Analysis

  • max time kernel
    93s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 20:01

General

  • Target

    f8225f5a511658045125864fa8557183b92f0f8b9f4709d4e5f7bfa6e7b14621.exe

  • Size

    696KB

  • MD5

    47b0db360cf5cf1f3bc93fc1eba71415

  • SHA1

    73632ed7deaed2fd0377c6f6456f31a11671e41c

  • SHA256

    f8225f5a511658045125864fa8557183b92f0f8b9f4709d4e5f7bfa6e7b14621

  • SHA512

    2cbf30aef1794fd6f0c067bf08ff155905d6190005622e54f9fa157a5a2b8076a01193cbcaf6faddd8f4c5d4f7ba575d6452cb2e82795e9345798a2dd01f5ada

  • SSDEEP

    12288:dMrJy90RFOsS5Vz6b3CfWh6IUhctrt593cHrqzyIkJQAdCY5h:cySFdw86tmtR593cHrmyna3K

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f8225f5a511658045125864fa8557183b92f0f8b9f4709d4e5f7bfa6e7b14621.exe
    "C:\Users\Admin\AppData\Local\Temp\f8225f5a511658045125864fa8557183b92f0f8b9f4709d4e5f7bfa6e7b14621.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4824
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un588845.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un588845.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2244
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5178.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5178.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4040
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1645.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1645.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2692
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si270055.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si270055.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4220

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si270055.exe

    Filesize

    175KB

    MD5

    7410f183ae0154ff46dba8a83f156c93

    SHA1

    962ab8910b3a99a7e2601c477f952174710ce8e8

    SHA256

    4e9d048b752295c77d152ce1fbe242d42eccdb545a799a3bcb8e50644a45473c

    SHA512

    4c60106593eefd9bee8b9b716040f495d3f6c420d0fcb82d3a5bbe071f4622373c4adb20a1b5961c75f18ca65b04dc99732b66e89bb0e8dec837adca5fc759ec

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si270055.exe

    Filesize

    175KB

    MD5

    7410f183ae0154ff46dba8a83f156c93

    SHA1

    962ab8910b3a99a7e2601c477f952174710ce8e8

    SHA256

    4e9d048b752295c77d152ce1fbe242d42eccdb545a799a3bcb8e50644a45473c

    SHA512

    4c60106593eefd9bee8b9b716040f495d3f6c420d0fcb82d3a5bbe071f4622373c4adb20a1b5961c75f18ca65b04dc99732b66e89bb0e8dec837adca5fc759ec

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un588845.exe

    Filesize

    553KB

    MD5

    f62b7e7962fd778b7c8b449d79380a51

    SHA1

    02ffd82a0f086e3c75807f013e7054e1bd533062

    SHA256

    9d893a298bd5bda2b0b824807c6262a636005d764155d01c17a03b0381eec68a

    SHA512

    2aa8b874553db22ea7e0249f7030194f75bff51e3a360060e75fc36c6bbc10f5e19d5668df8f105023ba0a3af52209fabf7f70ab2c75df9bfba8675223c89811

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un588845.exe

    Filesize

    553KB

    MD5

    f62b7e7962fd778b7c8b449d79380a51

    SHA1

    02ffd82a0f086e3c75807f013e7054e1bd533062

    SHA256

    9d893a298bd5bda2b0b824807c6262a636005d764155d01c17a03b0381eec68a

    SHA512

    2aa8b874553db22ea7e0249f7030194f75bff51e3a360060e75fc36c6bbc10f5e19d5668df8f105023ba0a3af52209fabf7f70ab2c75df9bfba8675223c89811

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5178.exe

    Filesize

    308KB

    MD5

    7d07571e85cb41882b2226667428e1b0

    SHA1

    497c752ec067ace4491f2434f99d41164b35e033

    SHA256

    dd73c5d50480e00389464f78d8f71a0aef443c7ce1fb2d0a03de848333c9e745

    SHA512

    bc7ccc05fad65a6f4f0247a263c58cae9ae828314dd93a41311403956c776fe0c7bf1392af1b0fcd60688ac81a68bc522519c9416fe561fe2b41dbe1a902ccb7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5178.exe

    Filesize

    308KB

    MD5

    7d07571e85cb41882b2226667428e1b0

    SHA1

    497c752ec067ace4491f2434f99d41164b35e033

    SHA256

    dd73c5d50480e00389464f78d8f71a0aef443c7ce1fb2d0a03de848333c9e745

    SHA512

    bc7ccc05fad65a6f4f0247a263c58cae9ae828314dd93a41311403956c776fe0c7bf1392af1b0fcd60688ac81a68bc522519c9416fe561fe2b41dbe1a902ccb7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1645.exe

    Filesize

    366KB

    MD5

    7895f3adcf78997e33e6590818a5885c

    SHA1

    65a3e8086132e4bd291e79030dcf3ad732f418a3

    SHA256

    3f7b2256120698d499ee043d413470a2fee66bfa2f25736cdd1f6ea33b6e6c7e

    SHA512

    571393217a74ca1f1af3ce09dee12be6252737d79c415626fd8dc20961ed6a2297697c28fe855b168c217fa9b91d34b7b7ebb22975ff2980d8a897610673f9da

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1645.exe

    Filesize

    366KB

    MD5

    7895f3adcf78997e33e6590818a5885c

    SHA1

    65a3e8086132e4bd291e79030dcf3ad732f418a3

    SHA256

    3f7b2256120698d499ee043d413470a2fee66bfa2f25736cdd1f6ea33b6e6c7e

    SHA512

    571393217a74ca1f1af3ce09dee12be6252737d79c415626fd8dc20961ed6a2297697c28fe855b168c217fa9b91d34b7b7ebb22975ff2980d8a897610673f9da

