Analysis

  • max time kernel
    109s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 18:58

General

  • Target

    8ab8b80961bf8aa9ce3d9032867b0928cffa98a4792725ebf70cf6416906d52d.exe

  • Size

    696KB

  • MD5

    bd345559cd0f9dc2dbc320b06c118d1e

  • SHA1

    84e39164c935a80207163ffe1c29f17fb4d41c74

  • SHA256

    8ab8b80961bf8aa9ce3d9032867b0928cffa98a4792725ebf70cf6416906d52d

  • SHA512

    ad8a857e220855006349a90548566b33b991f6238d68087932ad9d81d12c1530c21e1e5beca650db36f84e51a6538047d744959252b6f27732e21b892859c8e3

  • SSDEEP

    12288:dMrXy90GxseOhF4qbIq+JU0KOnOLUTf14trff6vxZ+xYzdAsJulhDIDlQ92:uyeCqsjJtdTfWtLf6vxkGddkn2C2

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 22 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ab8b80961bf8aa9ce3d9032867b0928cffa98a4792725ebf70cf6416906d52d.exe
    "C:\Users\Admin\AppData\Local\Temp\8ab8b80961bf8aa9ce3d9032867b0928cffa98a4792725ebf70cf6416906d52d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un277469.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un277469.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2200
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8427.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8427.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2296
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3459.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3459.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4028
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si656302.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si656302.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4356

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si656302.exe

    Filesize

    175KB

    MD5

    204c3e33bd0efeba55614cc7b7a1ca87

    SHA1

    b5528e2b50988f00a12c1da8592e8d584ad9a099

    SHA256

    730dcdd20f440630056d9a5b8bd58f47154e6543563cf3057cf5c227f3c6d619

    SHA512

    5cfed4dd6e1ebdcffdce124b0611f3f9e96ffaff4cb214e3c8075b64a513ab8402abb66c0fcc2dc76d358ce0c2a6dfd61e04b3095713cf6f1091107cd7bcec90

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si656302.exe

    Filesize

    175KB

    MD5

    204c3e33bd0efeba55614cc7b7a1ca87

    SHA1

    b5528e2b50988f00a12c1da8592e8d584ad9a099

    SHA256

    730dcdd20f440630056d9a5b8bd58f47154e6543563cf3057cf5c227f3c6d619

    SHA512

    5cfed4dd6e1ebdcffdce124b0611f3f9e96ffaff4cb214e3c8075b64a513ab8402abb66c0fcc2dc76d358ce0c2a6dfd61e04b3095713cf6f1091107cd7bcec90

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un277469.exe

    Filesize

    553KB

    MD5

    1e4a72d9a40832f5d0de2aa6787732ca

    SHA1

    5da0889ff6425f7661f7a2233915c5bd121f4381

    SHA256

    94ffe3718dae8bbbcb77357150708cb96e40b1e9364f57f37ec301221ecb8b61

    SHA512

    d7b89ed6903f430e384c50e4e8a2ab6cd968bf75e99ef2b6e5a8ffc8515b308a79fdc054e48c3c79b1ea7e3ea0c4788050f888cde483ea5afeb01960d952209a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un277469.exe

    Filesize

    553KB

    MD5

    1e4a72d9a40832f5d0de2aa6787732ca

    SHA1

    5da0889ff6425f7661f7a2233915c5bd121f4381

    SHA256

    94ffe3718dae8bbbcb77357150708cb96e40b1e9364f57f37ec301221ecb8b61

    SHA512

    d7b89ed6903f430e384c50e4e8a2ab6cd968bf75e99ef2b6e5a8ffc8515b308a79fdc054e48c3c79b1ea7e3ea0c4788050f888cde483ea5afeb01960d952209a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8427.exe

    Filesize

    308KB

    MD5

    0b1c3f38a06bb077dd3f70ba79bbc231

    SHA1

    9f9970bdd29d78eeea1c4d3df7cce754f54e664d

    SHA256

    2d85766e48e45fb69908449cd8afb94f040727be89bcb7952582561d69e090be

    SHA512

    fb10e0ba92c0b29a277d513fb816806c7d78770650ab7a91a086ffd90b06d22625ecfe40dbc0fabf34b4365bc594056e0b6d35a9102485e4df52ab0f4d7a9ad9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8427.exe

    Filesize

    308KB

    MD5

    0b1c3f38a06bb077dd3f70ba79bbc231

    SHA1

    9f9970bdd29d78eeea1c4d3df7cce754f54e664d

    SHA256

    2d85766e48e45fb69908449cd8afb94f040727be89bcb7952582561d69e090be

    SHA512

    fb10e0ba92c0b29a277d513fb816806c7d78770650ab7a91a086ffd90b06d22625ecfe40dbc0fabf34b4365bc594056e0b6d35a9102485e4df52ab0f4d7a9ad9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3459.exe

    Filesize

    366KB

    MD5

    e9e68b7dbca2507f7f4854dd4ed910bb

    SHA1

    27415e8df641f7b69f78cc18c28eff240ed7fbc4

    SHA256

    45a1b374591da5d696f6791365898a60a84d25d1ec5735a4394ff841ddba411d

    SHA512

    4a8104634a725da07ae21cac012db1f9fff3411cca1416515ff45b88e3d672c66ba7143ad4066a9090357e59e6589bfb31b86fa04f2278ac4f31fb41ec666069

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3459.exe

    Filesize

    366KB

    MD5

    e9e68b7dbca2507f7f4854dd4ed910bb

    SHA1

    27415e8df641f7b69f78cc18c28eff240ed7fbc4

    SHA256

    45a1b374591da5d696f6791365898a60a84d25d1ec5735a4394ff841ddba411d

    SHA512

    4a8104634a725da07ae21cac012db1f9fff3411cca1416515ff45b88e3d672c66ba7143ad4066a9090357e59e6589bfb31b86fa04f2278ac4f31fb41ec666069

  • memory/2296-148-0x00000000007E0000-0x000000000080D000-memory.dmp

    Filesize

    180KB

  • memory/2296-149-0x0000000005050000-0x00000000055F4000-memory.dmp

    Filesize

    5.6MB

  • memory/2296-150-0x00000000025F0000-0x0000000002602000-memory.dmp

    Filesize

    72KB

  • memory/2296-151-0x00000000025F0000-0x0000000002602000-memory.dmp

    Filesize

    72KB

  • memory/2296-153-0x00000000025F0000-0x0000000002602000-memory.dmp

    Filesize

    72KB

  • memory/2296-155-0x00000000025F0000-0x0000000002602000-memory.dmp

    Filesize

    72KB

  • memory/2296-159-0x00000000025F0000-0x0000000002602000-memory.dmp

    Filesize

    72KB

  • memory/2296-157-0x00000000025F0000-0x0000000002602000-memory.dmp

    Filesize

    72KB

  • memory/2296-161-0x00000000025F0000-0x0000000002602000-memory.dmp

    Filesize

    72KB

  • memory/2296-163-0x00000000025F0000-0x0000000002602000-memory.dmp

    Filesize

    72KB

  • memory/2296-165-0x00000000025F0000-0x0000000002602000-memory.dmp

    Filesize

    72KB

  • memory/2296-169-0x00000000025F0000-0x0000000002602000-memory.dmp

    Filesize

    72KB

  • memory/2296-167-0x00000000025F0000-0x0000000002602000-memory.dmp

    Filesize

    72KB

  • memory/2296-171-0x00000000025F0000-0x0000000002602000-memory.dmp

    Filesize

    72KB

  • memory/2296-173-0x00000000025F0000-0x0000000002602000-memory.dmp

    Filesize

    72KB

  • memory/2296-177-0x00000000025F0000-0x0000000002602000-memory.dmp

    Filesize

    72KB

  • memory/2296-175-0x00000000025F0000-0x0000000002602000-memory.dmp

    Filesize

    72KB

  • memory/2296-178-0x0000000005040000-0x0000000005050000-memory.dmp

    Filesize

    64KB

  • memory/2296-180-0x0000000005040000-0x0000000005050000-memory.dmp

    Filesize

    64KB

  • memory/2296-179-0x0000000005040000-0x0000000005050000-memory.dmp

    Filesize

    64KB

  • memory/2296-181-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/2296-182-0x0000000005040000-0x0000000005050000-memory.dmp

    Filesize

    64KB

  • memory/2296-183-0x0000000005040000-0x0000000005050000-memory.dmp

    Filesize

    64KB

  • memory/2296-184-0x0000000005040000-0x0000000005050000-memory.dmp

    Filesize

    64KB

  • memory/2296-186-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4028-191-0x00000000028E0000-0x000000000291F000-memory.dmp

