Analysis

  • max time kernel
    134s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 20:05

General

  • Target

    00ebe7a0e3a68511576855ecbb440d1064eaa3a557a3aa263e387af2c3bd43cf.exe

  • Size

    694KB

  • MD5

    e523a28ef765b891f65e2cb086bd29b3

  • SHA1

    f212163b08065a6368fd5986f62916bbc27e0c25

  • SHA256

    00ebe7a0e3a68511576855ecbb440d1064eaa3a557a3aa263e387af2c3bd43cf

  • SHA512

    ad58e9047768f35fd92877354ebc9ae76b891a3f49678b1de0e4616208a8c1615f343c63aadbbe4050ad667d1d39ccd297966a4d0e10fb79c5bf900eea5e1310

  • SSDEEP

    12288:VMrIy90KpuNkkA0Vgqq5DtWmMzIpyTvPS2zIrYJZvv3n:pyLQkmgqq5xXMzIqyyI0f3X

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00ebe7a0e3a68511576855ecbb440d1064eaa3a557a3aa263e387af2c3bd43cf.exe
    "C:\Users\Admin\AppData\Local\Temp\00ebe7a0e3a68511576855ecbb440d1064eaa3a557a3aa263e387af2c3bd43cf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4232
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un666560.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un666560.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4632
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1756.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1756.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1028
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9564.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9564.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:848
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si577635.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si577635.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1304
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:2180

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si577635.exe

    Filesize

    175KB

    MD5

    95c70b11dffd6630f080638131eda6a3

    SHA1

    a3552161b19f6b029cacc34d60bbe6239358fa05

    SHA256

    7112a7b18c84129d8d6d3d6107e3b97118928d9bb540bc3134506d50f6d53e5c

    SHA512

    1a66c3578e6256b9640dc2b15ba9a893bf29827b6e309539ffae4c684fdd228f4558a38b522d7c03c2e31046233c244ef63ec0a1197279e1b7dfe9743bd148e1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si577635.exe

    Filesize

    175KB

    MD5

    95c70b11dffd6630f080638131eda6a3

    SHA1

    a3552161b19f6b029cacc34d60bbe6239358fa05

    SHA256

    7112a7b18c84129d8d6d3d6107e3b97118928d9bb540bc3134506d50f6d53e5c

    SHA512

    1a66c3578e6256b9640dc2b15ba9a893bf29827b6e309539ffae4c684fdd228f4558a38b522d7c03c2e31046233c244ef63ec0a1197279e1b7dfe9743bd148e1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un666560.exe

    Filesize

    552KB

    MD5

    17133c50dbef29f27e58523904368e74

    SHA1

    ce7bb3656d053b57b9e7542c92dc917b83f54696

    SHA256

    3029ee3607b4d462d314907cfa8af82712f6957638fdb049c596831533d8304e

    SHA512

    dc7b28423711b376c9bc898193b107de491905e7f79062ce4f12aa737a24c3caa766ef9e35ea0a5fe720191614ff7a8062ebb6ea259f176f5941adf9557965af

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un666560.exe

    Filesize

    552KB

    MD5

    17133c50dbef29f27e58523904368e74

    SHA1

    ce7bb3656d053b57b9e7542c92dc917b83f54696

    SHA256

    3029ee3607b4d462d314907cfa8af82712f6957638fdb049c596831533d8304e

    SHA512

    dc7b28423711b376c9bc898193b107de491905e7f79062ce4f12aa737a24c3caa766ef9e35ea0a5fe720191614ff7a8062ebb6ea259f176f5941adf9557965af

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1756.exe

    Filesize

    308KB

    MD5

    c47c742f3059d2fbc2d95cbedd6f28b4

    SHA1

    b0aa456756d0d38809b9fe3bb3079ac42ebadc95

    SHA256

    0f3581b854d86f5ac97a73db1ccfd0d812d6ff375105b7fec2e403a43f9dd5e1

    SHA512

    a028f6c531d96895229f7dbdc44275013d148b9593168eb76222aec297072691a61f34947175cfd64e4e61d6d22a90738a25215891fd6a2d8ba02d6b85bfe638

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1756.exe

    Filesize

    308KB

    MD5

    c47c742f3059d2fbc2d95cbedd6f28b4

    SHA1

    b0aa456756d0d38809b9fe3bb3079ac42ebadc95

    SHA256

    0f3581b854d86f5ac97a73db1ccfd0d812d6ff375105b7fec2e403a43f9dd5e1

    SHA512

    a028f6c531d96895229f7dbdc44275013d148b9593168eb76222aec297072691a61f34947175cfd64e4e61d6d22a90738a25215891fd6a2d8ba02d6b85bfe638

