Analysis

  • max time kernel
    55s
  • max time network
    149s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 22:54

General

  • Target

    e45d4f49ecc96f0f547227a02f637f7c9efffbb707a3d6e925ae1c59058be757.exe

  • Size

    700KB

  • MD5

    545ae6221d77b17dface82c531f1cce9

  • SHA1

    2b5253d1b21c0f7d38e6fca82cb5a1cdd80cde67

  • SHA256

    e45d4f49ecc96f0f547227a02f637f7c9efffbb707a3d6e925ae1c59058be757

  • SHA512

    6b8236d73b76dfc3b496f1fe75511856a2fd4e248e58926aeb09ef43d5bca77d4656d2ef4068020cb94bc770de9d6813d4d56d82fcabf14754f611af3b96719f

  • SSDEEP

    12288:1Mr/y9062ZdylVnQ49DVFcAD8F/d9bq6UeNXHfISHmUi4tdwyM9yXmmvech:CylRD8hd9m6UeNXnmat6Gh

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e45d4f49ecc96f0f547227a02f637f7c9efffbb707a3d6e925ae1c59058be757.exe
    "C:\Users\Admin\AppData\Local\Temp\e45d4f49ecc96f0f547227a02f637f7c9efffbb707a3d6e925ae1c59058be757.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un653868.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un653868.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2120
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5984.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5984.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4248
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0165.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0165.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3048
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si455646.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si455646.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4504

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si455646.exe

    Filesize

    175KB

    MD5

    17cf6f1223eea737f806279383b50e34

    SHA1

    ac8ec22195ea2af285e1dbc0cfabee06bc89136d

    SHA256

    012de5546a60b759542d809456c7c3a2c79d5bb2ee03f1318af99ec2f3008bd4

    SHA512

    67001a4dde983253324ae785c6dabe8c7a45f80dae8e62f4f79c99430aca62fe0c166014b5552626f05956aa038c16bd958e424d41275e660be3b090442287d9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si455646.exe

    Filesize

    175KB

    MD5

    17cf6f1223eea737f806279383b50e34

    SHA1

    ac8ec22195ea2af285e1dbc0cfabee06bc89136d

    SHA256

    012de5546a60b759542d809456c7c3a2c79d5bb2ee03f1318af99ec2f3008bd4

    SHA512

    67001a4dde983253324ae785c6dabe8c7a45f80dae8e62f4f79c99430aca62fe0c166014b5552626f05956aa038c16bd958e424d41275e660be3b090442287d9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un653868.exe

    Filesize

    558KB

    MD5

    c3639594a4ae487c98c05f367745d8ec

    SHA1

    7fa3b3ea2f539b3c651412b85ddef5b9196a233b

    SHA256

    7591e5c826d7f42928708a66eee27812db82b289431763718feb90e3963620ce

    SHA512

    45a2d8a9c8ddefe8c56bcd108bf1c34399aa03f305ca3f4cf73f2010a89628fd686f799726411fa39ef44b5ba4703794f461d963728ac6c3d20b9c75d4eec700

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un653868.exe

    Filesize

    558KB

    MD5

    c3639594a4ae487c98c05f367745d8ec

    SHA1

    7fa3b3ea2f539b3c651412b85ddef5b9196a233b

    SHA256

    7591e5c826d7f42928708a66eee27812db82b289431763718feb90e3963620ce

    SHA512

    45a2d8a9c8ddefe8c56bcd108bf1c34399aa03f305ca3f4cf73f2010a89628fd686f799726411fa39ef44b5ba4703794f461d963728ac6c3d20b9c75d4eec700

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5984.exe

    Filesize

    307KB

    MD5

    e530f7db9e4bdcea56c9bc9a61922a5a

    SHA1

    904b6d85e213a8344685f8de05085c77eab34d30

    SHA256

    1ae73d30a75a61b2c02dff719f0258944841c2e3e8f0ef6efa2f8c4b244951d8

    SHA512

    1a9547e36dae26cdf024a8febaa2f6970cec84d89999d98f21384974a02329dd8cac8c43f4b7fd2f7e00da924c3b20038fcdd718aef817ee2b4e25a9c6c3507c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5984.exe

