Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 20:50

General

  • Target

    c9a924d5044f00f7a4cac45c2de4bdaa122022ef860466058fb81f7027f037ff.exe

  • Size

    695KB

  • MD5

    825e2c3a42386159cad22b8d8de44422

  • SHA1

    746a1294dec74faf715ae92c1de4aa054e0f1e31

  • SHA256

    c9a924d5044f00f7a4cac45c2de4bdaa122022ef860466058fb81f7027f037ff

  • SHA512

    45821744532edad0716e478d0a8218654e6d9851d4a6eb9962927d0a584a433941bd7e5aec8e638a1776049acdeb13115a1698688215f75d66757205346ab6ce

  • SSDEEP

    12288:qMrzy90/AddAq0sA1HDg7BeDtUY1/2ouPlypDkkFrzhs/JK4WZICq:hyaUksAJM7Bex7/2oelypDkShckM

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c9a924d5044f00f7a4cac45c2de4bdaa122022ef860466058fb81f7027f037ff.exe
    "C:\Users\Admin\AppData\Local\Temp\c9a924d5044f00f7a4cac45c2de4bdaa122022ef860466058fb81f7027f037ff.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1480
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un477289.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un477289.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:60
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3773.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3773.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:840
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8836.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8836.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3064
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si686884.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si686884.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3652
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:3152

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si686884.exe

    Filesize

    175KB

    MD5

    9579fb866ec6da91ea187574880c6391

    SHA1

    7f470f8944b9feb4896a3fbd16949ca235ee8c1b

    SHA256

    089f562ebe74be5d0be1a83918ea8171af71a649b2afd4de3d76aef75c3b3179

    SHA512

    96b208ac3062de5de3c6b06821ce28913fea011220f9429cb735df8bd93fd3adb072754c8b79afb36b60cef702ccc113a9dc28ecf7234d0c5902d399aaf27f11

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si686884.exe

    Filesize

    175KB

    MD5

    9579fb866ec6da91ea187574880c6391

    SHA1

    7f470f8944b9feb4896a3fbd16949ca235ee8c1b

    SHA256

    089f562ebe74be5d0be1a83918ea8171af71a649b2afd4de3d76aef75c3b3179

    SHA512

    96b208ac3062de5de3c6b06821ce28913fea011220f9429cb735df8bd93fd3adb072754c8b79afb36b60cef702ccc113a9dc28ecf7234d0c5902d399aaf27f11

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un477289.exe

    Filesize

    553KB

    MD5

    06756fc37ad404bc6eda871fe988a63c

    SHA1

    18ebedeb995ca16ca548ca9ef286887b558bb291

    SHA256

    6d41291585587b9c8ef9efc8b154bc5fbaec98164670b54cfd09cae53ea8ff80

    SHA512

    1625a1d373db8ef3275ed8b40f51dabe53bdbba2d0555b7febeb04329e695118d9261b29353f888a1e2e97e3d4b66a066bcc1bcfc8b676f18c3417c9822ee19b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un477289.exe

    Filesize

    553KB

    MD5

    06756fc37ad404bc6eda871fe988a63c

    SHA1

    18ebedeb995ca16ca548ca9ef286887b558bb291

    SHA256

    6d41291585587b9c8ef9efc8b154bc5fbaec98164670b54cfd09cae53ea8ff80

    SHA512

    1625a1d373db8ef3275ed8b40f51dabe53bdbba2d0555b7febeb04329e695118d9261b29353f888a1e2e97e3d4b66a066bcc1bcfc8b676f18c3417c9822ee19b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3773.exe

    Filesize

    308KB

    MD5

    feafc067d05cd58c4e5a36938bede5c1

    SHA1

    d270106dbcd942cc66b3607af0be7ab06bd0bab1

    SHA256

    ff5531464ecc681542a5f6f4cc464b62216b9eb197d7ef743be67103780468e2

    SHA512

    e0d8173cf1824e42bf9dcdcb22013df47601facc99d37770311908036897515c90aaf0aaec119b8b72a89bc82248949f059ff0458521bdad979366876239d8ae

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3773.exe

    Filesize

    308KB

    MD5

    feafc067d05cd58c4e5a36938bede5c1

    SHA1

    d270106dbcd942cc66b3607af0be7ab06bd0bab1

    SHA256

    ff5531464ecc681542a5f6f4cc464b62216b9eb197d7ef743be67103780468e2

    SHA512

    e0d8173cf1824e42bf9dcdcb22013df47601facc99d37770311908036897515c90aaf0aaec119b8b72a89bc82248949f059ff0458521bdad979366876239d8ae

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8836.exe

    Filesize

    366KB

    MD5

    01176c72d027b4002c3370a407e6f36b

    SHA1

    8d015994ac5d0bf4f12bb06791b79f2f53915a0e

    SHA256

    11896a6f902692cc010fe30b129a2656277bf28fa84f6289bdefc1acb7a83ab5

    SHA512

    f368732b271282ddb93a0b5476e5e7d27c797cc9fed3749db9bfd60589fc36560ef09af92de441a426a829daa45fae7fa86dd2dd1bfdb4aaa4e72061a6103d6f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8836.exe

    Filesize

    366KB

    MD5

    01176c72d027b4002c3370a407e6f36b

    SHA1

    8d015994ac5d0bf4f12bb06791b79f2f53915a0e

    SHA256

    11896a6f902692cc010fe30b129a2656277bf28fa84f6289bdefc1acb7a83ab5

    SHA512

    f368732b271282ddb93a0b5476e5e7d27c797cc9fed3749db9bfd60589fc36560ef09af92de441a426a829daa45fae7fa86dd2dd1bfdb4aaa4e72061a6103d6f

  • memory/840-148-0x0000000004E30000-0x00000000053D4000-memory.dmp

    Filesize

    5.6MB

  • memory/840-149-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/840-150-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/840-152-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/840-154-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/840-156-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/840-158-0x00000000007E0000-0x000000000080D000-memory.dmp

    Filesize

    180KB

  • memory/840-159-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/840-160-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/840-162-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/840-164-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/840-163-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/840-166-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/840-168-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/840-170-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/840-172-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/840-174-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/840-176-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/840-178-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/840-180-0x0000000002720000-0x0000000002732000-memory.dmp

    Filesize

    72KB

  • memory/840-181-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/840-183-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/3064-189-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/3064-188-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/3064-191-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/3064-193-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/3064-195-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/3064-197-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/3064-199-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/3064-201-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/3064-203-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/3064-205-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/3064-207-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/3064-209-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/3064-211-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/3064-213-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/3064-215-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/3064-217-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/3064-219-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/3064-221-0x0000000004D10000-0x0000000004D4F000-memory.dmp

    Filesize

    252KB

  • memory/3064-389-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/3064-391-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/3064-393-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/3064-395-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/3064-1098-0x0000000005470000-0x0000000005A88000-memory.dmp

    Filesize

    6.1MB

  • memory/3064-1099-0x0000000005B00000-0x0000000005C0A000-memory.dmp

    Filesize

    1.0MB

  • memory/3064-1100-0x0000000005C40000-0x0000000005C52000-memory.dmp

    Filesize

    72KB

  • memory/3064-1101-0x0000000005C60000-0x0000000005C9C000-memory.dmp

    Filesize

    240KB

  • memory/3064-1102-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/3064-1103-0x0000000005F50000-0x0000000005FE2000-memory.dmp

    Filesize

    584KB

  • memory/3064-1104-0x0000000005FF0000-0x0000000006056000-memory.dmp

    Filesize

    408KB

  • memory/3064-1105-0x00000000066F0000-0x0000000006766000-memory.dmp

    Filesize

    472KB

  • memory/3064-1107-0x0000000006780000-0x00000000067D0000-memory.dmp

    Filesize

    320KB

  • memory/3064-1108-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/3064-1109-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/3064-1110-0x0000000006BB0000-0x0000000006D72000-memory.dmp

    Filesize

    1.8MB

  • memory/3064-1111-0x0000000006D80000-0x00000000072AC000-memory.dmp

    Filesize

    5.2MB

  • memory/3064-1112-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/3652-1118-0x00000000002F0000-0x0000000000322000-memory.dmp

    Filesize

    200KB

  • memory/3652-1119-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

    Filesize

    64KB

  • memory/3652-1120-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

    Filesize

    64KB