Analysis

  • max time kernel
    57s
  • max time network
    61s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 18:23

General

  • Target

    91b689c10a4226380c576796cdb08f24d1e81f6b4742ce0870eca2d0013c5441.exe

  • Size

    700KB

  • MD5

    00115cd14159ea81f10a7cecce3cc851

  • SHA1

    49a82228887494053337c913a3e9a3ad35f1478f

  • SHA256

    91b689c10a4226380c576796cdb08f24d1e81f6b4742ce0870eca2d0013c5441

  • SHA512

    41530a728a6519355d63fd5dd845a3d185fcb90b86f268a682a247edc671bcbb44e43ad694d5daece3868fc3aea5f2e0f72fac89b69a76bbf63ce15d77cc4a01

  • SSDEEP

    12288:sMrzy90ejgGykXwrrvwQzLOKDew0khrM2NwPaSLPHEycA:fyZcIOzzLdDew0MrM2NAaoPHiA

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\91b689c10a4226380c576796cdb08f24d1e81f6b4742ce0870eca2d0013c5441.exe
    "C:\Users\Admin\AppData\Local\Temp\91b689c10a4226380c576796cdb08f24d1e81f6b4742ce0870eca2d0013c5441.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4220
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un901872.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un901872.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1716
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2764.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2764.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1436
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1971.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1971.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4920
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si870601.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si870601.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3568

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si870601.exe

    Filesize

    175KB

    MD5

    9901ffc47d267ef30a2ec3822b4b300b

    SHA1

    791c0aa4409dab24634a446f9ceaef274afa2801

    SHA256

    f26077b4af16170abcd4d5ad968028aa714b657d3f20eb4ffc02568faf839471

    SHA512

    9e1aebbffdfa9ed9f9cac468f694c81aad44a32b0631499b6aae96b4b33e0fa17f7145aa6bef82f2f906bc960ee21ab9c3c6dccd9031ca45256a704494d53861

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si870601.exe

    Filesize

    175KB

    MD5

    9901ffc47d267ef30a2ec3822b4b300b

    SHA1

    791c0aa4409dab24634a446f9ceaef274afa2801

    SHA256

    f26077b4af16170abcd4d5ad968028aa714b657d3f20eb4ffc02568faf839471

    SHA512

    9e1aebbffdfa9ed9f9cac468f694c81aad44a32b0631499b6aae96b4b33e0fa17f7145aa6bef82f2f906bc960ee21ab9c3c6dccd9031ca45256a704494d53861

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un901872.exe

    Filesize

    557KB

    MD5

    7791270a40be805b9f30dfea3146dfa3

    SHA1

    a43720297dd4bf609937c83cd31d9548b00a7059

    SHA256

    99c4a26d138908d5ae276ea1a60e34009fa5ec568ed1ded6c88b1a4e3ee83a3b

    SHA512

    29679b661406769e8978aabdc914c8ea9bb9690e3f585272145ac6cf941c834261aa3a19b2f1e3a7c52d16d05749eef28d3832473dfa4aa278355622ef07f1bc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un901872.exe

    Filesize

    557KB

    MD5

    7791270a40be805b9f30dfea3146dfa3

    SHA1

    a43720297dd4bf609937c83cd31d9548b00a7059

    SHA256

    99c4a26d138908d5ae276ea1a60e34009fa5ec568ed1ded6c88b1a4e3ee83a3b

    SHA512

    29679b661406769e8978aabdc914c8ea9bb9690e3f585272145ac6cf941c834261aa3a19b2f1e3a7c52d16d05749eef28d3832473dfa4aa278355622ef07f1bc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2764.exe

    Filesize

    307KB

    MD5

    c08dd59291842a106313352196008fd1

    SHA1

    3297dbd000d550f6fab9a55547e6c51b84c9d515

    SHA256

    f3da5103395c0b61c9f0a3fc002e7ef3b1cc1349fa6a5683844df5531fd310d8

    SHA512

    41dec7499d15f13696ac98d335829767a7492bf26e95f27fa5df811a45c5cc7c4a2e51dcca3b53f9daaa70c886b5adc0732ce8961962dcafaa7c6e3fd9918f9a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2764.exe

    Filesize

    307KB

    MD5

    c08dd59291842a106313352196008fd1

    SHA1

    3297dbd000d550f6fab9a55547e6c51b84c9d515

    SHA256

    f3da5103395c0b61c9f0a3fc002e7ef3b1cc1349fa6a5683844df5531fd310d8

    SHA512

    41dec7499d15f13696ac98d335829767a7492bf26e95f27fa5df811a45c5cc7c4a2e51dcca3b53f9daaa70c886b5adc0732ce8961962dcafaa7c6e3fd9918f9a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1971.exe

    Filesize

    366KB

    MD5

    d3927fb19196d6cac6e5937988808ddb

    SHA1

    0dc5044f8e15dbf576c157cb4b42504d0d90f1aa

    SHA256

    9c768239b7c959133bd2b1614c24ed15a8189f3a4da6dfec67bfbc4bba4f5129

    SHA512

    47674156cc862c8cf4c84c4872ee4759590937a34bc0ff0d2dc4c263f531bf2bdceffea415ff421382918e760ef1ab76a826e62cbaae5bcdccf0ce2fe9489b9f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1971.exe

    Filesize

    366KB

    MD5

    d3927fb19196d6cac6e5937988808ddb

    SHA1

    0dc5044f8e15dbf576c157cb4b42504d0d90f1aa

    SHA256

    9c768239b7c959133bd2b1614c24ed15a8189f3a4da6dfec67bfbc4bba4f5129

    SHA512

    47674156cc862c8cf4c84c4872ee4759590937a34bc0ff0d2dc4c263f531bf2bdceffea415ff421382918e760ef1ab76a826e62cbaae5bcdccf0ce2fe9489b9f

  • memory/1436-131-0x0000000002740000-0x000000000275A000-memory.dmp

    Filesize

    104KB

  • memory/1436-132-0x0000000004D30000-0x000000000522E000-memory.dmp

    Filesize

    5.0MB

  • memory/1436-133-0x0000000004C40000-0x0000000004C58000-memory.dmp

    Filesize

    96KB

  • memory/1436-134-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/1436-135-0x0000000004D20000-0x0000000004D30000-memory.dmp

    Filesize

    64KB

  • memory/1436-136-0x0000000004D20000-0x0000000004D30000-memory.dmp

    Filesize

    64KB

  • memory/1436-137-0x0000000004D20000-0x0000000004D30000-memory.dmp

    Filesize

    64KB

  • memory/1436-139-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/1436-138-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/1436-141-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/1436-143-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/1436-145-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/1436-147-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/1436-149-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/1436-151-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/1436-153-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/1436-155-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/1436-157-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/1436-159-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/1436-161-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/1436-163-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/1436-165-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/1436-166-0x0000000000400000-0x0000000000710000-memory.dmp

    Filesize

    3.1MB

  • memory/1436-167-0x0000000004D20000-0x0000000004D30000-memory.dmp

    Filesize

    64KB

  • memory/1436-168-0x0000000004D20000-0x0000000004D30000-memory.dmp

    Filesize

    64KB

  • memory/1436-169-0x0000000004D20000-0x0000000004D30000-memory.dmp

    Filesize

    64KB

  • memory/1436-171-0x0000000000400000-0x0000000000710000-memory.dmp

    Filesize

    3.1MB

  • memory/3568-1110-0x0000000000FF0000-0x0000000001022000-memory.dmp

    Filesize

    200KB

  • memory/3568-1112-0x0000000005C20000-0x0000000005C30000-memory.dmp

    Filesize

    64KB

  • memory/3568-1111-0x0000000005A30000-0x0000000005A7B000-memory.dmp

    Filesize

    300KB

  • memory/4920-179-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4920-285-0x0000000002580000-0x0000000002590000-memory.dmp

    Filesize

    64KB

  • memory/4920-181-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4920-183-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4920-185-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4920-187-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4920-189-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4920-191-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4920-193-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4920-195-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4920-197-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4920-199-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4920-201-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4920-203-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4920-205-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4920-207-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4920-209-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4920-211-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4920-283-0x0000000002120000-0x000000000216B000-memory.dmp

    Filesize

    300KB

  • memory/4920-178-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/4920-289-0x0000000002580000-0x0000000002590000-memory.dmp

    Filesize

    64KB

  • memory/4920-287-0x0000000002580000-0x0000000002590000-memory.dmp

    Filesize

    64KB

  • memory/4920-1088-0x0000000005840000-0x0000000005E46000-memory.dmp

    Filesize

    6.0MB

  • memory/4920-1089-0x00000000052B0000-0x00000000053BA000-memory.dmp

    Filesize

    1.0MB

  • memory/4920-1090-0x00000000053F0000-0x0000000005402000-memory.dmp

    Filesize

    72KB

  • memory/4920-1091-0x0000000005410000-0x000000000544E000-memory.dmp

    Filesize

    248KB

  • memory/4920-1092-0x0000000005560000-0x00000000055AB000-memory.dmp

    Filesize

    300KB

  • memory/4920-1093-0x0000000002580000-0x0000000002590000-memory.dmp

    Filesize

    64KB

  • memory/4920-1094-0x00000000056F0000-0x0000000005756000-memory.dmp

    Filesize

    408KB

  • memory/4920-1095-0x00000000063C0000-0x0000000006452000-memory.dmp

    Filesize

    584KB

  • memory/4920-1097-0x0000000002580000-0x0000000002590000-memory.dmp

    Filesize

    64KB

  • memory/4920-1098-0x0000000002580000-0x0000000002590000-memory.dmp

    Filesize

    64KB

  • memory/4920-1099-0x0000000002580000-0x0000000002590000-memory.dmp

    Filesize

    64KB

  • memory/4920-1100-0x00000000066E0000-0x00000000068A2000-memory.dmp

    Filesize

    1.8MB

  • memory/4920-1101-0x00000000068D0000-0x0000000006DFC000-memory.dmp

    Filesize

    5.2MB

  • memory/4920-177-0x00000000051C0000-0x0000000005204000-memory.dmp

    Filesize

    272KB

  • memory/4920-176-0x0000000002540000-0x0000000002586000-memory.dmp

    Filesize

    280KB

  • memory/4920-1102-0x0000000002580000-0x0000000002590000-memory.dmp

    Filesize

    64KB

  • memory/4920-1103-0x0000000006F10000-0x0000000006F86000-memory.dmp

    Filesize

    472KB

  • memory/4920-1104-0x0000000006FB0000-0x0000000007000000-memory.dmp

    Filesize

    320KB