Analysis

  • max time kernel
    87s
  • max time network
    117s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 19:18

General

  • Target

    a2768446ceae346237df402d45ee9982b1d69dc85a67982c9b7dd0ebdf054bd6.exe

  • Size

    696KB

  • MD5

    cfe3d4d2b964d73c9db203588342a916

  • SHA1

    56e688a6b3e9131dcc2ef3bc18b3396cdf226d89

  • SHA256

    a2768446ceae346237df402d45ee9982b1d69dc85a67982c9b7dd0ebdf054bd6

  • SHA512

    ffd12cbee11cbfd478869e1af9ccfdf0f40f2aba45f5b6e45a5d8e0ecb3bce5b4911f2979b8c63e813122463df6c9712a66f925e6bf651b572c7d5004acf62f5

  • SSDEEP

    12288:LMrby908Ktx7h5YR5w8wSWf0oaBJG44ks++gY1D2DZJSC2J5ZW0+Vc:4ySLh5ORWsoaLgZ1D2leZWxVc

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2768446ceae346237df402d45ee9982b1d69dc85a67982c9b7dd0ebdf054bd6.exe
    "C:\Users\Admin\AppData\Local\Temp\a2768446ceae346237df402d45ee9982b1d69dc85a67982c9b7dd0ebdf054bd6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3744
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un318603.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un318603.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4544
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1775.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1775.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1268
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2230.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2230.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2380
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si323375.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si323375.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:876

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si323375.exe

    Filesize

    175KB

    MD5

    2086f799d04d5b6bfa673c5dbb93a0ae

    SHA1

    ebc7d7c8bd32b3c5910a61b6693f048979d9bb97

    SHA256

    9cb03c49deef4ebfd15b102cd2de16ae95f8c05e9147ab6254bda01285c2a29a

    SHA512

    91c8efd0541381f1184986ade8b9df3b289a03a5642cc6ccfed5383fa837160b78e9946cc9e03c8d7296990b359f0d3f338c479830cb766b6bfbf9edef5c548d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si323375.exe

    Filesize

    175KB

    MD5

    2086f799d04d5b6bfa673c5dbb93a0ae

    SHA1

    ebc7d7c8bd32b3c5910a61b6693f048979d9bb97

    SHA256

    9cb03c49deef4ebfd15b102cd2de16ae95f8c05e9147ab6254bda01285c2a29a

    SHA512

    91c8efd0541381f1184986ade8b9df3b289a03a5642cc6ccfed5383fa837160b78e9946cc9e03c8d7296990b359f0d3f338c479830cb766b6bfbf9edef5c548d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un318603.exe

    Filesize

    554KB

    MD5

    2cf7e59a973960281f445a5e5909600d

    SHA1

    04052ed8355a8f154e2c2e466e4bf6882c13cfd9

    SHA256

    778354ad4834f9e5d7372c604628b9285fe76ad9d8c7c83e01ac339d2b50c35b

    SHA512

    11e5b6b7fb87c4890ed6705acd9bf5fb05fc4e30d703c5e791b97c13c234ac84ede02b24199f18d7725a7907b788b657a9fc08643ec096dd290d941131844709

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un318603.exe

    Filesize

    554KB

    MD5

    2cf7e59a973960281f445a5e5909600d

    SHA1

    04052ed8355a8f154e2c2e466e4bf6882c13cfd9

    SHA256

    778354ad4834f9e5d7372c604628b9285fe76ad9d8c7c83e01ac339d2b50c35b

    SHA512

    11e5b6b7fb87c4890ed6705acd9bf5fb05fc4e30d703c5e791b97c13c234ac84ede02b24199f18d7725a7907b788b657a9fc08643ec096dd290d941131844709

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1775.exe

    Filesize

    308KB

    MD5

    359cf873db253506505157e2936e3a45

    SHA1

    a25656dfc39d13555bb2cb8b96e6dd4881670324

    SHA256

    61c0a61e7d41267ce079e9f56413fbb540733585db56d6817af8650497b1d82f

    SHA512

    64696cabbf72881b8875dafa41fa897634590cd27fc2cd0af7ae2ad463d7595c6c8905f45da508cffa70baa9d3f26cf81424a06313633bea0316d6f654b39a4f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1775.exe

    Filesize

    308KB

    MD5

    359cf873db253506505157e2936e3a45

    SHA1

    a25656dfc39d13555bb2cb8b96e6dd4881670324

    SHA256

    61c0a61e7d41267ce079e9f56413fbb540733585db56d6817af8650497b1d82f

    SHA512

    64696cabbf72881b8875dafa41fa897634590cd27fc2cd0af7ae2ad463d7595c6c8905f45da508cffa70baa9d3f26cf81424a06313633bea0316d6f654b39a4f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2230.exe

    Filesize

    366KB

    MD5

    b242c43c108a2a8a55af73e82085fe1b

    SHA1

    d02dc96deeda2442e325c88f4fcba4acfe8296c8

    SHA256

    99c4030249304655d1a19262ce501c0531419ccb5fd7ca9e062c95e2b2709c51

    SHA512

    04cef26ba51206309d4ea78b6f2ec0daf6ee89af6ff6f8bf9abfba538e8d0d61f0f2f0114a1601638e616ad5ae5db0158d2ff8425a1c1efc32efc49dd089c8a0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2230.exe

    Filesize

    366KB

    MD5

    b242c43c108a2a8a55af73e82085fe1b

    SHA1

    d02dc96deeda2442e325c88f4fcba4acfe8296c8

    SHA256

    99c4030249304655d1a19262ce501c0531419ccb5fd7ca9e062c95e2b2709c51

    SHA512

    04cef26ba51206309d4ea78b6f2ec0daf6ee89af6ff6f8bf9abfba538e8d0d61f0f2f0114a1601638e616ad5ae5db0158d2ff8425a1c1efc32efc49dd089c8a0

  • memory/876-1121-0x00000000007E0000-0x0000000000812000-memory.dmp

    Filesize

    200KB

  • memory/876-1122-0x0000000005060000-0x0000000005070000-memory.dmp

    Filesize

    64KB

  • memory/876-1123-0x0000000005060000-0x0000000005070000-memory.dmp

    Filesize

    64KB

  • memory/1268-158-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/1268-170-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/1268-152-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/1268-154-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/1268-156-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/1268-150-0x0000000004CB0000-0x0000000005254000-memory.dmp

    Filesize

    5.6MB

  • memory/1268-160-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/1268-162-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/1268-164-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/1268-166-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/1268-168-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/1268-151-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/1268-172-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/1268-174-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/1268-176-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/1268-178-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/1268-179-0x0000000002620000-0x0000000002630000-memory.dmp

    Filesize

    64KB

  • memory/1268-180-0x0000000002620000-0x0000000002630000-memory.dmp

    Filesize

    64KB

  • memory/1268-181-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/1268-182-0x0000000002620000-0x0000000002630000-memory.dmp

    Filesize

    64KB

  • memory/1268-184-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/1268-185-0x0000000002620000-0x0000000002630000-memory.dmp

    Filesize

    64KB

  • memory/1268-149-0x0000000002620000-0x0000000002630000-memory.dmp

    Filesize

    64KB

  • memory/1268-148-0x0000000000710000-0x000000000073D000-memory.dmp

    Filesize

    180KB

  • memory/2380-195-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/2380-227-0x0000000002670000-0x0000000002680000-memory.dmp

    Filesize

    64KB

  • memory/2380-197-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/2380-199-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/2380-201-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/2380-203-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/2380-205-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/2380-207-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/2380-209-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/2380-211-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/2380-213-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/2380-215-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/2380-217-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/2380-219-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/2380-221-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/2380-224-0x0000000000840000-0x000000000088B000-memory.dmp

    Filesize

    300KB

  • memory/2380-223-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/2380-226-0x0000000002670000-0x0000000002680000-memory.dmp

    Filesize

    64KB

  • memory/2380-229-0x0000000002670000-0x0000000002680000-memory.dmp

    Filesize

    64KB

  • memory/2380-193-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/2380-1100-0x0000000005360000-0x0000000005978000-memory.dmp

    Filesize

    6.1MB

  • memory/2380-1101-0x00000000059C0000-0x0000000005ACA000-memory.dmp

    Filesize

    1.0MB

  • memory/2380-1102-0x0000000005B00000-0x0000000005B12000-memory.dmp

    Filesize

    72KB

  • memory/2380-1103-0x0000000005B20000-0x0000000005B5C000-memory.dmp

    Filesize

    240KB

  • memory/2380-1104-0x0000000002670000-0x0000000002680000-memory.dmp

    Filesize

    64KB

  • memory/2380-1105-0x0000000005E10000-0x0000000005EA2000-memory.dmp

    Filesize

    584KB

  • memory/2380-1106-0x0000000005EB0000-0x0000000005F16000-memory.dmp

    Filesize

    408KB

  • memory/2380-1108-0x00000000065C0000-0x0000000006636000-memory.dmp

    Filesize

    472KB

  • memory/2380-1109-0x0000000006640000-0x0000000006690000-memory.dmp

    Filesize

    320KB

  • memory/2380-1110-0x0000000002670000-0x0000000002680000-memory.dmp

    Filesize

    64KB

  • memory/2380-1111-0x0000000002670000-0x0000000002680000-memory.dmp

    Filesize

    64KB

  • memory/2380-1112-0x0000000002670000-0x0000000002680000-memory.dmp

    Filesize

    64KB

  • memory/2380-191-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/2380-190-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/2380-1113-0x0000000002670000-0x0000000002680000-memory.dmp

    Filesize

    64KB

  • memory/2380-1114-0x0000000007B30000-0x0000000007CF2000-memory.dmp

    Filesize

    1.8MB

  • memory/2380-1115-0x0000000007D00000-0x000000000822C000-memory.dmp

    Filesize

    5.2MB