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9564.exe

    Filesize

    366KB

    MD5

    244c5c85843e54c965568c66897b36aa

    SHA1

    2eeaac589be4419c76847480f6d49efbc9751512

    SHA256

    3a05b40cbcd14c5a2dcfa3b820d4865821f0c64ae79326c8ae4c3ded1c129e71

    SHA512

    3e505257196c0e8cbe1b17aebd158e2e17eeb83dfadce64f4a25b1a851d9c63d6e62daf9314ff5ed95c69ca5dd6a0d6179c8c753e6499479cf06affe29a03b4f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9564.exe

    Filesize

    366KB

    MD5

    244c5c85843e54c965568c66897b36aa

    SHA1

    2eeaac589be4419c76847480f6d49efbc9751512

    SHA256

    3a05b40cbcd14c5a2dcfa3b820d4865821f0c64ae79326c8ae4c3ded1c129e71

    SHA512

    3e505257196c0e8cbe1b17aebd158e2e17eeb83dfadce64f4a25b1a851d9c63d6e62daf9314ff5ed95c69ca5dd6a0d6179c8c753e6499479cf06affe29a03b4f

  • memory/848-1099-0x0000000005B00000-0x0000000005C0A000-memory.dmp

    Filesize

    1.0MB

  • memory/848-1102-0x0000000005C60000-0x0000000005C9C000-memory.dmp

    Filesize

    240KB

  • memory/848-1113-0x0000000009070000-0x000000000959C000-memory.dmp

    Filesize

    5.2MB

  • memory/848-1112-0x0000000008EA0000-0x0000000009062000-memory.dmp

    Filesize

    1.8MB

  • memory/848-1111-0x0000000008D30000-0x0000000008D80000-memory.dmp

    Filesize

    320KB

  • memory/848-1110-0x0000000008CA0000-0x0000000008D16000-memory.dmp

    Filesize

    472KB

  • memory/848-1109-0x0000000002750000-0x0000000002760000-memory.dmp

    Filesize

    64KB

  • memory/848-1108-0x0000000002750000-0x0000000002760000-memory.dmp

    Filesize

    64KB

  • memory/848-1107-0x0000000002750000-0x0000000002760000-memory.dmp

    Filesize

    64KB

  • memory/848-1106-0x0000000002750000-0x0000000002760000-memory.dmp

    Filesize

    64KB

  • memory/848-1104-0x0000000006620000-0x00000000066B2000-memory.dmp

    Filesize

    584KB

  • memory/848-1103-0x0000000005F50000-0x0000000005FB6000-memory.dmp

    Filesize

    408KB

  • memory/848-1101-0x0000000002750000-0x0000000002760000-memory.dmp

    Filesize

    64KB

  • memory/848-1100-0x0000000005C40000-0x0000000005C52000-memory.dmp

    Filesize

    72KB

  • memory/848-1098-0x0000000005480000-0x0000000005A98000-memory.dmp

    Filesize

    6.1MB

  • memory/848-507-0x0000000002750000-0x0000000002760000-memory.dmp

    Filesize

    64KB

  • memory/848-505-0x0000000002750000-0x0000000002760000-memory.dmp

    Filesize

    64KB

  • memory/848-503-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/848-222-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/848-220-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/848-218-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/848-189-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/848-190-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/848-192-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/848-194-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/848-196-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/848-198-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/848-200-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/848-202-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/848-204-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/848-206-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/848-208-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/848-210-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/848-212-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/848-214-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/848-216-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/1028-171-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/1028-184-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/1028-169-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/1028-167-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/1028-182-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/1028-180-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/1028-179-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/1028-151-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/1028-177-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/1028-175-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/1028-153-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/1028-173-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/1028-150-0x0000000004EE0000-0x0000000005484000-memory.dmp

    Filesize

    5.6MB

  • memory/1028-152-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/1028-181-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/1028-165-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/1028-163-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/1028-159-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/1028-161-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/1028-157-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/1028-155-0x0000000002560000-0x0000000002572000-memory.dmp

    Filesize

    72KB

  • memory/1028-148-0x0000000000810000-0x000000000083D000-memory.dmp

    Filesize

    180KB

  • memory/1028-149-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/1304-1119-0x00000000006A0000-0x00000000006D2000-memory.dmp

    Filesize

    200KB

  • memory/1304-1120-0x0000000004F30000-0x0000000004F40000-memory.dmp

    Filesize

    64KB

  • memory/1304-1121-0x0000000004F30000-0x0000000004F40000-memory.dmp

    Filesize

    64KB