Analysis

  • max time kernel
    54s
  • max time network
    139s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27/03/2023, 18:18

General

  • Target

    82aa753400cc848e1e54fb31ac05575cc8fd545e0c868dab54a2b5e9ea3332de.exe

  • Size

    699KB

  • MD5

    956dffa28ea0afdb4962172f865636a5

  • SHA1

    29f2bb8ade401443a25ce00f6a3fbfa78de7c753

  • SHA256

    82aa753400cc848e1e54fb31ac05575cc8fd545e0c868dab54a2b5e9ea3332de

  • SHA512

    0a39c812908e5788d7a7fa2dbeeb9ea96291998d9d7c01eb457a53d3b4747ad9b60ccbf6e34998a49e4b0dad1acd597c8b44569fe720409512347b527de8f91d

  • SSDEEP

    12288:DMrdy90riED/+wFRE6jUMX+oEt5rMANwP3SLDDLUrx:qyTED5RhUo+oEt5rMANA3oDUt

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\82aa753400cc848e1e54fb31ac05575cc8fd545e0c868dab54a2b5e9ea3332de.exe
    "C:\Users\Admin\AppData\Local\Temp\82aa753400cc848e1e54fb31ac05575cc8fd545e0c868dab54a2b5e9ea3332de.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4148
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un047234.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un047234.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3596
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4542.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4542.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2344
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3407.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3407.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1472
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si222731.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si222731.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1300

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si222731.exe

    Filesize

    175KB

    MD5

    33669a39d138dcf53f4708e55cdee917

    SHA1

    cb9fcaa056827ecc52397222da4c564ff472a748

    SHA256

    7401cea259cf27d8c575fac50e72dacbfb327b35a7408c37fce6289f4e66a7fa

    SHA512

    ca2f5aff84d1273d3f9610c41868dfa40b91751273561baac08610266ba344292ea017346bfcf0f3b5735757380d0ee91d7b13ab27ec305dd4a7701ca03da944

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si222731.exe

    Filesize

    175KB

    MD5

    33669a39d138dcf53f4708e55cdee917

    SHA1

    cb9fcaa056827ecc52397222da4c564ff472a748

    SHA256

    7401cea259cf27d8c575fac50e72dacbfb327b35a7408c37fce6289f4e66a7fa

    SHA512

    ca2f5aff84d1273d3f9610c41868dfa40b91751273561baac08610266ba344292ea017346bfcf0f3b5735757380d0ee91d7b13ab27ec305dd4a7701ca03da944

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un047234.exe

    Filesize

    557KB

    MD5

    31961e100bceedc055b03f81c18b93b0

    SHA1

    ca72d31fff4f40c630ad0cee95d0cc95c3d83993

    SHA256

    c4655599a27e024ee62216f3de7e42ca155a02185952ed288d10f74197d89f5a

    SHA512

    ae49859e5dd8c0bc41615c5e71e8013f609732eeb6cd6ab7dd39ff67c759496d386f2c3a3f711f121bf73ac758cb3f50b6f0aade56f1ea837b4c361cfade137f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un047234.exe

    Filesize

    557KB

    MD5

    31961e100bceedc055b03f81c18b93b0

    SHA1

    ca72d31fff4f40c630ad0cee95d0cc95c3d83993

    SHA256

    c4655599a27e024ee62216f3de7e42ca155a02185952ed288d10f74197d89f5a

    SHA512

    ae49859e5dd8c0bc41615c5e71e8013f609732eeb6cd6ab7dd39ff67c759496d386f2c3a3f711f121bf73ac758cb3f50b6f0aade56f1ea837b4c361cfade137f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4542.exe

    Filesize

    307KB

    MD5

    cae1cecd8a74ca4d36874211e2d1a5e1

    SHA1

    88d7987a0ffc37f036b764008cbb7cfc305cb9e6

    SHA256

    02422f2bb745cb0e2dc3a48ea1c38ba6248de50eadacca21fb9049f4ca247a26

    SHA512

    eb997210cb4e166a33a5240aad35bbb25768f4c3fe8e80c98e7e329fe6727b8ba375e45b5e7d60b14ace2f7d5ccdf38f03dcaef965561d5224b62d536bb3df97

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4542.exe

    Filesize

    307KB

    MD5

    cae1cecd8a74ca4d36874211e2d1a5e1

    SHA1

    88d7987a0ffc37f036b764008cbb7cfc305cb9e6

    SHA256

    02422f2bb745cb0e2dc3a48ea1c38ba6248de50eadacca21fb9049f4ca247a26

    SHA512

    eb997210cb4e166a33a5240aad35bbb25768f4c3fe8e80c98e7e329fe6727b8ba375e45b5e7d60b14ace2f7d5ccdf38f03dcaef965561d5224b62d536bb3df97

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3407.exe

    Filesize

    366KB

    MD5

    f09d4cd554cb4b8b2aa59099b79114bb

    SHA1

    568a725ed5884850612a1e4f8edcb9c459912dc0

    SHA256

    678fc51f21323f72dcfaabbfa057ba8d63823ae0fd2f4b2d7325169563ce8d25

    SHA512

    2a3a33167d47c61cee8b1ee93d8fa3f8738a91efc086311bcd84096beb4a8488a7e59e2510e6e026c09468ce1277d82c80b7f1c806efdfc2cd0053d88844251d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3407.exe

    Filesize

    366KB

    MD5

    f09d4cd554cb4b8b2aa59099b79114bb

    SHA1

    568a725ed5884850612a1e4f8edcb9c459912dc0

    SHA256

    678fc51f21323f72dcfaabbfa057ba8d63823ae0fd2f4b2d7325169563ce8d25

    SHA512

    2a3a33167d47c61cee8b1ee93d8fa3f8738a91efc086311bcd84096beb4a8488a7e59e2510e6e026c09468ce1277d82c80b7f1c806efdfc2cd0053d88844251d

  • memory/1300-1113-0x0000000004B90000-0x0000000004BA0000-memory.dmp

    Filesize

    64KB

  • memory/1300-1112-0x0000000004B90000-0x0000000004BA0000-memory.dmp

    Filesize

    64KB

  • memory/1300-1111-0x0000000004B30000-0x0000000004B7B000-memory.dmp

    Filesize

    300KB

  • memory/1300-1110-0x00000000002B0000-0x00000000002E2000-memory.dmp

    Filesize

    200KB

  • memory/1472-1088-0x0000000005370000-0x0000000005976000-memory.dmp

    Filesize

    6.0MB

  • memory/1472-1092-0x0000000005CB0000-0x0000000005CFB000-memory.dmp

    Filesize

    300KB

  • memory/1472-1104-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

    Filesize

    64KB

  • memory/1472-1103-0x0000000006AF0000-0x000000000701C000-memory.dmp

    Filesize

    5.2MB

  • memory/1472-1102-0x0000000006910000-0x0000000006AD2000-memory.dmp

    Filesize

    1.8MB

  • memory/1472-1101-0x0000000006760000-0x00000000067B0000-memory.dmp

    Filesize

    320KB

  • memory/1472-1100-0x00000000066E0000-0x0000000006756000-memory.dmp

    Filesize

    472KB

  • memory/1472-1099-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

    Filesize

    64KB

  • memory/1472-1098-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

    Filesize

    64KB

  • memory/1472-1097-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

    Filesize

    64KB

  • memory/1472-1095-0x0000000006500000-0x0000000006592000-memory.dmp

    Filesize

    584KB

  • memory/1472-1094-0x0000000005E40000-0x0000000005EA6000-memory.dmp

    Filesize

    408KB

  • memory/1472-1093-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

    Filesize

    64KB

  • memory/1472-1091-0x0000000005B60000-0x0000000005B9E000-memory.dmp

    Filesize

    248KB

  • memory/1472-1090-0x0000000005B40000-0x0000000005B52000-memory.dmp

    Filesize

    72KB

  • memory/1472-1089-0x0000000005A00000-0x0000000005B0A000-memory.dmp

    Filesize

    1.0MB

  • memory/1472-215-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/1472-213-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/1472-211-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/1472-209-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/1472-207-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/1472-176-0x0000000004B30000-0x0000000004B76000-memory.dmp

    Filesize

    280KB

  • memory/1472-177-0x00000000051F0000-0x0000000005234000-memory.dmp

    Filesize

    272KB

  • memory/1472-178-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/1472-179-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/1472-181-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/1472-183-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/1472-185-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/1472-187-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/1472-189-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/1472-193-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/1472-192-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

    Filesize

    64KB

  • memory/1472-197-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/1472-196-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

    Filesize

    64KB

  • memory/1472-194-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

    Filesize

    64KB

  • memory/1472-191-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/1472-199-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/1472-201-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/1472-203-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/1472-205-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/2344-159-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/2344-133-0x0000000002540000-0x0000000002558000-memory.dmp

    Filesize

    96KB

  • memory/2344-171-0x0000000000400000-0x0000000000710000-memory.dmp

    Filesize

    3.1MB

  • memory/2344-169-0x0000000002530000-0x0000000002540000-memory.dmp

    Filesize

    64KB

  • memory/2344-168-0x0000000002530000-0x0000000002540000-memory.dmp

    Filesize

    64KB

  • memory/2344-137-0x0000000002530000-0x0000000002540000-memory.dmp

    Filesize

    64KB

  • memory/2344-167-0x0000000002530000-0x0000000002540000-memory.dmp

    Filesize

    64KB

  • memory/2344-166-0x0000000000400000-0x0000000000710000-memory.dmp

    Filesize

    3.1MB

  • memory/2344-165-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/2344-141-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/2344-163-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/2344-155-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/2344-139-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/2344-138-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/2344-161-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/2344-153-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/2344-151-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/2344-149-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/2344-147-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/2344-145-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/2344-143-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/2344-136-0x0000000002530000-0x0000000002540000-memory.dmp

    Filesize

    64KB

  • memory/2344-135-0x0000000002530000-0x0000000002540000-memory.dmp

    Filesize

    64KB

  • memory/2344-134-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2344-157-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/2344-132-0x0000000004CC0000-0x00000000051BE000-memory.dmp

    Filesize

    5.0MB

  • memory/2344-131-0x0000000000A80000-0x0000000000A9A000-memory.dmp

    Filesize

    104KB