Analysis

  • max time kernel
    55s
  • max time network
    149s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 20:08

General

  • Target

    aa7bca2d2173308a37ffcf2ffb75b9ac6f2711cc413fb7398efe0de5645ea341.exe

  • Size

    694KB

  • MD5

    578f1ae62a08a1c3fabfe7a400a52b0b

  • SHA1

    6da7d41d45e86cd9a3c59b9deed76c7fb81d7e8d

  • SHA256

    aa7bca2d2173308a37ffcf2ffb75b9ac6f2711cc413fb7398efe0de5645ea341

  • SHA512

    ac2616d27064193723b306aa44c8c2a348579e2e3d4e937fc2b52dd5060a015c3429ea92de43b28d79245faa5fc8a9bd9fa7cd89edbdbce303ddc9dcecb2f8fa

  • SSDEEP

    12288:pMr2y90ITdAPjyi9p0WM7dSDthj6kuPley00D8QsCvPSlzkfaJJ5T65EICs1j:TyJiyIp0ndSxYkeleJ08QRylkCJT651j

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 22 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa7bca2d2173308a37ffcf2ffb75b9ac6f2711cc413fb7398efe0de5645ea341.exe
    "C:\Users\Admin\AppData\Local\Temp\aa7bca2d2173308a37ffcf2ffb75b9ac6f2711cc413fb7398efe0de5645ea341.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un046543.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un046543.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2120
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1538.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1538.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4248
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3699.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3699.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3048
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si233771.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si233771.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4176

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si233771.exe

    Filesize

    175KB

    MD5

    837a0f338e278dfec631b3ef271a55de

    SHA1

    5276fbb3cecbea253f5cf25aa37abc68c491ce71

    SHA256

    4780de31ae3d747702c03ac43643b9dbedb11a00915e5b92745e4314bb6f49fd

    SHA512

    79748972fc7e411ae3034292421e04713f0fe4d68e37143366d602634becefc6c8ced35f0fb4c95b179e36398b760eeb9198ea5519a143b4346b499ef413d836

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si233771.exe

    Filesize

    175KB

    MD5

    837a0f338e278dfec631b3ef271a55de

    SHA1

    5276fbb3cecbea253f5cf25aa37abc68c491ce71

    SHA256

    4780de31ae3d747702c03ac43643b9dbedb11a00915e5b92745e4314bb6f49fd

    SHA512

    79748972fc7e411ae3034292421e04713f0fe4d68e37143366d602634becefc6c8ced35f0fb4c95b179e36398b760eeb9198ea5519a143b4346b499ef413d836

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un046543.exe

    Filesize

    553KB

    MD5

    e128e6ce1d3d9d6af130d95288a81f0a

    SHA1

    cae02fbe64046a3f2a6156c790d174f70a651b9e

    SHA256

    ce16dfecb175a3e578ceca6c9cc86ac64c21b4fc303a5b7e577e577c0c381f32

    SHA512

    397c11d742728463559cf493a91cea5152083751ce2ee622b54060e20950a35a38da525dce10321d7ff68f7117672da2431773671ca630a990122702f278cefa

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un046543.exe

    Filesize

    553KB

    MD5

    e128e6ce1d3d9d6af130d95288a81f0a

    SHA1

    cae02fbe64046a3f2a6156c790d174f70a651b9e

    SHA256

    ce16dfecb175a3e578ceca6c9cc86ac64c21b4fc303a5b7e577e577c0c381f32

    SHA512

    397c11d742728463559cf493a91cea5152083751ce2ee622b54060e20950a35a38da525dce10321d7ff68f7117672da2431773671ca630a990122702f278cefa

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1538.exe

    Filesize

    308KB

    MD5

    43cc0d0422d9ba25b731b5cc83bd7669

    SHA1

    eba65c5d39f5660b5650fa8b33c442e3a43c87b5

    SHA256

    55fe65c57fa3e5ec2e126ae94a56a10a9b659cc9854e53292cb04066981133cd

    SHA512

    a97dd5e03feff1a1b160ee491c07205bcca5958b8fc2fe2fe43fa81a3d46bc22c0c0a141d2f3a902caff6be2b0226dfd06d93e0c69d524d5927ac0be41ad3f17

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1538.exe

    Filesize

    308KB

    MD5

    43cc0d0422d9ba25b731b5cc83bd7669

    SHA1

    eba65c5d39f5660b5650fa8b33c442e3a43c87b5

    SHA256

    55fe65c57fa3e5ec2e126ae94a56a10a9b659cc9854e53292cb04066981133cd

    SHA512

    a97dd5e03feff1a1b160ee491c07205bcca5958b8fc2fe2fe43fa81a3d46bc22c0c0a141d2f3a902caff6be2b0226dfd06d93e0c69d524d5927ac0be41ad3f17

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3699.exe

    Filesize

    366KB

    MD5

    7231b694a4a87c188a57991ab1263de7

    SHA1

    179b3bc3326a57b3489a2e2fa2b08c1ffb238c63

    SHA256

    cefa6e8d9ff9e91d4c099fa792d8072e42be9c9e3404af6350d5087182737f21

    SHA512

    71735460f2d56e05e4f756f6ca21169174beec5d8480a2623bc22aa56824503e2554e92330adf6691f419f0274c008aa09df00b32a0715503d760cda0c7f3dab

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3699.exe

    Filesize

    366KB

    MD5

    7231b694a4a87c188a57991ab1263de7

    SHA1

    179b3bc3326a57b3489a2e2fa2b08c1ffb238c63

    SHA256

    cefa6e8d9ff9e91d4c099fa792d8072e42be9c9e3404af6350d5087182737f21

    SHA512

    71735460f2d56e05e4f756f6ca21169174beec5d8480a2623bc22aa56824503e2554e92330adf6691f419f0274c008aa09df00b32a0715503d760cda0c7f3dab

  • memory/3048-1092-0x0000000005A60000-0x0000000006066000-memory.dmp

    Filesize

    6.0MB

  • memory/3048-1095-0x0000000005560000-0x000000000559E000-memory.dmp

    Filesize

    248KB

  • memory/3048-213-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/3048-195-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/3048-211-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/3048-197-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/3048-209-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/3048-207-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/3048-1108-0x0000000006FE0000-0x0000000007030000-memory.dmp

    Filesize

    320KB

  • memory/3048-1107-0x0000000006F50000-0x0000000006FC6000-memory.dmp

    Filesize

    472KB

  • memory/3048-1106-0x0000000004E40000-0x0000000004E50000-memory.dmp

    Filesize

    64KB

  • memory/3048-1105-0x00000000068F0000-0x0000000006E1C000-memory.dmp

    Filesize

    5.2MB

  • memory/3048-1104-0x0000000006720000-0x00000000068E2000-memory.dmp

    Filesize

    1.8MB

  • memory/3048-1103-0x0000000004E40000-0x0000000004E50000-memory.dmp

    Filesize

    64KB

  • memory/3048-1102-0x0000000004E40000-0x0000000004E50000-memory.dmp

    Filesize

    64KB

  • memory/3048-1101-0x0000000004E40000-0x0000000004E50000-memory.dmp

    Filesize

    64KB

  • memory/3048-1099-0x0000000006500000-0x0000000006592000-memory.dmp

    Filesize

    584KB

  • memory/3048-1098-0x0000000005830000-0x0000000005896000-memory.dmp

    Filesize

    408KB

  • memory/3048-199-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/3048-1097-0x0000000004E40000-0x0000000004E50000-memory.dmp

    Filesize

    64KB

  • memory/3048-1096-0x00000000056A0000-0x00000000056EB000-memory.dmp

    Filesize

    300KB

  • memory/3048-215-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/3048-1094-0x0000000004E10000-0x0000000004E22000-memory.dmp

    Filesize

    72KB

  • memory/3048-1093-0x0000000005450000-0x000000000555A000-memory.dmp

    Filesize

    1.0MB

  • memory/3048-249-0x0000000004E40000-0x0000000004E50000-memory.dmp

    Filesize

    64KB

  • memory/3048-180-0x00000000025D0000-0x0000000002616000-memory.dmp

    Filesize

    280KB

  • memory/3048-181-0x0000000004CD0000-0x0000000004D14000-memory.dmp

    Filesize

    272KB

  • memory/3048-183-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/3048-185-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/3048-182-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/3048-187-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/3048-189-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/3048-191-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/3048-193-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/3048-246-0x0000000004E40000-0x0000000004E50000-memory.dmp

    Filesize

    64KB

  • memory/3048-244-0x0000000004E40000-0x0000000004E50000-memory.dmp

    Filesize

    64KB

  • memory/3048-242-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/3048-201-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/3048-203-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/3048-205-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/4176-1114-0x0000000000B90000-0x0000000000BC2000-memory.dmp

    Filesize

    200KB

  • memory/4176-1115-0x0000000002D80000-0x0000000002D90000-memory.dmp

    Filesize

    64KB

  • memory/4176-1116-0x00000000054A0000-0x00000000054EB000-memory.dmp

    Filesize

    300KB

  • memory/4176-1117-0x0000000002D80000-0x0000000002D90000-memory.dmp

    Filesize

    64KB

  • memory/4248-170-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4248-143-0x0000000004E60000-0x0000000004E70000-memory.dmp

    Filesize

    64KB

  • memory/4248-146-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4248-147-0x0000000004E60000-0x0000000004E70000-memory.dmp

    Filesize

    64KB

  • memory/4248-139-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4248-137-0x00000000026E0000-0x00000000026F8000-memory.dmp

    Filesize

    96KB

  • memory/4248-138-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4248-175-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4248-174-0x0000000004E60000-0x0000000004E70000-memory.dmp

    Filesize

    64KB

  • memory/4248-172-0x0000000004E60000-0x0000000004E70000-memory.dmp

    Filesize

    64KB

  • memory/4248-171-0x0000000004E60000-0x0000000004E70000-memory.dmp

    Filesize

    64KB

  • memory/4248-169-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4248-167-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4248-165-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4248-163-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4248-161-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4248-159-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4248-157-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4248-155-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4248-153-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4248-151-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4248-136-0x0000000004E70000-0x000000000536E000-memory.dmp

    Filesize

    5.0MB

  • memory/4248-135-0x0000000000A60000-0x0000000000A7A000-memory.dmp

    Filesize

    104KB

  • memory/4248-149-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4248-142-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4248-145-0x0000000004E60000-0x0000000004E70000-memory.dmp

    Filesize

    64KB

  • memory/4248-141-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB