Analysis

  • max time kernel
    144s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 00:10

General

  • Target

    ad742900a2401bdf38005e834e7f9ef45ec5904ef9234126cd7748679eaec096.exe

  • Size

    700KB

  • MD5

    534dd6d182950f2c33dd6a4b95c8ba5f

  • SHA1

    49537e779c94e07b73b3df96e5ae25537e78ee8b

  • SHA256

    ad742900a2401bdf38005e834e7f9ef45ec5904ef9234126cd7748679eaec096

  • SHA512

    b2e223bf3666eccb230e44b754afd7fa4ded0a1107e5d49c202be1c149d3d261bffd2d3bb4f707b9a8113ca8e7ca725e43e57a89c44cc5e0c971f62b260af334

  • SSDEEP

    12288:kMrly905HCX5MgCcaisl2LA9D/scAQDNTqKadHM7PHB2+V7Zdwc:hywH4PaiSEcqTi7pFfec

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 22 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad742900a2401bdf38005e834e7f9ef45ec5904ef9234126cd7748679eaec096.exe
    "C:\Users\Admin\AppData\Local\Temp\ad742900a2401bdf38005e834e7f9ef45ec5904ef9234126cd7748679eaec096.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:368
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un627165.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un627165.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1172
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6369.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6369.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1384
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9398.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9398.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4228
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si508124.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si508124.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3780

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si508124.exe

    Filesize

    175KB

    MD5

    3d634df736615c0cf8b72449b5c82900

    SHA1

    c289c4ec638a8d67c04d15a1c166198cf51bdeca

    SHA256

    b3e2a50e88889e45b3276bca82d7a8a5ec2b9a463c91212a3528a734bb566837

    SHA512

    f5abb6450fb41957a3195e632aee7a36ba56252e79bd2a573288796d1b90ad9e029f63e1a0afa82b7cb3276d17942b9440d5f2069ce0ce1338eb18cd97209a53

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si508124.exe

    Filesize

    175KB

    MD5

    3d634df736615c0cf8b72449b5c82900

    SHA1

    c289c4ec638a8d67c04d15a1c166198cf51bdeca

    SHA256

    b3e2a50e88889e45b3276bca82d7a8a5ec2b9a463c91212a3528a734bb566837

    SHA512

    f5abb6450fb41957a3195e632aee7a36ba56252e79bd2a573288796d1b90ad9e029f63e1a0afa82b7cb3276d17942b9440d5f2069ce0ce1338eb18cd97209a53

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un627165.exe

    Filesize

    558KB

    MD5

    6b5e31b3572b71944792c2af26843fab

    SHA1

    a06d62b84969810bbd42ea2cfc0adb999bea78fb

    SHA256

    df1abe5235a07790284e2ec9e10dc1e86124aca085296c9e66c0a0bdd657af79

    SHA512

    5160a151100f1a0c60a89949e55c43a6b3eeee51f9bbc2051ad0c5c51291d37e35bfc5a6f373b15c6a388f3bf6d1a56352670b318309fc268c7258650b181592

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un627165.exe

    Filesize

    558KB

    MD5

    6b5e31b3572b71944792c2af26843fab

    SHA1

    a06d62b84969810bbd42ea2cfc0adb999bea78fb

    SHA256

    df1abe5235a07790284e2ec9e10dc1e86124aca085296c9e66c0a0bdd657af79

    SHA512

    5160a151100f1a0c60a89949e55c43a6b3eeee51f9bbc2051ad0c5c51291d37e35bfc5a6f373b15c6a388f3bf6d1a56352670b318309fc268c7258650b181592

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6369.exe

    Filesize

    307KB

    MD5

    3ec460e72d4ceb97a82f5e48be0855dd

    SHA1

    dccf7f9cf406e3ffcae4af9dfa448be8d6961b51

    SHA256

    d05b7327c20f61b671e45f88000f68cb7c29a0a1cf4106c11f61ea7ed6186f73

    SHA512

    5724fc0e4c4ca8c74685167a19a365ff1b8e75eff2c02e0733fea7772d5d179033cdf8f001521e6edf28ce461d56fd332e72e1caed94863f1f368dc84adfd714

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6369.exe

    Filesize

    307KB

    MD5

    3ec460e72d4ceb97a82f5e48be0855dd

    SHA1

    dccf7f9cf406e3ffcae4af9dfa448be8d6961b51

    SHA256

    d05b7327c20f61b671e45f88000f68cb7c29a0a1cf4106c11f61ea7ed6186f73

    SHA512

    5724fc0e4c4ca8c74685167a19a365ff1b8e75eff2c02e0733fea7772d5d179033cdf8f001521e6edf28ce461d56fd332e72e1caed94863f1f368dc84adfd714

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9398.exe

    Filesize

    365KB

    MD5

    b8f7a39fc7ba067ae17ec5fee7b1ab6e

    SHA1

    8e2b3649d8ec7fb554b6f482f0e9f5a1544d2122

    SHA256

    bc6e27d19f8ed17bf418f257f5e254087a6eb4f678db120f14ea39e9ff451b5c

    SHA512

    cf4e9183432e1f5493b96fea5e5b6ce1d1060d335322330934a11f1bbdfa052d3039d4578742ba96a285fe5e2b88b56086a834cf076d56c1e21913ccc01c9e88

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9398.exe

    Filesize

    365KB

    MD5

    b8f7a39fc7ba067ae17ec5fee7b1ab6e

    SHA1

    8e2b3649d8ec7fb554b6f482f0e9f5a1544d2122

    SHA256

    bc6e27d19f8ed17bf418f257f5e254087a6eb4f678db120f14ea39e9ff451b5c

    SHA512

    cf4e9183432e1f5493b96fea5e5b6ce1d1060d335322330934a11f1bbdfa052d3039d4578742ba96a285fe5e2b88b56086a834cf076d56c1e21913ccc01c9e88

  • memory/1384-136-0x0000000000710000-0x000000000073D000-memory.dmp

    Filesize

    180KB

  • memory/1384-137-0x00000000023D0000-0x00000000023EA000-memory.dmp

    Filesize

    104KB

  • memory/1384-138-0x0000000000A10000-0x0000000000A20000-memory.dmp

    Filesize

    64KB

  • memory/1384-139-0x0000000000A10000-0x0000000000A20000-memory.dmp

    Filesize

    64KB

  • memory/1384-140-0x0000000004D50000-0x000000000524E000-memory.dmp

    Filesize

    5.0MB

  • memory/1384-141-0x00000000025D0000-0x00000000025E8000-memory.dmp

    Filesize

    96KB

  • memory/1384-143-0x00000000025D0000-0x00000000025E2000-memory.dmp

    Filesize

    72KB

  • memory/1384-142-0x00000000025D0000-0x00000000025E2000-memory.dmp

    Filesize

    72KB

  • memory/1384-145-0x00000000025D0000-0x00000000025E2000-memory.dmp

    Filesize

    72KB

  • memory/1384-147-0x00000000025D0000-0x00000000025E2000-memory.dmp

    Filesize

    72KB

  • memory/1384-149-0x00000000025D0000-0x00000000025E2000-memory.dmp

    Filesize

    72KB

  • memory/1384-151-0x00000000025D0000-0x00000000025E2000-memory.dmp

    Filesize

    72KB

  • memory/1384-153-0x00000000025D0000-0x00000000025E2000-memory.dmp

    Filesize

    72KB

  • memory/1384-155-0x00000000025D0000-0x00000000025E2000-memory.dmp

    Filesize

    72KB

  • memory/1384-157-0x00000000025D0000-0x00000000025E2000-memory.dmp

    Filesize

    72KB

  • memory/1384-159-0x00000000025D0000-0x00000000025E2000-memory.dmp

    Filesize

    72KB

  • memory/1384-161-0x00000000025D0000-0x00000000025E2000-memory.dmp

    Filesize

    72KB

  • memory/1384-163-0x00000000025D0000-0x00000000025E2000-memory.dmp

    Filesize

    72KB

  • memory/1384-165-0x00000000025D0000-0x00000000025E2000-memory.dmp

    Filesize

    72KB

  • memory/1384-167-0x00000000025D0000-0x00000000025E2000-memory.dmp

    Filesize

    72KB

  • memory/1384-169-0x00000000025D0000-0x00000000025E2000-memory.dmp

    Filesize

    72KB

  • memory/1384-170-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/1384-171-0x0000000000A10000-0x0000000000A20000-memory.dmp

    Filesize

    64KB

  • memory/1384-172-0x0000000000A10000-0x0000000000A20000-memory.dmp

    Filesize

    64KB

  • memory/1384-174-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/3780-1113-0x0000000000190000-0x00000000001C2000-memory.dmp

    Filesize

    200KB

  • memory/3780-1115-0x0000000004D90000-0x0000000004DA0000-memory.dmp

    Filesize

    64KB

  • memory/3780-1114-0x0000000004BD0000-0x0000000004C1B000-memory.dmp

    Filesize

    300KB

  • memory/4228-184-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/4228-303-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/4228-181-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/4228-186-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/4228-188-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/4228-190-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/4228-192-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/4228-194-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/4228-196-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/4228-198-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/4228-200-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/4228-202-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/4228-204-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/4228-206-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/4228-208-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/4228-210-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/4228-212-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/4228-214-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/4228-302-0x0000000000840000-0x000000000088B000-memory.dmp

    Filesize

    300KB

  • memory/4228-182-0x0000000004CB0000-0x0000000004CEF000-memory.dmp

    Filesize

    252KB

  • memory/4228-305-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/4228-307-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/4228-1091-0x0000000005280000-0x0000000005886000-memory.dmp

    Filesize

    6.0MB

  • memory/4228-1092-0x00000000058C0000-0x00000000059CA000-memory.dmp

    Filesize

    1.0MB

  • memory/4228-1093-0x0000000005A00000-0x0000000005A12000-memory.dmp

    Filesize

    72KB

  • memory/4228-1094-0x0000000005A20000-0x0000000005A5E000-memory.dmp

    Filesize

    248KB

  • memory/4228-1095-0x0000000005B70000-0x0000000005BBB000-memory.dmp

    Filesize

    300KB

  • memory/4228-1096-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/4228-1098-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/4228-1099-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/4228-1100-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/4228-1101-0x0000000005D00000-0x0000000005D92000-memory.dmp

    Filesize

    584KB

  • memory/4228-1102-0x0000000005DA0000-0x0000000005E06000-memory.dmp

    Filesize

    408KB

  • memory/4228-1103-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/4228-1104-0x00000000065A0000-0x0000000006616000-memory.dmp

    Filesize

    472KB

  • memory/4228-180-0x0000000004CB0000-0x0000000004CF4000-memory.dmp

    Filesize

    272KB

  • memory/4228-179-0x0000000002570000-0x00000000025B6000-memory.dmp

    Filesize

    280KB

  • memory/4228-1105-0x0000000006630000-0x0000000006680000-memory.dmp

    Filesize

    320KB

  • memory/4228-1106-0x00000000066A0000-0x0000000006862000-memory.dmp

    Filesize

    1.8MB

  • memory/4228-1107-0x0000000006870000-0x0000000006D9C000-memory.dmp

    Filesize

    5.2MB