Analysis

  • max time kernel
    44s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    28-03-2023 00:46

General

  • Target

    setup.exe

  • Size

    700KB

  • MD5

    390353878989c08b4e68406572f0914f

  • SHA1

    81bb75c476a38bc191ed62b86b015d8bec10142e

  • SHA256

    3678c2431759493f25d1aa32afc11dc95173ac4ce1bb5092c365b670a2c61209

  • SHA512

    5d51c5f8830e0a497f1a77d862af183fa9b0fec4c2c5609e176f5c739152c4d6cb414f692aad7e34093d6122fdc12ac64b8d258fd147f13ace39e9126ebc0796

  • SSDEEP

    12288:KMrNy909uoPmynsWYKHjfajnDcvYRW3XpjJappxyGWt7lik8xgK:/ywPlnVYKzajnAYRIX9J2WbikTK

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un370785.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un370785.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1696
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9315.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9315.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:864
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1034.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1034.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1720
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si956069.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si956069.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1560

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si956069.exe
    Filesize

    175KB

    MD5

    ee65757289bd7d2d1000ed01503a2fec

    SHA1

    bf5e7c4f24d51b8acc1def0398c2f6ec5d5fe279

    SHA256

    e7574d230e8f64ec619b59b1ce76692ffb28d570c67f9bb2ec7a9696394838bb

    SHA512

    ee799aab795d08f8f9d89265e914e6248df6f8558936e86e6e4f8c425daf55e23395e602bbfc02ceb5eecfeff69b529bcce8bbd6035b51604bfc256a922f9d80

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si956069.exe
    Filesize

    175KB

    MD5

    ee65757289bd7d2d1000ed01503a2fec

    SHA1

    bf5e7c4f24d51b8acc1def0398c2f6ec5d5fe279

    SHA256

    e7574d230e8f64ec619b59b1ce76692ffb28d570c67f9bb2ec7a9696394838bb

    SHA512

    ee799aab795d08f8f9d89265e914e6248df6f8558936e86e6e4f8c425daf55e23395e602bbfc02ceb5eecfeff69b529bcce8bbd6035b51604bfc256a922f9d80

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un370785.exe
    Filesize

    558KB

    MD5

    efb83e5ddb6d897eeacdba07bb102103

    SHA1

    a8502b9a4b890c99e0110afd4cb75d43bad474e5

    SHA256

    ecccdb601c6b2e1fa6fd853528fe1fb8783e5c8b87b91a95c67246f8c66dc327

    SHA512

    e91e488e659abfe2fa92b8dcb8b7d8a9967386f11e8bffa5dee7c3a0888a28b2538c5d9edfd0fcc01d82d36b1782099fe291245578053b234732aad7aac9921e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un370785.exe
    Filesize

    558KB

    MD5

    efb83e5ddb6d897eeacdba07bb102103

    SHA1

    a8502b9a4b890c99e0110afd4cb75d43bad474e5

    SHA256

    ecccdb601c6b2e1fa6fd853528fe1fb8783e5c8b87b91a95c67246f8c66dc327

    SHA512

    e91e488e659abfe2fa92b8dcb8b7d8a9967386f11e8bffa5dee7c3a0888a28b2538c5d9edfd0fcc01d82d36b1782099fe291245578053b234732aad7aac9921e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9315.exe
    Filesize

    307KB

    MD5

    464a0acd4058920dcc9e052838fa0ccd

    SHA1

    ca1418fd02965b6e50dfdd4d61b734a3e92afe25

    SHA256

    659083cdcd275e8136eb03769c71c6d823cde3ffb56623ef75e7d561fbf6b2ce

    SHA512

    31fbb97d75d11626fc281b3d2278ca920883502dd49218b7db00b6d4b136adb224d0c24436471861635b37014fdb6cc54a309e3ba43a0d9f58849abb409453dc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9315.exe
    Filesize

    307KB

    MD5

    464a0acd4058920dcc9e052838fa0ccd

    SHA1

    ca1418fd02965b6e50dfdd4d61b734a3e92afe25

    SHA256

    659083cdcd275e8136eb03769c71c6d823cde3ffb56623ef75e7d561fbf6b2ce

    SHA512

    31fbb97d75d11626fc281b3d2278ca920883502dd49218b7db00b6d4b136adb224d0c24436471861635b37014fdb6cc54a309e3ba43a0d9f58849abb409453dc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9315.exe
    Filesize

