Analysis

  • max time kernel
    144s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 19:06

General

  • Target

    33848fb648af670da89366215a5bdeee491cbe2b574a057509bf5f91f3a31284.exe

  • Size

    695KB

  • MD5

    96d93c3d5570eefa3e0ea9a102e8e952

  • SHA1

    3dd618b69af23965d37de77daecd8638c87a58c1

  • SHA256

    33848fb648af670da89366215a5bdeee491cbe2b574a057509bf5f91f3a31284

  • SHA512

    9f8055d33327e58df55559fcc85c86d9ac0043ed9aefe7e7ad425f71c57598f0cd30dd7aa7eedb758f507e12001d2a3a823cb277725c54e0c165117a50f34744

  • SSDEEP

    12288:xMrBy90RB0L6Qt6DlCpfp1JArcGuPlhc+QGMyO/rfIzBRxJVQDokPC:ky4yL6TDl4p1WrcGelhlOzIBD7/kq

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33848fb648af670da89366215a5bdeee491cbe2b574a057509bf5f91f3a31284.exe
    "C:\Users\Admin\AppData\Local\Temp\33848fb648af670da89366215a5bdeee491cbe2b574a057509bf5f91f3a31284.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4212
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un768433.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un768433.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4272
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3393.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3393.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4616
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7491.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7491.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3500
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si525803.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si525803.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4488

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si525803.exe

    Filesize

    175KB

    MD5

    0094e46f29b21ae008e7c6da1d1ecc6f

    SHA1

    39895f9b1369c067653a133d7fe05dff94607c97

    SHA256

    d18b03ab30c7630d46dcdc6abe7edd277a2b89518cf63acaeb36d3aeac4d9bc7

    SHA512

    90d438b8e424de78bdaaf79b726b7799b498239db001c6f088c67c67f8dc1d00334676b8f36e7b44b4a5b6ef4f2c49021562cf3859236007d9ccb960be347881

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si525803.exe

    Filesize

    175KB

    MD5

    0094e46f29b21ae008e7c6da1d1ecc6f

    SHA1

    39895f9b1369c067653a133d7fe05dff94607c97

    SHA256

    d18b03ab30c7630d46dcdc6abe7edd277a2b89518cf63acaeb36d3aeac4d9bc7

    SHA512

    90d438b8e424de78bdaaf79b726b7799b498239db001c6f088c67c67f8dc1d00334676b8f36e7b44b4a5b6ef4f2c49021562cf3859236007d9ccb960be347881

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un768433.exe

    Filesize

    553KB

    MD5

    0dbd56ee77f76e22a3a4ab10c576db34

    SHA1

    6955ab9d7a41118989fde5d9ba903b8539a5248f

    SHA256

    e87983538ce19ba2d7991ac4c34f28f1a648386c06baddbe05404962e3d07796

    SHA512

    13dfc01b307e5613856fe99243deff7028e46ff03ebfb573cf3ba388eb9a4d8731ac5b02af5d1804953a1542e253bc8bc9838c92a6995e5f24fc54d8be0a46ec

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un768433.exe

    Filesize

    553KB

    MD5

    0dbd56ee77f76e22a3a4ab10c576db34

    SHA1

    6955ab9d7a41118989fde5d9ba903b8539a5248f

    SHA256

    e87983538ce19ba2d7991ac4c34f28f1a648386c06baddbe05404962e3d07796

    SHA512

    13dfc01b307e5613856fe99243deff7028e46ff03ebfb573cf3ba388eb9a4d8731ac5b02af5d1804953a1542e253bc8bc9838c92a6995e5f24fc54d8be0a46ec

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3393.exe

    Filesize

    308KB

    MD5

    d9c07efeda60ab7911698fe0adc32fdc

    SHA1

    1ad174b0e47a12c18306aa07f9702998ed6ff47d

    SHA256

    d9bfe450b4f999547d56f73a577415658f7e74f9ffbce6dec4e5b154708f447b

    SHA512

    a769ff311df2f03c68714f5db27af8ac82898efb1c7aa88a0c74b1bc73491fd75c7b0426298e94d5fb87f85cde6c58dcbcacdbdb41d245d6f24f4e192757385d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3393.exe

    Filesize

    308KB

    MD5

    d9c07efeda60ab7911698fe0adc32fdc

    SHA1

    1ad174b0e47a12c18306aa07f9702998ed6ff47d

    SHA256

    d9bfe450b4f999547d56f73a577415658f7e74f9ffbce6dec4e5b154708f447b

    SHA512

    a769ff311df2f03c68714f5db27af8ac82898efb1c7aa88a0c74b1bc73491fd75c7b0426298e94d5fb87f85cde6c58dcbcacdbdb41d245d6f24f4e192757385d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7491.exe

    Filesize

    366KB

    MD5

    aa6de8dfea5c56c4fc4fc03b5fe8c2ea

    SHA1

    2dcb98f63da2f59bc410a101b93108fdd55d7bb7

    SHA256

    a74b74a0f43106a663a2aaf701ff31eb4ffc1081725edb6d1d742ee822b59e15

    SHA512

    8e202983bf843eb057c1a201d6cdd9489ea12024fdd93b79ba06ce251e2b9975898219471926b46e0ce9d51ca8b43b00c9471e03cea770d54fccb62e61c33c73

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7491.exe

    Filesize

    366KB

    MD5

    aa6de8dfea5c56c4fc4fc03b5fe8c2ea

    SHA1

    2dcb98f63da2f59bc410a101b93108fdd55d7bb7

    SHA256

    a74b74a0f43106a663a2aaf701ff31eb4ffc1081725edb6d1d742ee822b59e15

    SHA512

    8e202983bf843eb057c1a201d6cdd9489ea12024fdd93b79ba06ce251e2b9975898219471926b46e0ce9d51ca8b43b00c9471e03cea770d54fccb62e61c33c73

  • memory/3500-1092-0x0000000005B90000-0x0000000006196000-memory.dmp

    Filesize

    6.0MB

  • memory/3500-1095-0x00000000028E0000-0x000000000291E000-memory.dmp

    Filesize

    248KB

  • memory/3500-209-0x0000000002670000-0x00000000026AF000-memory.dmp

    Filesize

    252KB

  • memory/3500-195-0x0000000002670000-0x00000000026AF000-memory.dmp

    Filesize

    252KB

  • memory/3500-204-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/3500-197-0x0000000002670000-0x00000000026AF000-memory.dmp

    Filesize

    252KB

  • memory/3500-207-0x0000000002670000-0x00000000026AF000-memory.dmp

    Filesize

    252KB

  • memory/3500-205-0x0000000002670000-0x00000000026AF000-memory.dmp

    Filesize

    252KB

  • memory/3500-1108-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/3500-1107-0x0000000006FA0000-0x0000000006FF0000-memory.dmp

    Filesize

    320KB

  • memory/3500-1106-0x0000000006F20000-0x0000000006F96000-memory.dmp

    Filesize

    472KB

  • memory/3500-1105-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/3500-1104-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/3500-1103-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/3500-1101-0x00000000067C0000-0x0000000006CEC000-memory.dmp

    Filesize

    5.2MB

  • memory/3500-1100-0x00000000065F0000-0x00000000067B2000-memory.dmp

    Filesize

    1.8MB

  • memory/3500-1099-0x00000000058D0000-0x0000000005936000-memory.dmp

    Filesize

    408KB

  • memory/3500-1098-0x0000000005830000-0x00000000058C2000-memory.dmp

    Filesize

    584KB

  • memory/3500-199-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/3500-1097-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/3500-1096-0x0000000004EA0000-0x0000000004EEB000-memory.dmp

