Analysis

  • max time kernel
    42s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    28-03-2023 00:51

General

  • Target

    setup.exe

  • Size

    700KB

  • MD5

    560438562e86acf69f02aeda2086968b

  • SHA1

    96d0dc3fd4d18e54f933109d75ac5807caa1cc77

  • SHA256

    8b539d02f4658dc80f89a69e2b355796f48d8d68b6174dff551b4ff29277523c

  • SHA512

    0e9047c7ca34da83dde4394846a060988af4c412e3025177775ad3deb5d95cae38a25d3cdbdadc3cc58c083855b87d427670edea6441ffb3bc75c70a6369674a

  • SSDEEP

    12288:WMrTy900GpXQD7JDgatv9DGIcA6GNPqO+0/XOAnDOju60hO0xfg:1yBHDVzX6wqE/XO4DOCzg

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un253705.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un253705.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1668
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5627.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5627.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1736
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8658.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8658.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:940
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si931348.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si931348.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2044

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si931348.exe
    Filesize

    175KB

    MD5

    fa52d4790dd6c0b52d36161f70fe2152

    SHA1

    c723449883ff847e69b9e00e90d1dd1994c439a8

    SHA256

    4ce830cc27fba5272cbc66d90bb3018f6cbd911cf67edd9265861ff350cb09a2

    SHA512

    fc1636686c34f281b2ab7842cad8ec72519f464657084db6984c7542c26392c6919c6e36afca1c75baf3bad198583c7c9498012183cb026c6b4ac2119f0d044f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si931348.exe
    Filesize

    175KB

    MD5

    fa52d4790dd6c0b52d36161f70fe2152

    SHA1

    c723449883ff847e69b9e00e90d1dd1994c439a8

    SHA256

    4ce830cc27fba5272cbc66d90bb3018f6cbd911cf67edd9265861ff350cb09a2

    SHA512

    fc1636686c34f281b2ab7842cad8ec72519f464657084db6984c7542c26392c6919c6e36afca1c75baf3bad198583c7c9498012183cb026c6b4ac2119f0d044f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un253705.exe
    Filesize

    558KB

    MD5

    f714a682a4e5f9c53e6c2b3d7a3b978e

    SHA1

    1e5932682cd957a590b9316796f51745a077e8f9

    SHA256

    3d645c61609658bf1532f4c11e6a0448b30248ca542834971c30ee086ceb918d

    SHA512

    960ea3325cf75abc2b2847de22d347a500912b73d2dd112b7a382fb9c56e4ec4c5bd39340c0352002d95bb7149da4246b46926265ad768613fec4e6fe459581d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un253705.exe
    Filesize

    558KB

    MD5

    f714a682a4e5f9c53e6c2b3d7a3b978e

    SHA1

    1e5932682cd957a590b9316796f51745a077e8f9

    SHA256

    3d645c61609658bf1532f4c11e6a0448b30248ca542834971c30ee086ceb918d

    SHA512

    960ea3325cf75abc2b2847de22d347a500912b73d2dd112b7a382fb9c56e4ec4c5bd39340c0352002d95bb7149da4246b46926265ad768613fec4e6fe459581d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5627.exe
    Filesize

    307KB

    MD5

    f18c6b8db70568744924d51ae2849a71

    SHA1

    df11b10e0c96fe98703d78b607b8019fbb06a8af

    SHA256

    7022bc7431c6a6eab8f3ddfba314f0a796806f19deeda1b1c4b690e6bd750b3d

    SHA512

    0679bbab7a1104d75f0fa9685a8f9f66425858879955486dbf48cee76e14898ce2870099f1fa077df4d734cf07a4a859e5120805615c005693d7ccfb939df7d9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5627.exe
    Filesize

    307KB

    MD5

    f18c6b8db70568744924d51ae2849a71

    SHA1

    df11b10e0c96fe98703d78b607b8019fbb06a8af

    SHA256

    7022bc7431c6a6eab8f3ddfba314f0a796806f19deeda1b1c4b690e6bd750b3d

    SHA512

    0679bbab7a1104d75f0fa9685a8f9f66425858879955486dbf48cee76e14898ce2870099f1fa077df4d734cf07a4a859e5120805615c005693d7ccfb939df7d9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5627.exe
    Filesize

    307KB

    MD5

    f18c6b8db70568744924d51ae2849a71

    SHA1

    df11b10e0c96fe98703d78b607b8019fbb06a8af

    SHA256

    7022bc7431c6a6eab8f3ddfba314f0a796806f19deeda1b1c4b690e6bd750b3d

    SHA512

    0679bbab7a1104d75f0fa9685a8f9f66425858879955486dbf48cee76e14898ce2870099f1fa077df4d734cf07a4a859e5120805615c005693d7ccfb939df7d9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8658.exe
    Filesize

    365KB

    MD5

    3d9d6a5b41346391155be7d69dccb5a5

    SHA1

    c4a888e11cca99e4877b9579a295a9476a7be4db

    SHA256

    713bbe23141f6d05c44ad3c41d5586c5e8ae2d112386e687bef5cd277019fa65

    SHA512

    a184b5404c1b5e949005379f66ed074eb446ab671bc59191e548c0821080a7fc1c8b90573fea99d1f93fb86cb803a1cf6d4756fbcc66bc66a3785c9e322ddc99

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8658.exe
    Filesize

    365KB

    MD5

    3d9d6a5b41346391155be7d69dccb5a5

    SHA1

    c4a888e11cca99e4877b9579a295a9476a7be4db

    SHA256

    713bbe23141f6d05c44ad3c41d5586c5e8ae2d112386e687bef5cd277019fa65

    SHA512

    a184b5404c1b5e949005379f66ed074eb446ab671bc59191e548c0821080a7fc1c8b90573fea99d1f93fb86cb803a1cf6d4756fbcc66bc66a3785c9e322ddc99

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8658.exe
    Filesize

    365KB

    MD5

    3d9d6a5b41346391155be7d69dccb5a5

    SHA1

    c4a888e11cca99e4877b9579a295a9476a7be4db

    SHA256

    713bbe23141f6d05c44ad3c41d5586c5e8ae2d112386e687bef5cd277019fa65

    SHA512

    a184b5404c1b5e949005379f66ed074eb446ab671bc59191e548c0821080a7fc1c8b90573fea99d1f93fb86cb803a1cf6d4756fbcc66bc66a3785c9e322ddc99

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\si931348.exe
    Filesize

    175KB

    MD5

    fa52d4790dd6c0b52d36161f70fe2152

    SHA1

    c723449883ff847e69b9e00e90d1dd1994c439a8

    SHA256

    4ce830cc27fba5272cbc66d90bb3018f6cbd911cf67edd9265861ff350cb09a2

    SHA512

    fc1636686c34f281b2ab7842cad8ec72519f464657084db6984c7542c26392c6919c6e36afca1c75baf3bad198583c7c9498012183cb026c6b4ac2119f0d044f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\si931348.exe
    Filesize

    175KB

    MD5

    fa52d4790dd6c0b52d36161f70fe2152

    SHA1

    c723449883ff847e69b9e00e90d1dd1994c439a8

    SHA256

    4ce830cc27fba5272cbc66d90bb3018f6cbd911cf67edd9265861ff350cb09a2

    SHA512

    fc1636686c34f281b2ab7842cad8ec72519f464657084db6984c7542c26392c6919c6e36afca1c75baf3bad198583c7c9498012183cb026c6b4ac2119f0d044f

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un253705.exe
    Filesize

    558KB

    MD5

    f714a682a4e5f9c53e6c2b3d7a3b978e

    SHA1

    1e5932682cd957a590b9316796f51745a077e8f9

    SHA256

    3d645c61609658bf1532f4c11e6a0448b30248ca542834971c30ee086ceb918d

    SHA512

    960ea3325cf75abc2b2847de22d347a500912b73d2dd112b7a382fb9c56e4ec4c5bd39340c0352002d95bb7149da4246b46926265ad768613fec4e6fe459581d

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un253705.exe
    Filesize

    558KB

    MD5

    f714a682a4e5f9c53e6c2b3d7a3b978e

    SHA1

    1e5932682cd957a590b9316796f51745a077e8f9

    SHA256

    3d645c61609658bf1532f4c11e6a0448b30248ca542834971c30ee086ceb918d

    SHA512

    960ea3325cf75abc2b2847de22d347a500912b73d2dd112b7a382fb9c56e4ec4c5bd39340c0352002d95bb7149da4246b46926265ad768613fec4e6fe459581d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5627.exe
    Filesize

    307KB

    MD5

    f18c6b8db70568744924d51ae2849a71

    SHA1

    df11b10e0c96fe98703d78b607b8019fbb06a8af

    SHA256

    7022bc7431c6a6eab8f3ddfba314f0a796806f19deeda1b1c4b690e6bd750b3d

    SHA512

    0679bbab7a1104d75f0fa9685a8f9f66425858879955486dbf48cee76e14898ce2870099f1fa077df4d734cf07a4a859e5120805615c005693d7ccfb939df7d9

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5627.exe
    Filesize

    307KB

    MD5

    f18c6b8db70568744924d51ae2849a71

    SHA1

    df11b10e0c96fe98703d78b607b8019fbb06a8af

    SHA256

    7022bc7431c6a6eab8f3ddfba314f0a796806f19deeda1b1c4b690e6bd750b3d

    SHA512

    0679bbab7a1104d75f0fa9685a8f9f66425858879955486dbf48cee76e14898ce2870099f1fa077df4d734cf07a4a859e5120805615c005693d7ccfb939df7d9

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5627.exe
    Filesize

    307KB

    MD5

    f18c6b8db70568744924d51ae2849a71

    SHA1

    df11b10e0c96fe98703d78b607b8019fbb06a8af

    SHA256

    7022bc7431c6a6eab8f3ddfba314f0a796806f19deeda1b1c4b690e6bd750b3d

    SHA512

    0679bbab7a1104d75f0fa9685a8f9f66425858879955486dbf48cee76e14898ce2870099f1fa077df4d734cf07a4a859e5120805615c005693d7ccfb939df7d9

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8658.exe
    Filesize

    365KB

    MD5

    3d9d6a5b41346391155be7d69dccb5a5

    SHA1

    c4a888e11cca99e4877b9579a295a9476a7be4db

    SHA256

    713bbe23141f6d05c44ad3c41d5586c5e8ae2d112386e687bef5cd277019fa65

    SHA512

    a184b5404c1b5e949005379f66ed074eb446ab671bc59191e548c0821080a7fc1c8b90573fea99d1f93fb86cb803a1cf6d4756fbcc66bc66a3785c9e322ddc99

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8658.exe
    Filesize

    365KB

    MD5

    3d9d6a5b41346391155be7d69dccb5a5

    SHA1

    c4a888e11cca99e4877b9579a295a9476a7be4db

    SHA256

    713bbe23141f6d05c44ad3c41d5586c5e8ae2d112386e687bef5cd277019fa65

    SHA512

    a184b5404c1b5e949005379f66ed074eb446ab671bc59191e548c0821080a7fc1c8b90573fea99d1f93fb86cb803a1cf6d4756fbcc66bc66a3785c9e322ddc99

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8658.exe
    Filesize

    365KB

    MD5

    3d9d6a5b41346391155be7d69dccb5a5

    SHA1

    c4a888e11cca99e4877b9579a295a9476a7be4db

    SHA256

    713bbe23141f6d05c44ad3c41d5586c5e8ae2d112386e687bef5cd277019fa65

    SHA512

    a184b5404c1b5e949005379f66ed074eb446ab671bc59191e548c0821080a7fc1c8b90573fea99d1f93fb86cb803a1cf6d4756fbcc66bc66a3785c9e322ddc99

  • memory/940-145-0x0000000000E80000-0x0000000000EBF000-memory.dmp
    Filesize

    252KB

  • memory/940-157-0x0000000000E80000-0x0000000000EBF000-memory.dmp
    Filesize

    252KB

  • memory/940-1035-0x0000000004F10000-0x0000000004F50000-memory.dmp
    Filesize

    256KB

  • memory/940-442-0x0000000004F10000-0x0000000004F50000-memory.dmp
    Filesize

    256KB

  • memory/940-440-0x0000000004F10000-0x0000000004F50000-memory.dmp
    Filesize

    256KB

  • memory/940-438-0x0000000000240000-0x000000000028B000-memory.dmp
    Filesize

    300KB

  • memory/940-159-0x0000000000E80000-0x0000000000EBF000-memory.dmp
    Filesize

    252KB

  • memory/940-155-0x0000000000E80000-0x0000000000EBF000-memory.dmp
    Filesize

    252KB

  • memory/940-153-0x0000000000E80000-0x0000000000EBF000-memory.dmp
    Filesize

    252KB

  • memory/940-151-0x0000000000E80000-0x0000000000EBF000-memory.dmp
    Filesize

    252KB

  • memory/940-149-0x0000000000E80000-0x0000000000EBF000-memory.dmp
    Filesize

    252KB

  • memory/940-147-0x0000000000E80000-0x0000000000EBF000-memory.dmp
    Filesize

    252KB

  • memory/940-143-0x0000000000E80000-0x0000000000EBF000-memory.dmp
    Filesize

    252KB

  • memory/940-141-0x0000000000E80000-0x0000000000EBF000-memory.dmp
    Filesize

    252KB

  • memory/940-139-0x0000000000E80000-0x0000000000EBF000-memory.dmp
    Filesize

    252KB

  • memory/940-137-0x0000000000E80000-0x0000000000EBF000-memory.dmp
    Filesize

    252KB

  • memory/940-135-0x0000000000E80000-0x0000000000EBF000-memory.dmp
    Filesize

    252KB

  • memory/940-133-0x0000000000E80000-0x0000000000EBF000-memory.dmp
    Filesize

    252KB

  • memory/940-131-0x0000000000E80000-0x0000000000EBF000-memory.dmp
    Filesize

    252KB

  • memory/940-124-0x0000000000840000-0x0000000000886000-memory.dmp
    Filesize

    280KB

  • memory/940-125-0x0000000000E80000-0x0000000000EC4000-memory.dmp
    Filesize

    272KB

  • memory/940-126-0x0000000000E80000-0x0000000000EBF000-memory.dmp
    Filesize

    252KB

  • memory/940-127-0x0000000000E80000-0x0000000000EBF000-memory.dmp
    Filesize

    252KB

  • memory/940-129-0x0000000000E80000-0x0000000000EBF000-memory.dmp
    Filesize

    252KB

  • memory/1736-105-0x0000000000CE0000-0x0000000000CF2000-memory.dmp
    Filesize

    72KB

  • memory/1736-89-0x0000000000CE0000-0x0000000000CF2000-memory.dmp
    Filesize

    72KB

  • memory/1736-83-0x0000000000CE0000-0x0000000000CF2000-memory.dmp
    Filesize

    72KB

  • memory/1736-91-0x0000000000CE0000-0x0000000000CF2000-memory.dmp
    Filesize

    72KB

  • memory/1736-93-0x0000000000CE0000-0x0000000000CF2000-memory.dmp
    Filesize

    72KB

  • memory/1736-95-0x0000000000CE0000-0x0000000000CF2000-memory.dmp
    Filesize

    72KB

  • memory/1736-113-0x0000000000400000-0x000000000070F000-memory.dmp
    Filesize

    3.1MB

  • memory/1736-107-0x0000000000CE0000-0x0000000000CF2000-memory.dmp
    Filesize

    72KB

  • memory/1736-112-0x0000000000400000-0x000000000070F000-memory.dmp
    Filesize

    3.1MB

  • memory/1736-111-0x0000000004DA0000-0x0000000004DE0000-memory.dmp
    Filesize

    256KB

  • memory/1736-110-0x0000000004DA0000-0x0000000004DE0000-memory.dmp
    Filesize

    256KB

  • memory/1736-109-0x0000000000CE0000-0x0000000000CF2000-memory.dmp
    Filesize

    72KB

  • memory/1736-87-0x0000000000CE0000-0x0000000000CF2000-memory.dmp
    Filesize

    72KB

  • memory/1736-85-0x0000000000CE0000-0x0000000000CF2000-memory.dmp
    Filesize

    72KB

  • memory/1736-82-0x0000000000CE0000-0x0000000000CF2000-memory.dmp
    Filesize

    72KB

  • memory/1736-101-0x0000000000CE0000-0x0000000000CF2000-memory.dmp
    Filesize

    72KB

  • memory/1736-103-0x0000000000CE0000-0x0000000000CF2000-memory.dmp
    Filesize

    72KB

  • memory/1736-97-0x0000000000CE0000-0x0000000000CF2000-memory.dmp
    Filesize

    72KB

  • memory/1736-99-0x0000000000CE0000-0x0000000000CF2000-memory.dmp
    Filesize

    72KB

  • memory/1736-81-0x0000000000CE0000-0x0000000000CF8000-memory.dmp
    Filesize

    96KB

  • memory/1736-80-0x0000000004DA0000-0x0000000004DE0000-memory.dmp
    Filesize

    256KB

  • memory/1736-79-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/1736-78-0x00000000008E0000-0x00000000008FA000-memory.dmp
    Filesize

    104KB

  • memory/2044-1044-0x0000000000F40000-0x0000000000F72000-memory.dmp
    Filesize

    200KB

  • memory/2044-1045-0x00000000050D0000-0x0000000005110000-memory.dmp
    Filesize

    256KB