Analysis

  • max time kernel
    96s
  • max time network
    132s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 19:36

General

  • Target

    3d8ada78f53157900720466b204b37e8a5693eb0e4e0ca41b872383eaf39d7c8.exe

  • Size

    696KB

  • MD5

    27982d80d5501a3c29a46db3eaccbcf2

  • SHA1

    33f7383aa14d73fd01bb248c0e211464b342b068

  • SHA256

    3d8ada78f53157900720466b204b37e8a5693eb0e4e0ca41b872383eaf39d7c8

  • SHA512

    871c8ebcdd1d1d42edf8797dde02a18566ccc93acfaf9dd885b339a1027b0a0683fdf4d87093d6aacec197c7f9d570f02f085c4de6c67a934bf2a737bb62c30d

  • SSDEEP

    12288:dMrXy90qUgC3Yt42SFBDAm811yfPnrMv7OdyfIskXz9fYJ3FKQJDRkab:qyCgz/SdfPnov7OdyQsC9wTlRke

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d8ada78f53157900720466b204b37e8a5693eb0e4e0ca41b872383eaf39d7c8.exe
    "C:\Users\Admin\AppData\Local\Temp\3d8ada78f53157900720466b204b37e8a5693eb0e4e0ca41b872383eaf39d7c8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4616
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un130099.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un130099.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1136
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9053.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9053.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4832
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9719.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9719.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2264
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si662761.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si662761.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3964

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si662761.exe

    Filesize

    175KB

    MD5

    efae794e870736bba06277f9496a62b2

    SHA1

    f634df6e4cedfb9a21258117731a6e620488715e

    SHA256

    9feb9f60e2db3bd30667853da404cc7d9af98fbc500fe894e3dde0691e7182ca

    SHA512

    e57fea637e6b9a8aaa050e4270f6a4bb8d103e1e56b1c831978f124e0cd3534fd9b9ecc3304c60d0f57bc4fa4aedc47cbf21b83a4da69a186c4a6f1b0acdfcd9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si662761.exe

    Filesize

    175KB

    MD5

    efae794e870736bba06277f9496a62b2

    SHA1

    f634df6e4cedfb9a21258117731a6e620488715e

    SHA256

    9feb9f60e2db3bd30667853da404cc7d9af98fbc500fe894e3dde0691e7182ca

    SHA512

    e57fea637e6b9a8aaa050e4270f6a4bb8d103e1e56b1c831978f124e0cd3534fd9b9ecc3304c60d0f57bc4fa4aedc47cbf21b83a4da69a186c4a6f1b0acdfcd9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un130099.exe

    Filesize

    554KB

    MD5

    ec1a8d64da48686a89bc24ae803a22b5

    SHA1

    3bd996d01430a2bb99938fab7cbdfa66a593c0e8

    SHA256

    27cea968afc7a6f34d49457b96dc209b580413b27367ce00d7f8162ecafe88dc

    SHA512

    c7b4cd32a4f8b891537225a30a431a89cc5cf1a9eabd6f774ea4416d19ecfad1d5a7a0024e8c9fe50c6c054faa41736b49d34d4b3ec476e0ac6a3ef0e2d48a6f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un130099.exe

    Filesize

    554KB

    MD5

    ec1a8d64da48686a89bc24ae803a22b5

    SHA1

    3bd996d01430a2bb99938fab7cbdfa66a593c0e8

    SHA256

    27cea968afc7a6f34d49457b96dc209b580413b27367ce00d7f8162ecafe88dc

    SHA512

    c7b4cd32a4f8b891537225a30a431a89cc5cf1a9eabd6f774ea4416d19ecfad1d5a7a0024e8c9fe50c6c054faa41736b49d34d4b3ec476e0ac6a3ef0e2d48a6f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9053.exe

    Filesize

    308KB

    MD5

    28e5f5a8d7002176b9db7c6bf662fedc

    SHA1

    5cfd5c70aba0f7dde473deed9cb626a6bc4de5cf

    SHA256

    3d01740034a822c15b1483721dc547a84183a9842f2eb8f79065b07c2c23e31f

    SHA512

    b4be25871bea862300f7cb0342f0dbb7135c4746004ca7c1a73fe12c443d603f62170ca2403a76aa6aa4a81245646995b8b323a45bec8c3b59f0b478f5643799

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9053.exe

    Filesize

    308KB

    MD5

    28e5f5a8d7002176b9db7c6bf662fedc

    SHA1

    5cfd5c70aba0f7dde473deed9cb626a6bc4de5cf

    SHA256

    3d01740034a822c15b1483721dc547a84183a9842f2eb8f79065b07c2c23e31f

    SHA512

    b4be25871bea862300f7cb0342f0dbb7135c4746004ca7c1a73fe12c443d603f62170ca2403a76aa6aa4a81245646995b8b323a45bec8c3b59f0b478f5643799

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9719.exe

    Filesize

    366KB

    MD5

    5de9e0da648341b01430347c02fdb620

    SHA1

    dfff58a31b14b831ab4201117988c687264814c6

    SHA256

    fc150610e154d77e6894d5a58ad70ce9a0cb3eb30af459947671a025fe78623f

    SHA512

    edc7cda358c0feb20e4dc147efe2bec1fde936c125697e75c6e7606715b13914d1e3e280f175c17129b331f11fc18bc714bb95ec2e314b5bbb2372d822303fc3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9719.exe

