Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 19:14

General

  • Target

    30c242261429b0980046f2a50269df76f1891b88b0a1e39a85d67ff0092fec61.exe

  • Size

    696KB

  • MD5

    94a6d42b3bb02191d72f19c586b1b372

  • SHA1

    939f85959f1f7bcfd1e90dcb28f781efd617a127

  • SHA256

    30c242261429b0980046f2a50269df76f1891b88b0a1e39a85d67ff0092fec61

  • SHA512

    cd70b1eb6b4cd1622da5a005a292b2448de3349c24b657eb5f1a17af162d2e48124318d8289738244ea83d1d277792eee564fada71c24e02c93852df5af3f8e9

  • SSDEEP

    12288:CMrSy90YvCqIrdppLwDkHDtwATG0oTjVANyV82dERfjzxPwJEcKA6ktlvFQwAhEz:oy5xsdpp8DSxlBiVAoVbuRfPxo7tldfz

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\30c242261429b0980046f2a50269df76f1891b88b0a1e39a85d67ff0092fec61.exe
    "C:\Users\Admin\AppData\Local\Temp\30c242261429b0980046f2a50269df76f1891b88b0a1e39a85d67ff0092fec61.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:420
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un984916.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un984916.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3652
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1567.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1567.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4608
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9336.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9336.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4736
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si169670.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si169670.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3016

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si169670.exe

    Filesize

    175KB

    MD5

    f0b1723f91bab8a95007aa6a3690e1dd

    SHA1

    72a9025f84df9dc5fe5e258d36e48640ba489db3

    SHA256

    bf43c785204c43f892f0fd2c9646bcbaa2f91037e0cbc7da6dbc372cf11ea810

    SHA512

    e16f4d7821a325e38c3e7dec212614830ddf82cdf3b63a1486d1cc0af777149fa9e466b6bd1baa4c743b1f82218340afb5ff86b50873ce8964ebb17cf6f89ad4

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si169670.exe

    Filesize

    175KB

    MD5

    f0b1723f91bab8a95007aa6a3690e1dd

    SHA1

    72a9025f84df9dc5fe5e258d36e48640ba489db3

    SHA256

    bf43c785204c43f892f0fd2c9646bcbaa2f91037e0cbc7da6dbc372cf11ea810

    SHA512

    e16f4d7821a325e38c3e7dec212614830ddf82cdf3b63a1486d1cc0af777149fa9e466b6bd1baa4c743b1f82218340afb5ff86b50873ce8964ebb17cf6f89ad4

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un984916.exe

    Filesize

    553KB

    MD5

    45215a13d0ffc4d6ac5c79ffeb084a33

    SHA1

    c6c275e7c055e8084815cf9835775354c3a9345e

    SHA256

    7ec5aec69af94b8912bfed74ab742923741e68dfce72421e0c3f416a0371cfc1

    SHA512

    965a6cc6043a6e4a36714eb962ff9306ae411f00f14d288721794fc75767712cffaf14509176f705aa61f4fe76f201f11d7b0cc75ac407430c3e29eb10e52d44

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un984916.exe

    Filesize

    553KB

    MD5

    45215a13d0ffc4d6ac5c79ffeb084a33

    SHA1

    c6c275e7c055e8084815cf9835775354c3a9345e

    SHA256

    7ec5aec69af94b8912bfed74ab742923741e68dfce72421e0c3f416a0371cfc1

    SHA512

    965a6cc6043a6e4a36714eb962ff9306ae411f00f14d288721794fc75767712cffaf14509176f705aa61f4fe76f201f11d7b0cc75ac407430c3e29eb10e52d44

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1567.exe

    Filesize

    308KB

    MD5

    2aba70b792aca5a4e6f5f14a5bd54c85

    SHA1

    a250b8a343b58236cf7cbdd640b0ea6d5e4791e9

    SHA256

    033e6d84b2da7a59b523a3fb88011656b9cdc65688a0e4e4e47afb3153fc4718

    SHA512

    6a727ec8996ad3aa2fd5c7a0c71245b0f5111d6cfc1d2f573a66406db7098db4df6bb5d0f936d6532d1b5d59a452b9fd8ad2f9aafa138a0b1be1f5942908c2c8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1567.exe

    Filesize

    308KB

    MD5

    2aba70b792aca5a4e6f5f14a5bd54c85

    SHA1

    a250b8a343b58236cf7cbdd640b0ea6d5e4791e9

    SHA256

    033e6d84b2da7a59b523a3fb88011656b9cdc65688a0e4e4e47afb3153fc4718

    SHA512

    6a727ec8996ad3aa2fd5c7a0c71245b0f5111d6cfc1d2f573a66406db7098db4df6bb5d0f936d6532d1b5d59a452b9fd8ad2f9aafa138a0b1be1f5942908c2c8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9336.exe

    Filesize

    366KB

    MD5

    87695336e806ddd0b76a3a2e68a26eda

    SHA1

    0117a48402990ab0ec77267ae57b23dd528ad64c

    SHA256

    9e5375dca7cf5b52c060a9a8627c0f0fbdf6b49949a4198e2814744f4b54db17

    SHA512

    25c505fa862b283943d1c6926295e19363ad120235d53f884d3430fc691d2b674c28cf6c6edf68a371a8165d2fd832949eaa08357017e27e580f2555b95fc46e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9336.exe

    Filesize

    366KB

    MD5

    87695336e806ddd0b76a3a2e68a26eda

    SHA1

    0117a48402990ab0ec77267ae57b23dd528ad64c

    SHA256

    9e5375dca7cf5b52c060a9a8627c0f0fbdf6b49949a4198e2814744f4b54db17

    SHA512

    25c505fa862b283943d1c6926295e19363ad120235d53f884d3430fc691d2b674c28cf6c6edf68a371a8165d2fd832949eaa08357017e27e580f2555b95fc46e

  • memory/3016-1111-0x0000000000AD0000-0x0000000000B02000-memory.dmp

    Filesize

    200KB

  • memory/3016-1112-0x0000000005510000-0x000000000555B000-memory.dmp

    Filesize

    300KB

  • memory/3016-1113-0x0000000005350000-0x0000000005360000-memory.dmp

    Filesize

    64KB

  • memory/4608-142-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/4608-154-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/4608-137-0x00000000024B0000-0x00000000024C0000-memory.dmp

    Filesize

    64KB

  • memory/4608-135-0x0000000000710000-0x000000000073D000-memory.dmp

    Filesize

    180KB

  • memory/4608-138-0x00000000024B0000-0x00000000024C0000-memory.dmp

    Filesize

    64KB

  • memory/4608-140-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/4608-139-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/4608-134-0x0000000002630000-0x0000000002648000-memory.dmp

    Filesize

    96KB

  • memory/4608-144-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/4608-146-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/4608-148-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/4608-150-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/4608-152-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/4608-136-0x00000000024B0000-0x00000000024C0000-memory.dmp

    Filesize

    64KB

  • memory/4608-156-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/4608-158-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/4608-160-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/4608-162-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/4608-164-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/4608-166-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/4608-167-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4608-168-0x00000000024B0000-0x00000000024C0000-memory.dmp

    Filesize

    64KB

  • memory/4608-169-0x00000000024B0000-0x00000000024C0000-memory.dmp

    Filesize

    64KB

  • memory/4608-170-0x00000000024B0000-0x00000000024C0000-memory.dmp

    Filesize

    64KB

  • memory/4608-172-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4608-133-0x0000000004DB0000-0x00000000052AE000-memory.dmp

    Filesize

    5.0MB

  • memory/4608-132-0x0000000002360000-0x000000000237A000-memory.dmp

    Filesize

    104KB

  • memory/4736-179-0x0000000002750000-0x000000000278F000-memory.dmp

    Filesize

    252KB

  • memory/4736-216-0x0000000002510000-0x0000000002520000-memory.dmp

    Filesize

    64KB

  • memory/4736-182-0x0000000002750000-0x000000000278F000-memory.dmp

    Filesize

    252KB

  • memory/4736-184-0x0000000002750000-0x000000000278F000-memory.dmp

    Filesize

    252KB

  • memory/4736-186-0x0000000002750000-0x000000000278F000-memory.dmp

    Filesize

    252KB

  • memory/4736-188-0x0000000002750000-0x000000000278F000-memory.dmp

    Filesize

    252KB

  • memory/4736-190-0x0000000002750000-0x000000000278F000-memory.dmp

    Filesize

    252KB

  • memory/4736-192-0x0000000002750000-0x000000000278F000-memory.dmp

    Filesize

    252KB

  • memory/4736-194-0x0000000002750000-0x000000000278F000-memory.dmp

    Filesize

    252KB

  • memory/4736-196-0x0000000002750000-0x000000000278F000-memory.dmp

    Filesize

    252KB

  • memory/4736-198-0x0000000002750000-0x000000000278F000-memory.dmp

    Filesize

    252KB

  • memory/4736-200-0x0000000002750000-0x000000000278F000-memory.dmp

    Filesize

    252KB

  • memory/4736-202-0x0000000002750000-0x000000000278F000-memory.dmp

    Filesize

    252KB

  • memory/4736-204-0x0000000002750000-0x000000000278F000-memory.dmp

    Filesize

    252KB

  • memory/4736-206-0x0000000002750000-0x000000000278F000-memory.dmp

    Filesize

    252KB

  • memory/4736-208-0x0000000002750000-0x000000000278F000-memory.dmp

    Filesize

    252KB

  • memory/4736-210-0x0000000002750000-0x000000000278F000-memory.dmp

    Filesize

    252KB

  • memory/4736-212-0x0000000002750000-0x000000000278F000-memory.dmp

    Filesize

    252KB

  • memory/4736-214-0x0000000000770000-0x00000000007BB000-memory.dmp

    Filesize

    300KB

  • memory/4736-180-0x0000000002750000-0x000000000278F000-memory.dmp

    Filesize

    252KB

  • memory/4736-218-0x0000000002510000-0x0000000002520000-memory.dmp

    Filesize

    64KB

  • memory/4736-220-0x0000000002510000-0x0000000002520000-memory.dmp

    Filesize

    64KB

  • memory/4736-1089-0x0000000005370000-0x0000000005976000-memory.dmp

    Filesize

    6.0MB

  • memory/4736-1090-0x0000000005A00000-0x0000000005B0A000-memory.dmp

    Filesize

    1.0MB

  • memory/4736-1091-0x0000000005B40000-0x0000000005B52000-memory.dmp

    Filesize

    72KB

  • memory/4736-1092-0x0000000005B60000-0x0000000005B9E000-memory.dmp

    Filesize

    248KB

  • memory/4736-1093-0x0000000005CB0000-0x0000000005CFB000-memory.dmp

    Filesize

    300KB

  • memory/4736-1094-0x0000000002510000-0x0000000002520000-memory.dmp

    Filesize

    64KB

  • memory/4736-1095-0x0000000005E40000-0x0000000005EA6000-memory.dmp

    Filesize

    408KB

  • memory/4736-1096-0x0000000006510000-0x00000000065A2000-memory.dmp

    Filesize

    584KB

  • memory/4736-1098-0x00000000065E0000-0x00000000067A2000-memory.dmp

    Filesize

    1.8MB

  • memory/4736-1099-0x00000000067B0000-0x0000000006CDC000-memory.dmp

    Filesize

    5.2MB

  • memory/4736-1100-0x0000000002510000-0x0000000002520000-memory.dmp

    Filesize

    64KB

  • memory/4736-1101-0x0000000002510000-0x0000000002520000-memory.dmp

    Filesize

    64KB

  • memory/4736-1102-0x0000000002510000-0x0000000002520000-memory.dmp

    Filesize

    64KB

  • memory/4736-178-0x0000000002750000-0x0000000002794000-memory.dmp

    Filesize

    272KB

  • memory/4736-177-0x0000000002330000-0x0000000002376000-memory.dmp

    Filesize

    280KB

  • memory/4736-1103-0x0000000007060000-0x00000000070D6000-memory.dmp

    Filesize

    472KB

  • memory/4736-1104-0x00000000070E0000-0x0000000007130000-memory.dmp

    Filesize

    320KB

  • memory/4736-1105-0x0000000002510000-0x0000000002520000-memory.dmp

    Filesize

    64KB