Analysis

  • max time kernel
    41s
  • max time network
    43s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    27-03-2023 20:46

General

  • Target

    b1b9edba3110d3f6e1d37249f7c69ea5.exe

  • Size

    675KB

  • MD5

    b1b9edba3110d3f6e1d37249f7c69ea5

  • SHA1

    805be968dd146cb68492d9a6759ba6551f555008

  • SHA256

    63b4f86f6e094ed68e2da3ecf003605e743105d3fab1f1992d3896bc9bf0c3eb

  • SHA512

    f4701376b91264b777db007ffe8dcbc0ce206765f0126487e2f944450687e48524d1edf1d7eca60231379f31ee4e20bc201e67552b2f594df6f41a2742cf1331

  • SSDEEP

    12288:uMrsy90rGERgVYhFUUuG38kMcXBkFzW3WzNVNbo8kYZ0rWwaEJU46/BP:GyuiuBPRMcWFzbzTpJkvrWnb/5

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1b9edba3110d3f6e1d37249f7c69ea5.exe
    "C:\Users\Admin\AppData\Local\Temp\b1b9edba3110d3f6e1d37249f7c69ea5.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1108
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un841637.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un841637.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0378.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0378.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:984
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9649.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9649.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1544
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si336700.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si336700.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:288

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si336700.exe

    Filesize

    175KB

    MD5

    20a5a004d0bb6486fb4eae3e4684126e

    SHA1

    842ff9af58c557ad1e30039543f03d2a7e6e8e50

    SHA256

    43a7e505c2f158df7c50412f8b9382e8fcc6e457a047d18cadbb5ad0f0de788d

    SHA512

    39857ce727db56ba8799bfa444a1a6183b02d0315c732e5fc716e15fd9c5be6a5be811a60c37cd4e8d2b2653f095d7f29fbc3ecc15d1045d05109007a8428cac

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si336700.exe

    Filesize

    175KB

    MD5

    20a5a004d0bb6486fb4eae3e4684126e

    SHA1

    842ff9af58c557ad1e30039543f03d2a7e6e8e50

    SHA256

    43a7e505c2f158df7c50412f8b9382e8fcc6e457a047d18cadbb5ad0f0de788d

    SHA512

    39857ce727db56ba8799bfa444a1a6183b02d0315c732e5fc716e15fd9c5be6a5be811a60c37cd4e8d2b2653f095d7f29fbc3ecc15d1045d05109007a8428cac

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un841637.exe

    Filesize

    533KB

    MD5

    003d6947d9bda4b0a4c6646e227e93dc

    SHA1

    3f57e87737c902d4d4c06a5c9c9ea327d8a9c83e

    SHA256

    503bec83c85e294ed8eb814e50696e4b74c050c8b248e3c775ba4122030b75fe

    SHA512

    9321e3822c84b9449e6746d699e2cbbe3e82e2f5e966b706dcdf8ea799e29cba25ec7972c777de6ae4ddeab539907926ad30df317b3f6b759cf02a44dd17eca2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un841637.exe

    Filesize

    533KB

    MD5

    003d6947d9bda4b0a4c6646e227e93dc

    SHA1

    3f57e87737c902d4d4c06a5c9c9ea327d8a9c83e

    SHA256

    503bec83c85e294ed8eb814e50696e4b74c050c8b248e3c775ba4122030b75fe

    SHA512

    9321e3822c84b9449e6746d699e2cbbe3e82e2f5e966b706dcdf8ea799e29cba25ec7972c777de6ae4ddeab539907926ad30df317b3f6b759cf02a44dd17eca2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0378.exe

    Filesize

    272KB

    MD5

    ae964d4a5a332d4a89018bdcbeeb6f5b

    SHA1

    17555a475d322a056e37fa129ca53cdb0f173936

    SHA256

    df11f77c3a7bf8afaaa941812fb260187b8ebccedc23cfad095f226f38a347a8

    SHA512

    2c70d591d0b079f6e787436f7d2e8ce2cba12e643f2c6912f7c26127386543187299d3880a29a393ebeaae6ce2ed36103b56ed5e5df6cc4f01172a34583d9225

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0378.exe

    Filesize

    272KB

    MD5

    ae964d4a5a332d4a89018bdcbeeb6f5b

    SHA1

    17555a475d322a056e37fa129ca53cdb0f173936

    SHA256

    df11f77c3a7bf8afaaa941812fb260187b8ebccedc23cfad095f226f38a347a8

    SHA512

    2c70d591d0b079f6e787436f7d2e8ce2cba12e643f2c6912f7c26127386543187299d3880a29a393ebeaae6ce2ed36103b56ed5e5df6cc4f01172a34583d9225

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0378.exe

    Filesize

    272KB

    MD5

    ae964d4a5a332d4a89018bdcbeeb6f5b

    SHA1

    17555a475d322a056e37fa129ca53cdb0f173936

    SHA256

    df11f77c3a7bf8afaaa941812fb260187b8ebccedc23cfad095f226f38a347a8

    SHA512

    2c70d591d0b079f6e787436f7d2e8ce2cba12e643f2c6912f7c26127386543187299d3880a29a393ebeaae6ce2ed36103b56ed5e5df6cc4f01172a34583d9225

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9649.exe

    Filesize

    331KB

    MD5

    5a86bdae19d5d3d4d7d9d910e25040cd

    SHA1

    fe38880773db726ff80cb609a4bce3ce60422393

    SHA256

    1645427f2ff49dd34856e011880f2383589ef3eb09e18aee53eb7c0d996d2b64

    SHA512

    b6c2f5eb3a6e61ef9c5024d9f5e16452df91e2bc35509d5c5f5ac95d99163704b11a4cb79b5421a7cb0086cbf0d7865d4cb65ce784aab9abbba1e2a08a507248

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9649.exe

    Filesize

    331KB

    MD5

    5a86bdae19d5d3d4d7d9d910e25040cd

    SHA1

    fe38880773db726ff80cb609a4bce3ce60422393

    SHA256

    1645427f2ff49dd34856e011880f2383589ef3eb09e18aee53eb7c0d996d2b64

    SHA512

    b6c2f5eb3a6e61ef9c5024d9f5e16452df91e2bc35509d5c5f5ac95d99163704b11a4cb79b5421a7cb0086cbf0d7865d4cb65ce784aab9abbba1e2a08a507248

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9649.exe

    Filesize

    331KB

    MD5

    5a86bdae19d5d3d4d7d9d910e25040cd

    SHA1

    fe38880773db726ff80cb609a4bce3ce60422393

    SHA256

    1645427f2ff49dd34856e011880f2383589ef3eb09e18aee53eb7c0d996d2b64

    SHA512

    b6c2f5eb3a6e61ef9c5024d9f5e16452df91e2bc35509d5c5f5ac95d99163704b11a4cb79b5421a7cb0086cbf0d7865d4cb65ce784aab9abbba1e2a08a507248

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\si336700.exe

    Filesize

    175KB

    MD5

    20a5a004d0bb6486fb4eae3e4684126e

    SHA1

    842ff9af58c557ad1e30039543f03d2a7e6e8e50

    SHA256

    43a7e505c2f158df7c50412f8b9382e8fcc6e457a047d18cadbb5ad0f0de788d

    SHA512

    39857ce727db56ba8799bfa444a1a6183b02d0315c732e5fc716e15fd9c5be6a5be811a60c37cd4e8d2b2653f095d7f29fbc3ecc15d1045d05109007a8428cac

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\si336700.exe

    Filesize

    175KB

    MD5

    20a5a004d0bb6486fb4eae3e4684126e

    SHA1

    842ff9af58c557ad1e30039543f03d2a7e6e8e50

    SHA256

    43a7e505c2f158df7c50412f8b9382e8fcc6e457a047d18cadbb5ad0f0de788d

    SHA512

    39857ce727db56ba8799bfa444a1a6183b02d0315c732e5fc716e15fd9c5be6a5be811a60c37cd4e8d2b2653f095d7f29fbc3ecc15d1045d05109007a8428cac

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un841637.exe

    Filesize

    533KB

    MD5

    003d6947d9bda4b0a4c6646e227e93dc

    SHA1

    3f57e87737c902d4d4c06a5c9c9ea327d8a9c83e

    SHA256

    503bec83c85e294ed8eb814e50696e4b74c050c8b248e3c775ba4122030b75fe

    SHA512

    9321e3822c84b9449e6746d699e2cbbe3e82e2f5e966b706dcdf8ea799e29cba25ec7972c777de6ae4ddeab539907926ad30df317b3f6b759cf02a44dd17eca2

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un841637.exe

    Filesize

    533KB

    MD5

    003d6947d9bda4b0a4c6646e227e93dc

    SHA1

    3f57e87737c902d4d4c06a5c9c9ea327d8a9c83e

    SHA256

    503bec83c85e294ed8eb814e50696e4b74c050c8b248e3c775ba4122030b75fe

    SHA512

    9321e3822c84b9449e6746d699e2cbbe3e82e2f5e966b706dcdf8ea799e29cba25ec7972c777de6ae4ddeab539907926ad30df317b3f6b759cf02a44dd17eca2

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0378.exe

    Filesize

    272KB

    MD5

    ae964d4a5a332d4a89018bdcbeeb6f5b

    SHA1

    17555a475d322a056e37fa129ca53cdb0f173936

    SHA256

    df11f77c3a7bf8afaaa941812fb260187b8ebccedc23cfad095f226f38a347a8

    SHA512

    2c70d591d0b079f6e787436f7d2e8ce2cba12e643f2c6912f7c26127386543187299d3880a29a393ebeaae6ce2ed36103b56ed5e5df6cc4f01172a34583d9225

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0378.exe

    Filesize

    272KB

    MD5

    ae964d4a5a332d4a89018bdcbeeb6f5b

    SHA1

    17555a475d322a056e37fa129ca53cdb0f173936

    SHA256

    df11f77c3a7bf8afaaa941812fb260187b8ebccedc23cfad095f226f38a347a8

    SHA512

    2c70d591d0b079f6e787436f7d2e8ce2cba12e643f2c6912f7c26127386543187299d3880a29a393ebeaae6ce2ed36103b56ed5e5df6cc4f01172a34583d9225

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0378.exe

    Filesize

    272KB

    MD5

    ae964d4a5a332d4a89018bdcbeeb6f5b

    SHA1

    17555a475d322a056e37fa129ca53cdb0f173936

    SHA256

    df11f77c3a7bf8afaaa941812fb260187b8ebccedc23cfad095f226f38a347a8

    SHA512

    2c70d591d0b079f6e787436f7d2e8ce2cba12e643f2c6912f7c26127386543187299d3880a29a393ebeaae6ce2ed36103b56ed5e5df6cc4f01172a34583d9225

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9649.exe

    Filesize

    331KB

    MD5

    5a86bdae19d5d3d4d7d9d910e25040cd

    SHA1

    fe38880773db726ff80cb609a4bce3ce60422393

    SHA256

    1645427f2ff49dd34856e011880f2383589ef3eb09e18aee53eb7c0d996d2b64

    SHA512

    b6c2f5eb3a6e61ef9c5024d9f5e16452df91e2bc35509d5c5f5ac95d99163704b11a4cb79b5421a7cb0086cbf0d7865d4cb65ce784aab9abbba1e2a08a507248

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9649.exe

    Filesize

    331KB

    MD5

    5a86bdae19d5d3d4d7d9d910e25040cd

    SHA1

    fe38880773db726ff80cb609a4bce3ce60422393

    SHA256

    1645427f2ff49dd34856e011880f2383589ef3eb09e18aee53eb7c0d996d2b64

    SHA512

    b6c2f5eb3a6e61ef9c5024d9f5e16452df91e2bc35509d5c5f5ac95d99163704b11a4cb79b5421a7cb0086cbf0d7865d4cb65ce784aab9abbba1e2a08a507248

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9649.exe

    Filesize

    331KB

    MD5

    5a86bdae19d5d3d4d7d9d910e25040cd

    SHA1

    fe38880773db726ff80cb609a4bce3ce60422393

    SHA256

    1645427f2ff49dd34856e011880f2383589ef3eb09e18aee53eb7c0d996d2b64

    SHA512

    b6c2f5eb3a6e61ef9c5024d9f5e16452df91e2bc35509d5c5f5ac95d99163704b11a4cb79b5421a7cb0086cbf0d7865d4cb65ce784aab9abbba1e2a08a507248

  • memory/288-1043-0x0000000000B20000-0x0000000000B52000-memory.dmp

    Filesize

    200KB

  • memory/288-1044-0x0000000000BE0000-0x0000000000C20000-memory.dmp

    Filesize

    256KB

  • memory/984-84-0x0000000000A60000-0x0000000000A72000-memory.dmp

    Filesize

    72KB

  • memory/984-98-0x0000000000A60000-0x0000000000A72000-memory.dmp

    Filesize

    72KB

  • memory/984-100-0x0000000000A60000-0x0000000000A72000-memory.dmp

    Filesize

    72KB

  • memory/984-102-0x0000000000A60000-0x0000000000A72000-memory.dmp

    Filesize

    72KB

  • memory/984-104-0x0000000000A60000-0x0000000000A72000-memory.dmp

    Filesize

    72KB

  • memory/984-106-0x0000000000A60000-0x0000000000A72000-memory.dmp

    Filesize

    72KB

  • memory/984-108-0x0000000000A60000-0x0000000000A72000-memory.dmp

    Filesize

    72KB

  • memory/984-110-0x0000000000A60000-0x0000000000A72000-memory.dmp

    Filesize

    72KB

  • memory/984-111-0x0000000000400000-0x0000000000707000-memory.dmp

    Filesize

    3.0MB

  • memory/984-112-0x0000000000400000-0x0000000000707000-memory.dmp

    Filesize

    3.0MB

  • memory/984-96-0x0000000000A60000-0x0000000000A72000-memory.dmp

    Filesize

    72KB

  • memory/984-92-0x0000000000A60000-0x0000000000A72000-memory.dmp

    Filesize

    72KB

  • memory/984-94-0x0000000000A60000-0x0000000000A72000-memory.dmp

    Filesize

    72KB

  • memory/984-90-0x0000000000A60000-0x0000000000A72000-memory.dmp

    Filesize

    72KB

  • memory/984-88-0x0000000000A60000-0x0000000000A72000-memory.dmp

    Filesize

    72KB

  • memory/984-86-0x0000000000A60000-0x0000000000A72000-memory.dmp

    Filesize

    72KB

  • memory/984-78-0x0000000000810000-0x000000000082A000-memory.dmp

    Filesize

    104KB

  • memory/984-79-0x0000000000A60000-0x0000000000A78000-memory.dmp

    Filesize

    96KB

  • memory/984-81-0x0000000000A90000-0x0000000000AD0000-memory.dmp

    Filesize

    256KB

  • memory/984-80-0x0000000000240000-0x000000000026D000-memory.dmp

    Filesize

    180KB

  • memory/984-82-0x0000000000A90000-0x0000000000AD0000-memory.dmp

    Filesize

    256KB

  • memory/984-83-0x0000000000A60000-0x0000000000A72000-memory.dmp

    Filesize

    72KB

  • memory/1544-134-0x00000000024E0000-0x000000000251F000-memory.dmp

    Filesize

    252KB

  • memory/1544-152-0x00000000024E0000-0x000000000251F000-memory.dmp

    Filesize

    252KB

  • memory/1544-137-0x0000000000240000-0x000000000028B000-memory.dmp

    Filesize

    300KB

  • memory/1544-139-0x0000000004E60000-0x0000000004EA0000-memory.dmp

    Filesize

    256KB

  • memory/1544-136-0x00000000024E0000-0x000000000251F000-memory.dmp

    Filesize

    252KB

  • memory/1544-140-0x00000000024E0000-0x000000000251F000-memory.dmp

    Filesize

    252KB

  • memory/1544-142-0x00000000024E0000-0x000000000251F000-memory.dmp

    Filesize

    252KB

  • memory/1544-144-0x00000000024E0000-0x000000000251F000-memory.dmp

    Filesize

    252KB

  • memory/1544-146-0x00000000024E0000-0x000000000251F000-memory.dmp

    Filesize

    252KB

  • memory/1544-148-0x00000000024E0000-0x000000000251F000-memory.dmp

    Filesize

    252KB

  • memory/1544-150-0x00000000024E0000-0x000000000251F000-memory.dmp

    Filesize

    252KB

  • memory/1544-132-0x00000000024E0000-0x000000000251F000-memory.dmp

    Filesize

    252KB

  • memory/1544-154-0x00000000024E0000-0x000000000251F000-memory.dmp

    Filesize

    252KB

  • memory/1544-156-0x00000000024E0000-0x000000000251F000-memory.dmp

    Filesize

    252KB

  • memory/1544-158-0x00000000024E0000-0x000000000251F000-memory.dmp

    Filesize

    252KB

  • memory/1544-160-0x00000000024E0000-0x000000000251F000-memory.dmp

    Filesize

    252KB

  • memory/1544-1033-0x0000000004E60000-0x0000000004EA0000-memory.dmp

    Filesize

    256KB

  • memory/1544-130-0x00000000024E0000-0x000000000251F000-memory.dmp

    Filesize

    252KB

  • memory/1544-128-0x00000000024E0000-0x000000000251F000-memory.dmp

    Filesize

    252KB

  • memory/1544-126-0x00000000024E0000-0x000000000251F000-memory.dmp

    Filesize

    252KB

  • memory/1544-125-0x00000000024E0000-0x000000000251F000-memory.dmp

    Filesize

    252KB

  • memory/1544-124-0x00000000024E0000-0x0000000002524000-memory.dmp

    Filesize

    272KB

  • memory/1544-123-0x00000000024A0000-0x00000000024E6000-memory.dmp

    Filesize

    280KB