Analysis

  • max time kernel
    63s
  • max time network
    68s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 18:54

General

  • Target

    bbf8b8429e3a7e59003af0e22d460d532c219c8e05402f480e50b5e92b49ea88.exe

  • Size

    696KB

  • MD5

    7052a49f3a3a914eae32f9144525dfc0

  • SHA1

    b8441dca7e35c277db6ca296e192c070b4ec3e65

  • SHA256

    bbf8b8429e3a7e59003af0e22d460d532c219c8e05402f480e50b5e92b49ea88

  • SHA512

    e0e919c37d715f44e0b24d8148a2fdcd4358d19ff40b374793bcdff7402634d543ef5bfbd3765670f60b779f70d0270d048d8a11cc3e1efc79850a67c8ea158b

  • SSDEEP

    12288:2MrQy90FIGq8uYH7WlqN27J9cKaunlWAnJkCdgoxyzpbGJ4/P+a:Wyyq4bPNabcKaGl5B9YpKgP+a

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bbf8b8429e3a7e59003af0e22d460d532c219c8e05402f480e50b5e92b49ea88.exe
    "C:\Users\Admin\AppData\Local\Temp\bbf8b8429e3a7e59003af0e22d460d532c219c8e05402f480e50b5e92b49ea88.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1188
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un765379.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un765379.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3756
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4757.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4757.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4760
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7821.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7821.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1208
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si327780.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si327780.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3944

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si327780.exe

    Filesize

    175KB

    MD5

    9a54b36feb0e1f83586b226811509aef

    SHA1

    994016687e6449e3efca65dc5c2633cff40acd93

    SHA256

    8f320b4d340e6b9ed383a17ffcea413e1a3aa8cf69a2ee450f7ed66488771a50

    SHA512

    e8cae682af180e6d741765ca0ba0c1706748671c777b53c75f122d25fb728860c1b7245b2469dff3de0dd8f27d3df2d935602e48d2f17f7cec62d6c4ca24b3ae

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si327780.exe

    Filesize

    175KB

    MD5

    9a54b36feb0e1f83586b226811509aef

    SHA1

    994016687e6449e3efca65dc5c2633cff40acd93

    SHA256

    8f320b4d340e6b9ed383a17ffcea413e1a3aa8cf69a2ee450f7ed66488771a50

    SHA512

    e8cae682af180e6d741765ca0ba0c1706748671c777b53c75f122d25fb728860c1b7245b2469dff3de0dd8f27d3df2d935602e48d2f17f7cec62d6c4ca24b3ae

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un765379.exe

    Filesize

    553KB

    MD5

    dbed2aa509d3c7165fd1504573c93fd1

    SHA1

    504694fe4d89e0f0b6431ea246c01864458f6aab

    SHA256

    9839fe86a67d475c012cf9426ef904b0bc99ec7b14db483e00993456da11de65

    SHA512

    ab54ceab4786a760ccb0d587d8237796058c39a14303598456f235cbd77aaac91ce959ba14bd5303ef19f47689f20863bf5860893b36aea9595ee54f9b4537db

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un765379.exe

    Filesize

    553KB

    MD5

    dbed2aa509d3c7165fd1504573c93fd1

    SHA1

    504694fe4d89e0f0b6431ea246c01864458f6aab

    SHA256

    9839fe86a67d475c012cf9426ef904b0bc99ec7b14db483e00993456da11de65

    SHA512

    ab54ceab4786a760ccb0d587d8237796058c39a14303598456f235cbd77aaac91ce959ba14bd5303ef19f47689f20863bf5860893b36aea9595ee54f9b4537db

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4757.exe

    Filesize

    308KB

    MD5

    2528ba04641eabde72a0034f82b1018d

    SHA1

    b092bcf396dc71a0d10ec1b7d1d96cf79adcbb4e

    SHA256

    2ed447f43319098e669720120d47ac3d0d9ebd6846c0e03db02a6c232224d0ed

    SHA512

    3229d0f02148bb5d8e73738333052de11072ab97eb5426ecd155a04cfdfb1123338e5b685cc4a68425d958d1da8decbcc55e868173dc02cc6f500d242acaeafb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4757.exe

    Filesize

    308KB

    MD5

    2528ba04641eabde72a0034f82b1018d

    SHA1

    b092bcf396dc71a0d10ec1b7d1d96cf79adcbb4e

    SHA256

    2ed447f43319098e669720120d47ac3d0d9ebd6846c0e03db02a6c232224d0ed

    SHA512

    3229d0f02148bb5d8e73738333052de11072ab97eb5426ecd155a04cfdfb1123338e5b685cc4a68425d958d1da8decbcc55e868173dc02cc6f500d242acaeafb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7821.exe

    Filesize

    366KB

    MD5

    0363a545c48a6ab879ba75ad33d4e87e

    SHA1

    84fa162cfa6e48ef8336ee2c4600a66d664fad19

    SHA256

    f8573473fe1c482f37baaa6189738b37d15e4bbf284cf978413b1c399fdbe49e

    SHA512

    ab183cafd0665e158c0b9822432448150acba61d25f749416fdfb842cb25ba0fbcd5cfc5764ed27c517902b9d0aef63daa7ce08255aebadc6736261ee2ce2e89

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7821.exe

    Filesize

    366KB

    MD5

    0363a545c48a6ab879ba75ad33d4e87e

    SHA1

    84fa162cfa6e48ef8336ee2c4600a66d664fad19

    SHA256

    f8573473fe1c482f37baaa6189738b37d15e4bbf284cf978413b1c399fdbe49e

    SHA512

    ab183cafd0665e158c0b9822432448150acba61d25f749416fdfb842cb25ba0fbcd5cfc5764ed27c517902b9d0aef63daa7ce08255aebadc6736261ee2ce2e89

  • memory/1208-1102-0x0000000005B10000-0x0000000005B22000-memory.dmp

    Filesize

    72KB

  • memory/1208-1101-0x0000000005A00000-0x0000000005B0A000-memory.dmp

    Filesize

    1.0MB

  • memory/1208-221-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1208-220-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/1208-205-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1208-207-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1208-1115-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/1208-1114-0x0000000006890000-0x0000000006DBC000-memory.dmp

    Filesize

    5.2MB

  • memory/1208-1113-0x00000000066B0000-0x0000000006872000-memory.dmp

    Filesize

    1.8MB

  • memory/1208-1112-0x0000000006640000-0x0000000006690000-memory.dmp

    Filesize

    320KB

  • memory/1208-209-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1208-1111-0x00000000065B0000-0x0000000006626000-memory.dmp

    Filesize

    472KB

  • memory/1208-1110-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/1208-1109-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/1208-1108-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/1208-1107-0x0000000005EB0000-0x0000000005F16000-memory.dmp

    Filesize

    408KB

  • memory/1208-1106-0x0000000005E10000-0x0000000005EA2000-memory.dmp

    Filesize

    584KB

  • memory/1208-1104-0x0000000005B30000-0x0000000005B6C000-memory.dmp

    Filesize

    240KB

  • memory/1208-1103-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/1208-225-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/1208-1100-0x00000000053E0000-0x00000000059F8000-memory.dmp

    Filesize

    6.1MB

  • memory/1208-227-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1208-190-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1208-191-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1208-193-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1208-195-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1208-197-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1208-199-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1208-201-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1208-203-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1208-219-0x0000000000830000-0x000000000087B000-memory.dmp

    Filesize

    300KB

  • memory/1208-224-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1208-222-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/1208-211-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1208-213-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1208-215-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/1208-217-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/3944-1121-0x0000000000840000-0x0000000000872000-memory.dmp

    Filesize

    200KB

  • memory/3944-1122-0x0000000005170000-0x0000000005180000-memory.dmp

    Filesize

    64KB

  • memory/3944-1123-0x0000000005170000-0x0000000005180000-memory.dmp

    Filesize

    64KB

  • memory/4760-181-0x0000000004D50000-0x0000000004D60000-memory.dmp

    Filesize

    64KB

  • memory/4760-171-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB

  • memory/4760-149-0x0000000000710000-0x000000000073D000-memory.dmp

    Filesize

    180KB

  • memory/4760-151-0x0000000004D50000-0x0000000004D60000-memory.dmp

    Filesize

    64KB

  • memory/4760-152-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB

  • memory/4760-185-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4760-150-0x0000000004D50000-0x0000000004D60000-memory.dmp

    Filesize

    64KB

  • memory/4760-183-0x0000000004D50000-0x0000000004D60000-memory.dmp

    Filesize

    64KB

  • memory/4760-182-0x0000000004D50000-0x0000000004D60000-memory.dmp

    Filesize

    64KB

  • memory/4760-153-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB

  • memory/4760-180-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4760-179-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB

  • memory/4760-177-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB

  • memory/4760-175-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB

  • memory/4760-173-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB

  • memory/4760-169-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB

  • memory/4760-167-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB

  • memory/4760-165-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB

  • memory/4760-163-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB

  • memory/4760-161-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB

  • memory/4760-148-0x0000000004D60000-0x0000000005304000-memory.dmp

    Filesize

    5.6MB

  • memory/4760-159-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB

  • memory/4760-157-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB

  • memory/4760-155-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB