Analysis

  • max time kernel
    105s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 19:49

General

  • Target

    43dddd4574c193138f4be438f088e10986aef481206f39f8ee46f38f95b1a265.exe

  • Size

    695KB

  • MD5

    b4bf4af149607f98138166d7aab2b806

  • SHA1

    c1a5e20903e664accff8e68e53aebe7f8d449ffe

  • SHA256

    43dddd4574c193138f4be438f088e10986aef481206f39f8ee46f38f95b1a265

  • SHA512

    437c9fdd79a663a7b7a8f3a8cf3b54a8a175960c24c140f39625b057ad372cdff01e21a9f75b5a2aa1f4673a2da2d42325073b5b9d51888bfeb30bda3a82d26f

  • SSDEEP

    12288:RMrPy90BSVuHZFZy2PrAnwyOinGlQJGFOvPSpzbjoJiEAz97MRt:CyiXrymr5ioQogy5bMyaRt

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\43dddd4574c193138f4be438f088e10986aef481206f39f8ee46f38f95b1a265.exe
    "C:\Users\Admin\AppData\Local\Temp\43dddd4574c193138f4be438f088e10986aef481206f39f8ee46f38f95b1a265.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3656
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un385157.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un385157.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1436
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3211.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3211.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2428
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0024.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0024.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3368
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si607210.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si607210.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3768

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si607210.exe

    Filesize

    175KB

    MD5

    e8b6021829d1ee3095f01a74ce14e8f9

    SHA1

    b9ee689382b8d4b5f735bb6b4e86037bb39d8cc1

    SHA256

    f0ee866abfe1993572dedd4117c7f3f1a71617d3b78293aad3232c8aa9e0d4e5

    SHA512

    c7323116d4135bfeb304cd1686ccb01a49333caddf2823fea769b8c9c8bc636ff25d5ff33687007dc81ba2c9249cb40fe0893f70e18141ee4c25a99f1b282ccf

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si607210.exe

    Filesize

    175KB

    MD5

    e8b6021829d1ee3095f01a74ce14e8f9

    SHA1

    b9ee689382b8d4b5f735bb6b4e86037bb39d8cc1

    SHA256

    f0ee866abfe1993572dedd4117c7f3f1a71617d3b78293aad3232c8aa9e0d4e5

    SHA512

    c7323116d4135bfeb304cd1686ccb01a49333caddf2823fea769b8c9c8bc636ff25d5ff33687007dc81ba2c9249cb40fe0893f70e18141ee4c25a99f1b282ccf

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un385157.exe

    Filesize

    553KB

    MD5

    8b7cad2e504b1b2ee081d60ac3f6c380

    SHA1

    3f679be40fab394b5b00d3bbdc224966f8dfd04d

    SHA256

    455dcf68c78b9979917c8405d8e5857c6421b5129ca82386f12d43f1cfc8954d

    SHA512

    540ea85d33aba252514aa4b34121e56bbe2ec44bdbfaa4d7e0f0a21eceab3f34e1ca7ec52be9f7bb6b0b1941caa1ba7f168e844ed847428c9206cecc603c64fe

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un385157.exe

    Filesize

    553KB

    MD5

    8b7cad2e504b1b2ee081d60ac3f6c380

    SHA1

    3f679be40fab394b5b00d3bbdc224966f8dfd04d

    SHA256

    455dcf68c78b9979917c8405d8e5857c6421b5129ca82386f12d43f1cfc8954d

    SHA512

    540ea85d33aba252514aa4b34121e56bbe2ec44bdbfaa4d7e0f0a21eceab3f34e1ca7ec52be9f7bb6b0b1941caa1ba7f168e844ed847428c9206cecc603c64fe

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3211.exe

    Filesize

    308KB

    MD5

    77ffac6986f5f07ef220664d34f326a2

    SHA1

    e0679c0f93d422b9d1c40de01d0a423d123dbff8

    SHA256

    89af4e8a1e8017c7719905db189896092d4d8e950173ddca42ed8b04231813b6

    SHA512

    5ec31740d2d8e4ed1ef3a52f901c15735807af70b9b15c49320363f3eabfedb3800891e314f3ec9f9aca5eaa8315689c64a183b5c32138c816d4a9eca29673df

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3211.exe

    Filesize

    308KB

    MD5

    77ffac6986f5f07ef220664d34f326a2

    SHA1

    e0679c0f93d422b9d1c40de01d0a423d123dbff8

    SHA256

    89af4e8a1e8017c7719905db189896092d4d8e950173ddca42ed8b04231813b6

    SHA512

    5ec31740d2d8e4ed1ef3a52f901c15735807af70b9b15c49320363f3eabfedb3800891e314f3ec9f9aca5eaa8315689c64a183b5c32138c816d4a9eca29673df

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0024.exe

    Filesize

    366KB

    MD5

    b0ff4d46bfe59b1e87fc025a654f7ceb

    SHA1

    e1ff298bdb2858af27067222fcb5242d97452faf

    SHA256

    881aa6b72fb5b1efce036e413a35af03d298fa5a3f40b39c4a9b1b06dbd3a2c5

    SHA512

    82af0f77546b81a57c52bc40dd745955443cba2ce42e039ca862b003e3b88c60d7e2e0cc4aa72173c8b5d94741810deb47e214cb2899dffdffbd2356b62a8d51

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0024.exe

    Filesize

    366KB

    MD5

    b0ff4d46bfe59b1e87fc025a654f7ceb

    SHA1

    e1ff298bdb2858af27067222fcb5242d97452faf

    SHA256

    881aa6b72fb5b1efce036e413a35af03d298fa5a3f40b39c4a9b1b06dbd3a2c5

    SHA512

    82af0f77546b81a57c52bc40dd745955443cba2ce42e039ca862b003e3b88c60d7e2e0cc4aa72173c8b5d94741810deb47e214cb2899dffdffbd2356b62a8d51

  • memory/2428-148-0x00000000008F0000-0x000000000091D000-memory.dmp

    Filesize

    180KB

  • memory/2428-150-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/2428-149-0x0000000004EC0000-0x0000000005464000-memory.dmp

    Filesize

    5.6MB

  • memory/2428-152-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/2428-151-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/2428-153-0x0000000002810000-0x0000000002822000-memory.dmp

    Filesize

    72KB

  • memory/2428-154-0x0000000002810000-0x0000000002822000-memory.dmp

    Filesize

    72KB

  • memory/2428-156-0x0000000002810000-0x0000000002822000-memory.dmp

    Filesize

    72KB

  • memory/2428-158-0x0000000002810000-0x0000000002822000-memory.dmp

    Filesize

    72KB

  • memory/2428-160-0x0000000002810000-0x0000000002822000-memory.dmp

    Filesize

    72KB

  • memory/2428-162-0x0000000002810000-0x0000000002822000-memory.dmp

    Filesize

    72KB

  • memory/2428-164-0x0000000002810000-0x0000000002822000-memory.dmp

    Filesize

    72KB

  • memory/2428-166-0x0000000002810000-0x0000000002822000-memory.dmp

    Filesize

    72KB

  • memory/2428-168-0x0000000002810000-0x0000000002822000-memory.dmp

    Filesize

    72KB

  • memory/2428-170-0x0000000002810000-0x0000000002822000-memory.dmp

    Filesize

    72KB

  • memory/2428-172-0x0000000002810000-0x0000000002822000-memory.dmp

    Filesize

    72KB

  • memory/2428-174-0x0000000002810000-0x0000000002822000-memory.dmp

    Filesize

    72KB

  • memory/2428-176-0x0000000002810000-0x0000000002822000-memory.dmp

    Filesize

    72KB

  • memory/2428-178-0x0000000002810000-0x0000000002822000-memory.dmp

    Filesize

    72KB

  • memory/2428-180-0x0000000002810000-0x0000000002822000-memory.dmp

    Filesize

    72KB

  • memory/2428-181-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/2428-182-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/2428-183-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/2428-185-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/3368-190-0x0000000002570000-0x00000000025AF000-memory.dmp

