Analysis

  • max time kernel
    86s
  • max time network
    88s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 01:46

General

  • Target

    a9a98a4f5f158736b9b0944c2d9a4b23b41f09e2f3abca85beb8651fd05c2730.exe

  • Size

    689KB

  • MD5

    19d777330aae9f2f70e83668e130f460

  • SHA1

    3519b6d1dea28a3543c42f09a06080c0469d1810

  • SHA256

    a9a98a4f5f158736b9b0944c2d9a4b23b41f09e2f3abca85beb8651fd05c2730

  • SHA512

    887c97dc33f5d1efa4a19396d8428dbd743f72e19415f10624cc59d9edc8068e1a4cfb1485f0c74c158ca8048e20d3837f721ed3294a4263f0768d16604b6e72

  • SSDEEP

    12288:cMr/y90ehwqG8pPIx8rRdxoaB5mgHrlmJfvxF6WfigjG6Plekyv:zyVhwqGS4aB5pmJfT6Wag66Pyv

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a9a98a4f5f158736b9b0944c2d9a4b23b41f09e2f3abca85beb8651fd05c2730.exe
    "C:\Users\Admin\AppData\Local\Temp\a9a98a4f5f158736b9b0944c2d9a4b23b41f09e2f3abca85beb8651fd05c2730.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3956
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un433326.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un433326.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2092
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7247.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7247.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4256
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1924.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1924.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2120
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si141615.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si141615.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4624

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si141615.exe

    Filesize

    175KB

    MD5

    ffe05c4b7e826ae26b8ce85199c5d803

    SHA1

    acd80d441144784e7fb7dd8aa349245e8d9b272c

    SHA256

    4907b54ecba644a1f8a525aecc7faa27ecff33f355590ba9896fb369fd4d3481

    SHA512

    cb0218335ec0cb5e110844e84f16a7bcbf648a887ca519f86ae91acccce18524e662c584afcebf8aff518d9a776309f1148bad00f8c63994db429c9beb8dc756

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si141615.exe

    Filesize

    175KB

    MD5

    ffe05c4b7e826ae26b8ce85199c5d803

    SHA1

    acd80d441144784e7fb7dd8aa349245e8d9b272c

    SHA256

    4907b54ecba644a1f8a525aecc7faa27ecff33f355590ba9896fb369fd4d3481

    SHA512

    cb0218335ec0cb5e110844e84f16a7bcbf648a887ca519f86ae91acccce18524e662c584afcebf8aff518d9a776309f1148bad00f8c63994db429c9beb8dc756

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un433326.exe

    Filesize

    547KB

    MD5

    bd0d420f4d2ce4ad759468c68721db2d

    SHA1

    01d205c2f0af38e20ebe0abe169e3e735bf9bcbf

    SHA256

    95fa01c33a231099ea5eb8f42017ddaccb7b703aaba961a191b18a1ee5a1d37a

    SHA512

    1470d7ba6573c248ee8e9cc7428ebcb7c360a385a5416732fb6cf33df23b111ce0a7680bbc759acd77015afaf0d977dfdca77bc07d32c8c1e38dda08a8a89309

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un433326.exe

    Filesize

    547KB

    MD5

    bd0d420f4d2ce4ad759468c68721db2d

    SHA1

    01d205c2f0af38e20ebe0abe169e3e735bf9bcbf

    SHA256

    95fa01c33a231099ea5eb8f42017ddaccb7b703aaba961a191b18a1ee5a1d37a

    SHA512

    1470d7ba6573c248ee8e9cc7428ebcb7c360a385a5416732fb6cf33df23b111ce0a7680bbc759acd77015afaf0d977dfdca77bc07d32c8c1e38dda08a8a89309

