Analysis

  • max time kernel
    144s
  • max time network
    122s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 20:29

General

  • Target

    00cf4d7490303d80acb32fea03448ed3f816693f3e7c651eee219a662a5125ca.exe

  • Size

    696KB

  • MD5

    f95d30d0acd281b956855a5788610c34

  • SHA1

    f97ed256b1a23d6c876c1ff04dda7fd80c652c6c

  • SHA256

    00cf4d7490303d80acb32fea03448ed3f816693f3e7c651eee219a662a5125ca

  • SHA512

    51ce06774583888140ea5cd233774eb1adb9f3de3bb11ad680195c6b7c115ff24268ff406ed025a2924aebcd276aacf145f419ad367c88be9dd756926cf7b861

  • SSDEEP

    12288:zMr7y90waZhKGgle/A1lEEBWjJybrUYzJYCTuPl/KL3+GfAuz1omJxq9Z0tm6E:UyhKgWm3Kyl9Tel/2uGZ1Tub0w6E

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00cf4d7490303d80acb32fea03448ed3f816693f3e7c651eee219a662a5125ca.exe
    "C:\Users\Admin\AppData\Local\Temp\00cf4d7490303d80acb32fea03448ed3f816693f3e7c651eee219a662a5125ca.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4896
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un184789.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un184789.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1252
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8670.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8670.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1464
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8904.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8904.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4956
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si966189.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si966189.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1364
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:2452

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si966189.exe

    Filesize

    175KB

    MD5

    cf0cbd4eea20969a0140ef6bb39dd87b

    SHA1

    706c428fc2cea94f6e570b14dbe4c378981e523e

    SHA256

    deb31766536038dbc32ebd1dcc9ed8ae9f8c00218c2eea897af5a9ee3207977b

    SHA512

    2ad4ecf1ff07dc5f090e9a40d91fc1f759bb5e098b567e75704e1adfcfcd7ddab95f019834a00f1dec0fc47773bd56a2e84332a71f553366ee6aa5b74b5359e7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si966189.exe

    Filesize

    175KB

    MD5

    cf0cbd4eea20969a0140ef6bb39dd87b

    SHA1

    706c428fc2cea94f6e570b14dbe4c378981e523e

    SHA256

    deb31766536038dbc32ebd1dcc9ed8ae9f8c00218c2eea897af5a9ee3207977b

    SHA512

    2ad4ecf1ff07dc5f090e9a40d91fc1f759bb5e098b567e75704e1adfcfcd7ddab95f019834a00f1dec0fc47773bd56a2e84332a71f553366ee6aa5b74b5359e7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un184789.exe

    Filesize

    553KB

    MD5

    8695e55a2bc279ba96f9bead7826040a

    SHA1

    69ab81ab2cd8dd81b469446d5c817f42d9150331

    SHA256

    010c48feb7e40f2a9547015605f54b232c2d1805ce71d019bb9551a7c363c069

    SHA512

    601ea6c1237cc547a4ac6c41c12ad6992d08aa83f9c29f372e157b5a8e44d5f7e870e046e01eb0c4a16f9cec711ebc8b717d63ced15eb4cb1633104095c233eb

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un184789.exe

    Filesize

    553KB

    MD5

    8695e55a2bc279ba96f9bead7826040a

    SHA1

    69ab81ab2cd8dd81b469446d5c817f42d9150331

    SHA256

    010c48feb7e40f2a9547015605f54b232c2d1805ce71d019bb9551a7c363c069

    SHA512

    601ea6c1237cc547a4ac6c41c12ad6992d08aa83f9c29f372e157b5a8e44d5f7e870e046e01eb0c4a16f9cec711ebc8b717d63ced15eb4cb1633104095c233eb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8670.exe

    Filesize

    308KB

    MD5

    c90c705301766c663364c86059d3a51c

    SHA1

    7832622d320f6751b17661d859036fbca753c57c

    SHA256

    ac11255c411555f89a12bc10af5dde0aed22663cd6477da244f80f7cb284e066

    SHA512

    8a3bc009edbfe85145011290a177ea1c228048162b61e01d3038604fc9d25ae1259426ed12ba4203908fb4329b77703a62593ea425264d66e84be2abec96006d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8670.exe

    Filesize

    308KB

    MD5

    c90c705301766c663364c86059d3a51c

    SHA1

    7832622d320f6751b17661d859036fbca753c57c

    SHA256

    ac11255c411555f89a12bc10af5dde0aed22663cd6477da244f80f7cb284e066

    SHA512

    8a3bc009edbfe85145011290a177ea1c228048162b61e01d3038604fc9d25ae1259426ed12ba4203908fb4329b77703a62593ea425264d66e84be2abec96006d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8904.exe

