Analysis

  • max time kernel
    50s
  • max time network
    52s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 00:34

General

  • Target

    6744c366c926fa0f2986ca76c97fb92118be732df58f7f357c21755d7420590e.exe

  • Size

    699KB

  • MD5

    2e0e67b8108122f6c5b00782834344b0

  • SHA1

    435299663a47865a5bc01689fe2d825e9c9fed59

  • SHA256

    6744c366c926fa0f2986ca76c97fb92118be732df58f7f357c21755d7420590e

  • SHA512

    cfb17cfd93304b553c98fd1c9149c511623cec6f3f39ae9ca958ee2db7016b939e4739b6db0a7f446060a8b6f4bcd65daaa863050fc4289b7277169ff20d8527

  • SSDEEP

    12288:yMrEy90Mm74mI2VC6jmmUhapVDGuNbhuyPKwN6I/fj79b8n8JT:Gy+8mzVxqdhapXuyPRt/fH9b8n8N

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6744c366c926fa0f2986ca76c97fb92118be732df58f7f357c21755d7420590e.exe
    "C:\Users\Admin\AppData\Local\Temp\6744c366c926fa0f2986ca76c97fb92118be732df58f7f357c21755d7420590e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3632
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un241922.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un241922.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3668
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8229.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8229.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3672
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9637.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9637.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4656
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si083305.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si083305.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1504

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si083305.exe
    Filesize

    175KB

    MD5

    be0af2a7a8d178d67fd0db5b74a4b3c0

    SHA1

    931fbb418f73811022c0a5c906e15fecebf685da

    SHA256

    de1684ec0a1f661fd47c4b9c6b9dff869a45a22f8a1fd9802fc142360231aabf

    SHA512

    3039cdb9cf6ca4cfabf6a7f2f74e8bc2812fb043a6c31a5ef6dabbcbdb7409b13cb8b10dd09334d0129ec0d55671d57048ad6c72c5d38dfbe2e3ddb1329784dd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si083305.exe
    Filesize

    175KB

    MD5

    be0af2a7a8d178d67fd0db5b74a4b3c0

    SHA1

    931fbb418f73811022c0a5c906e15fecebf685da

    SHA256

    de1684ec0a1f661fd47c4b9c6b9dff869a45a22f8a1fd9802fc142360231aabf

    SHA512

    3039cdb9cf6ca4cfabf6a7f2f74e8bc2812fb043a6c31a5ef6dabbcbdb7409b13cb8b10dd09334d0129ec0d55671d57048ad6c72c5d38dfbe2e3ddb1329784dd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un241922.exe
    Filesize

    557KB

    MD5

    b898e5ece1e6b425b843554a16cbbff5

    SHA1

    7c58cee83c757ffed40bcc568618799eaa3dc4a7

    SHA256

    885ed1b15f850cca6f0dc4d1f91392f1ab684d9f6665a12acc0af94e4948bb08

    SHA512

    cd374164fa3d4eadad199b0a32d9a9446e211c9c10d7f72c401f0c99865ae0335fe4dd7529fcc767d66aa46404604de0bf8b78e8f2bf45f4163ae3e017880503

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un241922.exe
    Filesize

    557KB

    MD5

    b898e5ece1e6b425b843554a16cbbff5

    SHA1

    7c58cee83c757ffed40bcc568618799eaa3dc4a7

    SHA256

    885ed1b15f850cca6f0dc4d1f91392f1ab684d9f6665a12acc0af94e4948bb08

    SHA512

    cd374164fa3d4eadad199b0a32d9a9446e211c9c10d7f72c401f0c99865ae0335fe4dd7529fcc767d66aa46404604de0bf8b78e8f2bf45f4163ae3e017880503

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8229.exe
    Filesize

    307KB

    MD5

    f0dbbfc52f25179dfa9e04de0f485603

    SHA1

    e1aa7209f17112d35453752264742ac54222ede6

    SHA256

    11ceab1fe88d126c09efb7c18ac1cb6eab1a543043db5ba477815b80eeb9a72b

    SHA512

    ebf151d38f011a3719d613cde788b57a0711a1f3ae7be1efcb968fd152262b5c658ea4d9a0e0b4fdeb8fdaefe02b3e2c2009ad73f7ae50f9c347efcff2d38626

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8229.exe
    Filesize

    307KB

    MD5

    f0dbbfc52f25179dfa9e04de0f485603

    SHA1

    e1aa7209f17112d35453752264742ac54222ede6

    SHA256

    11ceab1fe88d126c09efb7c18ac1cb6eab1a543043db5ba477815b80eeb9a72b

    SHA512

    ebf151d38f011a3719d613cde788b57a0711a1f3ae7be1efcb968fd152262b5c658ea4d9a0e0b4fdeb8fdaefe02b3e2c2009ad73f7ae50f9c347efcff2d38626

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9637.exe
    Filesize

    365KB

    MD5

    9c857b1bebfe5df4ea6bbf11d3b1ab19

    SHA1

    920952a370636bbb930f927df61ecaa7dc8638ab

    SHA256

    30b66c9c440eb76ffac17e4b8de9bd814393889ccc0d576466a9050373d7f4ba

    SHA512

    e82585eb610095043f0feb178e58afa02f0e7edaad1f5c23d54026eac10f84daede7060d014cd6ccc7bec3ec17635fe1a5d973c80cb950ebab529d7eda45fe51

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9637.exe
    Filesize

    365KB

    MD5

    9c857b1bebfe5df4ea6bbf11d3b1ab19

    SHA1

    920952a370636bbb930f927df61ecaa7dc8638ab

    SHA256

    30b66c9c440eb76ffac17e4b8de9bd814393889ccc0d576466a9050373d7f4ba

    SHA512

    e82585eb610095043f0feb178e58afa02f0e7edaad1f5c23d54026eac10f84daede7060d014cd6ccc7bec3ec17635fe1a5d973c80cb950ebab529d7eda45fe51

  • memory/1504-1111-0x0000000000400000-0x0000000000432000-memory.dmp
    Filesize

    200KB

  • memory/1504-1112-0x0000000004E50000-0x0000000004E9B000-memory.dmp
    Filesize

    300KB

  • memory/1504-1113-0x0000000004FB0000-0x0000000004FC0000-memory.dmp
    Filesize

    64KB

  • memory/3672-143-0x0000000002520000-0x0000000002532000-memory.dmp
    Filesize

    72KB

  • memory/3672-159-0x0000000002520000-0x0000000002532000-memory.dmp
    Filesize

    72KB

  • memory/3672-140-0x0000000004D80000-0x000000000527E000-memory.dmp
    Filesize

    5.0MB

  • memory/3672-141-0x0000000002520000-0x0000000002538000-memory.dmp
    Filesize

    96KB

  • memory/3672-142-0x0000000002520000-0x0000000002532000-memory.dmp
    Filesize

    72KB

  • memory/3672-138-0x0000000004D70000-0x0000000004D80000-memory.dmp
    Filesize

    64KB

  • memory/3672-145-0x0000000002520000-0x0000000002532000-memory.dmp
    Filesize

    72KB

  • memory/3672-147-0x0000000002520000-0x0000000002532000-memory.dmp
    Filesize

    72KB

  • memory/3672-149-0x0000000002520000-0x0000000002532000-memory.dmp
    Filesize

    72KB

  • memory/3672-151-0x0000000002520000-0x0000000002532000-memory.dmp
    Filesize

    72KB

  • memory/3672-153-0x0000000002520000-0x0000000002532000-memory.dmp
    Filesize

    72KB

  • memory/3672-139-0x0000000004D70000-0x0000000004D80000-memory.dmp
    Filesize

    64KB

  • memory/3672-157-0x0000000002520000-0x0000000002532000-memory.dmp
    Filesize

    72KB

  • memory/3672-155-0x0000000002520000-0x0000000002532000-memory.dmp
    Filesize

    72KB

  • memory/3672-163-0x0000000002520000-0x0000000002532000-memory.dmp
    Filesize

    72KB

  • memory/3672-169-0x0000000002520000-0x0000000002532000-memory.dmp
    Filesize

    72KB

  • memory/3672-167-0x0000000002520000-0x0000000002532000-memory.dmp
    Filesize

    72KB

  • memory/3672-165-0x0000000002520000-0x0000000002532000-memory.dmp
    Filesize

    72KB

  • memory/3672-161-0x0000000002520000-0x0000000002532000-memory.dmp
    Filesize

    72KB

  • memory/3672-170-0x0000000000400000-0x000000000070F000-memory.dmp
    Filesize

    3.1MB

  • memory/3672-172-0x0000000000400000-0x000000000070F000-memory.dmp
    Filesize

    3.1MB

  • memory/3672-137-0x0000000002380000-0x000000000239A000-memory.dmp
    Filesize

    104KB

  • memory/3672-136-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/4656-181-0x0000000004CB0000-0x0000000004CEF000-memory.dmp
    Filesize

    252KB

  • memory/4656-212-0x0000000004CB0000-0x0000000004CEF000-memory.dmp
    Filesize

    252KB

  • memory/4656-179-0x00000000007F0000-0x000000000083B000-memory.dmp
    Filesize

    300KB

  • memory/4656-182-0x0000000004DA0000-0x0000000004DB0000-memory.dmp
    Filesize

    64KB

  • memory/4656-183-0x0000000004CB0000-0x0000000004CEF000-memory.dmp
    Filesize

    252KB

  • memory/4656-184-0x0000000004DA0000-0x0000000004DB0000-memory.dmp
    Filesize

    64KB

  • memory/4656-186-0x0000000004CB0000-0x0000000004CEF000-memory.dmp
    Filesize

    252KB

  • memory/4656-188-0x0000000004CB0000-0x0000000004CEF000-memory.dmp
    Filesize

    252KB

  • memory/4656-190-0x0000000004CB0000-0x0000000004CEF000-memory.dmp
    Filesize

    252KB

  • memory/4656-192-0x0000000004CB0000-0x0000000004CEF000-memory.dmp
    Filesize

    252KB

  • memory/4656-194-0x0000000004CB0000-0x0000000004CEF000-memory.dmp
    Filesize

    252KB

  • memory/4656-196-0x0000000004CB0000-0x0000000004CEF000-memory.dmp
    Filesize

    252KB

  • memory/4656-198-0x0000000004CB0000-0x0000000004CEF000-memory.dmp
    Filesize

    252KB

  • memory/4656-200-0x0000000004CB0000-0x0000000004CEF000-memory.dmp
    Filesize

    252KB

  • memory/4656-202-0x0000000004CB0000-0x0000000004CEF000-memory.dmp
    Filesize

    252KB

  • memory/4656-204-0x0000000004CB0000-0x0000000004CEF000-memory.dmp
    Filesize

    252KB

  • memory/4656-206-0x0000000004CB0000-0x0000000004CEF000-memory.dmp
    Filesize

    252KB

  • memory/4656-208-0x0000000004CB0000-0x0000000004CEF000-memory.dmp
    Filesize

    252KB

  • memory/4656-210-0x0000000004CB0000-0x0000000004CEF000-memory.dmp
    Filesize

    252KB

  • memory/4656-180-0x0000000004DA0000-0x0000000004DB0000-memory.dmp
    Filesize

    64KB

  • memory/4656-214-0x0000000004CB0000-0x0000000004CEF000-memory.dmp
    Filesize

    252KB

  • memory/4656-216-0x0000000004CB0000-0x0000000004CEF000-memory.dmp
    Filesize

    252KB

  • memory/4656-1089-0x00000000052B0000-0x00000000058B6000-memory.dmp
    Filesize

    6.0MB

  • memory/4656-1090-0x00000000058C0000-0x00000000059CA000-memory.dmp
    Filesize

    1.0MB

  • memory/4656-1091-0x0000000005A00000-0x0000000005A12000-memory.dmp
    Filesize

    72KB

  • memory/4656-1092-0x0000000005A20000-0x0000000005A5E000-memory.dmp
    Filesize

    248KB

  • memory/4656-1093-0x0000000004DA0000-0x0000000004DB0000-memory.dmp
    Filesize

    64KB

  • memory/4656-1094-0x0000000005B70000-0x0000000005BBB000-memory.dmp
    Filesize

    300KB

  • memory/4656-1096-0x0000000004DA0000-0x0000000004DB0000-memory.dmp
    Filesize

    64KB

  • memory/4656-1097-0x0000000004DA0000-0x0000000004DB0000-memory.dmp
    Filesize

    64KB

  • memory/4656-1098-0x0000000004DA0000-0x0000000004DB0000-memory.dmp
    Filesize

    64KB

  • memory/4656-1099-0x0000000005D00000-0x0000000005D92000-memory.dmp
    Filesize

    584KB

  • memory/4656-1100-0x0000000005DA0000-0x0000000005E06000-memory.dmp
    Filesize

    408KB

  • memory/4656-1101-0x0000000004DA0000-0x0000000004DB0000-memory.dmp
    Filesize

    64KB

  • memory/4656-1102-0x00000000066E0000-0x00000000068A2000-memory.dmp
    Filesize

    1.8MB

  • memory/4656-178-0x0000000004CB0000-0x0000000004CF4000-memory.dmp
    Filesize

    272KB

  • memory/4656-177-0x00000000022A0000-0x00000000022E6000-memory.dmp
    Filesize

    280KB

  • memory/4656-1103-0x00000000068D0000-0x0000000006DFC000-memory.dmp
    Filesize

    5.2MB

  • memory/4656-1104-0x0000000006F10000-0x0000000006F86000-memory.dmp
    Filesize

    472KB

  • memory/4656-1105-0x0000000006FB0000-0x0000000007000000-memory.dmp
    Filesize

    320KB