Analysis

  • max time kernel
    86s
  • max time network
    88s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 23:33

General

  • Target

    03cc55249e57f42a2222ccc22a6864b852d961850bae00a08a04705a94f222b1.exe

  • Size

    699KB

  • MD5

    ea259d195946c62854ae3602c7f12300

  • SHA1

    464a12675ef3ef543a34d9bf5b2d6c5bd90cc73a

  • SHA256

    03cc55249e57f42a2222ccc22a6864b852d961850bae00a08a04705a94f222b1

  • SHA512

    91c09890f4e09a03158a66c14f8c94f420cad430397a69a776bc055edb93c575c4f7f2e0a124594a8da3d206661ef49ef58bbf28783341d3219b5a1d53e54894

  • SSDEEP

    12288:oMr/y90pfdWtf+WyazO8EB6ZOB3yWsj77zizn2XmPu:HykIVfaL6ZWNsH7+lu

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03cc55249e57f42a2222ccc22a6864b852d961850bae00a08a04705a94f222b1.exe
    "C:\Users\Admin\AppData\Local\Temp\03cc55249e57f42a2222ccc22a6864b852d961850bae00a08a04705a94f222b1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3956
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un072686.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un072686.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2092
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0510.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0510.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4256
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3832.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3832.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2120
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si296311.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si296311.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4652

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si296311.exe

    Filesize

    175KB

    MD5

    2017c2a6a8c4cdc010050764a9b46f51

    SHA1

    04b3aa3f67c121c1d6e818255bf3a14047ece1dc

    SHA256

    2a77755360e6603e59d8fe1ca50909d1ac8460d31a4efa20d46381178904a20a

    SHA512

    43dc85148529eb68aef8d25723c129653f73c5ff9519c1e6c1a5a1872dd872509239976a2e41560d759ac602772c157cc3ad9f0aa8a865eb979eb1dda9adf01c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si296311.exe

    Filesize

    175KB

    MD5

    2017c2a6a8c4cdc010050764a9b46f51

    SHA1

    04b3aa3f67c121c1d6e818255bf3a14047ece1dc

    SHA256

    2a77755360e6603e59d8fe1ca50909d1ac8460d31a4efa20d46381178904a20a

    SHA512

    43dc85148529eb68aef8d25723c129653f73c5ff9519c1e6c1a5a1872dd872509239976a2e41560d759ac602772c157cc3ad9f0aa8a865eb979eb1dda9adf01c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un072686.exe

    Filesize

    557KB

    MD5

    6eafd80bcb7f33e28aff0ebb23595e35

    SHA1

    2549f2dca0084af69a1d11a30dbd7e8525dc2361

    SHA256

    774eae7ab13304ba1d021e2b589c3ab9b17d04795dd0dbf7c7db071dc05f9378

    SHA512

    4eb734f0ef407c161bf89b1f5dd1cce9ff7e10125f70a69339ecbe6627216d1d1d47a32789a026acb57a81b6754654b0b941aef8176d9bff270582ad6b0564de

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un072686.exe

    Filesize

    557KB

    MD5

    6eafd80bcb7f33e28aff0ebb23595e35

    SHA1

    2549f2dca0084af69a1d11a30dbd7e8525dc2361

    SHA256

    774eae7ab13304ba1d021e2b589c3ab9b17d04795dd0dbf7c7db071dc05f9378

    SHA512

    4eb734f0ef407c161bf89b1f5dd1cce9ff7e10125f70a69339ecbe6627216d1d1d47a32789a026acb57a81b6754654b0b941aef8176d9bff270582ad6b0564de

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0510.exe

    Filesize

    307KB

    MD5

    48442e701f2df199631a64b2ab5e6d9c

    SHA1

    46c0caede83c4592c84ce6fe03cae5c9cfe00ee5

    SHA256

    a5de3eb107fca1ddc1d30d8e6a382141dca302b6a88fbcce797fefd6590f05c6

    SHA512

    0501299845bd4e4479b5c3482a6b575b9cec1d2df20f33c13651f7eb1fded87334afb4ba893aca637876c34bb00695a92bf7343607399b5ea2eb71101249cbae

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0510.exe

    Filesize

    307KB

    MD5

    48442e701f2df199631a64b2ab5e6d9c

    SHA1

    46c0caede83c4592c84ce6fe03cae5c9cfe00ee5

    SHA256

    a5de3eb107fca1ddc1d30d8e6a382141dca302b6a88fbcce797fefd6590f05c6

    SHA512

    0501299845bd4e4479b5c3482a6b575b9cec1d2df20f33c13651f7eb1fded87334afb4ba893aca637876c34bb00695a92bf7343607399b5ea2eb71101249cbae

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3832.exe

    Filesize

    365KB

    MD5

    ab3ea22084aeaac463d99835242664d2

    SHA1

    071be042cfaca6b6001e6393462eea4cfc80eb88

    SHA256

    6d459b4f167eea822745b2c39cf110c1c62bdf54bbccc0ce742b61a5ee226619

    SHA512

    ee40743a789e9d3be51c844dfdc973317544d5c0bd20c8a8bdf92a661711c8485e7a7732650d567fb4b65fc03d12539357ba8de57444010a679b96477ee01aa1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3832.exe

    Filesize

    365KB

    MD5

    ab3ea22084aeaac463d99835242664d2

    SHA1

    071be042cfaca6b6001e6393462eea4cfc80eb88

    SHA256

    6d459b4f167eea822745b2c39cf110c1c62bdf54bbccc0ce742b61a5ee226619

    SHA512

    ee40743a789e9d3be51c844dfdc973317544d5c0bd20c8a8bdf92a661711c8485e7a7732650d567fb4b65fc03d12539357ba8de57444010a679b96477ee01aa1

  • memory/2120-1091-0x0000000005280000-0x0000000005886000-memory.dmp

    Filesize

    6.0MB

  • memory/2120-215-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/2120-1107-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/2120-1106-0x0000000006E60000-0x0000000006EB0000-memory.dmp

    Filesize

    320KB

  • memory/2120-1105-0x0000000006DE0000-0x0000000006E56000-memory.dmp

    Filesize

    472KB

  • memory/2120-196-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/2120-1104-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/2120-1103-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/2120-1102-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/2120-1101-0x0000000006680000-0x0000000006BAC000-memory.dmp

    Filesize

    5.2MB

  • memory/2120-198-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/2120-1100-0x00000000064B0000-0x0000000006672000-memory.dmp

    Filesize

    1.8MB

  • memory/2120-1098-0x00000000062A0000-0x0000000006332000-memory.dmp

    Filesize

    584KB

  • memory/2120-1097-0x0000000005D00000-0x0000000005D66000-memory.dmp

    Filesize

    408KB

  • memory/2120-1096-0x0000000005B70000-0x0000000005BBB000-memory.dmp

    Filesize

    300KB

  • memory/2120-1095-0x0000000005A20000-0x0000000005A5E000-memory.dmp

    Filesize

    248KB

  • memory/2120-1094-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/2120-1093-0x0000000005A00000-0x0000000005A12000-memory.dmp

    Filesize

    72KB

  • memory/2120-1092-0x00000000058C0000-0x00000000059CA000-memory.dmp

    Filesize

    1.0MB

  • memory/2120-206-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/2120-219-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/2120-216-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/2120-218-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/2120-214-0x0000000000810000-0x000000000085B000-memory.dmp

    Filesize

    300KB

  • memory/2120-212-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/2120-179-0x00000000026B0000-0x00000000026F6000-memory.dmp

    Filesize

    280KB

  • memory/2120-180-0x0000000004CB0000-0x0000000004CF4000-memory.dmp

    Filesize

    272KB

  • memory/2120-182-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/2120-181-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/2120-194-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/2120-186-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/2120-188-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/2120-190-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/2120-192-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/2120-184-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/2120-210-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/2120-208-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/2120-200-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/2120-202-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/2120-204-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/4256-169-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4256-154-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/4256-144-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/4256-137-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4256-138-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/4256-174-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4256-172-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/4256-171-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/4256-170-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/4256-136-0x0000000002570000-0x0000000002588000-memory.dmp

    Filesize

    96KB

  • memory/4256-139-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/4256-166-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/4256-168-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/4256-164-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/4256-162-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/4256-160-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/4256-158-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/4256-156-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/4256-152-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/4256-150-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/4256-148-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/4256-146-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/4256-142-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/4256-141-0x0000000002570000-0x0000000002582000-memory.dmp

    Filesize

    72KB

  • memory/4256-140-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/4256-135-0x0000000004DB0000-0x00000000052AE000-memory.dmp

    Filesize

    5.0MB

  • memory/4256-134-0x00000000009D0000-0x00000000009EA000-memory.dmp

    Filesize

    104KB

  • memory/4652-1113-0x0000000000430000-0x0000000000462000-memory.dmp

    Filesize

    200KB

  • memory/4652-1114-0x0000000004E70000-0x0000000004EBB000-memory.dmp

    Filesize

    300KB

  • memory/4652-1115-0x0000000004D30000-0x0000000004D40000-memory.dmp

    Filesize

    64KB