Analysis

  • max time kernel
    144s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 19:04

General

  • Target

    e771efe3f14773b75c46208eb19692fa5f4ffdeaf89702aaaa0207e7f7796f53.exe

  • Size

    696KB

  • MD5

    e0342ece768924c690e80173c66b04c2

  • SHA1

    83d0e964ecd31e571461f6acec8daa6e543add03

  • SHA256

    e771efe3f14773b75c46208eb19692fa5f4ffdeaf89702aaaa0207e7f7796f53

  • SHA512

    b6ce82898ad4ce423a61c2aa5c6859742805e24f206d1b41b639bc4ce565d27acd57e3b2991a3c479a8635caf13462697a826b12a88925413708e0caed9a90e4

  • SSDEEP

    12288:TMr3y9029wlReYh9lkRkfDK0HI4h4trtQ8wEg7fzLSzJcwaVmk7KlI:4yFsnK0Hr+tpCLESVmk7gI

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e771efe3f14773b75c46208eb19692fa5f4ffdeaf89702aaaa0207e7f7796f53.exe
    "C:\Users\Admin\AppData\Local\Temp\e771efe3f14773b75c46208eb19692fa5f4ffdeaf89702aaaa0207e7f7796f53.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3820
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un627139.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un627139.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3488
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1512.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1512.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1436
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6549.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6549.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4552
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si195595.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si195595.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3992
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:3440

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si195595.exe

    Filesize

    175KB

    MD5

    b676210353f24721d13ce69d63eb83ed

    SHA1

    5302734fe0bc5e007ddd33a9884a3158ccf1e57c

    SHA256

    bfca093252316b8cc4cf02d30ba8fac27d8c07600ab05911c4d1459bd540b388

    SHA512

    2632f83496092d8ef749d3fc99e3ef3b28516d974dbc5cab532888b12ee59c68b31426043a66d9dba12d82a9d7697eed0ada1debb02529d32de02a29775a4eee

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si195595.exe

    Filesize

    175KB

    MD5

    b676210353f24721d13ce69d63eb83ed

    SHA1

    5302734fe0bc5e007ddd33a9884a3158ccf1e57c

    SHA256

    bfca093252316b8cc4cf02d30ba8fac27d8c07600ab05911c4d1459bd540b388

    SHA512

    2632f83496092d8ef749d3fc99e3ef3b28516d974dbc5cab532888b12ee59c68b31426043a66d9dba12d82a9d7697eed0ada1debb02529d32de02a29775a4eee

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un627139.exe

    Filesize

    553KB

    MD5

    feb9e1165d3716bf2b8573a49ea7a270

    SHA1

    99955e8ce60a942a31c6a98366a6366a6f9e1d01

    SHA256

    779d78a1ae8e0561ad29e8632066f8c4e135c0342484e569a03d1f5c49c7c741

    SHA512

    e52427ccb14a67634d72afc295e33d1285930fa4914029e8fec8e815835cf78cc56be558b4a043f0df3e60aae31c4c83d3add9e1f8a9b108eefd06a7368ea356

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un627139.exe

    Filesize

    553KB

    MD5

    feb9e1165d3716bf2b8573a49ea7a270

    SHA1

    99955e8ce60a942a31c6a98366a6366a6f9e1d01

    SHA256

    779d78a1ae8e0561ad29e8632066f8c4e135c0342484e569a03d1f5c49c7c741

    SHA512

    e52427ccb14a67634d72afc295e33d1285930fa4914029e8fec8e815835cf78cc56be558b4a043f0df3e60aae31c4c83d3add9e1f8a9b108eefd06a7368ea356

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1512.exe

    Filesize

    308KB

    MD5

    ea7f6a91d917436193a0abdb51b47919

    SHA1

    9e67ea1a91ae03aadce334ab8eb75bfc99a012f9

    SHA256

    877605010f4e817dd30b88e2da7329badc2f02a731f712d260955d4f61bbf753

    SHA512

    34cd059c0a9b13a062ad43afd6895c5af12bd860afcbdf6fed1f5d8efa890d2dca3e419ad7127e17e4c168152f23c41d9d790397dcfa634d22ca332ea4d7b1cd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1512.exe

    Filesize

    308KB

    MD5

    ea7f6a91d917436193a0abdb51b47919

    SHA1

    9e67ea1a91ae03aadce334ab8eb75bfc99a012f9

    SHA256

    877605010f4e817dd30b88e2da7329badc2f02a731f712d260955d4f61bbf753

    SHA512

    34cd059c0a9b13a062ad43afd6895c5af12bd860afcbdf6fed1f5d8efa890d2dca3e419ad7127e17e4c168152f23c41d9d790397dcfa634d22ca332ea4d7b1cd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6549.exe

    Filesize

    366KB

    MD5

    bf10fcbcf2c78660f39ea2b02a5dbc0f

    SHA1

    052ab74ad4e5fb2322b5e8109198f89415a4427f

    SHA256

    f1b64bc5ab63e3e3ee2fd6291fa48afc6ec03286bc4e9cebf9eee70f340198b0

    SHA512

    ec0b9c148feca41ed9b26e9e03a946953ce1c336e6c0ede08b651b4eacfc549a1e6df118538953f70ad48f9af1a6e05ee7dee9a47358c7e0809545878dfdc42f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6549.exe

    Filesize

    366KB

    MD5

    bf10fcbcf2c78660f39ea2b02a5dbc0f

    SHA1

    052ab74ad4e5fb2322b5e8109198f89415a4427f

    SHA256

    f1b64bc5ab63e3e3ee2fd6291fa48afc6ec03286bc4e9cebf9eee70f340198b0

    SHA512

    ec0b9c148feca41ed9b26e9e03a946953ce1c336e6c0ede08b651b4eacfc549a1e6df118538953f70ad48f9af1a6e05ee7dee9a47358c7e0809545878dfdc42f

  • memory/1436-158-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB

  • memory/1436-168-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB

  • memory/1436-150-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/1436-151-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/1436-152-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/1436-153-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB

  • memory/1436-154-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB

  • memory/1436-156-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB

  • memory/1436-148-0x0000000004E30000-0x00000000053D4000-memory.dmp

    Filesize

    5.6MB

  • memory/1436-160-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB

  • memory/1436-162-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB

  • memory/1436-164-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB

  • memory/1436-166-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB

  • memory/1436-149-0x00000000007E0000-0x000000000080D000-memory.dmp

    Filesize

    180KB

  • memory/1436-170-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB

  • memory/1436-172-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB

  • memory/1436-174-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB

  • memory/1436-176-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB

  • memory/1436-178-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB

  • memory/1436-180-0x0000000002700000-0x0000000002712000-memory.dmp

    Filesize

    72KB

  • memory/1436-181-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/1436-182-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/1436-183-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/1436-184-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/1436-186-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/3992-1121-0x0000000000540000-0x0000000000572000-memory.dmp

    Filesize

    200KB

  • memory/3992-1122-0x00000000051B0000-0x00000000051C0000-memory.dmp

    Filesize

    64KB

  • memory/4552-191-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4552-223-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4552-196-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4552-198-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4552-200-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4552-202-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4552-205-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4552-204-0x0000000000830000-0x000000000087B000-memory.dmp

    Filesize

    300KB

  • memory/4552-206-0x0000000004C80000-0x0000000004C90000-memory.dmp

    Filesize

    64KB

  • memory/4552-209-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4552-208-0x0000000004C80000-0x0000000004C90000-memory.dmp

    Filesize

    64KB

  • memory/4552-211-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4552-213-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4552-215-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4552-217-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4552-219-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4552-221-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4552-194-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4552-225-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4552-227-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4552-1100-0x0000000005340000-0x0000000005958000-memory.dmp

    Filesize

    6.1MB

  • memory/4552-1101-0x00000000059C0000-0x0000000005ACA000-memory.dmp

    Filesize

    1.0MB

  • memory/4552-1102-0x0000000005B00000-0x0000000005B12000-memory.dmp

    Filesize

    72KB

  • memory/4552-1103-0x0000000005B20000-0x0000000005B5C000-memory.dmp

    Filesize

    240KB

  • memory/4552-1104-0x0000000004C80000-0x0000000004C90000-memory.dmp

    Filesize

    64KB

  • memory/4552-1105-0x0000000005E10000-0x0000000005E76000-memory.dmp

    Filesize

    408KB

  • memory/4552-1106-0x00000000064C0000-0x0000000006552000-memory.dmp

    Filesize

    584KB

  • memory/4552-1108-0x00000000065B0000-0x0000000006626000-memory.dmp

    Filesize

    472KB

  • memory/4552-1109-0x0000000006640000-0x0000000006690000-memory.dmp

    Filesize

    320KB

  • memory/4552-1110-0x0000000004C80000-0x0000000004C90000-memory.dmp

    Filesize

    64KB

  • memory/4552-1111-0x0000000004C80000-0x0000000004C90000-memory.dmp

    Filesize

    64KB

  • memory/4552-1112-0x0000000004C80000-0x0000000004C90000-memory.dmp

    Filesize

    64KB

  • memory/4552-192-0x0000000004BD0000-0x0000000004C0F000-memory.dmp

    Filesize

    252KB

  • memory/4552-1113-0x00000000067B0000-0x0000000006972000-memory.dmp

    Filesize

    1.8MB

  • memory/4552-1114-0x00000000069A0000-0x0000000006ECC000-memory.dmp

    Filesize

    5.2MB

  • memory/4552-1115-0x0000000004C80000-0x0000000004C90000-memory.dmp

    Filesize

    64KB