Analysis

  • max time kernel
    40s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    28-03-2023 00:44

General

  • Target

    setup.exe

  • Size

    699KB

  • MD5

    2e0e67b8108122f6c5b00782834344b0

  • SHA1

    435299663a47865a5bc01689fe2d825e9c9fed59

  • SHA256

    6744c366c926fa0f2986ca76c97fb92118be732df58f7f357c21755d7420590e

  • SHA512

    cfb17cfd93304b553c98fd1c9149c511623cec6f3f39ae9ca958ee2db7016b939e4739b6db0a7f446060a8b6f4bcd65daaa863050fc4289b7277169ff20d8527

  • SSDEEP

    12288:yMrEy90Mm74mI2VC6jmmUhapVDGuNbhuyPKwN6I/fj79b8n8JT:Gy+8mzVxqdhapXuyPRt/fH9b8n8N

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 22 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1520
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un241922.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un241922.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1732
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8229.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8229.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:268
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9637.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9637.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1808
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si083305.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si083305.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1584

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si083305.exe
    Filesize

    175KB

    MD5

    be0af2a7a8d178d67fd0db5b74a4b3c0

    SHA1

    931fbb418f73811022c0a5c906e15fecebf685da

    SHA256

    de1684ec0a1f661fd47c4b9c6b9dff869a45a22f8a1fd9802fc142360231aabf

    SHA512

    3039cdb9cf6ca4cfabf6a7f2f74e8bc2812fb043a6c31a5ef6dabbcbdb7409b13cb8b10dd09334d0129ec0d55671d57048ad6c72c5d38dfbe2e3ddb1329784dd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si083305.exe
    Filesize

    175KB

    MD5

    be0af2a7a8d178d67fd0db5b74a4b3c0

    SHA1

    931fbb418f73811022c0a5c906e15fecebf685da

    SHA256

    de1684ec0a1f661fd47c4b9c6b9dff869a45a22f8a1fd9802fc142360231aabf

    SHA512

    3039cdb9cf6ca4cfabf6a7f2f74e8bc2812fb043a6c31a5ef6dabbcbdb7409b13cb8b10dd09334d0129ec0d55671d57048ad6c72c5d38dfbe2e3ddb1329784dd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un241922.exe
    Filesize

    557KB

    MD5

    b898e5ece1e6b425b843554a16cbbff5

    SHA1

    7c58cee83c757ffed40bcc568618799eaa3dc4a7

    SHA256

    885ed1b15f850cca6f0dc4d1f91392f1ab684d9f6665a12acc0af94e4948bb08

    SHA512

    cd374164fa3d4eadad199b0a32d9a9446e211c9c10d7f72c401f0c99865ae0335fe4dd7529fcc767d66aa46404604de0bf8b78e8f2bf45f4163ae3e017880503

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un241922.exe
    Filesize

    557KB

    MD5

    b898e5ece1e6b425b843554a16cbbff5

    SHA1

    7c58cee83c757ffed40bcc568618799eaa3dc4a7

    SHA256

    885ed1b15f850cca6f0dc4d1f91392f1ab684d9f6665a12acc0af94e4948bb08

    SHA512

    cd374164fa3d4eadad199b0a32d9a9446e211c9c10d7f72c401f0c99865ae0335fe4dd7529fcc767d66aa46404604de0bf8b78e8f2bf45f4163ae3e017880503

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8229.exe
    Filesize

    307KB

    MD5

    f0dbbfc52f25179dfa9e04de0f485603

    SHA1

    e1aa7209f17112d35453752264742ac54222ede6

    SHA256

    11ceab1fe88d126c09efb7c18ac1cb6eab1a543043db5ba477815b80eeb9a72b

    SHA512

    ebf151d38f011a3719d613cde788b57a0711a1f3ae7be1efcb968fd152262b5c658ea4d9a0e0b4fdeb8fdaefe02b3e2c2009ad73f7ae50f9c347efcff2d38626

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8229.exe
    Filesize

    307KB

    MD5

    f0dbbfc52f25179dfa9e04de0f485603

    SHA1

    e1aa7209f17112d35453752264742ac54222ede6

    SHA256

    11ceab1fe88d126c09efb7c18ac1cb6eab1a543043db5ba477815b80eeb9a72b

    SHA512

    ebf151d38f011a3719d613cde788b57a0711a1f3ae7be1efcb968fd152262b5c658ea4d9a0e0b4fdeb8fdaefe02b3e2c2009ad73f7ae50f9c347efcff2d38626

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8229.exe
    Filesize

    307KB

    MD5

    f0dbbfc52f25179dfa9e04de0f485603

    SHA1

    e1aa7209f17112d35453752264742ac54222ede6

    SHA256

    11ceab1fe88d126c09efb7c18ac1cb6eab1a543043db5ba477815b80eeb9a72b

    SHA512

    ebf151d38f011a3719d613cde788b57a0711a1f3ae7be1efcb968fd152262b5c658ea4d9a0e0b4fdeb8fdaefe02b3e2c2009ad73f7ae50f9c347efcff2d38626

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9637.exe
    Filesize

    365KB

    MD5

    9c857b1bebfe5df4ea6bbf11d3b1ab19

    SHA1

    920952a370636bbb930f927df61ecaa7dc8638ab

    SHA256

    30b66c9c440eb76ffac17e4b8de9bd814393889ccc0d576466a9050373d7f4ba

    SHA512

    e82585eb610095043f0feb178e58afa02f0e7edaad1f5c23d54026eac10f84daede7060d014cd6ccc7bec3ec17635fe1a5d973c80cb950ebab529d7eda45fe51

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9637.exe
    Filesize

    365KB

    MD5

    9c857b1bebfe5df4ea6bbf11d3b1ab19

    SHA1

    920952a370636bbb930f927df61ecaa7dc8638ab

    SHA256

    30b66c9c440eb76ffac17e4b8de9bd814393889ccc0d576466a9050373d7f4ba

    SHA512

    e82585eb610095043f0feb178e58afa02f0e7edaad1f5c23d54026eac10f84daede7060d014cd6ccc7bec3ec17635fe1a5d973c80cb950ebab529d7eda45fe51

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9637.exe
    Filesize

    365KB

    MD5

    9c857b1bebfe5df4ea6bbf11d3b1ab19

    SHA1

    920952a370636bbb930f927df61ecaa7dc8638ab

    SHA256

    30b66c9c440eb76ffac17e4b8de9bd814393889ccc0d576466a9050373d7f4ba

    SHA512

    e82585eb610095043f0feb178e58afa02f0e7edaad1f5c23d54026eac10f84daede7060d014cd6ccc7bec3ec17635fe1a5d973c80cb950ebab529d7eda45fe51

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\si083305.exe
    Filesize

    175KB

    MD5

    be0af2a7a8d178d67fd0db5b74a4b3c0

    SHA1

    931fbb418f73811022c0a5c906e15fecebf685da

    SHA256

    de1684ec0a1f661fd47c4b9c6b9dff869a45a22f8a1fd9802fc142360231aabf

    SHA512

    3039cdb9cf6ca4cfabf6a7f2f74e8bc2812fb043a6c31a5ef6dabbcbdb7409b13cb8b10dd09334d0129ec0d55671d57048ad6c72c5d38dfbe2e3ddb1329784dd

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\si083305.exe
    Filesize

    175KB

    MD5

    be0af2a7a8d178d67fd0db5b74a4b3c0

    SHA1

    931fbb418f73811022c0a5c906e15fecebf685da

    SHA256

    de1684ec0a1f661fd47c4b9c6b9dff869a45a22f8a1fd9802fc142360231aabf

    SHA512

    3039cdb9cf6ca4cfabf6a7f2f74e8bc2812fb043a6c31a5ef6dabbcbdb7409b13cb8b10dd09334d0129ec0d55671d57048ad6c72c5d38dfbe2e3ddb1329784dd

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un241922.exe
    Filesize

    557KB

    MD5

    b898e5ece1e6b425b843554a16cbbff5

    SHA1

    7c58cee83c757ffed40bcc568618799eaa3dc4a7

    SHA256

    885ed1b15f850cca6f0dc4d1f91392f1ab684d9f6665a12acc0af94e4948bb08

    SHA512

    cd374164fa3d4eadad199b0a32d9a9446e211c9c10d7f72c401f0c99865ae0335fe4dd7529fcc767d66aa46404604de0bf8b78e8f2bf45f4163ae3e017880503

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un241922.exe
    Filesize

    557KB

    MD5

    b898e5ece1e6b425b843554a16cbbff5

    SHA1

    7c58cee83c757ffed40bcc568618799eaa3dc4a7

    SHA256

    885ed1b15f850cca6f0dc4d1f91392f1ab684d9f6665a12acc0af94e4948bb08

    SHA512

    cd374164fa3d4eadad199b0a32d9a9446e211c9c10d7f72c401f0c99865ae0335fe4dd7529fcc767d66aa46404604de0bf8b78e8f2bf45f4163ae3e017880503

