Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 01:44

General

  • Target

    63a0a84549592f0b68d0d18d8a160352ec6fe0d3f5db4425a2a655b2f3fce47b.exe

  • Size

    690KB

  • MD5

    f97ba0e181e85ea0adeebacbd9eb881b

  • SHA1

    0b076a56ea3f490816c9a15083d102705dd959b9

  • SHA256

    63a0a84549592f0b68d0d18d8a160352ec6fe0d3f5db4425a2a655b2f3fce47b

  • SHA512

    1429ee7a073aa921dc2fdc0c12e539085f57deee8dab000158c550f10d6a8b2c38e5b69b989984debb9521d27cafacd7fd809964029c17173b1e91fd5f68724d

  • SSDEEP

    12288:SMrey90BS69S+vJs5LyK65hLuk7MSKE3ZDXtDTpvmFgtfigvwt/tBI+guGn:gySScS+vp5fak7Lt3ZLtDlSgtagvci

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 22 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\63a0a84549592f0b68d0d18d8a160352ec6fe0d3f5db4425a2a655b2f3fce47b.exe
    "C:\Users\Admin\AppData\Local\Temp\63a0a84549592f0b68d0d18d8a160352ec6fe0d3f5db4425a2a655b2f3fce47b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4224
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un514474.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un514474.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3528
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0229.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0229.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2837.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2837.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4480
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si116083.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si116083.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4164

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si116083.exe

    Filesize

    175KB

    MD5

    ba51e7854322ba37ce8e21415b144b65

    SHA1

    38682eb771a40e2dff69a2e368a08eebbf16834f

    SHA256

    960170e1b04f174877b364e9a473dd7aaa339be7ae32a19ea8c62472c1ba7079

    SHA512

    0ea0753ca86f9ab9e4413cf9862c97535eb1cee7e2bf1651313379c1224762a0bfb50d172a507b0f36a9a2e316e766ee9dab18151efd70b0d74b10629cc54b1c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si116083.exe

    Filesize

    175KB

    MD5

    ba51e7854322ba37ce8e21415b144b65

    SHA1

    38682eb771a40e2dff69a2e368a08eebbf16834f

    SHA256

    960170e1b04f174877b364e9a473dd7aaa339be7ae32a19ea8c62472c1ba7079

    SHA512

    0ea0753ca86f9ab9e4413cf9862c97535eb1cee7e2bf1651313379c1224762a0bfb50d172a507b0f36a9a2e316e766ee9dab18151efd70b0d74b10629cc54b1c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un514474.exe

    Filesize

    548KB

    MD5

    a4d5bc4d0d0b2a17510373fccb071eb5

    SHA1

    ad0aa7d75e3ef418d0430f1e70b35b7be0c2594e

    SHA256

    845f1145e359e8e08bcd7cc14e1ca599630b5e2b08a6e124da715c753b737ace

    SHA512

    87dadcb782ddf3b45af8af5a1fb29b8e0938d84747f975eddca369c64fc432812d35270b36379ecba4c7a7943b2bfad7330be067511a3f1d3aeb21a19d375a12

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un514474.exe

    Filesize

    548KB

    MD5

    a4d5bc4d0d0b2a17510373fccb071eb5

    SHA1

    ad0aa7d75e3ef418d0430f1e70b35b7be0c2594e

    SHA256

    845f1145e359e8e08bcd7cc14e1ca599630b5e2b08a6e124da715c753b737ace

    SHA512

    87dadcb782ddf3b45af8af5a1fb29b8e0938d84747f975eddca369c64fc432812d35270b36379ecba4c7a7943b2bfad7330be067511a3f1d3aeb21a19d375a12

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0229.exe

    Filesize

    291KB

    MD5

    bada2e9688ef2f1e09e4839ecac6b4d0

    SHA1

    1f3c1f5213fd320c8a573c0ccf0a7238d0d61465

    SHA256

    b894b9a0e0a8090f643b841be8b0bc1cc389cd0e262e23a66495db4cc26d9bc2

    SHA512

    6c4f023a0b13244137fb06d58cf9540e4605cf20b85924224f7031b45f67d1bd4e275f21c909072901a1421f7b0eeff3197e95a762402e218d03a0b9649c63af

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0229.exe

    Filesize

    291KB

    MD5

    bada2e9688ef2f1e09e4839ecac6b4d0

    SHA1

    1f3c1f5213fd320c8a573c0ccf0a7238d0d61465

    SHA256

    b894b9a0e0a8090f643b841be8b0bc1cc389cd0e262e23a66495db4cc26d9bc2

    SHA512

    6c4f023a0b13244137fb06d58cf9540e4605cf20b85924224f7031b45f67d1bd4e275f21c909072901a1421f7b0eeff3197e95a762402e218d03a0b9649c63af

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2837.exe

    Filesize

    345KB

    MD5

    aed8c92b2745a652e4455986744b866d

    SHA1

    3940c8120b050c645e1a0f67f3e2d3da8d3dc470

    SHA256

    dfbf4ef2ffe104547a546aa6bb0d5bcb32cbdb0864b7f4b1dd41cf311cc565e0

    SHA512

    053468c58edc36dcb196d0dc2c80bd5e0b6e84c4e2f5903d0fe67b68a1de82f35c29c79c9e1ba51c01fc24489730e2bcd9702474a66d0e15add311e4f904987b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2837.exe

    Filesize

    345KB

    MD5

    aed8c92b2745a652e4455986744b866d

    SHA1

    3940c8120b050c645e1a0f67f3e2d3da8d3dc470

    SHA256

    dfbf4ef2ffe104547a546aa6bb0d5bcb32cbdb0864b7f4b1dd41cf311cc565e0

    SHA512

    053468c58edc36dcb196d0dc2c80bd5e0b6e84c4e2f5903d0fe67b68a1de82f35c29c79c9e1ba51c01fc24489730e2bcd9702474a66d0e15add311e4f904987b

  • memory/1600-143-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/1600-153-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/1600-133-0x0000000004C30000-0x0000000004C48000-memory.dmp

    Filesize

    96KB

  • memory/1600-134-0x00000000007E0000-0x000000000080D000-memory.dmp

    Filesize

    180KB

  • memory/1600-135-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/1600-136-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/1600-137-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/1600-138-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/1600-139-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/1600-141-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/1600-131-0x0000000002390000-0x00000000023AA000-memory.dmp

    Filesize

    104KB

  • memory/1600-145-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/1600-147-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/1600-149-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/1600-151-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/1600-132-0x0000000004D10000-0x000000000520E000-memory.dmp

    Filesize

    5.0MB

  • memory/1600-155-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/1600-157-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/1600-159-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/1600-161-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/1600-165-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/1600-163-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/1600-166-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/1600-167-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/1600-169-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/1600-170-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/1600-171-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/4164-1110-0x00000000005F0000-0x0000000000622000-memory.dmp

    Filesize

    200KB

  • memory/4164-1113-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

    Filesize

    64KB

  • memory/4164-1112-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

    Filesize

    64KB

  • memory/4164-1111-0x0000000004E70000-0x0000000004EBB000-memory.dmp

    Filesize

    300KB

  • memory/4480-178-0x0000000006520000-0x000000000655F000-memory.dmp

    Filesize

    252KB

  • memory/4480-252-0x0000000006010000-0x0000000006020000-memory.dmp

    Filesize

    64KB

  • memory/4480-183-0x0000000006520000-0x000000000655F000-memory.dmp

    Filesize

    252KB

  • memory/4480-185-0x0000000006520000-0x000000000655F000-memory.dmp

    Filesize

    252KB

  • memory/4480-187-0x0000000006520000-0x000000000655F000-memory.dmp

    Filesize

    252KB

  • memory/4480-189-0x0000000006520000-0x000000000655F000-memory.dmp

    Filesize

    252KB

  • memory/4480-191-0x0000000006520000-0x000000000655F000-memory.dmp

    Filesize

    252KB

  • memory/4480-193-0x0000000006520000-0x000000000655F000-memory.dmp

    Filesize

    252KB

  • memory/4480-195-0x0000000006520000-0x000000000655F000-memory.dmp

    Filesize

    252KB

  • memory/4480-197-0x0000000006520000-0x000000000655F000-memory.dmp

    Filesize

    252KB

  • memory/4480-199-0x0000000006520000-0x000000000655F000-memory.dmp

    Filesize

    252KB

  • memory/4480-201-0x0000000006520000-0x000000000655F000-memory.dmp

    Filesize

    252KB

  • memory/4480-203-0x0000000006520000-0x000000000655F000-memory.dmp

    Filesize

    252KB

  • memory/4480-205-0x0000000006520000-0x000000000655F000-memory.dmp

    Filesize

    252KB

  • memory/4480-207-0x0000000006520000-0x000000000655F000-memory.dmp

    Filesize

    252KB

  • memory/4480-209-0x0000000006520000-0x000000000655F000-memory.dmp

    Filesize

    252KB

  • memory/4480-211-0x0000000006520000-0x000000000655F000-memory.dmp

    Filesize

    252KB

  • memory/4480-250-0x0000000001A30000-0x0000000001A7B000-memory.dmp

    Filesize

    300KB

  • memory/4480-254-0x0000000006010000-0x0000000006020000-memory.dmp

    Filesize

    64KB

  • memory/4480-181-0x0000000006520000-0x000000000655F000-memory.dmp

    Filesize

    252KB

  • memory/4480-256-0x0000000006010000-0x0000000006020000-memory.dmp

    Filesize

    64KB

  • memory/4480-1088-0x0000000006CB0000-0x00000000072B6000-memory.dmp

    Filesize

    6.0MB

  • memory/4480-1089-0x0000000006700000-0x000000000680A000-memory.dmp

    Filesize

    1.0MB

  • memory/4480-1090-0x0000000006840000-0x0000000006852000-memory.dmp

    Filesize

    72KB

  • memory/4480-1091-0x0000000006860000-0x000000000689E000-memory.dmp

    Filesize

    248KB

  • memory/4480-1092-0x00000000069B0000-0x00000000069FB000-memory.dmp

    Filesize

    300KB

  • memory/4480-1093-0x0000000006010000-0x0000000006020000-memory.dmp

    Filesize

    64KB

  • memory/4480-1094-0x0000000006B40000-0x0000000006BD2000-memory.dmp

    Filesize

    584KB

  • memory/4480-1095-0x0000000006BE0000-0x0000000006C46000-memory.dmp

    Filesize

    408KB

  • memory/4480-1097-0x0000000007A10000-0x0000000007BD2000-memory.dmp

    Filesize

    1.8MB

  • memory/4480-1098-0x0000000007BE0000-0x000000000810C000-memory.dmp

    Filesize

    5.2MB

  • memory/4480-1099-0x0000000008230000-0x00000000082A6000-memory.dmp

    Filesize

    472KB

  • memory/4480-1100-0x00000000082B0000-0x0000000008300000-memory.dmp

    Filesize

    320KB

  • memory/4480-1101-0x0000000006010000-0x0000000006020000-memory.dmp

    Filesize

    64KB

  • memory/4480-179-0x0000000006520000-0x000000000655F000-memory.dmp

    Filesize

    252KB

  • memory/4480-177-0x0000000006520000-0x0000000006564000-memory.dmp

    Filesize

    272KB

  • memory/4480-176-0x0000000003870000-0x00000000038B6000-memory.dmp

    Filesize

    280KB

  • memory/4480-1102-0x0000000006010000-0x0000000006020000-memory.dmp

    Filesize

    64KB

  • memory/4480-1103-0x0000000006010000-0x0000000006020000-memory.dmp

    Filesize

    64KB

  • memory/4480-1104-0x0000000006010000-0x0000000006020000-memory.dmp

    Filesize

    64KB