Analysis

  • max time kernel
    52s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 18:11

General

  • Target

    e289012b84f755ea827cb29ae2e9951643c09f06f0f33a2ae8abcf29d3459d69.exe

  • Size

    700KB

  • MD5

    41acc3686738265f33c685e6108e42bc

  • SHA1

    d06788b1e8295dd5594ecad9cfadd2d2f1c0a4ae

  • SHA256

    e289012b84f755ea827cb29ae2e9951643c09f06f0f33a2ae8abcf29d3459d69

  • SHA512

    9d48227af7e3d56e284f3e4a925bdeb2aaf7e8fb9479ce68d5f719551af78df3bc8ce2440bfa84dfb5960076993b55fe02e698bab5b22cb240d59a140e129f48

  • SSDEEP

    12288:4Mr7y90xauQ/EkVBJkiwRyZ/K1hqeCW6KHnNwPVCLpMFF4Jxk3uTaiVL:DynJEmXfwAZ/K1DHnNAV4pMFF4JoCPN

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e289012b84f755ea827cb29ae2e9951643c09f06f0f33a2ae8abcf29d3459d69.exe
    "C:\Users\Admin\AppData\Local\Temp\e289012b84f755ea827cb29ae2e9951643c09f06f0f33a2ae8abcf29d3459d69.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3628
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un097788.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un097788.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4300
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2174.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2174.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4624
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6315.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6315.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3616
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si599660.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si599660.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4532

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si599660.exe

    Filesize

    175KB

    MD5

    6ad9fa7b49b3b130697e866532d86b2b

    SHA1

    48ef54a6b6f9657f313ea90cb199f774f3c44136

    SHA256

    71beece728fdc39c03dca4dd84d30ffe229ca171a66a76dd2452a6ce9434054a

    SHA512

    d8948ba80aa49c5c7a5e6a03dd3721f5055b0cfacc321a35e898602670565047ab746045ea07732d698d841eec9cc70eb97914f00ca301eda3191581054fb396

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si599660.exe

    Filesize

    175KB

    MD5

    6ad9fa7b49b3b130697e866532d86b2b

    SHA1

    48ef54a6b6f9657f313ea90cb199f774f3c44136

    SHA256

    71beece728fdc39c03dca4dd84d30ffe229ca171a66a76dd2452a6ce9434054a

    SHA512

    d8948ba80aa49c5c7a5e6a03dd3721f5055b0cfacc321a35e898602670565047ab746045ea07732d698d841eec9cc70eb97914f00ca301eda3191581054fb396

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un097788.exe

    Filesize

    558KB

    MD5

    0889e8610b0de69e17447748591124ce

    SHA1

    caa2176828f6ce4096917c39b3a76746bf3c6f59

    SHA256

    5a0ed8cf3a38efb4129878831995cadde0f315be2ca641442616574b145192f6

    SHA512

    f8ed9fbdb976e88a2a95c64e951ef1392a1bdc3f852e02f5d6b4af138171937dfd1b205d3e4d94d520c2ee3556f0ebb49b30fa980e0b49531cdb123a3c9970e9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un097788.exe

    Filesize

    558KB

    MD5

    0889e8610b0de69e17447748591124ce

    SHA1

    caa2176828f6ce4096917c39b3a76746bf3c6f59

    SHA256

    5a0ed8cf3a38efb4129878831995cadde0f315be2ca641442616574b145192f6

    SHA512

    f8ed9fbdb976e88a2a95c64e951ef1392a1bdc3f852e02f5d6b4af138171937dfd1b205d3e4d94d520c2ee3556f0ebb49b30fa980e0b49531cdb123a3c9970e9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2174.exe

    Filesize

    307KB

    MD5

    14f93888b1b2a8e6cab73a4f34a35433

    SHA1

    9853496bb6bdd1683d461bb49fa207a6d4e346e0

    SHA256

    d04c31afdabf41216b7f9f675825deeaa580c40c96eb297ee9ca6a35cb8b218e

    SHA512

    1ce390236dff49074853554d84ce38cb8348ccf164b7faec75ee2b41b665c59d336c2649a5111df9f37f75ca12653ff871b350a52e717110cc4bd7f02ffdd2f0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2174.exe

    Filesize

    307KB

    MD5

    14f93888b1b2a8e6cab73a4f34a35433

    SHA1

    9853496bb6bdd1683d461bb49fa207a6d4e346e0

    SHA256

    d04c31afdabf41216b7f9f675825deeaa580c40c96eb297ee9ca6a35cb8b218e

    SHA512

    1ce390236dff49074853554d84ce38cb8348ccf164b7faec75ee2b41b665c59d336c2649a5111df9f37f75ca12653ff871b350a52e717110cc4bd7f02ffdd2f0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6315.exe

    Filesize

    366KB

    MD5

    5da169740e275c171adb5e35f6d3df3d

    SHA1

    2daa25d55c838916018245fe3e98864d8e0ab1e5

    SHA256

    57d4fd15c40963dc5c23ae21dcc8d1714dd8775ed32ec4e8eaa75086d8c5e128

    SHA512

    1d7fb17b34a6cc289141dd2d7614702f035b2da14f81e20d46c2cc70764cca38944e5c8f6f241351299bcc3882d84ca476220fe79c4853f562eab74ebfb28e6f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6315.exe

    Filesize

    366KB

    MD5

    5da169740e275c171adb5e35f6d3df3d

    SHA1

    2daa25d55c838916018245fe3e98864d8e0ab1e5

    SHA256

    57d4fd15c40963dc5c23ae21dcc8d1714dd8775ed32ec4e8eaa75086d8c5e128

    SHA512

    1d7fb17b34a6cc289141dd2d7614702f035b2da14f81e20d46c2cc70764cca38944e5c8f6f241351299bcc3882d84ca476220fe79c4853f562eab74ebfb28e6f

  • memory/3616-1092-0x00000000058B0000-0x0000000005EB6000-memory.dmp

    Filesize

    6.0MB

  • memory/3616-1093-0x00000000052B0000-0x00000000053BA000-memory.dmp

    Filesize

    1.0MB

  • memory/3616-207-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3616-205-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3616-203-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3616-195-0x0000000004D90000-0x0000000004DA0000-memory.dmp

    Filesize

    64KB

  • memory/3616-1108-0x0000000004D90000-0x0000000004DA0000-memory.dmp

    Filesize

    64KB

  • memory/3616-1107-0x0000000006FA0000-0x0000000006FF0000-memory.dmp

    Filesize

    320KB

  • memory/3616-1106-0x0000000006F20000-0x0000000006F96000-memory.dmp

    Filesize

    472KB

  • memory/3616-1105-0x0000000004D90000-0x0000000004DA0000-memory.dmp

    Filesize

    64KB

  • memory/3616-194-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3616-1104-0x0000000004D90000-0x0000000004DA0000-memory.dmp

    Filesize

    64KB

  • memory/3616-1103-0x0000000004D90000-0x0000000004DA0000-memory.dmp

    Filesize

    64KB

  • memory/3616-1101-0x0000000006690000-0x0000000006BBC000-memory.dmp

    Filesize

    5.2MB

  • memory/3616-1100-0x00000000064C0000-0x0000000006682000-memory.dmp

    Filesize

    1.8MB

  • memory/3616-1099-0x00000000063C0000-0x0000000006452000-memory.dmp

    Filesize

    584KB

  • memory/3616-1098-0x00000000056F0000-0x0000000005756000-memory.dmp

    Filesize

    408KB

  • memory/3616-1097-0x0000000004D90000-0x0000000004DA0000-memory.dmp

    Filesize

    64KB

  • memory/3616-1096-0x0000000005560000-0x00000000055AB000-memory.dmp

    Filesize

    300KB

  • memory/3616-1095-0x0000000005410000-0x000000000544E000-memory.dmp

    Filesize

    248KB

  • memory/3616-1094-0x00000000053F0000-0x0000000005402000-memory.dmp

    Filesize

    72KB

  • memory/3616-209-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3616-219-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3616-217-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3616-215-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3616-180-0x0000000004C60000-0x0000000004CA6000-memory.dmp

