Analysis

  • max time kernel
    106s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 20:24

General

  • Target

    e500189557bab4e9da6d58ee6451c0f25cc01933cefb5c5f1b4b134df3ca3501.exe

  • Size

    695KB

  • MD5

    ba5d769137c45d1efbbdc9cd864f0baa

  • SHA1

    6e55ef58edc59f58ff4120e16e85c820e62df029

  • SHA256

    e500189557bab4e9da6d58ee6451c0f25cc01933cefb5c5f1b4b134df3ca3501

  • SHA512

    25848defa13a9ba7c9f8bfca7b42f0e1b80258f888784f36e856026c110f2882b461302de445f9830c161017f2a374abe174cb7c7152a34f23b7bf225b647c25

  • SSDEEP

    12288:uMrjy90nuOeffp5JE0bQsQZ8hcxl/lkAVDTOUKzyfvPSozKMlJLuA6vIwaxN:1yEuOe353hgl/RcUKz+yQK8N61EN

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e500189557bab4e9da6d58ee6451c0f25cc01933cefb5c5f1b4b134df3ca3501.exe
    "C:\Users\Admin\AppData\Local\Temp\e500189557bab4e9da6d58ee6451c0f25cc01933cefb5c5f1b4b134df3ca3501.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un398652.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un398652.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1484
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9264.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9264.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4928
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9233.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9233.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:208
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si712626.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si712626.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5104

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si712626.exe

    Filesize

    175KB

    MD5

    ac0254e58777dcb8cbacf89a983110f5

    SHA1

    c5dcdcb5bc365faf6f5f42999b054417da260825

    SHA256

    79831a7501595ebfea7d299b98e533b3a6560aa0a8349174dafa436c422d861f

    SHA512

    fa77c9484828e1bc5dfd3e7a15ceb3445c343c0f92d1e3b31c8a0e7250ede6896dc80de8dabcde15323903eaa54702b2018c14063bac528014e321ef64e9daff

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si712626.exe

    Filesize

    175KB

    MD5

    ac0254e58777dcb8cbacf89a983110f5

    SHA1

    c5dcdcb5bc365faf6f5f42999b054417da260825

    SHA256

    79831a7501595ebfea7d299b98e533b3a6560aa0a8349174dafa436c422d861f

    SHA512

    fa77c9484828e1bc5dfd3e7a15ceb3445c343c0f92d1e3b31c8a0e7250ede6896dc80de8dabcde15323903eaa54702b2018c14063bac528014e321ef64e9daff

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un398652.exe

    Filesize

    553KB

    MD5

    6fef598825165568fe44c4663b39730d

    SHA1

    09043fed4003783b7ff0818676b23d73e0c93bf8

    SHA256

    fd425ca2136a27f747ee9735ac7e9ab419177fcacbb0ebba1b01bc96bc543fe9

    SHA512

    2683bb80745410fb872f5f32c7408516edba69fd560dcad6178ab77ed4552fc9b5fc77149ed4ead5232a5c967aefc506052f0e08637ffa495288cb0ed986adea

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un398652.exe

    Filesize

    553KB

    MD5

    6fef598825165568fe44c4663b39730d

    SHA1

    09043fed4003783b7ff0818676b23d73e0c93bf8

    SHA256

    fd425ca2136a27f747ee9735ac7e9ab419177fcacbb0ebba1b01bc96bc543fe9

    SHA512

    2683bb80745410fb872f5f32c7408516edba69fd560dcad6178ab77ed4552fc9b5fc77149ed4ead5232a5c967aefc506052f0e08637ffa495288cb0ed986adea

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9264.exe

    Filesize

    308KB

    MD5

    b2b8d7afab156732ccfbb62e88e4c8a6

    SHA1

    2abe0e7cc1077da2edc2065912a86015d2872908

    SHA256

    fd9e3e0a14f02a6f0bc901d07cd03b76dc23a3596e4c005b8ea92de4623fb1d8

    SHA512

    6d2a54e858df88198b401232ac68de4cd42fcdde7ec817ae1da5d8215ac0b44d9a266348761b25c063260e6ecc312cc3da4d6d66c10da365d59be4b83627f9eb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9264.exe

    Filesize

    308KB

    MD5

    b2b8d7afab156732ccfbb62e88e4c8a6

    SHA1

    2abe0e7cc1077da2edc2065912a86015d2872908

    SHA256

    fd9e3e0a14f02a6f0bc901d07cd03b76dc23a3596e4c005b8ea92de4623fb1d8

    SHA512

    6d2a54e858df88198b401232ac68de4cd42fcdde7ec817ae1da5d8215ac0b44d9a266348761b25c063260e6ecc312cc3da4d6d66c10da365d59be4b83627f9eb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9233.exe

    Filesize

    366KB

    MD5

    adb33ce401fc2b8534a31918bf6bfdd7

    SHA1

    f3a914656668ecc7391a3de2ef831a8119ee5a5b

    SHA256

    fe6cdbd4c8e1979d36ff4a3734b57d11ef0b6c0817ef8ced3dde719c3db821e8

    SHA512

    f5c4dc710fcb3c875af43d6530d13e91043f245550c26157652d882511235fcc386f4da5399e3524b70c22364b03f0402152f09e68844263bec20c3906926c97

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9233.exe

    Filesize

    366KB

    MD5

    adb33ce401fc2b8534a31918bf6bfdd7

    SHA1

    f3a914656668ecc7391a3de2ef831a8119ee5a5b

    SHA256

    fe6cdbd4c8e1979d36ff4a3734b57d11ef0b6c0817ef8ced3dde719c3db821e8

    SHA512

    f5c4dc710fcb3c875af43d6530d13e91043f245550c26157652d882511235fcc386f4da5399e3524b70c22364b03f0402152f09e68844263bec20c3906926c97

