Analysis

  • max time kernel
    56s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 20:41

General

  • Target

    852d7c0b51fbdb8a65e0be328656167fa1c2156ee46bf04714b2f7ec5610b2b9.exe

  • Size

    696KB

  • MD5

    bb769f88159ee86bcb5529630637d357

  • SHA1

    44c5812f174fb136e4b1d4c419d9803a1169d5a7

  • SHA256

    852d7c0b51fbdb8a65e0be328656167fa1c2156ee46bf04714b2f7ec5610b2b9

  • SHA512

    f528f6236687e8f030c4f62deb4eb02f458641ecccae198412ca278c9a52dae237e49f0caf3aa595060e97b86af607d195751d0365bd7577e2535b5bb986e2e8

  • SSDEEP

    12288:/MrYy90jGml9TaSxjOk5lymwl2plsz3LUWd4VyDdnhk4ZzNFxJuSKQwSKPXvv:HyHmlNjSxl2p03oi5dnrpNvfzgv

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 22 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\852d7c0b51fbdb8a65e0be328656167fa1c2156ee46bf04714b2f7ec5610b2b9.exe
    "C:\Users\Admin\AppData\Local\Temp\852d7c0b51fbdb8a65e0be328656167fa1c2156ee46bf04714b2f7ec5610b2b9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un225467.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un225467.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2112
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9195.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9195.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3972
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7786.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7786.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2752
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si325959.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si325959.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4796

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si325959.exe

    Filesize

    175KB

    MD5

    bb09f3ddaf1a99c63ec1e2a48ad2245c

    SHA1

    30b7ea8b52290ce194ecab9643f6eda17f7dcd94

    SHA256

    a9c9aba4783bb7e19b088c59ed2d9b5f45213c934440d2d3b4fa314c3938e052

    SHA512

    636bef607be2087944cd8db204f4c3e8e1d0576366cb41edd66a33b81d3033fd4edc06333445c4b04c78ff80f8fd9562dacb874dfba8ffce3354cc93767a3339

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si325959.exe

    Filesize

    175KB

    MD5

    bb09f3ddaf1a99c63ec1e2a48ad2245c

    SHA1

    30b7ea8b52290ce194ecab9643f6eda17f7dcd94

    SHA256

    a9c9aba4783bb7e19b088c59ed2d9b5f45213c934440d2d3b4fa314c3938e052

    SHA512

    636bef607be2087944cd8db204f4c3e8e1d0576366cb41edd66a33b81d3033fd4edc06333445c4b04c78ff80f8fd9562dacb874dfba8ffce3354cc93767a3339

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un225467.exe

    Filesize

    554KB

    MD5

    6529bf3e5cd2fd86fe248bc622ec8d80

    SHA1

    c2be25c3f92d90d91ef8b0725976451bde6295e7

    SHA256

    d82a1aa359de3665f28f20fe47b574f947681c1c82638a47ee06e622df50e2bb

    SHA512

    113f166e79474806394e5d9a2fcdfc8da3ae91fa6d0aec55e0dbcd6c485f9d2fba960d83029b8b5e46764dd972c3db1a31c438b516c3608363c8df60d0c535d6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un225467.exe

    Filesize

    554KB

    MD5

    6529bf3e5cd2fd86fe248bc622ec8d80

    SHA1

    c2be25c3f92d90d91ef8b0725976451bde6295e7

    SHA256

    d82a1aa359de3665f28f20fe47b574f947681c1c82638a47ee06e622df50e2bb

    SHA512

    113f166e79474806394e5d9a2fcdfc8da3ae91fa6d0aec55e0dbcd6c485f9d2fba960d83029b8b5e46764dd972c3db1a31c438b516c3608363c8df60d0c535d6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9195.exe

    Filesize

    308KB

    MD5

    890ead97435cfab3f1add0f6f0a5b149

    SHA1

    903378f0310bbf881389eec91c4616d6d47a9526

    SHA256

    394481c7708fdfea2a6e4c39a16473fe88f1e1ba7b30ab7ec1875a84670cffc9

    SHA512

    d1c2d603de4d1c34c98c2beb0394b1abae830d1c68dd3e2bb1e51a95b4db53a0d107fcfc5b8125b8dd0687502685fcd77198f26dbbb1a5bbe442f5570e0b94de

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9195.exe

    Filesize

    308KB

    MD5

    890ead97435cfab3f1add0f6f0a5b149

    SHA1

    903378f0310bbf881389eec91c4616d6d47a9526

    SHA256

    394481c7708fdfea2a6e4c39a16473fe88f1e1ba7b30ab7ec1875a84670cffc9

    SHA512

    d1c2d603de4d1c34c98c2beb0394b1abae830d1c68dd3e2bb1e51a95b4db53a0d107fcfc5b8125b8dd0687502685fcd77198f26dbbb1a5bbe442f5570e0b94de

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7786.exe

    Filesize

    366KB

    MD5

    c3134c6c939591615e9cffb6a17bc5bc

    SHA1

    13434e1c1cef3856cefa04fae465f193fded4494

    SHA256

    e51906f292eb0b0fb261a8c88cc9439b8ad8bbc1b0cd20e0153983607ab5d852

    SHA512

    bc7ca2904550d658e56dfe6b916eec973d3ebf78da20edfdfbc23ae084b500123b5afafa74a57e90eac4bc7d6c3443043de0128478f4be0e4427d006c5f06450

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7786.exe

    Filesize

    366KB

    MD5

    c3134c6c939591615e9cffb6a17bc5bc

    SHA1

    13434e1c1cef3856cefa04fae465f193fded4494

    SHA256

    e51906f292eb0b0fb261a8c88cc9439b8ad8bbc1b0cd20e0153983607ab5d852

    SHA512

    bc7ca2904550d658e56dfe6b916eec973d3ebf78da20edfdfbc23ae084b500123b5afafa74a57e90eac4bc7d6c3443043de0128478f4be0e4427d006c5f06450

  • memory/2752-217-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/2752-1090-0x0000000005980000-0x0000000005F86000-memory.dmp

    Filesize

    6.0MB

  • memory/2752-1105-0x0000000006AF0000-0x000000000701C000-memory.dmp

    Filesize

    5.2MB

  • memory/2752-1104-0x0000000006920000-0x0000000006AE2000-memory.dmp

    Filesize

    1.8MB

  • memory/2752-1103-0x0000000002210000-0x0000000002220000-memory.dmp

    Filesize

    64KB

  • memory/2752-1102-0x00000000068B0000-0x0000000006900000-memory.dmp

    Filesize

    320KB

  • memory/2752-1101-0x0000000006820000-0x0000000006896000-memory.dmp

    Filesize

    472KB

  • memory/2752-193-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/2752-1100-0x0000000002210000-0x0000000002220000-memory.dmp

    Filesize

    64KB

  • memory/2752-1099-0x0000000002210000-0x0000000002220000-memory.dmp

    Filesize

    64KB

  • memory/2752-1097-0x0000000006500000-0x0000000006592000-memory.dmp

    Filesize

    584KB

  • memory/2752-1096-0x0000000005830000-0x0000000005896000-memory.dmp

    Filesize

    408KB

  • memory/2752-1095-0x0000000002210000-0x0000000002220000-memory.dmp

    Filesize

    64KB

  • memory/2752-195-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/2752-1094-0x00000000056A0000-0x00000000056EB000-memory.dmp

    Filesize

    300KB

  • memory/2752-1093-0x0000000005550000-0x000000000558E000-memory.dmp

    Filesize

    248KB

  • memory/2752-1092-0x0000000005530000-0x0000000005542000-memory.dmp

    Filesize

    72KB

  • memory/2752-197-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/2752-1091-0x00000000053F0000-0x00000000054FA000-memory.dmp

    Filesize

    1.0MB

  • memory/2752-205-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/2752-215-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/2752-213-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/2752-212-0x0000000002210000-0x0000000002220000-memory.dmp

    Filesize

    64KB

  • memory/2752-178-0x0000000002540000-0x0000000002586000-memory.dmp

    Filesize

    280KB

  • memory/2752-179-0x00000000051D0000-0x0000000005214000-memory.dmp

    Filesize

    272KB

  • memory/2752-181-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/2752-180-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/2752-183-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/2752-185-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/2752-187-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/2752-189-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/2752-191-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/2752-209-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/2752-210-0x0000000002210000-0x0000000002220000-memory.dmp

    Filesize

    64KB

  • memory/2752-207-0x0000000002210000-0x0000000002220000-memory.dmp

    Filesize

    64KB

  • memory/2752-199-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/2752-201-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/2752-203-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/2752-206-0x0000000000960000-0x00000000009AB000-memory.dmp

    Filesize

    300KB

  • memory/3972-167-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/3972-169-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/3972-161-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/3972-149-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/3972-138-0x00000000007E0000-0x000000000080D000-memory.dmp

    Filesize

    180KB

  • memory/3972-140-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/3972-173-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/3972-137-0x0000000004C40000-0x0000000004C58000-memory.dmp

    Filesize

    96KB

  • memory/3972-171-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/3972-170-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/3972-139-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/3972-165-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/3972-163-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/3972-159-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/3972-157-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/3972-155-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/3972-153-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/3972-151-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/3972-147-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/3972-143-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/3972-145-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/3972-142-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/3972-141-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/3972-136-0x0000000004D80000-0x000000000527E000-memory.dmp

    Filesize

    5.0MB

  • memory/3972-135-0x0000000002380000-0x000000000239A000-memory.dmp

    Filesize

    104KB

  • memory/4796-1112-0x0000000000300000-0x0000000000332000-memory.dmp

    Filesize

    200KB

  • memory/4796-1113-0x0000000004D40000-0x0000000004D8B000-memory.dmp

    Filesize

    300KB

  • memory/4796-1114-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB