Analysis

  • max time kernel
    93s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 19:09

General

  • Target

    17d40808f526776d33a538b043f641c4d6560b6d194a6e2e74611eac92af2230.exe

  • Size

    695KB

  • MD5

    05aa1bc627c2d88a474e913546a09941

  • SHA1

    165d4f6f585c5f704cf8b52267be8163c8e723ef

  • SHA256

    17d40808f526776d33a538b043f641c4d6560b6d194a6e2e74611eac92af2230

  • SHA512

    ee39ab2d16b0c1a0e7c6fd5f9ed1c00949f977bc5ede45b30107959454bf247cb79746d9552f95365dec0e2b6b351ded354a4d53dac4cf925cdcf5bddf1f6ae4

  • SSDEEP

    12288:JMr/y90zAUgHzDimlbJsfJ1P+IVoFMAEhjL4vPSZz1q8JLcOJI:iycAUSOmtq7qoJL4yp1Hdi

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17d40808f526776d33a538b043f641c4d6560b6d194a6e2e74611eac92af2230.exe
    "C:\Users\Admin\AppData\Local\Temp\17d40808f526776d33a538b043f641c4d6560b6d194a6e2e74611eac92af2230.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2136
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un195181.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un195181.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:644
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5239.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5239.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3464
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3645.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3645.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1944
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si704389.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si704389.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3624

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si704389.exe

    Filesize

    175KB

    MD5

    a3a601e5953ed87da549e3dd73b03afe

    SHA1

    482b88e735321f18bcf5d869e8f110c8952364b3

    SHA256

    17c3fd33589ce984bbd46b42665b87dbcfff28e6065ffbf8e4c3b2e63a45fe3a

    SHA512

    10175dc666d72fce914836bc8f28260335a15d66d77dde6bbe3b616189a301c92da8a32a0ada713bab84c63d2d173440ee56da0fc5fec9f8940aad74ddb69558

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si704389.exe

    Filesize

    175KB

    MD5

    a3a601e5953ed87da549e3dd73b03afe

    SHA1

    482b88e735321f18bcf5d869e8f110c8952364b3

    SHA256

    17c3fd33589ce984bbd46b42665b87dbcfff28e6065ffbf8e4c3b2e63a45fe3a

    SHA512

    10175dc666d72fce914836bc8f28260335a15d66d77dde6bbe3b616189a301c92da8a32a0ada713bab84c63d2d173440ee56da0fc5fec9f8940aad74ddb69558

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un195181.exe

    Filesize

    553KB

    MD5

    eb3c8c35c5ff5b3efa5acba5d1c04a1e

    SHA1

    7e16e98c08bf84a1a990175a61fd5e871b87186a

    SHA256

    6e68a0c9e807bea17da2bd9d2fe8b172e68bbec57fddbcf5afdefe143ce7e2ab

    SHA512

    c11f010affcaefbb0b7785f761a0b26c63393a502b6de4d8b19586e382dcab4a59a78d07e127f8cc22d8ca4cb474754d9938cb5f884ca0cd519f0035821ede98

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un195181.exe

    Filesize

    553KB

    MD5

    eb3c8c35c5ff5b3efa5acba5d1c04a1e

    SHA1

    7e16e98c08bf84a1a990175a61fd5e871b87186a

    SHA256

    6e68a0c9e807bea17da2bd9d2fe8b172e68bbec57fddbcf5afdefe143ce7e2ab

    SHA512

    c11f010affcaefbb0b7785f761a0b26c63393a502b6de4d8b19586e382dcab4a59a78d07e127f8cc22d8ca4cb474754d9938cb5f884ca0cd519f0035821ede98

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5239.exe

    Filesize

    308KB

    MD5

    f7a497099093f8297b74ba311ef02069

    SHA1

    bf956c7de0ad4ca81c7d99a591590fa85142fc9e

    SHA256

    038718067e18fc2f1cdd8671c66c9c02bc3b5d4091c431ed84733443865ff168

    SHA512

    7a3323e2f329e45f01ffe649888c7bcca6f4eecfd3f72c15228f702cb54279b6dd793a4f59c516091187a148bd61abe5823c6e041dff5e04a047cac00e90a9d8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5239.exe

    Filesize

    308KB

    MD5

    f7a497099093f8297b74ba311ef02069

    SHA1

    bf956c7de0ad4ca81c7d99a591590fa85142fc9e

    SHA256

    038718067e18fc2f1cdd8671c66c9c02bc3b5d4091c431ed84733443865ff168

    SHA512

    7a3323e2f329e45f01ffe649888c7bcca6f4eecfd3f72c15228f702cb54279b6dd793a4f59c516091187a148bd61abe5823c6e041dff5e04a047cac00e90a9d8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3645.exe

    Filesize

    366KB

    MD5

    01f697c6515dcd5b6e3f61d889f45074

    SHA1

    aed1657fefa61db86ab1bf3de53d204792e711e2

    SHA256

    ee1591d87fbbe8bb9a664763aebc7a271c88cf8676c58ffdc3dace54c57e21b0

    SHA512

    3c7375258a98e19668501e4126013575258c4ad5eedcf0dd45d48e17582161d7760d2d631906dbfc081f1da0c7ffc631bdc630f9848140ad0238a6de7a4e5c3a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3645.exe

    Filesize

    366KB

    MD5

    01f697c6515dcd5b6e3f61d889f45074

    SHA1

    aed1657fefa61db86ab1bf3de53d204792e711e2

    SHA256

    ee1591d87fbbe8bb9a664763aebc7a271c88cf8676c58ffdc3dace54c57e21b0

    SHA512

    3c7375258a98e19668501e4126013575258c4ad5eedcf0dd45d48e17582161d7760d2d631906dbfc081f1da0c7ffc631bdc630f9848140ad0238a6de7a4e5c3a

  • memory/1944-1102-0x0000000005B60000-0x0000000005C6A000-memory.dmp

    Filesize

    1.0MB

  • memory/1944-226-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1944-1116-0x0000000007ED0000-0x00000000083FC000-memory.dmp

    Filesize

    5.2MB

  • memory/1944-1115-0x0000000007CF0000-0x0000000007EB2000-memory.dmp

    Filesize

    1.8MB

  • memory/1944-1114-0x0000000004E80000-0x0000000004E90000-memory.dmp

    Filesize

    64KB

  • memory/1944-204-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1944-1113-0x0000000004E80000-0x0000000004E90000-memory.dmp

    Filesize

    64KB

  • memory/1944-1112-0x0000000004E80000-0x0000000004E90000-memory.dmp

    Filesize

    64KB

  • memory/1944-1111-0x0000000004E80000-0x0000000004E90000-memory.dmp

    Filesize

    64KB

  • memory/1944-1109-0x0000000006780000-0x00000000067D0000-memory.dmp

    Filesize

    320KB

  • memory/1944-1108-0x00000000066F0000-0x0000000006766000-memory.dmp

    Filesize

    472KB

  • memory/1944-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp

    Filesize

    408KB

  • memory/1944-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp

    Filesize

    584KB

  • memory/1944-206-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1944-1105-0x0000000004E80000-0x0000000004E90000-memory.dmp

    Filesize

    64KB

  • memory/1944-1104-0x0000000005C70000-0x0000000005CAC000-memory.dmp

    Filesize

    240KB

  • memory/1944-1103-0x0000000004E50000-0x0000000004E62000-memory.dmp

    Filesize

    72KB

  • memory/1944-1101-0x0000000005540000-0x0000000005B58000-memory.dmp

    Filesize

    6.1MB

  • memory/1944-228-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1944-214-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1944-224-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1944-222-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1944-220-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1944-191-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/1944-192-0x0000000004E80000-0x0000000004E90000-memory.dmp

    Filesize

    64KB

  • memory/1944-208-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1944-195-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1944-194-0x0000000004E80000-0x0000000004E90000-memory.dmp

    Filesize

    64KB

  • memory/1944-196-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1944-198-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1944-200-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1944-202-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1944-218-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1944-216-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1944-193-0x0000000004E80000-0x0000000004E90000-memory.dmp

    Filesize

    64KB

  • memory/1944-210-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/1944-212-0x00000000029C0000-0x00000000029FF000-memory.dmp

    Filesize

    252KB

  • memory/3464-182-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

    Filesize

    64KB

  • memory/3464-176-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/3464-160-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/3464-151-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

    Filesize

    64KB

  • memory/3464-152-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

    Filesize

    64KB

  • memory/3464-186-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/3464-184-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

    Filesize

    64KB

  • memory/3464-183-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

    Filesize

    64KB

  • memory/3464-154-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/3464-150-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

    Filesize

    64KB

  • memory/3464-181-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/3464-180-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/3464-178-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/3464-174-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/3464-172-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/3464-170-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/3464-168-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/3464-166-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/3464-164-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/3464-162-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/3464-158-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/3464-156-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/3464-153-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/3464-149-0x00000000007E0000-0x000000000080D000-memory.dmp

    Filesize

    180KB

  • memory/3464-148-0x0000000004EF0000-0x0000000005494000-memory.dmp

    Filesize

    5.6MB

  • memory/3624-1122-0x0000000000DD0000-0x0000000000E02000-memory.dmp

    Filesize

    200KB

  • memory/3624-1123-0x0000000005660000-0x0000000005670000-memory.dmp

    Filesize

    64KB

  • memory/3624-1124-0x0000000005660000-0x0000000005670000-memory.dmp

    Filesize

    64KB