Analysis

  • max time kernel
    50s
  • max time network
    60s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 19:23

General

  • Target

    55b8f8236d2215682f7579e1fc1bf35bfef9c55bf9aa8fa399e013230a6796bd.exe

  • Size

    695KB

  • MD5

    d3266baa227df1f774ea3a2cc4d305f7

  • SHA1

    d7fa4f459dd002c8f93fd44f14ef73ab0101771b

  • SHA256

    55b8f8236d2215682f7579e1fc1bf35bfef9c55bf9aa8fa399e013230a6796bd

  • SHA512

    a0a98d095e96f9436dfb2625d5be3fe36a7dccf1051b83a60528c8075fc8142d8c66a28ae88c54bc6c04e9e0a42dfbd62eba9d9af5dfb0e5539f0a2d781b2d1d

  • SSDEEP

    12288:sMrjy90TBhWU7JvZpC6EgoXPgt/5T/L6qrxd+Ln/sz+dAJ0yjeOU+h1:fyAhWU8H4tReqrxALc+aCyjiC1

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55b8f8236d2215682f7579e1fc1bf35bfef9c55bf9aa8fa399e013230a6796bd.exe
    "C:\Users\Admin\AppData\Local\Temp\55b8f8236d2215682f7579e1fc1bf35bfef9c55bf9aa8fa399e013230a6796bd.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3588
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un137935.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un137935.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3524
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6947.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6947.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3940
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2109.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2109.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1020
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si084158.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si084158.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1284

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si084158.exe

    Filesize

    175KB

    MD5

    f788cd749f017a94f0f8350407833b89

    SHA1

    e336e454ba53e5e2deaa2e8cdec135b9a85db16c

    SHA256

    f8560d495ddaeec6492e7f8e4f93a87d93720c925547c69630f91f7e64b91fbb

    SHA512

    51784ce50818157e4d170762131164a4226e9dcb1f25d6ddd97ce38fcfdab5787a91309d52c4614af9beef53286cae2d630fee2903add9962aa82f80a3eca441

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si084158.exe

    Filesize

    175KB

    MD5

    f788cd749f017a94f0f8350407833b89

    SHA1

    e336e454ba53e5e2deaa2e8cdec135b9a85db16c

    SHA256

    f8560d495ddaeec6492e7f8e4f93a87d93720c925547c69630f91f7e64b91fbb

    SHA512

    51784ce50818157e4d170762131164a4226e9dcb1f25d6ddd97ce38fcfdab5787a91309d52c4614af9beef53286cae2d630fee2903add9962aa82f80a3eca441

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un137935.exe

    Filesize

    553KB

    MD5

    f89f13b624e13bb3b058d6a561e1c156

    SHA1

    a9676f5eef9318651b4e57e9c65852eea6403e39

    SHA256

    5b7b91b8b1d2b83f35a4ab342bd0e1982db3e7aaabae461f2cdc1911c8427e86

    SHA512

    167fa00b1ddc890ca87d40523c4095412c8056aa315489eaf6a57d52fb28967904365891390cf32dccc9f497ec98b181c89cf050227390479edf328c73ba6c5b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un137935.exe

    Filesize

    553KB

    MD5

    f89f13b624e13bb3b058d6a561e1c156

    SHA1

    a9676f5eef9318651b4e57e9c65852eea6403e39

    SHA256

    5b7b91b8b1d2b83f35a4ab342bd0e1982db3e7aaabae461f2cdc1911c8427e86

    SHA512

    167fa00b1ddc890ca87d40523c4095412c8056aa315489eaf6a57d52fb28967904365891390cf32dccc9f497ec98b181c89cf050227390479edf328c73ba6c5b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6947.exe

