Analysis

  • max time kernel
    101s
  • max time network
    104s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 00:17

General

  • Target

    49730a38397002e60ef4e7dcbda0130e93caf7dd55617e73b08fca7d22a4b27c.exe

  • Size

    700KB

  • MD5

    176a8b9c937dc87859b0749306b16a4b

  • SHA1

    523e022d0cdccac24b2d844bf74d2a489bb72956

  • SHA256

    49730a38397002e60ef4e7dcbda0130e93caf7dd55617e73b08fca7d22a4b27c

  • SHA512

    5e6c16a07b4edde7127d4ce47e9441cd4ad8922dea287cccdf5fa945863f62dd0843afc956b6a441bf4a845d05569dadcbe75dfaefd54674fe7d47b746d3d0f3

  • SSDEEP

    12288:KMrZy907GeBtKKHqyVqbCqpx9DM5cAtg0bzNTqCbrTQ/Zju60JOZLoMt:zywGIVH2/p0tgcqMyC+8Mt

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\49730a38397002e60ef4e7dcbda0130e93caf7dd55617e73b08fca7d22a4b27c.exe
    "C:\Users\Admin\AppData\Local\Temp\49730a38397002e60ef4e7dcbda0130e93caf7dd55617e73b08fca7d22a4b27c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un437362.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un437362.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2564
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9909.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9909.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:428
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0179.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0179.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1348
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si261679.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si261679.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3636

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si261679.exe

    Filesize

    175KB

    MD5

    42820be0de084384adf5709d2dc494ce

    SHA1

    f86eb8999601d292aea5025787da8c6fe8f6af99

    SHA256

    6891529239094a98fb1aeedf94a65deb68506e8965b683396e9610551569fd7c

    SHA512

    1397db9c78e00592733f11751506e2a993efc3ed74b5ada5eb40a05f82b61d942aae49f268a4d627c26622634c08b67445cedc2a80e66fe2782c51db9576e3a5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si261679.exe

    Filesize

    175KB

    MD5

    42820be0de084384adf5709d2dc494ce

    SHA1

    f86eb8999601d292aea5025787da8c6fe8f6af99

    SHA256

    6891529239094a98fb1aeedf94a65deb68506e8965b683396e9610551569fd7c

    SHA512

    1397db9c78e00592733f11751506e2a993efc3ed74b5ada5eb40a05f82b61d942aae49f268a4d627c26622634c08b67445cedc2a80e66fe2782c51db9576e3a5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un437362.exe

    Filesize

    558KB

    MD5

    7c2cf47304848694516ec1ec7cba7f53

    SHA1

    b31acd3ea965cd84cb7154682356083cf66ffb68

    SHA256

    c1d21c6e1baedf7354ba4e30e63c119fa5b4a146fe4c105ffa007ff7ac88660e

    SHA512

    255934ec4a99603cbc8dda4e99e463eb53867028cbdac9ff9760a1a77c450b4cf73d683a0d335e14e05a02e2abf15d11688c8edbf1bf1f5d24b4e25827abc13d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un437362.exe

    Filesize

    558KB

    MD5

    7c2cf47304848694516ec1ec7cba7f53

    SHA1

    b31acd3ea965cd84cb7154682356083cf66ffb68

    SHA256

    c1d21c6e1baedf7354ba4e30e63c119fa5b4a146fe4c105ffa007ff7ac88660e

    SHA512

    255934ec4a99603cbc8dda4e99e463eb53867028cbdac9ff9760a1a77c450b4cf73d683a0d335e14e05a02e2abf15d11688c8edbf1bf1f5d24b4e25827abc13d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9909.exe

    Filesize

    307KB

    MD5

    7eca84a695e24c18070e99773e586b65

    SHA1

    b182100087e8a3bca9b8c6fa8cce819c46f7963c

    SHA256

    f3937350877020391506a35ce751a11ea9d4baee93c99ed37363e6cb365e6055

    SHA512

    1c049070d4162f40f8cd2a13ae34c93c53d293bc7629f5f8c4b79c06b7abe64a6a0ac0564bee07746478361508cc76b6dbe934fec57dbbd19fcdcf3634d2e086

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9909.exe

    Filesize

    307KB

    MD5

    7eca84a695e24c18070e99773e586b65

    SHA1

    b182100087e8a3bca9b8c6fa8cce819c46f7963c

    SHA256

    f3937350877020391506a35ce751a11ea9d4baee93c99ed37363e6cb365e6055

    SHA512

    1c049070d4162f40f8cd2a13ae34c93c53d293bc7629f5f8c4b79c06b7abe64a6a0ac0564bee07746478361508cc76b6dbe934fec57dbbd19fcdcf3634d2e086

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0179.exe

    Filesize

    365KB

    MD5

    266c3741bb42fbeeaad2e991dc30d853

    SHA1

    0329c392928166daa7114504e5e1a99a82d17115

    SHA256

    8e8d59236303eb249eac8feb24e24de6d490369bfbfbcbc7781ac6b250c761fd

    SHA512

    1e730032f31791719e2ea80daf1f73132172e66a785aa719e89feed7ca4ed4275bf16a1269bcc82624ced277902ebc0097397a35a3db99273bdc26f0bda0e007

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0179.exe

    Filesize

    365KB

    MD5

    266c3741bb42fbeeaad2e991dc30d853

    SHA1

    0329c392928166daa7114504e5e1a99a82d17115

    SHA256

    8e8d59236303eb249eac8feb24e24de6d490369bfbfbcbc7781ac6b250c761fd

    SHA512

    1e730032f31791719e2ea80daf1f73132172e66a785aa719e89feed7ca4ed4275bf16a1269bcc82624ced277902ebc0097397a35a3db99273bdc26f0bda0e007

  • memory/428-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/428-137-0x00000000025A0000-0x00000000025BA000-memory.dmp

    Filesize

    104KB

  • memory/428-138-0x0000000004CB0000-0x00000000051AE000-memory.dmp

    Filesize

    5.0MB

  • memory/428-139-0x0000000002740000-0x0000000002758000-memory.dmp

    Filesize

    96KB

  • memory/428-140-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/428-141-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/428-143-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/428-145-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/428-147-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/428-149-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/428-151-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/428-153-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/428-158-0x0000000000B50000-0x0000000000B60000-memory.dmp

    Filesize

    64KB

  • memory/428-156-0x0000000000B50000-0x0000000000B60000-memory.dmp

    Filesize

    64KB

  • memory/428-155-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/428-159-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/428-160-0x0000000000B50000-0x0000000000B60000-memory.dmp

    Filesize

    64KB

  • memory/428-162-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/428-164-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/428-166-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/428-168-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/428-170-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/428-171-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/428-173-0x0000000000B50000-0x0000000000B60000-memory.dmp

    Filesize

    64KB

  • memory/428-175-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/428-174-0x0000000000B50000-0x0000000000B60000-memory.dmp

    Filesize

    64KB

  • memory/428-176-0x0000000000B50000-0x0000000000B60000-memory.dmp

    Filesize

    64KB

  • memory/1348-181-0x00000000027D0000-0x0000000002816000-memory.dmp

    Filesize

    280KB

  • memory/1348-182-0x0000000000760000-0x00000000007AB000-memory.dmp

    Filesize

    300KB

  • memory/1348-183-0x0000000004CD0000-0x0000000004D14000-memory.dmp

    Filesize

    272KB

  • memory/1348-185-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/1348-186-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/1348-184-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/1348-187-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/1348-188-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/1348-190-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/1348-192-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/1348-194-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/1348-196-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/1348-198-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/1348-200-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/1348-202-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/1348-204-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/1348-206-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/1348-208-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/1348-210-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/1348-212-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/1348-214-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/1348-216-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/1348-218-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/1348-220-0x0000000004CD0000-0x0000000004D0F000-memory.dmp

    Filesize

    252KB

  • memory/1348-1093-0x00000000052B0000-0x00000000058B6000-memory.dmp

    Filesize

    6.0MB

  • memory/1348-1094-0x00000000058C0000-0x00000000059CA000-memory.dmp

    Filesize

    1.0MB

  • memory/1348-1095-0x0000000005A00000-0x0000000005A12000-memory.dmp

    Filesize

    72KB

  • memory/1348-1096-0x0000000005A60000-0x0000000005A9E000-memory.dmp

    Filesize

    248KB

  • memory/1348-1097-0x0000000005BA0000-0x0000000005BEB000-memory.dmp

    Filesize

    300KB

  • memory/1348-1098-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/1348-1100-0x0000000005D00000-0x0000000005D92000-memory.dmp

    Filesize

    584KB

  • memory/1348-1101-0x0000000005DA0000-0x0000000005E06000-memory.dmp

    Filesize

    408KB

  • memory/1348-1104-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/1348-1103-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/1348-1102-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/1348-1105-0x00000000064A0000-0x0000000006662000-memory.dmp

    Filesize

    1.8MB

  • memory/1348-1106-0x0000000006670000-0x0000000006B9C000-memory.dmp

    Filesize

    5.2MB

  • memory/1348-1107-0x0000000006CD0000-0x0000000006D46000-memory.dmp

    Filesize

    472KB

  • memory/1348-1108-0x0000000006D60000-0x0000000006DB0000-memory.dmp

    Filesize

    320KB

  • memory/1348-1109-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/3636-1115-0x0000000000790000-0x00000000007C2000-memory.dmp

    Filesize

    200KB

  • memory/3636-1116-0x00000000052F0000-0x0000000005300000-memory.dmp

    Filesize

    64KB

  • memory/3636-1117-0x00000000051D0000-0x000000000521B000-memory.dmp

    Filesize

    300KB