  • memory/208-1102-0x00000000059C0000-0x0000000005ACA000-memory.dmp

    Filesize

    1.0MB

  • memory/208-1101-0x0000000005320000-0x0000000005938000-memory.dmp

    Filesize

    6.1MB

  • memory/208-204-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/208-206-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/208-1115-0x0000000000AB0000-0x0000000000AC0000-memory.dmp

    Filesize

    64KB

  • memory/208-1114-0x0000000006F90000-0x0000000006FE0000-memory.dmp

    Filesize

    320KB

  • memory/208-1113-0x0000000006F00000-0x0000000006F76000-memory.dmp

    Filesize

    472KB

  • memory/208-1112-0x0000000000AB0000-0x0000000000AC0000-memory.dmp

    Filesize

    64KB

  • memory/208-1111-0x0000000000AB0000-0x0000000000AC0000-memory.dmp

    Filesize

    64KB

  • memory/208-1110-0x00000000067A0000-0x0000000006CCC000-memory.dmp

    Filesize

    5.2MB

  • memory/208-208-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/208-1109-0x00000000065D0000-0x0000000006792000-memory.dmp

    Filesize

    1.8MB

  • memory/208-1108-0x0000000005EB0000-0x0000000005F16000-memory.dmp

    Filesize

    408KB

  • memory/208-1107-0x0000000005E10000-0x0000000005EA2000-memory.dmp

    Filesize

    584KB

  • memory/208-1105-0x0000000000AB0000-0x0000000000AC0000-memory.dmp

    Filesize

    64KB

  • memory/208-1104-0x0000000005B20000-0x0000000005B5C000-memory.dmp

    Filesize

    240KB

  • memory/208-1103-0x0000000005B00000-0x0000000005B12000-memory.dmp

    Filesize

    72KB

  • memory/208-216-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/208-318-0x0000000000AB0000-0x0000000000AC0000-memory.dmp

    Filesize

    64KB

  • memory/208-317-0x0000000000AB0000-0x0000000000AC0000-memory.dmp

    Filesize

    64KB

  • memory/208-315-0x0000000000AB0000-0x0000000000AC0000-memory.dmp

    Filesize

    64KB

  • memory/208-314-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/208-224-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/208-191-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/208-192-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/208-194-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/208-196-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/208-198-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/208-200-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/208-202-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/208-222-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/208-220-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/208-218-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/208-210-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/208-212-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/208-214-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/4928-181-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4928-178-0x0000000004C70000-0x0000000004C82000-memory.dmp

    Filesize

    72KB

  • memory/4928-149-0x0000000004C70000-0x0000000004C82000-memory.dmp

    Filesize

    72KB

  • memory/4928-159-0x0000000004D30000-0x0000000004D40000-memory.dmp

    Filesize

    64KB

  • memory/4928-152-0x0000000004C70000-0x0000000004C82000-memory.dmp

    Filesize

    72KB

  • memory/4928-154-0x0000000004C70000-0x0000000004C82000-memory.dmp

    Filesize

    72KB

  • memory/4928-186-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4928-185-0x0000000004D30000-0x0000000004D40000-memory.dmp

    Filesize

    64KB

  • memory/4928-184-0x0000000004D30000-0x0000000004D40000-memory.dmp

    Filesize

    64KB

  • memory/4928-182-0x0000000004D30000-0x0000000004D40000-memory.dmp

    Filesize

    64KB

  • memory/4928-150-0x0000000004C70000-0x0000000004C82000-memory.dmp

    Filesize

    72KB

  • memory/4928-156-0x0000000004C70000-0x0000000004C82000-memory.dmp

    Filesize

    72KB

  • memory/4928-180-0x0000000004C70000-0x0000000004C82000-memory.dmp

    Filesize

    72KB

  • memory/4928-170-0x0000000004C70000-0x0000000004C82000-memory.dmp

    Filesize

    72KB

  • memory/4928-176-0x0000000004C70000-0x0000000004C82000-memory.dmp

    Filesize

    72KB

  • memory/4928-174-0x0000000004C70000-0x0000000004C82000-memory.dmp

    Filesize

    72KB

  • memory/4928-172-0x0000000004C70000-0x0000000004C82000-memory.dmp

    Filesize

    72KB

  • memory/4928-168-0x0000000004C70000-0x0000000004C82000-memory.dmp

    Filesize

    72KB

  • memory/4928-166-0x0000000004C70000-0x0000000004C82000-memory.dmp

    Filesize

    72KB

  • memory/4928-158-0x00000000009B0000-0x00000000009DD000-memory.dmp

    Filesize

    180KB

  • memory/4928-164-0x0000000004C70000-0x0000000004C82000-memory.dmp

    Filesize

    72KB

  • memory/4928-163-0x0000000004D30000-0x0000000004D40000-memory.dmp

    Filesize

    64KB

  • memory/4928-160-0x0000000004C70000-0x0000000004C82000-memory.dmp

    Filesize

    72KB

  • memory/4928-161-0x0000000004D30000-0x0000000004D40000-memory.dmp

    Filesize

    64KB

  • memory/4928-148-0x0000000004D40000-0x00000000052E4000-memory.dmp

    Filesize

    5.6MB

  • memory/5104-1121-0x0000000000CB0000-0x0000000000CE2000-memory.dmp

    Filesize

    200KB

  • memory/5104-1122-0x0000000005590000-0x00000000055A0000-memory.dmp

    Filesize

    64KB

  • memory/5104-1124-0x0000000005590000-0x00000000055A0000-memory.dmp

    Filesize

    64KB