Analysis

  • max time kernel
    53s
  • max time network
    71s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 00:07

General

  • Target

    8639fc97db74b01a65913f3d3d588113f306e128ef57e1ac891106941341bb08.exe

  • Size

    700KB

  • MD5

    016bc34dcb7c32da11b6a937950ec552

  • SHA1

    eac4e3284fbb84edb51e96588bfd2b4fb2aa70e8

  • SHA256

    8639fc97db74b01a65913f3d3d588113f306e128ef57e1ac891106941341bb08

  • SHA512

    b657fdfabf2ad1969de3600588f396d89792fc82c30eecc28933c30605759b4bae65a0110554c342aa8e168201c5dd43cee93b4615485f78c8b1d4ed5fe41cfa

  • SSDEEP

    12288:0Mrly90YiIy7z0k2GLEgoDGTa9DGjcAy8F/D7ebft+Her1AtrM0tSt:Ry7pgseEgoDGTPy8hDb+ZARM0tSt

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8639fc97db74b01a65913f3d3d588113f306e128ef57e1ac891106941341bb08.exe
    "C:\Users\Admin\AppData\Local\Temp\8639fc97db74b01a65913f3d3d588113f306e128ef57e1ac891106941341bb08.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3240
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un011773.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un011773.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3276
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2484.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2484.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3748
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0430.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0430.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3160
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si694202.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si694202.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4612

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si694202.exe

    Filesize

    175KB

    MD5

    11a8be6616a70ea6e50e6d3952ac4543

    SHA1

    c2f62334ce20e206c6face162801f1ba0af3b877

    SHA256

    22c09933249ebca44b3b01a7ae97ad79386bc9e6a3b1ed2c2342d4facf4d90ac

    SHA512

    782f26ffbe2f288b952e95078f98a694eef59b473729ac47fb99708618544d316f165e4fafbe4779f0ba58bf06aae9a7c9eec8e7f44f14dc094612b383a62e49

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si694202.exe

    Filesize

    175KB

    MD5

    11a8be6616a70ea6e50e6d3952ac4543

    SHA1

    c2f62334ce20e206c6face162801f1ba0af3b877

    SHA256

    22c09933249ebca44b3b01a7ae97ad79386bc9e6a3b1ed2c2342d4facf4d90ac

    SHA512

    782f26ffbe2f288b952e95078f98a694eef59b473729ac47fb99708618544d316f165e4fafbe4779f0ba58bf06aae9a7c9eec8e7f44f14dc094612b383a62e49

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un011773.exe

    Filesize

    558KB

    MD5

    896981a830a7630dd6dc99032cd10766

    SHA1

    7c15fa05fdb8287b267c24d675810505d4999555

    SHA256

    8f614565bbc5bbd9828e7b8a22dde88f5f55a7cd5c69a3bc12d5dd396428a8a5

    SHA512

    8fd663c4c7ea737b0b70ca635dc0d07ccb8e2c5d394ec34ffbb8fa05acd0045adca80799f6fbf02db7f64397aa06f6d6c4ccf00749595604778cf8d3308e51ec

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un011773.exe

    Filesize

    558KB

    MD5

    896981a830a7630dd6dc99032cd10766

    SHA1

    7c15fa05fdb8287b267c24d675810505d4999555

    SHA256

    8f614565bbc5bbd9828e7b8a22dde88f5f55a7cd5c69a3bc12d5dd396428a8a5

    SHA512

    8fd663c4c7ea737b0b70ca635dc0d07ccb8e2c5d394ec34ffbb8fa05acd0045adca80799f6fbf02db7f64397aa06f6d6c4ccf00749595604778cf8d3308e51ec

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2484.exe

    Filesize

    307KB

    MD5

    5a5eecb5af458209ac84133e44a777d8

    SHA1

    d7531342abdfe9f6091b0af18c0085f0797cfe19

    SHA256

    a59f884f3e3b1fb00c799c58dd1e20838b6cadb62155135ddba68f92d70e6fff

    SHA512

    a559b1846a1538ec89012a6281d4e2ac58ad1c42cd94c98dc8fb17af7f100d2a6bf3f28996bbe5b9acaa8e2cc08317ef138f590e15870bc7bb06b6c10be202ee

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2484.exe

    Filesize

    307KB

    MD5

    5a5eecb5af458209ac84133e44a777d8

    SHA1

    d7531342abdfe9f6091b0af18c0085f0797cfe19

    SHA256

    a59f884f3e3b1fb00c799c58dd1e20838b6cadb62155135ddba68f92d70e6fff

    SHA512

    a559b1846a1538ec89012a6281d4e2ac58ad1c42cd94c98dc8fb17af7f100d2a6bf3f28996bbe5b9acaa8e2cc08317ef138f590e15870bc7bb06b6c10be202ee

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0430.exe

    Filesize

    365KB

    MD5

    896337b92a65507b8e8c79cffcb743ac

    SHA1

    b652ea48e61384a7d356da3695bc60dd16a84bef

    SHA256

    93f53d37328cf520d57b18d071bd165ebf5701a480c2b1df7f5f4a045afa01ef

    SHA512

    ebcd84ad491edaf2712ed606a9f49b68bcb436603502d5253d8f762eda7e4a8d366a832028799f79ace6e0b6f0509282ee07f6f4bdec24380afaf29a75b1d821

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0430.exe

    Filesize

    365KB

    MD5

    896337b92a65507b8e8c79cffcb743ac

    SHA1

    b652ea48e61384a7d356da3695bc60dd16a84bef

    SHA256

    93f53d37328cf520d57b18d071bd165ebf5701a480c2b1df7f5f4a045afa01ef

    SHA512

    ebcd84ad491edaf2712ed606a9f49b68bcb436603502d5253d8f762eda7e4a8d366a832028799f79ace6e0b6f0509282ee07f6f4bdec24380afaf29a75b1d821

  • memory/3160-1092-0x0000000005980000-0x0000000005F86000-memory.dmp

    Filesize

    6.0MB

  • memory/3160-219-0x0000000002860000-0x000000000289F000-memory.dmp

    Filesize

    252KB

  • memory/3160-1108-0x0000000008200000-0x0000000008250000-memory.dmp

    Filesize

    320KB

  • memory/3160-1107-0x0000000002240000-0x00000000022B6000-memory.dmp

    Filesize

    472KB

  • memory/3160-1106-0x00000000028A0000-0x00000000028B0000-memory.dmp

    Filesize

    64KB

  • memory/3160-197-0x0000000002860000-0x000000000289F000-memory.dmp

    Filesize

    252KB

  • memory/3160-1105-0x0000000006A10000-0x0000000006F3C000-memory.dmp

    Filesize

    5.2MB

  • memory/3160-1104-0x0000000006830000-0x00000000069F2000-memory.dmp

    Filesize

    1.8MB

  • memory/3160-1103-0x00000000028A0000-0x00000000028B0000-memory.dmp

    Filesize

    64KB

  • memory/3160-1102-0x00000000028A0000-0x00000000028B0000-memory.dmp

    Filesize

    64KB

  • memory/3160-200-0x00000000028A0000-0x00000000028B0000-memory.dmp

    Filesize

    64KB

  • memory/3160-1101-0x00000000028A0000-0x00000000028B0000-memory.dmp

    Filesize

    64KB

  • memory/3160-1099-0x0000000006510000-0x00000000065A2000-memory.dmp

    Filesize

    584KB

  • memory/3160-1098-0x0000000005830000-0x0000000005896000-memory.dmp

    Filesize

    408KB

  • memory/3160-1097-0x00000000028A0000-0x00000000028B0000-memory.dmp

    Filesize

    64KB

  • memory/3160-1096-0x00000000056A0000-0x00000000056EB000-memory.dmp

    Filesize

    300KB

  • memory/3160-1095-0x0000000005550000-0x000000000558E000-memory.dmp

    Filesize

    248KB

  • memory/3160-1094-0x0000000005530000-0x0000000005542000-memory.dmp

    Filesize

    72KB

  • memory/3160-1093-0x00000000053F0000-0x00000000054FA000-memory.dmp

    Filesize

    1.0MB

  • memory/3160-205-0x0000000002860000-0x000000000289F000-memory.dmp

    Filesize

    252KB

  • memory/3160-217-0x0000000002860000-0x000000000289F000-memory.dmp

    Filesize

    252KB

  • memory/3160-215-0x0000000002860000-0x000000000289F000-memory.dmp

    Filesize

    252KB

  • memory/3160-213-0x0000000002860000-0x000000000289F000-memory.dmp

    Filesize

    252KB

  • memory/3160-211-0x0000000002860000-0x000000000289F000-memory.dmp

    Filesize

    252KB

  • memory/3160-209-0x0000000002860000-0x000000000289F000-memory.dmp

    Filesize

    252KB

  • memory/3160-180-0x0000000002430000-0x0000000002476000-memory.dmp

    Filesize

    280KB

  • memory/3160-181-0x0000000002860000-0x00000000028A4000-memory.dmp

    Filesize

    272KB

  • memory/3160-183-0x0000000002860000-0x000000000289F000-memory.dmp

    Filesize

    252KB

  • memory/3160-182-0x0000000002860000-0x000000000289F000-memory.dmp

    Filesize

    252KB

  • memory/3160-195-0x0000000002860000-0x000000000289F000-memory.dmp

    Filesize

    252KB

  • memory/3160-187-0x0000000002860000-0x000000000289F000-memory.dmp

    Filesize

    252KB

  • memory/3160-189-0x0000000002860000-0x000000000289F000-memory.dmp

    Filesize

    252KB

  • memory/3160-191-0x0000000002860000-0x000000000289F000-memory.dmp

    Filesize

    252KB

  • memory/3160-193-0x0000000002860000-0x000000000289F000-memory.dmp

    Filesize

    252KB

  • memory/3160-185-0x0000000002860000-0x000000000289F000-memory.dmp

    Filesize

    252KB

  • memory/3160-207-0x0000000002860000-0x000000000289F000-memory.dmp

    Filesize

    252KB

  • memory/3160-204-0x00000000028A0000-0x00000000028B0000-memory.dmp

    Filesize

    64KB

  • memory/3160-201-0x0000000002860000-0x000000000289F000-memory.dmp

    Filesize

    252KB

  • memory/3160-202-0x00000000028A0000-0x00000000028B0000-memory.dmp

    Filesize

    64KB

  • memory/3160-199-0x0000000000720000-0x000000000076B000-memory.dmp

    Filesize

    300KB

  • memory/3748-170-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/3748-155-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/3748-145-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/3748-138-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/3748-140-0x0000000002640000-0x0000000002650000-memory.dmp

    Filesize

    64KB

  • memory/3748-175-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/3748-173-0x0000000002640000-0x0000000002650000-memory.dmp

    Filesize

    64KB

  • memory/3748-172-0x0000000002640000-0x0000000002650000-memory.dmp

    Filesize

    64KB

  • memory/3748-171-0x0000000002640000-0x0000000002650000-memory.dmp

    Filesize

    64KB

  • memory/3748-137-0x00000000027F0000-0x0000000002808000-memory.dmp

    Filesize

    96KB

  • memory/3748-139-0x0000000002640000-0x0000000002650000-memory.dmp

    Filesize

    64KB

  • memory/3748-169-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/3748-167-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/3748-165-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/3748-163-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/3748-161-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/3748-159-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/3748-157-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/3748-153-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/3748-151-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/3748-149-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/3748-147-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/3748-143-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/3748-142-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/3748-141-0x0000000002640000-0x0000000002650000-memory.dmp

    Filesize

    64KB

  • memory/3748-136-0x0000000004C70000-0x000000000516E000-memory.dmp

    Filesize

    5.0MB

  • memory/3748-135-0x0000000002650000-0x000000000266A000-memory.dmp

    Filesize

    104KB

  • memory/4612-1114-0x0000000000460000-0x0000000000492000-memory.dmp

    Filesize

    200KB

  • memory/4612-1115-0x0000000004D60000-0x0000000004DAB000-memory.dmp

    Filesize

    300KB

  • memory/4612-1116-0x0000000005000000-0x0000000005010000-memory.dmp

    Filesize

    64KB