    Filesize

    300KB

  • memory/3500-211-0x0000000002670000-0x00000000026AF000-memory.dmp

    Filesize

    252KB

  • memory/3500-1094-0x00000000028C0000-0x00000000028D2000-memory.dmp

    Filesize

    72KB

  • memory/3500-1093-0x0000000005580000-0x000000000568A000-memory.dmp

    Filesize

    1.0MB

  • memory/3500-219-0x0000000002670000-0x00000000026AF000-memory.dmp

    Filesize

    252KB

  • memory/3500-180-0x0000000002580000-0x00000000025C6000-memory.dmp

    Filesize

    280KB

  • memory/3500-181-0x0000000002670000-0x00000000026B4000-memory.dmp

    Filesize

    272KB

  • memory/3500-182-0x0000000002670000-0x00000000026AF000-memory.dmp

    Filesize

    252KB

  • memory/3500-183-0x0000000002670000-0x00000000026AF000-memory.dmp

    Filesize

    252KB

  • memory/3500-185-0x0000000002670000-0x00000000026AF000-memory.dmp

    Filesize

    252KB

  • memory/3500-187-0x0000000002670000-0x00000000026AF000-memory.dmp

    Filesize

    252KB

  • memory/3500-189-0x0000000002670000-0x00000000026AF000-memory.dmp

    Filesize

    252KB

  • memory/3500-191-0x0000000002670000-0x00000000026AF000-memory.dmp

    Filesize

    252KB

  • memory/3500-193-0x0000000002670000-0x00000000026AF000-memory.dmp

    Filesize

    252KB

  • memory/3500-217-0x0000000002670000-0x00000000026AF000-memory.dmp

    Filesize

    252KB

  • memory/3500-215-0x0000000002670000-0x00000000026AF000-memory.dmp

    Filesize

    252KB

  • memory/3500-213-0x0000000002670000-0x00000000026AF000-memory.dmp

    Filesize

    252KB

  • memory/3500-200-0x0000000002670000-0x00000000026AF000-memory.dmp

    Filesize

    252KB

  • memory/3500-202-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/3500-201-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/4488-1114-0x0000000000A00000-0x0000000000A32000-memory.dmp

    Filesize

    200KB

  • memory/4488-1115-0x0000000005440000-0x000000000548B000-memory.dmp

    Filesize

    300KB

  • memory/4488-1116-0x00000000055E0000-0x00000000055F0000-memory.dmp

    Filesize

    64KB

  • memory/4488-1117-0x00000000055E0000-0x00000000055F0000-memory.dmp

    Filesize

    64KB

  • memory/4616-170-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4616-139-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/4616-145-0x0000000002590000-0x00000000025A2000-memory.dmp

    Filesize

    72KB

  • memory/4616-142-0x0000000002590000-0x00000000025A2000-memory.dmp

    Filesize

    72KB

  • memory/4616-138-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4616-137-0x0000000002590000-0x00000000025A8000-memory.dmp

    Filesize

    96KB

  • memory/4616-140-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/4616-175-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4616-173-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/4616-172-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/4616-171-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/4616-169-0x0000000002590000-0x00000000025A2000-memory.dmp

    Filesize

    72KB

  • memory/4616-167-0x0000000002590000-0x00000000025A2000-memory.dmp

    Filesize

    72KB

  • memory/4616-165-0x0000000002590000-0x00000000025A2000-memory.dmp

    Filesize

    72KB

  • memory/4616-163-0x0000000002590000-0x00000000025A2000-memory.dmp

    Filesize

    72KB

  • memory/4616-161-0x0000000002590000-0x00000000025A2000-memory.dmp

    Filesize

    72KB

  • memory/4616-159-0x0000000002590000-0x00000000025A2000-memory.dmp

    Filesize

    72KB

  • memory/4616-157-0x0000000002590000-0x00000000025A2000-memory.dmp

    Filesize

    72KB

  • memory/4616-155-0x0000000002590000-0x00000000025A2000-memory.dmp

    Filesize

    72KB

  • memory/4616-153-0x0000000002590000-0x00000000025A2000-memory.dmp

    Filesize

    72KB

  • memory/4616-151-0x0000000002590000-0x00000000025A2000-memory.dmp

    Filesize

    72KB

  • memory/4616-136-0x0000000004E80000-0x000000000537E000-memory.dmp

    Filesize

    5.0MB

  • memory/4616-135-0x0000000000950000-0x000000000096A000-memory.dmp

    Filesize

    104KB

  • memory/4616-149-0x0000000002590000-0x00000000025A2000-memory.dmp

    Filesize

    72KB

  • memory/4616-147-0x0000000002590000-0x00000000025A2000-memory.dmp

    Filesize

    72KB

  • memory/4616-143-0x0000000002590000-0x00000000025A2000-memory.dmp

    Filesize

    72KB

  • memory/4616-141-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB