Analysis

  • max time kernel
    118s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 19:35

General

  • Target

    7228e98f65c4103360d7b7e7600f96d94eeb57a6d4465448494692c832b4825d.exe

  • Size

    695KB

  • MD5

    96dec57731dcc86ab9cc353074df62f1

  • SHA1

    18773b26c02156677849d9b1e436da18dd4fc421

  • SHA256

    7228e98f65c4103360d7b7e7600f96d94eeb57a6d4465448494692c832b4825d

  • SHA512

    207d7ef1602422531a5b1a0ff8e3373cd4843fa6102eb0204f3f563ed38bb63bb6ddbed91fff3219a028cb67a729eb8773bc5a4f7043b908dbf53b16dadd21ea

  • SSDEEP

    12288:AMrIy90vwSSkDUKGJBZ5/8LCwe/J+lBUzrW8J2w2uY:YyGwD13Z5/aCwegf8rZgX

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7228e98f65c4103360d7b7e7600f96d94eeb57a6d4465448494692c832b4825d.exe
    "C:\Users\Admin\AppData\Local\Temp\7228e98f65c4103360d7b7e7600f96d94eeb57a6d4465448494692c832b4825d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4340
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un033793.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un033793.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4440
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7208.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7208.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1896
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7210.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7210.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:100
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si513844.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si513844.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2816

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si513844.exe

    Filesize

    175KB

    MD5

    551552fd5d8bcbe26db102a1861a3de3

    SHA1

    f6f501fa803d580e0a38cb5df19313403dbdb8e1

    SHA256

    ef770ee0b6483bb0b17b343edd93c1a9f10278c4b6dd09d674d1921a8102a230

    SHA512

    68296301ad410f46b1677f0bc896dd3b8ba44999150d7c8e33cb9b4a10a36a01f0caced78a0b6163f4a91341152b6c52d8221432c0dfc4c5e97b813113c29a69

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si513844.exe

    Filesize

    175KB

    MD5

    551552fd5d8bcbe26db102a1861a3de3

    SHA1

    f6f501fa803d580e0a38cb5df19313403dbdb8e1

    SHA256

    ef770ee0b6483bb0b17b343edd93c1a9f10278c4b6dd09d674d1921a8102a230

    SHA512

    68296301ad410f46b1677f0bc896dd3b8ba44999150d7c8e33cb9b4a10a36a01f0caced78a0b6163f4a91341152b6c52d8221432c0dfc4c5e97b813113c29a69

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un033793.exe

    Filesize

    553KB

    MD5

    3a7ac254fe6db34e92b9bac00edd295a

    SHA1

    31bfe758bf980ab8ebfa63d065ee5e93c2c1109c

    SHA256

    253de328577a9c9cfea24012bd29afbda0dc5fe6a29b2e445a0ccfb7208138e3

    SHA512

    7c3e0432114a780269c2e939fbfc78ce7e76fd7c322e8ec80ba5705d64c55a6faf35d503619d7c3bd9d6e0cf74cc745737a0f3749f1cbc54cf9a38a355b2e185

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un033793.exe

    Filesize

    553KB

    MD5

    3a7ac254fe6db34e92b9bac00edd295a

    SHA1

    31bfe758bf980ab8ebfa63d065ee5e93c2c1109c

    SHA256

    253de328577a9c9cfea24012bd29afbda0dc5fe6a29b2e445a0ccfb7208138e3

    SHA512

    7c3e0432114a780269c2e939fbfc78ce7e76fd7c322e8ec80ba5705d64c55a6faf35d503619d7c3bd9d6e0cf74cc745737a0f3749f1cbc54cf9a38a355b2e185

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7208.exe

    Filesize

    308KB

    MD5

    5234b9e5ce3d72f3a1ae11757ab5ed5a

    SHA1

    6f47b9cd4ce795f972d5b6f187d696778724aff7

    SHA256

    c25976457fa9f50dac750df61cae11a8c70c14ba7c17f8814b8f718c2d186611

    SHA512

    866b3f0d3b7aff360a1437a79633563b4dac32fd63bbd79e5a6053f79278aa4370f963aec8bb9ef770e08abd75df56c0c11920dc3bcd10cc9091a62f6ceaa206

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7208.exe

    Filesize

    308KB

    MD5

    5234b9e5ce3d72f3a1ae11757ab5ed5a

    SHA1

    6f47b9cd4ce795f972d5b6f187d696778724aff7

    SHA256

    c25976457fa9f50dac750df61cae11a8c70c14ba7c17f8814b8f718c2d186611

    SHA512

    866b3f0d3b7aff360a1437a79633563b4dac32fd63bbd79e5a6053f79278aa4370f963aec8bb9ef770e08abd75df56c0c11920dc3bcd10cc9091a62f6ceaa206

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7210.exe

    Filesize

    366KB

    MD5

    9b48f5d4cfa401924a26cd5ed37f2972

    SHA1

    b1a6fd39d2edd27700e5c5eeaae51a1544160cf0

    SHA256

    6ff05f657d83993082745bdd4b02ac3fce6c91810ef17a8bb8941e367098a1aa

    SHA512

    95c452c5c298c0dc97d7fb7196c2c6ad176d19410ede5bea548d42b1babad603ddc67b84dc41b0c04f0c2e996dd3b5a32f668a3bff464b4412f2aeb6dc94e9e1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7210.exe

    Filesize

    366KB

    MD5

    9b48f5d4cfa401924a26cd5ed37f2972

    SHA1

    b1a6fd39d2edd27700e5c5eeaae51a1544160cf0

    SHA256

    6ff05f657d83993082745bdd4b02ac3fce6c91810ef17a8bb8941e367098a1aa

    SHA512

    95c452c5c298c0dc97d7fb7196c2c6ad176d19410ede5bea548d42b1babad603ddc67b84dc41b0c04f0c2e996dd3b5a32f668a3bff464b4412f2aeb6dc94e9e1

  • memory/100-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp

    Filesize

    1.0MB

  • memory/100-273-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/100-1116-0x0000000008640000-0x0000000008690000-memory.dmp

    Filesize

    320KB

  • memory/100-1115-0x0000000002650000-0x00000000026C6000-memory.dmp

    Filesize

    472KB

  • memory/100-1114-0x0000000007DF0000-0x000000000831C000-memory.dmp

    Filesize

    5.2MB

  • memory/100-208-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/100-1113-0x0000000007C10000-0x0000000007DD2000-memory.dmp

    Filesize

    1.8MB

  • memory/100-1112-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/100-1111-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/100-1110-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/100-1109-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/100-1107-0x0000000006600000-0x0000000006692000-memory.dmp

    Filesize

    584KB

  • memory/100-1106-0x0000000005F50000-0x0000000005FB6000-memory.dmp

    Filesize

    408KB

  • memory/100-210-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/100-1105-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/100-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp

    Filesize

    240KB

  • memory/100-1103-0x0000000005C40000-0x0000000005C52000-memory.dmp

    Filesize

    72KB

  • memory/100-1101-0x0000000005470000-0x0000000005A88000-memory.dmp

    Filesize

    6.1MB

  • memory/100-275-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/100-218-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/100-271-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/100-270-0x0000000000860000-0x00000000008AB000-memory.dmp

    Filesize

    300KB

  • memory/100-224-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/100-191-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/100-192-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/100-212-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/100-196-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/100-198-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/100-200-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/100-202-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/100-204-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/100-206-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/100-222-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/100-220-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/100-194-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/100-214-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/100-216-0x0000000004CE0000-0x0000000004D1F000-memory.dmp

    Filesize

    252KB

  • memory/1896-182-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/1896-176-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/1896-160-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/1896-151-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/1896-152-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/1896-186-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/1896-184-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/1896-183-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/1896-153-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/1896-150-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/1896-181-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/1896-180-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/1896-178-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/1896-174-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/1896-172-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/1896-170-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/1896-168-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/1896-166-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/1896-164-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/1896-162-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/1896-158-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/1896-156-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/1896-154-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/1896-149-0x0000000004ED0000-0x0000000005474000-memory.dmp

    Filesize

    5.6MB

  • memory/1896-148-0x00000000007E0000-0x000000000080D000-memory.dmp

    Filesize

    180KB

  • memory/2816-1122-0x0000000000D50000-0x0000000000D82000-memory.dmp

    Filesize

    200KB

  • memory/2816-1123-0x00000000055C0000-0x00000000055D0000-memory.dmp

    Filesize

    64KB

  • memory/2816-1124-0x00000000055C0000-0x00000000055D0000-memory.dmp

    Filesize

    64KB