    Filesize

    252KB

  • memory/4028-192-0x00000000028E0000-0x000000000291F000-memory.dmp

    Filesize

    252KB

  • memory/4028-194-0x00000000028E0000-0x000000000291F000-memory.dmp

    Filesize

    252KB

  • memory/4028-196-0x00000000028E0000-0x000000000291F000-memory.dmp

    Filesize

    252KB

  • memory/4028-198-0x00000000028E0000-0x000000000291F000-memory.dmp

    Filesize

    252KB

  • memory/4028-200-0x00000000028E0000-0x000000000291F000-memory.dmp

    Filesize

    252KB

  • memory/4028-202-0x00000000028E0000-0x000000000291F000-memory.dmp

    Filesize

    252KB

  • memory/4028-204-0x00000000028E0000-0x000000000291F000-memory.dmp

    Filesize

    252KB

  • memory/4028-206-0x00000000028E0000-0x000000000291F000-memory.dmp

    Filesize

    252KB

  • memory/4028-208-0x00000000028E0000-0x000000000291F000-memory.dmp

    Filesize

    252KB

  • memory/4028-210-0x00000000028E0000-0x000000000291F000-memory.dmp

    Filesize

    252KB

  • memory/4028-212-0x00000000028E0000-0x000000000291F000-memory.dmp

    Filesize

    252KB

  • memory/4028-214-0x00000000028E0000-0x000000000291F000-memory.dmp

    Filesize

    252KB

  • memory/4028-216-0x00000000028E0000-0x000000000291F000-memory.dmp

    Filesize

    252KB

  • memory/4028-222-0x00000000028E0000-0x000000000291F000-memory.dmp

    Filesize

    252KB

  • memory/4028-220-0x00000000028E0000-0x000000000291F000-memory.dmp

    Filesize

    252KB

  • memory/4028-224-0x00000000028E0000-0x000000000291F000-memory.dmp

    Filesize

    252KB

  • memory/4028-218-0x00000000028E0000-0x000000000291F000-memory.dmp

    Filesize

    252KB

  • memory/4028-355-0x0000000000720000-0x000000000076B000-memory.dmp

    Filesize

    300KB

  • memory/4028-357-0x0000000002490000-0x00000000024A0000-memory.dmp

    Filesize

    64KB

  • memory/4028-359-0x0000000002490000-0x00000000024A0000-memory.dmp

    Filesize

    64KB

  • memory/4028-361-0x0000000002490000-0x00000000024A0000-memory.dmp

    Filesize

    64KB

  • memory/4028-1101-0x0000000005330000-0x0000000005948000-memory.dmp

    Filesize

    6.1MB

  • memory/4028-1102-0x00000000059C0000-0x0000000005ACA000-memory.dmp

    Filesize

    1.0MB

  • memory/4028-1103-0x0000000005B00000-0x0000000005B12000-memory.dmp

    Filesize

    72KB

  • memory/4028-1104-0x0000000005B20000-0x0000000005B5C000-memory.dmp

    Filesize

    240KB

  • memory/4028-1105-0x0000000002490000-0x00000000024A0000-memory.dmp

    Filesize

    64KB

  • memory/4028-1107-0x0000000005E10000-0x0000000005EA2000-memory.dmp

    Filesize

    584KB

  • memory/4028-1108-0x0000000005EB0000-0x0000000005F16000-memory.dmp

    Filesize

    408KB

  • memory/4028-1109-0x00000000065E0000-0x00000000067A2000-memory.dmp

    Filesize

    1.8MB

  • memory/4028-1110-0x00000000067B0000-0x0000000006CDC000-memory.dmp

    Filesize

    5.2MB

  • memory/4028-1111-0x0000000002490000-0x00000000024A0000-memory.dmp

    Filesize

    64KB

  • memory/4028-1112-0x0000000002490000-0x00000000024A0000-memory.dmp

    Filesize

    64KB

  • memory/4028-1113-0x0000000002490000-0x00000000024A0000-memory.dmp

    Filesize

    64KB

  • memory/4028-1114-0x0000000006F60000-0x0000000006FD6000-memory.dmp

    Filesize

    472KB

  • memory/4028-1115-0x0000000006FE0000-0x0000000007030000-memory.dmp

    Filesize

    320KB

  • memory/4028-1116-0x0000000002490000-0x00000000024A0000-memory.dmp

    Filesize

    64KB

  • memory/4356-1122-0x00000000006C0000-0x00000000006F2000-memory.dmp

    Filesize

    200KB

  • memory/4356-1123-0x0000000004F60000-0x0000000004F70000-memory.dmp

    Filesize

    64KB