Analysis

  • max time kernel
    56s
  • max time network
    70s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 23:34

General

  • Target

    5cfce9d96d50530d066a441d447423cf75ceb43d41f9bf2c2ca1a7ae0d0e98f8.exe

  • Size

    700KB

  • MD5

    c8737d4d6b65d292b244a8b6bc5f57a5

  • SHA1

    3812badf8205f93e666985b4c6c6d59867bf56be

  • SHA256

    5cfce9d96d50530d066a441d447423cf75ceb43d41f9bf2c2ca1a7ae0d0e98f8

  • SHA512

    3f716f256b6ba5d1670a7fac524023f5fbb82c62c9f8c11577c1b1fa06e2ab7099a04632de3031b921d9a3c38bbea04c191c30cc6adfbd01df937b2e92c6200a

  • SSDEEP

    12288:EMrsy90tye21nPNH/o9D5RcAHOQ8Fg40HZrsz4XBRpcG+c+9pR:4yqye21FH/MHOQ8W405vXB5F+nR

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5cfce9d96d50530d066a441d447423cf75ceb43d41f9bf2c2ca1a7ae0d0e98f8.exe
    "C:\Users\Admin\AppData\Local\Temp\5cfce9d96d50530d066a441d447423cf75ceb43d41f9bf2c2ca1a7ae0d0e98f8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un333967.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un333967.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4960
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4210.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4210.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3000
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2320.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2320.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1088
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si669063.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si669063.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2116

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si669063.exe

    Filesize

    175KB

    MD5

    50a92857cfdf272e4712fddfeaee256a

    SHA1

    fefc8a7218c7ad1fac0f9ad0b2b814c4020fefea

    SHA256

    e8c7feca30efacce03537c43c45e88f0becbc87f15fb596f45d0ba1e70b0e938

    SHA512

    27e4e824126b5b19aea548542c5144063757feccd74c6cb695c6a557eb27650f52a73e56aabd402c51bde4201d8a37df55d5ea1e6d20f2599d13af156eca6e42

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si669063.exe

    Filesize

    175KB

    MD5

    50a92857cfdf272e4712fddfeaee256a

    SHA1

    fefc8a7218c7ad1fac0f9ad0b2b814c4020fefea

    SHA256

    e8c7feca30efacce03537c43c45e88f0becbc87f15fb596f45d0ba1e70b0e938

    SHA512

    27e4e824126b5b19aea548542c5144063757feccd74c6cb695c6a557eb27650f52a73e56aabd402c51bde4201d8a37df55d5ea1e6d20f2599d13af156eca6e42

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un333967.exe

    Filesize

    558KB

    MD5

    82d15008b6e714e27f993b1b663c32a3

    SHA1

    2c3dfb2ccf7c5b393895603b93ec81eb39f6c1b5

    SHA256

    2f5e6ec5ef018c94fc91e015a7e6cba774e4f6b099aa52f8464406e3caff953d

    SHA512

    a2f1d2c41eb0fe42d641a64ea6e31e909cf76eb9cb12e86dd51c3c4f83f0fff10c837e39402586eb38db272de8e9496409a1971fec4fc317111cfd0e0f140b6d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un333967.exe

    Filesize

    558KB

    MD5

    82d15008b6e714e27f993b1b663c32a3

    SHA1

    2c3dfb2ccf7c5b393895603b93ec81eb39f6c1b5

    SHA256

    2f5e6ec5ef018c94fc91e015a7e6cba774e4f6b099aa52f8464406e3caff953d

    SHA512

    a2f1d2c41eb0fe42d641a64ea6e31e909cf76eb9cb12e86dd51c3c4f83f0fff10c837e39402586eb38db272de8e9496409a1971fec4fc317111cfd0e0f140b6d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4210.exe

    Filesize

    307KB

    MD5

    15e20b0fd45cd4e239df8060c7c05af8

    SHA1

    4600a19c38c3ae1e5453bb5fc3f73534fa33da3a

    SHA256

    c961d2f6adc526cd12c16b4bd1a60c01c5e901746decf83f697ed7a8ccbc4dd3

    SHA512

    3689a80ad44223c9e8123792c991008b844aa377b7f3c6ab71c8364bd794b80c828ced7228720c4e77ce829619c890bcbf8c62890e305b1794a3c1babb704842

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4210.exe

    Filesize

    307KB

    MD5

    15e20b0fd45cd4e239df8060c7c05af8

    SHA1

    4600a19c38c3ae1e5453bb5fc3f73534fa33da3a

    SHA256

    c961d2f6adc526cd12c16b4bd1a60c01c5e901746decf83f697ed7a8ccbc4dd3

    SHA512

    3689a80ad44223c9e8123792c991008b844aa377b7f3c6ab71c8364bd794b80c828ced7228720c4e77ce829619c890bcbf8c62890e305b1794a3c1babb704842

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2320.exe

    Filesize

    365KB

    MD5

    8eccc05196ec9228610a8a5723fa7afa

    SHA1

    e2b7c68fc696252bb2c6c7c999e48af680b947ef

    SHA256

    f4618aafb604c376bcf7e8f996a97706965780ddf4af0f6c8ac103bc0af030ed

    SHA512

    ce0409df6081f1375e973e04916f6fc310b0378277d55e92498e70a98da0b3463b5be24bf3649dc66d94cdfa7bf92fff732ed13d827e8f8eb7611f409b0ee9d6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2320.exe

    Filesize

    365KB

    MD5

    8eccc05196ec9228610a8a5723fa7afa

    SHA1

    e2b7c68fc696252bb2c6c7c999e48af680b947ef

    SHA256

    f4618aafb604c376bcf7e8f996a97706965780ddf4af0f6c8ac103bc0af030ed

    SHA512

    ce0409df6081f1375e973e04916f6fc310b0378277d55e92498e70a98da0b3463b5be24bf3649dc66d94cdfa7bf92fff732ed13d827e8f8eb7611f409b0ee9d6

  • memory/1088-1094-0x0000000005A20000-0x0000000005A5E000-memory.dmp

    Filesize

    248KB

  • memory/1088-1093-0x0000000004C20000-0x0000000004C30000-memory.dmp

    Filesize

    64KB

  • memory/1088-1106-0x0000000004C20000-0x0000000004C30000-memory.dmp

    Filesize

    64KB

  • memory/1088-1105-0x0000000006E60000-0x0000000006EB0000-memory.dmp

    Filesize

    320KB

  • memory/1088-1104-0x0000000006DD0000-0x0000000006E46000-memory.dmp

    Filesize

    472KB

  • memory/1088-1103-0x0000000006780000-0x0000000006CAC000-memory.dmp

    Filesize

    5.2MB

  • memory/1088-1102-0x00000000065B0000-0x0000000006772000-memory.dmp

    Filesize

    1.8MB

  • memory/1088-1101-0x0000000004C20000-0x0000000004C30000-memory.dmp

    Filesize

    64KB

  • memory/1088-1100-0x0000000004C20000-0x0000000004C30000-memory.dmp

    Filesize

    64KB

  • memory/1088-1099-0x0000000004C20000-0x0000000004C30000-memory.dmp

    Filesize

    64KB

  • memory/1088-1098-0x00000000063C0000-0x0000000006452000-memory.dmp

    Filesize

    584KB

  • memory/1088-1097-0x0000000005D00000-0x0000000005D66000-memory.dmp

    Filesize

    408KB

  • memory/1088-1095-0x0000000005B70000-0x0000000005BBB000-memory.dmp

    Filesize

    300KB

  • memory/1088-196-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1088-1092-0x0000000005A00000-0x0000000005A12000-memory.dmp

    Filesize

    72KB

  • memory/1088-1091-0x00000000058C0000-0x00000000059CA000-memory.dmp

    Filesize

    1.0MB

  • memory/1088-1090-0x0000000005230000-0x0000000005836000-memory.dmp

    Filesize

    6.0MB

  • memory/1088-217-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1088-215-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1088-213-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1088-211-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1088-209-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1088-178-0x0000000002540000-0x0000000002586000-memory.dmp

    Filesize

    280KB

  • memory/1088-179-0x0000000004B90000-0x0000000004BD4000-memory.dmp

    Filesize

    272KB

  • memory/1088-200-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1088-181-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1088-183-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1088-185-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1088-187-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1088-189-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1088-191-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1088-193-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1088-207-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1088-195-0x00000000020E0000-0x000000000212B000-memory.dmp

    Filesize

    300KB

  • memory/1088-180-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1088-197-0x0000000004C20000-0x0000000004C30000-memory.dmp

    Filesize

    64KB

  • memory/1088-199-0x0000000004C20000-0x0000000004C30000-memory.dmp

    Filesize

    64KB

  • memory/1088-201-0x0000000004C20000-0x0000000004C30000-memory.dmp

    Filesize

    64KB

  • memory/1088-203-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/1088-205-0x0000000004B90000-0x0000000004BCF000-memory.dmp

    Filesize

    252KB

  • memory/2116-1112-0x00000000004D0000-0x0000000000502000-memory.dmp

    Filesize

    200KB

  • memory/2116-1115-0x0000000005110000-0x0000000005120000-memory.dmp

    Filesize

    64KB

  • memory/2116-1114-0x0000000005110000-0x0000000005120000-memory.dmp

    Filesize

    64KB

  • memory/2116-1113-0x0000000004DA0000-0x0000000004DEB000-memory.dmp

    Filesize

    300KB

  • memory/3000-173-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/3000-141-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/3000-169-0x0000000002360000-0x0000000002370000-memory.dmp

    Filesize

    64KB

  • memory/3000-168-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/3000-166-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/3000-138-0x0000000002360000-0x0000000002370000-memory.dmp

    Filesize

    64KB

  • memory/3000-154-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/3000-162-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/3000-160-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/3000-139-0x0000000004D40000-0x000000000523E000-memory.dmp

    Filesize

    5.0MB

  • memory/3000-164-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/3000-170-0x0000000002360000-0x0000000002370000-memory.dmp

    Filesize

    64KB

  • memory/3000-152-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/3000-150-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/3000-148-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/3000-146-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/3000-144-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/3000-142-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/3000-137-0x0000000002390000-0x00000000023AA000-memory.dmp

    Filesize

    104KB

  • memory/3000-136-0x00000000007E0000-0x000000000080D000-memory.dmp

    Filesize

    180KB

  • memory/3000-171-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/3000-156-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/3000-140-0x0000000002430000-0x0000000002448000-memory.dmp

    Filesize

    96KB

  • memory/3000-158-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB