Analysis

  • max time kernel
    52s
  • max time network
    67s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 20:13

General

  • Target

    672f5e90042e025fb9df102d1324945cb22bda1892bde05c0bb6a5f7e1748c14.exe

  • Size

    696KB

  • MD5

    418b5ed53ab9315e02c9f1d3e809479e

  • SHA1

    201ce1c30233401004ff113c1caece164cf39680

  • SHA256

    672f5e90042e025fb9df102d1324945cb22bda1892bde05c0bb6a5f7e1748c14

  • SHA512

    df7137e9cc1e5ff6e82448a3c518f6a4f91044dc52bf5d21e66aa198ac3f6c4a3980c58c6b5358676e6835f6ac883dc2492f5b4b42a730b1e3ded6dab5cfd56a

  • SSDEEP

    12288:iMr5y90HD7YGexJsWAF3CwFha1QOLjoZQZ2HKwzM1jJxZ+eFGz:ryW7ghU3nk1QO3hZcKoMh7Z+YQ

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 22 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\672f5e90042e025fb9df102d1324945cb22bda1892bde05c0bb6a5f7e1748c14.exe
    "C:\Users\Admin\AppData\Local\Temp\672f5e90042e025fb9df102d1324945cb22bda1892bde05c0bb6a5f7e1748c14.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2156
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un676654.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un676654.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2508
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1017.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1017.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2560
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9851.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9851.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3480
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si261208.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si261208.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si261208.exe

    Filesize

    175KB

    MD5

    b9dd4dd87ac629fc627d71ea5d32a410

    SHA1

    91dc83e5767168debb061b9f51fb8e5989373748

    SHA256

    afd7952c383cbcb722ad15589835cf705faffee1832e17860656a824445a75b4

    SHA512

    973e6af08b98486a58e47df7ece7b3f93b5c842aabb091026d2e04257f78c15d6d19f74da390b349f70d21146afbb78fd09d9e2b1114e8b5fccd565973c43a0b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si261208.exe

    Filesize

    175KB

    MD5

    b9dd4dd87ac629fc627d71ea5d32a410

    SHA1

    91dc83e5767168debb061b9f51fb8e5989373748

    SHA256

    afd7952c383cbcb722ad15589835cf705faffee1832e17860656a824445a75b4

    SHA512

    973e6af08b98486a58e47df7ece7b3f93b5c842aabb091026d2e04257f78c15d6d19f74da390b349f70d21146afbb78fd09d9e2b1114e8b5fccd565973c43a0b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un676654.exe

    Filesize

    553KB

    MD5

    6baa2a383f3b2873f89995f85e7a39dd

    SHA1

    035e93ddd3a74c04d50850a0d2cc327f2f953a5b

    SHA256

    69b1352dd220f6b28a3a02a3aaf9f36ba2370591f798daba5a480d4a1f8a9d8d

    SHA512

    47cd354777f85fa40f17d83c0f7380b5aef5026157da6f8e21798c393559bfd4d06e9c19e0b38144a028068999136ad714ba6c4006d049c4fd41b13abc222665

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un676654.exe

    Filesize

    553KB

    MD5

    6baa2a383f3b2873f89995f85e7a39dd

    SHA1

    035e93ddd3a74c04d50850a0d2cc327f2f953a5b

    SHA256

    69b1352dd220f6b28a3a02a3aaf9f36ba2370591f798daba5a480d4a1f8a9d8d

    SHA512

    47cd354777f85fa40f17d83c0f7380b5aef5026157da6f8e21798c393559bfd4d06e9c19e0b38144a028068999136ad714ba6c4006d049c4fd41b13abc222665

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1017.exe

    Filesize

    308KB

    MD5

    537ad88d3fd3292646a2000adee89da3

    SHA1

    ab25c5f2390c303b2d8d22e6ad07243ea4ee3e98

    SHA256

    1cdfeb6a05afb05d2d1692f3ff8ef3f96def0abe461b1898f99df27f3be6996c

    SHA512

    e4a34c043c2b1ef6cc0f65684107577650b2dbb43e3d1c1f1b0b6e0006ae8321b88f72e9c6b99a2ca72d73e4446186768a14027a8517fb4a4fc83d74e471f56e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1017.exe

    Filesize

    308KB

    MD5

    537ad88d3fd3292646a2000adee89da3

    SHA1

    ab25c5f2390c303b2d8d22e6ad07243ea4ee3e98

    SHA256

    1cdfeb6a05afb05d2d1692f3ff8ef3f96def0abe461b1898f99df27f3be6996c

    SHA512

    e4a34c043c2b1ef6cc0f65684107577650b2dbb43e3d1c1f1b0b6e0006ae8321b88f72e9c6b99a2ca72d73e4446186768a14027a8517fb4a4fc83d74e471f56e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9851.exe

    Filesize

    366KB

    MD5

    192910c290f4e9b5e28301be6bff9b1e

    SHA1

    5f3c437d3a93b2a76120585505847d66fcda2e1b

    SHA256

    9fba3023c7f633efc9eb1dcdef6be1bb687013b8a76ef7dc48a64cda648721ac

    SHA512

    67977865db20326ff864efcd0c17c77e918ec2ce620d2dfa6fca69529d757c8dd437331032294f96dd934c5259bde842938b35d463df313d6f0b3b67d71673e6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9851.exe

    Filesize

    366KB

    MD5

    192910c290f4e9b5e28301be6bff9b1e

    SHA1

    5f3c437d3a93b2a76120585505847d66fcda2e1b

    SHA256

    9fba3023c7f633efc9eb1dcdef6be1bb687013b8a76ef7dc48a64cda648721ac

    SHA512

    67977865db20326ff864efcd0c17c77e918ec2ce620d2dfa6fca69529d757c8dd437331032294f96dd934c5259bde842938b35d463df313d6f0b3b67d71673e6

  • memory/2560-136-0x0000000000A50000-0x0000000000A6A000-memory.dmp

    Filesize

    104KB

  • memory/2560-137-0x0000000004D80000-0x000000000527E000-memory.dmp

    Filesize

    5.0MB

  • memory/2560-138-0x00000000026D0000-0x00000000026E8000-memory.dmp

    Filesize

    96KB

  • memory/2560-139-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2560-141-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/2560-140-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/2560-142-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/2560-144-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2560-143-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2560-146-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2560-148-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2560-150-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2560-152-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2560-154-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2560-156-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2560-158-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2560-160-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2560-162-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2560-164-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2560-166-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2560-168-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2560-170-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2560-171-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/2560-172-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/2560-173-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/2560-174-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/2560-176-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/3480-181-0x0000000002510000-0x0000000002556000-memory.dmp

    Filesize

    280KB

  • memory/3480-182-0x00000000026B0000-0x00000000026F4000-memory.dmp

    Filesize

    272KB

  • memory/3480-183-0x00000000026B0000-0x00000000026EF000-memory.dmp

    Filesize

    252KB

  • memory/3480-184-0x00000000026B0000-0x00000000026EF000-memory.dmp

    Filesize

    252KB

  • memory/3480-186-0x00000000026B0000-0x00000000026EF000-memory.dmp

    Filesize

    252KB

  • memory/3480-188-0x00000000026B0000-0x00000000026EF000-memory.dmp

    Filesize

    252KB

  • memory/3480-190-0x00000000026B0000-0x00000000026EF000-memory.dmp

    Filesize

    252KB

  • memory/3480-192-0x00000000026B0000-0x00000000026EF000-memory.dmp

    Filesize

    252KB

  • memory/3480-194-0x00000000026B0000-0x00000000026EF000-memory.dmp

    Filesize

    252KB

  • memory/3480-196-0x00000000026B0000-0x00000000026EF000-memory.dmp

    Filesize

    252KB

  • memory/3480-198-0x00000000026B0000-0x00000000026EF000-memory.dmp

    Filesize

    252KB

  • memory/3480-200-0x00000000026B0000-0x00000000026EF000-memory.dmp

    Filesize

    252KB

  • memory/3480-202-0x00000000026B0000-0x00000000026EF000-memory.dmp

    Filesize

    252KB

  • memory/3480-204-0x00000000026B0000-0x00000000026EF000-memory.dmp

    Filesize

    252KB

  • memory/3480-206-0x00000000026B0000-0x00000000026EF000-memory.dmp

    Filesize

    252KB

  • memory/3480-208-0x00000000026B0000-0x00000000026EF000-memory.dmp

    Filesize

    252KB

  • memory/3480-210-0x00000000026B0000-0x00000000026EF000-memory.dmp

    Filesize

    252KB

  • memory/3480-212-0x00000000026B0000-0x00000000026EF000-memory.dmp

    Filesize

    252KB

  • memory/3480-214-0x00000000026B0000-0x00000000026EF000-memory.dmp

    Filesize

    252KB

  • memory/3480-216-0x00000000026B0000-0x00000000026EF000-memory.dmp

    Filesize

    252KB

  • memory/3480-276-0x0000000000950000-0x000000000099B000-memory.dmp

    Filesize

    300KB

  • memory/3480-277-0x0000000004E40000-0x0000000004E50000-memory.dmp

    Filesize

    64KB

  • memory/3480-279-0x0000000004E40000-0x0000000004E50000-memory.dmp

    Filesize

    64KB

  • memory/3480-281-0x0000000004E40000-0x0000000004E50000-memory.dmp

    Filesize

    64KB

  • memory/3480-1093-0x0000000005350000-0x0000000005956000-memory.dmp

    Filesize

    6.0MB

  • memory/3480-1094-0x0000000005960000-0x0000000005A6A000-memory.dmp

    Filesize

    1.0MB

  • memory/3480-1095-0x0000000004DD0000-0x0000000004DE2000-memory.dmp

    Filesize

    72KB

  • memory/3480-1096-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/3480-1097-0x0000000005BB0000-0x0000000005BFB000-memory.dmp

    Filesize

    300KB

  • memory/3480-1098-0x0000000004E40000-0x0000000004E50000-memory.dmp

    Filesize

    64KB

  • memory/3480-1099-0x0000000005D00000-0x0000000005D66000-memory.dmp

    Filesize

    408KB

  • memory/3480-1101-0x00000000062A0000-0x0000000006332000-memory.dmp

    Filesize

    584KB

  • memory/3480-1102-0x0000000004E40000-0x0000000004E50000-memory.dmp

    Filesize

    64KB

  • memory/3480-1103-0x0000000004E40000-0x0000000004E50000-memory.dmp

    Filesize

    64KB

  • memory/3480-1104-0x0000000004E40000-0x0000000004E50000-memory.dmp

    Filesize

    64KB

  • memory/3480-1105-0x0000000007750000-0x0000000007912000-memory.dmp

    Filesize

    1.8MB

  • memory/3480-1106-0x0000000007920000-0x0000000007E4C000-memory.dmp

    Filesize

    5.2MB

  • memory/3480-1107-0x0000000004E40000-0x0000000004E50000-memory.dmp

    Filesize

    64KB

  • memory/3480-1108-0x0000000007F50000-0x0000000007FC6000-memory.dmp

    Filesize

    472KB

  • memory/3480-1109-0x0000000004850000-0x00000000048A0000-memory.dmp

    Filesize

    320KB

  • memory/4956-1115-0x0000000000650000-0x0000000000682000-memory.dmp

    Filesize

    200KB

  • memory/4956-1116-0x0000000004F50000-0x0000000004F9B000-memory.dmp

    Filesize

    300KB

  • memory/4956-1117-0x0000000005200000-0x0000000005210000-memory.dmp

    Filesize

    64KB