Analysis

  • max time kernel
    54s
  • max time network
    138s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 20:32

General

  • Target

    8ca707e2ec8f32173d670fdf6a731e265b02e5473c1558ea080327f0352e6f14.exe

  • Size

    695KB

  • MD5

    838d7862475b81938125883abc85e4c1

  • SHA1

    693b608f80a642838d320b1e9d207ee0bfb4ef4a

  • SHA256

    8ca707e2ec8f32173d670fdf6a731e265b02e5473c1558ea080327f0352e6f14

  • SHA512

    ddb5044453b8732fa7d6f4e02d9703739ed02f5b8459d77fa25a5c3f27a648b8beacd35c39725e6bc74114e89b6287a0c8a13ee667112c21fd7ac1aebcb7c1f4

  • SSDEEP

    12288:3MrWy90mSrN2rm27uvml3PnAfwhLBkzhdvPSLr4PDJZmBsf9FDypWfj:tyKOnSnyH4L/9V1yY

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8ca707e2ec8f32173d670fdf6a731e265b02e5473c1558ea080327f0352e6f14.exe
    "C:\Users\Admin\AppData\Local\Temp\8ca707e2ec8f32173d670fdf6a731e265b02e5473c1558ea080327f0352e6f14.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3704
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un409041.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un409041.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3048
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3773.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3773.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4656
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1968.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1968.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si342812.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si342812.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4236

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si342812.exe

    Filesize

    175KB

    MD5

    66a4573faa59537b2f284680653f64df

    SHA1

    0cbc7e006a6a7c72a449dd6fc18a6ceaafab3001

    SHA256

    bb3ada24dec02bb400588997278b17ffb65124de6f13fb6408141e72ac90fa72

    SHA512

    763735e33412b12fbe92120194e1c4432f6fc4a901c2dc9ca84cddbb51d56bc0d4763113b26b798c59db8feb2b4e549cab014b55d8c843fbb54774f715a6b40c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si342812.exe

    Filesize

    175KB

    MD5

    66a4573faa59537b2f284680653f64df

    SHA1

    0cbc7e006a6a7c72a449dd6fc18a6ceaafab3001

    SHA256

    bb3ada24dec02bb400588997278b17ffb65124de6f13fb6408141e72ac90fa72

    SHA512

    763735e33412b12fbe92120194e1c4432f6fc4a901c2dc9ca84cddbb51d56bc0d4763113b26b798c59db8feb2b4e549cab014b55d8c843fbb54774f715a6b40c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un409041.exe

    Filesize

    553KB

    MD5

    8d74807131c952278f9dfe1fa4f13ea4

    SHA1

    692be8c43e4453f710a8b63ba0b31db10a9e8c78

    SHA256

    7b4ad5961802456723e8b30b1ee29fb90cd3b04ae13a1865b35e03e9c634f70b

    SHA512

    81c9c707966dc093aaa3f9d0a5b1e44f7e60b16c3b96d9a1dcae357eb0cac87204a441ffd4110f8da2994f07ca93e18ee2b1717d6d9fc006a4881d96ea75cd4f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un409041.exe

    Filesize

    553KB

    MD5

    8d74807131c952278f9dfe1fa4f13ea4

    SHA1

    692be8c43e4453f710a8b63ba0b31db10a9e8c78

    SHA256

    7b4ad5961802456723e8b30b1ee29fb90cd3b04ae13a1865b35e03e9c634f70b

    SHA512

    81c9c707966dc093aaa3f9d0a5b1e44f7e60b16c3b96d9a1dcae357eb0cac87204a441ffd4110f8da2994f07ca93e18ee2b1717d6d9fc006a4881d96ea75cd4f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3773.exe

    Filesize

    308KB

    MD5

    f09cdf10fa39d08caf5098a1b91e2dc9

    SHA1

    63dee967a7774cb8ef0d5a2ddb711a8a66b20807

    SHA256

    4f168c4cd643fa8e4f1496351e54b03a83fa21025a781a0f2003dffea0ebd21c

    SHA512

    a5a1304a473a7d07fcc96df422b3ee5f94e91afd83775a78bef375b87a23d8dd9b71387149d6ecd82983b325a3109ba4cc2a17fd7c5c832d2f010271b6c0ae3f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3773.exe

    Filesize

    308KB

    MD5

    f09cdf10fa39d08caf5098a1b91e2dc9

    SHA1

    63dee967a7774cb8ef0d5a2ddb711a8a66b20807

    SHA256

    4f168c4cd643fa8e4f1496351e54b03a83fa21025a781a0f2003dffea0ebd21c

    SHA512

    a5a1304a473a7d07fcc96df422b3ee5f94e91afd83775a78bef375b87a23d8dd9b71387149d6ecd82983b325a3109ba4cc2a17fd7c5c832d2f010271b6c0ae3f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1968.exe

    Filesize

    366KB

    MD5

    ef8425c5b7a82e156bfdf239851528e1

    SHA1

    45625ffa50cce40454a4580f33e005c2aec3269e

    SHA256

    408df75f5cfccf2220a4a3836651bea2fc9dc40ad41e5a0290be86af4fb510fe

    SHA512

    8b853980d780a6f44851bcc30aaa15a040a8df07685e1d362cc067e7945361b3b3e04b208a810923ca769d9fb910aac2e89f92d92bbfcc96c6f84f3ed4f5652e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1968.exe

    Filesize

    366KB

    MD5

    ef8425c5b7a82e156bfdf239851528e1

    SHA1

    45625ffa50cce40454a4580f33e005c2aec3269e

    SHA256

    408df75f5cfccf2220a4a3836651bea2fc9dc40ad41e5a0290be86af4fb510fe

    SHA512

    8b853980d780a6f44851bcc30aaa15a040a8df07685e1d362cc067e7945361b3b3e04b208a810923ca769d9fb910aac2e89f92d92bbfcc96c6f84f3ed4f5652e

  • memory/4124-1088-0x0000000004F10000-0x0000000004F22000-memory.dmp

    Filesize

    72KB

  • memory/4124-1087-0x00000000054B0000-0x00000000055BA000-memory.dmp

    Filesize

    1.0MB

  • memory/4124-253-0x0000000000980000-0x00000000009CB000-memory.dmp

    Filesize

    300KB

  • memory/4124-209-0x0000000002400000-0x000000000243F000-memory.dmp

    Filesize

    252KB

  • memory/4124-207-0x0000000002400000-0x000000000243F000-memory.dmp

    Filesize

    252KB

  • memory/4124-195-0x0000000002400000-0x000000000243F000-memory.dmp

    Filesize

    252KB

  • memory/4124-193-0x0000000002400000-0x000000000243F000-memory.dmp

    Filesize

    252KB

  • memory/4124-1102-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

    Filesize

    64KB

  • memory/4124-1101-0x0000000006AF0000-0x000000000701C000-memory.dmp

    Filesize

    5.2MB

  • memory/4124-197-0x0000000002400000-0x000000000243F000-memory.dmp

    Filesize

    252KB

  • memory/4124-1100-0x0000000006920000-0x0000000006AE2000-memory.dmp

    Filesize

    1.8MB

  • memory/4124-1099-0x0000000006760000-0x00000000067B0000-memory.dmp

    Filesize

    320KB

  • memory/4124-1098-0x00000000066E0000-0x0000000006756000-memory.dmp

    Filesize

    472KB

  • memory/4124-1097-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

    Filesize

    64KB

  • memory/4124-1096-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

    Filesize

    64KB

  • memory/4124-1095-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

    Filesize

    64KB

  • memory/4124-1094-0x00000000058D0000-0x0000000005936000-memory.dmp

    Filesize

    408KB

  • memory/4124-1093-0x0000000005830000-0x00000000058C2000-memory.dmp

    Filesize

    584KB

  • memory/4124-1091-0x00000000056C0000-0x000000000570B000-memory.dmp

    Filesize

    300KB

  • memory/4124-1090-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

    Filesize

    64KB

  • memory/4124-1089-0x0000000004F30000-0x0000000004F6E000-memory.dmp

    Filesize

    248KB

  • memory/4124-254-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

    Filesize

    64KB

  • memory/4124-1086-0x0000000005AC0000-0x00000000060C6000-memory.dmp

    Filesize

    6.0MB

  • memory/4124-174-0x0000000002380000-0x00000000023C6000-memory.dmp

    Filesize

    280KB

  • memory/4124-175-0x0000000002400000-0x0000000002444000-memory.dmp

    Filesize

    272KB

  • memory/4124-176-0x0000000002400000-0x000000000243F000-memory.dmp

    Filesize

    252KB

  • memory/4124-177-0x0000000002400000-0x000000000243F000-memory.dmp

    Filesize

    252KB

  • memory/4124-179-0x0000000002400000-0x000000000243F000-memory.dmp

    Filesize

    252KB

  • memory/4124-181-0x0000000002400000-0x000000000243F000-memory.dmp

    Filesize

    252KB

  • memory/4124-183-0x0000000002400000-0x000000000243F000-memory.dmp

    Filesize

    252KB

  • memory/4124-185-0x0000000002400000-0x000000000243F000-memory.dmp

    Filesize

    252KB

  • memory/4124-187-0x0000000002400000-0x000000000243F000-memory.dmp

    Filesize

    252KB

  • memory/4124-189-0x0000000002400000-0x000000000243F000-memory.dmp

    Filesize

    252KB

  • memory/4124-191-0x0000000002400000-0x000000000243F000-memory.dmp

    Filesize

    252KB

  • memory/4124-205-0x0000000002400000-0x000000000243F000-memory.dmp

    Filesize

    252KB

  • memory/4124-258-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

    Filesize

    64KB

  • memory/4124-256-0x0000000004FA0000-0x0000000004FB0000-memory.dmp

    Filesize

    64KB

  • memory/4124-199-0x0000000002400000-0x000000000243F000-memory.dmp

    Filesize

    252KB

  • memory/4124-201-0x0000000002400000-0x000000000243F000-memory.dmp

    Filesize

    252KB

  • memory/4124-203-0x0000000002400000-0x000000000243F000-memory.dmp

    Filesize

    252KB

  • memory/4236-1108-0x0000000000040000-0x0000000000072000-memory.dmp

    Filesize

    200KB

  • memory/4236-1109-0x0000000004A80000-0x0000000004ACB000-memory.dmp

    Filesize

    300KB

  • memory/4236-1110-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

    Filesize

    64KB

  • memory/4236-1111-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

    Filesize

    64KB

  • memory/4656-166-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4656-149-0x0000000002410000-0x0000000002422000-memory.dmp

    Filesize

    72KB

  • memory/4656-141-0x0000000002410000-0x0000000002422000-memory.dmp

    Filesize

    72KB

  • memory/4656-134-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4656-135-0x0000000002890000-0x00000000028A0000-memory.dmp

    Filesize

    64KB

  • memory/4656-133-0x0000000002410000-0x0000000002428000-memory.dmp

    Filesize

    96KB

  • memory/4656-169-0x0000000002890000-0x00000000028A0000-memory.dmp

    Filesize

    64KB

  • memory/4656-168-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4656-136-0x0000000002890000-0x00000000028A0000-memory.dmp

    Filesize

    64KB

  • memory/4656-165-0x0000000002410000-0x0000000002422000-memory.dmp

    Filesize

    72KB

  • memory/4656-163-0x0000000002410000-0x0000000002422000-memory.dmp

    Filesize

    72KB

  • memory/4656-161-0x0000000002410000-0x0000000002422000-memory.dmp

    Filesize

    72KB

  • memory/4656-159-0x0000000002410000-0x0000000002422000-memory.dmp

    Filesize

    72KB

  • memory/4656-157-0x0000000002410000-0x0000000002422000-memory.dmp

    Filesize

    72KB

  • memory/4656-155-0x0000000002410000-0x0000000002422000-memory.dmp

    Filesize

    72KB

  • memory/4656-153-0x0000000002410000-0x0000000002422000-memory.dmp

    Filesize

    72KB

  • memory/4656-151-0x0000000002410000-0x0000000002422000-memory.dmp

    Filesize

    72KB

  • memory/4656-147-0x0000000002410000-0x0000000002422000-memory.dmp

    Filesize

    72KB

  • memory/4656-145-0x0000000002410000-0x0000000002422000-memory.dmp

    Filesize

    72KB

  • memory/4656-132-0x0000000004D30000-0x000000000522E000-memory.dmp

    Filesize

    5.0MB

  • memory/4656-131-0x0000000002260000-0x000000000227A000-memory.dmp

    Filesize

    104KB

  • memory/4656-143-0x0000000002410000-0x0000000002422000-memory.dmp

    Filesize

    72KB

  • memory/4656-139-0x0000000002410000-0x0000000002422000-memory.dmp

    Filesize

    72KB

  • memory/4656-138-0x0000000002410000-0x0000000002422000-memory.dmp

    Filesize

    72KB

  • memory/4656-137-0x0000000002890000-0x00000000028A0000-memory.dmp

    Filesize

    64KB