    Filesize

    366KB

    MD5

    0634d20c6b41b1e60479729f91609956

    SHA1

    776a29e9b18586a0b7fc21971d3249b74c67b61a

    SHA256

    466cf1e52c4480d4d9b804c99367cdffae8c1dc9cb6526f72418c7837f4f62b1

    SHA512

    f43f03608ba548cf3c3a83c12ab5f7f3b61c76d4ef9f1ca32dfd556ecc755d3f0e7618e7564f98bafe5d659c3197b7fe8fb210a23748c04387edd98b684d79a9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8904.exe

    Filesize

    366KB

    MD5

    0634d20c6b41b1e60479729f91609956

    SHA1

    776a29e9b18586a0b7fc21971d3249b74c67b61a

    SHA256

    466cf1e52c4480d4d9b804c99367cdffae8c1dc9cb6526f72418c7837f4f62b1

    SHA512

    f43f03608ba548cf3c3a83c12ab5f7f3b61c76d4ef9f1ca32dfd556ecc755d3f0e7618e7564f98bafe5d659c3197b7fe8fb210a23748c04387edd98b684d79a9

  • memory/1364-1122-0x00000000003F0000-0x0000000000422000-memory.dmp

    Filesize

    200KB

  • memory/1364-1123-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/1464-156-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/1464-170-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/1464-151-0x0000000002410000-0x0000000002420000-memory.dmp

    Filesize

    64KB

  • memory/1464-152-0x0000000002410000-0x0000000002420000-memory.dmp

    Filesize

    64KB

  • memory/1464-153-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/1464-154-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/1464-150-0x0000000002410000-0x0000000002420000-memory.dmp

    Filesize

    64KB

  • memory/1464-158-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/1464-160-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/1464-162-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/1464-164-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/1464-166-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/1464-168-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/1464-149-0x00000000007E0000-0x000000000080D000-memory.dmp

    Filesize

    180KB

  • memory/1464-172-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/1464-174-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/1464-176-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/1464-178-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/1464-180-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/1464-181-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/1464-182-0x0000000002410000-0x0000000002420000-memory.dmp

    Filesize

    64KB

  • memory/1464-183-0x0000000002410000-0x0000000002420000-memory.dmp

    Filesize

    64KB

  • memory/1464-184-0x0000000002410000-0x0000000002420000-memory.dmp

    Filesize

    64KB

  • memory/1464-186-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/1464-148-0x0000000004D10000-0x00000000052B4000-memory.dmp

    Filesize

    5.6MB

  • memory/4956-194-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/4956-222-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/4956-196-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/4956-198-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/4956-202-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/4956-200-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/4956-204-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/4956-206-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/4956-208-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/4956-210-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/4956-212-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/4956-214-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/4956-216-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/4956-219-0x0000000000720000-0x000000000076B000-memory.dmp

    Filesize

    300KB

  • memory/4956-218-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/4956-221-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/4956-223-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/4956-225-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/4956-226-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/4956-192-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/4956-228-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/4956-1101-0x0000000005460000-0x0000000005A78000-memory.dmp

    Filesize

    6.1MB

  • memory/4956-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp

    Filesize

    1.0MB

  • memory/4956-1103-0x0000000005C40000-0x0000000005C52000-memory.dmp

    Filesize

    72KB

  • memory/4956-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp

    Filesize

    240KB

  • memory/4956-1105-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/4956-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp

    Filesize

    584KB

  • memory/4956-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp

    Filesize

    408KB

  • memory/4956-1109-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/4956-1110-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/4956-1111-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB

  • memory/4956-1112-0x0000000006810000-0x0000000006886000-memory.dmp

    Filesize

    472KB

  • memory/4956-1113-0x00000000068A0000-0x00000000068F0000-memory.dmp

    Filesize

    320KB

  • memory/4956-191-0x0000000005290000-0x00000000052CF000-memory.dmp

    Filesize

    252KB

  • memory/4956-1114-0x0000000006D80000-0x0000000006F42000-memory.dmp

    Filesize

    1.8MB

  • memory/4956-1115-0x0000000006F50000-0x000000000747C000-memory.dmp

    Filesize

    5.2MB

  • memory/4956-1116-0x0000000002460000-0x0000000002470000-memory.dmp

    Filesize

    64KB