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7247.exe

    Filesize

    291KB

    MD5

    38e6752b8a5de5acd210fdd5d7e5cb09

    SHA1

    2f50b1ae525d863377069ae4ed8b2cfaa6130266

    SHA256

    6588953e822e35ab1897666bc50a499f3c0a2959c3ff43b4b1ced0d0a0679088

    SHA512

    2d0587227716078b6c0dc0e260ddd1deee7856b84f96f719c14b712532414cd6f38f38627709a2be6b8056bed7e1d3658a8a52c2cd35be856c84cd39596131db

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7247.exe

    Filesize

    291KB

    MD5

    38e6752b8a5de5acd210fdd5d7e5cb09

    SHA1

    2f50b1ae525d863377069ae4ed8b2cfaa6130266

    SHA256

    6588953e822e35ab1897666bc50a499f3c0a2959c3ff43b4b1ced0d0a0679088

    SHA512

    2d0587227716078b6c0dc0e260ddd1deee7856b84f96f719c14b712532414cd6f38f38627709a2be6b8056bed7e1d3658a8a52c2cd35be856c84cd39596131db

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1924.exe

    Filesize

    345KB

    MD5

    f51f955485a075e3e4eea931ec9caab3

    SHA1

    b263b55d1b32046c6a470e6994fe86dd8be7afa0

    SHA256

    7694b2ff939fd77fb7c941b0c50789f56d529968e7f278ab9e91737db20667d5

    SHA512

    4cd5ac7038f9ca9c2aaa20fc1cf663f98acada6729513f50a1f01fca1b204388b200918f86bc58050d674b0514a9f65dfbfa43df994c5074093aaa03ce563170

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1924.exe

    Filesize

    345KB

    MD5

    f51f955485a075e3e4eea931ec9caab3

    SHA1

    b263b55d1b32046c6a470e6994fe86dd8be7afa0

    SHA256

    7694b2ff939fd77fb7c941b0c50789f56d529968e7f278ab9e91737db20667d5

    SHA512

    4cd5ac7038f9ca9c2aaa20fc1cf663f98acada6729513f50a1f01fca1b204388b200918f86bc58050d674b0514a9f65dfbfa43df994c5074093aaa03ce563170

  • memory/2120-1091-0x0000000006680000-0x0000000006C86000-memory.dmp

    Filesize

    6.0MB

  • memory/2120-247-0x0000000005FF0000-0x0000000006000000-memory.dmp

    Filesize

    64KB

  • memory/2120-1107-0x0000000005FF0000-0x0000000006000000-memory.dmp

    Filesize

    64KB

  • memory/2120-1106-0x00000000082B0000-0x0000000008300000-memory.dmp

    Filesize

    320KB

  • memory/2120-1105-0x0000000008230000-0x00000000082A6000-memory.dmp

    Filesize

    472KB

  • memory/2120-196-0x0000000006500000-0x000000000653F000-memory.dmp

    Filesize

    252KB

  • memory/2120-1104-0x0000000005FF0000-0x0000000006000000-memory.dmp

    Filesize

    64KB

  • memory/2120-1103-0x0000000005FF0000-0x0000000006000000-memory.dmp

    Filesize

    64KB

  • memory/2120-1102-0x0000000005FF0000-0x0000000006000000-memory.dmp

    Filesize

    64KB

  • memory/2120-1101-0x0000000007AD0000-0x0000000007FFC000-memory.dmp

    Filesize

    5.2MB

  • memory/2120-198-0x0000000006500000-0x000000000653F000-memory.dmp

    Filesize

    252KB

  • memory/2120-1100-0x0000000007900000-0x0000000007AC2000-memory.dmp

    Filesize

    1.8MB

  • memory/2120-1098-0x00000000076F0000-0x0000000007782000-memory.dmp

    Filesize

    584KB

  • memory/2120-1097-0x0000000007150000-0x00000000071B6000-memory.dmp

    Filesize

    408KB

  • memory/2120-1096-0x0000000006FC0000-0x000000000700B000-memory.dmp

    Filesize

    300KB

  • memory/2120-1095-0x0000000006E70000-0x0000000006EAE000-memory.dmp

    Filesize

    248KB

  • memory/2120-1094-0x0000000005FF0000-0x0000000006000000-memory.dmp

    Filesize

    64KB

  • memory/2120-1093-0x0000000006E50000-0x0000000006E62000-memory.dmp

    Filesize

    72KB

  • memory/2120-1092-0x0000000006D10000-0x0000000006E1A000-memory.dmp

    Filesize

    1.0MB

  • memory/2120-206-0x0000000006500000-0x000000000653F000-memory.dmp

    Filesize

    252KB

  • memory/2120-245-0x0000000005FF0000-0x0000000006000000-memory.dmp

    Filesize

    64KB

  • memory/2120-243-0x0000000005FF0000-0x0000000006000000-memory.dmp

    Filesize

    64KB

  • memory/2120-242-0x0000000001B80000-0x0000000001BCB000-memory.dmp

    Filesize

    300KB

  • memory/2120-214-0x0000000006500000-0x000000000653F000-memory.dmp

    Filesize

    252KB

  • memory/2120-212-0x0000000006500000-0x000000000653F000-memory.dmp

    Filesize

    252KB

  • memory/2120-179-0x0000000005F40000-0x0000000005F86000-memory.dmp

    Filesize

    280KB

  • memory/2120-180-0x0000000006500000-0x0000000006544000-memory.dmp

    Filesize

    272KB

  • memory/2120-181-0x0000000006500000-0x000000000653F000-memory.dmp

    Filesize

    252KB

  • memory/2120-182-0x0000000006500000-0x000000000653F000-memory.dmp

    Filesize

    252KB

  • memory/2120-194-0x0000000006500000-0x000000000653F000-memory.dmp

    Filesize

    252KB

  • memory/2120-186-0x0000000006500000-0x000000000653F000-memory.dmp

    Filesize

    252KB

  • memory/2120-188-0x0000000006500000-0x000000000653F000-memory.dmp

    Filesize

    252KB

  • memory/2120-190-0x0000000006500000-0x000000000653F000-memory.dmp

    Filesize

    252KB

  • memory/2120-192-0x0000000006500000-0x000000000653F000-memory.dmp

    Filesize

    252KB

  • memory/2120-184-0x0000000006500000-0x000000000653F000-memory.dmp

    Filesize

    252KB

  • memory/2120-210-0x0000000006500000-0x000000000653F000-memory.dmp

    Filesize

    252KB

  • memory/2120-208-0x0000000006500000-0x000000000653F000-memory.dmp

    Filesize

    252KB

  • memory/2120-200-0x0000000006500000-0x000000000653F000-memory.dmp

    Filesize

    252KB

  • memory/2120-202-0x0000000006500000-0x000000000653F000-memory.dmp

    Filesize

    252KB

  • memory/2120-204-0x0000000006500000-0x000000000653F000-memory.dmp

    Filesize

    252KB

  • memory/4256-169-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/4256-154-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4256-144-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4256-137-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4256-138-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/4256-174-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/4256-172-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/4256-171-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/4256-170-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/4256-136-0x0000000004C40000-0x0000000004C58000-memory.dmp

    Filesize

    96KB

  • memory/4256-139-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/4256-168-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4256-166-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4256-164-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4256-162-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4256-160-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4256-158-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4256-156-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4256-152-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4256-150-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4256-148-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4256-146-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4256-142-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4256-141-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4256-140-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/4256-135-0x0000000004D70000-0x000000000526E000-memory.dmp

    Filesize

    5.0MB

  • memory/4256-134-0x00000000024A0000-0x00000000024BA000-memory.dmp

    Filesize

    104KB

  • memory/4624-1113-0x0000000000A10000-0x0000000000A42000-memory.dmp

    Filesize

    200KB

  • memory/4624-1114-0x0000000005450000-0x000000000549B000-memory.dmp

    Filesize

    300KB

  • memory/4624-1115-0x0000000005590000-0x00000000055A0000-memory.dmp

    Filesize

    64KB