    Filesize

    252KB

  • memory/3368-191-0x0000000002570000-0x00000000025AF000-memory.dmp

    Filesize

    252KB

  • memory/3368-193-0x0000000002570000-0x00000000025AF000-memory.dmp

    Filesize

    252KB

  • memory/3368-195-0x0000000002570000-0x00000000025AF000-memory.dmp

    Filesize

    252KB

  • memory/3368-197-0x0000000002570000-0x00000000025AF000-memory.dmp

    Filesize

    252KB

  • memory/3368-199-0x0000000002570000-0x00000000025AF000-memory.dmp

    Filesize

    252KB

  • memory/3368-201-0x0000000002570000-0x00000000025AF000-memory.dmp

    Filesize

    252KB

  • memory/3368-203-0x0000000002570000-0x00000000025AF000-memory.dmp

    Filesize

    252KB

  • memory/3368-205-0x0000000002570000-0x00000000025AF000-memory.dmp

    Filesize

    252KB

  • memory/3368-207-0x0000000002570000-0x00000000025AF000-memory.dmp

    Filesize

    252KB

  • memory/3368-208-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/3368-210-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

    Filesize

    64KB

  • memory/3368-212-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

    Filesize

    64KB

  • memory/3368-214-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

    Filesize

    64KB

  • memory/3368-211-0x0000000002570000-0x00000000025AF000-memory.dmp

    Filesize

    252KB

  • memory/3368-217-0x0000000002570000-0x00000000025AF000-memory.dmp

    Filesize

    252KB

  • memory/3368-215-0x0000000002570000-0x00000000025AF000-memory.dmp

    Filesize

    252KB

  • memory/3368-219-0x0000000002570000-0x00000000025AF000-memory.dmp

    Filesize

    252KB

  • memory/3368-221-0x0000000002570000-0x00000000025AF000-memory.dmp

    Filesize

    252KB

  • memory/3368-223-0x0000000002570000-0x00000000025AF000-memory.dmp

    Filesize

    252KB

  • memory/3368-225-0x0000000002570000-0x00000000025AF000-memory.dmp

    Filesize

    252KB

  • memory/3368-227-0x0000000002570000-0x00000000025AF000-memory.dmp

    Filesize

    252KB

  • memory/3368-1100-0x00000000055A0000-0x0000000005BB8000-memory.dmp

    Filesize

    6.1MB

  • memory/3368-1101-0x0000000005BC0000-0x0000000005CCA000-memory.dmp

    Filesize

    1.0MB

  • memory/3368-1102-0x0000000004E50000-0x0000000004E62000-memory.dmp

    Filesize

    72KB

  • memory/3368-1103-0x0000000004E70000-0x0000000004EAC000-memory.dmp

    Filesize

    240KB

  • memory/3368-1104-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

    Filesize

    64KB

  • memory/3368-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp

    Filesize

    584KB

  • memory/3368-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp

    Filesize

    408KB

  • memory/3368-1108-0x00000000066F0000-0x0000000006766000-memory.dmp

    Filesize

    472KB

  • memory/3368-1109-0x0000000006780000-0x00000000067D0000-memory.dmp

    Filesize

    320KB

  • memory/3368-1111-0x0000000006800000-0x00000000069C2000-memory.dmp

    Filesize

    1.8MB

  • memory/3368-1110-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

    Filesize

    64KB

  • memory/3368-1112-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

    Filesize

    64KB

  • memory/3368-1113-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

    Filesize

    64KB

  • memory/3368-1114-0x00000000069D0000-0x0000000006EFC000-memory.dmp

    Filesize

    5.2MB

  • memory/3368-1115-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

    Filesize

    64KB

  • memory/3768-1121-0x0000000000080000-0x00000000000B2000-memory.dmp

    Filesize

    200KB

  • memory/3768-1122-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

    Filesize

    64KB