Analysis

  • max time kernel
    92s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 19:58

General

  • Target

    44dbdb543f7af3feb8ff769602f7a3137af0e1b3fef2ee9d87aa6d890d5fee50.exe

  • Size

    695KB

  • MD5

    b322ae4378334acc36396a4fbffa658c

  • SHA1

    b51e037707f69b961e78bb4a53431b62fa6fcb66

  • SHA256

    44dbdb543f7af3feb8ff769602f7a3137af0e1b3fef2ee9d87aa6d890d5fee50

  • SHA512

    d44071dc82e506c8888ede4254a3ec02fc207b9f8ae3d58c904f29f06ccdd6c277194899ae3076bc69d1f0e685a2f345ad90cc04d9c5c17a23e4a73e42813ac9

  • SSDEEP

    12288:CMrvy90vMEw7r8ULM89kC4Og43rWuuPle99p7tvPSwzIdyJ/7SqiMH:1ywFwH4Wg4SuelevBtyoIocs

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\44dbdb543f7af3feb8ff769602f7a3137af0e1b3fef2ee9d87aa6d890d5fee50.exe
    "C:\Users\Admin\AppData\Local\Temp\44dbdb543f7af3feb8ff769602f7a3137af0e1b3fef2ee9d87aa6d890d5fee50.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4604
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un794866.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un794866.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4648
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8968.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8968.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4504
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9060.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9060.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4708
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si046980.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si046980.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2864

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si046980.exe

    Filesize

    175KB

    MD5

    5806e915d7fe82bb5f9b40d559569d3d

    SHA1

    115cc89afd98ee2af3cd70e21844d3f5e56f544f

    SHA256

    fcc0864462c21432db47b18e420844d36bcd07b7d2045e7106b107efcac7ca3a

    SHA512

    6a0a7e66ee878512946df73c41c041b64e3aa7aaa71cb062005d1fb481434692c7c4627b328164a6fdd01333456e4552f76dee3e79cb01d96625f25b4892fd95

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si046980.exe

    Filesize

    175KB

    MD5

    5806e915d7fe82bb5f9b40d559569d3d

    SHA1

    115cc89afd98ee2af3cd70e21844d3f5e56f544f

    SHA256

    fcc0864462c21432db47b18e420844d36bcd07b7d2045e7106b107efcac7ca3a

    SHA512

    6a0a7e66ee878512946df73c41c041b64e3aa7aaa71cb062005d1fb481434692c7c4627b328164a6fdd01333456e4552f76dee3e79cb01d96625f25b4892fd95

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un794866.exe

    Filesize

    553KB

    MD5

    eb2e187519cd52b6ea556a65b8a50b00

    SHA1

    80798bcbbc00fa9148f4be977a21172ca8f6d813

    SHA256

    f1ea93800c8b0630aee1aed8e51335dbb60c1f4b889d367a239249de48e055c5

    SHA512

    535ad7d98c5dfa873b44aeccf02d5cfa7cccffe5bf74a934bf884578b5b612052b3ad82ad7a80e620fedcde3c924ebe8cc6337b1b206b2294e9bf56a11d060e0

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un794866.exe

    Filesize

    553KB

    MD5

    eb2e187519cd52b6ea556a65b8a50b00

    SHA1

    80798bcbbc00fa9148f4be977a21172ca8f6d813

    SHA256

    f1ea93800c8b0630aee1aed8e51335dbb60c1f4b889d367a239249de48e055c5

    SHA512

    535ad7d98c5dfa873b44aeccf02d5cfa7cccffe5bf74a934bf884578b5b612052b3ad82ad7a80e620fedcde3c924ebe8cc6337b1b206b2294e9bf56a11d060e0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8968.exe

    Filesize

    308KB

    MD5

    cd67051cd36da2099adaa81eaf506800

    SHA1

    d2eb5a155960771a0e49f4fb3194dcae055e2e16

    SHA256

    18c981ada3061c35a001e0c41e536d86f455c215b1c78c92896da848f12bbde2

    SHA512

    d92aecac4842da2e621bbd63971c0dbe8a0090421251193dc497b0719f78894bfb958031276477e22fa17c6d08f2dc90fb9b9659d0da896229005f656b16a856

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8968.exe

    Filesize

    308KB

    MD5

    cd67051cd36da2099adaa81eaf506800

    SHA1

    d2eb5a155960771a0e49f4fb3194dcae055e2e16

    SHA256

    18c981ada3061c35a001e0c41e536d86f455c215b1c78c92896da848f12bbde2

    SHA512

    d92aecac4842da2e621bbd63971c0dbe8a0090421251193dc497b0719f78894bfb958031276477e22fa17c6d08f2dc90fb9b9659d0da896229005f656b16a856

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9060.exe

    Filesize

    366KB

    MD5

    d498a7e421bb4b0f4f90058daf642d68

    SHA1

    4b7c80e164b131b09adf02c42e7b581a1f48d386

    SHA256

    34e7782cb34725befbd3887051740a5f2906c2db065022eb56465932abb7c4a8

    SHA512

    83ceef37a9ace9f01438a50af09be23d7074c26e71423decd3a096ab48829b313b2442efd2423c255b72a954759d39078f4e79cdcc41c074dacab8bcb4db9e68

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9060.exe

    Filesize

    366KB

    MD5

    d498a7e421bb4b0f4f90058daf642d68

    SHA1

    4b7c80e164b131b09adf02c42e7b581a1f48d386

    SHA256

    34e7782cb34725befbd3887051740a5f2906c2db065022eb56465932abb7c4a8

    SHA512

    83ceef37a9ace9f01438a50af09be23d7074c26e71423decd3a096ab48829b313b2442efd2423c255b72a954759d39078f4e79cdcc41c074dacab8bcb4db9e68

  • memory/2864-1121-0x0000000000F20000-0x0000000000F52000-memory.dmp

    Filesize

    200KB

  • memory/2864-1122-0x00000000057B0000-0x00000000057C0000-memory.dmp

    Filesize

    64KB

  • memory/2864-1123-0x00000000057B0000-0x00000000057C0000-memory.dmp

    Filesize

    64KB

  • memory/4504-160-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/4504-172-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/4504-153-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/4504-152-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/4504-154-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/4504-156-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/4504-158-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/4504-150-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/4504-162-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/4504-164-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/4504-166-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/4504-168-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/4504-170-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/4504-151-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/4504-174-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/4504-176-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/4504-178-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/4504-180-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/4504-181-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4504-182-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/4504-183-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/4504-184-0x0000000004EC0000-0x0000000004ED0000-memory.dmp

    Filesize

    64KB

  • memory/4504-186-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4504-149-0x0000000000840000-0x000000000086D000-memory.dmp

    Filesize

    180KB

  • memory/4504-148-0x0000000004ED0000-0x0000000005474000-memory.dmp

    Filesize

    5.6MB

  • memory/4708-194-0x00000000052B0000-0x00000000052EF000-memory.dmp

    Filesize

    252KB

  • memory/4708-196-0x00000000052B0000-0x00000000052EF000-memory.dmp

    Filesize

    252KB

  • memory/4708-198-0x00000000052B0000-0x00000000052EF000-memory.dmp

    Filesize

    252KB

  • memory/4708-200-0x00000000052B0000-0x00000000052EF000-memory.dmp

    Filesize

    252KB

  • memory/4708-202-0x00000000052B0000-0x00000000052EF000-memory.dmp

    Filesize

    252KB

  • memory/4708-204-0x00000000052B0000-0x00000000052EF000-memory.dmp

    Filesize

    252KB

  • memory/4708-206-0x00000000052B0000-0x00000000052EF000-memory.dmp

    Filesize

    252KB

  • memory/4708-208-0x00000000052B0000-0x00000000052EF000-memory.dmp

    Filesize

    252KB

  • memory/4708-210-0x00000000052B0000-0x00000000052EF000-memory.dmp

    Filesize

    252KB

  • memory/4708-213-0x0000000000720000-0x000000000076B000-memory.dmp

    Filesize

    300KB

  • memory/4708-212-0x00000000052B0000-0x00000000052EF000-memory.dmp

    Filesize

    252KB

  • memory/4708-217-0x0000000004C70000-0x0000000004C80000-memory.dmp

    Filesize

    64KB

  • memory/4708-216-0x00000000052B0000-0x00000000052EF000-memory.dmp

    Filesize

    252KB

  • memory/4708-215-0x0000000004C70000-0x0000000004C80000-memory.dmp

    Filesize

    64KB

  • memory/4708-219-0x00000000052B0000-0x00000000052EF000-memory.dmp

    Filesize

    252KB

  • memory/4708-221-0x00000000052B0000-0x00000000052EF000-memory.dmp

    Filesize

    252KB

  • memory/4708-223-0x00000000052B0000-0x00000000052EF000-memory.dmp

    Filesize

    252KB

  • memory/4708-225-0x00000000052B0000-0x00000000052EF000-memory.dmp

    Filesize

    252KB

  • memory/4708-227-0x00000000052B0000-0x00000000052EF000-memory.dmp

    Filesize

    252KB

  • memory/4708-1100-0x0000000005460000-0x0000000005A78000-memory.dmp

    Filesize

    6.1MB

  • memory/4708-1101-0x0000000005B00000-0x0000000005C0A000-memory.dmp

    Filesize

    1.0MB

  • memory/4708-1102-0x0000000005C40000-0x0000000005C52000-memory.dmp

    Filesize

    72KB

  • memory/4708-1103-0x0000000005C60000-0x0000000005C9C000-memory.dmp

    Filesize

    240KB

  • memory/4708-1104-0x0000000004C70000-0x0000000004C80000-memory.dmp

    Filesize

    64KB

  • memory/4708-1105-0x0000000005F50000-0x0000000005FE2000-memory.dmp

    Filesize

    584KB

  • memory/4708-1106-0x0000000005FF0000-0x0000000006056000-memory.dmp

    Filesize

    408KB

  • memory/4708-1108-0x0000000004C70000-0x0000000004C80000-memory.dmp

    Filesize

    64KB

  • memory/4708-1109-0x0000000004C70000-0x0000000004C80000-memory.dmp

    Filesize

    64KB

  • memory/4708-1110-0x0000000004C70000-0x0000000004C80000-memory.dmp

    Filesize

    64KB

  • memory/4708-1111-0x0000000004C70000-0x0000000004C80000-memory.dmp

    Filesize

    64KB

  • memory/4708-1112-0x0000000006950000-0x0000000006B12000-memory.dmp

    Filesize

    1.8MB

  • memory/4708-192-0x00000000052B0000-0x00000000052EF000-memory.dmp

    Filesize

    252KB

  • memory/4708-191-0x00000000052B0000-0x00000000052EF000-memory.dmp

    Filesize

    252KB

  • memory/4708-1113-0x0000000006B70000-0x000000000709C000-memory.dmp

    Filesize

    5.2MB

  • memory/4708-1114-0x00000000071A0000-0x0000000007216000-memory.dmp

    Filesize

    472KB

  • memory/4708-1115-0x0000000007230000-0x0000000007280000-memory.dmp

    Filesize

    320KB