Analysis

  • max time kernel
    90s
  • max time network
    92s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 00:31

General

  • Target

    3678c2431759493f25d1aa32afc11dc95173ac4ce1bb5092c365b670a2c61209.exe

  • Size

    700KB

  • MD5

    390353878989c08b4e68406572f0914f

  • SHA1

    81bb75c476a38bc191ed62b86b015d8bec10142e

  • SHA256

    3678c2431759493f25d1aa32afc11dc95173ac4ce1bb5092c365b670a2c61209

  • SHA512

    5d51c5f8830e0a497f1a77d862af183fa9b0fec4c2c5609e176f5c739152c4d6cb414f692aad7e34093d6122fdc12ac64b8d258fd147f13ace39e9126ebc0796

  • SSDEEP

    12288:KMrNy909uoPmynsWYKHjfajnDcvYRW3XpjJappxyGWt7lik8xgK:/ywPlnVYKzajnAYRIX9J2WbikTK

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3678c2431759493f25d1aa32afc11dc95173ac4ce1bb5092c365b670a2c61209.exe
    "C:\Users\Admin\AppData\Local\Temp\3678c2431759493f25d1aa32afc11dc95173ac4ce1bb5092c365b670a2c61209.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4188
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un370785.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un370785.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4556
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9315.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9315.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4720
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1034.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1034.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4920
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si956069.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si956069.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3652

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si956069.exe
    Filesize

    175KB

    MD5

    ee65757289bd7d2d1000ed01503a2fec

    SHA1

    bf5e7c4f24d51b8acc1def0398c2f6ec5d5fe279

    SHA256

    e7574d230e8f64ec619b59b1ce76692ffb28d570c67f9bb2ec7a9696394838bb

    SHA512

    ee799aab795d08f8f9d89265e914e6248df6f8558936e86e6e4f8c425daf55e23395e602bbfc02ceb5eecfeff69b529bcce8bbd6035b51604bfc256a922f9d80

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si956069.exe
    Filesize

    175KB

    MD5

    ee65757289bd7d2d1000ed01503a2fec

    SHA1

    bf5e7c4f24d51b8acc1def0398c2f6ec5d5fe279

    SHA256

    e7574d230e8f64ec619b59b1ce76692ffb28d570c67f9bb2ec7a9696394838bb

    SHA512

    ee799aab795d08f8f9d89265e914e6248df6f8558936e86e6e4f8c425daf55e23395e602bbfc02ceb5eecfeff69b529bcce8bbd6035b51604bfc256a922f9d80

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un370785.exe
    Filesize

    558KB

    MD5

    efb83e5ddb6d897eeacdba07bb102103

    SHA1

    a8502b9a4b890c99e0110afd4cb75d43bad474e5

    SHA256

    ecccdb601c6b2e1fa6fd853528fe1fb8783e5c8b87b91a95c67246f8c66dc327

    SHA512

    e91e488e659abfe2fa92b8dcb8b7d8a9967386f11e8bffa5dee7c3a0888a28b2538c5d9edfd0fcc01d82d36b1782099fe291245578053b234732aad7aac9921e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un370785.exe
    Filesize

    558KB

    MD5

    efb83e5ddb6d897eeacdba07bb102103

    SHA1

    a8502b9a4b890c99e0110afd4cb75d43bad474e5

    SHA256

    ecccdb601c6b2e1fa6fd853528fe1fb8783e5c8b87b91a95c67246f8c66dc327

    SHA512

    e91e488e659abfe2fa92b8dcb8b7d8a9967386f11e8bffa5dee7c3a0888a28b2538c5d9edfd0fcc01d82d36b1782099fe291245578053b234732aad7aac9921e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9315.exe
    Filesize

    307KB

    MD5

    464a0acd4058920dcc9e052838fa0ccd

    SHA1

    ca1418fd02965b6e50dfdd4d61b734a3e92afe25

    SHA256

    659083cdcd275e8136eb03769c71c6d823cde3ffb56623ef75e7d561fbf6b2ce

    SHA512

    31fbb97d75d11626fc281b3d2278ca920883502dd49218b7db00b6d4b136adb224d0c24436471861635b37014fdb6cc54a309e3ba43a0d9f58849abb409453dc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9315.exe
    Filesize

    307KB

    MD5

    464a0acd4058920dcc9e052838fa0ccd

    SHA1

    ca1418fd02965b6e50dfdd4d61b734a3e92afe25

    SHA256

    659083cdcd275e8136eb03769c71c6d823cde3ffb56623ef75e7d561fbf6b2ce

    SHA512

    31fbb97d75d11626fc281b3d2278ca920883502dd49218b7db00b6d4b136adb224d0c24436471861635b37014fdb6cc54a309e3ba43a0d9f58849abb409453dc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1034.exe
    Filesize

    365KB

    MD5

    c6b751e8142ca2963e629efb2ca736ae

    SHA1

    4ca988ddfd8f28c9d154f6361f45cb41e52d9a67

    SHA256

    4f61d8a0dc06b010e5a2d2531a055d9e40eec233b48e8ae82bfda9e62c112d10

    SHA512

    7047bdf2961a4cb11c629f72519be66dcdf72d267b009365ce45bb3581ea2aa1be821400ff2213e6da97035558413fb05e95176c9cab34995356cf1cddff8770

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1034.exe
    Filesize

    365KB

    MD5

    c6b751e8142ca2963e629efb2ca736ae

    SHA1

    4ca988ddfd8f28c9d154f6361f45cb41e52d9a67

    SHA256

    4f61d8a0dc06b010e5a2d2531a055d9e40eec233b48e8ae82bfda9e62c112d10

    SHA512

    7047bdf2961a4cb11c629f72519be66dcdf72d267b009365ce45bb3581ea2aa1be821400ff2213e6da97035558413fb05e95176c9cab34995356cf1cddff8770

  • memory/3652-1114-0x0000000000BB0000-0x0000000000BE2000-memory.dmp
    Filesize

    200KB

  • memory/3652-1115-0x00000000055F0000-0x000000000563B000-memory.dmp
    Filesize

    300KB

  • memory/3652-1116-0x00000000057E0000-0x00000000057F0000-memory.dmp
    Filesize

    64KB

  • memory/4720-145-0x00000000023E0000-0x00000000023F2000-memory.dmp
    Filesize

    72KB

  • memory/4720-157-0x00000000023E0000-0x00000000023F2000-memory.dmp
    Filesize

    72KB

  • memory/4720-140-0x0000000004F10000-0x0000000004F20000-memory.dmp
    Filesize

    64KB

  • memory/4720-139-0x0000000004F10000-0x0000000004F20000-memory.dmp
    Filesize

    64KB

  • memory/4720-141-0x0000000004F10000-0x0000000004F20000-memory.dmp
    Filesize

    64KB

  • memory/4720-142-0x00000000023E0000-0x00000000023F2000-memory.dmp
    Filesize

    72KB

  • memory/4720-143-0x00000000023E0000-0x00000000023F2000-memory.dmp
    Filesize

    72KB

  • memory/4720-137-0x00000000023E0000-0x00000000023F8000-memory.dmp
    Filesize

    96KB

  • memory/4720-147-0x00000000023E0000-0x00000000023F2000-memory.dmp
    Filesize

    72KB

  • memory/4720-149-0x00000000023E0000-0x00000000023F2000-memory.dmp
    Filesize

    72KB

  • memory/4720-151-0x00000000023E0000-0x00000000023F2000-memory.dmp
    Filesize

    72KB

  • memory/4720-153-0x00000000023E0000-0x00000000023F2000-memory.dmp
    Filesize

    72KB

  • memory/4720-155-0x00000000023E0000-0x00000000023F2000-memory.dmp
    Filesize

    72KB

  • memory/4720-138-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/4720-159-0x00000000023E0000-0x00000000023F2000-memory.dmp
    Filesize

    72KB

  • memory/4720-161-0x00000000023E0000-0x00000000023F2000-memory.dmp
    Filesize

    72KB

  • memory/4720-163-0x00000000023E0000-0x00000000023F2000-memory.dmp
    Filesize

    72KB

  • memory/4720-165-0x00000000023E0000-0x00000000023F2000-memory.dmp
    Filesize

    72KB

  • memory/4720-167-0x00000000023E0000-0x00000000023F2000-memory.dmp
    Filesize

    72KB

  • memory/4720-169-0x00000000023E0000-0x00000000023F2000-memory.dmp
    Filesize

    72KB

  • memory/4720-170-0x0000000000400000-0x000000000070F000-memory.dmp
    Filesize

    3.1MB

  • memory/4720-171-0x0000000004F10000-0x0000000004F20000-memory.dmp
    Filesize

    64KB

  • memory/4720-172-0x0000000004F10000-0x0000000004F20000-memory.dmp
    Filesize

    64KB

  • memory/4720-173-0x0000000004F10000-0x0000000004F20000-memory.dmp
    Filesize

    64KB

  • memory/4720-175-0x0000000000400000-0x000000000070F000-memory.dmp
    Filesize

    3.1MB

  • memory/4720-136-0x0000000004F20000-0x000000000541E000-memory.dmp
    Filesize

    5.0MB

  • memory/4720-135-0x00000000009D0000-0x00000000009EA000-memory.dmp
    Filesize

    104KB

  • memory/4920-183-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4920-215-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4920-185-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4920-187-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4920-189-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4920-191-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4920-193-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4920-195-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4920-197-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4920-199-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4920-202-0x0000000000720000-0x000000000076B000-memory.dmp
    Filesize

    300KB

  • memory/4920-204-0x0000000004C30000-0x0000000004C40000-memory.dmp
    Filesize

    64KB

  • memory/4920-206-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4920-208-0x0000000004C30000-0x0000000004C40000-memory.dmp
    Filesize

    64KB

  • memory/4920-205-0x0000000004C30000-0x0000000004C40000-memory.dmp
    Filesize

    64KB

  • memory/4920-201-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4920-209-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4920-211-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4920-213-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4920-182-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4920-217-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4920-219-0x0000000004BF0000-0x0000000004C2F000-memory.dmp
    Filesize

    252KB

  • memory/4920-1092-0x0000000005380000-0x0000000005986000-memory.dmp
    Filesize

    6.0MB

  • memory/4920-1093-0x0000000005A00000-0x0000000005B0A000-memory.dmp
    Filesize

    1.0MB

  • memory/4920-1094-0x0000000005B40000-0x0000000005B52000-memory.dmp
    Filesize

    72KB

  • memory/4920-1095-0x0000000004C30000-0x0000000004C40000-memory.dmp
    Filesize

    64KB

  • memory/4920-1096-0x0000000005B60000-0x0000000005B9E000-memory.dmp
    Filesize

    248KB

  • memory/4920-1097-0x0000000005CB0000-0x0000000005CFB000-memory.dmp
    Filesize

    300KB

  • memory/4920-1098-0x0000000005E40000-0x0000000005ED2000-memory.dmp
    Filesize

    584KB

  • memory/4920-1099-0x0000000005EE0000-0x0000000005F46000-memory.dmp
    Filesize

    408KB

  • memory/4920-1100-0x00000000066E0000-0x0000000006756000-memory.dmp
    Filesize

    472KB

  • memory/4920-1101-0x0000000006760000-0x00000000067B0000-memory.dmp
    Filesize

    320KB

  • memory/4920-1103-0x0000000004C30000-0x0000000004C40000-memory.dmp
    Filesize

    64KB

  • memory/4920-1104-0x0000000004C30000-0x0000000004C40000-memory.dmp
    Filesize

    64KB

  • memory/4920-1105-0x0000000004C30000-0x0000000004C40000-memory.dmp
    Filesize

    64KB

  • memory/4920-181-0x0000000004BF0000-0x0000000004C34000-memory.dmp
    Filesize

    272KB

  • memory/4920-180-0x0000000004B30000-0x0000000004B76000-memory.dmp
    Filesize

    280KB

  • memory/4920-1106-0x00000000067E0000-0x00000000069A2000-memory.dmp
    Filesize

    1.8MB

  • memory/4920-1107-0x00000000069B0000-0x0000000006EDC000-memory.dmp
    Filesize

    5.2MB

  • memory/4920-1108-0x0000000004C30000-0x0000000004C40000-memory.dmp
    Filesize

    64KB