Analysis

  • max time kernel
    44s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    28-03-2023 00:48

General

  • Target

    setup.exe

  • Size

    700KB

  • MD5

    e18b0ecb25568db2735985ae4c47721f

  • SHA1

    4a2fe08c76c297549f410509e70032c53ed12fe4

  • SHA256

    5b00653edb699fbb7026653ee054c9654fa9046e266bdd645ea00c6b8200677d

  • SHA512

    5bc7eae30df3a67e8b24ac66f7516713920de9290d709293caadc0fbe570b26270e2890ad8ae829cbc5e360f6a9a16976e54023a8599d67cddda03a4a0b231aa

  • SSDEEP

    12288:+Mrdy90kSd9kvxDTNqY0Wx9D5ucAO78F30IE4qwm2Wr0vYS:7y6d9kvxDvAO78Vg4qwmBrs

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un545606.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un545606.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1732
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3618.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3618.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:916
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6477.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6477.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1640
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si797101.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si797101.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2016

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si797101.exe
    Filesize

    175KB

    MD5

    d36127ea4e8847374c229a54906369a6

    SHA1

    66bcdce55dec2e2466d06d34398094f6eba60d32

    SHA256

    b39d7a0b636e6809664f69a203a3961feacd7005c1c468512c0daa318070630c

    SHA512

    b4dc77a2b557d2f933062d757d386e31a2ba85d257b3442514fd6d141c972b7ed796fcacaaaea1a9cdd005f7a697c5627f5049e319a8ee9e0ef36f6511762ab6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si797101.exe
    Filesize

    175KB

    MD5

    d36127ea4e8847374c229a54906369a6

    SHA1

    66bcdce55dec2e2466d06d34398094f6eba60d32

    SHA256

    b39d7a0b636e6809664f69a203a3961feacd7005c1c468512c0daa318070630c

    SHA512

    b4dc77a2b557d2f933062d757d386e31a2ba85d257b3442514fd6d141c972b7ed796fcacaaaea1a9cdd005f7a697c5627f5049e319a8ee9e0ef36f6511762ab6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un545606.exe
    Filesize

    558KB

    MD5

    137f1e20525d143d9e5004e733755f39

    SHA1

    9149e537078247a3d56536addcaac5ba3d2849ac

    SHA256

    67064aeea9abc680e2bc86362b7ca905ac4ec689b7c4de101a6cd47d34c22435

    SHA512

    7e75bed3619e3b1c459c331fed25a2e75aaf0539a807e0af5bda373de91721ae2403baa828f719ef5f22f0a64c2af6eaa5a1e6117dbf1f9399e0b9bfc06038d9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un545606.exe
    Filesize

    558KB

    MD5

    137f1e20525d143d9e5004e733755f39

    SHA1

    9149e537078247a3d56536addcaac5ba3d2849ac

    SHA256

    67064aeea9abc680e2bc86362b7ca905ac4ec689b7c4de101a6cd47d34c22435

    SHA512

    7e75bed3619e3b1c459c331fed25a2e75aaf0539a807e0af5bda373de91721ae2403baa828f719ef5f22f0a64c2af6eaa5a1e6117dbf1f9399e0b9bfc06038d9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3618.exe
    Filesize

    307KB

    MD5

    85bf386b31300bb9a141127aca863575

    SHA1

    f4ed8d8c99b11ec6f846555340fc0cc3156601ec

    SHA256

    ff3862c5b34b04e2efe2208109636e9b2db6a030c11e8c9bdc60ed6ff2663e30

    SHA512

    d4ddbdbf28f847ff31d3ce0711c46da11c5dece020dbafa2dbc99128c49fcb9fddcd7462a2f49d2df6662edf93884ee9c64c40595a1edbc696227d1daa3be189

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3618.exe
    Filesize

    307KB

    MD5

    85bf386b31300bb9a141127aca863575

    SHA1

    f4ed8d8c99b11ec6f846555340fc0cc3156601ec

    SHA256

    ff3862c5b34b04e2efe2208109636e9b2db6a030c11e8c9bdc60ed6ff2663e30

    SHA512

    d4ddbdbf28f847ff31d3ce0711c46da11c5dece020dbafa2dbc99128c49fcb9fddcd7462a2f49d2df6662edf93884ee9c64c40595a1edbc696227d1daa3be189

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3618.exe
    Filesize

    307KB

    MD5

    85bf386b31300bb9a141127aca863575

    SHA1

    f4ed8d8c99b11ec6f846555340fc0cc3156601ec

    SHA256

    ff3862c5b34b04e2efe2208109636e9b2db6a030c11e8c9bdc60ed6ff2663e30

    SHA512

    d4ddbdbf28f847ff31d3ce0711c46da11c5dece020dbafa2dbc99128c49fcb9fddcd7462a2f49d2df6662edf93884ee9c64c40595a1edbc696227d1daa3be189

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6477.exe
    Filesize

    365KB

    MD5

    588eb11a9b46a2ede781e24a8cc443aa

    SHA1

    6d3d9a64f1e1bf103d68017e4a5c57ed28c2a263

    SHA256

    33a235b824f85869f7d6f384e1e5ebc0d8355243fbe3ef7136da252be4ccdd10

    SHA512

    95f79d1c18ab68c63b47447e0611eecb9567eca4400f2438c29ecc0f2fb2bee022e85713a01e6b4ba2b865a457f736af6b4543678436d8b7b2ecc86a176f9c0c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6477.exe
    Filesize

    365KB

    MD5

    588eb11a9b46a2ede781e24a8cc443aa

    SHA1

    6d3d9a64f1e1bf103d68017e4a5c57ed28c2a263

    SHA256

    33a235b824f85869f7d6f384e1e5ebc0d8355243fbe3ef7136da252be4ccdd10

    SHA512

    95f79d1c18ab68c63b47447e0611eecb9567eca4400f2438c29ecc0f2fb2bee022e85713a01e6b4ba2b865a457f736af6b4543678436d8b7b2ecc86a176f9c0c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6477.exe
    Filesize

    365KB

    MD5

    588eb11a9b46a2ede781e24a8cc443aa

    SHA1

    6d3d9a64f1e1bf103d68017e4a5c57ed28c2a263

    SHA256

    33a235b824f85869f7d6f384e1e5ebc0d8355243fbe3ef7136da252be4ccdd10

    SHA512

    95f79d1c18ab68c63b47447e0611eecb9567eca4400f2438c29ecc0f2fb2bee022e85713a01e6b4ba2b865a457f736af6b4543678436d8b7b2ecc86a176f9c0c

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\si797101.exe
    Filesize

    175KB

    MD5

    d36127ea4e8847374c229a54906369a6

    SHA1

    66bcdce55dec2e2466d06d34398094f6eba60d32

    SHA256

    b39d7a0b636e6809664f69a203a3961feacd7005c1c468512c0daa318070630c

    SHA512

    b4dc77a2b557d2f933062d757d386e31a2ba85d257b3442514fd6d141c972b7ed796fcacaaaea1a9cdd005f7a697c5627f5049e319a8ee9e0ef36f6511762ab6

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\si797101.exe
    Filesize

    175KB

    MD5

    d36127ea4e8847374c229a54906369a6

    SHA1

    66bcdce55dec2e2466d06d34398094f6eba60d32

    SHA256

    b39d7a0b636e6809664f69a203a3961feacd7005c1c468512c0daa318070630c

    SHA512

    b4dc77a2b557d2f933062d757d386e31a2ba85d257b3442514fd6d141c972b7ed796fcacaaaea1a9cdd005f7a697c5627f5049e319a8ee9e0ef36f6511762ab6

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un545606.exe
    Filesize

    558KB

    MD5

    137f1e20525d143d9e5004e733755f39

    SHA1

    9149e537078247a3d56536addcaac5ba3d2849ac

    SHA256

    67064aeea9abc680e2bc86362b7ca905ac4ec689b7c4de101a6cd47d34c22435

    SHA512

    7e75bed3619e3b1c459c331fed25a2e75aaf0539a807e0af5bda373de91721ae2403baa828f719ef5f22f0a64c2af6eaa5a1e6117dbf1f9399e0b9bfc06038d9

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un545606.exe
    Filesize

    558KB

    MD5

    137f1e20525d143d9e5004e733755f39

    SHA1

    9149e537078247a3d56536addcaac5ba3d2849ac

    SHA256

    67064aeea9abc680e2bc86362b7ca905ac4ec689b7c4de101a6cd47d34c22435

    SHA512

    7e75bed3619e3b1c459c331fed25a2e75aaf0539a807e0af5bda373de91721ae2403baa828f719ef5f22f0a64c2af6eaa5a1e6117dbf1f9399e0b9bfc06038d9

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3618.exe
    Filesize

    307KB

    MD5

    85bf386b31300bb9a141127aca863575

    SHA1

    f4ed8d8c99b11ec6f846555340fc0cc3156601ec

    SHA256

    ff3862c5b34b04e2efe2208109636e9b2db6a030c11e8c9bdc60ed6ff2663e30

    SHA512

    d4ddbdbf28f847ff31d3ce0711c46da11c5dece020dbafa2dbc99128c49fcb9fddcd7462a2f49d2df6662edf93884ee9c64c40595a1edbc696227d1daa3be189

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3618.exe
    Filesize

    307KB

    MD5

    85bf386b31300bb9a141127aca863575

    SHA1

    f4ed8d8c99b11ec6f846555340fc0cc3156601ec

    SHA256

    ff3862c5b34b04e2efe2208109636e9b2db6a030c11e8c9bdc60ed6ff2663e30

    SHA512

    d4ddbdbf28f847ff31d3ce0711c46da11c5dece020dbafa2dbc99128c49fcb9fddcd7462a2f49d2df6662edf93884ee9c64c40595a1edbc696227d1daa3be189

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3618.exe
    Filesize

    307KB

    MD5

    85bf386b31300bb9a141127aca863575

    SHA1

    f4ed8d8c99b11ec6f846555340fc0cc3156601ec

    SHA256

    ff3862c5b34b04e2efe2208109636e9b2db6a030c11e8c9bdc60ed6ff2663e30

    SHA512

    d4ddbdbf28f847ff31d3ce0711c46da11c5dece020dbafa2dbc99128c49fcb9fddcd7462a2f49d2df6662edf93884ee9c64c40595a1edbc696227d1daa3be189

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6477.exe
    Filesize

    365KB

    MD5

    588eb11a9b46a2ede781e24a8cc443aa

    SHA1

    6d3d9a64f1e1bf103d68017e4a5c57ed28c2a263

    SHA256

    33a235b824f85869f7d6f384e1e5ebc0d8355243fbe3ef7136da252be4ccdd10

    SHA512

    95f79d1c18ab68c63b47447e0611eecb9567eca4400f2438c29ecc0f2fb2bee022e85713a01e6b4ba2b865a457f736af6b4543678436d8b7b2ecc86a176f9c0c

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6477.exe
    Filesize

    365KB

    MD5

    588eb11a9b46a2ede781e24a8cc443aa

    SHA1

    6d3d9a64f1e1bf103d68017e4a5c57ed28c2a263

    SHA256

    33a235b824f85869f7d6f384e1e5ebc0d8355243fbe3ef7136da252be4ccdd10

    SHA512

    95f79d1c18ab68c63b47447e0611eecb9567eca4400f2438c29ecc0f2fb2bee022e85713a01e6b4ba2b865a457f736af6b4543678436d8b7b2ecc86a176f9c0c

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6477.exe
    Filesize

    365KB

    MD5

    588eb11a9b46a2ede781e24a8cc443aa

    SHA1

    6d3d9a64f1e1bf103d68017e4a5c57ed28c2a263

    SHA256

    33a235b824f85869f7d6f384e1e5ebc0d8355243fbe3ef7136da252be4ccdd10

    SHA512

    95f79d1c18ab68c63b47447e0611eecb9567eca4400f2438c29ecc0f2fb2bee022e85713a01e6b4ba2b865a457f736af6b4543678436d8b7b2ecc86a176f9c0c

  • memory/916-86-0x0000000002110000-0x0000000002122000-memory.dmp
    Filesize

    72KB

  • memory/916-94-0x0000000002110000-0x0000000002122000-memory.dmp
    Filesize

    72KB

  • memory/916-96-0x0000000002110000-0x0000000002122000-memory.dmp
    Filesize

    72KB

  • memory/916-98-0x0000000002110000-0x0000000002122000-memory.dmp
    Filesize

    72KB

  • memory/916-100-0x0000000002110000-0x0000000002122000-memory.dmp
    Filesize

    72KB

  • memory/916-102-0x0000000002110000-0x0000000002122000-memory.dmp
    Filesize

    72KB

  • memory/916-104-0x0000000002110000-0x0000000002122000-memory.dmp
    Filesize

    72KB

  • memory/916-106-0x0000000002110000-0x0000000002122000-memory.dmp
    Filesize

    72KB

  • memory/916-108-0x0000000002110000-0x0000000002122000-memory.dmp
    Filesize

    72KB

  • memory/916-110-0x0000000002110000-0x0000000002122000-memory.dmp
    Filesize

    72KB

  • memory/916-111-0x0000000000400000-0x000000000070F000-memory.dmp
    Filesize

    3.1MB

  • memory/916-112-0x0000000000400000-0x000000000070F000-memory.dmp
    Filesize

    3.1MB

  • memory/916-92-0x0000000002110000-0x0000000002122000-memory.dmp
    Filesize

    72KB

  • memory/916-90-0x0000000002110000-0x0000000002122000-memory.dmp
    Filesize

    72KB

  • memory/916-88-0x0000000002110000-0x0000000002122000-memory.dmp
    Filesize

    72KB

  • memory/916-84-0x0000000002110000-0x0000000002122000-memory.dmp
    Filesize

    72KB

  • memory/916-83-0x0000000002110000-0x0000000002122000-memory.dmp
    Filesize

    72KB

  • memory/916-80-0x00000000002E0000-0x000000000030D000-memory.dmp
    Filesize

    180KB

  • memory/916-78-0x00000000003E0000-0x00000000003FA000-memory.dmp
    Filesize

    104KB

  • memory/916-79-0x0000000002110000-0x0000000002128000-memory.dmp
    Filesize

    96KB

  • memory/916-81-0x0000000004D10000-0x0000000004D50000-memory.dmp
    Filesize

    256KB

  • memory/916-82-0x0000000004D10000-0x0000000004D50000-memory.dmp
    Filesize

    256KB

  • memory/1640-134-0x00000000022E0000-0x000000000231F000-memory.dmp
    Filesize

    252KB

  • memory/1640-150-0x0000000004E30000-0x0000000004E70000-memory.dmp
    Filesize

    256KB

  • memory/1640-132-0x00000000022E0000-0x000000000231F000-memory.dmp
    Filesize

    252KB

  • memory/1640-128-0x00000000022E0000-0x000000000231F000-memory.dmp
    Filesize

    252KB

  • memory/1640-136-0x00000000022E0000-0x000000000231F000-memory.dmp
    Filesize

    252KB

  • memory/1640-138-0x00000000022E0000-0x000000000231F000-memory.dmp
    Filesize

    252KB

  • memory/1640-140-0x00000000022E0000-0x000000000231F000-memory.dmp
    Filesize

    252KB

  • memory/1640-142-0x00000000022E0000-0x000000000231F000-memory.dmp
    Filesize

    252KB

  • memory/1640-144-0x00000000022E0000-0x000000000231F000-memory.dmp
    Filesize

    252KB

  • memory/1640-146-0x0000000000260000-0x00000000002AB000-memory.dmp
    Filesize

    300KB

  • memory/1640-147-0x00000000022E0000-0x000000000231F000-memory.dmp
    Filesize

    252KB

  • memory/1640-148-0x0000000004E30000-0x0000000004E70000-memory.dmp
    Filesize

    256KB

  • memory/1640-151-0x00000000022E0000-0x000000000231F000-memory.dmp
    Filesize

    252KB

  • memory/1640-130-0x00000000022E0000-0x000000000231F000-memory.dmp
    Filesize

    252KB

  • memory/1640-153-0x00000000022E0000-0x000000000231F000-memory.dmp
    Filesize

    252KB

  • memory/1640-155-0x00000000022E0000-0x000000000231F000-memory.dmp
    Filesize

    252KB

  • memory/1640-157-0x00000000022E0000-0x000000000231F000-memory.dmp
    Filesize

    252KB

  • memory/1640-159-0x00000000022E0000-0x000000000231F000-memory.dmp
    Filesize

    252KB

  • memory/1640-161-0x00000000022E0000-0x000000000231F000-memory.dmp
    Filesize

    252KB

  • memory/1640-1034-0x0000000004E30000-0x0000000004E70000-memory.dmp
    Filesize

    256KB

  • memory/1640-1036-0x0000000004E30000-0x0000000004E70000-memory.dmp
    Filesize

    256KB

  • memory/1640-126-0x00000000022E0000-0x000000000231F000-memory.dmp
    Filesize

    252KB

  • memory/1640-125-0x00000000022E0000-0x000000000231F000-memory.dmp
    Filesize

    252KB

  • memory/1640-124-0x00000000022E0000-0x0000000002324000-memory.dmp
    Filesize

    272KB

  • memory/1640-123-0x00000000022A0000-0x00000000022E6000-memory.dmp
    Filesize

    280KB

  • memory/2016-1044-0x0000000001250000-0x0000000001282000-memory.dmp
    Filesize

    200KB

  • memory/2016-1045-0x0000000004F00000-0x0000000004F40000-memory.dmp
    Filesize

    256KB