Analysis

  • max time kernel
    53s
  • max time network
    69s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 00:37

General

  • Target

    80b7edf8fbf49ed29065f61146327b997a5da88e703421fb6f1c3cf63fdea02e.exe

  • Size

    700KB

  • MD5

    714253bb012b77ceb9ea902080498760

  • SHA1

    d0464c5c39b42443de81fb1f78317ce794d76282

  • SHA256

    80b7edf8fbf49ed29065f61146327b997a5da88e703421fb6f1c3cf63fdea02e

  • SHA512

    5d0b6792aab9ce81bcd2e2dc06da76663f29662be3975efdb75f1154aaa49b36b32799fd882da06d9d98a247e77f16b90dcded93a43866127a2531b529c2bef2

  • SSDEEP

    12288:2Mr7y904Q6qeczmnoVXANKCp2+9DMpcAbr2fnFfNf1cuudyO6aasQ2:lyHQ/ecVVXAcCGv2fFf9+um/6aa+

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\80b7edf8fbf49ed29065f61146327b997a5da88e703421fb6f1c3cf63fdea02e.exe
    "C:\Users\Admin\AppData\Local\Temp\80b7edf8fbf49ed29065f61146327b997a5da88e703421fb6f1c3cf63fdea02e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un413570.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un413570.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1804
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5766.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5766.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3856
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7079.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7079.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3048
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si726589.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si726589.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4360

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si726589.exe

    Filesize

    175KB

    MD5

    16dda1c2e35573c53ce6ca6153aebc79

    SHA1

    3919c66e9e865eaf4e1fdd2aca123b28c82038f4

    SHA256

    9f5b1ed15388feeeefa94d0fbee982779e3749fcc4e0f5e31135f10d515a76e8

    SHA512

    79b9ce4fe90226f05dd454a94ccade9598be6d18316587f7514a0efcd6daa846c8dc42197443e3462b291c9e810acdec6a2246857315dac0e7d0fc9c6d972f37

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si726589.exe

    Filesize

    175KB

    MD5

    16dda1c2e35573c53ce6ca6153aebc79

    SHA1

    3919c66e9e865eaf4e1fdd2aca123b28c82038f4

    SHA256

    9f5b1ed15388feeeefa94d0fbee982779e3749fcc4e0f5e31135f10d515a76e8

    SHA512

    79b9ce4fe90226f05dd454a94ccade9598be6d18316587f7514a0efcd6daa846c8dc42197443e3462b291c9e810acdec6a2246857315dac0e7d0fc9c6d972f37

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un413570.exe

    Filesize

    558KB

    MD5

    8a9e068a607086915df7be1c00a2b46b

    SHA1

    9f1b188a3608666898a2084d474129ee1d1f318c

    SHA256

    6573925e79dc0e88ca47e9c2a36d703e3c5eafd739c2f3f2b046240e67ad659b

    SHA512

    6d6fccd92156259144454fd5768c0cb0dc5c6007eba04008382399654ee621fba250631eb323c7a52f4580b2e29e46a25d5c7ab5db3eec7075de5dc14a6875e7

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un413570.exe

    Filesize

    558KB

    MD5

    8a9e068a607086915df7be1c00a2b46b

    SHA1

    9f1b188a3608666898a2084d474129ee1d1f318c

    SHA256

    6573925e79dc0e88ca47e9c2a36d703e3c5eafd739c2f3f2b046240e67ad659b

    SHA512

    6d6fccd92156259144454fd5768c0cb0dc5c6007eba04008382399654ee621fba250631eb323c7a52f4580b2e29e46a25d5c7ab5db3eec7075de5dc14a6875e7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5766.exe

    Filesize

    307KB

    MD5

    be252a8226b0618886d031a2fccb5a7b

    SHA1

    527d39cf08e24f90cf23f6b638a1311d7f7597fa

    SHA256

    658e7fb7cfb139b9aa8c51bbc30c0b1e0931cb403c2c3749070b6e77329cedd5

    SHA512

    c6668c9f5ccf91d524b16699d8cc36e9922661345993a42ba745dc3a21adfbb968912c4441094481b6d897c8d8c13614a2e58c5710a73242365b8cfb316e2b85

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5766.exe

    Filesize

    307KB

    MD5

    be252a8226b0618886d031a2fccb5a7b

    SHA1

    527d39cf08e24f90cf23f6b638a1311d7f7597fa

    SHA256

    658e7fb7cfb139b9aa8c51bbc30c0b1e0931cb403c2c3749070b6e77329cedd5

    SHA512

    c6668c9f5ccf91d524b16699d8cc36e9922661345993a42ba745dc3a21adfbb968912c4441094481b6d897c8d8c13614a2e58c5710a73242365b8cfb316e2b85

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7079.exe

    Filesize

    365KB

    MD5

    dbb4a1f51e12bb36ab7c7749810ad023

    SHA1

    5d93c9f423e1061c21bb08e4dbbc4f87782e697b

    SHA256

    22d469598c4875faf0de7e7be2ee42b798740142622dbda9413c58853435cdf3

    SHA512

    2ff82532451c078cb9a216c9428481e56e93a12e1fcd90bb1990b3d32616d6e42632e7a91e608c0cd7486b3bb186c387a8d1815eb53f9d8f2e18f950784139b6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7079.exe

    Filesize

    365KB

    MD5

    dbb4a1f51e12bb36ab7c7749810ad023

    SHA1

    5d93c9f423e1061c21bb08e4dbbc4f87782e697b

    SHA256

    22d469598c4875faf0de7e7be2ee42b798740142622dbda9413c58853435cdf3

    SHA512

    2ff82532451c078cb9a216c9428481e56e93a12e1fcd90bb1990b3d32616d6e42632e7a91e608c0cd7486b3bb186c387a8d1815eb53f9d8f2e18f950784139b6

  • memory/3048-1092-0x00000000053F0000-0x00000000059F6000-memory.dmp

    Filesize

    6.0MB

  • memory/3048-1093-0x0000000005A00000-0x0000000005B0A000-memory.dmp

    Filesize

    1.0MB

  • memory/3048-1108-0x00000000009D0000-0x00000000009E0000-memory.dmp

    Filesize

    64KB

  • memory/3048-195-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/3048-1107-0x0000000006FB0000-0x0000000007000000-memory.dmp

    Filesize

    320KB

  • memory/3048-197-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/3048-1106-0x0000000006F30000-0x0000000006FA6000-memory.dmp

    Filesize

    472KB

  • memory/3048-1105-0x00000000067D0000-0x0000000006CFC000-memory.dmp

    Filesize

    5.2MB

  • memory/3048-1104-0x00000000065F0000-0x00000000067B2000-memory.dmp

    Filesize

    1.8MB

  • memory/3048-1103-0x00000000009D0000-0x00000000009E0000-memory.dmp

    Filesize

    64KB

  • memory/3048-1102-0x00000000009D0000-0x00000000009E0000-memory.dmp

    Filesize

    64KB

  • memory/3048-1101-0x00000000009D0000-0x00000000009E0000-memory.dmp

    Filesize

    64KB

  • memory/3048-1099-0x0000000005EE0000-0x0000000005F46000-memory.dmp

    Filesize

    408KB

  • memory/3048-1098-0x0000000005E40000-0x0000000005ED2000-memory.dmp

    Filesize

    584KB

  • memory/3048-1097-0x00000000009D0000-0x00000000009E0000-memory.dmp

    Filesize

    64KB

  • memory/3048-1096-0x0000000005CB0000-0x0000000005CFB000-memory.dmp

    Filesize

    300KB

  • memory/3048-1095-0x0000000005B60000-0x0000000005B9E000-memory.dmp

    Filesize

    248KB

  • memory/3048-1094-0x0000000005B40000-0x0000000005B52000-memory.dmp

    Filesize

    72KB

  • memory/3048-199-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/3048-207-0x00000000009D0000-0x00000000009E0000-memory.dmp

    Filesize

    64KB

  • memory/3048-219-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/3048-217-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/3048-215-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/3048-213-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/3048-204-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/3048-180-0x0000000000C10000-0x0000000000C56000-memory.dmp

    Filesize

    280KB

  • memory/3048-181-0x0000000002690000-0x00000000026D4000-memory.dmp

    Filesize

    272KB

  • memory/3048-182-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/3048-183-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/3048-185-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/3048-187-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/3048-189-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/3048-191-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/3048-193-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/3048-208-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/3048-210-0x00000000009D0000-0x00000000009E0000-memory.dmp

    Filesize

    64KB

  • memory/3048-211-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/3048-201-0x0000000002690000-0x00000000026CF000-memory.dmp

    Filesize

    252KB

  • memory/3048-203-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/3048-205-0x00000000009D0000-0x00000000009E0000-memory.dmp

    Filesize

    64KB

  • memory/3856-170-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/3856-139-0x0000000002590000-0x00000000025A0000-memory.dmp

    Filesize

    64KB

  • memory/3856-145-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/3856-142-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/3856-138-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/3856-140-0x0000000002590000-0x00000000025A0000-memory.dmp

    Filesize

    64KB

  • memory/3856-175-0x0000000000400000-0x000000000070F000-memory.dmp

    Filesize

    3.1MB

  • memory/3856-173-0x0000000002590000-0x00000000025A0000-memory.dmp

    Filesize

    64KB

  • memory/3856-172-0x0000000002590000-0x00000000025A0000-memory.dmp

    Filesize

    64KB

  • memory/3856-137-0x00000000025C0000-0x00000000025D8000-memory.dmp

    Filesize

    96KB

  • memory/3856-171-0x0000000002590000-0x00000000025A0000-memory.dmp

    Filesize

    64KB

  • memory/3856-169-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/3856-167-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/3856-165-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/3856-163-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/3856-161-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/3856-159-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/3856-157-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/3856-155-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/3856-153-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/3856-151-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/3856-149-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/3856-147-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/3856-143-0x00000000025C0000-0x00000000025D2000-memory.dmp

    Filesize

    72KB

  • memory/3856-141-0x0000000002590000-0x00000000025A0000-memory.dmp

    Filesize

    64KB

  • memory/3856-136-0x0000000004E30000-0x000000000532E000-memory.dmp

    Filesize

    5.0MB

  • memory/3856-135-0x00000000009D0000-0x00000000009EA000-memory.dmp

    Filesize

    104KB

  • memory/4360-1114-0x0000000000950000-0x0000000000982000-memory.dmp

    Filesize

    200KB

  • memory/4360-1115-0x0000000005390000-0x00000000053DB000-memory.dmp

    Filesize

    300KB

  • memory/4360-1116-0x0000000005270000-0x0000000005280000-memory.dmp

    Filesize

    64KB

  • memory/4360-1117-0x0000000005270000-0x0000000005280000-memory.dmp

    Filesize

    64KB