Analysis

  • max time kernel
    63s
  • max time network
    72s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 19:27

General

  • Target

    881f033d98adb99c2b84e343377ca680816a0c99b293a6a7c02a5814f320b310.exe

  • Size

    695KB

  • MD5

    6e3ef26458ed7619e05a2ee72800daa6

  • SHA1

    da7136d24433eee722ad2a324280f7e0be65bc6c

  • SHA256

    881f033d98adb99c2b84e343377ca680816a0c99b293a6a7c02a5814f320b310

  • SHA512

    e42a7d3cdbdad43c440992959bc1c5895fa03eb83ab5b27ee098481b9a6e8fe79663061902b4e11a12fc55a6eb41c14e35cc7afab95ff87f8a2a8d8cf2419909

  • SSDEEP

    12288:lMrty90hnniQ7ijYUPTzv3hFvTCXj/sXJ8J+4z8GGJVIqKdicFJe0HB+:wygnRUHjTCXoXJ1g89nIVdFFs0Y

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\881f033d98adb99c2b84e343377ca680816a0c99b293a6a7c02a5814f320b310.exe
    "C:\Users\Admin\AppData\Local\Temp\881f033d98adb99c2b84e343377ca680816a0c99b293a6a7c02a5814f320b310.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5040
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un105913.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un105913.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9246.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9246.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4576
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9006.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9006.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4312
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si190904.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si190904.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3240

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si190904.exe

    Filesize

    175KB

    MD5

    b7c133f20e2f21f24dc4cb92406bd28d

    SHA1

    0967e7a8ebfc28307b786ca572a716c378e1de9b

    SHA256

    be3d07674d357b3b0334c361f3ea6410e14a273fe7c014e37cfab54dc58897a1

    SHA512

    06db6056476f3d9c9c9703185b866edc0dae4d26c965efe9dc8ea634d4e40872841e434cc39f373fa1d08c22fd257c19c237aa780f68343aa737217e5e99f4f6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si190904.exe

    Filesize

    175KB

    MD5

    b7c133f20e2f21f24dc4cb92406bd28d

    SHA1

    0967e7a8ebfc28307b786ca572a716c378e1de9b

    SHA256

    be3d07674d357b3b0334c361f3ea6410e14a273fe7c014e37cfab54dc58897a1

    SHA512

    06db6056476f3d9c9c9703185b866edc0dae4d26c965efe9dc8ea634d4e40872841e434cc39f373fa1d08c22fd257c19c237aa780f68343aa737217e5e99f4f6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un105913.exe

    Filesize

    553KB

    MD5

    4f6b7b33d478b0c3e1d1fd5af40bfcc5

    SHA1

    8caa3172f6879902cd83834fa05a1461cf328a42

    SHA256

    7e373aa32739bfdb73b35187ed645ff14241b3fc38a77be896d86297556b4bad

    SHA512

    7671f28fb17b9a0a2c13385d0051097ef81c4e39035afc11f55477a97dae8ecdfe8417258590d457db5e185174f4176df621c5210166d5e002b87a69fb050772

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un105913.exe

    Filesize

    553KB

    MD5

    4f6b7b33d478b0c3e1d1fd5af40bfcc5

    SHA1

    8caa3172f6879902cd83834fa05a1461cf328a42

    SHA256

    7e373aa32739bfdb73b35187ed645ff14241b3fc38a77be896d86297556b4bad

    SHA512

    7671f28fb17b9a0a2c13385d0051097ef81c4e39035afc11f55477a97dae8ecdfe8417258590d457db5e185174f4176df621c5210166d5e002b87a69fb050772

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9246.exe

    Filesize

    308KB

    MD5

    2f932566273cf8ee86eb74b2b8c0244e

    SHA1

    fabedc1fc0e8b60b78ce6b6abe3939141737146b

    SHA256

    06b1bc474ebef283320c75daa243b5e7f0ff73a698984d695e6cb84513d41787

    SHA512

    9f1632625be332e4c1deff7b4c887d6edf5da79b446ad83d09fbddae155a0226506c73fc916dff18daae0156e527ce3941fa3ccd3e08e132a3f21380c08115ef

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9246.exe

    Filesize

    308KB

    MD5

    2f932566273cf8ee86eb74b2b8c0244e

    SHA1

    fabedc1fc0e8b60b78ce6b6abe3939141737146b

    SHA256

    06b1bc474ebef283320c75daa243b5e7f0ff73a698984d695e6cb84513d41787

    SHA512

    9f1632625be332e4c1deff7b4c887d6edf5da79b446ad83d09fbddae155a0226506c73fc916dff18daae0156e527ce3941fa3ccd3e08e132a3f21380c08115ef

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9006.exe

    Filesize

    366KB

    MD5

    8eb6786b10003db13b4e5a4aad997edf

    SHA1

    b0a203a48a5e75f3818f351cb2d744e85cecc9c0

    SHA256

    c74706fed8f4e1e62f4103cac2b64ac680a709d96254410905af949235765abf

    SHA512

    8b3b4053b63e1deba7dcf1df54a14c22eeed21d3b352c00c769efa5ae01ec73ebaa0c4f707d046082197559200f4f1fdceecc478c7f0908cae4105362291ee9d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9006.exe

    Filesize

    366KB

    MD5

    8eb6786b10003db13b4e5a4aad997edf

    SHA1

    b0a203a48a5e75f3818f351cb2d744e85cecc9c0

    SHA256

    c74706fed8f4e1e62f4103cac2b64ac680a709d96254410905af949235765abf

    SHA512

    8b3b4053b63e1deba7dcf1df54a14c22eeed21d3b352c00c769efa5ae01ec73ebaa0c4f707d046082197559200f4f1fdceecc478c7f0908cae4105362291ee9d

  • memory/3240-1116-0x0000000004F20000-0x0000000004F30000-memory.dmp

    Filesize

    64KB

  • memory/3240-1115-0x0000000005050000-0x000000000509B000-memory.dmp

    Filesize

    300KB

  • memory/3240-1114-0x0000000004F20000-0x0000000004F30000-memory.dmp

    Filesize

    64KB

  • memory/3240-1113-0x0000000000610000-0x0000000000642000-memory.dmp

    Filesize

    200KB

  • memory/4312-1091-0x0000000005920000-0x0000000005F26000-memory.dmp

    Filesize

    6.0MB

  • memory/4312-1095-0x0000000005560000-0x00000000055AB000-memory.dmp

    Filesize

    300KB

  • memory/4312-1107-0x0000000004E00000-0x0000000004E10000-memory.dmp

    Filesize

    64KB

  • memory/4312-1106-0x0000000006FA0000-0x0000000006FF0000-memory.dmp

    Filesize

    320KB

  • memory/4312-1105-0x0000000006F20000-0x0000000006F96000-memory.dmp

    Filesize

    472KB

  • memory/4312-1103-0x0000000004E00000-0x0000000004E10000-memory.dmp

    Filesize

    64KB

  • memory/4312-1104-0x0000000004E00000-0x0000000004E10000-memory.dmp

    Filesize

    64KB

  • memory/4312-1102-0x0000000004E00000-0x0000000004E10000-memory.dmp

    Filesize

    64KB

  • memory/4312-1101-0x0000000006770000-0x0000000006C9C000-memory.dmp

    Filesize

    5.2MB

  • memory/4312-1100-0x00000000065A0000-0x0000000006762000-memory.dmp

    Filesize

    1.8MB

  • memory/4312-1099-0x00000000063C0000-0x0000000006452000-memory.dmp

    Filesize

    584KB

  • memory/4312-1097-0x00000000056F0000-0x0000000005756000-memory.dmp

    Filesize

    408KB

  • memory/4312-1096-0x0000000004E00000-0x0000000004E10000-memory.dmp

    Filesize

    64KB

  • memory/4312-1094-0x0000000005420000-0x000000000545E000-memory.dmp

    Filesize

    248KB

  • memory/4312-1093-0x0000000004DD0000-0x0000000004DE2000-memory.dmp

    Filesize

    72KB

  • memory/4312-1092-0x0000000005310000-0x000000000541A000-memory.dmp

    Filesize

    1.0MB

  • memory/4312-218-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4312-216-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4312-214-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4312-212-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4312-210-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4312-179-0x0000000004C20000-0x0000000004C66000-memory.dmp

    Filesize

    280KB

  • memory/4312-180-0x0000000004CA0000-0x0000000004CE4000-memory.dmp

    Filesize

    272KB

  • memory/4312-181-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4312-182-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4312-184-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4312-186-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4312-188-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4312-190-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4312-192-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4312-194-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4312-197-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/4312-199-0x0000000004E00000-0x0000000004E10000-memory.dmp

    Filesize

    64KB

  • memory/4312-200-0x0000000004E00000-0x0000000004E10000-memory.dmp

    Filesize

    64KB

  • memory/4312-201-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4312-196-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4312-203-0x0000000004E00000-0x0000000004E10000-memory.dmp

    Filesize

    64KB

  • memory/4312-204-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4312-206-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4312-208-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4576-162-0x0000000002710000-0x0000000002722000-memory.dmp

    Filesize

    72KB

  • memory/4576-134-0x0000000002390000-0x00000000023AA000-memory.dmp

    Filesize

    104KB

  • memory/4576-141-0x0000000002710000-0x0000000002722000-memory.dmp

    Filesize

    72KB

  • memory/4576-172-0x00000000026F0000-0x0000000002700000-memory.dmp

    Filesize

    64KB

  • memory/4576-171-0x00000000026F0000-0x0000000002700000-memory.dmp

    Filesize

    64KB

  • memory/4576-140-0x0000000002710000-0x0000000002728000-memory.dmp

    Filesize

    96KB

  • memory/4576-170-0x00000000026F0000-0x0000000002700000-memory.dmp

    Filesize

    64KB

  • memory/4576-169-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4576-168-0x0000000002710000-0x0000000002722000-memory.dmp

    Filesize

    72KB

  • memory/4576-144-0x0000000002710000-0x0000000002722000-memory.dmp

    Filesize

    72KB

  • memory/4576-166-0x0000000002710000-0x0000000002722000-memory.dmp

    Filesize

    72KB

  • memory/4576-164-0x0000000002710000-0x0000000002722000-memory.dmp

    Filesize

    72KB

  • memory/4576-174-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4576-142-0x0000000002710000-0x0000000002722000-memory.dmp

    Filesize

    72KB

  • memory/4576-139-0x0000000004C20000-0x000000000511E000-memory.dmp

    Filesize

    5.0MB

  • memory/4576-154-0x0000000002710000-0x0000000002722000-memory.dmp

    Filesize

    72KB

  • memory/4576-156-0x0000000002710000-0x0000000002722000-memory.dmp

    Filesize

    72KB

  • memory/4576-152-0x0000000002710000-0x0000000002722000-memory.dmp

    Filesize

    72KB

  • memory/4576-150-0x0000000002710000-0x0000000002722000-memory.dmp

    Filesize

    72KB

  • memory/4576-148-0x0000000002710000-0x0000000002722000-memory.dmp

    Filesize

    72KB

  • memory/4576-146-0x0000000002710000-0x0000000002722000-memory.dmp

    Filesize

    72KB

  • memory/4576-158-0x0000000002710000-0x0000000002722000-memory.dmp

    Filesize

    72KB

  • memory/4576-138-0x00000000026F0000-0x0000000002700000-memory.dmp

    Filesize

    64KB

  • memory/4576-137-0x00000000026F0000-0x0000000002700000-memory.dmp

    Filesize

    64KB

  • memory/4576-136-0x00000000026F0000-0x0000000002700000-memory.dmp

    Filesize

    64KB

  • memory/4576-135-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4576-160-0x0000000002710000-0x0000000002722000-memory.dmp

    Filesize

    72KB