Analysis

  • max time kernel
    55s
  • max time network
    60s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 00:55

General

  • Target

    172742d918d8d53bec416a129533610b612c8708c74343c7cbc2f5b61d143f23.exe

  • Size

    690KB

  • MD5

    24f0ddfe0332622a82d8fd855402bd05

  • SHA1

    7327a5a70cf3abaa5c49c3cca7f778735cec9708

  • SHA256

    172742d918d8d53bec416a129533610b612c8708c74343c7cbc2f5b61d143f23

  • SHA512

    145bd580fd679e2ff42eb50804b4fe6c3c4af692104b1f6c7c175355c92e48cf58591203107285f36b38ab8b6af4eaab965f0813620074569946719d51a0b51c

  • SSDEEP

    12288:UMrWy90xeC0TXladjDo5rtRZn5B0AIP0jv1RkDCyPuYzqeLB:KycjYMdno5rtr5C1PDCGzqel

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\172742d918d8d53bec416a129533610b612c8708c74343c7cbc2f5b61d143f23.exe
    "C:\Users\Admin\AppData\Local\Temp\172742d918d8d53bec416a129533610b612c8708c74343c7cbc2f5b61d143f23.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un498527.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un498527.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2548
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6207.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6207.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2992
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5467.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5467.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3036
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si469124.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si469124.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3872

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si469124.exe

    Filesize

    175KB

    MD5

    2e91fcd187bce31d5d831220c51ac0c9

    SHA1

    e5caf8557efbebe6fe712215f781510761d995b8

    SHA256

    4c8177e89a9a06b0765c006d31a0a69d4adcfb360344a2d290f767633181aec1

    SHA512

    5042a5038b303805157ef1dcab5c296ad4544d1d1a260c9362096b3eacf7ca71572bfd27756e54304d49014f27d06c5dd8151d99a7a3abcb6e3f9c43153687e7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si469124.exe

    Filesize

    175KB

    MD5

    2e91fcd187bce31d5d831220c51ac0c9

    SHA1

    e5caf8557efbebe6fe712215f781510761d995b8

    SHA256

    4c8177e89a9a06b0765c006d31a0a69d4adcfb360344a2d290f767633181aec1

    SHA512

    5042a5038b303805157ef1dcab5c296ad4544d1d1a260c9362096b3eacf7ca71572bfd27756e54304d49014f27d06c5dd8151d99a7a3abcb6e3f9c43153687e7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un498527.exe

    Filesize

    548KB

    MD5

    0e12fe8f4a53e9ee7d39aa89963fb69d

    SHA1

    7220d7ac568c2abb60992c0799608a6adda1f1ad

    SHA256

    cde347c6ab92fb11930647eb59276d1a4bff901ecdcef0f901e1d3896ad36109

    SHA512

    68b8985ab454b530a3b220c42ea7045ce01c72bb135a089de0365a48ee9d3b2bf8c7aed67396abeb1bf15df4a250cd5e88db41e1d75759aaade3b6435d554518

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un498527.exe

    Filesize

    548KB

    MD5

    0e12fe8f4a53e9ee7d39aa89963fb69d

    SHA1

    7220d7ac568c2abb60992c0799608a6adda1f1ad

    SHA256

    cde347c6ab92fb11930647eb59276d1a4bff901ecdcef0f901e1d3896ad36109

    SHA512

    68b8985ab454b530a3b220c42ea7045ce01c72bb135a089de0365a48ee9d3b2bf8c7aed67396abeb1bf15df4a250cd5e88db41e1d75759aaade3b6435d554518

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6207.exe

    Filesize

    291KB

    MD5

    7b69980dddbcc3b71106d60a29733ff0

    SHA1

    feb6086631b2417fef845c5ba5f4fa77a40cf3c9

    SHA256

    922aee610aa220ca120fd51a42357f90b60e68339e31f11f2cf3f38402438741

    SHA512

    57b658f94ac9bc3fdd5983174ed1f8090a7e215b898737d9d0cc8635e7b8c59eb9e98735d6c86d3d7dcf9383aca91d84c28cfea64c54b597af253d5fd9f6f23a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6207.exe

    Filesize

    291KB

    MD5

    7b69980dddbcc3b71106d60a29733ff0

    SHA1

    feb6086631b2417fef845c5ba5f4fa77a40cf3c9

    SHA256

    922aee610aa220ca120fd51a42357f90b60e68339e31f11f2cf3f38402438741

    SHA512

    57b658f94ac9bc3fdd5983174ed1f8090a7e215b898737d9d0cc8635e7b8c59eb9e98735d6c86d3d7dcf9383aca91d84c28cfea64c54b597af253d5fd9f6f23a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5467.exe

    Filesize

    350KB

    MD5

    15c5c8c18c335eb71b1a9aeff1eee2ce

    SHA1

    655c113888ed8150d75064034b99d1b96281d8cf

    SHA256

    f49528c234b79ce55fb6893a0cae3d1260e9616ab399dd8468febe1dfae33d42

    SHA512

    1f5867863dd6139e8ab4eb64a84820f2f91b37842b9fe9710b8da23397e4dae1983fa0a6eb5cb4d0370df9937fc45b0b1001a39a6eb45e6f3b668197dc915ccb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5467.exe

    Filesize

    350KB

    MD5

    15c5c8c18c335eb71b1a9aeff1eee2ce

    SHA1

    655c113888ed8150d75064034b99d1b96281d8cf

    SHA256

    f49528c234b79ce55fb6893a0cae3d1260e9616ab399dd8468febe1dfae33d42

    SHA512

    1f5867863dd6139e8ab4eb64a84820f2f91b37842b9fe9710b8da23397e4dae1983fa0a6eb5cb4d0370df9937fc45b0b1001a39a6eb45e6f3b668197dc915ccb

  • memory/2992-136-0x00000000007E0000-0x000000000080D000-memory.dmp

    Filesize

    180KB

  • memory/2992-137-0x00000000025B0000-0x00000000025CA000-memory.dmp

    Filesize

    104KB

  • memory/2992-138-0x0000000004CD0000-0x00000000051CE000-memory.dmp

    Filesize

    5.0MB

  • memory/2992-139-0x00000000021C0000-0x00000000021D0000-memory.dmp

    Filesize

    64KB

  • memory/2992-142-0x0000000002650000-0x0000000002668000-memory.dmp

    Filesize

    96KB

  • memory/2992-141-0x00000000021C0000-0x00000000021D0000-memory.dmp

    Filesize

    64KB

  • memory/2992-140-0x00000000021C0000-0x00000000021D0000-memory.dmp

    Filesize

    64KB

  • memory/2992-154-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/2992-152-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/2992-166-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/2992-164-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/2992-170-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/2992-168-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/2992-162-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/2992-160-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/2992-158-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/2992-156-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/2992-150-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/2992-148-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/2992-146-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/2992-144-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/2992-143-0x0000000002650000-0x0000000002662000-memory.dmp

    Filesize

    72KB

  • memory/2992-171-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/2992-173-0x00000000021C0000-0x00000000021D0000-memory.dmp

    Filesize

    64KB

  • memory/2992-172-0x00000000021C0000-0x00000000021D0000-memory.dmp

    Filesize

    64KB

  • memory/2992-174-0x00000000021C0000-0x00000000021D0000-memory.dmp

    Filesize

    64KB

  • memory/2992-176-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/3036-181-0x0000000004AA0000-0x0000000004AE6000-memory.dmp

    Filesize

    280KB

  • memory/3036-182-0x00000000051C0000-0x0000000005204000-memory.dmp

    Filesize

    272KB

  • memory/3036-183-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/3036-184-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/3036-186-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/3036-188-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/3036-190-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/3036-192-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/3036-194-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/3036-198-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/3036-200-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/3036-196-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/3036-202-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/3036-204-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/3036-208-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/3036-206-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/3036-210-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/3036-212-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/3036-214-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/3036-216-0x00000000051C0000-0x00000000051FF000-memory.dmp

    Filesize

    252KB

  • memory/3036-220-0x0000000002100000-0x000000000214B000-memory.dmp

    Filesize

    300KB

  • memory/3036-222-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

    Filesize

    64KB

  • memory/3036-224-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

    Filesize

    64KB

  • memory/3036-225-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

    Filesize

    64KB

  • memory/3036-1093-0x0000000005230000-0x0000000005836000-memory.dmp

    Filesize

    6.0MB

  • memory/3036-1094-0x00000000058C0000-0x00000000059CA000-memory.dmp

    Filesize

    1.0MB

  • memory/3036-1095-0x0000000005A00000-0x0000000005A12000-memory.dmp

    Filesize

    72KB

  • memory/3036-1096-0x0000000005A20000-0x0000000005A5E000-memory.dmp

    Filesize

    248KB

  • memory/3036-1097-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

    Filesize

    64KB

  • memory/3036-1098-0x0000000005B70000-0x0000000005BBB000-memory.dmp

    Filesize

    300KB

  • memory/3036-1100-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

    Filesize

    64KB

  • memory/3036-1101-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

    Filesize

    64KB

  • memory/3036-1102-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

    Filesize

    64KB

  • memory/3036-1103-0x0000000005D00000-0x0000000005D92000-memory.dmp

    Filesize

    584KB

  • memory/3036-1104-0x0000000005DA0000-0x0000000005E06000-memory.dmp

    Filesize

    408KB

  • memory/3036-1105-0x00000000065E0000-0x0000000006656000-memory.dmp

    Filesize

    472KB

  • memory/3036-1106-0x0000000006670000-0x00000000066C0000-memory.dmp

    Filesize

    320KB

  • memory/3036-1107-0x00000000067E0000-0x00000000069A2000-memory.dmp

    Filesize

    1.8MB

  • memory/3036-1108-0x00000000069B0000-0x0000000006EDC000-memory.dmp

    Filesize

    5.2MB

  • memory/3036-1109-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

    Filesize

    64KB

  • memory/3872-1115-0x0000000000F40000-0x0000000000F72000-memory.dmp

    Filesize

    200KB

  • memory/3872-1116-0x0000000005980000-0x00000000059CB000-memory.dmp

    Filesize

    300KB

  • memory/3872-1117-0x0000000005780000-0x0000000005790000-memory.dmp

    Filesize

    64KB