Analysis

  • max time kernel
    51s
  • max time network
    152s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 23:54

General

  • Target

    e7a8a37c08372a7b8b604fbe0a10b8543cebd558a1b91eb2e8178efbc1313b36.exe

  • Size

    700KB

  • MD5

    ed6fb11df99569705d91aa95f06e63d3

  • SHA1

    52155e28857bf8ada2e879b555ffb0d8153c3821

  • SHA256

    e7a8a37c08372a7b8b604fbe0a10b8543cebd558a1b91eb2e8178efbc1313b36

  • SHA512

    3cd3470bc6f9d5eaebe43b8fd7330754c3dc1ea1a39888cd7078855833f46d0da5c2af945b08a4d4047bff42cf2e30ff199cc04f7affa692d38773a6e80acff7

  • SSDEEP

    12288:rMrxy900iLRMFPKhlUyJ9DuucAQ0uNDk0W9eg/wUobP+4Y1COVetGa/ur/:CyQLgKh1Q0T0W4iwUo7+V1H4tvur/

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7a8a37c08372a7b8b604fbe0a10b8543cebd558a1b91eb2e8178efbc1313b36.exe
    "C:\Users\Admin\AppData\Local\Temp\e7a8a37c08372a7b8b604fbe0a10b8543cebd558a1b91eb2e8178efbc1313b36.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4152
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un872928.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un872928.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3936
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7886.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7886.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4348
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1182.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1182.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4552
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si527220.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si527220.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1528

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si527220.exe
    Filesize

    175KB

    MD5

    7863a6170dab60a5d873d68a7586c2fd

    SHA1

    11d194b4205472b4a955573281aec756d45eab5b

    SHA256

    98f15ea028378c732fb467c49a97e2a6100a0d65738ea53b738deb6e887da7a7

    SHA512

    88a8045543b85add30bacde3539945e57186d89d80c079f51a0eef5f94f35962522d30326ca9fe08e3426b7da17013b10d0a3a6e8d9ce96b387c6f00d879a064

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si527220.exe
    Filesize

    175KB

    MD5

    7863a6170dab60a5d873d68a7586c2fd

    SHA1

    11d194b4205472b4a955573281aec756d45eab5b

    SHA256

    98f15ea028378c732fb467c49a97e2a6100a0d65738ea53b738deb6e887da7a7

    SHA512

    88a8045543b85add30bacde3539945e57186d89d80c079f51a0eef5f94f35962522d30326ca9fe08e3426b7da17013b10d0a3a6e8d9ce96b387c6f00d879a064

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un872928.exe
    Filesize

    558KB

    MD5

    dddebe68e1791152d71e3365ff9136df

    SHA1

    161d09e8b7e042a1133e6d3264118f27516a46ef

    SHA256

    633a50e13e6fc68ddaf61f4cf293375ba33d30ac9e76f91ab38c532544929b19

    SHA512

    3517766529f652f697cf45302196d6fa5ea3d4b6118ac2ab0815f4f09eac035ee842beb11949c8e5998306ee4c9d4e8ac1b585a3db78abf2a698162067f2252d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un872928.exe
    Filesize

    558KB

    MD5

    dddebe68e1791152d71e3365ff9136df

    SHA1

    161d09e8b7e042a1133e6d3264118f27516a46ef

    SHA256

    633a50e13e6fc68ddaf61f4cf293375ba33d30ac9e76f91ab38c532544929b19

    SHA512

    3517766529f652f697cf45302196d6fa5ea3d4b6118ac2ab0815f4f09eac035ee842beb11949c8e5998306ee4c9d4e8ac1b585a3db78abf2a698162067f2252d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7886.exe
    Filesize

    307KB

    MD5

    3f9749335588b4f8a3b28179fad3d4db

    SHA1

    df93df5e86b10a53275a143c576277c32fa31972

    SHA256

    30c2a0746a17faef9421604afb238d3709e7059cdb295743f9be4730ee8ce3dc

    SHA512

    63f91197050cf5dcdcb2bad4679bf1d45d9bcb92fb2f2b155dd155b16cbe82b1265bfe8d26f2514293cf53fe948646597eb2a4e97ce4edc995406d60ee4f8a1c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7886.exe
    Filesize

    307KB

    MD5

    3f9749335588b4f8a3b28179fad3d4db

    SHA1

    df93df5e86b10a53275a143c576277c32fa31972

    SHA256

    30c2a0746a17faef9421604afb238d3709e7059cdb295743f9be4730ee8ce3dc

    SHA512

    63f91197050cf5dcdcb2bad4679bf1d45d9bcb92fb2f2b155dd155b16cbe82b1265bfe8d26f2514293cf53fe948646597eb2a4e97ce4edc995406d60ee4f8a1c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1182.exe
    Filesize

    365KB

    MD5

    21c4cffe0b8df2625805f0e48a0070f0

    SHA1

    64f9fd680d4651526f9adcd520d4a2c6f3d28739

    SHA256

    a61440c55ea7251d4063cc38ad038de84dca2f12603eb843b737553b97d2715a

    SHA512

    b577c183eea0aaf7dc8206d35bfedb476ed446971cb61a58823ea826f7a363ce1edc1a963b0f7504640e19f8ba9b8b0947a91e0efac53bacd93ab0be14a7856c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1182.exe
    Filesize

    365KB

    MD5

    21c4cffe0b8df2625805f0e48a0070f0

    SHA1

    64f9fd680d4651526f9adcd520d4a2c6f3d28739

    SHA256

    a61440c55ea7251d4063cc38ad038de84dca2f12603eb843b737553b97d2715a

    SHA512

    b577c183eea0aaf7dc8206d35bfedb476ed446971cb61a58823ea826f7a363ce1edc1a963b0f7504640e19f8ba9b8b0947a91e0efac53bacd93ab0be14a7856c

  • memory/1528-1115-0x0000000005430000-0x000000000547B000-memory.dmp
    Filesize

    300KB

  • memory/1528-1114-0x00000000009F0000-0x0000000000A22000-memory.dmp
    Filesize

    200KB

  • memory/1528-1116-0x0000000005230000-0x0000000005240000-memory.dmp
    Filesize

    64KB

  • memory/1528-1117-0x0000000005230000-0x0000000005240000-memory.dmp
    Filesize

    64KB

  • memory/4348-142-0x0000000002340000-0x0000000002352000-memory.dmp
    Filesize

    72KB

  • memory/4348-159-0x0000000002340000-0x0000000002352000-memory.dmp
    Filesize

    72KB

  • memory/4348-141-0x0000000004D90000-0x0000000004DA0000-memory.dmp
    Filesize

    64KB

  • memory/4348-140-0x0000000004D90000-0x0000000004DA0000-memory.dmp
    Filesize

    64KB

  • memory/4348-143-0x0000000002340000-0x0000000002352000-memory.dmp
    Filesize

    72KB

  • memory/4348-145-0x0000000002340000-0x0000000002352000-memory.dmp
    Filesize

    72KB

  • memory/4348-138-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/4348-147-0x0000000002340000-0x0000000002352000-memory.dmp
    Filesize

    72KB

  • memory/4348-149-0x0000000002340000-0x0000000002352000-memory.dmp
    Filesize

    72KB

  • memory/4348-151-0x0000000002340000-0x0000000002352000-memory.dmp
    Filesize

    72KB

  • memory/4348-153-0x0000000002340000-0x0000000002352000-memory.dmp
    Filesize

    72KB

  • memory/4348-155-0x0000000002340000-0x0000000002352000-memory.dmp
    Filesize

    72KB

  • memory/4348-157-0x0000000002340000-0x0000000002352000-memory.dmp
    Filesize

    72KB

  • memory/4348-139-0x0000000004D90000-0x0000000004DA0000-memory.dmp
    Filesize

    64KB

  • memory/4348-161-0x0000000002340000-0x0000000002352000-memory.dmp
    Filesize

    72KB

  • memory/4348-163-0x0000000002340000-0x0000000002352000-memory.dmp
    Filesize

    72KB

  • memory/4348-165-0x0000000002340000-0x0000000002352000-memory.dmp
    Filesize

    72KB

  • memory/4348-167-0x0000000002340000-0x0000000002352000-memory.dmp
    Filesize

    72KB

  • memory/4348-169-0x0000000002340000-0x0000000002352000-memory.dmp
    Filesize

    72KB

  • memory/4348-170-0x0000000000400000-0x000000000070F000-memory.dmp
    Filesize

    3.1MB

  • memory/4348-171-0x0000000004D90000-0x0000000004DA0000-memory.dmp
    Filesize

    64KB

  • memory/4348-172-0x0000000004D90000-0x0000000004DA0000-memory.dmp
    Filesize

    64KB

  • memory/4348-173-0x0000000004D90000-0x0000000004DA0000-memory.dmp
    Filesize

    64KB

  • memory/4348-175-0x0000000000400000-0x000000000070F000-memory.dmp
    Filesize

    3.1MB

  • memory/4348-137-0x0000000002340000-0x0000000002358000-memory.dmp
    Filesize

    96KB

  • memory/4348-136-0x0000000004DA0000-0x000000000529E000-memory.dmp
    Filesize

    5.0MB

  • memory/4348-135-0x0000000000A10000-0x0000000000A2A000-memory.dmp
    Filesize

    104KB

  • memory/4552-182-0x00000000051B0000-0x00000000051EF000-memory.dmp
    Filesize

    252KB

  • memory/4552-217-0x00000000051B0000-0x00000000051EF000-memory.dmp
    Filesize

    252KB

  • memory/4552-187-0x00000000051B0000-0x00000000051EF000-memory.dmp
    Filesize

    252KB

  • memory/4552-189-0x00000000051B0000-0x00000000051EF000-memory.dmp
    Filesize

    252KB

  • memory/4552-191-0x00000000051B0000-0x00000000051EF000-memory.dmp
    Filesize

    252KB

  • memory/4552-193-0x00000000051B0000-0x00000000051EF000-memory.dmp
    Filesize

    252KB

  • memory/4552-195-0x00000000051B0000-0x00000000051EF000-memory.dmp
    Filesize

    252KB

  • memory/4552-197-0x00000000051B0000-0x00000000051EF000-memory.dmp
    Filesize

    252KB

  • memory/4552-199-0x00000000051B0000-0x00000000051EF000-memory.dmp
    Filesize

    252KB

  • memory/4552-201-0x00000000051B0000-0x00000000051EF000-memory.dmp
    Filesize

    252KB

  • memory/4552-203-0x00000000051B0000-0x00000000051EF000-memory.dmp
    Filesize

    252KB

  • memory/4552-205-0x00000000051B0000-0x00000000051EF000-memory.dmp
    Filesize

    252KB

  • memory/4552-208-0x00000000051B0000-0x00000000051EF000-memory.dmp
    Filesize

    252KB

  • memory/4552-206-0x0000000000720000-0x000000000076B000-memory.dmp
    Filesize

    300KB

  • memory/4552-209-0x0000000004B20000-0x0000000004B30000-memory.dmp
    Filesize

    64KB

  • memory/4552-211-0x0000000004B20000-0x0000000004B30000-memory.dmp
    Filesize

    64KB

  • memory/4552-213-0x0000000004B20000-0x0000000004B30000-memory.dmp
    Filesize

    64KB

  • memory/4552-212-0x00000000051B0000-0x00000000051EF000-memory.dmp
    Filesize

    252KB

  • memory/4552-215-0x00000000051B0000-0x00000000051EF000-memory.dmp
    Filesize

    252KB

  • memory/4552-185-0x00000000051B0000-0x00000000051EF000-memory.dmp
    Filesize

    252KB

  • memory/4552-219-0x00000000051B0000-0x00000000051EF000-memory.dmp
    Filesize

    252KB

  • memory/4552-1092-0x0000000005980000-0x0000000005F86000-memory.dmp
    Filesize

    6.0MB

  • memory/4552-1093-0x00000000053F0000-0x00000000054FA000-memory.dmp
    Filesize

    1.0MB

  • memory/4552-1094-0x0000000005530000-0x0000000005542000-memory.dmp
    Filesize

    72KB

  • memory/4552-1095-0x0000000005550000-0x000000000558E000-memory.dmp
    Filesize

    248KB

  • memory/4552-1096-0x00000000056A0000-0x00000000056EB000-memory.dmp
    Filesize

    300KB

  • memory/4552-1097-0x0000000004B20000-0x0000000004B30000-memory.dmp
    Filesize

    64KB

  • memory/4552-1098-0x0000000005830000-0x0000000005896000-memory.dmp
    Filesize

    408KB

  • memory/4552-1099-0x0000000006510000-0x00000000065A2000-memory.dmp
    Filesize

    584KB

  • memory/4552-1101-0x00000000065E0000-0x00000000067A2000-memory.dmp
    Filesize

    1.8MB

  • memory/4552-1102-0x00000000067B0000-0x0000000006CDC000-memory.dmp
    Filesize

    5.2MB

  • memory/4552-1103-0x0000000004B20000-0x0000000004B30000-memory.dmp
    Filesize

    64KB

  • memory/4552-1104-0x0000000004B20000-0x0000000004B30000-memory.dmp
    Filesize

    64KB

  • memory/4552-1105-0x0000000004B20000-0x0000000004B30000-memory.dmp
    Filesize

    64KB

  • memory/4552-183-0x00000000051B0000-0x00000000051EF000-memory.dmp
    Filesize

    252KB

  • memory/4552-181-0x00000000051B0000-0x00000000051F4000-memory.dmp
    Filesize

    272KB

  • memory/4552-180-0x0000000004AE0000-0x0000000004B26000-memory.dmp
    Filesize

    280KB

  • memory/4552-1106-0x0000000006E20000-0x0000000006E96000-memory.dmp
    Filesize

    472KB

  • memory/4552-1107-0x0000000006EA0000-0x0000000006EF0000-memory.dmp
    Filesize

    320KB

  • memory/4552-1108-0x0000000004B20000-0x0000000004B30000-memory.dmp
    Filesize

    64KB