Analysis

  • max time kernel
    93s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2023, 19:55

General

  • Target

    3d10360bb4335e100c896ce9656a42c2b76c14b5c433f6cd71d5ee960c8a9dee.exe

  • Size

    695KB

  • MD5

    dba39baff2d6e1a64e9a45aeb0fefdb3

  • SHA1

    a11e71f7eb96db80dca943a7b8fcebf79115ba6d

  • SHA256

    3d10360bb4335e100c896ce9656a42c2b76c14b5c433f6cd71d5ee960c8a9dee

  • SHA512

    d1b6ab79d6ed93ee93ad6ad63a9dc28d8ea14caf43c4205a7f48d83a555c8a18f1c4742f96b932646f87f333d319611470f647153ca71fc17c647397bf549901

  • SSDEEP

    12288:OMr3y90YJSPmW2Q8bTBCoPkgFlvqeZSvPSzzi2GJSyryWih:JyTHwUkgvvqeZSyfiHw+yP

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3d10360bb4335e100c896ce9656a42c2b76c14b5c433f6cd71d5ee960c8a9dee.exe
    "C:\Users\Admin\AppData\Local\Temp\3d10360bb4335e100c896ce9656a42c2b76c14b5c433f6cd71d5ee960c8a9dee.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un268678.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un268678.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4664
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6312.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6312.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1384
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7284.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7284.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3796
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si597108.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si597108.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1964

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si597108.exe

    Filesize

    175KB

    MD5

    c1dc3febc7f3dea216625e083b05a8c0

    SHA1

    497fab2b72f1959853a976ad1f054b71998516f1

    SHA256

    013168c96ff52032c3cf21b9dec141b414ce0824a88ec8eeab08b43fe0c0c562

    SHA512

    eff5c9e679dfcae480caa12465144caf3fcc3a9ee53507d732d5f17db42663aecc951e2472f48207db4a3ca7c3d669ab583902fd4af4bd35e1cb5da560c55041

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si597108.exe

    Filesize

    175KB

    MD5

    c1dc3febc7f3dea216625e083b05a8c0

    SHA1

    497fab2b72f1959853a976ad1f054b71998516f1

    SHA256

    013168c96ff52032c3cf21b9dec141b414ce0824a88ec8eeab08b43fe0c0c562

    SHA512

    eff5c9e679dfcae480caa12465144caf3fcc3a9ee53507d732d5f17db42663aecc951e2472f48207db4a3ca7c3d669ab583902fd4af4bd35e1cb5da560c55041

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un268678.exe

    Filesize

    553KB

    MD5

    abef5a077be1ca6bd176e4101094483d

    SHA1

    36dd93bc083f472e5c5049a551e71acd013466c7

    SHA256

    f429cdddec1b63d1b558784ef25805994aa3a1f76a4f28f5cc6e09e9a1ba3b1a

    SHA512

    9873cbfb1711fb936f4ef2bf144bfa6193a369804a65f09e427aeb87124da287488cf588fa31fb50a237d7882389827880bfbb80ee17a04cfc582e7efd215d18

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un268678.exe

    Filesize

    553KB

    MD5

    abef5a077be1ca6bd176e4101094483d

    SHA1

    36dd93bc083f472e5c5049a551e71acd013466c7

    SHA256

    f429cdddec1b63d1b558784ef25805994aa3a1f76a4f28f5cc6e09e9a1ba3b1a

    SHA512

    9873cbfb1711fb936f4ef2bf144bfa6193a369804a65f09e427aeb87124da287488cf588fa31fb50a237d7882389827880bfbb80ee17a04cfc582e7efd215d18

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6312.exe

    Filesize

    308KB

    MD5

    d48753e1d94d5a54907cecf3be10c200

    SHA1

    bf2d6fbbe49565b60ef18da37b96bdc679af82f9

    SHA256

    4bce729b81e494e479d1ea47049a968dcc1a06618410e09f8234861f21f5e2c7

    SHA512

    5c15541e242b31dc96a874f04127df3c3ca9c2e7c1845e4ee243c35fae28fc815e57ef784e8b3332fe13023115e8859050f3f4a149f4f93880474f2baf6747c4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6312.exe