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8229.exe
    Filesize

    307KB

    MD5

    f0dbbfc52f25179dfa9e04de0f485603

    SHA1

    e1aa7209f17112d35453752264742ac54222ede6

    SHA256

    11ceab1fe88d126c09efb7c18ac1cb6eab1a543043db5ba477815b80eeb9a72b

    SHA512

    ebf151d38f011a3719d613cde788b57a0711a1f3ae7be1efcb968fd152262b5c658ea4d9a0e0b4fdeb8fdaefe02b3e2c2009ad73f7ae50f9c347efcff2d38626

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8229.exe
    Filesize

    307KB

    MD5

    f0dbbfc52f25179dfa9e04de0f485603

    SHA1

    e1aa7209f17112d35453752264742ac54222ede6

    SHA256

    11ceab1fe88d126c09efb7c18ac1cb6eab1a543043db5ba477815b80eeb9a72b

    SHA512

    ebf151d38f011a3719d613cde788b57a0711a1f3ae7be1efcb968fd152262b5c658ea4d9a0e0b4fdeb8fdaefe02b3e2c2009ad73f7ae50f9c347efcff2d38626

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8229.exe
    Filesize

    307KB

    MD5

    f0dbbfc52f25179dfa9e04de0f485603

    SHA1

    e1aa7209f17112d35453752264742ac54222ede6

    SHA256

    11ceab1fe88d126c09efb7c18ac1cb6eab1a543043db5ba477815b80eeb9a72b

    SHA512

    ebf151d38f011a3719d613cde788b57a0711a1f3ae7be1efcb968fd152262b5c658ea4d9a0e0b4fdeb8fdaefe02b3e2c2009ad73f7ae50f9c347efcff2d38626

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9637.exe
    Filesize

    365KB

    MD5

    9c857b1bebfe5df4ea6bbf11d3b1ab19

    SHA1

    920952a370636bbb930f927df61ecaa7dc8638ab

    SHA256

    30b66c9c440eb76ffac17e4b8de9bd814393889ccc0d576466a9050373d7f4ba

    SHA512

    e82585eb610095043f0feb178e58afa02f0e7edaad1f5c23d54026eac10f84daede7060d014cd6ccc7bec3ec17635fe1a5d973c80cb950ebab529d7eda45fe51

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9637.exe
    Filesize

    365KB

    MD5

    9c857b1bebfe5df4ea6bbf11d3b1ab19

    SHA1

    920952a370636bbb930f927df61ecaa7dc8638ab

    SHA256

    30b66c9c440eb76ffac17e4b8de9bd814393889ccc0d576466a9050373d7f4ba

    SHA512

    e82585eb610095043f0feb178e58afa02f0e7edaad1f5c23d54026eac10f84daede7060d014cd6ccc7bec3ec17635fe1a5d973c80cb950ebab529d7eda45fe51

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9637.exe
    Filesize

    365KB

    MD5

    9c857b1bebfe5df4ea6bbf11d3b1ab19

    SHA1

    920952a370636bbb930f927df61ecaa7dc8638ab

    SHA256

    30b66c9c440eb76ffac17e4b8de9bd814393889ccc0d576466a9050373d7f4ba

    SHA512

    e82585eb610095043f0feb178e58afa02f0e7edaad1f5c23d54026eac10f84daede7060d014cd6ccc7bec3ec17635fe1a5d973c80cb950ebab529d7eda45fe51

