Analysis

  • max time kernel
    56s
  • max time network
    59s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 23:21

General

  • Target

    beb7f5e5d647cd4a5337d4d685f028f455435d03e77d13a48a19cc23f4d69cf7.exe

  • Size

    701KB

  • MD5

    3d97864554b4daa8ddf91815983ee375

  • SHA1

    3d722165c0db3b8de4263f8a6cac93ec8d8f7c90

  • SHA256

    beb7f5e5d647cd4a5337d4d685f028f455435d03e77d13a48a19cc23f4d69cf7

  • SHA512

    bc4dedf350c0e6e64da5d77addbd2235844766f051dc4b5212dffacf659bcd414651ced7213369c6f5ca624263438968a510c99e659efdef0ff6d1455d06c03e

  • SSDEEP

    12288:RMrzy90rqgi/9kEBuVNAXBARhh0iPrCG+7gLvN:eywq1kj7OBRiOGlrN

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\beb7f5e5d647cd4a5337d4d685f028f455435d03e77d13a48a19cc23f4d69cf7.exe
    "C:\Users\Admin\AppData\Local\Temp\beb7f5e5d647cd4a5337d4d685f028f455435d03e77d13a48a19cc23f4d69cf7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3796
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un064465.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un064465.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4144
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3583.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3583.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4132
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9052.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9052.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3592
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si277670.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si277670.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3920

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si277670.exe

    Filesize

    175KB

    MD5

    ca3316b690404766b0c27a81d7ea5221

    SHA1

    1d4f1dbd39b513bd69b413eae3730d8cf73a3b80

    SHA256

    87cd6ee3e16e3ea8ce3dcdafd4f618ab514e85a38d3578b27c1509c9ff444044

    SHA512

    79133672805907ee895ce89fcac2a7dbdbf55d8914d26b89d05d611ff81ca61c7c911abebb68704039a0cba8143249abd41c1f672b46f82077eca4511a7d9384

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si277670.exe

    Filesize

    175KB

    MD5

    ca3316b690404766b0c27a81d7ea5221

    SHA1

    1d4f1dbd39b513bd69b413eae3730d8cf73a3b80

    SHA256

    87cd6ee3e16e3ea8ce3dcdafd4f618ab514e85a38d3578b27c1509c9ff444044

    SHA512

    79133672805907ee895ce89fcac2a7dbdbf55d8914d26b89d05d611ff81ca61c7c911abebb68704039a0cba8143249abd41c1f672b46f82077eca4511a7d9384

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un064465.exe

    Filesize

    558KB

    MD5

    41bb71f62df95190df72e3436ee8b7c9

    SHA1

    1245838e67f4f4b9a69783d87ccd837e6b8213a1

    SHA256

    7be1aaf035cc61668e1632906f66a071de0ac40be12606391b04d27be56900c5

    SHA512

    eafb461ff7dd8fdced1b28c2d0abcae8fec0137120b6323d3fe96748bd572a27b3f297a65a668910e744f82a5d22214b88e674eccbcd8d7f3a1c08cc867edfd8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un064465.exe

    Filesize

    558KB

    MD5

    41bb71f62df95190df72e3436ee8b7c9

    SHA1

    1245838e67f4f4b9a69783d87ccd837e6b8213a1

    SHA256

    7be1aaf035cc61668e1632906f66a071de0ac40be12606391b04d27be56900c5

    SHA512

    eafb461ff7dd8fdced1b28c2d0abcae8fec0137120b6323d3fe96748bd572a27b3f297a65a668910e744f82a5d22214b88e674eccbcd8d7f3a1c08cc867edfd8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3583.exe

    Filesize

    307KB

    MD5

    d80f7c6a0f21195ae7248e315ad15af5

    SHA1

    78f53df3010c2073bacb3a18a73594dc5cdd3097

    SHA256

    6c3b463e525f191309d37048b5773f65c07136db26b70a1097707b7770071433

    SHA512

    5f5b2af88a57ed2effe91e6737fafca195cf103585da5387ba7dca07e145139941e8a7610c276b5a9d3ca1f913ab65c7efda6cf422243284bac3c923b131aa79

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3583.exe

    Filesize

    307KB

    MD5

    d80f7c6a0f21195ae7248e315ad15af5

    SHA1

    78f53df3010c2073bacb3a18a73594dc5cdd3097

    SHA256

    6c3b463e525f191309d37048b5773f65c07136db26b70a1097707b7770071433

    SHA512

    5f5b2af88a57ed2effe91e6737fafca195cf103585da5387ba7dca07e145139941e8a7610c276b5a9d3ca1f913ab65c7efda6cf422243284bac3c923b131aa79

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9052.exe

    Filesize

    365KB

    MD5

    0aa8500b7b451f079adb8eb46632e0a2

    SHA1

    a2e3f0ff788f2ff3bf53420897aba105e9d9b2dc

    SHA256

    2e917cd19f64e0a91d2ab52689a7392be8e8b9ad091f34d5754a898a05b23770

    SHA512

    b9895b7a9efa2196561f6b1ec21d7bbc20c094b6eeb8caf959068653e9bbb726669776e13ff5b4935a7f3e94098814a58491669fc17bc7807aa7b21389dd7f70

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9052.exe

    Filesize

    365KB

    MD5

    0aa8500b7b451f079adb8eb46632e0a2

    SHA1

    a2e3f0ff788f2ff3bf53420897aba105e9d9b2dc

    SHA256

    2e917cd19f64e0a91d2ab52689a7392be8e8b9ad091f34d5754a898a05b23770

    SHA512

    b9895b7a9efa2196561f6b1ec21d7bbc20c094b6eeb8caf959068653e9bbb726669776e13ff5b4935a7f3e94098814a58491669fc17bc7807aa7b21389dd7f70

  • memory/3592-1093-0x00000000058C0000-0x00000000059CA000-memory.dmp

    Filesize

    1.0MB

  • memory/3592-1094-0x0000000005A00000-0x0000000005A12000-memory.dmp

    Filesize

    72KB

  • memory/3592-1107-0x0000000007A20000-0x0000000007F4C000-memory.dmp

    Filesize

    5.2MB

  • memory/3592-1106-0x0000000007850000-0x0000000007A12000-memory.dmp

    Filesize

    1.8MB

  • memory/3592-1105-0x00000000077D0000-0x0000000007820000-memory.dmp

    Filesize

    320KB

  • memory/3592-1104-0x0000000007740000-0x00000000077B6000-memory.dmp

    Filesize

    472KB

  • memory/3592-1103-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/3592-1102-0x0000000005DA0000-0x0000000005E06000-memory.dmp

    Filesize

    408KB

  • memory/3592-1101-0x0000000005D00000-0x0000000005D92000-memory.dmp

    Filesize

    584KB

  • memory/3592-1100-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/3592-1099-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/3592-1098-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/3592-1096-0x0000000005B70000-0x0000000005BBB000-memory.dmp

    Filesize

    300KB

  • memory/3592-195-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/3592-1095-0x0000000005A20000-0x0000000005A5E000-memory.dmp

    Filesize

    248KB

  • memory/3592-1092-0x0000000005230000-0x0000000005836000-memory.dmp

    Filesize

    6.0MB

  • memory/3592-229-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/3592-225-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/3592-227-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/3592-222-0x0000000000800000-0x000000000084B000-memory.dmp

    Filesize

    300KB

  • memory/3592-215-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/3592-213-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/3592-211-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/3592-193-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/3592-197-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/3592-181-0x00000000051E0000-0x0000000005224000-memory.dmp

    Filesize

    272KB

  • memory/3592-182-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/3592-183-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/3592-185-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/3592-187-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/3592-189-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/3592-191-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/3592-209-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/3592-207-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/3592-180-0x0000000004C30000-0x0000000004C76000-memory.dmp

    Filesize

    280KB

  • memory/3592-199-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/3592-201-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/3592-203-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/3592-205-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/3920-1115-0x0000000005610000-0x0000000005620000-memory.dmp

    Filesize

    64KB

  • memory/3920-1114-0x0000000005420000-0x000000000546B000-memory.dmp

    Filesize

    300KB

  • memory/3920-1113-0x00000000009E0000-0x0000000000A12000-memory.dmp

    Filesize

    200KB

  • memory/4132-139-0x0000000002330000-0x0000000002348000-memory.dmp

    Filesize

    96KB

  • memory/4132-166-0x0000000002330000-0x0000000002342000-memory.dmp

    Filesize

    72KB

  • memory/4132-172-0x00000000024E0000-0x00000000024F0000-memory.dmp

    Filesize

    64KB

  • memory/4132-171-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4132-150-0x0000000002330000-0x0000000002342000-memory.dmp

    Filesize

    72KB

  • memory/4132-152-0x0000000002330000-0x0000000002342000-memory.dmp

    Filesize

    72KB

  • memory/4132-154-0x0000000002330000-0x0000000002342000-memory.dmp

    Filesize

    72KB

  • memory/4132-138-0x0000000004D40000-0x000000000523E000-memory.dmp

    Filesize

    5.0MB

  • memory/4132-142-0x00000000024E0000-0x00000000024F0000-memory.dmp

    Filesize

    64KB

  • memory/4132-156-0x0000000002330000-0x0000000002342000-memory.dmp

    Filesize

    72KB

  • memory/4132-175-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4132-162-0x0000000002330000-0x0000000002342000-memory.dmp

    Filesize

    72KB

  • memory/4132-170-0x0000000002330000-0x0000000002342000-memory.dmp

    Filesize

    72KB

  • memory/4132-173-0x00000000024E0000-0x00000000024F0000-memory.dmp

    Filesize

    64KB

  • memory/4132-158-0x0000000002330000-0x0000000002342000-memory.dmp

    Filesize

    72KB

  • memory/4132-160-0x0000000002330000-0x0000000002342000-memory.dmp

    Filesize

    72KB

  • memory/4132-146-0x0000000002330000-0x0000000002342000-memory.dmp

    Filesize

    72KB

  • memory/4132-148-0x0000000002330000-0x0000000002342000-memory.dmp

    Filesize

    72KB

  • memory/4132-144-0x0000000002330000-0x0000000002342000-memory.dmp

    Filesize

    72KB

  • memory/4132-143-0x0000000002330000-0x0000000002342000-memory.dmp

    Filesize

    72KB

  • memory/4132-141-0x00000000024E0000-0x00000000024F0000-memory.dmp

    Filesize

    64KB

  • memory/4132-137-0x0000000002220000-0x000000000223A000-memory.dmp

    Filesize

    104KB

  • memory/4132-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4132-140-0x00000000024E0000-0x00000000024F0000-memory.dmp

    Filesize

    64KB

  • memory/4132-168-0x0000000002330000-0x0000000002342000-memory.dmp

    Filesize

    72KB

  • memory/4132-164-0x0000000002330000-0x0000000002342000-memory.dmp

    Filesize

    72KB