    Filesize

    308KB

    MD5

    d48753e1d94d5a54907cecf3be10c200

    SHA1

    bf2d6fbbe49565b60ef18da37b96bdc679af82f9

    SHA256

    4bce729b81e494e479d1ea47049a968dcc1a06618410e09f8234861f21f5e2c7

    SHA512

    5c15541e242b31dc96a874f04127df3c3ca9c2e7c1845e4ee243c35fae28fc815e57ef784e8b3332fe13023115e8859050f3f4a149f4f93880474f2baf6747c4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7284.exe

    Filesize

    366KB

    MD5

    3af75cdcb9f021b1ba330b94c6279f8b

    SHA1

    d6ecee3cb4928ae92b81be901367d1ca88315c12

    SHA256

    840f61955605e04c6c9eae3d1e9f45252cbfb945cfe53b16ed5bed9a2895ee8f

    SHA512

    a37a3fe2f2526d72853e942b66dd284615e2c9fc775ffec36a945df44eadb3117d7bfada710e42794994799b438b8f1a7b79cf291cff4c06bc493350d4e5b953

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7284.exe

    Filesize

    366KB

    MD5

    3af75cdcb9f021b1ba330b94c6279f8b

    SHA1

    d6ecee3cb4928ae92b81be901367d1ca88315c12

    SHA256

    840f61955605e04c6c9eae3d1e9f45252cbfb945cfe53b16ed5bed9a2895ee8f

    SHA512

    a37a3fe2f2526d72853e942b66dd284615e2c9fc775ffec36a945df44eadb3117d7bfada710e42794994799b438b8f1a7b79cf291cff4c06bc493350d4e5b953

  • memory/1384-162-0x0000000002830000-0x0000000002842000-memory.dmp

    Filesize

    72KB

  • memory/1384-168-0x0000000002830000-0x0000000002842000-memory.dmp

    Filesize

    72KB

  • memory/1384-153-0x0000000002830000-0x0000000002842000-memory.dmp

    Filesize

    72KB

  • memory/1384-151-0x0000000002830000-0x0000000002842000-memory.dmp

    Filesize

    72KB

  • memory/1384-155-0x0000000002520000-0x0000000002530000-memory.dmp

    Filesize

    64KB

  • memory/1384-152-0x0000000002520000-0x0000000002530000-memory.dmp

    Filesize

    64KB

  • memory/1384-150-0x0000000002520000-0x0000000002530000-memory.dmp

    Filesize

    64KB

  • memory/1384-158-0x0000000002830000-0x0000000002842000-memory.dmp

    Filesize

    72KB

  • memory/1384-156-0x0000000002830000-0x0000000002842000-memory.dmp

    Filesize

    72KB

  • memory/1384-160-0x0000000002830000-0x0000000002842000-memory.dmp

    Filesize

    72KB

  • memory/1384-148-0x0000000004D30000-0x00000000052D4000-memory.dmp

    Filesize

    5.6MB

  • memory/1384-164-0x0000000002830000-0x0000000002842000-memory.dmp

    Filesize

    72KB

  • memory/1384-166-0x0000000002830000-0x0000000002842000-memory.dmp

    Filesize

    72KB

  • memory/1384-149-0x0000000000710000-0x000000000073D000-memory.dmp

    Filesize

    180KB

  • memory/1384-170-0x0000000002830000-0x0000000002842000-memory.dmp

    Filesize

    72KB

  • memory/1384-172-0x0000000002830000-0x0000000002842000-memory.dmp

    Filesize

    72KB

  • memory/1384-174-0x0000000002830000-0x0000000002842000-memory.dmp

    Filesize

    72KB

  • memory/1384-176-0x0000000002830000-0x0000000002842000-memory.dmp

    Filesize

    72KB

  • memory/1384-178-0x0000000002830000-0x0000000002842000-memory.dmp

    Filesize

    72KB

  • memory/1384-180-0x0000000002830000-0x0000000002842000-memory.dmp

    Filesize

    72KB

  • memory/1384-181-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/1384-182-0x0000000002520000-0x0000000002530000-memory.dmp

    Filesize

    64KB

  • memory/1384-183-0x0000000002520000-0x0000000002530000-memory.dmp

    Filesize

    64KB

  • memory/1384-184-0x0000000002520000-0x0000000002530000-memory.dmp

    Filesize

    64KB

  • memory/1384-186-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/1964-1121-0x0000000000F70000-0x0000000000FA2000-memory.dmp

    Filesize

    200KB

  • memory/1964-1123-0x0000000005970000-0x0000000005980000-memory.dmp

    Filesize

    64KB

  • memory/1964-1122-0x0000000005970000-0x0000000005980000-memory.dmp

    Filesize

    64KB

  • memory/3796-194-0x0000000004D20000-0x0000000004D5F000-memory.dmp

    Filesize

    252KB

  • memory/3796-198-0x0000000004D20000-0x0000000004D5F000-memory.dmp

    Filesize

    252KB

  • memory/3796-196-0x0000000004D20000-0x0000000004D5F000-memory.dmp

    Filesize

    252KB

  • memory/3796-200-0x0000000004D20000-0x0000000004D5F000-memory.dmp

    Filesize

    252KB

  • memory/3796-202-0x0000000004D20000-0x0000000004D5F000-memory.dmp

    Filesize

    252KB

  • memory/3796-204-0x0000000004D20000-0x0000000004D5F000-memory.dmp

    Filesize

    252KB

  • memory/3796-206-0x0000000004D20000-0x0000000004D5F000-memory.dmp

    Filesize

    252KB

  • memory/3796-208-0x0000000004D20000-0x0000000004D5F000-memory.dmp

    Filesize

    252KB

  • memory/3796-210-0x0000000004D20000-0x0000000004D5F000-memory.dmp

    Filesize

    252KB

  • memory/3796-212-0x0000000004D20000-0x0000000004D5F000-memory.dmp

    Filesize

    252KB

  • memory/3796-214-0x0000000004D20000-0x0000000004D5F000-memory.dmp

    Filesize

    252KB

  • memory/3796-216-0x0000000004D20000-0x0000000004D5F000-memory.dmp

    Filesize

    252KB

  • memory/3796-218-0x0000000004D20000-0x0000000004D5F000-memory.dmp

    Filesize

    252KB

  • memory/3796-220-0x0000000002110000-0x000000000215B000-memory.dmp

    Filesize

    300KB

  • memory/3796-222-0x0000000004D20000-0x0000000004D5F000-memory.dmp

    Filesize

    252KB

  • memory/3796-223-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/3796-225-0x0000000004D20000-0x0000000004D5F000-memory.dmp

    Filesize

    252KB

  • memory/3796-221-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/3796-227-0x0000000004D20000-0x0000000004D5F000-memory.dmp

    Filesize

    252KB

  • memory/3796-1100-0x0000000005510000-0x0000000005B28000-memory.dmp

    Filesize

    6.1MB

  • memory/3796-1101-0x0000000005B30000-0x0000000005C3A000-memory.dmp

    Filesize

    1.0MB

  • memory/3796-1102-0x0000000005C40000-0x0000000005C52000-memory.dmp

    Filesize

    72KB

  • memory/3796-1103-0x0000000005C60000-0x0000000005C9C000-memory.dmp

    Filesize

    240KB

  • memory/3796-1104-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/3796-1105-0x0000000005F50000-0x0000000005FB6000-memory.dmp

    Filesize

    408KB

  • memory/3796-1106-0x0000000006620000-0x00000000066B2000-memory.dmp

    Filesize

    584KB

  • memory/3796-1108-0x00000000067F0000-0x0000000006866000-memory.dmp

    Filesize

    472KB

  • memory/3796-1109-0x0000000006880000-0x00000000068D0000-memory.dmp

    Filesize

    320KB

  • memory/3796-1110-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/3796-1111-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/3796-1112-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/3796-192-0x0000000004D20000-0x0000000004D5F000-memory.dmp

    Filesize

    252KB

  • memory/3796-191-0x0000000004D20000-0x0000000004D5F000-memory.dmp

    Filesize

    252KB

  • memory/3796-1113-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/3796-1114-0x0000000006A70000-0x0000000006C32000-memory.dmp

    Filesize

    1.8MB

  • memory/3796-1115-0x0000000006C40000-0x000000000716C000-memory.dmp

    Filesize

    5.2MB