    Filesize

    308KB

    MD5

    e564cf29795bb360e8bfbcc5432b756f

    SHA1

    177caa720a20d2e4820be97d9c5b7fd7a6fddcb4

    SHA256

    4314c286f8bf8c849cf0f9bc5bb38f0e990d2a940ba3ed1e0371cc7db8fd3472

    SHA512

    b3b171f10bc6f6bedcc54476f6845cdcc37ea1d7437e0ab8b4ff3e2894b642c960804908baf247289c920348e6acfda56b9cccdcdcdf865323236fff009aa46a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6947.exe

    Filesize

    308KB

    MD5

    e564cf29795bb360e8bfbcc5432b756f

    SHA1

    177caa720a20d2e4820be97d9c5b7fd7a6fddcb4

    SHA256

    4314c286f8bf8c849cf0f9bc5bb38f0e990d2a940ba3ed1e0371cc7db8fd3472

    SHA512

    b3b171f10bc6f6bedcc54476f6845cdcc37ea1d7437e0ab8b4ff3e2894b642c960804908baf247289c920348e6acfda56b9cccdcdcdf865323236fff009aa46a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2109.exe

    Filesize

    366KB

    MD5

    8f6c0fdbc430dc80d580a1119eaf4308

    SHA1

    84417c933973688e0f7a4abe30c3a94bddeb6916

    SHA256

    680764573646c4698d6a1d96557c382d8a56b99e91528b3203639e842719142b

    SHA512

    4691a9493fce60055905031fd1be351d7554cdd3c4a262bd8b696f1e7fad4bcb15660aec27b612e25ea5a130bc994f66afc2157549914b62d6eb7d21638a4b3a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2109.exe

    Filesize

    366KB

    MD5

    8f6c0fdbc430dc80d580a1119eaf4308

    SHA1

    84417c933973688e0f7a4abe30c3a94bddeb6916

    SHA256

    680764573646c4698d6a1d96557c382d8a56b99e91528b3203639e842719142b

    SHA512

    4691a9493fce60055905031fd1be351d7554cdd3c4a262bd8b696f1e7fad4bcb15660aec27b612e25ea5a130bc994f66afc2157549914b62d6eb7d21638a4b3a

  • memory/1020-1091-0x0000000005A80000-0x0000000005B8A000-memory.dmp

    Filesize

    1.0MB

  • memory/1020-1092-0x0000000004E10000-0x0000000004E22000-memory.dmp

    Filesize

    72KB

  • memory/1020-211-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/1020-209-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/1020-207-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/1020-197-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/1020-195-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/1020-1106-0x0000000006AF0000-0x000000000701C000-memory.dmp

    Filesize

    5.2MB

  • memory/1020-1105-0x0000000006920000-0x0000000006AE2000-memory.dmp

    Filesize

    1.8MB

  • memory/1020-199-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/1020-1104-0x00000000067B0000-0x0000000006800000-memory.dmp

    Filesize

    320KB

  • memory/1020-1103-0x0000000006730000-0x00000000067A6000-memory.dmp

    Filesize

    472KB

  • memory/1020-1102-0x0000000004E60000-0x0000000004E70000-memory.dmp

    Filesize

    64KB

  • memory/1020-1101-0x0000000004E60000-0x0000000004E70000-memory.dmp

    Filesize

    64KB

  • memory/1020-1100-0x0000000004E60000-0x0000000004E70000-memory.dmp

    Filesize

    64KB

  • memory/1020-1099-0x0000000004E60000-0x0000000004E70000-memory.dmp

    Filesize

    64KB

  • memory/1020-1098-0x00000000063E0000-0x0000000006472000-memory.dmp

    Filesize

    584KB

  • memory/1020-1096-0x0000000005E40000-0x0000000005EA6000-memory.dmp

    Filesize

    408KB

  • memory/1020-1095-0x0000000005CD0000-0x0000000005D1B000-memory.dmp

    Filesize

    300KB

  • memory/1020-1094-0x0000000005B90000-0x0000000005BCE000-memory.dmp

    Filesize

    248KB

  • memory/1020-1093-0x0000000004E60000-0x0000000004E70000-memory.dmp

    Filesize

    64KB

  • memory/1020-213-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/1020-1090-0x0000000005470000-0x0000000005A76000-memory.dmp

    Filesize

    6.0MB

  • memory/1020-286-0x0000000004E60000-0x0000000004E70000-memory.dmp

    Filesize

    64KB

  • memory/1020-178-0x0000000004C70000-0x0000000004CB6000-memory.dmp

    Filesize

    280KB

  • memory/1020-179-0x0000000004CF0000-0x0000000004D34000-memory.dmp

    Filesize

    272KB

  • memory/1020-181-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/1020-183-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/1020-180-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/1020-185-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/1020-187-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/1020-189-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/1020-191-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/1020-193-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/1020-287-0x0000000004E60000-0x0000000004E70000-memory.dmp

    Filesize

    64KB

  • memory/1020-283-0x0000000004E60000-0x0000000004E70000-memory.dmp

    Filesize

    64KB

  • memory/1020-282-0x0000000000720000-0x000000000076B000-memory.dmp

    Filesize

    300KB

  • memory/1020-201-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/1020-203-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/1020-205-0x0000000004CF0000-0x0000000004D2F000-memory.dmp

    Filesize

    252KB

  • memory/1284-1112-0x00000000005A0000-0x00000000005D2000-memory.dmp

    Filesize

    200KB

  • memory/1284-1113-0x0000000004FE0000-0x000000000502B000-memory.dmp

    Filesize

    300KB

  • memory/1284-1114-0x0000000005170000-0x0000000005180000-memory.dmp

    Filesize

    64KB

  • memory/3940-169-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/3940-153-0x0000000004C60000-0x0000000004C72000-memory.dmp

    Filesize

    72KB

  • memory/3940-145-0x0000000004C60000-0x0000000004C72000-memory.dmp

    Filesize

    72KB

  • memory/3940-134-0x0000000002370000-0x000000000238A000-memory.dmp

    Filesize

    104KB

  • memory/3940-137-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/3940-138-0x0000000004D70000-0x000000000526E000-memory.dmp

    Filesize

    5.0MB

  • memory/3940-136-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/3940-173-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/3940-171-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/3940-170-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/3940-139-0x0000000004C60000-0x0000000004C78000-memory.dmp

    Filesize

    96KB

  • memory/3940-168-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/3940-167-0x0000000004C60000-0x0000000004C72000-memory.dmp

    Filesize

    72KB

  • memory/3940-165-0x0000000004C60000-0x0000000004C72000-memory.dmp

    Filesize

    72KB

  • memory/3940-163-0x0000000004C60000-0x0000000004C72000-memory.dmp

    Filesize

    72KB

  • memory/3940-161-0x0000000004C60000-0x0000000004C72000-memory.dmp

    Filesize

    72KB

  • memory/3940-159-0x0000000004C60000-0x0000000004C72000-memory.dmp

    Filesize

    72KB

  • memory/3940-157-0x0000000004C60000-0x0000000004C72000-memory.dmp

    Filesize

    72KB

  • memory/3940-155-0x0000000004C60000-0x0000000004C72000-memory.dmp

    Filesize

    72KB

  • memory/3940-151-0x0000000004C60000-0x0000000004C72000-memory.dmp

    Filesize

    72KB

  • memory/3940-149-0x0000000004C60000-0x0000000004C72000-memory.dmp

    Filesize

    72KB

  • memory/3940-135-0x00000000007E0000-0x000000000080D000-memory.dmp

    Filesize

    180KB

  • memory/3940-147-0x0000000004C60000-0x0000000004C72000-memory.dmp

    Filesize

    72KB

  • memory/3940-143-0x0000000004C60000-0x0000000004C72000-memory.dmp

    Filesize

    72KB

  • memory/3940-141-0x0000000004C60000-0x0000000004C72000-memory.dmp

    Filesize

    72KB

  • memory/3940-140-0x0000000004C60000-0x0000000004C72000-memory.dmp

    Filesize

    72KB