Analysis

  • max time kernel
    135s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 20:48

General

  • Target

    c6557f1d0e58349d38f3e408c82f6b2513285cdb5c5a2c71c892bf8d10d8cb77.exe

  • Size

    696KB

  • MD5

    41fc6777968949bcb038070cc8a00b7b

  • SHA1

    c89d4fa83d5a8cf9dbfa65ceb036a4c561548da1

  • SHA256

    c6557f1d0e58349d38f3e408c82f6b2513285cdb5c5a2c71c892bf8d10d8cb77

  • SHA512

    335659f1e6e7a97e226fe887dd4e8d0bd05a6d1f4314dc1bfe5c125353791f9539291a99905e572980117a1ee3879b5b1eb4bd85cd0c630603b444de0bfaff72

  • SSDEEP

    12288:4MrLy90anlkTlhTP77HhfwVzIhhJtr32AYraIM+zSSyJ2Spl5b:zydnoP77YzAztx7LKSFgSnB

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6557f1d0e58349d38f3e408c82f6b2513285cdb5c5a2c71c892bf8d10d8cb77.exe
    "C:\Users\Admin\AppData\Local\Temp\c6557f1d0e58349d38f3e408c82f6b2513285cdb5c5a2c71c892bf8d10d8cb77.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2264
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un233609.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un233609.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1964
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6709.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6709.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4100
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0980.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0980.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1496
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si599738.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si599738.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1960

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si599738.exe

    Filesize

    175KB

    MD5

    4028d492332539d0d61191f5955073cc

    SHA1

    194ca03432ac6bff708f0966a146f29cbd73d422

    SHA256

    9ce2b00143fe49da970bc254f1e9bb0e47811aa9f11b0e7d927475dbb4467af8

    SHA512

    387e3ed11eadac16b4bfcc4e1f02a60c06cb983c9a6b705ede95e4eaa49f7d53c1b99f6b52488f63ccf02a513b74aa185b7010d6d0b840087652a60ee5a40405

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si599738.exe

    Filesize

    175KB

    MD5

    4028d492332539d0d61191f5955073cc

    SHA1

    194ca03432ac6bff708f0966a146f29cbd73d422

    SHA256

    9ce2b00143fe49da970bc254f1e9bb0e47811aa9f11b0e7d927475dbb4467af8

    SHA512

    387e3ed11eadac16b4bfcc4e1f02a60c06cb983c9a6b705ede95e4eaa49f7d53c1b99f6b52488f63ccf02a513b74aa185b7010d6d0b840087652a60ee5a40405

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un233609.exe

    Filesize

    553KB

    MD5

    1215f81cec7e2d10754fda3651ff944e

    SHA1

    59432769c6fcbaa57fed422ce7eef5bfbb155dbc

    SHA256

    e9702e48dd3f75674e986917b3605aecf984b35aee62e15b404e0e57d34d7811

    SHA512

    0232d32af583e7205ff31eebcc8c9f77a54b75cfb88b73473e2b8515ec71368a865c55b50fc7807676c48ef65fb40c7c532fdf3e146d7c4fe22a6c8ca5f1112e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un233609.exe

    Filesize

    553KB

    MD5

    1215f81cec7e2d10754fda3651ff944e

    SHA1

    59432769c6fcbaa57fed422ce7eef5bfbb155dbc

    SHA256

    e9702e48dd3f75674e986917b3605aecf984b35aee62e15b404e0e57d34d7811

    SHA512

    0232d32af583e7205ff31eebcc8c9f77a54b75cfb88b73473e2b8515ec71368a865c55b50fc7807676c48ef65fb40c7c532fdf3e146d7c4fe22a6c8ca5f1112e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6709.exe

    Filesize

    308KB

    MD5

    475807e35eaf8173678b41ebd5fd637f

    SHA1

    2e6fbe4144d5f76901e72fa8d07c5c2f28f5a7d4

    SHA256

    91c8798fd16b6e3c82e9f5fcaa31b3aaccc406ae41f1cfcfa76a9d1436d5029a

    SHA512

    bc0d4e0f5851c9980c97130d2c5927fc6f45cbc9aeb0617e505c91504d9e1645935369adb937949d895ff98d68f970cee4c8440e38dd7dfb8842186008ba4ed9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6709.exe

    Filesize

    308KB

    MD5

    475807e35eaf8173678b41ebd5fd637f

    SHA1

    2e6fbe4144d5f76901e72fa8d07c5c2f28f5a7d4

    SHA256

    91c8798fd16b6e3c82e9f5fcaa31b3aaccc406ae41f1cfcfa76a9d1436d5029a

    SHA512

    bc0d4e0f5851c9980c97130d2c5927fc6f45cbc9aeb0617e505c91504d9e1645935369adb937949d895ff98d68f970cee4c8440e38dd7dfb8842186008ba4ed9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0980.exe

    Filesize

    366KB

    MD5

    4370dd706f433a9d97a53a773abb4459

    SHA1

    a120df05649b83d03b4ef19c763e8db148883ee0

    SHA256

    b16f918539fbd8cfb9d0668d54f39d51b62d6828be68e9d5860875cef1156d8a

    SHA512

    3a1c7422db198c2394595134f694f6cfaa0e327f7d0f0ec11c9df229aabe723ae5c36c63b879b55aa8e9de73527fd4e80575c2d632fcaef9080b542be8b73c9b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0980.exe

    Filesize

    366KB

    MD5

    4370dd706f433a9d97a53a773abb4459

    SHA1

    a120df05649b83d03b4ef19c763e8db148883ee0

    SHA256

    b16f918539fbd8cfb9d0668d54f39d51b62d6828be68e9d5860875cef1156d8a

    SHA512

    3a1c7422db198c2394595134f694f6cfaa0e327f7d0f0ec11c9df229aabe723ae5c36c63b879b55aa8e9de73527fd4e80575c2d632fcaef9080b542be8b73c9b

