Analysis

  • max time kernel
    135s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 19:56

General

  • Target

    96f7a13f198faec689e5f4cdbc2d80afa41b240db0cd808371e6440b8bec9ea9.exe

  • Size

    695KB

  • MD5

    9e5b006eeaa5e1654607c850d7c10ad6

  • SHA1

    bc1fbe877824f7a3bd52e91751ba4c1ae903e3bc

  • SHA256

    96f7a13f198faec689e5f4cdbc2d80afa41b240db0cd808371e6440b8bec9ea9

  • SHA512

    24cb480ca35f37299833a9e62eaf4fe0fcdd144ed6df8b632bc5a998e2aa7c2c268ac445aeffef450866d940535f33786f526c94159b119bae8dcb362a625db7

  • SSDEEP

    12288:XMrvy90rsCJqgWMAVDASosaKKGvZzoKqdeTiONcvPSdzGCgJK7aiqBcpMuo:IyiCgcA2ISZzNqdeTiONcyNGfwlvQ

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\96f7a13f198faec689e5f4cdbc2d80afa41b240db0cd808371e6440b8bec9ea9.exe
    "C:\Users\Admin\AppData\Local\Temp\96f7a13f198faec689e5f4cdbc2d80afa41b240db0cd808371e6440b8bec9ea9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3388
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un758226.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un758226.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5096
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1783.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1783.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2972
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5118.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5118.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1440
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si385369.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si385369.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:624

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si385369.exe

    Filesize

    175KB

    MD5

    e0cff543fe7ddf5c60181b2ee7d7e4f3

    SHA1

    6e631046994f9ef07847d021f233067a998c0f4f

    SHA256

    589bb9dff0d0fa41bf340f6a328edbfb3f8163ed14d47fe5c50075d2653f77d6

    SHA512

    e43bcada1e796476c634ec678afe09bd4035d5ca4f75acfaf2d449df1c952d2bb5be90186174eb24b346878262c5647a290add67ed39334d7ee1b5c8d82c9b5d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si385369.exe

    Filesize

    175KB

    MD5

    e0cff543fe7ddf5c60181b2ee7d7e4f3

    SHA1

    6e631046994f9ef07847d021f233067a998c0f4f

    SHA256

    589bb9dff0d0fa41bf340f6a328edbfb3f8163ed14d47fe5c50075d2653f77d6

    SHA512

    e43bcada1e796476c634ec678afe09bd4035d5ca4f75acfaf2d449df1c952d2bb5be90186174eb24b346878262c5647a290add67ed39334d7ee1b5c8d82c9b5d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un758226.exe

    Filesize

    553KB

    MD5

    d1ce5786bc8a24c32cc62174a9463b51

    SHA1

    928b26d96ec702d032f44117db5d1381cf6949c7

    SHA256

    95217309c37b9dad0e0e5bd41a0d8293bd1a6af76fa7a5f8236809bbec385307

    SHA512

    2ae3073beebdf64c05912cac69a93a69cbe0248294f11457aa5e0cadc172238211af2297db9224e1c4be60344b13a543d08ed6845c4a4086a7a9e21e0da88bd7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un758226.exe

    Filesize

    553KB

    MD5

    d1ce5786bc8a24c32cc62174a9463b51

    SHA1

    928b26d96ec702d032f44117db5d1381cf6949c7

    SHA256

    95217309c37b9dad0e0e5bd41a0d8293bd1a6af76fa7a5f8236809bbec385307

    SHA512

    2ae3073beebdf64c05912cac69a93a69cbe0248294f11457aa5e0cadc172238211af2297db9224e1c4be60344b13a543d08ed6845c4a4086a7a9e21e0da88bd7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1783.exe

    Filesize

    308KB

    MD5

    02e67c0a66f81863fea38ebf9acfd6ff

    SHA1

    170caa24b9ac58a7ad3fb354f39ec4d7ed36e3df

    SHA256

    31a8a7d248a9918aa1a94ad64b363f6e664b04ad9dcbc52c4cd9fec6910165c9

    SHA512

    8d2253da5c484638dd7150ffd067f2728bbdaed153fa47e31c9b77faf5743be988dcff40c467b4722a2d94d5f0244e5c1802af2981a6d1ec9761a85b9f73b3f5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1783.exe

    Filesize

    308KB

    MD5

    02e67c0a66f81863fea38ebf9acfd6ff

    SHA1

    170caa24b9ac58a7ad3fb354f39ec4d7ed36e3df

    SHA256

    31a8a7d248a9918aa1a94ad64b363f6e664b04ad9dcbc52c4cd9fec6910165c9

    SHA512

    8d2253da5c484638dd7150ffd067f2728bbdaed153fa47e31c9b77faf5743be988dcff40c467b4722a2d94d5f0244e5c1802af2981a6d1ec9761a85b9f73b3f5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5118.exe

    Filesize

    366KB

    MD5

    a14761424e3edef34985d5a9a0ba67ee

    SHA1

    372ef624a0f779b0ab2bce0973e288ebcf0b0ca4

    SHA256

    1b4bbcfa456e0c9f1e82c6a4f3ed45a992bde87faa05a039ac5d49f1abcd511b

    SHA512

    31284a07c04f92aa73e0a7f602ef3a1091239b87a07b943c0fe24cdfad124ce52eed9840d656c45071eebcdd0f511cbe61d187501977e60f8d45b1e82295e1ad

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5118.exe

    Filesize

    366KB

    MD5

    a14761424e3edef34985d5a9a0ba67ee

    SHA1

    372ef624a0f779b0ab2bce0973e288ebcf0b0ca4

    SHA256

    1b4bbcfa456e0c9f1e82c6a4f3ed45a992bde87faa05a039ac5d49f1abcd511b

    SHA512

    31284a07c04f92aa73e0a7f602ef3a1091239b87a07b943c0fe24cdfad124ce52eed9840d656c45071eebcdd0f511cbe61d187501977e60f8d45b1e82295e1ad

  • memory/624-1122-0x0000000005B70000-0x0000000005B80000-memory.dmp

    Filesize

    64KB

  • memory/624-1121-0x0000000000F70000-0x0000000000FA2000-memory.dmp

    Filesize

    200KB

  • memory/1440-535-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/1440-1104-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/1440-1115-0x00000000070E0000-0x0000000007130000-memory.dmp

    Filesize

    320KB

  • memory/1440-1114-0x0000000007060000-0x00000000070D6000-memory.dmp

    Filesize

    472KB

  • memory/1440-1113-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/1440-1112-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/1440-1111-0x00000000068B0000-0x0000000006DDC000-memory.dmp

    Filesize

    5.2MB

  • memory/1440-1110-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/1440-1109-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/1440-1107-0x00000000066D0000-0x0000000006892000-memory.dmp

    Filesize

    1.8MB

  • memory/1440-1106-0x0000000005EB0000-0x0000000005F16000-memory.dmp

    Filesize

    408KB

  • memory/1440-1105-0x0000000005E10000-0x0000000005EA2000-memory.dmp

    Filesize

    584KB

  • memory/1440-1103-0x0000000004E30000-0x0000000004E6C000-memory.dmp

    Filesize

    240KB

  • memory/1440-1102-0x0000000004E10000-0x0000000004E22000-memory.dmp

    Filesize

    72KB

  • memory/1440-1101-0x0000000005A90000-0x0000000005B9A000-memory.dmp

    Filesize

    1.0MB

  • memory/1440-1100-0x0000000005470000-0x0000000005A88000-memory.dmp

    Filesize

    6.1MB

  • memory/1440-226-0x0000000002970000-0x00000000029AF000-memory.dmp

    Filesize

    252KB

  • memory/1440-224-0x0000000002970000-0x00000000029AF000-memory.dmp

    Filesize

    252KB

  • memory/1440-222-0x0000000002970000-0x00000000029AF000-memory.dmp

    Filesize

    252KB

  • memory/1440-220-0x0000000002970000-0x00000000029AF000-memory.dmp

    Filesize

    252KB

  • memory/1440-190-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/1440-191-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/1440-192-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB

  • memory/1440-193-0x0000000002970000-0x00000000029AF000-memory.dmp

    Filesize

    252KB

  • memory/1440-194-0x0000000002970000-0x00000000029AF000-memory.dmp

    Filesize

    252KB

  • memory/1440-196-0x0000000002970000-0x00000000029AF000-memory.dmp

    Filesize

    252KB

  • memory/1440-198-0x0000000002970000-0x00000000029AF000-memory.dmp

    Filesize

    252KB

  • memory/1440-200-0x0000000002970000-0x00000000029AF000-memory.dmp

    Filesize

    252KB

  • memory/1440-202-0x0000000002970000-0x00000000029AF000-memory.dmp

    Filesize

    252KB

  • memory/1440-204-0x0000000002970000-0x00000000029AF000-memory.dmp

    Filesize

    252KB

  • memory/1440-206-0x0000000002970000-0x00000000029AF000-memory.dmp

    Filesize

    252KB

  • memory/1440-208-0x0000000002970000-0x00000000029AF000-memory.dmp

    Filesize

    252KB

  • memory/1440-210-0x0000000002970000-0x00000000029AF000-memory.dmp

    Filesize

    252KB

  • memory/1440-212-0x0000000002970000-0x00000000029AF000-memory.dmp

    Filesize

    252KB

  • memory/1440-214-0x0000000002970000-0x00000000029AF000-memory.dmp

    Filesize

    252KB

  • memory/1440-216-0x0000000002970000-0x00000000029AF000-memory.dmp

    Filesize

    252KB

  • memory/1440-218-0x0000000002970000-0x00000000029AF000-memory.dmp

    Filesize

    252KB

  • memory/2972-173-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB

  • memory/2972-150-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/2972-185-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/2972-183-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/2972-152-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB

  • memory/2972-182-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/2972-181-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/2972-180-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/2972-179-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB

  • memory/2972-157-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB

  • memory/2972-148-0x0000000000710000-0x000000000073D000-memory.dmp

    Filesize

    180KB

  • memory/2972-155-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB

  • memory/2972-169-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB

  • memory/2972-171-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB

  • memory/2972-153-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB

  • memory/2972-167-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB

  • memory/2972-165-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB

  • memory/2972-163-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB

  • memory/2972-161-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB

  • memory/2972-159-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB

  • memory/2972-151-0x0000000004D50000-0x00000000052F4000-memory.dmp

    Filesize

    5.6MB

  • memory/2972-175-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB

  • memory/2972-149-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/2972-177-0x0000000004C80000-0x0000000004C92000-memory.dmp

    Filesize

    72KB