    Filesize

    280KB

  • memory/3616-181-0x0000000004CE0000-0x0000000004D24000-memory.dmp

    Filesize

    272KB

  • memory/3616-183-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3616-182-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3616-193-0x0000000004D90000-0x0000000004DA0000-memory.dmp

    Filesize

    64KB

  • memory/3616-187-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3616-189-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/3616-191-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3616-190-0x0000000004D90000-0x0000000004DA0000-memory.dmp

    Filesize

    64KB

  • memory/3616-185-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3616-213-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3616-211-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3616-197-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3616-199-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/3616-201-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/4532-1114-0x0000000000A40000-0x0000000000A72000-memory.dmp

    Filesize

    200KB

  • memory/4532-1115-0x00000000054B0000-0x00000000054FB000-memory.dmp

    Filesize

    300KB

  • memory/4532-1116-0x00000000052F0000-0x0000000005300000-memory.dmp

    Filesize

    64KB

  • memory/4624-170-0x0000000000400000-0x0000000000710000-memory.dmp

    Filesize

    3.1MB

  • memory/4624-155-0x00000000027D0000-0x00000000027E2000-memory.dmp

    Filesize

    72KB

  • memory/4624-145-0x00000000027D0000-0x00000000027E2000-memory.dmp

    Filesize

    72KB

  • memory/4624-138-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4624-139-0x0000000002840000-0x0000000002850000-memory.dmp

    Filesize

    64KB

  • memory/4624-175-0x0000000000400000-0x0000000000710000-memory.dmp

    Filesize

    3.1MB

  • memory/4624-137-0x00000000027D0000-0x00000000027E8000-memory.dmp

    Filesize

    96KB

  • memory/4624-173-0x0000000002840000-0x0000000002850000-memory.dmp

    Filesize

    64KB

  • memory/4624-172-0x0000000002840000-0x0000000002850000-memory.dmp

    Filesize

    64KB

  • memory/4624-171-0x0000000002840000-0x0000000002850000-memory.dmp

    Filesize

    64KB

  • memory/4624-140-0x0000000002840000-0x0000000002850000-memory.dmp

    Filesize

    64KB

  • memory/4624-169-0x00000000027D0000-0x00000000027E2000-memory.dmp

    Filesize

    72KB

  • memory/4624-167-0x00000000027D0000-0x00000000027E2000-memory.dmp

    Filesize

    72KB

  • memory/4624-165-0x00000000027D0000-0x00000000027E2000-memory.dmp

    Filesize

    72KB

  • memory/4624-163-0x00000000027D0000-0x00000000027E2000-memory.dmp

    Filesize

    72KB

  • memory/4624-161-0x00000000027D0000-0x00000000027E2000-memory.dmp

    Filesize

    72KB

  • memory/4624-159-0x00000000027D0000-0x00000000027E2000-memory.dmp

    Filesize

    72KB

  • memory/4624-157-0x00000000027D0000-0x00000000027E2000-memory.dmp

    Filesize

    72KB

  • memory/4624-153-0x00000000027D0000-0x00000000027E2000-memory.dmp

    Filesize

    72KB

  • memory/4624-151-0x00000000027D0000-0x00000000027E2000-memory.dmp

    Filesize

    72KB

  • memory/4624-149-0x00000000027D0000-0x00000000027E2000-memory.dmp

    Filesize

    72KB

  • memory/4624-147-0x00000000027D0000-0x00000000027E2000-memory.dmp

    Filesize

    72KB

  • memory/4624-136-0x0000000004DB0000-0x00000000052AE000-memory.dmp

    Filesize

    5.0MB

  • memory/4624-135-0x00000000022D0000-0x00000000022EA000-memory.dmp

    Filesize

    104KB

  • memory/4624-143-0x00000000027D0000-0x00000000027E2000-memory.dmp

    Filesize

    72KB

  • memory/4624-142-0x00000000027D0000-0x00000000027E2000-memory.dmp

    Filesize

    72KB

  • memory/4624-141-0x0000000002840000-0x0000000002850000-memory.dmp

    Filesize

    64KB