    Filesize

    366KB

    MD5

    5de9e0da648341b01430347c02fdb620

    SHA1

    dfff58a31b14b831ab4201117988c687264814c6

    SHA256

    fc150610e154d77e6894d5a58ad70ce9a0cb3eb30af459947671a025fe78623f

    SHA512

    edc7cda358c0feb20e4dc147efe2bec1fde936c125697e75c6e7606715b13914d1e3e280f175c17129b331f11fc18bc714bb95ec2e314b5bbb2372d822303fc3

  • memory/2264-1102-0x00000000059C0000-0x0000000005ACA000-memory.dmp

    Filesize

    1.0MB

  • memory/2264-1101-0x0000000005330000-0x0000000005948000-memory.dmp

    Filesize

    6.1MB

  • memory/2264-220-0x0000000000720000-0x000000000076B000-memory.dmp

    Filesize

    300KB

  • memory/2264-218-0x0000000002770000-0x00000000027AF000-memory.dmp

    Filesize

    252KB

  • memory/2264-204-0x0000000002770000-0x00000000027AF000-memory.dmp

    Filesize

    252KB

  • memory/2264-206-0x0000000002770000-0x00000000027AF000-memory.dmp

    Filesize

    252KB

  • memory/2264-1115-0x0000000006F60000-0x0000000006FD6000-memory.dmp

    Filesize

    472KB

  • memory/2264-1114-0x0000000002390000-0x00000000023A0000-memory.dmp

    Filesize

    64KB

  • memory/2264-1113-0x00000000068F0000-0x0000000006E1C000-memory.dmp

    Filesize

    5.2MB

  • memory/2264-1112-0x0000000006720000-0x00000000068E2000-memory.dmp

    Filesize

    1.8MB

  • memory/2264-208-0x0000000002770000-0x00000000027AF000-memory.dmp

    Filesize

    252KB

  • memory/2264-1111-0x0000000005EB0000-0x0000000005F16000-memory.dmp

    Filesize

    408KB

  • memory/2264-1110-0x0000000005E10000-0x0000000005EA2000-memory.dmp

    Filesize

    584KB

  • memory/2264-1109-0x0000000002390000-0x00000000023A0000-memory.dmp

    Filesize

    64KB

  • memory/2264-1108-0x0000000002390000-0x00000000023A0000-memory.dmp

    Filesize

    64KB

  • memory/2264-1107-0x0000000002390000-0x00000000023A0000-memory.dmp

    Filesize

    64KB

  • memory/2264-1105-0x0000000002390000-0x00000000023A0000-memory.dmp

    Filesize

    64KB

  • memory/2264-1104-0x0000000005B20000-0x0000000005B5C000-memory.dmp

    Filesize

    240KB

  • memory/2264-1103-0x0000000005B00000-0x0000000005B12000-memory.dmp

    Filesize

    72KB

  • memory/2264-224-0x0000000002390000-0x00000000023A0000-memory.dmp

    Filesize

    64KB

  • memory/2264-221-0x0000000002770000-0x00000000027AF000-memory.dmp

    Filesize

    252KB

  • memory/2264-227-0x0000000002390000-0x00000000023A0000-memory.dmp

    Filesize

    64KB

  • memory/2264-228-0x0000000002770000-0x00000000027AF000-memory.dmp

    Filesize

    252KB

  • memory/2264-191-0x0000000002770000-0x00000000027AF000-memory.dmp

    Filesize

    252KB

  • memory/2264-192-0x0000000002770000-0x00000000027AF000-memory.dmp

    Filesize

    252KB

  • memory/2264-194-0x0000000002770000-0x00000000027AF000-memory.dmp

    Filesize

    252KB

  • memory/2264-196-0x0000000002770000-0x00000000027AF000-memory.dmp

    Filesize

    252KB

  • memory/2264-198-0x0000000002770000-0x00000000027AF000-memory.dmp

    Filesize

    252KB

  • memory/2264-200-0x0000000002770000-0x00000000027AF000-memory.dmp

    Filesize

    252KB

  • memory/2264-202-0x0000000002770000-0x00000000027AF000-memory.dmp

    Filesize

    252KB

  • memory/2264-222-0x0000000002390000-0x00000000023A0000-memory.dmp

    Filesize

    64KB

  • memory/2264-1116-0x0000000006FE0000-0x0000000007030000-memory.dmp

    Filesize

    320KB

  • memory/2264-225-0x0000000002770000-0x00000000027AF000-memory.dmp

    Filesize

    252KB

  • memory/2264-210-0x0000000002770000-0x00000000027AF000-memory.dmp

    Filesize

    252KB

  • memory/2264-212-0x0000000002770000-0x00000000027AF000-memory.dmp

    Filesize

    252KB

  • memory/2264-214-0x0000000002770000-0x00000000027AF000-memory.dmp

    Filesize

    252KB

  • memory/2264-216-0x0000000002770000-0x00000000027AF000-memory.dmp

    Filesize

    252KB

  • memory/3964-1122-0x0000000000D10000-0x0000000000D42000-memory.dmp

    Filesize

    200KB

  • memory/3964-1123-0x0000000005610000-0x0000000005620000-memory.dmp

    Filesize

    64KB

  • memory/4832-181-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4832-172-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/4832-148-0x0000000000950000-0x000000000097D000-memory.dmp

    Filesize

    180KB

  • memory/4832-151-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/4832-152-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/4832-186-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4832-185-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/4832-150-0x0000000004E60000-0x0000000005404000-memory.dmp

    Filesize

    5.6MB

  • memory/4832-184-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/4832-182-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/4832-154-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/4832-180-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/4832-179-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/4832-178-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/4832-176-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/4832-174-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/4832-170-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/4832-168-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/4832-166-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/4832-164-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/4832-162-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/4832-149-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/4832-160-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/4832-158-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/4832-156-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB