Analysis

  • max time kernel
    56s
  • max time network
    141s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 20:33

General

  • Target

    500d09225e913938d9213980a3b8979ad0b3828d200ed7d837ea53729678e565.exe

  • Size

    694KB

  • MD5

    c70bc15acf834f1777c14433e4ffa5e8

  • SHA1

    f66ed1a12c3e78451e5035942eeb9b2a248d399b

  • SHA256

    500d09225e913938d9213980a3b8979ad0b3828d200ed7d837ea53729678e565

  • SHA512

    ce8746b74c3e6fd8fd0333c70edf018124b180ec790a28aa2d95f10f94080a5960c4fa656843a7d6dbf42b2e91ae1e5d344321e8710cd1079d29fce2fd5131ed

  • SSDEEP

    12288:KMrGy90Pe6sNdnnacnbJ8dH1l1u+PGPxvdeoR8Nr3rpmvPSkzwDCJxJ3Jw84:Myke6YtaKeLdgvdetp3rpmyMwW/E

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\500d09225e913938d9213980a3b8979ad0b3828d200ed7d837ea53729678e565.exe
    "C:\Users\Admin\AppData\Local\Temp\500d09225e913938d9213980a3b8979ad0b3828d200ed7d837ea53729678e565.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4600
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un530356.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un530356.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5112
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4889.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4889.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2100
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6366.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6366.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1940
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si155778.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si155778.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3640

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si155778.exe

    Filesize

    175KB

    MD5

    77812d9060e2c1864bc3f70948d96213

    SHA1

    a37c13e63f80e4fbcc95099832302c1ce79d5b8c

    SHA256

    16287e5b63edd2cb63d117f319d2384583466dc29ed51483ede70aaeef5e8d41

    SHA512

    927258c6ca0c37dafb2112c224b778f9d710d598931212762f4ac760106cbd68f39b38250168023cdad4d430623874e305520dc917fbf23d4f9861bb6dfce0e5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si155778.exe

    Filesize

    175KB

    MD5

    77812d9060e2c1864bc3f70948d96213

    SHA1

    a37c13e63f80e4fbcc95099832302c1ce79d5b8c

    SHA256

    16287e5b63edd2cb63d117f319d2384583466dc29ed51483ede70aaeef5e8d41

    SHA512

    927258c6ca0c37dafb2112c224b778f9d710d598931212762f4ac760106cbd68f39b38250168023cdad4d430623874e305520dc917fbf23d4f9861bb6dfce0e5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un530356.exe

    Filesize

    553KB

    MD5

    25c8eb80b844bf353693cf57fd8358fc

    SHA1

    1a7728639a82c42a1c445e24730e1fd94034073b

    SHA256

    3de30ca5f7c636e897ba9e2998bdcdda7deed1e35a5d738db3b773dd10f7d1aa

    SHA512

    bbb58b11bd83a23708b7abbb0d1bd03b0fd8859d5358d9bfbe256744c02fac49372dbbb87801049a31110036b603a42b83122ad214bc0e090cc6f68e52e2912b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un530356.exe

    Filesize

    553KB

    MD5

    25c8eb80b844bf353693cf57fd8358fc

    SHA1

    1a7728639a82c42a1c445e24730e1fd94034073b

    SHA256

    3de30ca5f7c636e897ba9e2998bdcdda7deed1e35a5d738db3b773dd10f7d1aa

    SHA512

    bbb58b11bd83a23708b7abbb0d1bd03b0fd8859d5358d9bfbe256744c02fac49372dbbb87801049a31110036b603a42b83122ad214bc0e090cc6f68e52e2912b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4889.exe

    Filesize

    308KB

    MD5

    c9fc177886191e5db5ac7cffd73a89d8

    SHA1

    76b8c508587a0d1e67e0d637f770343a3a396fb6

    SHA256

    e13ee962e001dbf20867c8b4fcbe991c54ff3312352a958aa05a2dac79d1d838

    SHA512

    7085d7001beb40c911be5325cf905d373cf7793251e1cde9ae374f582341a5e5f4cb543470fdf7f5eef4f17f04321ad57871d7dcbf6b3a9740cfc22b0950845c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4889.exe

    Filesize

    308KB

    MD5

    c9fc177886191e5db5ac7cffd73a89d8

    SHA1

    76b8c508587a0d1e67e0d637f770343a3a396fb6

    SHA256

    e13ee962e001dbf20867c8b4fcbe991c54ff3312352a958aa05a2dac79d1d838

    SHA512

    7085d7001beb40c911be5325cf905d373cf7793251e1cde9ae374f582341a5e5f4cb543470fdf7f5eef4f17f04321ad57871d7dcbf6b3a9740cfc22b0950845c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6366.exe

    Filesize

    366KB

    MD5

    bc08ba1089fa71ca11c6c39dc5b5c816

    SHA1

    39dcf7a11871ae5ebb7db3e1afa133ea0115f9bb

    SHA256

    f1e0a311a5fa47e6905c1103211d310f3ad9caf37518ce5875765dc2b5c4c8a0

    SHA512

    eaa5bf3a672a76463334e1e5dc08acf0e2cad94871ee0db18e2bf618703819320fd46c1f615ccf075206693dbc531be44165c5033fa78c8d228f9a63aa5f6ffd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6366.exe

    Filesize

    366KB

    MD5

    bc08ba1089fa71ca11c6c39dc5b5c816

    SHA1

    39dcf7a11871ae5ebb7db3e1afa133ea0115f9bb

    SHA256

    f1e0a311a5fa47e6905c1103211d310f3ad9caf37518ce5875765dc2b5c4c8a0

    SHA512

    eaa5bf3a672a76463334e1e5dc08acf0e2cad94871ee0db18e2bf618703819320fd46c1f615ccf075206693dbc531be44165c5033fa78c8d228f9a63aa5f6ffd

  • memory/1940-1091-0x0000000005230000-0x0000000005836000-memory.dmp

    Filesize

    6.0MB

  • memory/1940-1092-0x00000000058C0000-0x00000000059CA000-memory.dmp

    Filesize

    1.0MB

  • memory/1940-1107-0x0000000006FC0000-0x0000000007010000-memory.dmp

    Filesize

    320KB

  • memory/1940-194-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/1940-1106-0x0000000006F40000-0x0000000006FB6000-memory.dmp

    Filesize

    472KB

  • memory/1940-196-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/1940-1105-0x00000000068D0000-0x0000000006DFC000-memory.dmp

    Filesize

    5.2MB

  • memory/1940-1104-0x00000000066F0000-0x00000000068B2000-memory.dmp

    Filesize

    1.8MB

  • memory/1940-1103-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/1940-1102-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/1940-1101-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/1940-1100-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/1940-1098-0x00000000063D0000-0x0000000006462000-memory.dmp

    Filesize

    584KB

  • memory/1940-1097-0x0000000005D00000-0x0000000005D66000-memory.dmp

    Filesize

    408KB

  • memory/1940-1096-0x0000000005B70000-0x0000000005BBB000-memory.dmp

    Filesize

    300KB

  • memory/1940-1095-0x0000000005A20000-0x0000000005A5E000-memory.dmp

    Filesize

    248KB

  • memory/1940-1094-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/1940-1093-0x0000000005A00000-0x0000000005A12000-memory.dmp

    Filesize

    72KB

  • memory/1940-198-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/1940-206-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/1940-223-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/1940-220-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/1940-219-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/1940-216-0x0000000000720000-0x000000000076B000-memory.dmp

    Filesize

    300KB

  • memory/1940-214-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/1940-179-0x00000000027E0000-0x0000000002826000-memory.dmp

    Filesize

    280KB

  • memory/1940-180-0x00000000051E0000-0x0000000005224000-memory.dmp

    Filesize

    272KB

  • memory/1940-181-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/1940-182-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/1940-184-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/1940-186-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/1940-188-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/1940-190-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/1940-192-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/1940-212-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/1940-210-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/1940-208-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/1940-200-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/1940-202-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/1940-204-0x00000000051E0000-0x000000000521F000-memory.dmp

    Filesize

    252KB

  • memory/2100-169-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/2100-139-0x0000000004D30000-0x0000000004D40000-memory.dmp

    Filesize

    64KB

  • memory/2100-144-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/2100-141-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/2100-137-0x00000000007E0000-0x000000000080D000-memory.dmp

    Filesize

    180KB

  • memory/2100-138-0x0000000004D30000-0x0000000004D40000-memory.dmp

    Filesize

    64KB

  • memory/2100-174-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/2100-173-0x0000000004D30000-0x0000000004D40000-memory.dmp

    Filesize

    64KB

  • memory/2100-172-0x0000000004D30000-0x0000000004D40000-memory.dmp

    Filesize

    64KB

  • memory/2100-136-0x0000000004C40000-0x0000000004C58000-memory.dmp

    Filesize

    96KB

  • memory/2100-171-0x0000000004D30000-0x0000000004D40000-memory.dmp

    Filesize

    64KB

  • memory/2100-168-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/2100-166-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/2100-164-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/2100-162-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/2100-160-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/2100-158-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/2100-156-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/2100-154-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/2100-152-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/2100-150-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/2100-148-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/2100-146-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/2100-142-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/2100-140-0x0000000004D30000-0x0000000004D40000-memory.dmp

    Filesize

    64KB

  • memory/2100-135-0x0000000004D40000-0x000000000523E000-memory.dmp

    Filesize

    5.0MB

  • memory/2100-134-0x0000000002440000-0x000000000245A000-memory.dmp

    Filesize

    104KB

  • memory/3640-1113-0x0000000000E10000-0x0000000000E42000-memory.dmp

    Filesize

    200KB

  • memory/3640-1114-0x0000000005850000-0x000000000589B000-memory.dmp

    Filesize

    300KB

  • memory/3640-1115-0x0000000005730000-0x0000000005740000-memory.dmp

    Filesize

    64KB

  • memory/3640-1116-0x0000000005730000-0x0000000005740000-memory.dmp

    Filesize

    64KB