Analysis

  • max time kernel
    50s
  • max time network
    52s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 17:08

General

  • Target

    0fe3a116cb8a3d0b067896f634c6ae959c6a4e43e45855d5aa3f8de425d7ea72.exe

  • Size

    695KB

  • MD5

    661d8125e85a0fc32626d822a2605ab4

  • SHA1

    e15e7ccf63d8a055b164f770f2b99e9b67ed6792

  • SHA256

    0fe3a116cb8a3d0b067896f634c6ae959c6a4e43e45855d5aa3f8de425d7ea72

  • SHA512

    665d265a7bccfd5b280fb2b8a32924b6358275e32440495f0994a34d1f906fca45931f67b857d486b06243a4e06027b21d8c6dbdfc4851bd1c22432b054e922a

  • SSDEEP

    12288:RMrry903vnHtpBRULZf+YeAUq9ocDXKNAvIDRnhK2Qs6yIlKf4IJb:WyKvnHuw7JN8amADBhK2QsvRt

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0fe3a116cb8a3d0b067896f634c6ae959c6a4e43e45855d5aa3f8de425d7ea72.exe
    "C:\Users\Admin\AppData\Local\Temp\0fe3a116cb8a3d0b067896f634c6ae959c6a4e43e45855d5aa3f8de425d7ea72.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4032
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un298423.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un298423.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4212
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2228.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2228.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4216
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3987.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3987.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4736
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si422660.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si422660.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4152

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si422660.exe

    Filesize

    175KB

    MD5

    418b2ff5790d686ba50b2289029b5b32

    SHA1

    9dd0e377e76b30600d518a9de60cbe8f10960a95

    SHA256

    e8a684a14b1a2767f76a9bcfe75ad55fedf57f6b94a29700bef8d3049b86373f

    SHA512

    d7a562eddc7f870315a1517ca0370f221f9327ff8d33f273f1ff73e70d963fef64a6fe3892166984358d96c5685cf8c2a614d155196f46ec643a2b1df691227c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si422660.exe

    Filesize

    175KB

    MD5

    418b2ff5790d686ba50b2289029b5b32

    SHA1

    9dd0e377e76b30600d518a9de60cbe8f10960a95

    SHA256

    e8a684a14b1a2767f76a9bcfe75ad55fedf57f6b94a29700bef8d3049b86373f

    SHA512

    d7a562eddc7f870315a1517ca0370f221f9327ff8d33f273f1ff73e70d963fef64a6fe3892166984358d96c5685cf8c2a614d155196f46ec643a2b1df691227c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un298423.exe

    Filesize

    553KB

    MD5

    73dca9b086734756e99cdf98eae77603

    SHA1

    9af720365af3648cd5096ea587b100dff524f68b

    SHA256

    591cde92f2a16d1bf4168aed5b2e59897a801e0375c6997f35ab62f0f261cac6

    SHA512

    07647aed27350d161f78237a3f96fec34b5559480fd26d63d70f0cbfb78b5ddda9593617e39ea9a1ee59cecdd19ac4e149cef8c0eeb290956ecac773e1745a1c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un298423.exe

    Filesize

    553KB

    MD5

    73dca9b086734756e99cdf98eae77603

    SHA1

    9af720365af3648cd5096ea587b100dff524f68b

    SHA256

    591cde92f2a16d1bf4168aed5b2e59897a801e0375c6997f35ab62f0f261cac6

    SHA512

    07647aed27350d161f78237a3f96fec34b5559480fd26d63d70f0cbfb78b5ddda9593617e39ea9a1ee59cecdd19ac4e149cef8c0eeb290956ecac773e1745a1c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2228.exe

    Filesize

    308KB

    MD5

    1cc32201e78a370c5b18b4d07883e545

    SHA1

    a9267f95b6f3fb17cce457050707f48d21c1ce94

    SHA256

    f346d69a385517ed50b7f7ab1471e4d0482d9c477e1a999e55327a32c31fdbbd

    SHA512

    e3fb370c0e10a2832bedb4b8a415baea2e3325b81e9553facee8c9f8f28a47870a6c20f7456700724d02551a11638c331b89911b1e6ecd78b34e5f03f81ea7a1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2228.exe

    Filesize

    308KB

    MD5

    1cc32201e78a370c5b18b4d07883e545

    SHA1

    a9267f95b6f3fb17cce457050707f48d21c1ce94

    SHA256

    f346d69a385517ed50b7f7ab1471e4d0482d9c477e1a999e55327a32c31fdbbd

    SHA512

    e3fb370c0e10a2832bedb4b8a415baea2e3325b81e9553facee8c9f8f28a47870a6c20f7456700724d02551a11638c331b89911b1e6ecd78b34e5f03f81ea7a1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3987.exe

    Filesize

    366KB

    MD5

    4d406e17c8691608659769b4de209bca

    SHA1

    fc5b9a83dd2f6c6690ac00a9b6d2b4361df1f6f6

    SHA256

    dad6c2055be7b5b4423d2cfaf6b096b7268b0e59e7d91b8d52de2c9a1064307a

    SHA512

    a3f259413a382045bb49fbf8202a374a3826442391017519562254e2009d536b535955a9936aabdb2d17d076beac848b7d0c6e523bc1c391d1f5253f3747147b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3987.exe

    Filesize

    366KB

    MD5

    4d406e17c8691608659769b4de209bca

    SHA1

    fc5b9a83dd2f6c6690ac00a9b6d2b4361df1f6f6

    SHA256

    dad6c2055be7b5b4423d2cfaf6b096b7268b0e59e7d91b8d52de2c9a1064307a

    SHA512

    a3f259413a382045bb49fbf8202a374a3826442391017519562254e2009d536b535955a9936aabdb2d17d076beac848b7d0c6e523bc1c391d1f5253f3747147b

