Analysis

  • max time kernel
    57s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 23:25

General

  • Target

    d9488427707a4265a6798f28bb6ef5b785c0f1b4b3774316f284fe7924e432cf.exe

  • Size

    700KB

  • MD5

    de2f6c36c6e5930613bf5a2481677344

  • SHA1

    5323fbe08707afe1e00a3aa1ebdc1eeeb0b53964

  • SHA256

    d9488427707a4265a6798f28bb6ef5b785c0f1b4b3774316f284fe7924e432cf

  • SHA512

    093491a396a566c70f59cb8edb5486a651adb4d06a66a7d6a665abf61681dcdbef298d44452966c35c41531ed405e95f2bfd17330475f4402d191503a207f912

  • SSDEEP

    12288:GMr9y90p5lEFV0OsvDVNG59DGTcAGuA8F3UTE9uZc3ixgt0L3:DyZviDVN7G58VH9uK3ixz

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d9488427707a4265a6798f28bb6ef5b785c0f1b4b3774316f284fe7924e432cf.exe
    "C:\Users\Admin\AppData\Local\Temp\d9488427707a4265a6798f28bb6ef5b785c0f1b4b3774316f284fe7924e432cf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2304
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un365905.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un365905.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4352
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7626.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7626.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4868
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8482.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8482.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4668
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si006095.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si006095.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4364

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si006095.exe

    Filesize

    175KB

    MD5

    4cee8bb49c8eccc42d380d62c9cdf4d7

    SHA1

    4cc290b2425fbab806b2dd63c257aebffd5dbc33

    SHA256

    f8014d5364a76c45281a91fdb3839914126bba5c958d47e4fe393d40925e24a3

    SHA512

    99830710c3c64edc9692bf9a0fad13d58d51d5b5e66957ef8e67b60e262fc292568d9dcd2d59c6965e22450a48b746d716addc21f5c07e8f8dac3550c6f2a146

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si006095.exe

    Filesize

    175KB

    MD5

    4cee8bb49c8eccc42d380d62c9cdf4d7

    SHA1

    4cc290b2425fbab806b2dd63c257aebffd5dbc33

    SHA256

    f8014d5364a76c45281a91fdb3839914126bba5c958d47e4fe393d40925e24a3

    SHA512

    99830710c3c64edc9692bf9a0fad13d58d51d5b5e66957ef8e67b60e262fc292568d9dcd2d59c6965e22450a48b746d716addc21f5c07e8f8dac3550c6f2a146

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un365905.exe

    Filesize

    558KB

    MD5

    3f27745489033e1f3c4dc3a5b8bf97d0

    SHA1

    05541870f58770553d5196b7af8e1d54ed23cd73

    SHA256

    1e0ad32496d317f49c1f2ca323c6a16f294b298afb168782af97521b70b1e6e4

    SHA512

    50dcc80d4aa1e8d49630e3f72ae4e4579c656cc6d63c35baf47ad28b90b111eb9f9fa14bf56616788aef72fe1e88313c475f68e5f7d55b2e7121b204ab4d27fc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un365905.exe

    Filesize

    558KB

    MD5

    3f27745489033e1f3c4dc3a5b8bf97d0

    SHA1

    05541870f58770553d5196b7af8e1d54ed23cd73

    SHA256

    1e0ad32496d317f49c1f2ca323c6a16f294b298afb168782af97521b70b1e6e4

    SHA512

    50dcc80d4aa1e8d49630e3f72ae4e4579c656cc6d63c35baf47ad28b90b111eb9f9fa14bf56616788aef72fe1e88313c475f68e5f7d55b2e7121b204ab4d27fc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7626.exe

    Filesize

    307KB

    MD5

    dfe1de0e45e77954c4962b26e78b8155

    SHA1

    75ea624aa6e027bde0be2af7b414fea8da9bd659

    SHA256

    3806f610eafb581a0ee7081ec664d67efe5be40916a6ae0b7f1ad12577a7d351

    SHA512

    59f369d17becd39e63a1b41041fb0ea7c6e8dc582d0d8f2cc03cd1eea4de47280a63b114ed2044881fb8eab23e808146770b433c1a4f66acb649ffb7b6aca4fc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7626.exe

    Filesize

    307KB

    MD5

    dfe1de0e45e77954c4962b26e78b8155

    SHA1

    75ea624aa6e027bde0be2af7b414fea8da9bd659

    SHA256

    3806f610eafb581a0ee7081ec664d67efe5be40916a6ae0b7f1ad12577a7d351

    SHA512

    59f369d17becd39e63a1b41041fb0ea7c6e8dc582d0d8f2cc03cd1eea4de47280a63b114ed2044881fb8eab23e808146770b433c1a4f66acb649ffb7b6aca4fc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8482.exe

    Filesize

    365KB

    MD5

    7d702fc23e73cd9b1153809a76fc7fbb

    SHA1

    6ca9cb3003d216ce00d92ea74635a73e34ab49a4

    SHA256

    ba22b16a1616be6dcb9926ea9fb33d1218e748dd0423500faf52760a655d6aab

    SHA512

    b9c4b0e0a26b6d0738f72a89bd65063e04b80cb2e1e1660fa691d93ce00ab5c04c3300a2f0303877c69f9196ef19d70c824ee286d0b3c6dae6c12158eb9e3a78

