Analysis

  • max time kernel
    56s
  • max time network
    73s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 18:13

General

  • Target

    1a55ceebc680ab1962a8ebc20831cd5a6ab90c20da2b79518995a0285fb48b89.exe

  • Size

    699KB

  • MD5

    50cbafa870911ea0a75cb9a2d38db6d6

  • SHA1

    aaf59edd1911ed2628d6db4cb44faea4a50d88e8

  • SHA256

    1a55ceebc680ab1962a8ebc20831cd5a6ab90c20da2b79518995a0285fb48b89

  • SHA512

    eec683c180de96e41eb07d7bc897c2b2f4dec3c645cbfeb21df46ed1c89c040737370b1117a924193ce8948f5e89136d3cc35dc326651f2f8c58df0fcff59588

  • SSDEEP

    12288:PMrLy90SUmo2UsQJicBUOyre0suO6ekI4btrMYNwPSmL+r2Z0qKsrfCdbsWC:MyJSsQ4O1Vu3ldbtrMYNASU9KsIxC

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a55ceebc680ab1962a8ebc20831cd5a6ab90c20da2b79518995a0285fb48b89.exe
    "C:\Users\Admin\AppData\Local\Temp\1a55ceebc680ab1962a8ebc20831cd5a6ab90c20da2b79518995a0285fb48b89.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un463265.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un463265.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5032
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3295.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3295.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2080
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5890.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5890.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3812
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si658230.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si658230.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3052

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si658230.exe

    Filesize

    175KB

    MD5

    50c9507f225b00c4550706a29afd9d85

    SHA1

    808ba3e1ca7e6cbaebcdb4b40495c14f90ebc324

    SHA256

    f9797252135fa58da2396cd9cd0d2451e6abea8ac0b9ff8bff886af4e290aa29

    SHA512

    9183b995983e77f560fb24158135981287ed1492ad8ef2d21246db0207106322b7d0a37d085f1375bbabdf0112e40c7bdbab01020bb33f2615a2b8e89591c7c9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si658230.exe

    Filesize

    175KB

    MD5

    50c9507f225b00c4550706a29afd9d85

    SHA1

    808ba3e1ca7e6cbaebcdb4b40495c14f90ebc324

    SHA256

    f9797252135fa58da2396cd9cd0d2451e6abea8ac0b9ff8bff886af4e290aa29

    SHA512

    9183b995983e77f560fb24158135981287ed1492ad8ef2d21246db0207106322b7d0a37d085f1375bbabdf0112e40c7bdbab01020bb33f2615a2b8e89591c7c9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un463265.exe

    Filesize

    557KB

    MD5

    733166228e9dddb7f7f3170cdf2d8f96

    SHA1

    395d35345a99618049b661b1169b84debf96ee0e

    SHA256

    b28109ab5396494418dc5f2cc3b3f162e645929fccacdc6f14fc24ad8f2a1a63

    SHA512

    01bea7b9e48b53817c4fdc3ec22434cd3a4fe33b7d61a1d812dbea9405f6b5308998c46636fbcc254129778ca8732a1e7549ae7972db161a1cc0314db0987920

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un463265.exe

    Filesize

    557KB

    MD5

    733166228e9dddb7f7f3170cdf2d8f96

    SHA1

    395d35345a99618049b661b1169b84debf96ee0e

    SHA256

    b28109ab5396494418dc5f2cc3b3f162e645929fccacdc6f14fc24ad8f2a1a63

    SHA512

    01bea7b9e48b53817c4fdc3ec22434cd3a4fe33b7d61a1d812dbea9405f6b5308998c46636fbcc254129778ca8732a1e7549ae7972db161a1cc0314db0987920

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3295.exe

    Filesize

    307KB

    MD5

    4fa00e47c7079de6b0213361530b87a4

    SHA1

    29cbef824e4c36fcb6420321d0cd73348f55aad9

    SHA256

    f679384aaeb01f2c38ff63fa2cee9b2acfc9ac1c3a60819980ed33bf6c356b0e

    SHA512

    f96d40171d6fe89fa32d8ffa65a22799a19daecbc6cb37d7ba9d389ba13b9fae8d89f11dd2ce4f639b6d568ef43af5d55cda33e1802b448f2f3047bc169decdc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3295.exe

    Filesize

    307KB

    MD5

    4fa00e47c7079de6b0213361530b87a4

    SHA1

    29cbef824e4c36fcb6420321d0cd73348f55aad9

    SHA256

    f679384aaeb01f2c38ff63fa2cee9b2acfc9ac1c3a60819980ed33bf6c356b0e

    SHA512

    f96d40171d6fe89fa32d8ffa65a22799a19daecbc6cb37d7ba9d389ba13b9fae8d89f11dd2ce4f639b6d568ef43af5d55cda33e1802b448f2f3047bc169decdc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5890.exe

    Filesize

    366KB

    MD5

    d56cf13caa4575396b6a8e0efecc11af

    SHA1

    a5f3fde4d470c620810d889df0d1fd3a97f494b3

    SHA256

    be2ddbbc4642e79bcff546eaedf137fb99606ff5b4c303e0bdabf447c4b7a429

    SHA512

    d030198ff45a6c7a90fd569a6dc65b63bdf9299ab924f8c83ca6502ab1350f54dac28f4308fefb2edd761c2834976d09f3ca471b809a6b5992f236fac5b5684d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5890.exe

    Filesize

    366KB

    MD5

    d56cf13caa4575396b6a8e0efecc11af

    SHA1

    a5f3fde4d470c620810d889df0d1fd3a97f494b3

    SHA256

    be2ddbbc4642e79bcff546eaedf137fb99606ff5b4c303e0bdabf447c4b7a429

    SHA512

    d030198ff45a6c7a90fd569a6dc65b63bdf9299ab924f8c83ca6502ab1350f54dac28f4308fefb2edd761c2834976d09f3ca471b809a6b5992f236fac5b5684d

  • memory/2080-144-0x00000000027E0000-0x00000000027F2000-memory.dmp

    Filesize

    72KB

  • memory/2080-154-0x00000000027E0000-0x00000000027F2000-memory.dmp

    Filesize

    72KB

  • memory/2080-134-0x00000000027E0000-0x00000000027F8000-memory.dmp

    Filesize

    96KB

  • memory/2080-135-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2080-136-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/2080-137-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/2080-138-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/2080-139-0x00000000027E0000-0x00000000027F2000-memory.dmp

    Filesize

    72KB

  • memory/2080-140-0x00000000027E0000-0x00000000027F2000-memory.dmp

    Filesize

    72KB

  • memory/2080-142-0x00000000027E0000-0x00000000027F2000-memory.dmp

    Filesize

    72KB

  • memory/2080-132-0x0000000002520000-0x000000000253A000-memory.dmp

    Filesize

    104KB

  • memory/2080-146-0x00000000027E0000-0x00000000027F2000-memory.dmp

    Filesize

    72KB

  • memory/2080-148-0x00000000027E0000-0x00000000027F2000-memory.dmp

    Filesize

    72KB

  • memory/2080-150-0x00000000027E0000-0x00000000027F2000-memory.dmp

    Filesize

    72KB

  • memory/2080-152-0x00000000027E0000-0x00000000027F2000-memory.dmp

    Filesize

    72KB

  • memory/2080-133-0x0000000004E60000-0x000000000535E000-memory.dmp

    Filesize

    5.0MB

  • memory/2080-156-0x00000000027E0000-0x00000000027F2000-memory.dmp

    Filesize

    72KB

  • memory/2080-158-0x00000000027E0000-0x00000000027F2000-memory.dmp

    Filesize

    72KB

  • memory/2080-160-0x00000000027E0000-0x00000000027F2000-memory.dmp

    Filesize

    72KB

  • memory/2080-162-0x00000000027E0000-0x00000000027F2000-memory.dmp

    Filesize

    72KB

  • memory/2080-164-0x00000000027E0000-0x00000000027F2000-memory.dmp

    Filesize

    72KB

  • memory/2080-166-0x00000000027E0000-0x00000000027F2000-memory.dmp

    Filesize

    72KB

  • memory/2080-167-0x0000000000400000-0x0000000000710000-memory.dmp

    Filesize

    3.1MB

  • memory/2080-168-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/2080-169-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/2080-170-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/2080-172-0x0000000000400000-0x0000000000710000-memory.dmp