    Filesize

    307KB

    MD5

    e530f7db9e4bdcea56c9bc9a61922a5a

    SHA1

    904b6d85e213a8344685f8de05085c77eab34d30

    SHA256

    1ae73d30a75a61b2c02dff719f0258944841c2e3e8f0ef6efa2f8c4b244951d8

    SHA512

    1a9547e36dae26cdf024a8febaa2f6970cec84d89999d98f21384974a02329dd8cac8c43f4b7fd2f7e00da924c3b20038fcdd718aef817ee2b4e25a9c6c3507c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0165.exe

    Filesize

    365KB

    MD5

    6809553befd28601967675c44eafeeab

    SHA1

    bdae22fd794a2c522f4134fbff927370b0022229

    SHA256

    13e1e9ee54410582dd874b81cc51bc42c3be88b54d2cd859ae9a15c516432064

    SHA512

    0d103b8e56702652bbd625191fe4ad784911bf81c6bf271946fccff50a11f59eedcb8fce23398da0389222ccd1d4715130710ca135b926b2566f5034f04377e2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0165.exe

    Filesize

    365KB

    MD5

    6809553befd28601967675c44eafeeab

    SHA1

    bdae22fd794a2c522f4134fbff927370b0022229

    SHA256

    13e1e9ee54410582dd874b81cc51bc42c3be88b54d2cd859ae9a15c516432064

    SHA512

    0d103b8e56702652bbd625191fe4ad784911bf81c6bf271946fccff50a11f59eedcb8fce23398da0389222ccd1d4715130710ca135b926b2566f5034f04377e2

  • memory/3048-1092-0x00000000059D0000-0x0000000005FD6000-memory.dmp

    Filesize

    6.0MB

  • memory/3048-1093-0x00000000053F0000-0x00000000054FA000-memory.dmp

    Filesize

    1.0MB

  • memory/3048-1108-0x0000000006AF0000-0x000000000701C000-memory.dmp

    Filesize

    5.2MB

  • memory/3048-194-0x0000000002450000-0x000000000248F000-memory.dmp

    Filesize

    252KB

  • memory/3048-1107-0x0000000006920000-0x0000000006AE2000-memory.dmp

    Filesize

    1.8MB

  • memory/3048-196-0x0000000002270000-0x0000000002280000-memory.dmp

    Filesize

    64KB

  • memory/3048-1106-0x0000000002270000-0x0000000002280000-memory.dmp

    Filesize

    64KB

  • memory/3048-1105-0x00000000068B0000-0x0000000006900000-memory.dmp

    Filesize

    320KB

  • memory/3048-1104-0x0000000006830000-0x00000000068A6000-memory.dmp

    Filesize

    472KB

  • memory/3048-1103-0x0000000002270000-0x0000000002280000-memory.dmp

    Filesize

    64KB

  • memory/3048-1102-0x0000000002270000-0x0000000002280000-memory.dmp

    Filesize

    64KB

  • memory/3048-1101-0x0000000002270000-0x0000000002280000-memory.dmp

    Filesize

    64KB

  • memory/3048-1100-0x0000000006510000-0x00000000065A2000-memory.dmp

    Filesize

    584KB

  • memory/3048-1098-0x0000000005830000-0x0000000005896000-memory.dmp

    Filesize

    408KB

  • memory/3048-1097-0x0000000002270000-0x0000000002280000-memory.dmp

    Filesize

    64KB

  • memory/3048-1096-0x00000000056A0000-0x00000000056EB000-memory.dmp

    Filesize

    300KB

  • memory/3048-1095-0x0000000005550000-0x000000000558E000-memory.dmp

    Filesize

    248KB

  • memory/3048-1094-0x0000000005530000-0x0000000005542000-memory.dmp

    Filesize

    72KB

  • memory/3048-198-0x0000000002270000-0x0000000002280000-memory.dmp

    Filesize

    64KB

  • memory/3048-203-0x0000000002450000-0x000000000248F000-memory.dmp

    Filesize

    252KB

  • memory/3048-219-0x0000000002450000-0x000000000248F000-memory.dmp

    Filesize

    252KB

  • memory/3048-211-0x0000000002450000-0x000000000248F000-memory.dmp

    Filesize

    252KB

  • memory/3048-217-0x0000000002450000-0x000000000248F000-memory.dmp

    Filesize

    252KB

  • memory/3048-213-0x0000000002450000-0x000000000248F000-memory.dmp

    Filesize

    252KB

  • memory/3048-215-0x0000000002450000-0x000000000248F000-memory.dmp

    Filesize

    252KB

  • memory/3048-180-0x00000000023B0000-0x00000000023F6000-memory.dmp

    Filesize

    280KB

  • memory/3048-181-0x0000000002450000-0x0000000002494000-memory.dmp

    Filesize

    272KB

  • memory/3048-182-0x0000000002450000-0x000000000248F000-memory.dmp

    Filesize

    252KB

  • memory/3048-183-0x0000000002450000-0x000000000248F000-memory.dmp

    Filesize

    252KB

  • memory/3048-185-0x0000000002450000-0x000000000248F000-memory.dmp

    Filesize

    252KB

  • memory/3048-187-0x0000000002450000-0x000000000248F000-memory.dmp

    Filesize

    252KB

  • memory/3048-189-0x0000000002450000-0x000000000248F000-memory.dmp

    Filesize

    252KB

  • memory/3048-191-0x0000000002450000-0x000000000248F000-memory.dmp

    Filesize

    252KB

  • memory/3048-193-0x0000000000770000-0x00000000007BB000-memory.dmp

    Filesize

    300KB

  • memory/3048-209-0x0000000002450000-0x000000000248F000-memory.dmp

    Filesize

    252KB

  • memory/3048-207-0x0000000002450000-0x000000000248F000-memory.dmp

    Filesize

    252KB

  • memory/3048-205-0x0000000002450000-0x000000000248F000-memory.dmp

    Filesize

    252KB

  • memory/3048-197-0x0000000002450000-0x000000000248F000-memory.dmp

    Filesize

    252KB

  • memory/3048-200-0x0000000002270000-0x0000000002280000-memory.dmp

    Filesize

    64KB

  • memory/3048-201-0x0000000002450000-0x000000000248F000-memory.dmp

    Filesize

    252KB

  • memory/4248-170-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4248-140-0x00000000022A0000-0x00000000022B0000-memory.dmp

    Filesize

    64KB

  • memory/4248-145-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/4248-142-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/4248-138-0x00000000020B0000-0x00000000020DD000-memory.dmp

    Filesize

    180KB

  • memory/4248-139-0x00000000022A0000-0x00000000022B0000-memory.dmp

    Filesize

    64KB

  • memory/4248-175-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4248-173-0x00000000022A0000-0x00000000022B0000-memory.dmp

    Filesize

    64KB

  • memory/4248-172-0x00000000022A0000-0x00000000022B0000-memory.dmp

    Filesize

    64KB

  • memory/4248-137-0x0000000005140000-0x0000000005158000-memory.dmp

    Filesize

    96KB

  • memory/4248-171-0x00000000022A0000-0x00000000022B0000-memory.dmp

    Filesize

    64KB

  • memory/4248-169-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/4248-167-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/4248-163-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/4248-165-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/4248-161-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/4248-159-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/4248-157-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/4248-155-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/4248-153-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/4248-151-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/4248-149-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/4248-147-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/4248-143-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/4248-141-0x00000000022A0000-0x00000000022B0000-memory.dmp

    Filesize

    64KB

  • memory/4248-136-0x0000000004BE0000-0x00000000050DE000-memory.dmp

    Filesize

    5.0MB

  • memory/4248-135-0x0000000002280000-0x000000000229A000-memory.dmp

    Filesize

    104KB

  • memory/4504-1114-0x0000000000F50000-0x0000000000F82000-memory.dmp

    Filesize

    200KB

  • memory/4504-1115-0x0000000005AB0000-0x0000000005AC0000-memory.dmp

    Filesize

    64KB

  • memory/4504-1116-0x0000000005990000-0x00000000059DB000-memory.dmp

    Filesize

    300KB

  • memory/4504-1117-0x0000000005AB0000-0x0000000005AC0000-memory.dmp

    Filesize

    64KB