Analysis

  • max time kernel
    87s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 20:44

General

  • Target

    28995d75c937b138147e477f6b3e1fb887faed9ea247ba0bfa26e3b88a9ed5f2.exe

  • Size

    695KB

  • MD5

    4457da36722b993d663eeaee5b4ca439

  • SHA1

    7da6cc21ef7fe48aa37571d18ba4ce050aad40b9

  • SHA256

    28995d75c937b138147e477f6b3e1fb887faed9ea247ba0bfa26e3b88a9ed5f2

  • SHA512

    78516b6e3b8da58e8b7c3f8f62bcc25058aebc6ac236bf86eb1bf1c46de2361ae9ef875b55be91d066bbf37089437cca27db5bb0d02a07749f060a225e67cb36

  • SSDEEP

    12288:sMruy90nchnwdm/nDtJVBumlLp3Zc/UtRmz8mzo2iJmz+bbtn2lsIa:iy+chIm/nxLBHl13ZOUbioZQbW

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\28995d75c937b138147e477f6b3e1fb887faed9ea247ba0bfa26e3b88a9ed5f2.exe
    "C:\Users\Admin\AppData\Local\Temp\28995d75c937b138147e477f6b3e1fb887faed9ea247ba0bfa26e3b88a9ed5f2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2140
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un297496.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un297496.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2412
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2103.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2103.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2680
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3577.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3577.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4664
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si134561.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si134561.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3748

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si134561.exe

    Filesize

    175KB

    MD5

    c2719bd009111a79dc527e61562ee538

    SHA1

    4133c46bf6a7e7f7cbb3f4239dc54c05597787d2

    SHA256

    4aa11db47e4678982d9764ef34a83fab01d77569fd5b0e768d8000a7a29cd02b

    SHA512

    c0f6e014099d678c97d9634fa2546707af1ea9730e028c2dc7055c1a51c5f25a2224a4722708cae9194ae8c432cc09150e3accfe60e52bdf54151065e06eb63f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si134561.exe

    Filesize

    175KB

    MD5

    c2719bd009111a79dc527e61562ee538

    SHA1

    4133c46bf6a7e7f7cbb3f4239dc54c05597787d2

    SHA256

    4aa11db47e4678982d9764ef34a83fab01d77569fd5b0e768d8000a7a29cd02b

    SHA512

    c0f6e014099d678c97d9634fa2546707af1ea9730e028c2dc7055c1a51c5f25a2224a4722708cae9194ae8c432cc09150e3accfe60e52bdf54151065e06eb63f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un297496.exe

    Filesize

    553KB

    MD5

    421aabd057828716a1df57c71182b7e1

    SHA1

    78483980cefa9528df650d920e2c4a009f437c12

    SHA256

    1d2e8c7ef294a3ffa9d76b5098b6736e9a1efa2451abe4451a31a9c4ebef7f9b

    SHA512

    de725d304a2bbe8b06cb79cfcc2a130cea421e78b882f2d56887c03cab545c48d827981f9d11ca80e8bedd4a6c13927eeabbd708f844d31bd53421111309de67

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un297496.exe

    Filesize

    553KB

    MD5

    421aabd057828716a1df57c71182b7e1

    SHA1

    78483980cefa9528df650d920e2c4a009f437c12

    SHA256

    1d2e8c7ef294a3ffa9d76b5098b6736e9a1efa2451abe4451a31a9c4ebef7f9b

    SHA512

    de725d304a2bbe8b06cb79cfcc2a130cea421e78b882f2d56887c03cab545c48d827981f9d11ca80e8bedd4a6c13927eeabbd708f844d31bd53421111309de67

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2103.exe

    Filesize

    308KB

    MD5

    a422a2baf6949b783f42c69c8cf3aa43

    SHA1

    00aa0c24c217076e7b9cf5ec5cde2f4ff85584fb

    SHA256

    55fda30859a52daf278ad95f30f25786539795090e7d71cd361c08b991b6835a

    SHA512

    15ad07a2a5eb736c71db53d411426bf4411483463e89ce12f0e1fbbc4dd2383c5814e6813eb6e903b82e4bde5d7fbd663029a2ebf25ab540e5e28a7fdd605c0a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2103.exe

    Filesize

    308KB

    MD5

    a422a2baf6949b783f42c69c8cf3aa43

    SHA1

    00aa0c24c217076e7b9cf5ec5cde2f4ff85584fb

    SHA256

    55fda30859a52daf278ad95f30f25786539795090e7d71cd361c08b991b6835a

    SHA512

    15ad07a2a5eb736c71db53d411426bf4411483463e89ce12f0e1fbbc4dd2383c5814e6813eb6e903b82e4bde5d7fbd663029a2ebf25ab540e5e28a7fdd605c0a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3577.exe

    Filesize

    366KB

    MD5

    27cfba8ac5e5f3e6e6b13856931c2b77

    SHA1

    97461741e58af794642dde2c2ca825620bf15668

    SHA256

    ff8356527cd8054353c4884875c3c2d9f5cf9878fdd44c920cd6ff6c5c4c0fc0

    SHA512

    e17c05e94089dd635a5dde26c9f7f94f5e02697b5297b6427d64b2109254da816998f7f31cffe0d08f973b427d55f8c042a1b04a69269e29e7788faf19d8d8db

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3577.exe

    Filesize

    366KB

    MD5

    27cfba8ac5e5f3e6e6b13856931c2b77

    SHA1

    97461741e58af794642dde2c2ca825620bf15668

    SHA256

    ff8356527cd8054353c4884875c3c2d9f5cf9878fdd44c920cd6ff6c5c4c0fc0

    SHA512

    e17c05e94089dd635a5dde26c9f7f94f5e02697b5297b6427d64b2109254da816998f7f31cffe0d08f973b427d55f8c042a1b04a69269e29e7788faf19d8d8db

  • memory/2680-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2680-137-0x0000000000BB0000-0x0000000000BCA000-memory.dmp

    Filesize

    104KB

  • memory/2680-138-0x0000000004E00000-0x00000000052FE000-memory.dmp

    Filesize

    5.0MB

  • memory/2680-139-0x0000000002590000-0x00000000025A8000-memory.dmp

    Filesize

    96KB

  • memory/2680-140-0x0000000002590000-0x00000000025A2000-memory.dmp

    Filesize

    72KB

  • memory/2680-141-0x0000000002590000-0x00000000025A2000-memory.dmp

    Filesize

    72KB

  • memory/2680-145-0x0000000002590000-0x00000000025A2000-memory.dmp

    Filesize

    72KB

  • memory/2680-143-0x0000000002590000-0x00000000025A2000-memory.dmp

    Filesize

    72KB

  • memory/2680-147-0x0000000002590000-0x00000000025A2000-memory.dmp

    Filesize

    72KB

  • memory/2680-151-0x0000000002590000-0x00000000025A2000-memory.dmp

    Filesize

    72KB

  • memory/2680-149-0x0000000002590000-0x00000000025A2000-memory.dmp

    Filesize

    72KB

  • memory/2680-153-0x0000000002590000-0x00000000025A2000-memory.dmp

    Filesize

    72KB

  • memory/2680-155-0x0000000002590000-0x00000000025A2000-memory.dmp

    Filesize

    72KB

  • memory/2680-157-0x0000000002590000-0x00000000025A2000-memory.dmp

    Filesize

    72KB

  • memory/2680-159-0x0000000002590000-0x00000000025A2000-memory.dmp

    Filesize

    72KB

  • memory/2680-161-0x0000000002590000-0x00000000025A2000-memory.dmp

    Filesize

    72KB

  • memory/2680-163-0x0000000002590000-0x00000000025A2000-memory.dmp

    Filesize

    72KB

  • memory/2680-165-0x0000000002590000-0x00000000025A2000-memory.dmp

    Filesize

    72KB

  • memory/2680-167-0x0000000002590000-0x00000000025A2000-memory.dmp

    Filesize

    72KB

  • memory/2680-168-0x0000000004DF0000-0x0000000004E00000-memory.dmp

    Filesize

    64KB

  • memory/2680-169-0x0000000004DF0000-0x0000000004E00000-memory.dmp

    Filesize

    64KB

  • memory/2680-170-0x0000000004DF0000-0x0000000004E00000-memory.dmp

    Filesize

    64KB

  • memory/2680-171-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/2680-173-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/3748-1112-0x0000000000800000-0x0000000000832000-memory.dmp

    Filesize

    200KB

  • memory/3748-1114-0x0000000005240000-0x000000000528B000-memory.dmp

    Filesize

    300KB

  • memory/3748-1113-0x0000000005400000-0x0000000005410000-memory.dmp

    Filesize

    64KB

  • memory/4664-180-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/4664-213-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4664-182-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/4664-183-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/4664-184-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4664-185-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4664-187-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4664-189-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4664-191-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4664-193-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4664-195-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4664-197-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4664-199-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4664-201-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4664-203-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4664-205-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4664-207-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4664-209-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4664-211-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4664-181-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/4664-215-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4664-217-0x0000000004CA0000-0x0000000004CDF000-memory.dmp

    Filesize

    252KB

  • memory/4664-1090-0x0000000005840000-0x0000000005E46000-memory.dmp

    Filesize

    6.0MB

  • memory/4664-1091-0x00000000052B0000-0x00000000053BA000-memory.dmp

    Filesize

    1.0MB

  • memory/4664-1092-0x00000000053F0000-0x0000000005402000-memory.dmp

    Filesize

    72KB

  • memory/4664-1093-0x0000000005410000-0x000000000544E000-memory.dmp

    Filesize

    248KB

  • memory/4664-1094-0x0000000005560000-0x00000000055AB000-memory.dmp

    Filesize

    300KB

  • memory/4664-1095-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/4664-1097-0x00000000056F0000-0x0000000005782000-memory.dmp

    Filesize

    584KB

  • memory/4664-1098-0x0000000005790000-0x00000000057F6000-memory.dmp

    Filesize

    408KB

  • memory/4664-1099-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/4664-1100-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/4664-1101-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB

  • memory/4664-1102-0x00000000066E0000-0x0000000006756000-memory.dmp

    Filesize

    472KB

  • memory/4664-1103-0x0000000006770000-0x00000000067C0000-memory.dmp

    Filesize

    320KB

  • memory/4664-179-0x0000000004CA0000-0x0000000004CE4000-memory.dmp

    Filesize

    272KB

  • memory/4664-178-0x00000000023D0000-0x0000000002416000-memory.dmp

    Filesize

    280KB

  • memory/4664-1104-0x00000000067E0000-0x00000000069A2000-memory.dmp

    Filesize

    1.8MB

  • memory/4664-1105-0x00000000069B0000-0x0000000006EDC000-memory.dmp

    Filesize

    5.2MB

  • memory/4664-1106-0x0000000004CF0000-0x0000000004D00000-memory.dmp

    Filesize

    64KB