Analysis

  • max time kernel
    45s
  • max time network
    55s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    28-03-2023 00:57

General

  • Target

    setup.exe

  • Size

    699KB

  • MD5

    428b136f6c2f7cac893d1b08e36651a2

  • SHA1

    681461648d6ebd29b6ad0fa2c8fb18148b304a23

  • SHA256

    20fed0270b728e9f1e59f3a13ae2341087f089ac274618739c1f2de4d3978512

  • SHA512

    11a8d1fb8f9d5b58c8354b750be59de30e619d724e727c12104dc00d90da762174c25468edfaf23918bccc0df30678c926e2bfa590b5d83e09fd467cba535929

  • SSDEEP

    12288:EMrDy90JW7/U4FK7/irdxgXuh4CjSrGMFqfej7cxor7ic:fykAr+iTMtBrlCeHcxor7P

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 22 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1440
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un901488.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un901488.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1940
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2072.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2072.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Loads dropped DLL
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1728
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7650.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7650.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:948
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si658509.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si658509.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1500

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si658509.exe
    Filesize

    175KB

    MD5

    d290a8179e666e9c40fafb2d9e632281

    SHA1

    8c5a8c429ca56f90f674d5309455115e2f012ad5

    SHA256

    d420a728a63a6369037d46fbff2a40fa52b2045e4a8ddf4a75257756038890f2

    SHA512

    76a6f4abd1b7ea626a33eb39bbe2047d6b29c78f19c93eee9bfe5ad4ca4d269dbf7055e07888f32317dc69e29ffe5f23af82b8f0b9b6e5990f385160d568db7c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si658509.exe
    Filesize

    175KB

    MD5

    d290a8179e666e9c40fafb2d9e632281

    SHA1

    8c5a8c429ca56f90f674d5309455115e2f012ad5

    SHA256

    d420a728a63a6369037d46fbff2a40fa52b2045e4a8ddf4a75257756038890f2

    SHA512

    76a6f4abd1b7ea626a33eb39bbe2047d6b29c78f19c93eee9bfe5ad4ca4d269dbf7055e07888f32317dc69e29ffe5f23af82b8f0b9b6e5990f385160d568db7c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un901488.exe
    Filesize

    557KB

    MD5

    255de320d6cad4722e0eabb2f92047b8

    SHA1

    8a277f54ba36dd907e81d513f2033090a42edf88

    SHA256

    cc0f1f8c28cdaa2cc982655cf858d8b19b843f176c2fdac8d5fd1ee820c5285e

    SHA512

    a6aa3431daa13ff3a092cdb6614b304f884289ecff50d8927413bef141bfb0b02da63970e702d2f2f221911d0de038cb4b62b4bd840763657539302287ac7581

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un901488.exe
    Filesize

    557KB

    MD5

    255de320d6cad4722e0eabb2f92047b8

    SHA1

    8a277f54ba36dd907e81d513f2033090a42edf88

    SHA256

    cc0f1f8c28cdaa2cc982655cf858d8b19b843f176c2fdac8d5fd1ee820c5285e

    SHA512

    a6aa3431daa13ff3a092cdb6614b304f884289ecff50d8927413bef141bfb0b02da63970e702d2f2f221911d0de038cb4b62b4bd840763657539302287ac7581

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2072.exe
    Filesize

    307KB

    MD5

    d7540529573170feb26fe106cc723e12

    SHA1

    0ef542a6c05aa4f49034b21b172f787383a610fe

    SHA256

    7803d47bab1a5f582f6c0b07cb2d41e049475d878e15006b02bfa90d10f57887

    SHA512

    035b73de7ae35bfe5018a626f795d79737d63217b7abdd3582b6b4014a143f08ffc621b8e4bbbef58170e48419d5cde49eff3bc99a964568be2022d8e33d607d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2072.exe
    Filesize

    307KB

    MD5

    d7540529573170feb26fe106cc723e12

    SHA1

    0ef542a6c05aa4f49034b21b172f787383a610fe

    SHA256

    7803d47bab1a5f582f6c0b07cb2d41e049475d878e15006b02bfa90d10f57887

    SHA512

    035b73de7ae35bfe5018a626f795d79737d63217b7abdd3582b6b4014a143f08ffc621b8e4bbbef58170e48419d5cde49eff3bc99a964568be2022d8e33d607d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2072.exe
    Filesize

    307KB

    MD5

    d7540529573170feb26fe106cc723e12

    SHA1

    0ef542a6c05aa4f49034b21b172f787383a610fe

    SHA256

    7803d47bab1a5f582f6c0b07cb2d41e049475d878e15006b02bfa90d10f57887

    SHA512

    035b73de7ae35bfe5018a626f795d79737d63217b7abdd3582b6b4014a143f08ffc621b8e4bbbef58170e48419d5cde49eff3bc99a964568be2022d8e33d607d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7650.exe
    Filesize

    365KB

    MD5

    12415a60c751a10ec84b1d3c256eecdb

    SHA1

    120ea9985ca8c9c844254c37e014836263ea8f79

    SHA256

    6788ef9cc90c54d2549d8e552b23c11f9ec8094ce5aa2ec97c6e139d66236010

    SHA512

    97d448028faf480cd24ee44b97c1485f1502f200ea8c9f5544bcb55007bc6c17968f195d8c93327c1d7ed9edd505cd6597c9f4129ec10e956736b895c51adcae

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7650.exe
    Filesize

    365KB

    MD5

    12415a60c751a10ec84b1d3c256eecdb

    SHA1

    120ea9985ca8c9c844254c37e014836263ea8f79

    SHA256

    6788ef9cc90c54d2549d8e552b23c11f9ec8094ce5aa2ec97c6e139d66236010

    SHA512

    97d448028faf480cd24ee44b97c1485f1502f200ea8c9f5544bcb55007bc6c17968f195d8c93327c1d7ed9edd505cd6597c9f4129ec10e956736b895c51adcae

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7650.exe
    Filesize

    365KB

    MD5

    12415a60c751a10ec84b1d3c256eecdb

    SHA1

    120ea9985ca8c9c844254c37e014836263ea8f79

    SHA256

    6788ef9cc90c54d2549d8e552b23c11f9ec8094ce5aa2ec97c6e139d66236010

    SHA512

    97d448028faf480cd24ee44b97c1485f1502f200ea8c9f5544bcb55007bc6c17968f195d8c93327c1d7ed9edd505cd6597c9f4129ec10e956736b895c51adcae

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\si658509.exe
    Filesize

    175KB

    MD5

    d290a8179e666e9c40fafb2d9e632281

    SHA1

    8c5a8c429ca56f90f674d5309455115e2f012ad5

    SHA256

    d420a728a63a6369037d46fbff2a40fa52b2045e4a8ddf4a75257756038890f2

    SHA512

    76a6f4abd1b7ea626a33eb39bbe2047d6b29c78f19c93eee9bfe5ad4ca4d269dbf7055e07888f32317dc69e29ffe5f23af82b8f0b9b6e5990f385160d568db7c

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\si658509.exe
    Filesize

    175KB

    MD5

    d290a8179e666e9c40fafb2d9e632281

    SHA1

    8c5a8c429ca56f90f674d5309455115e2f012ad5

    SHA256

    d420a728a63a6369037d46fbff2a40fa52b2045e4a8ddf4a75257756038890f2

    SHA512

    76a6f4abd1b7ea626a33eb39bbe2047d6b29c78f19c93eee9bfe5ad4ca4d269dbf7055e07888f32317dc69e29ffe5f23af82b8f0b9b6e5990f385160d568db7c

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un901488.exe
    Filesize

    557KB

    MD5

    255de320d6cad4722e0eabb2f92047b8

    SHA1

    8a277f54ba36dd907e81d513f2033090a42edf88

    SHA256

    cc0f1f8c28cdaa2cc982655cf858d8b19b843f176c2fdac8d5fd1ee820c5285e

    SHA512

    a6aa3431daa13ff3a092cdb6614b304f884289ecff50d8927413bef141bfb0b02da63970e702d2f2f221911d0de038cb4b62b4bd840763657539302287ac7581

  • \Users\Admin\AppData\Local\Temp\IXP000.TMP\un901488.exe
    Filesize

    557KB

    MD5

    255de320d6cad4722e0eabb2f92047b8

    SHA1

    8a277f54ba36dd907e81d513f2033090a42edf88

    SHA256

    cc0f1f8c28cdaa2cc982655cf858d8b19b843f176c2fdac8d5fd1ee820c5285e

    SHA512

    a6aa3431daa13ff3a092cdb6614b304f884289ecff50d8927413bef141bfb0b02da63970e702d2f2f221911d0de038cb4b62b4bd840763657539302287ac7581

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2072.exe
    Filesize

    307KB

    MD5

    d7540529573170feb26fe106cc723e12

    SHA1

    0ef542a6c05aa4f49034b21b172f787383a610fe

    SHA256

    7803d47bab1a5f582f6c0b07cb2d41e049475d878e15006b02bfa90d10f57887

    SHA512

    035b73de7ae35bfe5018a626f795d79737d63217b7abdd3582b6b4014a143f08ffc621b8e4bbbef58170e48419d5cde49eff3bc99a964568be2022d8e33d607d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2072.exe
    Filesize

    307KB

    MD5

    d7540529573170feb26fe106cc723e12

    SHA1

    0ef542a6c05aa4f49034b21b172f787383a610fe

    SHA256

    7803d47bab1a5f582f6c0b07cb2d41e049475d878e15006b02bfa90d10f57887

    SHA512

    035b73de7ae35bfe5018a626f795d79737d63217b7abdd3582b6b4014a143f08ffc621b8e4bbbef58170e48419d5cde49eff3bc99a964568be2022d8e33d607d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2072.exe
    Filesize

    307KB

    MD5

    d7540529573170feb26fe106cc723e12

    SHA1

    0ef542a6c05aa4f49034b21b172f787383a610fe

    SHA256

    7803d47bab1a5f582f6c0b07cb2d41e049475d878e15006b02bfa90d10f57887

    SHA512

    035b73de7ae35bfe5018a626f795d79737d63217b7abdd3582b6b4014a143f08ffc621b8e4bbbef58170e48419d5cde49eff3bc99a964568be2022d8e33d607d

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7650.exe
    Filesize

    365KB

    MD5

    12415a60c751a10ec84b1d3c256eecdb

    SHA1

    120ea9985ca8c9c844254c37e014836263ea8f79

    SHA256

    6788ef9cc90c54d2549d8e552b23c11f9ec8094ce5aa2ec97c6e139d66236010

    SHA512

    97d448028faf480cd24ee44b97c1485f1502f200ea8c9f5544bcb55007bc6c17968f195d8c93327c1d7ed9edd505cd6597c9f4129ec10e956736b895c51adcae

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7650.exe
    Filesize

    365KB

    MD5

    12415a60c751a10ec84b1d3c256eecdb

    SHA1

    120ea9985ca8c9c844254c37e014836263ea8f79

    SHA256

    6788ef9cc90c54d2549d8e552b23c11f9ec8094ce5aa2ec97c6e139d66236010

    SHA512

    97d448028faf480cd24ee44b97c1485f1502f200ea8c9f5544bcb55007bc6c17968f195d8c93327c1d7ed9edd505cd6597c9f4129ec10e956736b895c51adcae

  • \Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7650.exe
    Filesize

    365KB

    MD5

    12415a60c751a10ec84b1d3c256eecdb

    SHA1

    120ea9985ca8c9c844254c37e014836263ea8f79

    SHA256

    6788ef9cc90c54d2549d8e552b23c11f9ec8094ce5aa2ec97c6e139d66236010

    SHA512

    97d448028faf480cd24ee44b97c1485f1502f200ea8c9f5544bcb55007bc6c17968f195d8c93327c1d7ed9edd505cd6597c9f4129ec10e956736b895c51adcae

  • memory/948-141-0x0000000004D50000-0x0000000004D90000-memory.dmp
    Filesize

    256KB

  • memory/948-150-0x00000000023E0000-0x000000000241F000-memory.dmp
    Filesize

    252KB

  • memory/948-1033-0x0000000004D50000-0x0000000004D90000-memory.dmp
    Filesize

    256KB

  • memory/948-160-0x00000000023E0000-0x000000000241F000-memory.dmp
    Filesize

    252KB

  • memory/948-158-0x00000000023E0000-0x000000000241F000-memory.dmp
    Filesize

    252KB

  • memory/948-156-0x00000000023E0000-0x000000000241F000-memory.dmp
    Filesize

    252KB

  • memory/948-152-0x00000000023E0000-0x000000000241F000-memory.dmp
    Filesize

    252KB

  • memory/948-154-0x00000000023E0000-0x000000000241F000-memory.dmp
    Filesize

    252KB

  • memory/948-148-0x00000000023E0000-0x000000000241F000-memory.dmp
    Filesize

    252KB

  • memory/948-146-0x00000000023E0000-0x000000000241F000-memory.dmp
    Filesize

    252KB

  • memory/948-144-0x00000000023E0000-0x000000000241F000-memory.dmp
    Filesize

    252KB

  • memory/948-139-0x0000000000290000-0x00000000002DB000-memory.dmp
    Filesize

    300KB

  • memory/948-143-0x0000000004D50000-0x0000000004D90000-memory.dmp
    Filesize

    256KB

  • memory/948-140-0x00000000023E0000-0x000000000241F000-memory.dmp
    Filesize

    252KB

  • memory/948-137-0x00000000023E0000-0x000000000241F000-memory.dmp
    Filesize

    252KB

  • memory/948-135-0x00000000023E0000-0x000000000241F000-memory.dmp
    Filesize

    252KB

  • memory/948-133-0x00000000023E0000-0x000000000241F000-memory.dmp
    Filesize

    252KB

  • memory/948-122-0x0000000002390000-0x00000000023D6000-memory.dmp
    Filesize

    280KB

  • memory/948-123-0x00000000023E0000-0x0000000002424000-memory.dmp
    Filesize

    272KB

  • memory/948-124-0x00000000023E0000-0x000000000241F000-memory.dmp
    Filesize

    252KB

  • memory/948-125-0x00000000023E0000-0x000000000241F000-memory.dmp
    Filesize

    252KB

  • memory/948-127-0x00000000023E0000-0x000000000241F000-memory.dmp
    Filesize

    252KB

  • memory/948-129-0x00000000023E0000-0x000000000241F000-memory.dmp
    Filesize

    252KB

  • memory/948-131-0x00000000023E0000-0x000000000241F000-memory.dmp
    Filesize

    252KB

  • memory/1500-1042-0x00000000000F0000-0x0000000000122000-memory.dmp
    Filesize

    200KB

  • memory/1500-1043-0x0000000002300000-0x0000000002340000-memory.dmp
    Filesize

    256KB

  • memory/1728-94-0x0000000000A10000-0x0000000000A22000-memory.dmp
    Filesize

    72KB

  • memory/1728-102-0x0000000000A10000-0x0000000000A22000-memory.dmp
    Filesize

    72KB

  • memory/1728-82-0x0000000000A10000-0x0000000000A22000-memory.dmp
    Filesize

    72KB

  • memory/1728-92-0x0000000000A10000-0x0000000000A22000-memory.dmp
    Filesize

    72KB

  • memory/1728-96-0x0000000000A10000-0x0000000000A22000-memory.dmp
    Filesize

    72KB

  • memory/1728-111-0x0000000000400000-0x000000000070F000-memory.dmp
    Filesize

    3.1MB

  • memory/1728-110-0x0000000000400000-0x000000000070F000-memory.dmp
    Filesize

    3.1MB

  • memory/1728-109-0x0000000004CD0000-0x0000000004D10000-memory.dmp
    Filesize

    256KB

  • memory/1728-84-0x0000000000A10000-0x0000000000A22000-memory.dmp
    Filesize

    72KB

  • memory/1728-106-0x0000000000A10000-0x0000000000A22000-memory.dmp
    Filesize

    72KB

  • memory/1728-108-0x0000000000A10000-0x0000000000A22000-memory.dmp
    Filesize

    72KB

  • memory/1728-90-0x0000000000A10000-0x0000000000A22000-memory.dmp
    Filesize

    72KB

  • memory/1728-104-0x0000000000A10000-0x0000000000A22000-memory.dmp
    Filesize

    72KB

  • memory/1728-98-0x0000000000A10000-0x0000000000A22000-memory.dmp
    Filesize

    72KB

  • memory/1728-100-0x0000000000A10000-0x0000000000A22000-memory.dmp
    Filesize

    72KB

  • memory/1728-81-0x0000000000A10000-0x0000000000A22000-memory.dmp
    Filesize

    72KB

  • memory/1728-80-0x0000000000A10000-0x0000000000A28000-memory.dmp
    Filesize

    96KB

  • memory/1728-79-0x0000000000780000-0x000000000079A000-memory.dmp
    Filesize

    104KB

  • memory/1728-78-0x0000000000300000-0x000000000032D000-memory.dmp
    Filesize

    180KB

  • memory/1728-88-0x0000000000A10000-0x0000000000A22000-memory.dmp
    Filesize

    72KB

  • memory/1728-86-0x0000000000A10000-0x0000000000A22000-memory.dmp
    Filesize

    72KB