  • memory/4152-1112-0x00000000001D0000-0x0000000000202000-memory.dmp

    Filesize

    200KB

  • memory/4152-1113-0x0000000004C10000-0x0000000004C5B000-memory.dmp

    Filesize

    300KB

  • memory/4152-1114-0x0000000004A20000-0x0000000004A30000-memory.dmp

    Filesize

    64KB

  • memory/4216-143-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4216-155-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4216-140-0x00000000024F0000-0x0000000002508000-memory.dmp

    Filesize

    96KB

  • memory/4216-141-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/4216-142-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4216-138-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/4216-145-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4216-147-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4216-149-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4216-151-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4216-153-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4216-139-0x0000000004E80000-0x000000000537E000-memory.dmp

    Filesize

    5.0MB

  • memory/4216-157-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4216-159-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4216-161-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4216-163-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4216-165-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4216-167-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4216-169-0x00000000024F0000-0x0000000002502000-memory.dmp

    Filesize

    72KB

  • memory/4216-170-0x0000000000400000-0x0000000000710000-memory.dmp

    Filesize

    3.1MB

  • memory/4216-171-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/4216-173-0x0000000000400000-0x0000000000710000-memory.dmp

    Filesize

    3.1MB

  • memory/4216-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4216-137-0x0000000000A20000-0x0000000000A3A000-memory.dmp

    Filesize

    104KB

  • memory/4736-181-0x0000000004D00000-0x0000000004D3F000-memory.dmp

    Filesize

    252KB

  • memory/4736-213-0x0000000004D00000-0x0000000004D3F000-memory.dmp

    Filesize

    252KB

  • memory/4736-183-0x0000000004D00000-0x0000000004D3F000-memory.dmp

    Filesize

    252KB

  • memory/4736-185-0x0000000004D00000-0x0000000004D3F000-memory.dmp

    Filesize

    252KB

  • memory/4736-187-0x0000000004D00000-0x0000000004D3F000-memory.dmp

    Filesize

    252KB

  • memory/4736-189-0x0000000004D00000-0x0000000004D3F000-memory.dmp

    Filesize

    252KB

  • memory/4736-191-0x0000000004D00000-0x0000000004D3F000-memory.dmp

    Filesize

    252KB

  • memory/4736-193-0x0000000004D00000-0x0000000004D3F000-memory.dmp

    Filesize

    252KB

  • memory/4736-195-0x0000000004D00000-0x0000000004D3F000-memory.dmp

    Filesize

    252KB

  • memory/4736-197-0x0000000004D00000-0x0000000004D3F000-memory.dmp

    Filesize

    252KB

  • memory/4736-199-0x0000000004D00000-0x0000000004D3F000-memory.dmp

    Filesize

    252KB

  • memory/4736-201-0x0000000000770000-0x00000000007BB000-memory.dmp

    Filesize

    300KB

  • memory/4736-203-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/4736-202-0x0000000004D00000-0x0000000004D3F000-memory.dmp

    Filesize

    252KB

  • memory/4736-205-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/4736-207-0x0000000004D00000-0x0000000004D3F000-memory.dmp

    Filesize

    252KB

  • memory/4736-206-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/4736-209-0x0000000004D00000-0x0000000004D3F000-memory.dmp

    Filesize

    252KB

  • memory/4736-211-0x0000000004D00000-0x0000000004D3F000-memory.dmp

    Filesize

    252KB

  • memory/4736-180-0x0000000004D00000-0x0000000004D3F000-memory.dmp

    Filesize

    252KB

  • memory/4736-215-0x0000000004D00000-0x0000000004D3F000-memory.dmp

    Filesize

    252KB

  • memory/4736-217-0x0000000004D00000-0x0000000004D3F000-memory.dmp

    Filesize

    252KB

  • memory/4736-1090-0x00000000052C0000-0x00000000058C6000-memory.dmp

    Filesize

    6.0MB

  • memory/4736-1091-0x00000000058D0000-0x00000000059DA000-memory.dmp

    Filesize

    1.0MB

  • memory/4736-1092-0x0000000005A00000-0x0000000005A12000-memory.dmp

    Filesize

    72KB

  • memory/4736-1093-0x0000000005A20000-0x0000000005A5E000-memory.dmp

    Filesize

    248KB

  • memory/4736-1094-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/4736-1095-0x0000000005B70000-0x0000000005BBB000-memory.dmp

    Filesize

    300KB

  • memory/4736-1097-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/4736-1098-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/4736-1099-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/4736-1100-0x0000000005D00000-0x0000000005D92000-memory.dmp

    Filesize

    584KB

  • memory/4736-1101-0x0000000005DA0000-0x0000000005E06000-memory.dmp

    Filesize

    408KB

  • memory/4736-1102-0x00000000065F0000-0x0000000006666000-memory.dmp

    Filesize

    472KB

  • memory/4736-1103-0x0000000006670000-0x00000000066C0000-memory.dmp

    Filesize

    320KB

  • memory/4736-179-0x0000000004D00000-0x0000000004D44000-memory.dmp

    Filesize

    272KB

  • memory/4736-178-0x00000000023B0000-0x00000000023F6000-memory.dmp

    Filesize

    280KB

  • memory/4736-1104-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/4736-1105-0x0000000007680000-0x0000000007842000-memory.dmp

    Filesize

    1.8MB

  • memory/4736-1106-0x0000000007850000-0x0000000007D7C000-memory.dmp

    Filesize

    5.2MB