  • memory/268-87-0x00000000023B0000-0x00000000023C2000-memory.dmp
    Filesize

    72KB

  • memory/268-112-0x0000000000400000-0x000000000070F000-memory.dmp
    Filesize

    3.1MB

  • memory/268-97-0x00000000023B0000-0x00000000023C2000-memory.dmp
    Filesize

    72KB

  • memory/268-99-0x00000000023B0000-0x00000000023C2000-memory.dmp
    Filesize

    72KB

  • memory/268-101-0x00000000023B0000-0x00000000023C2000-memory.dmp
    Filesize

    72KB

  • memory/268-103-0x00000000023B0000-0x00000000023C2000-memory.dmp
    Filesize

    72KB

  • memory/268-105-0x00000000023B0000-0x00000000023C2000-memory.dmp
    Filesize

    72KB

  • memory/268-107-0x00000000023B0000-0x00000000023C2000-memory.dmp
    Filesize

    72KB

  • memory/268-109-0x00000000023B0000-0x00000000023C2000-memory.dmp
    Filesize

    72KB

  • memory/268-110-0x0000000005010000-0x0000000005050000-memory.dmp
    Filesize

    256KB

  • memory/268-111-0x0000000000400000-0x000000000070F000-memory.dmp
    Filesize

    3.1MB

  • memory/268-81-0x00000000023B0000-0x00000000023C8000-memory.dmp
    Filesize

    96KB

  • memory/268-93-0x00000000023B0000-0x00000000023C2000-memory.dmp
    Filesize

    72KB

  • memory/268-91-0x00000000023B0000-0x00000000023C2000-memory.dmp
    Filesize

    72KB

  • memory/268-89-0x00000000023B0000-0x00000000023C2000-memory.dmp
    Filesize

    72KB

  • memory/268-85-0x00000000023B0000-0x00000000023C2000-memory.dmp
    Filesize

    72KB

  • memory/268-83-0x00000000023B0000-0x00000000023C2000-memory.dmp
    Filesize

    72KB

  • memory/268-82-0x00000000023B0000-0x00000000023C2000-memory.dmp
    Filesize

    72KB

  • memory/268-95-0x00000000023B0000-0x00000000023C2000-memory.dmp
    Filesize

    72KB

  • memory/268-80-0x0000000005010000-0x0000000005050000-memory.dmp
    Filesize

    256KB

  • memory/268-78-0x0000000000990000-0x00000000009AA000-memory.dmp
    Filesize

    104KB

  • memory/268-79-0x0000000000250000-0x000000000027D000-memory.dmp
    Filesize

    180KB

  • memory/1584-1043-0x0000000001280000-0x00000000012B2000-memory.dmp
    Filesize

    200KB

  • memory/1584-1044-0x0000000005180000-0x00000000051C0000-memory.dmp
    Filesize

    256KB

  • memory/1808-128-0x0000000002430000-0x000000000246F000-memory.dmp
    Filesize

    252KB

  • memory/1808-151-0x0000000002430000-0x000000000246F000-memory.dmp
    Filesize

    252KB

  • memory/1808-133-0x0000000002430000-0x000000000246F000-memory.dmp
    Filesize

    252KB

  • memory/1808-135-0x0000000002430000-0x000000000246F000-memory.dmp
    Filesize

    252KB

  • memory/1808-137-0x0000000002430000-0x000000000246F000-memory.dmp
    Filesize

    252KB

  • memory/1808-139-0x0000000002430000-0x000000000246F000-memory.dmp
    Filesize

    252KB

  • memory/1808-141-0x0000000002430000-0x000000000246F000-memory.dmp
    Filesize

    252KB

  • memory/1808-143-0x0000000002430000-0x000000000246F000-memory.dmp
    Filesize

    252KB

  • memory/1808-145-0x0000000002430000-0x000000000246F000-memory.dmp
    Filesize

    252KB

  • memory/1808-147-0x0000000002430000-0x000000000246F000-memory.dmp
    Filesize

    252KB

  • memory/1808-149-0x0000000002430000-0x000000000246F000-memory.dmp
    Filesize

    252KB

  • memory/1808-131-0x0000000002430000-0x000000000246F000-memory.dmp
    Filesize

    252KB

  • memory/1808-153-0x0000000002430000-0x000000000246F000-memory.dmp
    Filesize

    252KB

  • memory/1808-155-0x0000000002430000-0x000000000246F000-memory.dmp
    Filesize

    252KB

  • memory/1808-157-0x0000000002430000-0x000000000246F000-memory.dmp
    Filesize

    252KB

  • memory/1808-159-0x0000000002430000-0x000000000246F000-memory.dmp
    Filesize

    252KB

  • memory/1808-161-0x0000000002430000-0x000000000246F000-memory.dmp
    Filesize

    252KB

  • memory/1808-1034-0x00000000024F0000-0x0000000002530000-memory.dmp
    Filesize

    256KB

  • memory/1808-129-0x0000000002430000-0x000000000246F000-memory.dmp
    Filesize

    252KB

  • memory/1808-126-0x00000000024F0000-0x0000000002530000-memory.dmp
    Filesize

    256KB

  • memory/1808-127-0x00000000024F0000-0x0000000002530000-memory.dmp
    Filesize

    256KB

  • memory/1808-125-0x0000000000BD0000-0x0000000000C1B000-memory.dmp
    Filesize

    300KB

  • memory/1808-124-0x0000000002430000-0x0000000002474000-memory.dmp
    Filesize

    272KB

  • memory/1808-123-0x00000000023B0000-0x00000000023F6000-memory.dmp
    Filesize

    280KB