

  • memory/2624-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4740-183-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4740-223-0x0000000002720000-0x0000000002730000-memory.dmp

    Filesize

    64KB

  • memory/4740-186-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4740-188-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4740-190-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4740-192-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4740-194-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4740-196-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4740-198-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4740-200-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4740-202-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4740-204-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4740-208-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4740-206-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4740-210-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4740-212-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4740-214-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4740-216-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4740-219-0x0000000000720000-0x000000000076B000-memory.dmp

    Filesize

    300KB

  • memory/4740-184-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4740-221-0x0000000002720000-0x0000000002730000-memory.dmp

    Filesize

    64KB

  • memory/4740-225-0x0000000002720000-0x0000000002730000-memory.dmp

    Filesize

    64KB

  • memory/4740-1093-0x0000000005230000-0x0000000005836000-memory.dmp

    Filesize

    6.0MB

  • memory/4740-1094-0x00000000058C0000-0x00000000059CA000-memory.dmp

    Filesize

    1.0MB

  • memory/4740-1095-0x0000000005A00000-0x0000000005A12000-memory.dmp

    Filesize

    72KB

  • memory/4740-1096-0x0000000005A20000-0x0000000005A5E000-memory.dmp

    Filesize

    248KB

  • memory/4740-1097-0x0000000002720000-0x0000000002730000-memory.dmp

    Filesize

    64KB

  • memory/4740-1098-0x0000000005B70000-0x0000000005BBB000-memory.dmp

    Filesize

    300KB

  • memory/4740-1100-0x0000000005D00000-0x0000000005D92000-memory.dmp

    Filesize

    584KB

  • memory/4740-1101-0x0000000005DA0000-0x0000000005E06000-memory.dmp

    Filesize

    408KB

  • memory/4740-1102-0x0000000006460000-0x00000000064D6000-memory.dmp

    Filesize

    472KB

  • memory/4740-1103-0x0000000006500000-0x0000000006550000-memory.dmp

    Filesize

    320KB

  • memory/4740-1104-0x0000000002720000-0x0000000002730000-memory.dmp

    Filesize

    64KB

  • memory/4740-1105-0x0000000002720000-0x0000000002730000-memory.dmp

    Filesize

    64KB

  • memory/4740-1106-0x0000000002720000-0x0000000002730000-memory.dmp

    Filesize

    64KB

  • memory/4740-182-0x00000000051C0000-0x0000000005204000-memory.dmp

    Filesize

    272KB

  • memory/4740-181-0x0000000002690000-0x00000000026D6000-memory.dmp

    Filesize

    280KB

  • memory/4740-1107-0x0000000006580000-0x0000000006742000-memory.dmp

    Filesize

    1.8MB

  • memory/4740-1108-0x0000000006760000-0x0000000006C8C000-memory.dmp

    Filesize

    5.2MB

  • memory/4740-1109-0x0000000002720000-0x0000000002730000-memory.dmp

    Filesize

    64KB