  • memory/2692-1102-0x0000000005C40000-0x0000000005C52000-memory.dmp

    Filesize

    72KB

  • memory/2692-227-0x00000000052A0000-0x00000000052DF000-memory.dmp

    Filesize

    252KB

  • memory/2692-205-0x00000000052A0000-0x00000000052DF000-memory.dmp

    Filesize

    252KB

  • memory/2692-207-0x00000000052A0000-0x00000000052DF000-memory.dmp

    Filesize

    252KB

  • memory/2692-1115-0x0000000008510000-0x0000000008560000-memory.dmp

    Filesize

    320KB

  • memory/2692-1114-0x0000000008480000-0x00000000084F6000-memory.dmp

    Filesize

    472KB

  • memory/2692-1113-0x0000000006B30000-0x000000000705C000-memory.dmp

    Filesize

    5.2MB

  • memory/2692-1112-0x0000000006950000-0x0000000006B12000-memory.dmp

    Filesize

    1.8MB

  • memory/2692-1111-0x0000000002720000-0x0000000002730000-memory.dmp

    Filesize

    64KB

  • memory/2692-1110-0x0000000002720000-0x0000000002730000-memory.dmp

    Filesize

    64KB

  • memory/2692-209-0x00000000052A0000-0x00000000052DF000-memory.dmp

    Filesize

    252KB

  • memory/2692-1109-0x0000000002720000-0x0000000002730000-memory.dmp

    Filesize

    64KB

  • memory/2692-1108-0x0000000002720000-0x0000000002730000-memory.dmp

    Filesize

    64KB

  • memory/2692-1106-0x0000000006600000-0x0000000006692000-memory.dmp

    Filesize

    584KB

  • memory/2692-1105-0x0000000005F50000-0x0000000005FB6000-memory.dmp

    Filesize

    408KB

  • memory/2692-1104-0x0000000002720000-0x0000000002730000-memory.dmp

    Filesize

    64KB

  • memory/2692-1103-0x0000000005C60000-0x0000000005C9C000-memory.dmp

    Filesize

    240KB

  • memory/2692-1101-0x0000000005B00000-0x0000000005C0A000-memory.dmp

    Filesize

    1.0MB

  • memory/2692-1100-0x0000000005460000-0x0000000005A78000-memory.dmp

    Filesize

    6.1MB

  • memory/2692-219-0x00000000052A0000-0x00000000052DF000-memory.dmp

    Filesize

    252KB

  • memory/2692-226-0x0000000002720000-0x0000000002730000-memory.dmp

    Filesize

    64KB

  • memory/2692-223-0x00000000052A0000-0x00000000052DF000-memory.dmp

    Filesize

    252KB

  • memory/2692-190-0x00000000052A0000-0x00000000052DF000-memory.dmp

    Filesize

    252KB

  • memory/2692-191-0x00000000052A0000-0x00000000052DF000-memory.dmp

    Filesize

    252KB

  • memory/2692-193-0x00000000052A0000-0x00000000052DF000-memory.dmp

    Filesize

    252KB

  • memory/2692-195-0x00000000052A0000-0x00000000052DF000-memory.dmp

    Filesize

    252KB

  • memory/2692-197-0x00000000052A0000-0x00000000052DF000-memory.dmp

    Filesize

    252KB

  • memory/2692-199-0x00000000052A0000-0x00000000052DF000-memory.dmp

    Filesize

    252KB

  • memory/2692-201-0x00000000052A0000-0x00000000052DF000-memory.dmp

    Filesize

    252KB

  • memory/2692-203-0x00000000052A0000-0x00000000052DF000-memory.dmp

    Filesize

    252KB

  • memory/2692-224-0x0000000002720000-0x0000000002730000-memory.dmp

    Filesize

    64KB

  • memory/2692-222-0x0000000002720000-0x0000000002730000-memory.dmp

    Filesize

    64KB

  • memory/2692-220-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/2692-211-0x00000000052A0000-0x00000000052DF000-memory.dmp

    Filesize

    252KB

  • memory/2692-213-0x00000000052A0000-0x00000000052DF000-memory.dmp

    Filesize

    252KB

  • memory/2692-215-0x00000000052A0000-0x00000000052DF000-memory.dmp

    Filesize

    252KB

  • memory/2692-217-0x00000000052A0000-0x00000000052DF000-memory.dmp

    Filesize

    252KB

  • memory/4040-181-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/4040-177-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/4040-149-0x00000000007E0000-0x000000000080D000-memory.dmp

    Filesize

    180KB

  • memory/4040-155-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/4040-151-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/4040-152-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/4040-185-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4040-183-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/4040-182-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/4040-150-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/4040-153-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/4040-180-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4040-179-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/4040-171-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/4040-175-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/4040-173-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/4040-169-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/4040-167-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/4040-165-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/4040-163-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/4040-161-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/4040-159-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/4040-157-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

    Filesize

    72KB

  • memory/4040-148-0x0000000004EE0000-0x0000000005484000-memory.dmp

    Filesize

    5.6MB

  • memory/4220-1121-0x0000000000BD0000-0x0000000000C02000-memory.dmp

    Filesize

    200KB

  • memory/4220-1122-0x00000000057D0000-0x00000000057E0000-memory.dmp

    Filesize

    64KB

  • memory/4220-1123-0x00000000057D0000-0x00000000057E0000-memory.dmp

    Filesize

    64KB