    Filesize

    3.1MB

  • memory/3052-1111-0x0000000000FE0000-0x0000000001012000-memory.dmp

    Filesize

    200KB

  • memory/3052-1114-0x0000000005B90000-0x0000000005BA0000-memory.dmp

    Filesize

    64KB

  • memory/3052-1113-0x0000000005B90000-0x0000000005BA0000-memory.dmp

    Filesize

    64KB

  • memory/3052-1112-0x0000000005A20000-0x0000000005A6B000-memory.dmp

    Filesize

    300KB

  • memory/3812-180-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

    Filesize

    252KB

  • memory/3812-470-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/3812-200-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

    Filesize

    252KB

  • memory/3812-212-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

    Filesize

    252KB

  • memory/3812-210-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

    Filesize

    252KB

  • memory/3812-208-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

    Filesize

    252KB

  • memory/3812-206-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

    Filesize

    252KB

  • memory/3812-204-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

    Filesize

    252KB

  • memory/3812-202-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

    Filesize

    252KB

  • memory/3812-198-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

    Filesize

    252KB

  • memory/3812-196-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

    Filesize

    252KB

  • memory/3812-192-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

    Filesize

    252KB

  • memory/3812-190-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

    Filesize

    252KB

  • memory/3812-188-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

    Filesize

    252KB

  • memory/3812-186-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

    Filesize

    252KB

  • memory/3812-184-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

    Filesize

    252KB

  • memory/3812-182-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

    Filesize

    252KB

  • memory/3812-466-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/3812-464-0x0000000000890000-0x00000000008DB000-memory.dmp

    Filesize

    300KB

  • memory/3812-194-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

    Filesize

    252KB

  • memory/3812-468-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/3812-1089-0x00000000059A0000-0x0000000005FA6000-memory.dmp

    Filesize

    6.0MB

  • memory/3812-1090-0x00000000053F0000-0x00000000054FA000-memory.dmp

    Filesize

    1.0MB

  • memory/3812-1091-0x0000000005530000-0x0000000005542000-memory.dmp

    Filesize

    72KB

  • memory/3812-1092-0x0000000005550000-0x000000000558E000-memory.dmp

    Filesize

    248KB

  • memory/3812-1093-0x00000000056A0000-0x00000000056EB000-memory.dmp

    Filesize

    300KB

  • memory/3812-1094-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/3812-1095-0x0000000005830000-0x0000000005896000-memory.dmp

    Filesize

    408KB

  • memory/3812-1096-0x0000000006500000-0x0000000006592000-memory.dmp

    Filesize

    584KB

  • memory/3812-1097-0x00000000065F0000-0x00000000067B2000-memory.dmp

    Filesize

    1.8MB

  • memory/3812-1098-0x00000000067C0000-0x0000000006CEC000-memory.dmp

    Filesize

    5.2MB

  • memory/3812-1100-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/3812-1101-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/3812-1102-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/3812-179-0x0000000004CC0000-0x0000000004CFF000-memory.dmp

    Filesize

    252KB

  • memory/3812-178-0x0000000004CC0000-0x0000000004D04000-memory.dmp

    Filesize

    272KB

  • memory/3812-177-0x00000000028E0000-0x0000000002926000-memory.dmp

    Filesize

    280KB

  • memory/3812-1103-0x0000000007060000-0x00000000070D6000-memory.dmp

    Filesize

    472KB

  • memory/3812-1104-0x00000000070E0000-0x0000000007130000-memory.dmp

    Filesize

    320KB

  • memory/3812-1105-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB