Analysis

  • max time kernel
    57s
  • max time network
    61s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 19:02

General

  • Target

    7dd04365c7e7d974e4b92919874f5219dcab5a739a781dd280edfa5e6bdc66ef.exe

  • Size

    694KB

  • MD5

    696f88a6eb4f3c2a58d2758756452e59

  • SHA1

    984b1dfa9c127eb142fb3941eb4986ec760b9b27

  • SHA256

    7dd04365c7e7d974e4b92919874f5219dcab5a739a781dd280edfa5e6bdc66ef

  • SHA512

    96e627649ac90c4c0efab846cb41bb6a74072e0fc3ee327624238c63dae9119d8e60c1792dcc8b7869ee2fa1d68c79a567dac66740f3013e83a44b9ccb93b6b1

  • SSDEEP

    12288:xMrmgy907ORFMIWEJ9HRkm11XfsK0mIChttr0SRfvPSnWaM/J3R9S90QvxTG:SyxRFZLJ9HSu0K0m1ftYSZyWaEL9tIy

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7dd04365c7e7d974e4b92919874f5219dcab5a739a781dd280edfa5e6bdc66ef.exe
    "C:\Users\Admin\AppData\Local\Temp\7dd04365c7e7d974e4b92919874f5219dcab5a739a781dd280edfa5e6bdc66ef.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un670608.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un670608.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2872
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1979.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1979.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3364
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9239.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9239.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3128
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si701517.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si701517.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4804

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si701517.exe

    Filesize

    175KB

    MD5

    ff0b9a9ad9adc1c9a188d87309452c2c

    SHA1

    2f72093685148cb47eb775bebc8a8595153fcd5f

    SHA256

    10566301ff9bfc9b8efce2035195344efe174a407c993fee96c4bd6e4243adc6

    SHA512

    9746fa81812040ccef894106f44a2f65b28d642e51ded896956bba371116879b6cc9d1bc9b1d249db72e9c82904e248d280c118ea8629acf0b86fa9eb72135b4

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si701517.exe

    Filesize

    175KB

    MD5

    ff0b9a9ad9adc1c9a188d87309452c2c

    SHA1

    2f72093685148cb47eb775bebc8a8595153fcd5f

    SHA256

    10566301ff9bfc9b8efce2035195344efe174a407c993fee96c4bd6e4243adc6

    SHA512

    9746fa81812040ccef894106f44a2f65b28d642e51ded896956bba371116879b6cc9d1bc9b1d249db72e9c82904e248d280c118ea8629acf0b86fa9eb72135b4

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un670608.exe

    Filesize

    553KB

    MD5

    ee8ccd621cfc97522acbc82a4e907296

    SHA1

    d273798ebc1c6c6256d8ea88bc12a1a543735437

    SHA256

    e1f6d752173937247874fbbce0a696243e30468948b8b6f353f8adc4340b5ad2

    SHA512

    6af307fc86472436dde75bf099f2cd42e4a65786fdabe3d733a86af7b5be3209538e6187fb59236dd2a09627f1fa44e30b5388d742574b060349633c7b6df4bc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un670608.exe

    Filesize

    553KB

    MD5

    ee8ccd621cfc97522acbc82a4e907296

    SHA1

    d273798ebc1c6c6256d8ea88bc12a1a543735437

    SHA256

    e1f6d752173937247874fbbce0a696243e30468948b8b6f353f8adc4340b5ad2

    SHA512

    6af307fc86472436dde75bf099f2cd42e4a65786fdabe3d733a86af7b5be3209538e6187fb59236dd2a09627f1fa44e30b5388d742574b060349633c7b6df4bc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1979.exe

    Filesize

    308KB

    MD5

    11853eafd46c7c9a5686e2f78f3132a0

    SHA1

    ab6848f959720276b1357189a4f00c93f2c9a410

    SHA256

    07998a0337f84e6f2f2abb0d7a3eaaca9b6d81ab3defeb17341687397df0a160

    SHA512

    f43c1ce03fb99b4fa346794778559608edbb077b63898e598703efa5d8db35159ccd74a8e65c758a9e1619660ac89eb03e39fa5d1d89cc6f42811b01dce4d329

