Analysis

  • max time kernel
    61s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 18:51

General

  • Target

    0aecf11fb98a5045f666edc9e6e68faf0bd14b12ced0a6428f537ee0cc8a8d92.exe

  • Size

    696KB

  • MD5

    bee9dc99215683e165d22a7db4fd2056

  • SHA1

    5df6371475f7f0ccd792546fdc69789e8a776aba

  • SHA256

    0aecf11fb98a5045f666edc9e6e68faf0bd14b12ced0a6428f537ee0cc8a8d92

  • SHA512

    739c1d0488108faebfbecf8242fd52f78f360f0235906e45ce5dbd4f70e3bc8c09141ace9db5c4a85469a991819e0025292bef8e7f9b0749f8823fdd2ef9510d

  • SSDEEP

    12288:DMruy901YOD1IGtQxfAVrSYv3pxov7OyP1KYuzqb5JJ1K1BfhGQo:5ySDIGtQxg3Mv7OyP1x6q1FAZA

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0aecf11fb98a5045f666edc9e6e68faf0bd14b12ced0a6428f537ee0cc8a8d92.exe
    "C:\Users\Admin\AppData\Local\Temp\0aecf11fb98a5045f666edc9e6e68faf0bd14b12ced0a6428f537ee0cc8a8d92.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un270818.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un270818.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2084
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2440.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2440.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2720
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8401.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8401.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4948
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si919824.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si919824.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3528

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si919824.exe

    Filesize

    175KB

    MD5

    b0aa0d4ab5e87d34c1c274818726bef3

    SHA1

    d0807f84d2790bcaecac670d4b65dad67e421244

    SHA256

    2823bab5b1522fbb332133fb4ea6da2ec5e2af8d039d190af123fad73f702aa5

    SHA512

    cad890de094f7faa2171954689706140fb2cd0721f0ab173deb44655d8e9a68d43075c526e623c5f166d3ae1e8bc8510899481cd496057606345008a957469f9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si919824.exe

    Filesize

    175KB

    MD5

    b0aa0d4ab5e87d34c1c274818726bef3

    SHA1

    d0807f84d2790bcaecac670d4b65dad67e421244

    SHA256

    2823bab5b1522fbb332133fb4ea6da2ec5e2af8d039d190af123fad73f702aa5

    SHA512

    cad890de094f7faa2171954689706140fb2cd0721f0ab173deb44655d8e9a68d43075c526e623c5f166d3ae1e8bc8510899481cd496057606345008a957469f9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un270818.exe

    Filesize

    554KB

    MD5

    c400b703688b53db9de1d9d9fad421d2

    SHA1

    b2ec48a21fa09c5b7af98728dc3fdd1849f7213b

    SHA256

    15a0527410f1ed7967374a12ce96ae481cc4cefb60d53223c04b0dac12ba1de4

    SHA512

    1e46b0b38c4e68983d69cba9ec5bdc1f06d1628584c2df70cd268e8d21df0f38564f72111082fe07abafccc558786ba590058260f27b4cab5e96cca35fc6de3e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un270818.exe

    Filesize

    554KB

    MD5

    c400b703688b53db9de1d9d9fad421d2

    SHA1

    b2ec48a21fa09c5b7af98728dc3fdd1849f7213b

    SHA256

    15a0527410f1ed7967374a12ce96ae481cc4cefb60d53223c04b0dac12ba1de4

    SHA512

    1e46b0b38c4e68983d69cba9ec5bdc1f06d1628584c2df70cd268e8d21df0f38564f72111082fe07abafccc558786ba590058260f27b4cab5e96cca35fc6de3e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2440.exe

    Filesize

    308KB

    MD5

    f8b92159c49c12355886085d2e345a5d

    SHA1

    c590bd7699bb584be49f8063def3eb186eb7c66a

    SHA256

    8205bb6dae1a705fe936462892a1a7d4bf2d23e3f095cc054a8b5afeeb9ad974

    SHA512

    e8e78c593d050d6a8de1c0d82687eb3ecdb87c9e9114736625e9cd11c4b48136112f0565f281bc30ae918afc71aadfceabc7c292171bc302999e14d11a40770f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2440.exe

    Filesize

    308KB

    MD5

    f8b92159c49c12355886085d2e345a5d

    SHA1

    c590bd7699bb584be49f8063def3eb186eb7c66a

    SHA256

    8205bb6dae1a705fe936462892a1a7d4bf2d23e3f095cc054a8b5afeeb9ad974

    SHA512

    e8e78c593d050d6a8de1c0d82687eb3ecdb87c9e9114736625e9cd11c4b48136112f0565f281bc30ae918afc71aadfceabc7c292171bc302999e14d11a40770f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8401.exe

    Filesize

    366KB

    MD5

    b949a30018b5cd5a9162a52e32ce008e

    SHA1

    24b630854436711740f5f0db82aea3f116f47ab9

    SHA256

    800642d5c4732fab640635f3e0220f6bc61854dab394f31f347f85b065155c8d

    SHA512

    9188796e10c346a06ad046fee805c7c2bc981f5d2b1b2358c8ec4cdb048d1e6fe9bc370a4e84a3129fbfcc6d1bfbf130801b9884b8fe242f107d9137591794ac

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8401.exe

    Filesize

    366KB

    MD5

    b949a30018b5cd5a9162a52e32ce008e

    SHA1

    24b630854436711740f5f0db82aea3f116f47ab9

    SHA256

    800642d5c4732fab640635f3e0220f6bc61854dab394f31f347f85b065155c8d

    SHA512

    9188796e10c346a06ad046fee805c7c2bc981f5d2b1b2358c8ec4cdb048d1e6fe9bc370a4e84a3129fbfcc6d1bfbf130801b9884b8fe242f107d9137591794ac

  • memory/2720-148-0x0000000004CA0000-0x0000000005244000-memory.dmp

    Filesize

    5.6MB

  • memory/2720-149-0x0000000005250000-0x0000000005262000-memory.dmp

    Filesize

    72KB

  • memory/2720-150-0x0000000005250000-0x0000000005262000-memory.dmp

    Filesize

    72KB

  • memory/2720-153-0x0000000000AA0000-0x0000000000ACD000-memory.dmp

    Filesize

    180KB

  • memory/2720-155-0x0000000002830000-0x0000000002840000-memory.dmp

    Filesize

    64KB

  • memory/2720-152-0x0000000005250000-0x0000000005262000-memory.dmp

    Filesize

    72KB

  • memory/2720-156-0x0000000002830000-0x0000000002840000-memory.dmp

    Filesize

    64KB

  • memory/2720-157-0x0000000005250000-0x0000000005262000-memory.dmp

    Filesize

    72KB

  • memory/2720-161-0x0000000005250000-0x0000000005262000-memory.dmp

    Filesize

    72KB

  • memory/2720-159-0x0000000005250000-0x0000000005262000-memory.dmp

    Filesize

    72KB

  • memory/2720-163-0x0000000005250000-0x0000000005262000-memory.dmp

    Filesize

    72KB

  • memory/2720-165-0x0000000005250000-0x0000000005262000-memory.dmp

    Filesize

    72KB

  • memory/2720-167-0x0000000005250000-0x0000000005262000-memory.dmp

    Filesize

    72KB

  • memory/2720-169-0x0000000005250000-0x0000000005262000-memory.dmp

    Filesize

    72KB

  • memory/2720-171-0x0000000005250000-0x0000000005262000-memory.dmp

    Filesize

    72KB

  • memory/2720-173-0x0000000005250000-0x0000000005262000-memory.dmp

    Filesize

    72KB

  • memory/2720-175-0x0000000005250000-0x0000000005262000-memory.dmp

    Filesize

    72KB

  • memory/2720-177-0x0000000005250000-0x0000000005262000-memory.dmp

    Filesize

    72KB

  • memory/2720-179-0x0000000005250000-0x0000000005262000-memory.dmp

    Filesize

    72KB

  • memory/2720-180-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/2720-181-0x0000000002830000-0x0000000002840000-memory.dmp

    Filesize

    64KB

  • memory/2720-182-0x0000000002830000-0x0000000002840000-memory.dmp

    Filesize

    64KB

  • memory/2720-184-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/3528-1120-0x00000000003F0000-0x0000000000422000-memory.dmp

    Filesize

    200KB

  • memory/3528-1121-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/4948-191-0x00000000050B0000-0x00000000050C0000-memory.dmp

    Filesize

    64KB

  • memory/4948-220-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/4948-192-0x00000000050B0000-0x00000000050C0000-memory.dmp

    Filesize

    64KB

  • memory/4948-193-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/4948-194-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/4948-196-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/4948-198-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/4948-200-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/4948-202-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/4948-204-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/4948-206-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/4948-208-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/4948-210-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/4948-212-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/4948-214-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/4948-216-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/4948-218-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/4948-222-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/4948-224-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/4948-189-0x0000000000820000-0x000000000086B000-memory.dmp

    Filesize

    300KB

  • memory/4948-226-0x0000000002650000-0x000000000268F000-memory.dmp

    Filesize

    252KB

  • memory/4948-1099-0x0000000005670000-0x0000000005C88000-memory.dmp

    Filesize

    6.1MB

  • memory/4948-1100-0x0000000004EE0000-0x0000000004FEA000-memory.dmp

    Filesize

    1.0MB

  • memory/4948-1101-0x00000000029B0000-0x00000000029C2000-memory.dmp

    Filesize

    72KB

  • memory/4948-1102-0x00000000029D0000-0x0000000002A0C000-memory.dmp

    Filesize

    240KB

  • memory/4948-1103-0x00000000050B0000-0x00000000050C0000-memory.dmp

    Filesize

    64KB

  • memory/4948-1104-0x0000000005E10000-0x0000000005EA2000-memory.dmp

    Filesize

    584KB

  • memory/4948-1105-0x0000000005EB0000-0x0000000005F16000-memory.dmp

    Filesize

    408KB

  • memory/4948-1107-0x00000000065B0000-0x0000000006626000-memory.dmp

    Filesize

    472KB

  • memory/4948-1108-0x0000000006640000-0x0000000006690000-memory.dmp

    Filesize

    320KB

  • memory/4948-1109-0x00000000050B0000-0x00000000050C0000-memory.dmp

    Filesize

    64KB

  • memory/4948-1110-0x00000000050B0000-0x00000000050C0000-memory.dmp

    Filesize

    64KB

  • memory/4948-1111-0x00000000050B0000-0x00000000050C0000-memory.dmp

    Filesize

    64KB

  • memory/4948-190-0x00000000050B0000-0x00000000050C0000-memory.dmp

    Filesize

    64KB

  • memory/4948-1112-0x00000000050B0000-0x00000000050C0000-memory.dmp

    Filesize

    64KB

  • memory/4948-1113-0x0000000006930000-0x0000000006AF2000-memory.dmp

    Filesize

    1.8MB

  • memory/4948-1114-0x0000000006B00000-0x000000000702C000-memory.dmp

    Filesize

    5.2MB