Analysis

  • max time kernel
    135s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 20:52

General

  • Target

    d6ae0324ba0fa39de95dd7decd3cb36d07d0778375267a86be408462e6e11502.exe

  • Size

    696KB

  • MD5

    40a03eb86172df45ecd517d3f450a90d

  • SHA1

    bde35a673d071d6dfce7657033099cc86e4829f6

  • SHA256

    d6ae0324ba0fa39de95dd7decd3cb36d07d0778375267a86be408462e6e11502

  • SHA512

    082eb417c60c858359d94762df60642909e16c162411ff787858811493b8b88900c9edc5f4eeb23148333d425b3dc0564a850b63cce0ead37d8132c834258687

  • SSDEEP

    12288:nMrJy900eokNjdbdD0KBk6lOpMLyj/5+p7frYbzmSaJwyEyKOTEX:Gynp2JtjBqpMLyN+xgmPmO+

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d6ae0324ba0fa39de95dd7decd3cb36d07d0778375267a86be408462e6e11502.exe
    "C:\Users\Admin\AppData\Local\Temp\d6ae0324ba0fa39de95dd7decd3cb36d07d0778375267a86be408462e6e11502.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3196
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un399701.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un399701.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:404
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5243.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5243.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4692
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3412.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3412.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5108
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si953091.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si953091.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1716

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si953091.exe

    Filesize

    175KB

    MD5

    f2b1dc2432afed3f04674dbe4430a203

    SHA1

    6938b372f2f5543117be8cd998def2c75f417d1f

    SHA256

    572c0ec418572c057edd894212a7c6ff014ffbc9e5f0e5ef49664fefbe0d79cf

    SHA512

    34fc4d3c96566796e19632afeadacca7354700eff7459cd5807d7428ce0d69e66daffcf4b82be8d45680bba22c1de7a410b7192f3d0aa77df6e5676b8a875b06

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si953091.exe

    Filesize

    175KB

    MD5

    f2b1dc2432afed3f04674dbe4430a203

    SHA1

    6938b372f2f5543117be8cd998def2c75f417d1f

    SHA256

    572c0ec418572c057edd894212a7c6ff014ffbc9e5f0e5ef49664fefbe0d79cf

    SHA512

    34fc4d3c96566796e19632afeadacca7354700eff7459cd5807d7428ce0d69e66daffcf4b82be8d45680bba22c1de7a410b7192f3d0aa77df6e5676b8a875b06

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un399701.exe

    Filesize

    553KB

    MD5

    c5839ba3e3cc0424e91b39320dfd6275

    SHA1

    5b1e816ceb9b62cf15cc68766a7e7f6171759363

    SHA256

    a332952bf6fa56d369399f297cc2d2e12e7beaa2a9b1bd8f4d91071416b5b18b

    SHA512

    d06c1e14d82d3f62b6781b2bea3b3e1e38937b739c1c70b9e02057920f5a3d48f32d907044eb2cfa4b085a83b800a83fe1adf12ef23e53419bab39346a500aa2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un399701.exe

    Filesize

    553KB

    MD5

    c5839ba3e3cc0424e91b39320dfd6275

    SHA1

    5b1e816ceb9b62cf15cc68766a7e7f6171759363

    SHA256

    a332952bf6fa56d369399f297cc2d2e12e7beaa2a9b1bd8f4d91071416b5b18b

    SHA512

    d06c1e14d82d3f62b6781b2bea3b3e1e38937b739c1c70b9e02057920f5a3d48f32d907044eb2cfa4b085a83b800a83fe1adf12ef23e53419bab39346a500aa2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5243.exe

    Filesize

    308KB

    MD5

    4792d46e3ba0cbca4b32249d6582bca5

    SHA1

    ec63cff1bb9c9d6a73199a965463cab592f075a5

    SHA256

    09f46a8dfa5cbd490bf9ca5dc073a19023aed915587354ce353fd0ab41d45337

    SHA512

    43d0ff847b4aa372348d3dd1840193c025d1f86c359f64762e62a3e472ad0e555c5d9fab49bb8a1e1253e8e090752a18de6d46268272325ed9a0945923a49fbd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5243.exe

    Filesize

    308KB

    MD5

    4792d46e3ba0cbca4b32249d6582bca5

    SHA1

    ec63cff1bb9c9d6a73199a965463cab592f075a5

    SHA256

    09f46a8dfa5cbd490bf9ca5dc073a19023aed915587354ce353fd0ab41d45337

    SHA512

    43d0ff847b4aa372348d3dd1840193c025d1f86c359f64762e62a3e472ad0e555c5d9fab49bb8a1e1253e8e090752a18de6d46268272325ed9a0945923a49fbd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3412.exe

    Filesize

    366KB

    MD5

    16b95140cfd0b73c81028fd38e8b3f3a

    SHA1

    6c40feecb6faa8668df49d269847d3a263e7864b

    SHA256

    6851d2b7cc90ba1cca6e9283249722766917ffe0e3a8186bb2917d6ab005cd92

    SHA512

    028303e8ad26d9fc61bd7d6667066f6bd1ae0556934de0b803442ef451ac7d1b08dee3835f1247945043272576d2700d2157a90917ae17afafc17d8312f0cec3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3412.exe

    Filesize

    366KB

    MD5

    16b95140cfd0b73c81028fd38e8b3f3a

    SHA1

    6c40feecb6faa8668df49d269847d3a263e7864b

    SHA256

    6851d2b7cc90ba1cca6e9283249722766917ffe0e3a8186bb2917d6ab005cd92

    SHA512

    028303e8ad26d9fc61bd7d6667066f6bd1ae0556934de0b803442ef451ac7d1b08dee3835f1247945043272576d2700d2157a90917ae17afafc17d8312f0cec3

  • memory/1716-1122-0x0000000000DE0000-0x0000000000E12000-memory.dmp

    Filesize

    200KB

  • memory/1716-1123-0x0000000005A00000-0x0000000005A10000-memory.dmp

    Filesize

    64KB

  • memory/1716-1124-0x0000000005A00000-0x0000000005A10000-memory.dmp

    Filesize

    64KB

  • memory/4692-160-0x0000000002530000-0x0000000002542000-memory.dmp

    Filesize

    72KB

  • memory/4692-172-0x0000000002530000-0x0000000002542000-memory.dmp

    Filesize

    72KB

  • memory/4692-152-0x00000000024E0000-0x00000000024F0000-memory.dmp

    Filesize

    64KB

  • memory/4692-153-0x0000000002530000-0x0000000002542000-memory.dmp

    Filesize

    72KB

  • memory/4692-154-0x0000000002530000-0x0000000002542000-memory.dmp

    Filesize

    72KB

  • memory/4692-156-0x0000000002530000-0x0000000002542000-memory.dmp

    Filesize

    72KB

  • memory/4692-158-0x0000000002530000-0x0000000002542000-memory.dmp

    Filesize

    72KB

  • memory/4692-150-0x00000000024E0000-0x00000000024F0000-memory.dmp

    Filesize

    64KB

  • memory/4692-162-0x0000000002530000-0x0000000002542000-memory.dmp

    Filesize

    72KB

  • memory/4692-164-0x0000000002530000-0x0000000002542000-memory.dmp

    Filesize

    72KB

  • memory/4692-166-0x0000000002530000-0x0000000002542000-memory.dmp

    Filesize

    72KB

  • memory/4692-168-0x0000000002530000-0x0000000002542000-memory.dmp

    Filesize

    72KB

  • memory/4692-170-0x0000000002530000-0x0000000002542000-memory.dmp

    Filesize

    72KB

  • memory/4692-151-0x00000000024E0000-0x00000000024F0000-memory.dmp

    Filesize

    64KB

  • memory/4692-174-0x0000000002530000-0x0000000002542000-memory.dmp

    Filesize

    72KB

  • memory/4692-176-0x0000000002530000-0x0000000002542000-memory.dmp

    Filesize

    72KB

  • memory/4692-178-0x0000000002530000-0x0000000002542000-memory.dmp

    Filesize

    72KB

  • memory/4692-180-0x0000000002530000-0x0000000002542000-memory.dmp

    Filesize

    72KB

  • memory/4692-181-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4692-182-0x00000000024E0000-0x00000000024F0000-memory.dmp

    Filesize

    64KB

  • memory/4692-183-0x00000000024E0000-0x00000000024F0000-memory.dmp

    Filesize

    64KB

  • memory/4692-184-0x00000000024E0000-0x00000000024F0000-memory.dmp

    Filesize

    64KB

  • memory/4692-186-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4692-149-0x0000000004DA0000-0x0000000005344000-memory.dmp

    Filesize

    5.6MB

  • memory/4692-148-0x00000000007E0000-0x000000000080D000-memory.dmp

    Filesize

    180KB

  • memory/5108-195-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/5108-228-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/5108-199-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/5108-202-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/5108-200-0x00000000026E0000-0x00000000026F0000-memory.dmp

    Filesize

    64KB

  • memory/5108-198-0x00000000026E0000-0x00000000026F0000-memory.dmp

    Filesize

    64KB

  • memory/5108-194-0x0000000000720000-0x000000000076B000-memory.dmp

    Filesize

    300KB

  • memory/5108-204-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/5108-206-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/5108-208-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/5108-210-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/5108-212-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/5108-214-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/5108-216-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/5108-218-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/5108-220-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/5108-222-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/5108-224-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/5108-226-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/5108-196-0x00000000026E0000-0x00000000026F0000-memory.dmp

    Filesize

    64KB

  • memory/5108-1101-0x0000000005320000-0x0000000005938000-memory.dmp

    Filesize

    6.1MB

  • memory/5108-1102-0x00000000059C0000-0x0000000005ACA000-memory.dmp

    Filesize

    1.0MB

  • memory/5108-1103-0x0000000005B00000-0x0000000005B12000-memory.dmp

    Filesize

    72KB

  • memory/5108-1104-0x0000000005B20000-0x0000000005B5C000-memory.dmp

    Filesize

    240KB

  • memory/5108-1105-0x00000000026E0000-0x00000000026F0000-memory.dmp

    Filesize

    64KB

  • memory/5108-1106-0x0000000005E10000-0x0000000005E76000-memory.dmp

    Filesize

    408KB

  • memory/5108-1107-0x00000000064C0000-0x0000000006552000-memory.dmp

    Filesize

    584KB

  • memory/5108-1108-0x00000000065B0000-0x0000000006626000-memory.dmp

    Filesize

    472KB

  • memory/5108-1109-0x0000000006640000-0x0000000006690000-memory.dmp

    Filesize

    320KB

  • memory/5108-1111-0x00000000026E0000-0x00000000026F0000-memory.dmp

    Filesize

    64KB

  • memory/5108-1112-0x00000000026E0000-0x00000000026F0000-memory.dmp

    Filesize

    64KB

  • memory/5108-1113-0x00000000026E0000-0x00000000026F0000-memory.dmp

    Filesize

    64KB

  • memory/5108-191-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/5108-192-0x0000000002880000-0x00000000028BF000-memory.dmp

    Filesize

    252KB

  • memory/5108-1114-0x00000000026E0000-0x00000000026F0000-memory.dmp

    Filesize

    64KB

  • memory/5108-1115-0x0000000007A80000-0x0000000007C42000-memory.dmp

    Filesize

    1.8MB

  • memory/5108-1116-0x0000000007C50000-0x000000000817C000-memory.dmp

    Filesize

    5.2MB