Analysis

  • max time kernel
    53s
  • max time network
    56s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 00:15

General

  • Target

    7f9a746a05c180b3ca99294a75e45d36a96e9d42df34c50488f828e0bc5c5de6.exe

  • Size

    700KB

  • MD5

    8a1ac0d300121c13b091a940c98c42ad

  • SHA1

    1306e7b0b5f041dfaa524327cbbf78f37f42069d

  • SHA256

    7f9a746a05c180b3ca99294a75e45d36a96e9d42df34c50488f828e0bc5c5de6

  • SHA512

    99ee8e0f06f45f9c1b3d061d918b3b91a4144d4e58bf7f66d6359bb821d216dbf511750aede30aad89d9ca321c8b39cada67a779aa2a801032736165936be6ae

  • SSDEEP

    12288:xMroy9092ZQ7hCmnZ9JQRdnh9Dq1cAyPCuG4ZZ+BU5z7Yj7X2zjduyxUPda:pyAJ7YWuR0vWcKz7YHX2zfcA

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f9a746a05c180b3ca99294a75e45d36a96e9d42df34c50488f828e0bc5c5de6.exe
    "C:\Users\Admin\AppData\Local\Temp\7f9a746a05c180b3ca99294a75e45d36a96e9d42df34c50488f828e0bc5c5de6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un942580.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un942580.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3120
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9239.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9239.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3088
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0760.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0760.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4192
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si647933.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si647933.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1372

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si647933.exe
    Filesize

    175KB

    MD5

    5206c0ac124efbd5c0c0548131c81f44

    SHA1

    a22fc19a29f23475191054cd139becc049e9e4dc

    SHA256

    1c0a349354547bd9ed41e222a2160f2a76591ef9125251c493e908793f77a525

    SHA512

    15522490e3ce51aedc96114160de509c7a7c119eb5f93c974c1e2af7b8110273b8034df9184cfc3b836e37b02c9d7f134ea26afd823775bcaf3eb259a6622474

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si647933.exe
    Filesize

    175KB

    MD5

    5206c0ac124efbd5c0c0548131c81f44

    SHA1

    a22fc19a29f23475191054cd139becc049e9e4dc

    SHA256

    1c0a349354547bd9ed41e222a2160f2a76591ef9125251c493e908793f77a525

    SHA512

    15522490e3ce51aedc96114160de509c7a7c119eb5f93c974c1e2af7b8110273b8034df9184cfc3b836e37b02c9d7f134ea26afd823775bcaf3eb259a6622474

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un942580.exe
    Filesize

    557KB

    MD5

    a6a35f0c06195227713588fdac63f76a

    SHA1

    cd124f0674d9311a8a70ac727bacec6780d541db

    SHA256

    9e76f2fd09d453fec8e4e08473b5f1f3e6101602b84119d40f20c753cc8910cd

    SHA512

    ebd17a5583422e4e12a01c58781906d6c5ac7c1e5f3c175d4b3d37e8e7ec149d5b94b832f68da8299d0660936142cdeb72fccfad028ddd73c9523387c7a71997

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un942580.exe
    Filesize

    557KB

    MD5

    a6a35f0c06195227713588fdac63f76a

    SHA1

    cd124f0674d9311a8a70ac727bacec6780d541db

    SHA256

    9e76f2fd09d453fec8e4e08473b5f1f3e6101602b84119d40f20c753cc8910cd

    SHA512

    ebd17a5583422e4e12a01c58781906d6c5ac7c1e5f3c175d4b3d37e8e7ec149d5b94b832f68da8299d0660936142cdeb72fccfad028ddd73c9523387c7a71997

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9239.exe
    Filesize

    307KB

    MD5

    a20e8e57f7a5513211a18aa70ff27635

    SHA1

    34f9ca1b4fa5a35e078787b625cb1e8b5c2c2cfe

    SHA256

    da6ef67383d00ec7e76288ed145ea5fe3c4044906a7eaa2142bf2e314fcd0b0b

    SHA512

    5b78abdbee528313974df560e54fc41503274b393d8207aee7c126c971bb5ae4d300a0bf5b4387fc8c6bc8b4ad60eb02538450324d3298322d396f4a7f4fd427

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9239.exe
    Filesize

    307KB

    MD5

    a20e8e57f7a5513211a18aa70ff27635

    SHA1

    34f9ca1b4fa5a35e078787b625cb1e8b5c2c2cfe

    SHA256

    da6ef67383d00ec7e76288ed145ea5fe3c4044906a7eaa2142bf2e314fcd0b0b

    SHA512

    5b78abdbee528313974df560e54fc41503274b393d8207aee7c126c971bb5ae4d300a0bf5b4387fc8c6bc8b4ad60eb02538450324d3298322d396f4a7f4fd427

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0760.exe
    Filesize

    365KB

    MD5

    f51c5df302f9b8535480bb9cf3db0218

    SHA1

    854b257deff01c0328853f2e1d09821338f2d9e6

    SHA256

    58d821748048c9e19f3a0d5a462a345dcd1eb82277281f36a60d801c8065146c

    SHA512

    2d476dc1ee901f273654640a82786fa931ddb50cc16c47eaa05ee7ca63449c94a2106e75dd9d21b77429febd4882cfbb18cae4f55fc66edfb303a2fc2852d90c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0760.exe
    Filesize

    365KB

    MD5

    f51c5df302f9b8535480bb9cf3db0218

    SHA1

    854b257deff01c0328853f2e1d09821338f2d9e6

    SHA256

    58d821748048c9e19f3a0d5a462a345dcd1eb82277281f36a60d801c8065146c

    SHA512

    2d476dc1ee901f273654640a82786fa931ddb50cc16c47eaa05ee7ca63449c94a2106e75dd9d21b77429febd4882cfbb18cae4f55fc66edfb303a2fc2852d90c

  • memory/1372-1114-0x0000000005660000-0x00000000056AB000-memory.dmp
    Filesize

    300KB

  • memory/1372-1113-0x0000000000C20000-0x0000000000C52000-memory.dmp
    Filesize

    200KB

  • memory/1372-1115-0x00000000057C0000-0x00000000057D0000-memory.dmp
    Filesize

    64KB

  • memory/1372-1116-0x00000000057C0000-0x00000000057D0000-memory.dmp
    Filesize

    64KB

  • memory/3088-144-0x00000000028F0000-0x0000000002902000-memory.dmp
    Filesize

    72KB

  • memory/3088-158-0x00000000028F0000-0x0000000002902000-memory.dmp
    Filesize

    72KB

  • memory/3088-139-0x0000000004D90000-0x0000000004DA0000-memory.dmp
    Filesize

    64KB

  • memory/3088-140-0x0000000004D90000-0x0000000004DA0000-memory.dmp
    Filesize

    64KB

  • memory/3088-141-0x00000000028F0000-0x0000000002902000-memory.dmp
    Filesize

    72KB

  • memory/3088-142-0x00000000028F0000-0x0000000002902000-memory.dmp
    Filesize

    72KB

  • memory/3088-137-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/3088-146-0x00000000028F0000-0x0000000002902000-memory.dmp
    Filesize

    72KB

  • memory/3088-148-0x00000000028F0000-0x0000000002902000-memory.dmp
    Filesize

    72KB

  • memory/3088-150-0x00000000028F0000-0x0000000002902000-memory.dmp
    Filesize

    72KB

  • memory/3088-152-0x00000000028F0000-0x0000000002902000-memory.dmp
    Filesize

    72KB

  • memory/3088-154-0x00000000028F0000-0x0000000002902000-memory.dmp
    Filesize

    72KB

  • memory/3088-156-0x00000000028F0000-0x0000000002902000-memory.dmp
    Filesize

    72KB

  • memory/3088-138-0x0000000004D90000-0x0000000004DA0000-memory.dmp
    Filesize

    64KB

  • memory/3088-160-0x00000000028F0000-0x0000000002902000-memory.dmp
    Filesize

    72KB

  • memory/3088-162-0x00000000028F0000-0x0000000002902000-memory.dmp
    Filesize

    72KB

  • memory/3088-164-0x00000000028F0000-0x0000000002902000-memory.dmp
    Filesize

    72KB

  • memory/3088-166-0x00000000028F0000-0x0000000002902000-memory.dmp
    Filesize

    72KB

  • memory/3088-168-0x00000000028F0000-0x0000000002902000-memory.dmp
    Filesize

    72KB

  • memory/3088-169-0x0000000000400000-0x000000000070F000-memory.dmp
    Filesize

    3.1MB

  • memory/3088-170-0x0000000004D90000-0x0000000004DA0000-memory.dmp
    Filesize

    64KB

  • memory/3088-171-0x0000000004D90000-0x0000000004DA0000-memory.dmp
    Filesize

    64KB

  • memory/3088-172-0x0000000004D90000-0x0000000004DA0000-memory.dmp
    Filesize

    64KB

  • memory/3088-174-0x0000000000400000-0x000000000070F000-memory.dmp
    Filesize

    3.1MB

  • memory/3088-136-0x00000000028F0000-0x0000000002908000-memory.dmp
    Filesize

    96KB

  • memory/3088-135-0x0000000004DA0000-0x000000000529E000-memory.dmp
    Filesize

    5.0MB

  • memory/3088-134-0x0000000000A00000-0x0000000000A1A000-memory.dmp
    Filesize

    104KB

  • memory/4192-184-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4192-315-0x0000000004C90000-0x0000000004CA0000-memory.dmp
    Filesize

    64KB

  • memory/4192-186-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4192-188-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4192-190-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4192-192-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4192-194-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4192-196-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4192-198-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4192-200-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4192-202-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4192-204-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4192-206-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4192-208-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4192-210-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4192-212-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4192-214-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4192-311-0x0000000000720000-0x000000000076B000-memory.dmp
    Filesize

    300KB

  • memory/4192-314-0x0000000004C90000-0x0000000004CA0000-memory.dmp
    Filesize

    64KB

  • memory/4192-181-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4192-318-0x0000000004C90000-0x0000000004CA0000-memory.dmp
    Filesize

    64KB

  • memory/4192-1091-0x00000000053A0000-0x00000000059A6000-memory.dmp
    Filesize

    6.0MB

  • memory/4192-1092-0x0000000005A00000-0x0000000005B0A000-memory.dmp
    Filesize

    1.0MB

  • memory/4192-1093-0x0000000005B40000-0x0000000005B52000-memory.dmp
    Filesize

    72KB

  • memory/4192-1094-0x0000000004C90000-0x0000000004CA0000-memory.dmp
    Filesize

    64KB

  • memory/4192-1095-0x0000000005BA0000-0x0000000005BDE000-memory.dmp
    Filesize

    248KB

  • memory/4192-1096-0x0000000005CE0000-0x0000000005D2B000-memory.dmp
    Filesize

    300KB

  • memory/4192-1097-0x0000000005E40000-0x0000000005EA6000-memory.dmp
    Filesize

    408KB

  • memory/4192-1098-0x0000000006500000-0x0000000006592000-memory.dmp
    Filesize

    584KB

  • memory/4192-1100-0x0000000006820000-0x00000000069E2000-memory.dmp
    Filesize

    1.8MB

  • memory/4192-1101-0x0000000006A00000-0x0000000006F2C000-memory.dmp
    Filesize

    5.2MB

  • memory/4192-1103-0x0000000004C90000-0x0000000004CA0000-memory.dmp
    Filesize

    64KB

  • memory/4192-1102-0x0000000004C90000-0x0000000004CA0000-memory.dmp
    Filesize

    64KB

  • memory/4192-1104-0x0000000004C90000-0x0000000004CA0000-memory.dmp
    Filesize

    64KB

  • memory/4192-182-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4192-180-0x0000000004BF0000-0x0000000004C34000-memory.dmp
    Filesize

    272KB

  • memory/4192-179-0x0000000004B30000-0x0000000004B76000-memory.dmp
    Filesize

    280KB

  • memory/4192-1105-0x0000000004C90000-0x0000000004CA0000-memory.dmp
    Filesize

    64KB

  • memory/4192-1106-0x00000000071C0000-0x0000000007236000-memory.dmp
    Filesize

    472KB

  • memory/4192-1107-0x0000000007240000-0x0000000007290000-memory.dmp
    Filesize

    320KB