Analysis

  • max time kernel
    135s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 20:42

General

  • Target

    f40c331d4766de362d9e06b46eb922d773705ef85e2281ec2dbd590d6f077d1b.exe

  • Size

    696KB

  • MD5

    e3bd04773207081be534b64140172082

  • SHA1

    f9d94e31fe10ee049ba4a1f40a3668ba5e5a2b3c

  • SHA256

    f40c331d4766de362d9e06b46eb922d773705ef85e2281ec2dbd590d6f077d1b

  • SHA512

    67adddecd3fd97cb8f387f79b05ac9f5ca1027f8be0125373e8ac2ebc4ff9b23239059071ed281fb2460ba97104c61b0d9d0fa7fc7d24b6c5db898479596f229

  • SSDEEP

    12288:rMrVy90UEetbiQmUvd2YtYJv3hFvTCsjTYFGEdwDzQsiJL8UkErd:my2eBmUvEYGRjTCsQFGhvQVyUvd

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f40c331d4766de362d9e06b46eb922d773705ef85e2281ec2dbd590d6f077d1b.exe
    "C:\Users\Admin\AppData\Local\Temp\f40c331d4766de362d9e06b46eb922d773705ef85e2281ec2dbd590d6f077d1b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4260
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un209170.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un209170.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2776
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4034.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4034.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3380
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6153.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6153.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2596
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si139815.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si139815.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:668

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si139815.exe

    Filesize

    175KB

    MD5

    d9f04913fdf16fad2277c2f748c2247b

    SHA1

    b498e9abf9f0ec4a00aa5f7bb0ba3cad1a85cbc6

    SHA256

    ad3002a0019d6c7d0d98a3575e1ac067ae318f8adf70581ec42e155c753ee51e

    SHA512

    6a528bee3db4903953e0b1f187e23bd43829b62339a2b08a6bb97022b8d94e2738ab96578d7a2e6bfd00fac6bebb4cc3c3016431641cd5f8709d8f43ec8241f5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si139815.exe

    Filesize

    175KB

    MD5

    d9f04913fdf16fad2277c2f748c2247b

    SHA1

    b498e9abf9f0ec4a00aa5f7bb0ba3cad1a85cbc6

    SHA256

    ad3002a0019d6c7d0d98a3575e1ac067ae318f8adf70581ec42e155c753ee51e

    SHA512

    6a528bee3db4903953e0b1f187e23bd43829b62339a2b08a6bb97022b8d94e2738ab96578d7a2e6bfd00fac6bebb4cc3c3016431641cd5f8709d8f43ec8241f5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un209170.exe

    Filesize

    553KB

    MD5

    88ac7a350ab23d74239ec316a19cb188

    SHA1

    5f400735024749e6d6ce37f2f47e6c8f4bb3c0fe

    SHA256

    f379713ecfca44a04ef501d5aace6f2602edfa21c601ffa841fd54857c709af4

    SHA512

    afb12abd9c1630d4c7ed365af1216263cb60a1a9ac1422d358e614936018b727b24ca984bd9ae92727150e992e7bb5bc68a9b14a192ef550898c529eee5e8182

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un209170.exe

    Filesize

    553KB

    MD5

    88ac7a350ab23d74239ec316a19cb188

    SHA1

    5f400735024749e6d6ce37f2f47e6c8f4bb3c0fe

    SHA256

    f379713ecfca44a04ef501d5aace6f2602edfa21c601ffa841fd54857c709af4

    SHA512

    afb12abd9c1630d4c7ed365af1216263cb60a1a9ac1422d358e614936018b727b24ca984bd9ae92727150e992e7bb5bc68a9b14a192ef550898c529eee5e8182

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4034.exe

    Filesize

    308KB

    MD5

    ac129ecbc565af20f7bbff6868982143

    SHA1

    e22071822fa8ac02a16ba0fbec4e376a8addb473

    SHA256

    c050864b0771080217eeb7b78dae95011f7472f510af77934afef33b245481ce

    SHA512

    b4b5bd79a502cb53f09d74d388fb7f2f4f03223548522a387b84be7ab9955056a29256c511aa906f9d4da3544241abe1eae9b68469bf0dd8f7b75c2f4bbfc4a3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4034.exe

    Filesize

    308KB

    MD5

    ac129ecbc565af20f7bbff6868982143

    SHA1

    e22071822fa8ac02a16ba0fbec4e376a8addb473

    SHA256

    c050864b0771080217eeb7b78dae95011f7472f510af77934afef33b245481ce

    SHA512

    b4b5bd79a502cb53f09d74d388fb7f2f4f03223548522a387b84be7ab9955056a29256c511aa906f9d4da3544241abe1eae9b68469bf0dd8f7b75c2f4bbfc4a3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6153.exe

    Filesize

    366KB

    MD5

    1e4abf317bc452658fea6c3dd57545d1

    SHA1

    eb34b6af37c78d31cb8070054b9b51f29c75aace

    SHA256

    a160b4b84b392a3858e8abb4ba43451c31470c424523a37a4ea9c1be479db363

    SHA512

    130a4273a76b9f4c39c4324b0b7dd9482314ae8955c283ac7b752bf315ddb28c7b5ff22dd5777960df7779ad2563b0044743d868ea19ebac24ac71652e814372

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6153.exe

    Filesize

    366KB

    MD5

    1e4abf317bc452658fea6c3dd57545d1

    SHA1

    eb34b6af37c78d31cb8070054b9b51f29c75aace

    SHA256

    a160b4b84b392a3858e8abb4ba43451c31470c424523a37a4ea9c1be479db363

    SHA512

    130a4273a76b9f4c39c4324b0b7dd9482314ae8955c283ac7b752bf315ddb28c7b5ff22dd5777960df7779ad2563b0044743d868ea19ebac24ac71652e814372

  • memory/668-1123-0x0000000005040000-0x0000000005050000-memory.dmp

    Filesize

    64KB

  • memory/668-1122-0x0000000000490000-0x00000000004C2000-memory.dmp

    Filesize

    200KB

  • memory/2596-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp

    Filesize

    1.0MB

  • memory/2596-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp

    Filesize

    240KB

  • memory/2596-1116-0x0000000004C40000-0x0000000004C50000-memory.dmp

    Filesize

    64KB

  • memory/2596-1115-0x0000000007220000-0x0000000007270000-memory.dmp

    Filesize

    320KB

  • memory/2596-1114-0x00000000071A0000-0x0000000007216000-memory.dmp

    Filesize

    472KB

  • memory/2596-1113-0x0000000004C40000-0x0000000004C50000-memory.dmp

    Filesize

    64KB

  • memory/2596-1112-0x0000000004C40000-0x0000000004C50000-memory.dmp

    Filesize

    64KB

  • memory/2596-1111-0x0000000004C40000-0x0000000004C50000-memory.dmp

    Filesize

    64KB

  • memory/2596-1109-0x00000000068E0000-0x0000000006E0C000-memory.dmp

    Filesize

    5.2MB

  • memory/2596-1108-0x0000000006710000-0x00000000068D2000-memory.dmp

    Filesize

    1.8MB

  • memory/2596-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp

    Filesize

    408KB

  • memory/2596-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp

    Filesize

    584KB

  • memory/2596-1105-0x0000000004C40000-0x0000000004C50000-memory.dmp

    Filesize

    64KB

  • memory/2596-1103-0x0000000005C40000-0x0000000005C52000-memory.dmp

    Filesize

    72KB

  • memory/2596-1101-0x0000000005480000-0x0000000005A98000-memory.dmp

    Filesize

    6.1MB

  • memory/2596-228-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/2596-226-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/2596-224-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/2596-222-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/2596-220-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/2596-218-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/2596-191-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/2596-192-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/2596-194-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/2596-196-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/2596-198-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/2596-200-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/2596-202-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/2596-204-0x0000000004C40000-0x0000000004C50000-memory.dmp

    Filesize

    64KB

  • memory/2596-203-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/2596-207-0x0000000004C40000-0x0000000004C50000-memory.dmp

    Filesize

    64KB

  • memory/2596-206-0x0000000004C40000-0x0000000004C50000-memory.dmp

    Filesize

    64KB

  • memory/2596-208-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/2596-210-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/2596-212-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/2596-214-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/2596-216-0x0000000005300000-0x000000000533F000-memory.dmp

    Filesize

    252KB

  • memory/3380-174-0x0000000002460000-0x0000000002472000-memory.dmp

    Filesize

    72KB

  • memory/3380-183-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

    Filesize

    64KB

  • memory/3380-153-0x0000000002460000-0x0000000002472000-memory.dmp

    Filesize

    72KB

  • memory/3380-184-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

    Filesize

    64KB

  • memory/3380-172-0x0000000002460000-0x0000000002472000-memory.dmp

    Filesize

    72KB

  • memory/3380-182-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

    Filesize

    64KB

  • memory/3380-181-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/3380-170-0x0000000002460000-0x0000000002472000-memory.dmp

    Filesize

    72KB

  • memory/3380-180-0x0000000002460000-0x0000000002472000-memory.dmp

    Filesize

    72KB

  • memory/3380-156-0x0000000002460000-0x0000000002472000-memory.dmp

    Filesize

    72KB

  • memory/3380-178-0x0000000002460000-0x0000000002472000-memory.dmp

    Filesize

    72KB

  • memory/3380-176-0x0000000002460000-0x0000000002472000-memory.dmp

    Filesize

    72KB

  • memory/3380-186-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/3380-154-0x0000000002460000-0x0000000002472000-memory.dmp

    Filesize

    72KB

  • memory/3380-151-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

    Filesize

    64KB

  • memory/3380-168-0x0000000002460000-0x0000000002472000-memory.dmp

    Filesize

    72KB

  • memory/3380-166-0x0000000002460000-0x0000000002472000-memory.dmp

    Filesize

    72KB

  • memory/3380-164-0x0000000002460000-0x0000000002472000-memory.dmp

    Filesize

    72KB

  • memory/3380-162-0x0000000002460000-0x0000000002472000-memory.dmp

    Filesize

    72KB

  • memory/3380-160-0x0000000002460000-0x0000000002472000-memory.dmp

    Filesize

    72KB

  • memory/3380-158-0x0000000002460000-0x0000000002472000-memory.dmp

    Filesize

    72KB

  • memory/3380-152-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

    Filesize

    64KB

  • memory/3380-150-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

    Filesize

    64KB

  • memory/3380-149-0x00000000007E0000-0x000000000080D000-memory.dmp

    Filesize

    180KB

  • memory/3380-148-0x0000000004EB0000-0x0000000005454000-memory.dmp

    Filesize

    5.6MB