Analysis

  • max time kernel
    130s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 20:03

General

  • Target

    3f552ad908819ecec4414d27ba0d891d76db28419b317ec03adbe26808bda094.exe

  • Size

    695KB

  • MD5

    42102040a5e19eab9d159b4920f0b1e5

  • SHA1

    96f3f6d1d19bd6c7891d5da864b0a0a5e5869190

  • SHA256

    3f552ad908819ecec4414d27ba0d891d76db28419b317ec03adbe26808bda094

  • SHA512

    d4a6191cc38f2b0f6c29a3bd865712b792b9f37e6b036516c34c45fd7afb886fcd2aeecdbadedd7302ff779fc5d44cb7d5d6e19428e05274b3bdc1714f90d513

  • SSDEEP

    12288:4Mrny90nv1Np/EZX/aX1B+FSMI7MT7zM3CaYbQsYKzeQUJOmVV6sAX:Pyk+ZvnFvI7MT7zMSZe1husAX

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f552ad908819ecec4414d27ba0d891d76db28419b317ec03adbe26808bda094.exe
    "C:\Users\Admin\AppData\Local\Temp\3f552ad908819ecec4414d27ba0d891d76db28419b317ec03adbe26808bda094.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4324
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un081258.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un081258.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1496
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5583.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5583.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4256
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7047.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7047.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4696
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si058441.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si058441.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4188
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:3152

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si058441.exe

    Filesize

    175KB

    MD5

    221dd7201af8c1ea9b7ba2febb8914ef

    SHA1

    c7fd2f7c39341c8791702bcd0bae143d2f484e6e

    SHA256

    3d62bd18c58ab9b3b90df84fcbc1fbf50b5ed5afb105c3da84e788886b8d5571

    SHA512

    bce872d9ab650b3b70fbbf6c6a2d81b3dc0faa8f894189e9ea3bbdf5f9ae73579a9006d2593b9fab8a4852cc71e9deeb70089f9525e4074ca13a9258617afa2b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si058441.exe

    Filesize

    175KB

    MD5

    221dd7201af8c1ea9b7ba2febb8914ef

    SHA1

    c7fd2f7c39341c8791702bcd0bae143d2f484e6e

    SHA256

    3d62bd18c58ab9b3b90df84fcbc1fbf50b5ed5afb105c3da84e788886b8d5571

    SHA512

    bce872d9ab650b3b70fbbf6c6a2d81b3dc0faa8f894189e9ea3bbdf5f9ae73579a9006d2593b9fab8a4852cc71e9deeb70089f9525e4074ca13a9258617afa2b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un081258.exe

    Filesize

    553KB

    MD5

    fce13f906d7053b6b322b7f9b6877a35

    SHA1

    d8691a7e93337c1515714ec0b3dda182dd23ad72

    SHA256

    7ea9dd856034506b7c870dbb7aa0b8eea79c0aa807b193addade4c4b21d2e181

    SHA512

    80e956bfd02903c22754b4eaff0e06d3e75deb243a57e1ddcb196a0bb986e92c1841311718a2bae2836598363f8d178323f9a9c719743847cdf6d448752a218e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un081258.exe

    Filesize

    553KB

    MD5

    fce13f906d7053b6b322b7f9b6877a35

    SHA1

    d8691a7e93337c1515714ec0b3dda182dd23ad72

    SHA256

    7ea9dd856034506b7c870dbb7aa0b8eea79c0aa807b193addade4c4b21d2e181

    SHA512

    80e956bfd02903c22754b4eaff0e06d3e75deb243a57e1ddcb196a0bb986e92c1841311718a2bae2836598363f8d178323f9a9c719743847cdf6d448752a218e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5583.exe

    Filesize

    308KB

    MD5

    19bf36b0b43f5532448884b4bbe339a5

    SHA1

    4cd6882b45abcb7e172b52c8d33df3af3eaf1d89

    SHA256

    04075e40c5800818621c6eac80e39ed7a27da9ff684398e09655bbbf9bb25a4c

    SHA512

    c3087b38d8dd31c9aed8ba0dce53e0dd784b4eb36578be1881b9c8a16c88c2d00a6ff5ff759e1336b59e683b4e151e496f3d31f39d9749a9eaa46c019b9be446

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5583.exe

    Filesize

    308KB

    MD5

    19bf36b0b43f5532448884b4bbe339a5

    SHA1

    4cd6882b45abcb7e172b52c8d33df3af3eaf1d89

    SHA256

    04075e40c5800818621c6eac80e39ed7a27da9ff684398e09655bbbf9bb25a4c

    SHA512

    c3087b38d8dd31c9aed8ba0dce53e0dd784b4eb36578be1881b9c8a16c88c2d00a6ff5ff759e1336b59e683b4e151e496f3d31f39d9749a9eaa46c019b9be446

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7047.exe

    Filesize

    366KB

    MD5

    15aed3ba0aa40b18e4596259360dd5e4

    SHA1

    241fec4f3f2a825975be429fe820efc1450f53cc

    SHA256

    f26e021de2b0cf47921b3c2c9cc2bd4c7d662e26f8e55ac289ae5938e2e119f7

    SHA512

    067f88fce6b77c182e3c88cb3daf94398336d28641a8e26162985ae709759620d6927a45440c89bf29fc42e33e403110fc073f34893f8993406d87d7e633bbb0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7047.exe

    Filesize

    366KB

    MD5

    15aed3ba0aa40b18e4596259360dd5e4

    SHA1

    241fec4f3f2a825975be429fe820efc1450f53cc

    SHA256

    f26e021de2b0cf47921b3c2c9cc2bd4c7d662e26f8e55ac289ae5938e2e119f7

    SHA512

    067f88fce6b77c182e3c88cb3daf94398336d28641a8e26162985ae709759620d6927a45440c89bf29fc42e33e403110fc073f34893f8993406d87d7e633bbb0

  • memory/4188-1122-0x0000000005470000-0x0000000005480000-memory.dmp

    Filesize

    64KB

  • memory/4188-1121-0x00000000008C0000-0x00000000008F2000-memory.dmp

    Filesize

    200KB

  • memory/4188-1123-0x0000000005470000-0x0000000005480000-memory.dmp

    Filesize

    64KB

  • memory/4256-158-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/4256-170-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/4256-152-0x0000000002490000-0x00000000024A0000-memory.dmp

    Filesize

    64KB

  • memory/4256-151-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/4256-156-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/4256-154-0x0000000002490000-0x00000000024A0000-memory.dmp

    Filesize

    64KB

  • memory/4256-160-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/4256-162-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/4256-164-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/4256-166-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/4256-168-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/4256-153-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/4256-172-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/4256-174-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/4256-176-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/4256-178-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/4256-180-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/4256-181-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4256-182-0x0000000002490000-0x00000000024A0000-memory.dmp

    Filesize

    64KB

  • memory/4256-183-0x0000000002490000-0x00000000024A0000-memory.dmp

    Filesize

    64KB

  • memory/4256-184-0x0000000002490000-0x00000000024A0000-memory.dmp

    Filesize

    64KB

  • memory/4256-186-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4256-150-0x0000000000710000-0x000000000073D000-memory.dmp

    Filesize

    180KB

  • memory/4256-149-0x0000000004D20000-0x00000000052C4000-memory.dmp

    Filesize

    5.6MB

  • memory/4696-192-0x00000000052C0000-0x00000000052FF000-memory.dmp

    Filesize

    252KB

  • memory/4696-227-0x00000000052C0000-0x00000000052FF000-memory.dmp

    Filesize

    252KB

  • memory/4696-198-0x00000000052C0000-0x00000000052FF000-memory.dmp

    Filesize

    252KB

  • memory/4696-200-0x00000000052C0000-0x00000000052FF000-memory.dmp

    Filesize

    252KB

  • memory/4696-202-0x00000000052C0000-0x00000000052FF000-memory.dmp

    Filesize

    252KB

  • memory/4696-204-0x00000000052C0000-0x00000000052FF000-memory.dmp

    Filesize

    252KB

  • memory/4696-206-0x00000000052C0000-0x00000000052FF000-memory.dmp

    Filesize

    252KB

  • memory/4696-208-0x00000000052C0000-0x00000000052FF000-memory.dmp

    Filesize

    252KB

  • memory/4696-210-0x00000000052C0000-0x00000000052FF000-memory.dmp

    Filesize

    252KB

  • memory/4696-212-0x00000000052C0000-0x00000000052FF000-memory.dmp

    Filesize

    252KB

  • memory/4696-214-0x00000000052C0000-0x00000000052FF000-memory.dmp

    Filesize

    252KB

  • memory/4696-216-0x00000000052C0000-0x00000000052FF000-memory.dmp

    Filesize

    252KB

  • memory/4696-218-0x00000000052C0000-0x00000000052FF000-memory.dmp

    Filesize

    252KB

  • memory/4696-221-0x00000000052C0000-0x00000000052FF000-memory.dmp

    Filesize

    252KB

  • memory/4696-220-0x00000000020E0000-0x000000000212B000-memory.dmp

    Filesize

    300KB

  • memory/4696-224-0x00000000052C0000-0x00000000052FF000-memory.dmp

    Filesize

    252KB

  • memory/4696-222-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/4696-196-0x00000000052C0000-0x00000000052FF000-memory.dmp

    Filesize

    252KB

  • memory/4696-225-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/4696-1100-0x0000000005460000-0x0000000005A78000-memory.dmp

    Filesize

    6.1MB

  • memory/4696-1101-0x0000000005B00000-0x0000000005C0A000-memory.dmp

    Filesize

    1.0MB

  • memory/4696-1102-0x0000000005C40000-0x0000000005C52000-memory.dmp

    Filesize

    72KB

  • memory/4696-1103-0x0000000005C60000-0x0000000005C9C000-memory.dmp

    Filesize

    240KB

  • memory/4696-1104-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/4696-1105-0x0000000005F50000-0x0000000005FB6000-memory.dmp

    Filesize

    408KB

  • memory/4696-1107-0x0000000006620000-0x00000000066B2000-memory.dmp

    Filesize

    584KB

  • memory/4696-1108-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/4696-1109-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/4696-1110-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/4696-1111-0x0000000006850000-0x0000000006A12000-memory.dmp

    Filesize

    1.8MB

  • memory/4696-1112-0x0000000006A30000-0x0000000006F5C000-memory.dmp

    Filesize

    5.2MB

  • memory/4696-194-0x00000000052C0000-0x00000000052FF000-memory.dmp

    Filesize

    252KB

  • memory/4696-191-0x00000000052C0000-0x00000000052FF000-memory.dmp

    Filesize

    252KB

  • memory/4696-1113-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/4696-1114-0x00000000071A0000-0x0000000007216000-memory.dmp

    Filesize

    472KB

  • memory/4696-1115-0x0000000007230000-0x0000000007280000-memory.dmp

    Filesize

    320KB