Analysis

  • max time kernel
    68s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 21:02

General

  • Target

    c922a9a3105c027e150a594d36d773554196c78ec6c049d69b418b812b97611b.exe

  • Size

    695KB

  • MD5

    c6efff595af26320b452eeec9cf1a327

  • SHA1

    846b382063eadfc221492f16542890d7f0c54300

  • SHA256

    c922a9a3105c027e150a594d36d773554196c78ec6c049d69b418b812b97611b

  • SHA512

    c8c3c5f545b8528cf8d6f6d6ecac480e63d7e48e33b9e9ea2f46c65aefdf92c57188c074098dc356d02bbc52c29bde22d981688d3c589e27b9945fb2f3beb173

  • SSDEEP

    12288:pMrgy90NQ13jVDhR3fnJSTPs6JxQvHPnqjxitrSQ9xvHfsGzbhzJ3wQHmktN8KId:RyhDXJSThJxmHPht//kCbh5HmktyKId

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c922a9a3105c027e150a594d36d773554196c78ec6c049d69b418b812b97611b.exe
    "C:\Users\Admin\AppData\Local\Temp\c922a9a3105c027e150a594d36d773554196c78ec6c049d69b418b812b97611b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2132
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un710200.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un710200.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3968
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1190.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1190.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2716
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4628.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4628.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4464
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si751355.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si751355.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:684

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si751355.exe

    Filesize

    175KB

    MD5

    720eee1697b2c672230d24df2a67c76b

    SHA1

    0f59efca126acdb2bbe591a607d6257ac052a71c

    SHA256

    1bba3e529d64b5344ca37031bfa78007bbce314bc686c255681248ad83d32aa6

    SHA512

    1fcd05943f7eb407d2a24e795a638c389d17e4110afe3c7dba93a661087fddc19226ead2526b863e2f45c6c525eb8e8d61c1395381b6afc3fb2e4f22ab63e248

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si751355.exe

    Filesize

    175KB

    MD5

    720eee1697b2c672230d24df2a67c76b

    SHA1

    0f59efca126acdb2bbe591a607d6257ac052a71c

    SHA256

    1bba3e529d64b5344ca37031bfa78007bbce314bc686c255681248ad83d32aa6

    SHA512

    1fcd05943f7eb407d2a24e795a638c389d17e4110afe3c7dba93a661087fddc19226ead2526b863e2f45c6c525eb8e8d61c1395381b6afc3fb2e4f22ab63e248

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un710200.exe

    Filesize

    553KB

    MD5

    418495f1372df94f1a214e4e3d7c5975

    SHA1

    03096b89d49f7b3539fb0ea98de9907df4c13cb3

    SHA256

    85caaca52b9663732a1382b058997fcf57abc12f1d35011043aa1b998b0b1955

    SHA512

    9e3647ceb195529cb42b72d70eab255618e4e711bbaf33b24685060677d3d6bc16cbaadcbfb04c1d70b634db9cdced9619fa569022ccfc76eb93deae45f2c7c8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un710200.exe

    Filesize

    553KB

    MD5

    418495f1372df94f1a214e4e3d7c5975

    SHA1

    03096b89d49f7b3539fb0ea98de9907df4c13cb3

    SHA256

    85caaca52b9663732a1382b058997fcf57abc12f1d35011043aa1b998b0b1955

    SHA512

    9e3647ceb195529cb42b72d70eab255618e4e711bbaf33b24685060677d3d6bc16cbaadcbfb04c1d70b634db9cdced9619fa569022ccfc76eb93deae45f2c7c8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1190.exe

    Filesize

    308KB

    MD5

    c0a360db527ba0662e9af583a89a691b

    SHA1

    9a6404b8d59f3e34a2e45ae9571fa2a5c2587175

    SHA256

    b1e3cd88a38239d468468d54417cce04fc0e10e2b782b007bcc15a870ddcca48

    SHA512

    5cf961493a92f1a5a7be6d564e51e844adb44a28fa05ea6f7278e720382b0f8ac7d68691f209fc8879236868f7ab44dbaec5c6ea06dc203ee9b65d253efd1609

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1190.exe

    Filesize

    308KB

    MD5

    c0a360db527ba0662e9af583a89a691b

    SHA1

    9a6404b8d59f3e34a2e45ae9571fa2a5c2587175

    SHA256

    b1e3cd88a38239d468468d54417cce04fc0e10e2b782b007bcc15a870ddcca48

    SHA512

    5cf961493a92f1a5a7be6d564e51e844adb44a28fa05ea6f7278e720382b0f8ac7d68691f209fc8879236868f7ab44dbaec5c6ea06dc203ee9b65d253efd1609

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4628.exe

    Filesize

    366KB

    MD5

    78994da864fe59d0f939acde3a334f81

    SHA1

    48985d294f3ef27546488958fecdbe9d6577ed34

    SHA256

    ed81455bacbe08bb0bf0fd758087f8a1367411bc11e64d2cc12db13de1144b8b

    SHA512

    d97b0cbd1ac4bd6bbfd417c3bed7ba3841c5196d09cef63449d8ffb1133b7a1d4a14a03b33c358e43824b1231cf15727d29ab8284e61151de71d1a28a8ec9bbe

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4628.exe

    Filesize

    366KB

    MD5

    78994da864fe59d0f939acde3a334f81

    SHA1

    48985d294f3ef27546488958fecdbe9d6577ed34

    SHA256

    ed81455bacbe08bb0bf0fd758087f8a1367411bc11e64d2cc12db13de1144b8b

    SHA512

    d97b0cbd1ac4bd6bbfd417c3bed7ba3841c5196d09cef63449d8ffb1133b7a1d4a14a03b33c358e43824b1231cf15727d29ab8284e61151de71d1a28a8ec9bbe

  • memory/684-1122-0x00000000000C0000-0x00000000000F2000-memory.dmp

    Filesize

    200KB

  • memory/684-1123-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

    Filesize

    64KB

  • memory/2716-156-0x00000000028C0000-0x00000000028D2000-memory.dmp

    Filesize

    72KB

  • memory/2716-170-0x00000000028C0000-0x00000000028D2000-memory.dmp

    Filesize

    72KB

  • memory/2716-151-0x00000000028F0000-0x0000000002900000-memory.dmp

    Filesize

    64KB

  • memory/2716-152-0x00000000028F0000-0x0000000002900000-memory.dmp

    Filesize

    64KB

  • memory/2716-154-0x00000000028C0000-0x00000000028D2000-memory.dmp

    Filesize

    72KB

  • memory/2716-153-0x00000000028C0000-0x00000000028D2000-memory.dmp

    Filesize

    72KB

  • memory/2716-149-0x0000000004E00000-0x00000000053A4000-memory.dmp

    Filesize

    5.6MB

  • memory/2716-158-0x00000000028C0000-0x00000000028D2000-memory.dmp

    Filesize

    72KB

  • memory/2716-160-0x00000000028C0000-0x00000000028D2000-memory.dmp

    Filesize

    72KB

  • memory/2716-162-0x00000000028C0000-0x00000000028D2000-memory.dmp

    Filesize

    72KB

  • memory/2716-168-0x00000000028C0000-0x00000000028D2000-memory.dmp

    Filesize

    72KB

  • memory/2716-166-0x00000000028C0000-0x00000000028D2000-memory.dmp

    Filesize

    72KB

  • memory/2716-164-0x00000000028C0000-0x00000000028D2000-memory.dmp

    Filesize

    72KB

  • memory/2716-150-0x00000000028F0000-0x0000000002900000-memory.dmp

    Filesize

    64KB

  • memory/2716-172-0x00000000028C0000-0x00000000028D2000-memory.dmp

    Filesize

    72KB

  • memory/2716-174-0x00000000028C0000-0x00000000028D2000-memory.dmp

    Filesize

    72KB

  • memory/2716-176-0x00000000028C0000-0x00000000028D2000-memory.dmp

    Filesize

    72KB

  • memory/2716-178-0x00000000028C0000-0x00000000028D2000-memory.dmp

    Filesize

    72KB

  • memory/2716-180-0x00000000028C0000-0x00000000028D2000-memory.dmp

    Filesize

    72KB

  • memory/2716-181-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/2716-182-0x00000000028F0000-0x0000000002900000-memory.dmp

    Filesize

    64KB

  • memory/2716-183-0x00000000028F0000-0x0000000002900000-memory.dmp

    Filesize

    64KB

  • memory/2716-184-0x00000000028F0000-0x0000000002900000-memory.dmp

    Filesize

    64KB

  • memory/2716-186-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/2716-148-0x0000000000800000-0x000000000082D000-memory.dmp

    Filesize

    180KB

  • memory/4464-194-0x0000000002790000-0x00000000027CF000-memory.dmp

    Filesize

    252KB

  • memory/4464-226-0x0000000002790000-0x00000000027CF000-memory.dmp

    Filesize

    252KB

  • memory/4464-196-0x0000000002790000-0x00000000027CF000-memory.dmp

    Filesize

    252KB

  • memory/4464-198-0x0000000002790000-0x00000000027CF000-memory.dmp

    Filesize

    252KB

  • memory/4464-200-0x0000000002790000-0x00000000027CF000-memory.dmp

    Filesize

    252KB

  • memory/4464-203-0x0000000000760000-0x00000000007AB000-memory.dmp

    Filesize

    300KB

  • memory/4464-205-0x0000000000B70000-0x0000000000B80000-memory.dmp

    Filesize

    64KB

  • memory/4464-206-0x0000000002790000-0x00000000027CF000-memory.dmp

    Filesize

    252KB

  • memory/4464-202-0x0000000002790000-0x00000000027CF000-memory.dmp

    Filesize

    252KB

  • memory/4464-207-0x0000000000B70000-0x0000000000B80000-memory.dmp

    Filesize

    64KB

  • memory/4464-210-0x0000000002790000-0x00000000027CF000-memory.dmp

    Filesize

    252KB

  • memory/4464-212-0x0000000002790000-0x00000000027CF000-memory.dmp

    Filesize

    252KB

  • memory/4464-209-0x0000000000B70000-0x0000000000B80000-memory.dmp

    Filesize

    64KB

  • memory/4464-214-0x0000000002790000-0x00000000027CF000-memory.dmp

    Filesize

    252KB

  • memory/4464-216-0x0000000002790000-0x00000000027CF000-memory.dmp

    Filesize

    252KB

  • memory/4464-218-0x0000000002790000-0x00000000027CF000-memory.dmp

    Filesize

    252KB

  • memory/4464-220-0x0000000002790000-0x00000000027CF000-memory.dmp

    Filesize

    252KB

  • memory/4464-222-0x0000000002790000-0x00000000027CF000-memory.dmp

    Filesize

    252KB

  • memory/4464-224-0x0000000002790000-0x00000000027CF000-memory.dmp

    Filesize

    252KB

  • memory/4464-192-0x0000000002790000-0x00000000027CF000-memory.dmp

    Filesize

    252KB

  • memory/4464-228-0x0000000002790000-0x00000000027CF000-memory.dmp

    Filesize

    252KB

  • memory/4464-1101-0x0000000005460000-0x0000000005A78000-memory.dmp

    Filesize

    6.1MB

  • memory/4464-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp

    Filesize

    1.0MB

  • memory/4464-1103-0x0000000005C40000-0x0000000005C52000-memory.dmp

    Filesize

    72KB

  • memory/4464-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp

    Filesize

    240KB

  • memory/4464-1105-0x0000000000B70000-0x0000000000B80000-memory.dmp

    Filesize

    64KB

  • memory/4464-1107-0x0000000000B70000-0x0000000000B80000-memory.dmp

    Filesize

    64KB

  • memory/4464-1108-0x0000000000B70000-0x0000000000B80000-memory.dmp

    Filesize

    64KB

  • memory/4464-1109-0x0000000000B70000-0x0000000000B80000-memory.dmp

    Filesize

    64KB

  • memory/4464-1110-0x0000000005F50000-0x0000000005FE2000-memory.dmp

    Filesize

    584KB

  • memory/4464-1111-0x0000000005FF0000-0x0000000006056000-memory.dmp

    Filesize

    408KB

  • memory/4464-1112-0x0000000006810000-0x0000000006886000-memory.dmp

    Filesize

    472KB

  • memory/4464-1113-0x0000000006890000-0x00000000068E0000-memory.dmp

    Filesize

    320KB

  • memory/4464-191-0x0000000002790000-0x00000000027CF000-memory.dmp

    Filesize

    252KB

  • memory/4464-1114-0x0000000000B70000-0x0000000000B80000-memory.dmp

    Filesize

    64KB

  • memory/4464-1115-0x0000000007BE0000-0x0000000007DA2000-memory.dmp

    Filesize

    1.8MB

  • memory/4464-1116-0x0000000007DB0000-0x00000000082DC000-memory.dmp

    Filesize

    5.2MB