  • memory/1496-1102-0x0000000005B70000-0x0000000005C7A000-memory.dmp

    Filesize

    1.0MB

  • memory/1496-1101-0x0000000005550000-0x0000000005B68000-memory.dmp

    Filesize

    6.1MB

  • memory/1496-217-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/1496-215-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/1496-201-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/1496-203-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/1496-1115-0x0000000004F90000-0x0000000004FA0000-memory.dmp

    Filesize

    64KB

  • memory/1496-1114-0x0000000006A40000-0x0000000006C02000-memory.dmp

    Filesize

    1.8MB

  • memory/1496-1113-0x0000000004F90000-0x0000000004FA0000-memory.dmp

    Filesize

    64KB

  • memory/1496-1112-0x0000000004F90000-0x0000000004FA0000-memory.dmp

    Filesize

    64KB

  • memory/1496-205-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/1496-1111-0x0000000004F90000-0x0000000004FA0000-memory.dmp

    Filesize

    64KB

  • memory/1496-1110-0x00000000069C0000-0x0000000006A10000-memory.dmp

    Filesize

    320KB

  • memory/1496-1109-0x0000000006930000-0x00000000069A6000-memory.dmp

    Filesize

    472KB

  • memory/1496-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp

    Filesize

    408KB

  • memory/1496-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp

    Filesize

    584KB

  • memory/1496-1105-0x0000000004F90000-0x0000000004FA0000-memory.dmp

    Filesize

    64KB

  • memory/1496-1104-0x0000000005C80000-0x0000000005CBC000-memory.dmp

    Filesize

    240KB

  • memory/1496-1103-0x0000000004F50000-0x0000000004F62000-memory.dmp

    Filesize

    72KB

  • memory/1496-219-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/1496-563-0x0000000004F90000-0x0000000004FA0000-memory.dmp

    Filesize

    64KB

  • memory/1496-227-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/1496-225-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/1496-191-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/1496-192-0x0000000004F90000-0x0000000004FA0000-memory.dmp

    Filesize

    64KB

  • memory/1496-193-0x0000000004F90000-0x0000000004FA0000-memory.dmp

    Filesize

    64KB

  • memory/1496-195-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/1496-194-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/1496-197-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/1496-199-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/1496-223-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/1496-1116-0x0000000006C10000-0x000000000713C000-memory.dmp

    Filesize

    5.2MB

  • memory/1496-221-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/1496-207-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/1496-209-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/1496-211-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/1496-213-0x0000000002680000-0x00000000026BF000-memory.dmp

    Filesize

    252KB

  • memory/1960-1122-0x0000000000620000-0x0000000000652000-memory.dmp

    Filesize

    200KB

  • memory/1960-1123-0x0000000005210000-0x0000000005220000-memory.dmp

    Filesize

    64KB

  • memory/4100-181-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4100-170-0x0000000002940000-0x0000000002952000-memory.dmp

    Filesize

    72KB

  • memory/4100-148-0x0000000004D70000-0x0000000005314000-memory.dmp

    Filesize

    5.6MB

  • memory/4100-152-0x0000000002820000-0x0000000002830000-memory.dmp

    Filesize

    64KB

  • memory/4100-154-0x0000000002820000-0x0000000002830000-memory.dmp

    Filesize

    64KB

  • memory/4100-186-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4100-184-0x0000000002820000-0x0000000002830000-memory.dmp

    Filesize

    64KB

  • memory/4100-151-0x0000000002940000-0x0000000002952000-memory.dmp

    Filesize

    72KB

  • memory/4100-183-0x0000000002820000-0x0000000002830000-memory.dmp

    Filesize

    64KB

  • memory/4100-182-0x0000000002820000-0x0000000002830000-memory.dmp

    Filesize

    64KB

  • memory/4100-153-0x0000000002940000-0x0000000002952000-memory.dmp

    Filesize

    72KB

  • memory/4100-180-0x0000000002940000-0x0000000002952000-memory.dmp

    Filesize

    72KB

  • memory/4100-178-0x0000000002940000-0x0000000002952000-memory.dmp

    Filesize

    72KB

  • memory/4100-176-0x0000000002940000-0x0000000002952000-memory.dmp

    Filesize

    72KB

  • memory/4100-174-0x0000000002940000-0x0000000002952000-memory.dmp

    Filesize

    72KB

  • memory/4100-172-0x0000000002940000-0x0000000002952000-memory.dmp

    Filesize

    72KB

  • memory/4100-168-0x0000000002940000-0x0000000002952000-memory.dmp

    Filesize

    72KB

  • memory/4100-166-0x0000000002940000-0x0000000002952000-memory.dmp

    Filesize

    72KB

  • memory/4100-164-0x0000000002940000-0x0000000002952000-memory.dmp

    Filesize

    72KB

  • memory/4100-162-0x0000000002940000-0x0000000002952000-memory.dmp

    Filesize

    72KB

  • memory/4100-160-0x0000000002940000-0x0000000002952000-memory.dmp

    Filesize

    72KB

  • memory/4100-149-0x0000000000710000-0x000000000073D000-memory.dmp

    Filesize

    180KB

  • memory/4100-158-0x0000000002940000-0x0000000002952000-memory.dmp

    Filesize

    72KB

  • memory/4100-156-0x0000000002940000-0x0000000002952000-memory.dmp

    Filesize

    72KB

  • memory/4100-150-0x0000000002820000-0x0000000002830000-memory.dmp

    Filesize

    64KB