Analysis

  • max time kernel
    55s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 00:49

General

  • Target

    fd40cfd7e141f4e0a4909ae6c8110c4ecaadd70b596957b71135707c5809adbf.exe

  • Size

    691KB

  • MD5

    4f711e111e6496b8b518d78d068a0f98

  • SHA1

    0943d9ce51e4f9ca480d7be3aa911345a424187a

  • SHA256

    fd40cfd7e141f4e0a4909ae6c8110c4ecaadd70b596957b71135707c5809adbf

  • SHA512

    1211a25138b754d5efb98701e17ceea69cee22d204b2e219b68dfe6d95276795dccfe1756b26ed32afa5d9bac51d560a86fca95f331707aa63971fe276f82e1d

  • SSDEEP

    12288:CMrgy901EMPjLoR/zZhI0Y9ixQoNtpNzIOtXdNa62X8ADloyP2:OyacVh+4em/oHX8ADlN2

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd40cfd7e141f4e0a4909ae6c8110c4ecaadd70b596957b71135707c5809adbf.exe
    "C:\Users\Admin\AppData\Local\Temp\fd40cfd7e141f4e0a4909ae6c8110c4ecaadd70b596957b71135707c5809adbf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un581140.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un581140.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2120
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1330.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1330.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4248
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7187.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7187.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3048
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si657313.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si657313.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4176

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si657313.exe

    Filesize

    175KB

    MD5

    94b58cdf8d7dc0c9cef64af604a6f3ca

    SHA1

    5971b9e716ef81f3950bc9ada8d6d8402255b6d2

    SHA256

    41fdc59a89c7511b8a66274c9183fe7d67e28abb9e274d1981cb6d8d3d0d20c1

    SHA512

    42a77ff2749da38a315755707be55bd9003163398bc1058ab61a138b7b9588270cd0a01345a53859cbdb71989a3b4b31c75ba061340e3897d0fb9e4f9900433f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si657313.exe

    Filesize

    175KB

    MD5

    94b58cdf8d7dc0c9cef64af604a6f3ca

    SHA1

    5971b9e716ef81f3950bc9ada8d6d8402255b6d2

    SHA256

    41fdc59a89c7511b8a66274c9183fe7d67e28abb9e274d1981cb6d8d3d0d20c1

    SHA512

    42a77ff2749da38a315755707be55bd9003163398bc1058ab61a138b7b9588270cd0a01345a53859cbdb71989a3b4b31c75ba061340e3897d0fb9e4f9900433f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un581140.exe

    Filesize

    549KB

    MD5

    295d190db031ba1f5adb0e5c6acff177

    SHA1

    556d9617fc4be04d0f95cba670f2de5315fbec8c

    SHA256

    cc60821fd6f881db95c18536915d1917d9ef297913cf22f99c306c60512afa8e

    SHA512

    d9682225c13d63b6195e01fa69c7ef3f9ef633e6d09034f593cb9a9779832b8b6d08f07dc15c83a469dd21d4ca00d8afa4cdfec7d4f3e40a3b522b0d80212116

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un581140.exe

    Filesize

    549KB

    MD5

    295d190db031ba1f5adb0e5c6acff177

    SHA1

    556d9617fc4be04d0f95cba670f2de5315fbec8c

    SHA256

    cc60821fd6f881db95c18536915d1917d9ef297913cf22f99c306c60512afa8e

    SHA512

    d9682225c13d63b6195e01fa69c7ef3f9ef633e6d09034f593cb9a9779832b8b6d08f07dc15c83a469dd21d4ca00d8afa4cdfec7d4f3e40a3b522b0d80212116

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1330.exe

    Filesize

    291KB

    MD5

    9127c1ab4945cbd7416f5df41bd8563b

    SHA1

    d01d7ed630b5f9a6315a5b6c0ae77ea8deaf704b

    SHA256

    526baf08ef96b74398f741692298270646f28b894bf68bfb9fcc91e74f8bbf3f

    SHA512

    3ef5ab2be8d9a55779d34ccfec0a8c39493c6d39bfb9fb368807670e1515d956d3e1e7a4ef3cf2155743362280d0119782374a104d30bb09480bb5e965b48073

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1330.exe

    Filesize

    291KB

    MD5

    9127c1ab4945cbd7416f5df41bd8563b

    SHA1

    d01d7ed630b5f9a6315a5b6c0ae77ea8deaf704b

    SHA256

    526baf08ef96b74398f741692298270646f28b894bf68bfb9fcc91e74f8bbf3f

    SHA512

    3ef5ab2be8d9a55779d34ccfec0a8c39493c6d39bfb9fb368807670e1515d956d3e1e7a4ef3cf2155743362280d0119782374a104d30bb09480bb5e965b48073

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7187.exe

    Filesize

    350KB

    MD5

    72f8aaedc02080b469b870943902227e

    SHA1

    4df4cfd962551f0ee4571efb7ddb96432a6c0938

    SHA256

    81da7c18be2ac0e341f097fce2c042430cdffe6d1870aca086d77d7b6238f044

    SHA512

    634ae73b934f1991d2e30fb94dc136d6f2d9a93ac73ab260314f195817696fc92270e1c3ce9fd6cfe6230d8f50687b36c8d5e59b581b350d1241b2f3fc52fde8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7187.exe

    Filesize

    350KB

    MD5

    72f8aaedc02080b469b870943902227e

    SHA1

    4df4cfd962551f0ee4571efb7ddb96432a6c0938

    SHA256

    81da7c18be2ac0e341f097fce2c042430cdffe6d1870aca086d77d7b6238f044

    SHA512

    634ae73b934f1991d2e30fb94dc136d6f2d9a93ac73ab260314f195817696fc92270e1c3ce9fd6cfe6230d8f50687b36c8d5e59b581b350d1241b2f3fc52fde8

  • memory/3048-1092-0x0000000005A60000-0x0000000006066000-memory.dmp

    Filesize

    6.0MB

  • memory/3048-1093-0x0000000005450000-0x000000000555A000-memory.dmp

    Filesize

    1.0MB

  • memory/3048-211-0x00000000027B0000-0x00000000027EF000-memory.dmp

    Filesize

    252KB

  • memory/3048-209-0x00000000027B0000-0x00000000027EF000-memory.dmp

    Filesize

    252KB

  • memory/3048-207-0x00000000027B0000-0x00000000027EF000-memory.dmp

    Filesize

    252KB

  • memory/3048-197-0x00000000027B0000-0x00000000027EF000-memory.dmp

    Filesize

    252KB

  • memory/3048-1108-0x0000000004F40000-0x0000000004F50000-memory.dmp

    Filesize

    64KB

  • memory/3048-1107-0x00000000070E0000-0x0000000007130000-memory.dmp

    Filesize

    320KB

  • memory/3048-1106-0x0000000007060000-0x00000000070D6000-memory.dmp

    Filesize

    472KB

  • memory/3048-1105-0x0000000004F40000-0x0000000004F50000-memory.dmp

    Filesize

    64KB

  • memory/3048-199-0x00000000027B0000-0x00000000027EF000-memory.dmp

    Filesize

    252KB

  • memory/3048-1104-0x0000000004F40000-0x0000000004F50000-memory.dmp

    Filesize

    64KB

  • memory/3048-1103-0x0000000004F40000-0x0000000004F50000-memory.dmp

    Filesize

    64KB

  • memory/3048-1102-0x00000000067D0000-0x0000000006CFC000-memory.dmp

    Filesize

    5.2MB

  • memory/3048-1101-0x0000000006600000-0x00000000067C2000-memory.dmp

    Filesize

    1.8MB

  • memory/3048-1099-0x0000000006500000-0x0000000006592000-memory.dmp

    Filesize

    584KB

  • memory/3048-1098-0x0000000005830000-0x0000000005896000-memory.dmp

    Filesize

    408KB

  • memory/3048-1097-0x0000000004F40000-0x0000000004F50000-memory.dmp

    Filesize

    64KB

  • memory/3048-1096-0x00000000056A0000-0x00000000056EB000-memory.dmp

    Filesize

    300KB

  • memory/3048-1095-0x0000000005560000-0x000000000559E000-memory.dmp

    Filesize

    248KB

  • memory/3048-1094-0x0000000004F10000-0x0000000004F22000-memory.dmp

    Filesize

    72KB

  • memory/3048-215-0x00000000027B0000-0x00000000027EF000-memory.dmp

    Filesize

    252KB

  • memory/3048-221-0x0000000004F40000-0x0000000004F50000-memory.dmp

    Filesize

    64KB

  • memory/3048-219-0x0000000004F40000-0x0000000004F50000-memory.dmp

    Filesize

    64KB

  • memory/3048-218-0x0000000004F40000-0x0000000004F50000-memory.dmp

    Filesize

    64KB

  • memory/3048-180-0x00000000023D0000-0x0000000002416000-memory.dmp

    Filesize

    280KB

  • memory/3048-181-0x00000000027B0000-0x00000000027F4000-memory.dmp

    Filesize

    272KB

  • memory/3048-183-0x00000000027B0000-0x00000000027EF000-memory.dmp

    Filesize

    252KB

  • memory/3048-182-0x00000000027B0000-0x00000000027EF000-memory.dmp

    Filesize

    252KB

  • memory/3048-195-0x00000000027B0000-0x00000000027EF000-memory.dmp

    Filesize

    252KB

  • memory/3048-187-0x00000000027B0000-0x00000000027EF000-memory.dmp

    Filesize

    252KB

  • memory/3048-189-0x00000000027B0000-0x00000000027EF000-memory.dmp

    Filesize

    252KB

  • memory/3048-191-0x00000000027B0000-0x00000000027EF000-memory.dmp

    Filesize

    252KB

  • memory/3048-193-0x00000000027B0000-0x00000000027EF000-memory.dmp

    Filesize

    252KB

  • memory/3048-185-0x00000000027B0000-0x00000000027EF000-memory.dmp

    Filesize

    252KB

  • memory/3048-216-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/3048-213-0x00000000027B0000-0x00000000027EF000-memory.dmp

    Filesize

    252KB

  • memory/3048-201-0x00000000027B0000-0x00000000027EF000-memory.dmp

    Filesize

    252KB

  • memory/3048-203-0x00000000027B0000-0x00000000027EF000-memory.dmp

    Filesize

    252KB

  • memory/3048-205-0x00000000027B0000-0x00000000027EF000-memory.dmp

    Filesize

    252KB

  • memory/4176-1114-0x0000000000C60000-0x0000000000C92000-memory.dmp

    Filesize

    200KB

  • memory/4176-1115-0x00000000056A0000-0x00000000056EB000-memory.dmp

    Filesize

    300KB

  • memory/4176-1116-0x00000000057C0000-0x00000000057D0000-memory.dmp

    Filesize

    64KB

  • memory/4248-170-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/4248-155-0x00000000022F0000-0x0000000002302000-memory.dmp

    Filesize

    72KB

  • memory/4248-145-0x00000000022F0000-0x0000000002302000-memory.dmp

    Filesize

    72KB

  • memory/4248-138-0x00000000007E0000-0x000000000080D000-memory.dmp

    Filesize

    180KB

  • memory/4248-140-0x0000000002880000-0x0000000002890000-memory.dmp

    Filesize

    64KB

  • memory/4248-175-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/4248-137-0x00000000022F0000-0x0000000002308000-memory.dmp

    Filesize

    96KB

  • memory/4248-173-0x0000000002880000-0x0000000002890000-memory.dmp

    Filesize

    64KB

  • memory/4248-172-0x0000000002880000-0x0000000002890000-memory.dmp

    Filesize

    64KB

  • memory/4248-171-0x0000000002880000-0x0000000002890000-memory.dmp

    Filesize

    64KB

  • memory/4248-141-0x0000000002880000-0x0000000002890000-memory.dmp

    Filesize

    64KB

  • memory/4248-169-0x00000000022F0000-0x0000000002302000-memory.dmp

    Filesize

    72KB

  • memory/4248-167-0x00000000022F0000-0x0000000002302000-memory.dmp

    Filesize

    72KB

  • memory/4248-165-0x00000000022F0000-0x0000000002302000-memory.dmp

    Filesize

    72KB

  • memory/4248-163-0x00000000022F0000-0x0000000002302000-memory.dmp

    Filesize

    72KB

  • memory/4248-161-0x00000000022F0000-0x0000000002302000-memory.dmp

    Filesize

    72KB

  • memory/4248-159-0x00000000022F0000-0x0000000002302000-memory.dmp

    Filesize

    72KB

  • memory/4248-157-0x00000000022F0000-0x0000000002302000-memory.dmp

    Filesize

    72KB

  • memory/4248-153-0x00000000022F0000-0x0000000002302000-memory.dmp

    Filesize

    72KB

  • memory/4248-151-0x00000000022F0000-0x0000000002302000-memory.dmp

    Filesize

    72KB

  • memory/4248-149-0x00000000022F0000-0x0000000002302000-memory.dmp

    Filesize

    72KB

  • memory/4248-147-0x00000000022F0000-0x0000000002302000-memory.dmp

    Filesize

    72KB

  • memory/4248-136-0x0000000004D10000-0x000000000520E000-memory.dmp

    Filesize

    5.0MB

  • memory/4248-135-0x0000000002210000-0x000000000222A000-memory.dmp

    Filesize

    104KB

  • memory/4248-143-0x00000000022F0000-0x0000000002302000-memory.dmp

    Filesize

    72KB

  • memory/4248-142-0x00000000022F0000-0x0000000002302000-memory.dmp

    Filesize

    72KB

  • memory/4248-139-0x0000000002880000-0x0000000002890000-memory.dmp

    Filesize

    64KB