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8482.exe

    Filesize

    365KB

    MD5

    7d702fc23e73cd9b1153809a76fc7fbb

    SHA1

    6ca9cb3003d216ce00d92ea74635a73e34ab49a4

    SHA256

    ba22b16a1616be6dcb9926ea9fb33d1218e748dd0423500faf52760a655d6aab

    SHA512

    b9c4b0e0a26b6d0738f72a89bd65063e04b80cb2e1e1660fa691d93ce00ab5c04c3300a2f0303877c69f9196ef19d70c824ee286d0b3c6dae6c12158eb9e3a78

  • memory/4364-1112-0x0000000005990000-0x00000000059A0000-memory.dmp

    Filesize

    64KB

  • memory/4364-1111-0x0000000005860000-0x00000000058AB000-memory.dmp

    Filesize

    300KB

  • memory/4364-1110-0x0000000000E20000-0x0000000000E52000-memory.dmp

    Filesize

    200KB

  • memory/4668-1088-0x0000000005840000-0x0000000005E46000-memory.dmp

    Filesize

    6.0MB

  • memory/4668-1091-0x0000000005410000-0x000000000544E000-memory.dmp

    Filesize

    248KB

  • memory/4668-1104-0x0000000002740000-0x0000000002750000-memory.dmp

    Filesize

    64KB

  • memory/4668-1103-0x0000000006E70000-0x0000000006EC0000-memory.dmp

    Filesize

    320KB

  • memory/4668-1102-0x0000000006DD0000-0x0000000006E46000-memory.dmp

    Filesize

    472KB

  • memory/4668-1101-0x0000000006790000-0x0000000006CBC000-memory.dmp

    Filesize

    5.2MB

  • memory/4668-1100-0x00000000065A0000-0x0000000006762000-memory.dmp

    Filesize

    1.8MB

  • memory/4668-1099-0x0000000002740000-0x0000000002750000-memory.dmp

    Filesize

    64KB

  • memory/4668-1098-0x0000000002740000-0x0000000002750000-memory.dmp

    Filesize

    64KB

  • memory/4668-1097-0x0000000002740000-0x0000000002750000-memory.dmp

    Filesize

    64KB

  • memory/4668-1095-0x0000000005790000-0x00000000057F6000-memory.dmp

    Filesize

    408KB

  • memory/4668-1094-0x00000000056F0000-0x0000000005782000-memory.dmp

    Filesize

    584KB

  • memory/4668-1093-0x0000000002740000-0x0000000002750000-memory.dmp

    Filesize

    64KB

  • memory/4668-1092-0x0000000005560000-0x00000000055AB000-memory.dmp

    Filesize

    300KB

  • memory/4668-1090-0x00000000053F0000-0x0000000005402000-memory.dmp

    Filesize

    72KB

  • memory/4668-1089-0x00000000052B0000-0x00000000053BA000-memory.dmp

    Filesize

    1.0MB

  • memory/4668-215-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/4668-213-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/4668-211-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/4668-209-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/4668-207-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/4668-205-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/4668-176-0x00000000026A0000-0x00000000026E6000-memory.dmp

    Filesize

    280KB

  • memory/4668-177-0x00000000051F0000-0x0000000005234000-memory.dmp

    Filesize

    272KB

  • memory/4668-178-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/4668-179-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/4668-181-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/4668-183-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/4668-185-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/4668-186-0x0000000000720000-0x000000000076B000-memory.dmp

    Filesize

    300KB

  • memory/4668-188-0x0000000002740000-0x0000000002750000-memory.dmp

    Filesize

    64KB

  • memory/4668-190-0x0000000002740000-0x0000000002750000-memory.dmp

    Filesize

    64KB

  • memory/4668-189-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/4668-193-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/4668-195-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/4668-192-0x0000000002740000-0x0000000002750000-memory.dmp

    Filesize

    64KB

  • memory/4668-197-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/4668-199-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/4668-201-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/4668-203-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/4868-159-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB

  • memory/4868-131-0x00000000009C0000-0x00000000009DA000-memory.dmp

    Filesize

    104KB

  • memory/4868-137-0x00000000027B0000-0x00000000027C0000-memory.dmp

    Filesize

    64KB

  • memory/4868-169-0x00000000027B0000-0x00000000027C0000-memory.dmp

    Filesize

    64KB

  • memory/4868-168-0x00000000027B0000-0x00000000027C0000-memory.dmp

    Filesize

    64KB

  • memory/4868-167-0x00000000027B0000-0x00000000027C0000-memory.dmp

    Filesize

    64KB

  • memory/4868-135-0x00000000027B0000-0x00000000027C0000-memory.dmp

    Filesize

    64KB

  • memory/4868-166-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4868-165-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB

  • memory/4868-139-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB

  • memory/4868-163-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB

  • memory/4868-161-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB

  • memory/4868-171-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4868-138-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB

  • memory/4868-141-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB

  • memory/4868-153-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB

  • memory/4868-151-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB

  • memory/4868-149-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB

  • memory/4868-147-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB

  • memory/4868-145-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB

  • memory/4868-143-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB

  • memory/4868-155-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB

  • memory/4868-136-0x00000000027B0000-0x00000000027C0000-memory.dmp

    Filesize

    64KB

  • memory/4868-134-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4868-133-0x0000000002700000-0x0000000002718000-memory.dmp

    Filesize

    96KB

  • memory/4868-132-0x0000000004D30000-0x000000000522E000-memory.dmp

    Filesize

    5.0MB

  • memory/4868-157-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB