Analysis

  • max time kernel
    52s
  • max time network
    69s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 00:12

General

  • Target

    4700331e8a9cc0b72e5f247fadc958b5d05db10ccc69e1942bf1889a1459cdfd.exe

  • Size

    700KB

  • MD5

    89af4f67653f2867d4f1bcf216f2a0f4

  • SHA1

    ea4940b6ad10a85fe6159b8d20917a22c5a89a6b

  • SHA256

    4700331e8a9cc0b72e5f247fadc958b5d05db10ccc69e1942bf1889a1459cdfd

  • SHA512

    3ddadc3ea634dbb463e1e79632aea5af1051aac249765a83189aa625a994451e0fca4d57c58be519ea15f9d2dc2fda60530bd88cc74201af6a73a21661c0f13e

  • SSDEEP

    12288:nMrJy90rEqaG+FfFmmI09kc+1VpFQHm/5ovNMj5X4rWs5FNj7xvg1IvM4DKZG7:OyEnV+xAnnBZ5XoFNHxY1IvM4DKZs

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4700331e8a9cc0b72e5f247fadc958b5d05db10ccc69e1942bf1889a1459cdfd.exe
    "C:\Users\Admin\AppData\Local\Temp\4700331e8a9cc0b72e5f247fadc958b5d05db10ccc69e1942bf1889a1459cdfd.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1884
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un724873.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un724873.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2176
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5528.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5528.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2300
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9037.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9037.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4616
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si460152.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si460152.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:8

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si460152.exe
    Filesize

    175KB

    MD5

    249315c73fdd81a741ba8dd80a428a78

    SHA1

    c3ee37f4cab3908bf5f64481a7a89f272e6f7e9c

    SHA256

    54dedd2264f042040634189ad7b8b63e8d7029306961dd129aa15de03004e935

    SHA512

    ad0115ef359ffdfcbd92a7086d0922df8ae81c11034106a0533698ca1db6dc99bf4e0e5b461b5db675c5f079ef264fdbdebebb84923b5256d86a0c1fe2a4c38f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si460152.exe
    Filesize

    175KB

    MD5

    249315c73fdd81a741ba8dd80a428a78

    SHA1

    c3ee37f4cab3908bf5f64481a7a89f272e6f7e9c

    SHA256

    54dedd2264f042040634189ad7b8b63e8d7029306961dd129aa15de03004e935

    SHA512

    ad0115ef359ffdfcbd92a7086d0922df8ae81c11034106a0533698ca1db6dc99bf4e0e5b461b5db675c5f079ef264fdbdebebb84923b5256d86a0c1fe2a4c38f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un724873.exe
    Filesize

    558KB

    MD5

    b712c367b060e4e4351ed37ee0e60d88

    SHA1

    bc8d0ceffa0e20bd4c0582ef276e3b9f9f1a55c3

    SHA256

    4dc36e10e7a846c2bf543e969fbba3cc325ce38d0a8babde3be21876c540c544

    SHA512

    2575421994a33b65fe2484d9c0233128e9d7dedbaffba0e8104b35d6e954d259eebcc976588c1ed68f1cbdf8a3913bd300f04e3983d256f690ece51dce9a4462

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un724873.exe
    Filesize

    558KB

    MD5

    b712c367b060e4e4351ed37ee0e60d88

    SHA1

    bc8d0ceffa0e20bd4c0582ef276e3b9f9f1a55c3

    SHA256

    4dc36e10e7a846c2bf543e969fbba3cc325ce38d0a8babde3be21876c540c544

    SHA512

    2575421994a33b65fe2484d9c0233128e9d7dedbaffba0e8104b35d6e954d259eebcc976588c1ed68f1cbdf8a3913bd300f04e3983d256f690ece51dce9a4462

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5528.exe
    Filesize

    307KB

    MD5

    5ac88b976a128a596d95279d9e2595d6

    SHA1

    1461f4cd830ae52521eddffed63d99ed82e4c454

    SHA256

    5da2f36920ec97f722020620090c8e6d6a3a1bf5fc2aa513075e21843c321ac3

    SHA512

    dfab94c8ef0fe9ed7ecabd68fe2c12ac041af025d1afde8d43b3d7c6dabab4eabc4c2b14684f3f41bc39db65b086a67367c1c69f3f2e691b00860a3c230961b0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5528.exe
    Filesize

    307KB

    MD5

    5ac88b976a128a596d95279d9e2595d6

    SHA1

    1461f4cd830ae52521eddffed63d99ed82e4c454

    SHA256

    5da2f36920ec97f722020620090c8e6d6a3a1bf5fc2aa513075e21843c321ac3

    SHA512

    dfab94c8ef0fe9ed7ecabd68fe2c12ac041af025d1afde8d43b3d7c6dabab4eabc4c2b14684f3f41bc39db65b086a67367c1c69f3f2e691b00860a3c230961b0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9037.exe
    Filesize

    365KB

    MD5

    40024788432e28f02c3b7efa396f5c31

    SHA1

    4b3e748f0fe2c07edbad033fe92e5e03eaff0a2a

    SHA256

    9da5f88066a9b100099b0ff7ecb8e3ac0e65014a46a441c1eb4c4d59eaf12e67

    SHA512

    3793782328c6a1c8a3ac88b4acc272c9d1b7675590307f71bb0cb81c09f8da8d9921cb39c2cf6d85588b0d16f281d49318fd5464373cedd5da41a38dbc75eef4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9037.exe
    Filesize

    365KB

    MD5

    40024788432e28f02c3b7efa396f5c31

    SHA1

    4b3e748f0fe2c07edbad033fe92e5e03eaff0a2a

    SHA256

    9da5f88066a9b100099b0ff7ecb8e3ac0e65014a46a441c1eb4c4d59eaf12e67

    SHA512

    3793782328c6a1c8a3ac88b4acc272c9d1b7675590307f71bb0cb81c09f8da8d9921cb39c2cf6d85588b0d16f281d49318fd5464373cedd5da41a38dbc75eef4

  • memory/8-1112-0x0000000000A30000-0x0000000000A62000-memory.dmp
    Filesize

    200KB

  • memory/8-1113-0x0000000005470000-0x00000000054BB000-memory.dmp
    Filesize

    300KB

  • memory/8-1114-0x0000000005660000-0x0000000005670000-memory.dmp
    Filesize

    64KB

  • memory/2300-145-0x0000000002900000-0x0000000002912000-memory.dmp
    Filesize

    72KB

  • memory/2300-158-0x0000000004DD0000-0x0000000004DE0000-memory.dmp
    Filesize

    64KB

  • memory/2300-140-0x0000000002900000-0x0000000002912000-memory.dmp
    Filesize

    72KB

  • memory/2300-141-0x0000000002900000-0x0000000002912000-memory.dmp
    Filesize

    72KB

  • memory/2300-143-0x0000000002900000-0x0000000002912000-memory.dmp
    Filesize

    72KB

  • memory/2300-138-0x0000000004DE0000-0x00000000052DE000-memory.dmp
    Filesize

    5.0MB

  • memory/2300-147-0x0000000002900000-0x0000000002912000-memory.dmp
    Filesize

    72KB

  • memory/2300-149-0x0000000002900000-0x0000000002912000-memory.dmp
    Filesize

    72KB

  • memory/2300-151-0x0000000002900000-0x0000000002912000-memory.dmp
    Filesize

    72KB

  • memory/2300-153-0x0000000002900000-0x0000000002912000-memory.dmp
    Filesize

    72KB

  • memory/2300-155-0x0000000002900000-0x0000000002912000-memory.dmp
    Filesize

    72KB

  • memory/2300-139-0x0000000002900000-0x0000000002918000-memory.dmp
    Filesize

    96KB

  • memory/2300-157-0x0000000002900000-0x0000000002912000-memory.dmp
    Filesize

    72KB

  • memory/2300-160-0x0000000004DD0000-0x0000000004DE0000-memory.dmp
    Filesize

    64KB

  • memory/2300-162-0x0000000004DD0000-0x0000000004DE0000-memory.dmp
    Filesize

    64KB

  • memory/2300-161-0x0000000002900000-0x0000000002912000-memory.dmp
    Filesize

    72KB

  • memory/2300-164-0x0000000002900000-0x0000000002912000-memory.dmp
    Filesize

    72KB

  • memory/2300-166-0x0000000002900000-0x0000000002912000-memory.dmp
    Filesize

    72KB

  • memory/2300-168-0x0000000002900000-0x0000000002912000-memory.dmp
    Filesize

    72KB

  • memory/2300-170-0x0000000002900000-0x0000000002912000-memory.dmp
    Filesize

    72KB

  • memory/2300-171-0x0000000000400000-0x000000000070F000-memory.dmp
    Filesize

    3.1MB

  • memory/2300-173-0x0000000000400000-0x000000000070F000-memory.dmp
    Filesize

    3.1MB

  • memory/2300-137-0x00000000022F0000-0x000000000230A000-memory.dmp
    Filesize

    104KB

  • memory/2300-136-0x0000000000710000-0x000000000073D000-memory.dmp
    Filesize

    180KB

  • memory/4616-181-0x0000000004CE0000-0x0000000004CF0000-memory.dmp
    Filesize

    64KB

  • memory/4616-213-0x0000000004CA0000-0x0000000004CDF000-memory.dmp
    Filesize

    252KB

  • memory/4616-183-0x0000000004CA0000-0x0000000004CDF000-memory.dmp
    Filesize

    252KB

  • memory/4616-185-0x0000000004CA0000-0x0000000004CDF000-memory.dmp
    Filesize

    252KB

  • memory/4616-187-0x0000000004CA0000-0x0000000004CDF000-memory.dmp
    Filesize

    252KB

  • memory/4616-184-0x0000000004CE0000-0x0000000004CF0000-memory.dmp
    Filesize

    64KB

  • memory/4616-182-0x0000000004CE0000-0x0000000004CF0000-memory.dmp
    Filesize

    64KB

  • memory/4616-189-0x0000000004CA0000-0x0000000004CDF000-memory.dmp
    Filesize

    252KB

  • memory/4616-191-0x0000000004CA0000-0x0000000004CDF000-memory.dmp
    Filesize

    252KB

  • memory/4616-193-0x0000000004CA0000-0x0000000004CDF000-memory.dmp
    Filesize

    252KB

  • memory/4616-195-0x0000000004CA0000-0x0000000004CDF000-memory.dmp
    Filesize

    252KB

  • memory/4616-197-0x0000000004CA0000-0x0000000004CDF000-memory.dmp
    Filesize

    252KB

  • memory/4616-199-0x0000000004CA0000-0x0000000004CDF000-memory.dmp
    Filesize

    252KB

  • memory/4616-201-0x0000000004CA0000-0x0000000004CDF000-memory.dmp
    Filesize

    252KB

  • memory/4616-203-0x0000000004CA0000-0x0000000004CDF000-memory.dmp
    Filesize

    252KB

  • memory/4616-205-0x0000000004CA0000-0x0000000004CDF000-memory.dmp
    Filesize

    252KB

  • memory/4616-207-0x0000000004CA0000-0x0000000004CDF000-memory.dmp
    Filesize

    252KB

  • memory/4616-209-0x0000000004CA0000-0x0000000004CDF000-memory.dmp
    Filesize

    252KB

  • memory/4616-211-0x0000000004CA0000-0x0000000004CDF000-memory.dmp
    Filesize

    252KB

  • memory/4616-180-0x0000000000900000-0x000000000094B000-memory.dmp
    Filesize

    300KB

  • memory/4616-215-0x0000000004CA0000-0x0000000004CDF000-memory.dmp
    Filesize

    252KB

  • memory/4616-217-0x0000000004CA0000-0x0000000004CDF000-memory.dmp
    Filesize

    252KB

  • memory/4616-1090-0x0000000005980000-0x0000000005F86000-memory.dmp
    Filesize

    6.0MB

  • memory/4616-1091-0x00000000053F0000-0x00000000054FA000-memory.dmp
    Filesize

    1.0MB

  • memory/4616-1092-0x0000000005530000-0x0000000005542000-memory.dmp
    Filesize

    72KB

  • memory/4616-1093-0x0000000005550000-0x000000000558E000-memory.dmp
    Filesize

    248KB

  • memory/4616-1094-0x00000000056A0000-0x00000000056EB000-memory.dmp
    Filesize

    300KB

  • memory/4616-1095-0x0000000004CE0000-0x0000000004CF0000-memory.dmp
    Filesize

    64KB

  • memory/4616-1097-0x0000000005830000-0x00000000058C2000-memory.dmp
    Filesize

    584KB

  • memory/4616-1098-0x00000000058D0000-0x0000000005936000-memory.dmp
    Filesize

    408KB

  • memory/4616-1099-0x0000000004CE0000-0x0000000004CF0000-memory.dmp
    Filesize

    64KB

  • memory/4616-1100-0x0000000004CE0000-0x0000000004CF0000-memory.dmp
    Filesize

    64KB

  • memory/4616-1101-0x0000000004CE0000-0x0000000004CF0000-memory.dmp
    Filesize

    64KB

  • memory/4616-1102-0x00000000066E0000-0x00000000068A2000-memory.dmp
    Filesize

    1.8MB

  • memory/4616-1103-0x00000000068C0000-0x0000000006DEC000-memory.dmp
    Filesize

    5.2MB

  • memory/4616-179-0x0000000004CA0000-0x0000000004CE4000-memory.dmp
    Filesize

    272KB

  • memory/4616-178-0x0000000004C20000-0x0000000004C66000-memory.dmp
    Filesize

    280KB

  • memory/4616-1104-0x0000000004CE0000-0x0000000004CF0000-memory.dmp
    Filesize

    64KB

  • memory/4616-1105-0x0000000008210000-0x0000000008286000-memory.dmp
    Filesize

    472KB

  • memory/4616-1106-0x00000000082A0000-0x00000000082F0000-memory.dmp
    Filesize

    320KB