Analysis

  • max time kernel
    50s
  • max time network
    61s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 20:19

General

  • Target

    a27fbd52a2db4a5fbfa0acb56b00adca8e2cd213872f4bc33164d48d6d2ec6c9.exe

  • Size

    695KB

  • MD5

    17f173abc112f347be4acf072c9fe6ef

  • SHA1

    774bf1d52858124c6e5e00c260d22515294ed80e

  • SHA256

    a27fbd52a2db4a5fbfa0acb56b00adca8e2cd213872f4bc33164d48d6d2ec6c9

  • SHA512

    92ab5c9c99a58cb363afd5ffac36c874cbd359657eb2fea5c70973b6737411160bf48d7b38f40ffb3a7c9598f2842ad4a74b10a3a0bff7c4de53690b93fba44d

  • SSDEEP

    12288:zMrIy90nk8zGiJ+HsBIRVW4wcBBlX2LQjR5uH+NjzJCKzuSWJeGJOtTC:zy1SGsMW410LQzueFvuZ8wUO

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a27fbd52a2db4a5fbfa0acb56b00adca8e2cd213872f4bc33164d48d6d2ec6c9.exe
    "C:\Users\Admin\AppData\Local\Temp\a27fbd52a2db4a5fbfa0acb56b00adca8e2cd213872f4bc33164d48d6d2ec6c9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3648
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un690332.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un690332.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3524
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8775.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8775.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4280
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4696.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4696.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1820
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si770363.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si770363.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4608

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si770363.exe

    Filesize

    175KB

    MD5

    2121ed4ba79952eac13aa0fe75e37b8e

    SHA1

    9b2e17056f7ade0d85a2dc767351c428ddda13d7

    SHA256

    38f4e32b4eadfd256dbf72b736df7b86aacc770f80942321594afbd61d125d72

    SHA512

    de72bfb03e888b7e065c51ebf1b8e1cd952294ac8e71f52a8895805d0e9998fdff7ce719d9b12c5affbdbad52f515f9c9f414832d893336e28807d473dc0e18b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si770363.exe

    Filesize

    175KB

    MD5

    2121ed4ba79952eac13aa0fe75e37b8e

    SHA1

    9b2e17056f7ade0d85a2dc767351c428ddda13d7

    SHA256

    38f4e32b4eadfd256dbf72b736df7b86aacc770f80942321594afbd61d125d72

    SHA512

    de72bfb03e888b7e065c51ebf1b8e1cd952294ac8e71f52a8895805d0e9998fdff7ce719d9b12c5affbdbad52f515f9c9f414832d893336e28807d473dc0e18b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un690332.exe

    Filesize

    553KB

    MD5

    7a4bba636bdd0b4c5d7242ff6f160719

    SHA1

    6fff9a74d577d430914f4001de5391866c173bb0

    SHA256

    13d5b1d51fc3423233f7b1d52e119069f0f3f093feb7e6f3dc39bd8960f5712d

    SHA512

    0ff6aeeb27b38fc78cd79c6dd4ded487aa78f267c03fa08e4c0de1768e683f337c3f7080f450dcd6c237a8e553e5c85a93f60e0e794bc8d232663db95092ce2b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un690332.exe

    Filesize

    553KB

    MD5

    7a4bba636bdd0b4c5d7242ff6f160719

    SHA1

    6fff9a74d577d430914f4001de5391866c173bb0

    SHA256

    13d5b1d51fc3423233f7b1d52e119069f0f3f093feb7e6f3dc39bd8960f5712d

    SHA512

    0ff6aeeb27b38fc78cd79c6dd4ded487aa78f267c03fa08e4c0de1768e683f337c3f7080f450dcd6c237a8e553e5c85a93f60e0e794bc8d232663db95092ce2b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8775.exe

    Filesize

    308KB

    MD5

    19d2b326aa4ce88497c7856a5eee76f4

    SHA1

    1d1b28cdf953c9861f1c0ee3ff0ec490838d9dc5

    SHA256

    c8c69897a3b2d75a2096d8d78f3dedaeba9acf713da27447cb8bf53d44c7aeae

    SHA512

    e479c4afa100a54ae6f7a1bbdea095b1d0ed9d5f3680594690e145ee64755d854c8a3ce1515d5bb6ec0a0ab1a2f832b20407a7985c4aa91d67431c8474361c78

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8775.exe

    Filesize

    308KB

    MD5

    19d2b326aa4ce88497c7856a5eee76f4

    SHA1

    1d1b28cdf953c9861f1c0ee3ff0ec490838d9dc5

    SHA256

    c8c69897a3b2d75a2096d8d78f3dedaeba9acf713da27447cb8bf53d44c7aeae

    SHA512

    e479c4afa100a54ae6f7a1bbdea095b1d0ed9d5f3680594690e145ee64755d854c8a3ce1515d5bb6ec0a0ab1a2f832b20407a7985c4aa91d67431c8474361c78

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4696.exe

    Filesize

    366KB

    MD5

    7e879c9601b45315139a7342b6ab8ad8

    SHA1

    fcf76ebdd4fe59de566f6fe4206419fcd29bdd8c

    SHA256

    e30984d711b9ca785bae36d8179c20583fd640b1da4b9c23edc62b15cf0eab94

    SHA512

    12851e1c9ac1eed058e6c069dd5e3010f87ea595d991dc75e11857ce71311149f4db6f8a657422941a7430cde5145e58d39dce4a6db1498e997d55a1225387cd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4696.exe

    Filesize

    366KB

    MD5

    7e879c9601b45315139a7342b6ab8ad8

    SHA1

    fcf76ebdd4fe59de566f6fe4206419fcd29bdd8c

    SHA256

    e30984d711b9ca785bae36d8179c20583fd640b1da4b9c23edc62b15cf0eab94

    SHA512

    12851e1c9ac1eed058e6c069dd5e3010f87ea595d991dc75e11857ce71311149f4db6f8a657422941a7430cde5145e58d39dce4a6db1498e997d55a1225387cd

  • memory/1820-1088-0x0000000005460000-0x0000000005A66000-memory.dmp

    Filesize

    6.0MB

  • memory/1820-1089-0x0000000005A70000-0x0000000005B7A000-memory.dmp

    Filesize

    1.0MB

  • memory/1820-1104-0x0000000006FB0000-0x0000000007000000-memory.dmp

    Filesize

    320KB

  • memory/1820-1103-0x0000000006F30000-0x0000000006FA6000-memory.dmp

    Filesize

    472KB

  • memory/1820-1102-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/1820-1101-0x00000000067C0000-0x0000000006CEC000-memory.dmp

    Filesize

    5.2MB

  • memory/1820-1100-0x00000000065E0000-0x00000000067A2000-memory.dmp

    Filesize

    1.8MB

  • memory/1820-193-0x0000000002510000-0x000000000254F000-memory.dmp

    Filesize

    252KB

  • memory/1820-1099-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/1820-1098-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/1820-1097-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/1820-1095-0x0000000005EE0000-0x0000000005F46000-memory.dmp

    Filesize

    408KB

  • memory/1820-1094-0x0000000005E40000-0x0000000005ED2000-memory.dmp

    Filesize

    584KB

  • memory/1820-195-0x0000000002510000-0x000000000254F000-memory.dmp

    Filesize

    252KB

  • memory/1820-1093-0x0000000005CC0000-0x0000000005D0B000-memory.dmp

    Filesize

    300KB

  • memory/1820-1092-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/1820-1091-0x0000000005B80000-0x0000000005BBE000-memory.dmp

    Filesize

    248KB

  • memory/1820-197-0x0000000002510000-0x000000000254F000-memory.dmp

    Filesize

    252KB

  • memory/1820-1090-0x0000000004E10000-0x0000000004E22000-memory.dmp

    Filesize

    72KB

  • memory/1820-209-0x0000000002510000-0x000000000254F000-memory.dmp

    Filesize

    252KB

  • memory/1820-373-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/1820-371-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/1820-176-0x0000000002320000-0x0000000002366000-memory.dmp

    Filesize

    280KB

  • memory/1820-177-0x0000000002510000-0x0000000002554000-memory.dmp

    Filesize

    272KB

  • memory/1820-178-0x0000000002510000-0x000000000254F000-memory.dmp

    Filesize

    252KB

  • memory/1820-179-0x0000000002510000-0x000000000254F000-memory.dmp

    Filesize

    252KB

  • memory/1820-181-0x0000000002510000-0x000000000254F000-memory.dmp

    Filesize

    252KB

  • memory/1820-183-0x0000000002510000-0x000000000254F000-memory.dmp

    Filesize

    252KB

  • memory/1820-185-0x0000000002510000-0x000000000254F000-memory.dmp

    Filesize

    252KB

  • memory/1820-187-0x0000000002510000-0x000000000254F000-memory.dmp

    Filesize

    252KB

  • memory/1820-189-0x0000000002510000-0x000000000254F000-memory.dmp

    Filesize

    252KB

  • memory/1820-191-0x0000000002510000-0x000000000254F000-memory.dmp

    Filesize

    252KB

  • memory/1820-369-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/1820-368-0x0000000000890000-0x00000000008DB000-memory.dmp

    Filesize

    300KB

  • memory/1820-211-0x0000000002510000-0x000000000254F000-memory.dmp

    Filesize

    252KB

  • memory/1820-199-0x0000000002510000-0x000000000254F000-memory.dmp

    Filesize

    252KB

  • memory/1820-201-0x0000000002510000-0x000000000254F000-memory.dmp

    Filesize

    252KB

  • memory/1820-203-0x0000000002510000-0x000000000254F000-memory.dmp

    Filesize

    252KB

  • memory/1820-205-0x0000000002510000-0x000000000254F000-memory.dmp

    Filesize

    252KB

  • memory/1820-207-0x0000000002510000-0x000000000254F000-memory.dmp

    Filesize

    252KB

  • memory/4280-166-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/4280-168-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/4280-160-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/4280-148-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/4280-137-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/4280-138-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/4280-136-0x0000000004F70000-0x0000000004F80000-memory.dmp

    Filesize

    64KB

  • memory/4280-171-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4280-169-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4280-139-0x0000000004F80000-0x000000000547E000-memory.dmp

    Filesize

    5.0MB

  • memory/4280-164-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/4280-162-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/4280-158-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/4280-156-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/4280-154-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/4280-152-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/4280-150-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/4280-146-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/4280-144-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/4280-142-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/4280-141-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/4280-140-0x00000000025C0000-0x00000000025D8000-memory.dmp

    Filesize

    96KB

  • memory/4280-135-0x0000000000900000-0x000000000092D000-memory.dmp

    Filesize

    180KB

  • memory/4280-134-0x0000000002220000-0x000000000223A000-memory.dmp

    Filesize

    104KB

  • memory/4608-1110-0x0000000000D90000-0x0000000000DC2000-memory.dmp

    Filesize

    200KB

  • memory/4608-1111-0x00000000057D0000-0x000000000581B000-memory.dmp

    Filesize

    300KB

  • memory/4608-1112-0x00000000055C0000-0x00000000055D0000-memory.dmp

    Filesize

    64KB