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1979.exe

    Filesize

    308KB

    MD5

    11853eafd46c7c9a5686e2f78f3132a0

    SHA1

    ab6848f959720276b1357189a4f00c93f2c9a410

    SHA256

    07998a0337f84e6f2f2abb0d7a3eaaca9b6d81ab3defeb17341687397df0a160

    SHA512

    f43c1ce03fb99b4fa346794778559608edbb077b63898e598703efa5d8db35159ccd74a8e65c758a9e1619660ac89eb03e39fa5d1d89cc6f42811b01dce4d329

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9239.exe

    Filesize

    366KB

    MD5

    b5ef2bb5725a90f48a44ab6ae8bbb8e3

    SHA1

    b89ce8e2d916a60e8a0a0c7f2c9991d7c2e06f19

    SHA256

    1b27a3d8fa810d997a9e4ba8e6ec7fa122226bb50a2670e768d197162714ea2f

    SHA512

    94e7e3ea8b047cc5f4905afb00df41cd2193ba0554dafa6f783bc57aff6257e83d94cdbb10557d7a5cf6ca2fce3019a1122d3314839a1981eb818f3c1e0c9862

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9239.exe

    Filesize

    366KB

    MD5

    b5ef2bb5725a90f48a44ab6ae8bbb8e3

    SHA1

    b89ce8e2d916a60e8a0a0c7f2c9991d7c2e06f19

    SHA256

    1b27a3d8fa810d997a9e4ba8e6ec7fa122226bb50a2670e768d197162714ea2f

    SHA512

    94e7e3ea8b047cc5f4905afb00df41cd2193ba0554dafa6f783bc57aff6257e83d94cdbb10557d7a5cf6ca2fce3019a1122d3314839a1981eb818f3c1e0c9862

  • memory/3128-1090-0x0000000005A00000-0x0000000005A12000-memory.dmp

    Filesize

    72KB

  • memory/3128-215-0x00000000051B0000-0x00000000051EF000-memory.dmp

    Filesize

    252KB

  • memory/3128-192-0x00000000009B0000-0x00000000009C0000-memory.dmp

    Filesize

    64KB

  • memory/3128-191-0x00000000051B0000-0x00000000051EF000-memory.dmp

    Filesize

    252KB

  • memory/3128-1103-0x0000000006FB0000-0x0000000007000000-memory.dmp

    Filesize

    320KB

  • memory/3128-1102-0x0000000006F20000-0x0000000006F96000-memory.dmp

    Filesize

    472KB

  • memory/3128-1101-0x00000000009B0000-0x00000000009C0000-memory.dmp

    Filesize

    64KB

  • memory/3128-1100-0x0000000006670000-0x0000000006B9C000-memory.dmp

    Filesize

    5.2MB

  • memory/3128-1099-0x00000000064A0000-0x0000000006662000-memory.dmp

    Filesize

    1.8MB

  • memory/3128-1098-0x0000000005DA0000-0x0000000005E06000-memory.dmp

    Filesize

    408KB

  • memory/3128-194-0x00000000051B0000-0x00000000051EF000-memory.dmp

    Filesize

    252KB

  • memory/3128-1097-0x0000000005D00000-0x0000000005D92000-memory.dmp

    Filesize

    584KB

  • memory/3128-1096-0x00000000009B0000-0x00000000009C0000-memory.dmp

    Filesize

    64KB

  • memory/3128-1095-0x00000000009B0000-0x00000000009C0000-memory.dmp

    Filesize

    64KB

  • memory/3128-1094-0x00000000009B0000-0x00000000009C0000-memory.dmp

    Filesize

    64KB

  • memory/3128-1092-0x0000000005B70000-0x0000000005BBB000-memory.dmp

    Filesize

    300KB

  • memory/3128-1091-0x0000000005A20000-0x0000000005A5E000-memory.dmp

    Filesize

    248KB

  • memory/3128-1089-0x00000000058C0000-0x00000000059CA000-memory.dmp

    Filesize

    1.0MB

  • memory/3128-1088-0x0000000005230000-0x0000000005836000-memory.dmp

    Filesize

    6.0MB

  • memory/3128-207-0x00000000051B0000-0x00000000051EF000-memory.dmp

    Filesize

    252KB

  • memory/3128-176-0x0000000002520000-0x0000000002566000-memory.dmp

    Filesize

    280KB

  • memory/3128-177-0x00000000051B0000-0x00000000051F4000-memory.dmp

    Filesize

    272KB

  • memory/3128-178-0x00000000051B0000-0x00000000051EF000-memory.dmp

    Filesize

    252KB

  • memory/3128-179-0x00000000051B0000-0x00000000051EF000-memory.dmp

    Filesize

    252KB

  • memory/3128-181-0x00000000051B0000-0x00000000051EF000-memory.dmp

    Filesize

    252KB

  • memory/3128-183-0x00000000051B0000-0x00000000051EF000-memory.dmp

    Filesize

    252KB

  • memory/3128-185-0x00000000051B0000-0x00000000051EF000-memory.dmp

    Filesize

    252KB

  • memory/3128-188-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/3128-187-0x00000000051B0000-0x00000000051EF000-memory.dmp

    Filesize

    252KB

  • memory/3128-190-0x00000000009B0000-0x00000000009C0000-memory.dmp

    Filesize

    64KB

  • memory/3128-213-0x00000000051B0000-0x00000000051EF000-memory.dmp

    Filesize

    252KB

  • memory/3128-211-0x00000000051B0000-0x00000000051EF000-memory.dmp

    Filesize

    252KB

  • memory/3128-209-0x00000000051B0000-0x00000000051EF000-memory.dmp

    Filesize

    252KB

  • memory/3128-195-0x00000000009B0000-0x00000000009C0000-memory.dmp

    Filesize

    64KB

  • memory/3128-197-0x00000000051B0000-0x00000000051EF000-memory.dmp

    Filesize

    252KB

  • memory/3128-199-0x00000000051B0000-0x00000000051EF000-memory.dmp

    Filesize

    252KB

  • memory/3128-201-0x00000000051B0000-0x00000000051EF000-memory.dmp

    Filesize

    252KB

  • memory/3128-203-0x00000000051B0000-0x00000000051EF000-memory.dmp

    Filesize

    252KB

  • memory/3128-205-0x00000000051B0000-0x00000000051EF000-memory.dmp

    Filesize

    252KB

  • memory/3364-169-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/3364-160-0x00000000027E0000-0x00000000027F2000-memory.dmp

    Filesize

    72KB

  • memory/3364-137-0x0000000002470000-0x000000000248A000-memory.dmp

    Filesize

    104KB

  • memory/3364-142-0x00000000027E0000-0x00000000027F2000-memory.dmp

    Filesize

    72KB

  • memory/3364-139-0x0000000004D20000-0x000000000521E000-memory.dmp

    Filesize

    5.0MB

  • memory/3364-140-0x00000000027E0000-0x00000000027F8000-memory.dmp

    Filesize

    96KB

  • memory/3364-171-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/3364-138-0x0000000004D10000-0x0000000004D20000-memory.dmp

    Filesize

    64KB

  • memory/3364-141-0x00000000027E0000-0x00000000027F2000-memory.dmp

    Filesize

    72KB

  • memory/3364-168-0x00000000027E0000-0x00000000027F2000-memory.dmp

    Filesize

    72KB

  • memory/3364-166-0x00000000027E0000-0x00000000027F2000-memory.dmp

    Filesize

    72KB

  • memory/3364-164-0x00000000027E0000-0x00000000027F2000-memory.dmp

    Filesize

    72KB

  • memory/3364-162-0x00000000027E0000-0x00000000027F2000-memory.dmp

    Filesize

    72KB

  • memory/3364-158-0x00000000027E0000-0x00000000027F2000-memory.dmp

    Filesize

    72KB

  • memory/3364-156-0x00000000027E0000-0x00000000027F2000-memory.dmp

    Filesize

    72KB

  • memory/3364-154-0x00000000027E0000-0x00000000027F2000-memory.dmp

    Filesize

    72KB

  • memory/3364-152-0x00000000027E0000-0x00000000027F2000-memory.dmp

    Filesize

    72KB

  • memory/3364-150-0x00000000027E0000-0x00000000027F2000-memory.dmp

    Filesize

    72KB

  • memory/3364-148-0x00000000027E0000-0x00000000027F2000-memory.dmp

    Filesize

    72KB

  • memory/3364-146-0x00000000027E0000-0x00000000027F2000-memory.dmp

    Filesize

    72KB

  • memory/3364-144-0x00000000027E0000-0x00000000027F2000-memory.dmp

    Filesize

    72KB

  • memory/3364-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4804-1109-0x0000000000CB0000-0x0000000000CE2000-memory.dmp

    Filesize

    200KB

  • memory/4804-1111-0x00000000056F0000-0x000000000573B000-memory.dmp

    Filesize

    300KB

  • memory/4804-1110-0x00000000058D0000-0x00000000058E0000-memory.dmp

    Filesize

    64KB