Analysis

  • max time kernel
    50s
  • max time network
    70s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 17:54

General

  • Target

    692ddacdef8ed5764ed3a411d6fc5760e51a131e66b8c2455eea52e2d400c3fe.exe

  • Size

    695KB

  • MD5

    a9aecdfd40a0c217b02e958616786f90

  • SHA1

    1ee309b56b0aba8b6f74697673e4ef2f6668a897

  • SHA256

    692ddacdef8ed5764ed3a411d6fc5760e51a131e66b8c2455eea52e2d400c3fe

  • SHA512

    41d90d029ccb45de21af14d61cfee14997062bc790b3f22715c99bfc92bfb51610ac9c9de2e27a3a65a60b3e23d70846f5a5076d42aabf934e162c9632693488

  • SSDEEP

    12288:aMrty90oYDac+uZ3bLZuk9hWGxE7DYGQ6u3kna4bVnh9djTbk+YBB9:XyNYDac+MPZ5etYGza2th91bkzx

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\692ddacdef8ed5764ed3a411d6fc5760e51a131e66b8c2455eea52e2d400c3fe.exe
    "C:\Users\Admin\AppData\Local\Temp\692ddacdef8ed5764ed3a411d6fc5760e51a131e66b8c2455eea52e2d400c3fe.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4460
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un735919.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un735919.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4632
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0169.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0169.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2952
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6454.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6454.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3672
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si832947.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si832947.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4148

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si832947.exe

    Filesize

    175KB

    MD5

    1a54fc998bed8f88deb4569924c5e5bc

    SHA1

    30602e11ffecf29125f1f8a4b2727a569b6c33bb

    SHA256

    8d81fd065bc81ed702f003445a154fd20f01d2947ea72266bebc20052095a50b

    SHA512

    5d1be5e107da564d89cce7f2088772fd4e298a7f3c2f406aa058e8971674b86026827056d9a8dfa9a9d3c379468943aed0cc52464d6a176d3b26db25503a4b83

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si832947.exe

    Filesize

    175KB

    MD5

    1a54fc998bed8f88deb4569924c5e5bc

    SHA1

    30602e11ffecf29125f1f8a4b2727a569b6c33bb

    SHA256

    8d81fd065bc81ed702f003445a154fd20f01d2947ea72266bebc20052095a50b

    SHA512

    5d1be5e107da564d89cce7f2088772fd4e298a7f3c2f406aa058e8971674b86026827056d9a8dfa9a9d3c379468943aed0cc52464d6a176d3b26db25503a4b83

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un735919.exe

    Filesize

    553KB

    MD5

    950dac6f48f7b36e22e2951ad806f154

    SHA1

    73363bcebc516ae3f9c97d4d9ef448a8e4fe2969

    SHA256

    b5807d9b21e7c717d49d35fd866f92812e52746c0b966630a69fd625922c69f9

    SHA512

    35ab06fffc0e21aced0024ef4055312588eeded573aae356ae1d845095f52f2b293f5c838227018a133e7c12532daf16d95d67a07bf9826182afaa95fb556b91

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un735919.exe

    Filesize

    553KB

    MD5

    950dac6f48f7b36e22e2951ad806f154

    SHA1

    73363bcebc516ae3f9c97d4d9ef448a8e4fe2969

    SHA256

    b5807d9b21e7c717d49d35fd866f92812e52746c0b966630a69fd625922c69f9

    SHA512

    35ab06fffc0e21aced0024ef4055312588eeded573aae356ae1d845095f52f2b293f5c838227018a133e7c12532daf16d95d67a07bf9826182afaa95fb556b91

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0169.exe

    Filesize

    308KB

    MD5

    be5ae46640a76db92f17a2589bc88efe

    SHA1

    c10c606d66554e1a2ca37156409fbcfc3bfd6e56

    SHA256

    a3b4417c3f7924d23b4c0ef1ae928469645d96c8dfa1c4d5ef50e478e13e1b74

    SHA512

    d7cd6673fe98f3e9937871f03944a1c691dd2f2b2e4bff513ff11253ec47076541555a722a18530543d0fb804e9df018eec062c35d3188107bed7449ef7f43c2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0169.exe

    Filesize

    308KB

    MD5

    be5ae46640a76db92f17a2589bc88efe

    SHA1

    c10c606d66554e1a2ca37156409fbcfc3bfd6e56

    SHA256

    a3b4417c3f7924d23b4c0ef1ae928469645d96c8dfa1c4d5ef50e478e13e1b74

    SHA512

    d7cd6673fe98f3e9937871f03944a1c691dd2f2b2e4bff513ff11253ec47076541555a722a18530543d0fb804e9df018eec062c35d3188107bed7449ef7f43c2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6454.exe

    Filesize

    366KB

    MD5

    ff63faa557b6ad48e9a0048e8a6c39ec

    SHA1

    f65efcbad4911ae75f75f4825a360ed2ff4a996f

    SHA256

    735721c12ddcaa6b7dd6de68e4985e7895f5772a6348c1b21e9d2ba75803a247

    SHA512

    b893e7ce45930b4c8dede8350e141df12583755195c000bf64b3726a0a1657025cb13c60a23ceed5e50634e01918d29cfe9aab3ad7cbef29eaae71acf0ce9be4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6454.exe

    Filesize

    366KB

    MD5

    ff63faa557b6ad48e9a0048e8a6c39ec

    SHA1

    f65efcbad4911ae75f75f4825a360ed2ff4a996f

    SHA256

    735721c12ddcaa6b7dd6de68e4985e7895f5772a6348c1b21e9d2ba75803a247

    SHA512

    b893e7ce45930b4c8dede8350e141df12583755195c000bf64b3726a0a1657025cb13c60a23ceed5e50634e01918d29cfe9aab3ad7cbef29eaae71acf0ce9be4

  • memory/2952-132-0x0000000002220000-0x000000000223A000-memory.dmp

    Filesize

    104KB

  • memory/2952-133-0x0000000004E10000-0x000000000530E000-memory.dmp

    Filesize

    5.0MB

  • memory/2952-134-0x0000000002650000-0x0000000002668000-memory.dmp

    Filesize

    96KB

  • memory/2952-135-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/2952-136-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/2952-138-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/2952-140-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/2952-142-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/2952-144-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/2952-146-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/2952-148-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/2952-150-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/2952-152-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/2952-154-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/2952-156-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/2952-158-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/2952-160-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/2952-162-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/2952-163-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2952-164-0x0000000004E00000-0x0000000004E10000-memory.dmp

    Filesize

    64KB

  • memory/2952-165-0x0000000004E00000-0x0000000004E10000-memory.dmp

    Filesize

    64KB

  • memory/2952-166-0x0000000004E00000-0x0000000004E10000-memory.dmp

    Filesize

    64KB

  • memory/2952-167-0x0000000000400000-0x0000000000710000-memory.dmp

    Filesize

    3.1MB

  • memory/2952-170-0x0000000004E00000-0x0000000004E10000-memory.dmp

    Filesize

    64KB

  • memory/2952-169-0x0000000004E00000-0x0000000004E10000-memory.dmp

    Filesize

    64KB

  • memory/2952-171-0x0000000000400000-0x0000000000710000-memory.dmp

    Filesize

    3.1MB

  • memory/3672-176-0x00000000023E0000-0x0000000002426000-memory.dmp

    Filesize

    280KB

  • memory/3672-177-0x0000000002850000-0x0000000002894000-memory.dmp

    Filesize

    272KB

  • memory/3672-179-0x0000000002850000-0x000000000288F000-memory.dmp

    Filesize

    252KB

  • memory/3672-178-0x0000000002850000-0x000000000288F000-memory.dmp

    Filesize

    252KB

  • memory/3672-181-0x0000000002850000-0x000000000288F000-memory.dmp

    Filesize

    252KB

  • memory/3672-183-0x0000000002850000-0x000000000288F000-memory.dmp

    Filesize

    252KB

  • memory/3672-185-0x0000000002850000-0x000000000288F000-memory.dmp

    Filesize

    252KB

  • memory/3672-187-0x0000000002850000-0x000000000288F000-memory.dmp

    Filesize

    252KB

  • memory/3672-189-0x0000000002850000-0x000000000288F000-memory.dmp

    Filesize

    252KB

  • memory/3672-191-0x0000000002850000-0x000000000288F000-memory.dmp

    Filesize

    252KB

  • memory/3672-193-0x0000000002850000-0x000000000288F000-memory.dmp

    Filesize

    252KB

  • memory/3672-195-0x0000000002850000-0x000000000288F000-memory.dmp

    Filesize

    252KB

  • memory/3672-197-0x0000000002850000-0x000000000288F000-memory.dmp

    Filesize

    252KB

  • memory/3672-199-0x0000000000720000-0x000000000076B000-memory.dmp

    Filesize

    300KB

  • memory/3672-201-0x0000000002850000-0x000000000288F000-memory.dmp

    Filesize

    252KB

  • memory/3672-203-0x0000000004E00000-0x0000000004E10000-memory.dmp

    Filesize

    64KB

  • memory/3672-205-0x0000000004E00000-0x0000000004E10000-memory.dmp

    Filesize

    64KB

  • memory/3672-204-0x0000000002850000-0x000000000288F000-memory.dmp

    Filesize

    252KB

  • memory/3672-200-0x0000000004E00000-0x0000000004E10000-memory.dmp

    Filesize

    64KB

  • memory/3672-207-0x0000000002850000-0x000000000288F000-memory.dmp

    Filesize

    252KB

  • memory/3672-209-0x0000000002850000-0x000000000288F000-memory.dmp

    Filesize

    252KB

  • memory/3672-211-0x0000000002850000-0x000000000288F000-memory.dmp

    Filesize

    252KB

  • memory/3672-213-0x0000000002850000-0x000000000288F000-memory.dmp

    Filesize

    252KB

  • memory/3672-215-0x0000000002850000-0x000000000288F000-memory.dmp

    Filesize

    252KB

  • memory/3672-1088-0x0000000005920000-0x0000000005F26000-memory.dmp

    Filesize

    6.0MB

  • memory/3672-1089-0x0000000005310000-0x000000000541A000-memory.dmp

    Filesize

    1.0MB

  • memory/3672-1090-0x0000000004DD0000-0x0000000004DE2000-memory.dmp

    Filesize

    72KB

  • memory/3672-1091-0x0000000004E00000-0x0000000004E10000-memory.dmp

    Filesize

    64KB

  • memory/3672-1092-0x0000000005420000-0x000000000545E000-memory.dmp

    Filesize

    248KB

  • memory/3672-1093-0x0000000005560000-0x00000000055AB000-memory.dmp

    Filesize

    300KB

  • memory/3672-1095-0x0000000004E00000-0x0000000004E10000-memory.dmp

    Filesize

    64KB

  • memory/3672-1096-0x0000000004E00000-0x0000000004E10000-memory.dmp

    Filesize

    64KB

  • memory/3672-1097-0x0000000004E00000-0x0000000004E10000-memory.dmp

    Filesize

    64KB

  • memory/3672-1098-0x00000000056F0000-0x0000000005756000-memory.dmp

    Filesize

    408KB

  • memory/3672-1099-0x00000000063C0000-0x0000000006452000-memory.dmp

    Filesize

    584KB

  • memory/3672-1100-0x00000000066D0000-0x0000000006746000-memory.dmp

    Filesize

    472KB

  • memory/3672-1101-0x0000000006750000-0x00000000067A0000-memory.dmp

    Filesize

    320KB

  • memory/3672-1102-0x0000000004E00000-0x0000000004E10000-memory.dmp

    Filesize

    64KB

  • memory/3672-1103-0x00000000067E0000-0x00000000069A2000-memory.dmp

    Filesize

    1.8MB

  • memory/3672-1104-0x00000000069B0000-0x0000000006EDC000-memory.dmp

    Filesize

    5.2MB

  • memory/4148-1110-0x0000000000C70000-0x0000000000CA2000-memory.dmp

    Filesize

    200KB

  • memory/4148-1111-0x0000000005520000-0x0000000005530000-memory.dmp

    Filesize

    64KB

  • memory/4148-1112-0x0000000005530000-0x000000000557B000-memory.dmp

    Filesize

    300KB