    307KB

    MD5

    464a0acd4058920dcc9e052838fa0ccd

    SHA1

    ca1418fd02965b6e50dfdd4d61b734a3e92afe25

    SHA256

    659083cdcd275e8136eb03769c71c6d823cde3ffb56623ef75e7d561fbf6b2ce

    SHA512

    31fbb97d75d11626fc281b3d2278ca920883502dd49218b7db00b6d4b136adb224d0c24436471861635b37014fdb6cc54a309e3ba43a0d9f58849abb409453dc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1034.exe
    Filesize

    365KB

    MD5

    c6b751e8142ca2963e629efb2ca736ae

    SHA1

    4ca988ddfd8f28c9d154f6361f45cb41e52d9a67

    SHA256

    4f61d8a0dc06b010e5a2d2531a055d9e40eec233b48e8ae82bfda9e62c112d10

    SHA512

    7047bdf2961a4cb11c629f72519be66dcdf72d267b009365ce45bb3581ea2aa1be821400ff2213e6da97035558413fb05e95176c9cab34995356cf1cddff8770

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1034.exe
    Filesize

    365KB

    MD5

    c6b751e8142ca2963e629efb2ca736ae

    SHA1

    4ca988ddfd8f28c9d154f6361f45cb41e52d9a67

    SHA256

    4f61d8a0dc06b010e5a2d2531a055d9e40eec233b48e8ae82bfda9e62c112d10

    SHA512

    7047bdf2961a4cb11c629f72519be66dcdf72d267b009365ce45bb3581ea2aa1be821400ff2213e6da97035558413fb05e95176c9cab34995356cf1cddff8770

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1034.exe
    Filesize

    365KB

    MD5

    c6b751e8142ca2963e629efb2ca736ae

    SHA1

    4ca988ddfd8f28c9d154f6361f45cb41e52d9a67

    SHA256

    4f61d8a0dc06b010e5a2d2531a055d9e40eec233b48e8ae82bfda9e62c112d10

    SHA512

    7047bdf2961a4cb11c629f72519be66dcdf72d267b009365ce45bb3581ea2aa1be821400ff2213e6da97035558413fb05e95176c9cab34995356cf1cddff8770

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\si956069.exe
    Filesize

    175KB

    MD5

    ee65757289bd7d2d1000ed01503a2fec

    SHA1

    bf5e7c4f24d51b8acc1def0398c2f6ec5d5fe279

    SHA256

    e7574d230e8f64ec619b59b1ce76692ffb28d570c67f9bb2ec7a9696394838bb

    SHA512

    ee799aab795d08f8f9d89265e914e6248df6f8558936e86e6e4f8c425daf55e23395e602bbfc02ceb5eecfeff69b529bcce8bbd6035b51604bfc256a922f9d80

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\si956069.exe
    Filesize

    175KB

    MD5

    ee65757289bd7d2d1000ed01503a2fec

    SHA1

    bf5e7c4f24d51b8acc1def0398c2f6ec5d5fe279

    SHA256

    e7574d230e8f64ec619b59b1ce76692ffb28d570c67f9bb2ec7a9696394838bb

    SHA512

    ee799aab795d08f8f9d89265e914e6248df6f8558936e86e6e4f8c425daf55e23395e602bbfc02ceb5eecfeff69b529bcce8bbd6035b51604bfc256a922f9d80

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un370785.exe
    Filesize

    558KB

    MD5

    efb83e5ddb6d897eeacdba07bb102103

    SHA1

    a8502b9a4b890c99e0110afd4cb75d43bad474e5

    SHA256

    ecccdb601c6b2e1fa6fd853528fe1fb8783e5c8b87b91a95c67246f8c66dc327

    SHA512

    e91e488e659abfe2fa92b8dcb8b7d8a9967386f11e8bffa5dee7c3a0888a28b2538c5d9edfd0fcc01d82d36b1782099fe291245578053b234732aad7aac9921e

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un370785.exe
    Filesize

    558KB

    MD5

    efb83e5ddb6d897eeacdba07bb102103

    SHA1

    a8502b9a4b890c99e0110afd4cb75d43bad474e5

    SHA256

    ecccdb601c6b2e1fa6fd853528fe1fb8783e5c8b87b91a95c67246f8c66dc327

    SHA512

    e91e488e659abfe2fa92b8dcb8b7d8a9967386f11e8bffa5dee7c3a0888a28b2538c5d9edfd0fcc01d82d36b1782099fe291245578053b234732aad7aac9921e

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9315.exe
    Filesize

    307KB

    MD5

    464a0acd4058920dcc9e052838fa0ccd

    SHA1

    ca1418fd02965b6e50dfdd4d61b734a3e92afe25

    SHA256

    659083cdcd275e8136eb03769c71c6d823cde3ffb56623ef75e7d561fbf6b2ce

    SHA512

    31fbb97d75d11626fc281b3d2278ca920883502dd49218b7db00b6d4b136adb224d0c24436471861635b37014fdb6cc54a309e3ba43a0d9f58849abb409453dc

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9315.exe
    Filesize

    307KB

    MD5

    464a0acd4058920dcc9e052838fa0ccd

    SHA1

    ca1418fd02965b6e50dfdd4d61b734a3e92afe25

    SHA256

    659083cdcd275e8136eb03769c71c6d823cde3ffb56623ef75e7d561fbf6b2ce

    SHA512

    31fbb97d75d11626fc281b3d2278ca920883502dd49218b7db00b6d4b136adb224d0c24436471861635b37014fdb6cc54a309e3ba43a0d9f58849abb409453dc

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9315.exe
    Filesize

    307KB

    MD5

    464a0acd4058920dcc9e052838fa0ccd

    SHA1

    ca1418fd02965b6e50dfdd4d61b734a3e92afe25

    SHA256

    659083cdcd275e8136eb03769c71c6d823cde3ffb56623ef75e7d561fbf6b2ce

    SHA512

    31fbb97d75d11626fc281b3d2278ca920883502dd49218b7db00b6d4b136adb224d0c24436471861635b37014fdb6cc54a309e3ba43a0d9f58849abb409453dc

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1034.exe
    Filesize

    365KB

    MD5

    c6b751e8142ca2963e629efb2ca736ae

    SHA1

    4ca988ddfd8f28c9d154f6361f45cb41e52d9a67

    SHA256

    4f61d8a0dc06b010e5a2d2531a055d9e40eec233b48e8ae82bfda9e62c112d10

    SHA512

    7047bdf2961a4cb11c629f72519be66dcdf72d267b009365ce45bb3581ea2aa1be821400ff2213e6da97035558413fb05e95176c9cab34995356cf1cddff8770

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1034.exe
    Filesize

    365KB

    MD5

    c6b751e8142ca2963e629efb2ca736ae

    SHA1

    4ca988ddfd8f28c9d154f6361f45cb41e52d9a67

    SHA256

    4f61d8a0dc06b010e5a2d2531a055d9e40eec233b48e8ae82bfda9e62c112d10

    SHA512

    7047bdf2961a4cb11c629f72519be66dcdf72d267b009365ce45bb3581ea2aa1be821400ff2213e6da97035558413fb05e95176c9cab34995356cf1cddff8770

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1034.exe
    Filesize

    365KB

    MD5

    c6b751e8142ca2963e629efb2ca736ae

    SHA1

    4ca988ddfd8f28c9d154f6361f45cb41e52d9a67

    SHA256

    4f61d8a0dc06b010e5a2d2531a055d9e40eec233b48e8ae82bfda9e62c112d10

    SHA512

    7047bdf2961a4cb11c629f72519be66dcdf72d267b009365ce45bb3581ea2aa1be821400ff2213e6da97035558413fb05e95176c9cab34995356cf1cddff8770

  • memory/864-86-0x00000000023F0000-0x0000000002402000-memory.dmp
    Filesize

    72KB

  • memory/864-112-0x0000000000400000-0x000000000070F000-memory.dmp
    Filesize

    3.1MB

  • memory/864-96-0x00000000023F0000-0x0000000002402000-memory.dmp
    Filesize

    72KB

  • memory/864-98-0x00000000023F0000-0x0000000002402000-memory.dmp
    Filesize

    72KB

  • memory/864-100-0x00000000023F0000-0x0000000002402000-memory.dmp
    Filesize

    72KB

  • memory/864-102-0x00000000023F0000-0x0000000002402000-memory.dmp
    Filesize

    72KB

  • memory/864-104-0x00000000023F0000-0x0000000002402000-memory.dmp
    Filesize

    72KB

  • memory/864-106-0x00000000023F0000-0x0000000002402000-memory.dmp
    Filesize

    72KB

  • memory/864-108-0x00000000023F0000-0x0000000002402000-memory.dmp
    Filesize

    72KB

  • memory/864-110-0x00000000023F0000-0x0000000002402000-memory.dmp
    Filesize

    72KB

  • memory/864-111-0x0000000000400000-0x000000000070F000-memory.dmp
    Filesize

    3.1MB

  • memory/864-79-0x0000000000280000-0x00000000002AD000-memory.dmp
    Filesize

    180KB

  • memory/864-92-0x00000000023F0000-0x0000000002402000-memory.dmp
    Filesize

    72KB

  • memory/864-90-0x00000000023F0000-0x0000000002402000-memory.dmp
    Filesize

    72KB

  • memory/864-84-0x00000000023F0000-0x0000000002402000-memory.dmp
    Filesize

    72KB

  • memory/864-88-0x00000000023F0000-0x0000000002402000-memory.dmp
    Filesize

    72KB

  • memory/864-83-0x00000000023F0000-0x0000000002402000-memory.dmp
    Filesize

    72KB

  • memory/864-82-0x00000000023F0000-0x0000000002408000-memory.dmp
    Filesize

    96KB

  • memory/864-94-0x00000000023F0000-0x0000000002402000-memory.dmp
    Filesize

    72KB

  • memory/864-81-0x0000000004CC0000-0x0000000004D00000-memory.dmp
    Filesize

    256KB

  • memory/864-78-0x0000000002350000-0x000000000236A000-memory.dmp
    Filesize

    104KB

  • memory/864-80-0x0000000004CC0000-0x0000000004D00000-memory.dmp
    Filesize

    256KB

  • memory/1560-1043-0x0000000000A50000-0x0000000000A82000-memory.dmp
    Filesize

    200KB

  • memory/1560-1044-0x0000000002530000-0x0000000002570000-memory.dmp
    Filesize

    256KB

  • memory/1720-130-0x00000000024A0000-0x00000000024DF000-memory.dmp
    Filesize

    252KB

  • memory/1720-151-0x00000000024A0000-0x00000000024DF000-memory.dmp
    Filesize

    252KB

  • memory/1720-137-0x00000000028C0000-0x0000000002900000-memory.dmp
    Filesize

    256KB

  • memory/1720-136-0x00000000024A0000-0x00000000024DF000-memory.dmp
    Filesize

    252KB

  • memory/1720-139-0x00000000024A0000-0x00000000024DF000-memory.dmp
    Filesize

    252KB

  • memory/1720-132-0x00000000024A0000-0x00000000024DF000-memory.dmp
    Filesize

    252KB

  • memory/1720-141-0x00000000024A0000-0x00000000024DF000-memory.dmp
    Filesize

    252KB

  • memory/1720-143-0x00000000024A0000-0x00000000024DF000-memory.dmp
    Filesize

    252KB

  • memory/1720-145-0x00000000024A0000-0x00000000024DF000-memory.dmp
    Filesize

    252KB

  • memory/1720-147-0x00000000024A0000-0x00000000024DF000-memory.dmp
    Filesize

    252KB

  • memory/1720-149-0x00000000024A0000-0x00000000024DF000-memory.dmp
    Filesize

    252KB

  • memory/1720-135-0x00000000028C0000-0x0000000002900000-memory.dmp
    Filesize

    256KB

  • memory/1720-153-0x00000000024A0000-0x00000000024DF000-memory.dmp
    Filesize

    252KB

  • memory/1720-155-0x00000000024A0000-0x00000000024DF000-memory.dmp
    Filesize

    252KB

  • memory/1720-157-0x00000000024A0000-0x00000000024DF000-memory.dmp
    Filesize

    252KB

  • memory/1720-159-0x00000000024A0000-0x00000000024DF000-memory.dmp
    Filesize

    252KB

  • memory/1720-161-0x00000000024A0000-0x00000000024DF000-memory.dmp
    Filesize

    252KB

  • memory/1720-1034-0x00000000028C0000-0x0000000002900000-memory.dmp
    Filesize

    256KB

  • memory/1720-133-0x00000000002E0000-0x000000000032B000-memory.dmp
    Filesize

    300KB

  • memory/1720-128-0x00000000024A0000-0x00000000024DF000-memory.dmp
    Filesize

    252KB

  • memory/1720-126-0x00000000024A0000-0x00000000024DF000-memory.dmp
    Filesize

    252KB

  • memory/1720-125-0x00000000024A0000-0x00000000024DF000-memory.dmp
    Filesize

    252KB

  • memory/1720-124-0x00000000024A0000-0x00000000024E4000-memory.dmp
    Filesize

    272KB

  • memory/1720-123-0x0000000002460000-0x00000000024A6000-memory.dmp
    Filesize

    280KB