Analysis

  • max time kernel
    61s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 18:57

General

  • Target

    c97620b6a117017101c913bc0eafec128757867671edb6df68dc122f443cf449.exe

  • Size

    695KB

  • MD5

    2685dd13218d5d1d046f5f9622812a37

  • SHA1

    b5da7487af60ce5847cac64f14e2c901a0531fde

  • SHA256

    c97620b6a117017101c913bc0eafec128757867671edb6df68dc122f443cf449

  • SHA512

    e77051d0f2500827583dbf07f74fc734242ac44043e23c0a0e0ebe03ebc8045c0f9b10aee2b842e471d0629588e7469c87c12c04811c8793ebd4e788e4fa9584

  • SSDEEP

    12288:vMrzy90QPaiQikEGZgmwOaDtmZWNuPlyfYgFRM58Fkezo6bJBmjX0kFw:0yUi/GZgqaxvNelyfYEM6po4qjdu

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c97620b6a117017101c913bc0eafec128757867671edb6df68dc122f443cf449.exe
    "C:\Users\Admin\AppData\Local\Temp\c97620b6a117017101c913bc0eafec128757867671edb6df68dc122f443cf449.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un775501.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un775501.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4776
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6797.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6797.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1904
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3747.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3747.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4588
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si770406.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si770406.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1156

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si770406.exe

    Filesize

    175KB

    MD5

    7ffa6afc7539cad25da7a570dd7509d0

    SHA1

    ccac7824ff22f8b8e67b2bcc3d352d5b27c7c575

    SHA256

    da852896f39b785ccb56f525dd80bbf5ef5c4c3cfb64fb69941a3b6e889c825f

    SHA512

    b068535bc6e378dbf5293a0ca781afbb1bb65560b6133ba18fe70d694447d47247427ce2c9db5f6aae8e1d0142702777d254c0b123c90b1bf2046ff7adc14cf6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si770406.exe

    Filesize

    175KB

    MD5

    7ffa6afc7539cad25da7a570dd7509d0

    SHA1

    ccac7824ff22f8b8e67b2bcc3d352d5b27c7c575

    SHA256

    da852896f39b785ccb56f525dd80bbf5ef5c4c3cfb64fb69941a3b6e889c825f

    SHA512

    b068535bc6e378dbf5293a0ca781afbb1bb65560b6133ba18fe70d694447d47247427ce2c9db5f6aae8e1d0142702777d254c0b123c90b1bf2046ff7adc14cf6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un775501.exe

    Filesize

    553KB

    MD5

    0d78191ef74ad4ca22195a468b2f90bd

    SHA1

    eb36b68adb4c507ded742ab88cc420a9a1092d15

    SHA256

    5a8a96798b18f52b34ce341a1c6bf88bdc043dbec75ad0ef68003d29215a16fa

    SHA512

    abb11c8d0150b80c1a6fe10876308d4b20fdfc42e93f451ea19f7d9d38a62e6b02410a884e12b90a373c4efd889d1019a49ab67bc7d5e39e8b4e15017c924666

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un775501.exe

    Filesize

    553KB

    MD5

    0d78191ef74ad4ca22195a468b2f90bd

    SHA1

    eb36b68adb4c507ded742ab88cc420a9a1092d15

    SHA256

    5a8a96798b18f52b34ce341a1c6bf88bdc043dbec75ad0ef68003d29215a16fa

    SHA512

    abb11c8d0150b80c1a6fe10876308d4b20fdfc42e93f451ea19f7d9d38a62e6b02410a884e12b90a373c4efd889d1019a49ab67bc7d5e39e8b4e15017c924666

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6797.exe

    Filesize

    308KB

    MD5

    22adcb19564c68d6fff698c5c091eaeb

    SHA1

    c9e64c1c0910d4d7fcd9ca4af8952e7c08ef68de

    SHA256

    68b7e48c970e15f260abb9a752716506951bdb9ec9777936c44809792f8a3dae

    SHA512

    fe4ec37fc6d12a355decea36e39fa797cc212404a79be5adc18a238f37ccf77f5091b7da1081a868355db909edf31a668e7eced91cd30e8ef1c291c658460cd9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6797.exe

    Filesize

    308KB

    MD5

    22adcb19564c68d6fff698c5c091eaeb

    SHA1

    c9e64c1c0910d4d7fcd9ca4af8952e7c08ef68de

    SHA256

    68b7e48c970e15f260abb9a752716506951bdb9ec9777936c44809792f8a3dae

    SHA512

    fe4ec37fc6d12a355decea36e39fa797cc212404a79be5adc18a238f37ccf77f5091b7da1081a868355db909edf31a668e7eced91cd30e8ef1c291c658460cd9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3747.exe

    Filesize

    366KB

    MD5

    27ed9ada83ccd9e4267f3bf94dd5fb38

    SHA1

    430a74371ad35ba40e64e40f1fd083d07e0e4564

    SHA256

    dcceded6be4c4aa440b0bfd8c6664c82c8a1a11fb4aaa620377ec036bfc22b3a

    SHA512

    179df73880ea1aa1760cfc181ad18a2ec5b39a3dd86c6c34cbaee15b7bffc0dddd2e3659623e3d91e0a5dd33bf601edef25f339dfa209bb6d6d20f96d2fa5418

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3747.exe

    Filesize

    366KB

    MD5

    27ed9ada83ccd9e4267f3bf94dd5fb38

    SHA1

    430a74371ad35ba40e64e40f1fd083d07e0e4564

    SHA256

    dcceded6be4c4aa440b0bfd8c6664c82c8a1a11fb4aaa620377ec036bfc22b3a

    SHA512

    179df73880ea1aa1760cfc181ad18a2ec5b39a3dd86c6c34cbaee15b7bffc0dddd2e3659623e3d91e0a5dd33bf601edef25f339dfa209bb6d6d20f96d2fa5418

  • memory/1156-1122-0x00000000003F0000-0x0000000000422000-memory.dmp

    Filesize

    200KB

  • memory/1156-1123-0x0000000005000000-0x0000000005010000-memory.dmp

    Filesize

    64KB

  • memory/1904-158-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/1904-172-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/1904-151-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/1904-154-0x0000000004FF0000-0x0000000005000000-memory.dmp

    Filesize

    64KB

  • memory/1904-155-0x0000000004FF0000-0x0000000005000000-memory.dmp

    Filesize

    64KB

  • memory/1904-156-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/1904-150-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/1904-160-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/1904-162-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/1904-164-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/1904-166-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/1904-168-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/1904-170-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/1904-152-0x0000000004FF0000-0x0000000005000000-memory.dmp

    Filesize

    64KB

  • memory/1904-174-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/1904-176-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/1904-178-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/1904-180-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/1904-181-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/1904-182-0x0000000004FF0000-0x0000000005000000-memory.dmp

    Filesize

    64KB

  • memory/1904-183-0x0000000004FF0000-0x0000000005000000-memory.dmp

    Filesize

    64KB

  • memory/1904-184-0x0000000004FF0000-0x0000000005000000-memory.dmp

    Filesize

    64KB

  • memory/1904-186-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/1904-149-0x00000000007E0000-0x000000000080D000-memory.dmp

    Filesize

    180KB

  • memory/1904-148-0x0000000005000000-0x00000000055A4000-memory.dmp

    Filesize

    5.6MB

  • memory/4588-196-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4588-354-0x0000000004C80000-0x0000000004C90000-memory.dmp

    Filesize

    64KB

  • memory/4588-198-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4588-200-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4588-202-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4588-204-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4588-206-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4588-208-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4588-210-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4588-212-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4588-214-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4588-216-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4588-218-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4588-220-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4588-222-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4588-224-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4588-350-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/4588-351-0x0000000004C80000-0x0000000004C90000-memory.dmp

    Filesize

    64KB

  • memory/4588-356-0x0000000004C80000-0x0000000004C90000-memory.dmp

    Filesize

    64KB

  • memory/4588-194-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4588-1101-0x0000000005340000-0x0000000005958000-memory.dmp

    Filesize

    6.1MB

  • memory/4588-1102-0x00000000059C0000-0x0000000005ACA000-memory.dmp

    Filesize

    1.0MB

  • memory/4588-1103-0x0000000005B00000-0x0000000005B12000-memory.dmp

    Filesize

    72KB

  • memory/4588-1104-0x0000000005B20000-0x0000000005B5C000-memory.dmp

    Filesize

    240KB

  • memory/4588-1105-0x0000000004C80000-0x0000000004C90000-memory.dmp

    Filesize

    64KB

  • memory/4588-1106-0x0000000005E10000-0x0000000005E76000-memory.dmp

    Filesize

    408KB

  • memory/4588-1107-0x00000000064D0000-0x0000000006562000-memory.dmp

    Filesize

    584KB

  • memory/4588-1108-0x00000000065A0000-0x0000000006616000-memory.dmp

    Filesize

    472KB

  • memory/4588-1109-0x0000000006640000-0x0000000006690000-memory.dmp

    Filesize

    320KB

  • memory/4588-1111-0x0000000004C80000-0x0000000004C90000-memory.dmp

    Filesize

    64KB

  • memory/4588-1112-0x0000000004C80000-0x0000000004C90000-memory.dmp

    Filesize

    64KB

  • memory/4588-1113-0x0000000004C80000-0x0000000004C90000-memory.dmp

    Filesize

    64KB

  • memory/4588-1114-0x00000000067B0000-0x0000000006972000-memory.dmp

    Filesize

    1.8MB

  • memory/4588-192-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4588-191-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4588-1115-0x00000000069A0000-0x0000000006ECC000-memory.dmp

    Filesize

    5.2MB

  • memory/4588-1116-0x0000000004C80000-0x0000000004C90000-memory.dmp

    Filesize

    64KB