Analysis

  • max time kernel
    45s
  • max time network
    56s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 00:06

General

  • Target

    c5274a7f34f95474f180adaedd107f50e3591e667e62ee8bcbc9647ee95e5b7c.exe

  • Size

    701KB

  • MD5

    7d38d17940ec828b45402464e72be358

  • SHA1

    7af8105765fc63351d323b1db7d42e65e0e06357

  • SHA256

    c5274a7f34f95474f180adaedd107f50e3591e667e62ee8bcbc9647ee95e5b7c

  • SHA512

    d4cc02121c8322d3706dca448613ced19a194c9026b77f189c62d1ff3d50140eb740022dd46d2571e0a4081e67c89f4e2fdeaeb337f3a325caf44273b521e366

  • SSDEEP

    12288:sMrdy90ucVfY67fch34hB2sR9DANcAD4NkNBqIBFTQY6772nGLHj/:xyyQ6Lu34hB2hD4eqeBW7yn4z

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c5274a7f34f95474f180adaedd107f50e3591e667e62ee8bcbc9647ee95e5b7c.exe
    "C:\Users\Admin\AppData\Local\Temp\c5274a7f34f95474f180adaedd107f50e3591e667e62ee8bcbc9647ee95e5b7c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un208983.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un208983.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3568
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8942.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8942.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4164
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9943.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9943.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3664
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si836005.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si836005.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3508

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si836005.exe

    Filesize

    175KB

    MD5

    00f3ad217fa576e2748cc4ed9ccab9ac

    SHA1

    3afd7de1068bf12c084ce72c1515a298042f0d28

    SHA256

    e4ec4b51403635a2c2611463481f034bb8a3e2f166064c1c413d82ef811468bf

    SHA512

    514406602b3fd29b2ebde550a6c70faccd89fca79b693526ab67ee909344da091c661e0156240ce554417b1c7a55c32a8370a8be4ed0f159864db8e1493b8328

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si836005.exe

    Filesize

    175KB

    MD5

    00f3ad217fa576e2748cc4ed9ccab9ac

    SHA1

    3afd7de1068bf12c084ce72c1515a298042f0d28

    SHA256

    e4ec4b51403635a2c2611463481f034bb8a3e2f166064c1c413d82ef811468bf

    SHA512

    514406602b3fd29b2ebde550a6c70faccd89fca79b693526ab67ee909344da091c661e0156240ce554417b1c7a55c32a8370a8be4ed0f159864db8e1493b8328

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un208983.exe

    Filesize

    558KB

    MD5

    f19cf56e823825e52167af09bfac14d7

    SHA1

    c17a703fb83bea5a6cd98de5222e594382a561eb

    SHA256

    d2ba98812e9a3827fcffc75b5970c31d2e2ccef1da3d0eca45edeff776d9cea3

    SHA512

    a9736bdeeb883abea3ef7cf584dedd1d92154000b80c04a69d9302e657b920df22c375c89bebfbf3eec738b495fda6d0005c9dfe10d8a2a0136de4fe5e1192b8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un208983.exe

    Filesize

    558KB

    MD5

    f19cf56e823825e52167af09bfac14d7

    SHA1

    c17a703fb83bea5a6cd98de5222e594382a561eb

    SHA256

    d2ba98812e9a3827fcffc75b5970c31d2e2ccef1da3d0eca45edeff776d9cea3

    SHA512

    a9736bdeeb883abea3ef7cf584dedd1d92154000b80c04a69d9302e657b920df22c375c89bebfbf3eec738b495fda6d0005c9dfe10d8a2a0136de4fe5e1192b8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8942.exe

    Filesize

    307KB

    MD5

    d363477c7ea4432957c71620d690809d

    SHA1

    19d9eb0329186b24ea6226c5e02ee1bd8590bb4f

    SHA256

    9f87f09611ed1ce09d8e881332efd3e675a127a4077af2063b811e493f3b0111

    SHA512

    7b0d6e5122132950408450e5d81405fa62cce4ba5b7b5fd51467a6180a25552ba8a95f73ac4a6cdabf409982819cf58fe36853dd5f0af028d0325579f3cb0f2e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8942.exe

    Filesize

    307KB

    MD5

    d363477c7ea4432957c71620d690809d

    SHA1

    19d9eb0329186b24ea6226c5e02ee1bd8590bb4f

    SHA256

    9f87f09611ed1ce09d8e881332efd3e675a127a4077af2063b811e493f3b0111

    SHA512

    7b0d6e5122132950408450e5d81405fa62cce4ba5b7b5fd51467a6180a25552ba8a95f73ac4a6cdabf409982819cf58fe36853dd5f0af028d0325579f3cb0f2e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9943.exe

    Filesize

    365KB

    MD5

    335ec85cf37a4f257935937dc4c3952c

    SHA1

    810f41e5cd02f09460df8ffdebb03452ca290dfc

    SHA256

    8de17f885c9ab72b6809889e0c69a81d0772a7e4d0d97a5be8e9b500212d0afd

    SHA512

    075da49e25b3bd6f7c90828a0730b08316546a0f689927cd4cfd84fb47fc79b357d5fcf0ddcabb94d8fbfd7616ecf530b230b4cdc80b24d34b59514e63871ae0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9943.exe

    Filesize

    365KB

    MD5

    335ec85cf37a4f257935937dc4c3952c

    SHA1

    810f41e5cd02f09460df8ffdebb03452ca290dfc

    SHA256

    8de17f885c9ab72b6809889e0c69a81d0772a7e4d0d97a5be8e9b500212d0afd

    SHA512

    075da49e25b3bd6f7c90828a0730b08316546a0f689927cd4cfd84fb47fc79b357d5fcf0ddcabb94d8fbfd7616ecf530b230b4cdc80b24d34b59514e63871ae0

  • memory/3508-1117-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/3508-1116-0x0000000004C50000-0x0000000004C9B000-memory.dmp

    Filesize

    300KB

  • memory/3508-1115-0x0000000000210000-0x0000000000242000-memory.dmp

    Filesize

    200KB

  • memory/3664-1093-0x0000000005840000-0x0000000005E46000-memory.dmp

    Filesize

    6.0MB

  • memory/3664-1096-0x0000000005410000-0x000000000544E000-memory.dmp

    Filesize

    248KB

  • memory/3664-1109-0x0000000002700000-0x0000000002710000-memory.dmp

    Filesize

    64KB

  • memory/3664-1108-0x0000000008130000-0x0000000008180000-memory.dmp

    Filesize

    320KB

  • memory/3664-1107-0x00000000080A0000-0x0000000008116000-memory.dmp

    Filesize

    472KB

  • memory/3664-1106-0x0000000006770000-0x0000000006C9C000-memory.dmp

    Filesize

    5.2MB

  • memory/3664-1105-0x00000000065A0000-0x0000000006762000-memory.dmp

    Filesize

    1.8MB

  • memory/3664-1104-0x0000000005790000-0x00000000057F6000-memory.dmp

    Filesize

    408KB

  • memory/3664-1103-0x00000000056F0000-0x0000000005782000-memory.dmp

    Filesize

    584KB

  • memory/3664-1102-0x0000000002700000-0x0000000002710000-memory.dmp

    Filesize

    64KB

  • memory/3664-1100-0x0000000002700000-0x0000000002710000-memory.dmp

    Filesize

    64KB

  • memory/3664-1101-0x0000000002700000-0x0000000002710000-memory.dmp

    Filesize

    64KB

  • memory/3664-1098-0x0000000002700000-0x0000000002710000-memory.dmp

    Filesize

    64KB

  • memory/3664-1097-0x0000000005560000-0x00000000055AB000-memory.dmp

    Filesize

    300KB

  • memory/3664-1095-0x00000000053F0000-0x0000000005402000-memory.dmp

    Filesize

    72KB

  • memory/3664-1094-0x00000000052B0000-0x00000000053BA000-memory.dmp

    Filesize

    1.0MB

  • memory/3664-308-0x0000000002700000-0x0000000002710000-memory.dmp

    Filesize

    64KB

  • memory/3664-312-0x0000000002700000-0x0000000002710000-memory.dmp

    Filesize

    64KB

  • memory/3664-311-0x0000000002700000-0x0000000002710000-memory.dmp

    Filesize

    64KB

  • memory/3664-307-0x0000000000800000-0x000000000084B000-memory.dmp

    Filesize

    300KB

  • memory/3664-216-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3664-214-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3664-181-0x00000000026C0000-0x0000000002706000-memory.dmp

    Filesize

    280KB

  • memory/3664-182-0x00000000051D0000-0x0000000005214000-memory.dmp

    Filesize

    272KB

  • memory/3664-183-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3664-184-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3664-186-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3664-188-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3664-190-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3664-192-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3664-194-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3664-196-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3664-198-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3664-200-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3664-202-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3664-204-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3664-206-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3664-208-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3664-210-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/3664-212-0x00000000051D0000-0x000000000520F000-memory.dmp

    Filesize

    252KB

  • memory/4164-164-0x00000000023E0000-0x00000000023F2000-memory.dmp

    Filesize

    72KB

  • memory/4164-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4164-142-0x00000000009F0000-0x0000000000A00000-memory.dmp

    Filesize

    64KB

  • memory/4164-174-0x00000000009F0000-0x0000000000A00000-memory.dmp

    Filesize

    64KB

  • memory/4164-173-0x00000000009F0000-0x0000000000A00000-memory.dmp

    Filesize

    64KB

  • memory/4164-172-0x00000000009F0000-0x0000000000A00000-memory.dmp

    Filesize

    64KB

  • memory/4164-141-0x00000000009F0000-0x0000000000A00000-memory.dmp

    Filesize

    64KB

  • memory/4164-171-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4164-170-0x00000000023E0000-0x00000000023F2000-memory.dmp

    Filesize

    72KB

  • memory/4164-144-0x00000000023E0000-0x00000000023F2000-memory.dmp

    Filesize

    72KB

  • memory/4164-168-0x00000000023E0000-0x00000000023F2000-memory.dmp

    Filesize

    72KB

  • memory/4164-166-0x00000000023E0000-0x00000000023F2000-memory.dmp

    Filesize

    72KB

  • memory/4164-176-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/4164-143-0x00000000023E0000-0x00000000023F2000-memory.dmp

    Filesize

    72KB

  • memory/4164-146-0x00000000023E0000-0x00000000023F2000-memory.dmp

    Filesize

    72KB

  • memory/4164-158-0x00000000023E0000-0x00000000023F2000-memory.dmp

    Filesize

    72KB

  • memory/4164-156-0x00000000023E0000-0x00000000023F2000-memory.dmp

    Filesize

    72KB

  • memory/4164-154-0x00000000023E0000-0x00000000023F2000-memory.dmp

    Filesize

    72KB

  • memory/4164-152-0x00000000023E0000-0x00000000023F2000-memory.dmp

    Filesize

    72KB

  • memory/4164-150-0x00000000023E0000-0x00000000023F2000-memory.dmp

    Filesize

    72KB

  • memory/4164-148-0x00000000023E0000-0x00000000023F2000-memory.dmp

    Filesize

    72KB

  • memory/4164-160-0x00000000023E0000-0x00000000023F2000-memory.dmp

    Filesize

    72KB

  • memory/4164-140-0x00000000009F0000-0x0000000000A00000-memory.dmp

    Filesize

    64KB

  • memory/4164-139-0x00000000023E0000-0x00000000023F8000-memory.dmp

    Filesize

    96KB

  • memory/4164-138-0x0000000004D30000-0x000000000522E000-memory.dmp

    Filesize

    5.0MB

  • memory/4164-137-0x00000000009D0000-0x00000000009EA000-memory.dmp

    Filesize

    104KB

  • memory/4164-162-0x00000000023E0000-0x00000000023F2000-memory.dmp

    Filesize

    72KB