Analysis

  • max time kernel
    51s
  • max time network
    75s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 17:11

General

  • Target

    0221e936a07380560d2906539e72114e767b381cb99c37af247c7d6e05b7f66b.exe

  • Size

    695KB

  • MD5

    2c9ee479346717e4db2ed8baa58e5515

  • SHA1

    dcee4e0de297ac4247a5c3f6997057c467010d63

  • SHA256

    0221e936a07380560d2906539e72114e767b381cb99c37af247c7d6e05b7f66b

  • SHA512

    fd0370b0df8d9ff3b8446555c16794f55e37993f23af6e64ec15bb5d111275fe7685384a5ffac4a6c0a5e6d1d427bb96d23e797e4569b1dbd34740bc0c21d2cf

  • SSDEEP

    12288:NMrvy90z3yFko7VAXIA9qRPrEHuOkZoEnhKNmIHPCRwNg8:iyA3yka9UoPgx6hKwIHPYM

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0221e936a07380560d2906539e72114e767b381cb99c37af247c7d6e05b7f66b.exe
    "C:\Users\Admin\AppData\Local\Temp\0221e936a07380560d2906539e72114e767b381cb99c37af247c7d6e05b7f66b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4452
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un234534.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un234534.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5048
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2140.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2140.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3560
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5193.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5193.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3528
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si681493.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si681493.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5000

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si681493.exe

    Filesize

    175KB

    MD5

    c4eed6d064ae5f3599c45cadabd13749

    SHA1

    6c28d2b7844ee57351d728fc3561623212da4c9b

    SHA256

    f3dfc9bb12f37f9d845d6103ba722039cc9ec313862bb154d118961f33362aeb

    SHA512

    eb7eb6fadc488a31c5317dfd9bd6c992ab5e8553ccdf75cc6003bce9c6a1c1e0729ea5b161c25f64bc5e5517251e43474d98b407449ac638d4a17125fd586b31

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si681493.exe

    Filesize

    175KB

    MD5

    c4eed6d064ae5f3599c45cadabd13749

    SHA1

    6c28d2b7844ee57351d728fc3561623212da4c9b

    SHA256

    f3dfc9bb12f37f9d845d6103ba722039cc9ec313862bb154d118961f33362aeb

    SHA512

    eb7eb6fadc488a31c5317dfd9bd6c992ab5e8553ccdf75cc6003bce9c6a1c1e0729ea5b161c25f64bc5e5517251e43474d98b407449ac638d4a17125fd586b31

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un234534.exe

    Filesize

    553KB

    MD5

    6458b2685c8ca681bf4eb56b27ad8a59

    SHA1

    8f1a71f130513271faca23e085b4f585d432d375

    SHA256

    deccee92e3de6f83eca6962940efd7f6d592f2c8ab1c9a620f1b4a77e39b05d0

    SHA512

    287d0b0a98715f553f50d34bd496ca8e3c89d194f6f211d78dd533bafa53c42a50f51531160043578c132db9a7b8df9dcc88a3497f89f7521ca6d5796b51fdb8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un234534.exe

    Filesize

    553KB

    MD5

    6458b2685c8ca681bf4eb56b27ad8a59

    SHA1

    8f1a71f130513271faca23e085b4f585d432d375

    SHA256

    deccee92e3de6f83eca6962940efd7f6d592f2c8ab1c9a620f1b4a77e39b05d0

    SHA512

    287d0b0a98715f553f50d34bd496ca8e3c89d194f6f211d78dd533bafa53c42a50f51531160043578c132db9a7b8df9dcc88a3497f89f7521ca6d5796b51fdb8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2140.exe

    Filesize

    308KB

    MD5

    9f95b96d9e4770758ae2cd3a84ab1077

    SHA1

    de42650be5378e59ec825532eff6af419a8c0839

    SHA256

    9c68fffd9e3387bd5b0d3350836cc1e314f320078f1b41f8182288167c4197ea

    SHA512

    ea176cbd9949e2559cfd3da2c55a7342292b12a322fda93c436229798b6872ddb249325962d109be7dfd6ace0533683baa0f172668cb8474ea47debc095e3802

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2140.exe

    Filesize

    308KB

    MD5

    9f95b96d9e4770758ae2cd3a84ab1077

    SHA1

    de42650be5378e59ec825532eff6af419a8c0839

    SHA256

    9c68fffd9e3387bd5b0d3350836cc1e314f320078f1b41f8182288167c4197ea

    SHA512

    ea176cbd9949e2559cfd3da2c55a7342292b12a322fda93c436229798b6872ddb249325962d109be7dfd6ace0533683baa0f172668cb8474ea47debc095e3802

