Analysis

  • max time kernel
    58s
  • max time network
    71s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 19:44

General

  • Target

    d71faeca0ba27c3c39255cd78c77e3cb7247ff6af988443b99bdad30f9e765c7.exe

  • Size

    695KB

  • MD5

    41cbd1f83fcce2d98c53150d362180b0

  • SHA1

    8335e4bc0ec08165dea3b1527125d76561cfd830

  • SHA256

    d71faeca0ba27c3c39255cd78c77e3cb7247ff6af988443b99bdad30f9e765c7

  • SHA512

    bf15839b4dcce68d51c703f625c60c84a2088e0a6cf596eab87f85b08fe1375d92bb96d117d11a9266fe4fbd84498d80f833338b097d26d9cc03dfea1e9efe73

  • SSDEEP

    12288:KMrRy90dA2r8FvrJIpQMllgN774eiZHu8zJ/WJegor:ry+Fr89r6SqKt74rJOgj

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d71faeca0ba27c3c39255cd78c77e3cb7247ff6af988443b99bdad30f9e765c7.exe
    "C:\Users\Admin\AppData\Local\Temp\d71faeca0ba27c3c39255cd78c77e3cb7247ff6af988443b99bdad30f9e765c7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:372
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un562452.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un562452.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4512
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9648.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9648.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4324
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1819.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1819.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si079896.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si079896.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2596

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si079896.exe

    Filesize

    175KB

    MD5

    1789c28e597a1b6d0e6790201bdab2f8

    SHA1

    a2422229ffcddaffeb212ad81cd74f9b2dda8002

    SHA256

    42a2a8913c20a7ced84dd472ea2565af14ffb29dbf20275e9d77d6a52360e3c7

    SHA512

    f1037915f9ff41a773cc7764db01e95f77d9a8e9df4d2eecda2bfe9192ec34cdf51b814df39cccf7f0d5df8a7092d526a5c6baf7fb418d433cd6dbfa195075f8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si079896.exe

    Filesize

    175KB

    MD5

    1789c28e597a1b6d0e6790201bdab2f8

    SHA1

    a2422229ffcddaffeb212ad81cd74f9b2dda8002

    SHA256

    42a2a8913c20a7ced84dd472ea2565af14ffb29dbf20275e9d77d6a52360e3c7

    SHA512

    f1037915f9ff41a773cc7764db01e95f77d9a8e9df4d2eecda2bfe9192ec34cdf51b814df39cccf7f0d5df8a7092d526a5c6baf7fb418d433cd6dbfa195075f8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un562452.exe

    Filesize

    553KB

    MD5

    5c376cae0ee1386acca298b41d4efd7d

    SHA1

    08c286cec8dbb81bb58b15d0bcd4170953b250b5

    SHA256

    ed6f670412cb2a2ec0f436b32b2d81abf3d16268e215b623f59c3a3af39f02c4

    SHA512

    c0a2ea0642ba6b9c103ddbc8a7b919923c56bdadafb34a79bbe6e9a85436a0c7562f0dc5e051651f4f561e9d380be13be67d9a7616c8479106d2e41d12099209

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un562452.exe

    Filesize

    553KB

    MD5

    5c376cae0ee1386acca298b41d4efd7d

    SHA1

    08c286cec8dbb81bb58b15d0bcd4170953b250b5

    SHA256

    ed6f670412cb2a2ec0f436b32b2d81abf3d16268e215b623f59c3a3af39f02c4

    SHA512

    c0a2ea0642ba6b9c103ddbc8a7b919923c56bdadafb34a79bbe6e9a85436a0c7562f0dc5e051651f4f561e9d380be13be67d9a7616c8479106d2e41d12099209

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9648.exe

    Filesize

    308KB

    MD5

    631ebb2c496b541fe1421e09f115c22b

    SHA1

    f53cf4f79c8803a4837ba1361d21bde4a643a44c

    SHA256

    a21cccc0a1d63c76fc9a1551c84bb83ae3df6a69681bdb2fae055ab2fbb86bd6

    SHA512

    ebc3356445fef3c461d9dadbeab6e388eb7f6758c949f9c3d6fc415a29e652eafefa6c591d105c97b741458f1558588fa050e08a1e7e63981efcf2a477c50ea1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9648.exe

    Filesize

    308KB

    MD5

    631ebb2c496b541fe1421e09f115c22b

    SHA1

    f53cf4f79c8803a4837ba1361d21bde4a643a44c

    SHA256

    a21cccc0a1d63c76fc9a1551c84bb83ae3df6a69681bdb2fae055ab2fbb86bd6

    SHA512

    ebc3356445fef3c461d9dadbeab6e388eb7f6758c949f9c3d6fc415a29e652eafefa6c591d105c97b741458f1558588fa050e08a1e7e63981efcf2a477c50ea1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1819.exe

    Filesize

    366KB

    MD5

    dbe3764175dbbb4024c8c1633c995c34

    SHA1

    a270da62193283da7ffb91b16f47c35baa857d41

    SHA256

    c9a60539796072ca3340963235ad89b1fbb49c313d172cd50d734999fba727bf

    SHA512

    ecaf80de8a38bcff7ee5dc4d63268c4a4fb6cd7941d43988827362df7e9cce4694ad52539adee5427bfb028b7ba18172bf635d700db3ed33734042c738ab9057

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1819.exe

    Filesize

    366KB

    MD5

    dbe3764175dbbb4024c8c1633c995c34

    SHA1

    a270da62193283da7ffb91b16f47c35baa857d41

    SHA256

    c9a60539796072ca3340963235ad89b1fbb49c313d172cd50d734999fba727bf

    SHA512

    ecaf80de8a38bcff7ee5dc4d63268c4a4fb6cd7941d43988827362df7e9cce4694ad52539adee5427bfb028b7ba18172bf635d700db3ed33734042c738ab9057

  • memory/1124-1086-0x00000000059D0000-0x0000000005FD6000-memory.dmp

    Filesize

    6.0MB

  • memory/1124-1088-0x0000000004DE0000-0x0000000004DF2000-memory.dmp

    Filesize

    72KB

  • memory/1124-209-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/1124-208-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/1124-206-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/1124-1102-0x00000000069B0000-0x0000000006EDC000-memory.dmp

    Filesize

    5.2MB

  • memory/1124-1101-0x00000000067C0000-0x0000000006982000-memory.dmp

    Filesize

    1.8MB

  • memory/1124-191-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/1124-1100-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/1124-1099-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/1124-1098-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/1124-1097-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/1124-1096-0x0000000006500000-0x0000000006550000-memory.dmp

    Filesize

    320KB

  • memory/1124-193-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/1124-1095-0x0000000006480000-0x00000000064F6000-memory.dmp

    Filesize

    472KB

  • memory/1124-1094-0x00000000063E0000-0x0000000006472000-memory.dmp

    Filesize

    584KB

  • memory/1124-1092-0x00000000056F0000-0x0000000005756000-memory.dmp

    Filesize

    408KB

  • memory/1124-195-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/1124-1091-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/1124-1090-0x0000000004E40000-0x0000000004E8B000-memory.dmp

    Filesize

    300KB

  • memory/1124-1089-0x0000000004E00000-0x0000000004E3E000-memory.dmp

    Filesize

    248KB

  • memory/1124-205-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/1124-174-0x0000000002390000-0x00000000023D6000-memory.dmp

    Filesize

    280KB

  • memory/1124-175-0x0000000002530000-0x0000000002574000-memory.dmp

    Filesize

    272KB

  • memory/1124-177-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/1124-176-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/1124-179-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/1124-181-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/1124-183-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/1124-185-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/1124-187-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/1124-189-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/1124-1087-0x00000000053C0000-0x00000000054CA000-memory.dmp

    Filesize

    1.0MB

  • memory/1124-213-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/1124-211-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/1124-197-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/1124-199-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/1124-202-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/1124-201-0x0000000002530000-0x000000000256F000-memory.dmp

    Filesize

    252KB

  • memory/1124-204-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/2596-1108-0x0000000000260000-0x0000000000292000-memory.dmp

    Filesize

    200KB

  • memory/2596-1109-0x0000000004CA0000-0x0000000004CEB000-memory.dmp

    Filesize

    300KB

  • memory/2596-1110-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/4324-165-0x00000000023B0000-0x00000000023C0000-memory.dmp

    Filesize

    64KB

  • memory/4324-166-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4324-160-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/4324-134-0x00000000023B0000-0x00000000023C0000-memory.dmp

    Filesize

    64KB

  • memory/4324-148-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/4324-135-0x0000000004D80000-0x000000000527E000-memory.dmp

    Filesize

    5.0MB

  • memory/4324-136-0x0000000002430000-0x0000000002448000-memory.dmp

    Filesize

    96KB

  • memory/4324-169-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4324-167-0x00000000023B0000-0x00000000023C0000-memory.dmp

    Filesize

    64KB

  • memory/4324-137-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/4324-164-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/4324-162-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/4324-158-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/4324-156-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/4324-154-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/4324-152-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/4324-150-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/4324-146-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/4324-144-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/4324-132-0x0000000002360000-0x000000000237A000-memory.dmp

    Filesize

    104KB

  • memory/4324-133-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4324-142-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/4324-140-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/4324-138-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB