Analysis

  • max time kernel
    57s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 17:02

General

  • Target

    5b9618b212014d54da43d7d48cba3ecc379333ee7aaee142d8fda2b4771d41c0.exe

  • Size

    695KB

  • MD5

    8254d38d6a048b49526386b56a70ede3

  • SHA1

    fd392ca3e6782cb0488cd476550c442d5a178579

  • SHA256

    5b9618b212014d54da43d7d48cba3ecc379333ee7aaee142d8fda2b4771d41c0

  • SHA512

    7f7f43a0b742b2e87446671f1d3cea3192f06d5c15477da1219ede33fd8ade1ae29557d81e5de4d8270531139176418b84f677de369b3e62a8b913deef4cd7f4

  • SSDEEP

    12288:WMrsy907/5Qv4zATq1baX9KjrDhmApdnhRAQs6yIoo+qkmXfHRhuD:iyMuv4zaSY9KjrdXhRAQs/to+qkmXfH

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b9618b212014d54da43d7d48cba3ecc379333ee7aaee142d8fda2b4771d41c0.exe
    "C:\Users\Admin\AppData\Local\Temp\5b9618b212014d54da43d7d48cba3ecc379333ee7aaee142d8fda2b4771d41c0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3612
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un826905.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un826905.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4108
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6487.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6487.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2072
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5155.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5155.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2056
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si658971.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si658971.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4544

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si658971.exe

    Filesize

    175KB

    MD5

    dc637bfb23c5f9db2d1def1dcde7638b

    SHA1

    14366dbb4f61df3a7e07e19b5ba2929bbbe7b1d2

    SHA256

    62b8a951f49e5885fb8ca68846d360ab4fa53708dcb5bfcd2741acb365addf37

    SHA512

    fda0d8261d7479f02d98edcb9ac01911cb5fd110b7d9cd4e23d0219c5643438efa7571dfea1829183e2d9b99b81a61a2a2e67c5bab1f531a683aa3bc99587f24

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si658971.exe

    Filesize

    175KB

    MD5

    dc637bfb23c5f9db2d1def1dcde7638b

    SHA1

    14366dbb4f61df3a7e07e19b5ba2929bbbe7b1d2

    SHA256

    62b8a951f49e5885fb8ca68846d360ab4fa53708dcb5bfcd2741acb365addf37

    SHA512

    fda0d8261d7479f02d98edcb9ac01911cb5fd110b7d9cd4e23d0219c5643438efa7571dfea1829183e2d9b99b81a61a2a2e67c5bab1f531a683aa3bc99587f24

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un826905.exe

    Filesize

    553KB

    MD5

    793d009e7040f64b458806d6a43ff622

    SHA1

    46a4bf5e16d421236014c8407ddfaa750a082fc0

    SHA256

    405215ee5603f6fffaf236802da85c6a068887ac9ef72d8cd18cc5d2b4b9db6a

    SHA512

    1cc8cf81952a916fb6bc8eea97643b9717dc16ff645e5ede9eb0f2ab112d4a560e7eb287d3e565750d8491703a38ef84f04f9be55f9d8f0fa7dfa2b37c5be563

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un826905.exe

    Filesize

    553KB

    MD5

    793d009e7040f64b458806d6a43ff622

    SHA1

    46a4bf5e16d421236014c8407ddfaa750a082fc0

    SHA256

    405215ee5603f6fffaf236802da85c6a068887ac9ef72d8cd18cc5d2b4b9db6a

    SHA512

    1cc8cf81952a916fb6bc8eea97643b9717dc16ff645e5ede9eb0f2ab112d4a560e7eb287d3e565750d8491703a38ef84f04f9be55f9d8f0fa7dfa2b37c5be563

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6487.exe

    Filesize

    308KB

    MD5

    3383303cff8139fd680f1426bf73257f

    SHA1

    b942c309512cba2082ed3133b9b9a07c9051a38c

    SHA256

    350a784dfc995a3151f639b94e06cd8ab3143b7b7e767de1ce60ca2be72f9cd4

    SHA512

    1afc13e2bb42114fb12fcf217c45570397b56e921ea0bd369c6a2bf1388208ad840920b3bf47c3462e64efaf82f91dbbdd5e736f275cd987cc3acdf0a309f158

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6487.exe

    Filesize

    308KB

    MD5

    3383303cff8139fd680f1426bf73257f

    SHA1

    b942c309512cba2082ed3133b9b9a07c9051a38c

    SHA256

    350a784dfc995a3151f639b94e06cd8ab3143b7b7e767de1ce60ca2be72f9cd4

    SHA512

    1afc13e2bb42114fb12fcf217c45570397b56e921ea0bd369c6a2bf1388208ad840920b3bf47c3462e64efaf82f91dbbdd5e736f275cd987cc3acdf0a309f158

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5155.exe

    Filesize

    366KB

    MD5

    50885192d99d4c69196d20a99a2939a0

    SHA1

    f866afb8a0bf867afec38eae1f5118b10b1fcee3

    SHA256

    a8bf732340d5be1df56bad43d571f27e43af1260a530c6569c48ed0698046b92

    SHA512

    3283861f5f368c6ad8e0c452999e6f7f1aef46e3af5b48c3a5e4888991c149635e4be531cc008be3789191bf0f83deee382d6233382898016c24c42918c25507

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5155.exe

    Filesize

    366KB

    MD5

    50885192d99d4c69196d20a99a2939a0

    SHA1

    f866afb8a0bf867afec38eae1f5118b10b1fcee3

    SHA256

    a8bf732340d5be1df56bad43d571f27e43af1260a530c6569c48ed0698046b92

    SHA512

    3283861f5f368c6ad8e0c452999e6f7f1aef46e3af5b48c3a5e4888991c149635e4be531cc008be3789191bf0f83deee382d6233382898016c24c42918c25507

  • memory/2056-1088-0x0000000005AA0000-0x00000000060A6000-memory.dmp

    Filesize

    6.0MB

  • memory/2056-1089-0x0000000005490000-0x000000000559A000-memory.dmp

    Filesize

    1.0MB

  • memory/2056-1104-0x00000000081A0000-0x00000000081F0000-memory.dmp

    Filesize

    320KB

  • memory/2056-191-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/2056-1103-0x0000000008120000-0x0000000008196000-memory.dmp

    Filesize

    472KB

  • memory/2056-193-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/2056-1102-0x0000000007A60000-0x0000000007F8C000-memory.dmp

    Filesize

    5.2MB

  • memory/2056-1101-0x0000000007890000-0x0000000007A52000-memory.dmp

    Filesize

    1.8MB

  • memory/2056-1100-0x00000000023F0000-0x0000000002400000-memory.dmp

    Filesize

    64KB

  • memory/2056-1099-0x00000000023F0000-0x0000000002400000-memory.dmp

    Filesize

    64KB

  • memory/2056-1098-0x00000000023F0000-0x0000000002400000-memory.dmp

    Filesize

    64KB

  • memory/2056-1097-0x00000000023F0000-0x0000000002400000-memory.dmp

    Filesize

    64KB

  • memory/2056-1095-0x0000000006500000-0x0000000006592000-memory.dmp

    Filesize

    584KB

  • memory/2056-1094-0x0000000005830000-0x0000000005896000-memory.dmp

    Filesize

    408KB

  • memory/2056-1093-0x00000000056E0000-0x000000000572B000-memory.dmp

    Filesize

    300KB

  • memory/2056-1092-0x00000000055A0000-0x00000000055DE000-memory.dmp

    Filesize

    248KB

  • memory/2056-1091-0x00000000023F0000-0x0000000002400000-memory.dmp

    Filesize

    64KB

  • memory/2056-1090-0x00000000028F0000-0x0000000002902000-memory.dmp

    Filesize

    72KB

  • memory/2056-195-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/2056-203-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/2056-228-0x00000000023F0000-0x0000000002400000-memory.dmp

    Filesize

    64KB

  • memory/2056-227-0x00000000023F0000-0x0000000002400000-memory.dmp

    Filesize

    64KB

  • memory/2056-224-0x00000000023F0000-0x0000000002400000-memory.dmp

    Filesize

    64KB

  • memory/2056-223-0x0000000000800000-0x000000000084B000-memory.dmp

    Filesize

    300KB

  • memory/2056-211-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/2056-176-0x0000000002360000-0x00000000023A6000-memory.dmp

    Filesize

    280KB

  • memory/2056-177-0x0000000002650000-0x0000000002694000-memory.dmp

    Filesize

    272KB

  • memory/2056-179-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/2056-178-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/2056-181-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/2056-183-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/2056-185-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/2056-187-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/2056-189-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/2056-209-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/2056-207-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/2056-205-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/2056-197-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/2056-199-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/2056-201-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/2072-166-0x0000000000400000-0x0000000000710000-memory.dmp

    Filesize

    3.1MB

  • memory/2072-135-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/2072-145-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/2072-141-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/2072-134-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/2072-137-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/2072-171-0x0000000000400000-0x0000000000710000-memory.dmp

    Filesize

    3.1MB

  • memory/2072-169-0x0000000004FC0000-0x0000000004FD0000-memory.dmp

    Filesize

    64KB

  • memory/2072-168-0x0000000004FC0000-0x0000000004FD0000-memory.dmp

    Filesize

    64KB

  • memory/2072-133-0x00000000024C0000-0x00000000024D8000-memory.dmp

    Filesize

    96KB

  • memory/2072-167-0x0000000004FC0000-0x0000000004FD0000-memory.dmp

    Filesize

    64KB

  • memory/2072-165-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/2072-163-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/2072-161-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/2072-159-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/2072-157-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/2072-152-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/2072-153-0x0000000004FC0000-0x0000000004FD0000-memory.dmp

    Filesize

    64KB

  • memory/2072-155-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/2072-149-0x0000000004FC0000-0x0000000004FD0000-memory.dmp

    Filesize

    64KB

  • memory/2072-151-0x0000000004FC0000-0x0000000004FD0000-memory.dmp

    Filesize

    64KB

  • memory/2072-148-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/2072-147-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2072-143-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/2072-139-0x00000000024C0000-0x00000000024D2000-memory.dmp

    Filesize

    72KB

  • memory/2072-132-0x0000000004FD0000-0x00000000054CE000-memory.dmp

    Filesize

    5.0MB

  • memory/2072-131-0x0000000002260000-0x000000000227A000-memory.dmp

    Filesize

    104KB

  • memory/4544-1110-0x0000000000FA0000-0x0000000000FD2000-memory.dmp

    Filesize

    200KB

  • memory/4544-1111-0x00000000059E0000-0x0000000005A2B000-memory.dmp

    Filesize

    300KB

  • memory/4544-1112-0x0000000005B60000-0x0000000005B70000-memory.dmp

    Filesize

    64KB

  • memory/4544-1113-0x0000000005B60000-0x0000000005B70000-memory.dmp

    Filesize

    64KB