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5193.exe

    Filesize

    366KB

    MD5

    f35b26dc58879c8e2492715d8cd12c99

    SHA1

    a7e6653cb4e427105e3627e9302662b29cb08c86

    SHA256

    d6fb57e50d9928698318d162149b41da1c26780d048283af7a02c28e64c245f2

    SHA512

    37f0d1051454166c8a3c51f55bf83ee1be0b691bdc233c2285a9416dc651204bd2a0c14da649a6b8042dac54f4ad56ad512b093f8eb139e66e0e212ccc261fb8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5193.exe

    Filesize

    366KB

    MD5

    f35b26dc58879c8e2492715d8cd12c99

    SHA1

    a7e6653cb4e427105e3627e9302662b29cb08c86

    SHA256

    d6fb57e50d9928698318d162149b41da1c26780d048283af7a02c28e64c245f2

    SHA512

    37f0d1051454166c8a3c51f55bf83ee1be0b691bdc233c2285a9416dc651204bd2a0c14da649a6b8042dac54f4ad56ad512b093f8eb139e66e0e212ccc261fb8

  • memory/3528-1089-0x00000000058D0000-0x0000000005ED6000-memory.dmp

    Filesize

    6.0MB

  • memory/3528-1090-0x00000000052C0000-0x00000000053CA000-memory.dmp

    Filesize

    1.0MB

  • memory/3528-1105-0x00000000076F0000-0x0000000007C1C000-memory.dmp

    Filesize

    5.2MB

  • memory/3528-1104-0x0000000007520000-0x00000000076E2000-memory.dmp

    Filesize

    1.8MB

  • memory/3528-1103-0x0000000002850000-0x0000000002860000-memory.dmp

    Filesize

    64KB

  • memory/3528-1102-0x00000000074D0000-0x0000000007520000-memory.dmp

    Filesize

    320KB

  • memory/3528-1101-0x0000000006730000-0x00000000067A6000-memory.dmp

    Filesize

    472KB

  • memory/3528-190-0x0000000002780000-0x00000000027BF000-memory.dmp

    Filesize

    252KB

  • memory/3528-1100-0x0000000002850000-0x0000000002860000-memory.dmp

    Filesize

    64KB

  • memory/3528-1099-0x0000000002850000-0x0000000002860000-memory.dmp

    Filesize

    64KB

  • memory/3528-1098-0x0000000002850000-0x0000000002860000-memory.dmp

    Filesize

    64KB

  • memory/3528-1096-0x0000000005790000-0x00000000057F6000-memory.dmp

    Filesize

    408KB

  • memory/3528-1095-0x00000000056F0000-0x0000000005782000-memory.dmp

    Filesize

    584KB

  • memory/3528-192-0x0000000002780000-0x00000000027BF000-memory.dmp

    Filesize

    252KB

  • memory/3528-1094-0x0000000005560000-0x00000000055AB000-memory.dmp

    Filesize

    300KB

  • memory/3528-1093-0x0000000002850000-0x0000000002860000-memory.dmp

    Filesize

    64KB

  • memory/3528-1092-0x0000000005410000-0x000000000544E000-memory.dmp

    Filesize

    248KB

  • memory/3528-194-0x0000000002780000-0x00000000027BF000-memory.dmp

    Filesize

    252KB

  • memory/3528-1091-0x00000000053F0000-0x0000000005402000-memory.dmp

    Filesize

    72KB

  • memory/3528-206-0x0000000002780000-0x00000000027BF000-memory.dmp

    Filesize

    252KB

  • memory/3528-216-0x0000000002780000-0x00000000027BF000-memory.dmp

    Filesize

    252KB

  • memory/3528-214-0x0000000002780000-0x00000000027BF000-memory.dmp

    Filesize

    252KB

  • memory/3528-177-0x00000000026C0000-0x0000000002706000-memory.dmp

    Filesize

    280KB

  • memory/3528-178-0x0000000000720000-0x000000000076B000-memory.dmp

    Filesize

    300KB

  • memory/3528-180-0x0000000002780000-0x00000000027C4000-memory.dmp

    Filesize

    272KB

  • memory/3528-181-0x0000000002850000-0x0000000002860000-memory.dmp

    Filesize

    64KB

  • memory/3528-182-0x0000000002850000-0x0000000002860000-memory.dmp

    Filesize

    64KB

  • memory/3528-179-0x0000000002850000-0x0000000002860000-memory.dmp

    Filesize

    64KB

  • memory/3528-184-0x0000000002780000-0x00000000027BF000-memory.dmp

    Filesize

    252KB

  • memory/3528-183-0x0000000002780000-0x00000000027BF000-memory.dmp

    Filesize

    252KB

  • memory/3528-186-0x0000000002780000-0x00000000027BF000-memory.dmp

    Filesize

    252KB

  • memory/3528-188-0x0000000002780000-0x00000000027BF000-memory.dmp

    Filesize

    252KB

  • memory/3528-212-0x0000000002780000-0x00000000027BF000-memory.dmp

    Filesize

    252KB

  • memory/3528-210-0x0000000002780000-0x00000000027BF000-memory.dmp

    Filesize

    252KB

  • memory/3528-208-0x0000000002780000-0x00000000027BF000-memory.dmp

    Filesize

    252KB

  • memory/3528-196-0x0000000002780000-0x00000000027BF000-memory.dmp

    Filesize

    252KB

  • memory/3528-198-0x0000000002780000-0x00000000027BF000-memory.dmp

    Filesize

    252KB

  • memory/3528-200-0x0000000002780000-0x00000000027BF000-memory.dmp

    Filesize

    252KB

  • memory/3528-202-0x0000000002780000-0x00000000027BF000-memory.dmp

    Filesize

    252KB

  • memory/3528-204-0x0000000002780000-0x00000000027BF000-memory.dmp

    Filesize

    252KB

  • memory/3560-167-0x0000000002550000-0x0000000002562000-memory.dmp

    Filesize

    72KB

  • memory/3560-169-0x0000000002550000-0x0000000002562000-memory.dmp

    Filesize

    72KB

  • memory/3560-161-0x0000000002550000-0x0000000002562000-memory.dmp

    Filesize

    72KB

  • memory/3560-149-0x0000000002550000-0x0000000002562000-memory.dmp

    Filesize

    72KB

  • memory/3560-138-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/3560-139-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/3560-137-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/3560-172-0x0000000000400000-0x0000000000710000-memory.dmp

    Filesize

    3.1MB

  • memory/3560-170-0x0000000000400000-0x0000000000710000-memory.dmp

    Filesize

    3.1MB

  • memory/3560-140-0x0000000004E30000-0x000000000532E000-memory.dmp

    Filesize

    5.0MB

  • memory/3560-165-0x0000000002550000-0x0000000002562000-memory.dmp

    Filesize

    72KB

  • memory/3560-163-0x0000000002550000-0x0000000002562000-memory.dmp

    Filesize

    72KB

  • memory/3560-159-0x0000000002550000-0x0000000002562000-memory.dmp

    Filesize

    72KB

  • memory/3560-157-0x0000000002550000-0x0000000002562000-memory.dmp

    Filesize

    72KB

  • memory/3560-155-0x0000000002550000-0x0000000002562000-memory.dmp

    Filesize

    72KB

  • memory/3560-153-0x0000000002550000-0x0000000002562000-memory.dmp

    Filesize

    72KB

  • memory/3560-151-0x0000000002550000-0x0000000002562000-memory.dmp

    Filesize

    72KB

  • memory/3560-147-0x0000000002550000-0x0000000002562000-memory.dmp

    Filesize

    72KB

  • memory/3560-145-0x0000000002550000-0x0000000002562000-memory.dmp

    Filesize

    72KB

  • memory/3560-143-0x0000000002550000-0x0000000002562000-memory.dmp

    Filesize

    72KB

  • memory/3560-142-0x0000000002550000-0x0000000002562000-memory.dmp

    Filesize

    72KB

  • memory/3560-141-0x0000000002550000-0x0000000002568000-memory.dmp

    Filesize

    96KB

  • memory/3560-136-0x00000000007E0000-0x000000000080D000-memory.dmp

    Filesize

    180KB

  • memory/3560-135-0x0000000002220000-0x000000000223A000-memory.dmp

    Filesize

    104KB

  • memory/5000-1111-0x0000000000960000-0x0000000000992000-memory.dmp

    Filesize

    200KB

  • memory/5000-1112-0x0000000005260000-0x00000000052AB000-memory.dmp

    Filesize

    300KB

  • memory/5000-1113-0x00000000052D0000-0x00000000052E0000-memory.dmp

    Filesize

    64KB