Analysis

  • max time kernel
    53s
  • max time network
    74s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 21:25

General

  • Target

    a4cc6f514b733673886c4ac4893d211342bc05877ac51dc55111bb209e30041b.exe

  • Size

    695KB

  • MD5

    b9719da2a6069dcfde3c9e6bc34aad0d

  • SHA1

    1388b72a002c39ebdcd51b2de3f98eb3b15af1bc

  • SHA256

    a4cc6f514b733673886c4ac4893d211342bc05877ac51dc55111bb209e30041b

  • SHA512

    034bd8cc92697b84549d53698fc8af509bfbda71334f1ffcc8e749b9cf3414f48003310c18ba88ef321b6343380cd739031f4f52341336579233e5b22f212a02

  • SSDEEP

    12288:AMrky903WxjP2p8OGQG8Mw9wzM7msSzRcf2zdWqJdNAMcJ:UyLd2p8OS8nqzEmsSzRcad7raMS

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4cc6f514b733673886c4ac4893d211342bc05877ac51dc55111bb209e30041b.exe
    "C:\Users\Admin\AppData\Local\Temp\a4cc6f514b733673886c4ac4893d211342bc05877ac51dc55111bb209e30041b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4772
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un512435.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un512435.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5096
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7245.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7245.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2192
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4267.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4267.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4532
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si716102.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si716102.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4468

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si716102.exe

    Filesize

    175KB

    MD5

    5d52484bdf910e199bb01707763f921c

    SHA1

    b73d28cc8ccd458d71cc4dbe8e9556fd37afb975

    SHA256

    e690a1a985a0bbd3314e82e91416a2701392c714818b448da32c7415f23e9492

    SHA512

    46f3cbf8329b468264dfd636520825ff4c9f8903d31bbc9690609ae0a3ce2ea523f7c55efad32e3893e130bdc7b1fcea0cb48a5c1ca0748918ad33edea8adf30

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si716102.exe

    Filesize

    175KB

    MD5

    5d52484bdf910e199bb01707763f921c

    SHA1

    b73d28cc8ccd458d71cc4dbe8e9556fd37afb975

    SHA256

    e690a1a985a0bbd3314e82e91416a2701392c714818b448da32c7415f23e9492

    SHA512

    46f3cbf8329b468264dfd636520825ff4c9f8903d31bbc9690609ae0a3ce2ea523f7c55efad32e3893e130bdc7b1fcea0cb48a5c1ca0748918ad33edea8adf30

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un512435.exe

    Filesize

    553KB

    MD5

    8dc50dc70161de0ef1369af4ea7f298f

    SHA1

    3310431fc7fb3a5339a4a8cb4ec08c165f391fd7

    SHA256

    761e7cc82713d9bccb0d4417ab2a105941d1318158a015d555bef20bbba2293e

    SHA512

    e0547e19b4e26bed761fdeab83838cf490e7874cfdb6f6e2b484498a1634d855e4f21ba6f0e4ce52e855ec86ec12c8267eda5dc1ff26e3695ee7b60a69cf8f7d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un512435.exe

    Filesize

    553KB

    MD5

    8dc50dc70161de0ef1369af4ea7f298f

    SHA1

    3310431fc7fb3a5339a4a8cb4ec08c165f391fd7

    SHA256

    761e7cc82713d9bccb0d4417ab2a105941d1318158a015d555bef20bbba2293e

    SHA512

    e0547e19b4e26bed761fdeab83838cf490e7874cfdb6f6e2b484498a1634d855e4f21ba6f0e4ce52e855ec86ec12c8267eda5dc1ff26e3695ee7b60a69cf8f7d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7245.exe

    Filesize

    308KB

    MD5

    9d2b5751f704d3bb8cf2409adcdf290e

    SHA1

    034857ccfce48ddfbb4546d5ccd6137152948639

    SHA256

    87b410686dc8fd845806c116fcc74978f020b5f813cf172d30ab4c0cc5b425dc

    SHA512

    dd98537cc3dcfcd857f3b16440b9d8743009b358b2e3b4149b9f6aecb4c2e6b5e189ff8d6c05338a2ec8f98e007c017f1f46bfb8521c5d6a44b6a07e33f60bb3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7245.exe

    Filesize

    308KB

    MD5

    9d2b5751f704d3bb8cf2409adcdf290e

    SHA1

    034857ccfce48ddfbb4546d5ccd6137152948639

    SHA256

    87b410686dc8fd845806c116fcc74978f020b5f813cf172d30ab4c0cc5b425dc

    SHA512

    dd98537cc3dcfcd857f3b16440b9d8743009b358b2e3b4149b9f6aecb4c2e6b5e189ff8d6c05338a2ec8f98e007c017f1f46bfb8521c5d6a44b6a07e33f60bb3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4267.exe

    Filesize

    366KB

    MD5

    2b2fb0f74a4868bd1b59c75a8d1e7b78

    SHA1

    2bfb8d96bfbc10c662bd5f71e2ce9ab53a37d441

    SHA256

    7231517b98605e7dcd9b18283350466a55834ec812b1b4aa61daa4118053541a

    SHA512

    774b4a7f9f6254b4dc2fbd23446d43a4d61599c9017e0fe0cf9885d25d6020680ae8460775c6c208ee1117caa6694437240cfbd6997c860ff2305c4d880c23d6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4267.exe

    Filesize

    366KB

    MD5

    2b2fb0f74a4868bd1b59c75a8d1e7b78

    SHA1

    2bfb8d96bfbc10c662bd5f71e2ce9ab53a37d441

    SHA256

    7231517b98605e7dcd9b18283350466a55834ec812b1b4aa61daa4118053541a

    SHA512

    774b4a7f9f6254b4dc2fbd23446d43a4d61599c9017e0fe0cf9885d25d6020680ae8460775c6c208ee1117caa6694437240cfbd6997c860ff2305c4d880c23d6

  • memory/2192-135-0x00000000023A0000-0x00000000023BA000-memory.dmp

    Filesize

    104KB

  • memory/2192-136-0x0000000004E40000-0x000000000533E000-memory.dmp

    Filesize

    5.0MB

  • memory/2192-137-0x0000000002630000-0x0000000002648000-memory.dmp

    Filesize

    96KB

  • memory/2192-138-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2192-139-0x0000000004E30000-0x0000000004E40000-memory.dmp

    Filesize

    64KB

  • memory/2192-140-0x0000000004E30000-0x0000000004E40000-memory.dmp

    Filesize

    64KB

  • memory/2192-141-0x0000000004E30000-0x0000000004E40000-memory.dmp

    Filesize

    64KB

  • memory/2192-142-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/2192-143-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/2192-145-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/2192-147-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/2192-149-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/2192-151-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/2192-153-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/2192-155-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/2192-157-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/2192-159-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/2192-161-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/2192-163-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/2192-165-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/2192-167-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/2192-169-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/2192-170-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/2192-171-0x0000000004E30000-0x0000000004E40000-memory.dmp

    Filesize

    64KB

  • memory/2192-172-0x0000000004E30000-0x0000000004E40000-memory.dmp

    Filesize

    64KB

  • memory/2192-173-0x0000000004E30000-0x0000000004E40000-memory.dmp

    Filesize

    64KB

  • memory/2192-175-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4468-1113-0x0000000000E80000-0x0000000000EB2000-memory.dmp

    Filesize

    200KB

  • memory/4468-1115-0x00000000057A0000-0x00000000057B0000-memory.dmp

    Filesize

    64KB

  • memory/4468-1114-0x00000000058C0000-0x000000000590B000-memory.dmp

    Filesize

    300KB

  • memory/4532-183-0x0000000002470000-0x00000000024AF000-memory.dmp

    Filesize

    252KB

  • memory/4532-220-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/4532-185-0x0000000002470000-0x00000000024AF000-memory.dmp

    Filesize

    252KB

  • memory/4532-187-0x0000000002470000-0x00000000024AF000-memory.dmp

    Filesize

    252KB

  • memory/4532-189-0x0000000002470000-0x00000000024AF000-memory.dmp

    Filesize

    252KB

  • memory/4532-191-0x0000000002470000-0x00000000024AF000-memory.dmp

    Filesize

    252KB

  • memory/4532-193-0x0000000002470000-0x00000000024AF000-memory.dmp

    Filesize

    252KB

  • memory/4532-195-0x0000000002470000-0x00000000024AF000-memory.dmp

    Filesize

    252KB

  • memory/4532-197-0x0000000002470000-0x00000000024AF000-memory.dmp

    Filesize

    252KB

  • memory/4532-199-0x0000000002470000-0x00000000024AF000-memory.dmp

    Filesize

    252KB

  • memory/4532-201-0x0000000002470000-0x00000000024AF000-memory.dmp

    Filesize

    252KB

  • memory/4532-203-0x0000000002470000-0x00000000024AF000-memory.dmp

    Filesize

    252KB

  • memory/4532-205-0x0000000002470000-0x00000000024AF000-memory.dmp

    Filesize

    252KB

  • memory/4532-207-0x0000000002470000-0x00000000024AF000-memory.dmp

    Filesize

    252KB

  • memory/4532-209-0x0000000002470000-0x00000000024AF000-memory.dmp

    Filesize

    252KB

  • memory/4532-211-0x0000000002470000-0x00000000024AF000-memory.dmp

    Filesize

    252KB

  • memory/4532-213-0x0000000002470000-0x00000000024AF000-memory.dmp

    Filesize

    252KB

  • memory/4532-215-0x0000000002470000-0x00000000024AF000-memory.dmp

    Filesize

    252KB

  • memory/4532-221-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/4532-182-0x0000000002470000-0x00000000024AF000-memory.dmp

    Filesize

    252KB

  • memory/4532-218-0x0000000000720000-0x000000000076B000-memory.dmp

    Filesize

    300KB

  • memory/4532-224-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/4532-1092-0x00000000053A0000-0x00000000059A6000-memory.dmp

    Filesize

    6.0MB

  • memory/4532-1093-0x0000000005A00000-0x0000000005B0A000-memory.dmp

    Filesize

    1.0MB

  • memory/4532-1094-0x0000000005B40000-0x0000000005B52000-memory.dmp

    Filesize

    72KB

  • memory/4532-1095-0x0000000005B60000-0x0000000005B9E000-memory.dmp

    Filesize

    248KB

  • memory/4532-1096-0x0000000005CB0000-0x0000000005CFB000-memory.dmp

    Filesize

    300KB

  • memory/4532-1097-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/4532-1098-0x0000000005E40000-0x0000000005ED2000-memory.dmp

    Filesize

    584KB

  • memory/4532-1099-0x0000000005EE0000-0x0000000005F46000-memory.dmp

    Filesize

    408KB

  • memory/4532-1101-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/4532-1102-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/4532-1103-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/4532-1104-0x00000000065F0000-0x00000000067B2000-memory.dmp

    Filesize

    1.8MB

  • memory/4532-181-0x0000000002470000-0x00000000024B4000-memory.dmp

    Filesize

    272KB

  • memory/4532-180-0x0000000000B00000-0x0000000000B46000-memory.dmp

    Filesize

    280KB

  • memory/4532-1105-0x00000000067D0000-0x0000000006CFC000-memory.dmp

    Filesize

    5.2MB

  • memory/4532-1106-0x0000000006E30000-0x0000000006EA6000-memory.dmp

    Filesize

    472KB

  • memory/4532-1107-0x0000000006EB0000-0x0000000006F00000-memory.dmp

    Filesize

    320KB