Analysis

  • max time kernel
    56s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 00:28

General

  • Target

    5b00653edb699fbb7026653ee054c9654fa9046e266bdd645ea00c6b8200677d.exe

  • Size

    700KB

  • MD5

    e18b0ecb25568db2735985ae4c47721f

  • SHA1

    4a2fe08c76c297549f410509e70032c53ed12fe4

  • SHA256

    5b00653edb699fbb7026653ee054c9654fa9046e266bdd645ea00c6b8200677d

  • SHA512

    5bc7eae30df3a67e8b24ac66f7516713920de9290d709293caadc0fbe570b26270e2890ad8ae829cbc5e360f6a9a16976e54023a8599d67cddda03a4a0b231aa

  • SSDEEP

    12288:+Mrdy90kSd9kvxDTNqY0Wx9D5ucAO78F30IE4qwm2Wr0vYS:7y6d9kvxDvAO78Vg4qwmBrs

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b00653edb699fbb7026653ee054c9654fa9046e266bdd645ea00c6b8200677d.exe
    "C:\Users\Admin\AppData\Local\Temp\5b00653edb699fbb7026653ee054c9654fa9046e266bdd645ea00c6b8200677d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:352
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un545606.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un545606.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1424
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3618.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3618.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4144
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6477.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6477.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4748
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si797101.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si797101.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4444

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si797101.exe
    Filesize

    175KB

    MD5

    d36127ea4e8847374c229a54906369a6

    SHA1

    66bcdce55dec2e2466d06d34398094f6eba60d32

    SHA256

    b39d7a0b636e6809664f69a203a3961feacd7005c1c468512c0daa318070630c

    SHA512

    b4dc77a2b557d2f933062d757d386e31a2ba85d257b3442514fd6d141c972b7ed796fcacaaaea1a9cdd005f7a697c5627f5049e319a8ee9e0ef36f6511762ab6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si797101.exe
    Filesize

    175KB

    MD5

    d36127ea4e8847374c229a54906369a6

    SHA1

    66bcdce55dec2e2466d06d34398094f6eba60d32

    SHA256

    b39d7a0b636e6809664f69a203a3961feacd7005c1c468512c0daa318070630c

    SHA512

    b4dc77a2b557d2f933062d757d386e31a2ba85d257b3442514fd6d141c972b7ed796fcacaaaea1a9cdd005f7a697c5627f5049e319a8ee9e0ef36f6511762ab6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un545606.exe
    Filesize

    558KB

    MD5

    137f1e20525d143d9e5004e733755f39

    SHA1

    9149e537078247a3d56536addcaac5ba3d2849ac

    SHA256

    67064aeea9abc680e2bc86362b7ca905ac4ec689b7c4de101a6cd47d34c22435

    SHA512

    7e75bed3619e3b1c459c331fed25a2e75aaf0539a807e0af5bda373de91721ae2403baa828f719ef5f22f0a64c2af6eaa5a1e6117dbf1f9399e0b9bfc06038d9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un545606.exe
    Filesize

    558KB

    MD5

    137f1e20525d143d9e5004e733755f39

    SHA1

    9149e537078247a3d56536addcaac5ba3d2849ac

    SHA256

    67064aeea9abc680e2bc86362b7ca905ac4ec689b7c4de101a6cd47d34c22435

    SHA512

    7e75bed3619e3b1c459c331fed25a2e75aaf0539a807e0af5bda373de91721ae2403baa828f719ef5f22f0a64c2af6eaa5a1e6117dbf1f9399e0b9bfc06038d9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3618.exe
    Filesize

    307KB

    MD5

    85bf386b31300bb9a141127aca863575

    SHA1

    f4ed8d8c99b11ec6f846555340fc0cc3156601ec

    SHA256

    ff3862c5b34b04e2efe2208109636e9b2db6a030c11e8c9bdc60ed6ff2663e30

    SHA512

    d4ddbdbf28f847ff31d3ce0711c46da11c5dece020dbafa2dbc99128c49fcb9fddcd7462a2f49d2df6662edf93884ee9c64c40595a1edbc696227d1daa3be189

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3618.exe
    Filesize

    307KB

    MD5

    85bf386b31300bb9a141127aca863575

    SHA1

    f4ed8d8c99b11ec6f846555340fc0cc3156601ec

    SHA256

    ff3862c5b34b04e2efe2208109636e9b2db6a030c11e8c9bdc60ed6ff2663e30

    SHA512

    d4ddbdbf28f847ff31d3ce0711c46da11c5dece020dbafa2dbc99128c49fcb9fddcd7462a2f49d2df6662edf93884ee9c64c40595a1edbc696227d1daa3be189

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6477.exe
    Filesize

    365KB

    MD5

    588eb11a9b46a2ede781e24a8cc443aa

    SHA1

    6d3d9a64f1e1bf103d68017e4a5c57ed28c2a263

    SHA256

    33a235b824f85869f7d6f384e1e5ebc0d8355243fbe3ef7136da252be4ccdd10

    SHA512

    95f79d1c18ab68c63b47447e0611eecb9567eca4400f2438c29ecc0f2fb2bee022e85713a01e6b4ba2b865a457f736af6b4543678436d8b7b2ecc86a176f9c0c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6477.exe
    Filesize

    365KB

    MD5

    588eb11a9b46a2ede781e24a8cc443aa

    SHA1

    6d3d9a64f1e1bf103d68017e4a5c57ed28c2a263

    SHA256

    33a235b824f85869f7d6f384e1e5ebc0d8355243fbe3ef7136da252be4ccdd10

    SHA512

    95f79d1c18ab68c63b47447e0611eecb9567eca4400f2438c29ecc0f2fb2bee022e85713a01e6b4ba2b865a457f736af6b4543678436d8b7b2ecc86a176f9c0c

  • memory/4144-132-0x0000000002470000-0x000000000248A000-memory.dmp
    Filesize

    104KB

  • memory/4144-133-0x0000000004E20000-0x000000000531E000-memory.dmp
    Filesize

    5.0MB

  • memory/4144-134-0x0000000002640000-0x0000000002658000-memory.dmp
    Filesize

    96KB

  • memory/4144-135-0x0000000002640000-0x0000000002652000-memory.dmp
    Filesize

    72KB

  • memory/4144-136-0x0000000002640000-0x0000000002652000-memory.dmp
    Filesize

    72KB

  • memory/4144-138-0x0000000002640000-0x0000000002652000-memory.dmp
    Filesize

    72KB

  • memory/4144-140-0x0000000002640000-0x0000000002652000-memory.dmp
    Filesize

    72KB

  • memory/4144-142-0x0000000002640000-0x0000000002652000-memory.dmp
    Filesize

    72KB

  • memory/4144-144-0x0000000002640000-0x0000000002652000-memory.dmp
    Filesize

    72KB

  • memory/4144-146-0x0000000002640000-0x0000000002652000-memory.dmp
    Filesize

    72KB

  • memory/4144-148-0x0000000002640000-0x0000000002652000-memory.dmp
    Filesize

    72KB

  • memory/4144-150-0x0000000002640000-0x0000000002652000-memory.dmp
    Filesize

    72KB

  • memory/4144-152-0x0000000002640000-0x0000000002652000-memory.dmp
    Filesize

    72KB

  • memory/4144-154-0x0000000002640000-0x0000000002652000-memory.dmp
    Filesize

    72KB

  • memory/4144-156-0x0000000002640000-0x0000000002652000-memory.dmp
    Filesize

    72KB

  • memory/4144-158-0x0000000002640000-0x0000000002652000-memory.dmp
    Filesize

    72KB

  • memory/4144-161-0x0000000000800000-0x000000000082D000-memory.dmp
    Filesize

    180KB

  • memory/4144-163-0x0000000004E10000-0x0000000004E20000-memory.dmp
    Filesize

    64KB

  • memory/4144-160-0x0000000002640000-0x0000000002652000-memory.dmp
    Filesize

    72KB

  • memory/4144-165-0x0000000004E10000-0x0000000004E20000-memory.dmp
    Filesize

    64KB

  • memory/4144-166-0x0000000004E10000-0x0000000004E20000-memory.dmp
    Filesize

    64KB

  • memory/4144-164-0x0000000002640000-0x0000000002652000-memory.dmp
    Filesize

    72KB

  • memory/4144-167-0x0000000000400000-0x000000000070F000-memory.dmp
    Filesize

    3.1MB

  • memory/4144-169-0x0000000000400000-0x000000000070F000-memory.dmp
    Filesize

    3.1MB

  • memory/4444-1108-0x0000000000AA0000-0x0000000000AD2000-memory.dmp
    Filesize

    200KB

  • memory/4444-1110-0x00000000056A0000-0x00000000056B0000-memory.dmp
    Filesize

    64KB

  • memory/4444-1109-0x00000000054F0000-0x000000000553B000-memory.dmp
    Filesize

    300KB

  • memory/4748-177-0x0000000004CE0000-0x0000000004D1F000-memory.dmp
    Filesize

    252KB

  • memory/4748-284-0x0000000004D90000-0x0000000004DA0000-memory.dmp
    Filesize

    64KB

  • memory/4748-179-0x0000000004CE0000-0x0000000004D1F000-memory.dmp
    Filesize

    252KB

  • memory/4748-181-0x0000000004CE0000-0x0000000004D1F000-memory.dmp
    Filesize

    252KB

  • memory/4748-183-0x0000000004CE0000-0x0000000004D1F000-memory.dmp
    Filesize

    252KB

  • memory/4748-185-0x0000000004CE0000-0x0000000004D1F000-memory.dmp
    Filesize

    252KB

  • memory/4748-187-0x0000000004CE0000-0x0000000004D1F000-memory.dmp
    Filesize

    252KB

  • memory/4748-189-0x0000000004CE0000-0x0000000004D1F000-memory.dmp
    Filesize

    252KB

  • memory/4748-191-0x0000000004CE0000-0x0000000004D1F000-memory.dmp
    Filesize

    252KB

  • memory/4748-193-0x0000000004CE0000-0x0000000004D1F000-memory.dmp
    Filesize

    252KB

  • memory/4748-195-0x0000000004CE0000-0x0000000004D1F000-memory.dmp
    Filesize

    252KB

  • memory/4748-197-0x0000000004CE0000-0x0000000004D1F000-memory.dmp
    Filesize

    252KB

  • memory/4748-199-0x0000000004CE0000-0x0000000004D1F000-memory.dmp
    Filesize

    252KB

  • memory/4748-201-0x0000000004CE0000-0x0000000004D1F000-memory.dmp
    Filesize

    252KB

  • memory/4748-203-0x0000000004CE0000-0x0000000004D1F000-memory.dmp
    Filesize

    252KB

  • memory/4748-205-0x0000000004CE0000-0x0000000004D1F000-memory.dmp
    Filesize

    252KB

  • memory/4748-209-0x0000000004CE0000-0x0000000004D1F000-memory.dmp
    Filesize

    252KB

  • memory/4748-207-0x0000000004CE0000-0x0000000004D1F000-memory.dmp
    Filesize

    252KB

  • memory/4748-282-0x0000000000720000-0x000000000076B000-memory.dmp
    Filesize

    300KB

  • memory/4748-176-0x0000000004CE0000-0x0000000004D1F000-memory.dmp
    Filesize

    252KB

  • memory/4748-285-0x0000000004D90000-0x0000000004DA0000-memory.dmp
    Filesize

    64KB

  • memory/4748-287-0x0000000004D90000-0x0000000004DA0000-memory.dmp
    Filesize

    64KB

  • memory/4748-1086-0x00000000053A0000-0x00000000059A6000-memory.dmp
    Filesize

    6.0MB

  • memory/4748-1087-0x0000000005A00000-0x0000000005B0A000-memory.dmp
    Filesize

    1.0MB

  • memory/4748-1088-0x0000000004D90000-0x0000000004DA0000-memory.dmp
    Filesize

    64KB

  • memory/4748-1089-0x0000000005B40000-0x0000000005B52000-memory.dmp
    Filesize

    72KB

  • memory/4748-1090-0x0000000005B60000-0x0000000005B9E000-memory.dmp
    Filesize

    248KB

  • memory/4748-1091-0x0000000005CB0000-0x0000000005CFB000-memory.dmp
    Filesize

    300KB

  • memory/4748-1092-0x0000000005E40000-0x0000000005EA6000-memory.dmp
    Filesize

    408KB

  • memory/4748-1093-0x0000000006510000-0x00000000065A2000-memory.dmp
    Filesize

    584KB

  • memory/4748-1095-0x0000000006600000-0x00000000067C2000-memory.dmp
    Filesize

    1.8MB

  • memory/4748-1096-0x00000000067D0000-0x0000000006CFC000-memory.dmp
    Filesize

    5.2MB

  • memory/4748-1097-0x0000000004D90000-0x0000000004DA0000-memory.dmp
    Filesize

    64KB

  • memory/4748-1098-0x0000000004D90000-0x0000000004DA0000-memory.dmp
    Filesize

    64KB

  • memory/4748-1099-0x0000000004D90000-0x0000000004DA0000-memory.dmp
    Filesize

    64KB

  • memory/4748-175-0x0000000004CE0000-0x0000000004D24000-memory.dmp
    Filesize

    272KB

  • memory/4748-174-0x00000000024D0000-0x0000000002516000-memory.dmp
    Filesize

    280KB

  • memory/4748-1100-0x0000000006E30000-0x0000000006EA6000-memory.dmp
    Filesize

    472KB

  • memory/4748-1101-0x0000000006EB0000-0x0000000006F00000-memory.dmp
    Filesize

    320KB

  • memory/4748-1102-0x0000000004D90000-0x0000000004DA0000-memory.dmp
    Filesize

    64KB