Analysis

  • max time kernel
    56s
  • max time network
    73s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 19:59

General

  • Target

    6e95859a83ad147d1a9df5564dc76a25ca8567b8c54f642487a45dfa03253370.exe

  • Size

    695KB

  • MD5

    183de2383bbbacdabd21e2ddfb9dd30e

  • SHA1

    efe3af25acc8fe376b80361009dd54e0273959ce

  • SHA256

    6e95859a83ad147d1a9df5564dc76a25ca8567b8c54f642487a45dfa03253370

  • SHA512

    a3ee66774d2bd8028b75ead1ea52f9e99a0acab3a96b859a627f076a54dd0496d7498e3a0d2e45e1b622c41aff9e64c7f93df34e04f53fc5e9df76c574f2f914

  • SSDEEP

    12288:BMr7y90UFm6pZk+xpuHN3NemaxgEkjoKFdehwiv1vPS/zN+uJpPKW6FA3n:ey7Zk+judNe1gEkjNFdep1ybNnPJ2Sn

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e95859a83ad147d1a9df5564dc76a25ca8567b8c54f642487a45dfa03253370.exe
    "C:\Users\Admin\AppData\Local\Temp\6e95859a83ad147d1a9df5564dc76a25ca8567b8c54f642487a45dfa03253370.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un011945.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un011945.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4012
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0907.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0907.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2080
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4341.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4341.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3928
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si177641.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si177641.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4764

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si177641.exe

    Filesize

    175KB

    MD5

    210d61a107c57d334bd2b6fdf734b85c

    SHA1

    3e2c6dc8be404eceeb9a96d729b4817cb27f1e6a

    SHA256

    81a8b8eb0c549b2d8d1cb5f6fa37a9e64bced21c38f0951d3818ece4f07f6e68

    SHA512

    6ebc774f07562d522cff31883a0e118f31a452de96371d33ced9c9681e7effb68e78aed37fd37a7f7f6ef43a22d221327355fcba2a28cb13a0dbafbf7e86a495

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si177641.exe

    Filesize

    175KB

    MD5

    210d61a107c57d334bd2b6fdf734b85c

    SHA1

    3e2c6dc8be404eceeb9a96d729b4817cb27f1e6a

    SHA256

    81a8b8eb0c549b2d8d1cb5f6fa37a9e64bced21c38f0951d3818ece4f07f6e68

    SHA512

    6ebc774f07562d522cff31883a0e118f31a452de96371d33ced9c9681e7effb68e78aed37fd37a7f7f6ef43a22d221327355fcba2a28cb13a0dbafbf7e86a495

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un011945.exe

    Filesize

    553KB

    MD5

    2062b5e45c1762e48a7feaa9e89cbb86

    SHA1

    21ca1f6418076145cda1f65bfe6c813d586b24ca

    SHA256

    269203b6b291848ee576abbfe186eccaebddb9e4dcc9392e7d4dca786299c174

    SHA512

    fe27dc4eabb6f5d55694745b971129bdd06e8322f6749f92914ceb09bc67f5d99116e715bf4c1512bc8bdad9215febf400cdb616854522cc9f43fd3e0bef2edb

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un011945.exe

    Filesize

    553KB

    MD5

    2062b5e45c1762e48a7feaa9e89cbb86

    SHA1

    21ca1f6418076145cda1f65bfe6c813d586b24ca

    SHA256

    269203b6b291848ee576abbfe186eccaebddb9e4dcc9392e7d4dca786299c174

    SHA512

    fe27dc4eabb6f5d55694745b971129bdd06e8322f6749f92914ceb09bc67f5d99116e715bf4c1512bc8bdad9215febf400cdb616854522cc9f43fd3e0bef2edb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0907.exe

    Filesize

    308KB

    MD5

    2c715c370dc1dc3c4ae54d122ed45bbb

    SHA1

    a3bb361d0fa9bc7e86cb36a7183d1862ccfc5757

    SHA256

    35323a0fbf432d6d7d0b3059b00595c34a5588dff84c00374876d5f929edf1d1

    SHA512

    734cea1266b557179088a21ae4f1d288b690098c71844c12cebb988b917caf8f42fb7ad51cbc75e228dee84136a1a4e1c49eb5ee20c0849e11997985f8079e3e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0907.exe

    Filesize

    308KB

    MD5

    2c715c370dc1dc3c4ae54d122ed45bbb

    SHA1

    a3bb361d0fa9bc7e86cb36a7183d1862ccfc5757

    SHA256

    35323a0fbf432d6d7d0b3059b00595c34a5588dff84c00374876d5f929edf1d1

    SHA512

    734cea1266b557179088a21ae4f1d288b690098c71844c12cebb988b917caf8f42fb7ad51cbc75e228dee84136a1a4e1c49eb5ee20c0849e11997985f8079e3e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4341.exe

    Filesize

    366KB

    MD5

    e4812d3d40bf33a9db4e29193e505d8b

    SHA1

    524670d1fd500b499ae4506d66be2ab3a61a6aef

    SHA256

    0f688337ca3c536a3eb7037795e7982e7f65799d0eebce356c79edad3c1c9a8c

    SHA512

    c68c707483e58722d99b8c56dcb54442cdd6c424e1ebc960f1a70f308874f17a7510ac4bf0f0f0e195b00dcec5b5197141fce7db1177834da079e855cecb85f4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4341.exe

    Filesize

    366KB

    MD5

    e4812d3d40bf33a9db4e29193e505d8b

    SHA1

    524670d1fd500b499ae4506d66be2ab3a61a6aef

    SHA256

    0f688337ca3c536a3eb7037795e7982e7f65799d0eebce356c79edad3c1c9a8c

    SHA512

    c68c707483e58722d99b8c56dcb54442cdd6c424e1ebc960f1a70f308874f17a7510ac4bf0f0f0e195b00dcec5b5197141fce7db1177834da079e855cecb85f4

  • memory/2080-132-0x0000000002370000-0x000000000238A000-memory.dmp

    Filesize

    104KB

  • memory/2080-133-0x0000000004D80000-0x000000000527E000-memory.dmp

    Filesize

    5.0MB

  • memory/2080-135-0x0000000002430000-0x0000000002448000-memory.dmp

    Filesize

    96KB

  • memory/2080-137-0x0000000002420000-0x0000000002430000-memory.dmp

    Filesize

    64KB

  • memory/2080-136-0x0000000002420000-0x0000000002430000-memory.dmp

    Filesize

    64KB

  • memory/2080-134-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2080-138-0x0000000002420000-0x0000000002430000-memory.dmp

    Filesize

    64KB

  • memory/2080-139-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/2080-140-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/2080-142-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/2080-144-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/2080-146-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/2080-148-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/2080-150-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/2080-152-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/2080-154-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/2080-156-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/2080-158-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/2080-160-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/2080-162-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/2080-164-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/2080-166-0x0000000002430000-0x0000000002442000-memory.dmp

    Filesize

    72KB

  • memory/2080-167-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/2080-168-0x0000000002420000-0x0000000002430000-memory.dmp

    Filesize

    64KB

  • memory/2080-169-0x0000000002420000-0x0000000002430000-memory.dmp

    Filesize

    64KB

  • memory/2080-170-0x0000000002420000-0x0000000002430000-memory.dmp

    Filesize

    64KB

  • memory/2080-172-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/3928-177-0x00000000026B0000-0x00000000026F6000-memory.dmp

    Filesize

    280KB

  • memory/3928-178-0x0000000000720000-0x000000000076B000-memory.dmp

    Filesize

    300KB

  • memory/3928-179-0x00000000051F0000-0x0000000005234000-memory.dmp

    Filesize

    272KB

  • memory/3928-180-0x0000000002730000-0x0000000002740000-memory.dmp

    Filesize

    64KB

  • memory/3928-181-0x0000000002730000-0x0000000002740000-memory.dmp

    Filesize

    64KB

  • memory/3928-182-0x0000000002730000-0x0000000002740000-memory.dmp

    Filesize

    64KB

  • memory/3928-183-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/3928-186-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/3928-184-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/3928-188-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/3928-190-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/3928-192-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/3928-194-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/3928-196-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/3928-198-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/3928-200-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/3928-202-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/3928-204-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/3928-206-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/3928-208-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/3928-210-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/3928-212-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/3928-214-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/3928-216-0x00000000051F0000-0x000000000522F000-memory.dmp

    Filesize

    252KB

  • memory/3928-1089-0x0000000005980000-0x0000000005F86000-memory.dmp

    Filesize

    6.0MB

  • memory/3928-1090-0x00000000053F0000-0x00000000054FA000-memory.dmp

    Filesize

    1.0MB

  • memory/3928-1091-0x0000000005530000-0x0000000005542000-memory.dmp

    Filesize

    72KB

  • memory/3928-1092-0x0000000005550000-0x000000000558E000-memory.dmp

    Filesize

    248KB

  • memory/3928-1093-0x00000000056A0000-0x00000000056EB000-memory.dmp

    Filesize

    300KB

  • memory/3928-1094-0x0000000002730000-0x0000000002740000-memory.dmp

    Filesize

    64KB

  • memory/3928-1095-0x0000000005830000-0x00000000058C2000-memory.dmp

    Filesize

    584KB

  • memory/3928-1096-0x00000000058D0000-0x0000000005936000-memory.dmp

    Filesize

    408KB

  • memory/3928-1097-0x0000000006700000-0x00000000068C2000-memory.dmp

    Filesize

    1.8MB

  • memory/3928-1099-0x0000000002730000-0x0000000002740000-memory.dmp

    Filesize

    64KB

  • memory/3928-1100-0x0000000002730000-0x0000000002740000-memory.dmp

    Filesize

    64KB

  • memory/3928-1101-0x0000000002730000-0x0000000002740000-memory.dmp

    Filesize

    64KB

  • memory/3928-1102-0x00000000068D0000-0x0000000006DFC000-memory.dmp

    Filesize

    5.2MB

  • memory/3928-1103-0x0000000006F30000-0x0000000006FA6000-memory.dmp

    Filesize

    472KB

  • memory/3928-1104-0x0000000006FB0000-0x0000000007000000-memory.dmp

    Filesize

    320KB

  • memory/3928-1105-0x0000000002730000-0x0000000002740000-memory.dmp

    Filesize

    64KB

  • memory/4764-1111-0x0000000000420000-0x0000000000452000-memory.dmp

    Filesize

    200KB

  • memory/4764-1112-0x0000000004E60000-0x0000000004EAB000-memory.dmp

    Filesize

    300KB

  • memory/4764-1113-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB

  • memory/4764-1114-0x0000000004D40000-0x0000000004D50000-memory.dmp

    Filesize

    64KB