Analysis

  • max time kernel
    54s
  • max time network
    139s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 01:03

General

  • Target

    cab77224e12e531e6de82f22614259988ab80064bda66e2e480dc95d7a5d9e19.exe

  • Size

    690KB

  • MD5

    8acf03f38d704a8cf2e42c28ab83afb6

  • SHA1

    99d082c10b5a343482665401ec7692ce8cac6ed7

  • SHA256

    cab77224e12e531e6de82f22614259988ab80064bda66e2e480dc95d7a5d9e19

  • SHA512

    75fa1b30594fde22efbbbb10f7bdc9f176f5f6805ba59cccd8f98aa9540d83f0abe8ddc4c3062e033a088ce00c19ba6359275f5cf917027926d3d3671cc28da8

  • SSDEEP

    12288:ZMroy90zXyG6HurKKuBVyI65hLu6fA2dnYxvmFdifigVm/zRKAeJYE:FymXypHurjnfa6YtydiagVwKD9

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cab77224e12e531e6de82f22614259988ab80064bda66e2e480dc95d7a5d9e19.exe
    "C:\Users\Admin\AppData\Local\Temp\cab77224e12e531e6de82f22614259988ab80064bda66e2e480dc95d7a5d9e19.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un955972.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un955972.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3548
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2819.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2819.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2348
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2300.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2300.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4084
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si587497.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si587497.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1300

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si587497.exe

    Filesize

    175KB

    MD5

    0b36a7244e8dfe58846a9495b74d9b84

    SHA1

    8a2f142117cfc81b7c24f7c62801084d5fa5fc0c

    SHA256

    453b206e5294bddc72b60a20d77e022a07638da3af2be55ff65e366bb5e9f13a

    SHA512

    dcdce6e2ee845005055f45b879471218bcc3dbb1131f53c0b71229af6f0d8370d9faea8d8b34ab7b4695b0bf6dd2f22ccbb43e91b071755bf3ca9201a902a61a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si587497.exe

    Filesize

    175KB

    MD5

    0b36a7244e8dfe58846a9495b74d9b84

    SHA1

    8a2f142117cfc81b7c24f7c62801084d5fa5fc0c

    SHA256

    453b206e5294bddc72b60a20d77e022a07638da3af2be55ff65e366bb5e9f13a

    SHA512

    dcdce6e2ee845005055f45b879471218bcc3dbb1131f53c0b71229af6f0d8370d9faea8d8b34ab7b4695b0bf6dd2f22ccbb43e91b071755bf3ca9201a902a61a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un955972.exe

    Filesize

    548KB

    MD5

    eee881688eab6b73d5860eef042f455f

    SHA1

    c3a51c0e8a5eb0a05f743ae248916c734ed2c2e7

    SHA256

    8af388c60458ac5d38d39901439304e05af0c423cbfd305b69d363232ae35840

    SHA512

    e8e035953006815b67d0ed2776206a731c6d5813cf003b4e3671854309f659a4e51ccf00f9186a86dd049e0056d646b35c58dfa976a1cb966bec7c076e51765b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un955972.exe

    Filesize

    548KB

    MD5

    eee881688eab6b73d5860eef042f455f

    SHA1

    c3a51c0e8a5eb0a05f743ae248916c734ed2c2e7

    SHA256

    8af388c60458ac5d38d39901439304e05af0c423cbfd305b69d363232ae35840

    SHA512

    e8e035953006815b67d0ed2776206a731c6d5813cf003b4e3671854309f659a4e51ccf00f9186a86dd049e0056d646b35c58dfa976a1cb966bec7c076e51765b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2819.exe

    Filesize

    291KB

    MD5

    96422b7800dad82843101aecd363d027

    SHA1

    347e9b6901f5c0eb6059b2c4cb9cc06cb3b7ca8d

    SHA256

    4268384fda62d830f74f47df68d43c78f85cc26f3c3845b32a1af011d679460e

    SHA512

    4d946167c9c6ac4cd54ea018cd94c94bf9530ab8b7dd5aafb3e88b05f1c55e26351d32ff53127662f031629203f40a84ba9d56d3912df1c965dc2362947b0218

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2819.exe

    Filesize

    291KB

    MD5

    96422b7800dad82843101aecd363d027

    SHA1

    347e9b6901f5c0eb6059b2c4cb9cc06cb3b7ca8d

    SHA256

    4268384fda62d830f74f47df68d43c78f85cc26f3c3845b32a1af011d679460e

    SHA512

    4d946167c9c6ac4cd54ea018cd94c94bf9530ab8b7dd5aafb3e88b05f1c55e26351d32ff53127662f031629203f40a84ba9d56d3912df1c965dc2362947b0218

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2300.exe

    Filesize

    345KB

    MD5

    d7f0f08ea1186898e3636165a83a0a20

    SHA1

    06dbbedc50d08100a9a1155c9a196da0c881fd29

    SHA256

    0c1e3d951ed0507eb9f10ac01991f68b8b0c9f72db6aa2509688cac4ef3f6655

    SHA512

    dededddccd58f8f606e0f469ee6cbd65920029fda89ac02defe6815a5735940fa16071aa191b5bb012a03fc547c8ef91dfa057b5e191a4d29c7313961999aba5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2300.exe

    Filesize

    345KB

    MD5

    d7f0f08ea1186898e3636165a83a0a20

    SHA1

    06dbbedc50d08100a9a1155c9a196da0c881fd29

    SHA256

    0c1e3d951ed0507eb9f10ac01991f68b8b0c9f72db6aa2509688cac4ef3f6655

    SHA512

    dededddccd58f8f606e0f469ee6cbd65920029fda89ac02defe6815a5735940fa16071aa191b5bb012a03fc547c8ef91dfa057b5e191a4d29c7313961999aba5

  • memory/1300-1111-0x00000000052F0000-0x0000000005300000-memory.dmp

    Filesize

    64KB

  • memory/1300-1110-0x0000000000A40000-0x0000000000A72000-memory.dmp

    Filesize

    200KB

  • memory/1300-1112-0x0000000005300000-0x000000000534B000-memory.dmp

    Filesize

    300KB

  • memory/1300-1113-0x00000000052F0000-0x0000000005300000-memory.dmp

    Filesize

    64KB

  • memory/2348-141-0x0000000002900000-0x0000000002912000-memory.dmp

    Filesize

    72KB

  • memory/2348-155-0x0000000002900000-0x0000000002912000-memory.dmp

    Filesize

    72KB

  • memory/2348-136-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/2348-137-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/2348-138-0x0000000002900000-0x0000000002912000-memory.dmp

    Filesize

    72KB

  • memory/2348-139-0x0000000002900000-0x0000000002912000-memory.dmp

    Filesize

    72KB

  • memory/2348-134-0x00000000007E0000-0x000000000080D000-memory.dmp

    Filesize

    180KB

  • memory/2348-143-0x0000000002900000-0x0000000002912000-memory.dmp

    Filesize

    72KB

  • memory/2348-145-0x0000000002900000-0x0000000002912000-memory.dmp

    Filesize

    72KB

  • memory/2348-147-0x0000000002900000-0x0000000002912000-memory.dmp

    Filesize

    72KB

  • memory/2348-149-0x0000000002900000-0x0000000002912000-memory.dmp

    Filesize

    72KB

  • memory/2348-151-0x0000000002900000-0x0000000002912000-memory.dmp

    Filesize

    72KB

  • memory/2348-153-0x0000000002900000-0x0000000002912000-memory.dmp

    Filesize

    72KB

  • memory/2348-135-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/2348-157-0x0000000002900000-0x0000000002912000-memory.dmp

    Filesize

    72KB

  • memory/2348-159-0x0000000002900000-0x0000000002912000-memory.dmp

    Filesize

    72KB

  • memory/2348-161-0x0000000002900000-0x0000000002912000-memory.dmp

    Filesize

    72KB

  • memory/2348-163-0x0000000002900000-0x0000000002912000-memory.dmp

    Filesize

    72KB

  • memory/2348-165-0x0000000002900000-0x0000000002912000-memory.dmp

    Filesize

    72KB

  • memory/2348-166-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/2348-167-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/2348-168-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/2348-169-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/2348-171-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/2348-133-0x0000000002900000-0x0000000002918000-memory.dmp

    Filesize

    96KB

  • memory/2348-132-0x0000000004EA0000-0x000000000539E000-memory.dmp

    Filesize

    5.0MB

  • memory/2348-131-0x0000000002470000-0x000000000248A000-memory.dmp

    Filesize

    104KB

  • memory/4084-178-0x0000000006060000-0x000000000609F000-memory.dmp

    Filesize

    252KB

  • memory/4084-215-0x0000000006060000-0x000000000609F000-memory.dmp

    Filesize

    252KB

  • memory/4084-183-0x0000000006060000-0x000000000609F000-memory.dmp

    Filesize

    252KB

  • memory/4084-185-0x0000000006060000-0x000000000609F000-memory.dmp

    Filesize

    252KB

  • memory/4084-187-0x0000000006060000-0x000000000609F000-memory.dmp

    Filesize

    252KB

  • memory/4084-189-0x0000000006060000-0x000000000609F000-memory.dmp

    Filesize

    252KB

  • memory/4084-191-0x0000000006060000-0x000000000609F000-memory.dmp

    Filesize

    252KB

  • memory/4084-193-0x0000000001A30000-0x0000000001A7B000-memory.dmp

    Filesize

    300KB

  • memory/4084-194-0x0000000006060000-0x000000000609F000-memory.dmp

    Filesize

    252KB

  • memory/4084-195-0x0000000006150000-0x0000000006160000-memory.dmp

    Filesize

    64KB

  • memory/4084-198-0x0000000006060000-0x000000000609F000-memory.dmp

    Filesize

    252KB

  • memory/4084-197-0x0000000006150000-0x0000000006160000-memory.dmp

    Filesize

    64KB

  • memory/4084-201-0x0000000006060000-0x000000000609F000-memory.dmp

    Filesize

    252KB

  • memory/4084-199-0x0000000006150000-0x0000000006160000-memory.dmp

    Filesize

    64KB

  • memory/4084-203-0x0000000006060000-0x000000000609F000-memory.dmp

    Filesize

    252KB

  • memory/4084-205-0x0000000006060000-0x000000000609F000-memory.dmp

    Filesize

    252KB

  • memory/4084-207-0x0000000006060000-0x000000000609F000-memory.dmp

    Filesize

    252KB

  • memory/4084-209-0x0000000006060000-0x000000000609F000-memory.dmp

    Filesize

    252KB

  • memory/4084-211-0x0000000006060000-0x000000000609F000-memory.dmp

    Filesize

    252KB

  • memory/4084-181-0x0000000006060000-0x000000000609F000-memory.dmp

    Filesize

    252KB

  • memory/4084-213-0x0000000006060000-0x000000000609F000-memory.dmp

    Filesize

    252KB

  • memory/4084-1088-0x0000000006760000-0x0000000006D66000-memory.dmp

    Filesize

    6.0MB

  • memory/4084-1089-0x0000000006D70000-0x0000000006E7A000-memory.dmp

    Filesize

    1.0MB

  • memory/4084-1090-0x0000000006120000-0x0000000006132000-memory.dmp

    Filesize

    72KB

  • memory/4084-1091-0x0000000006E80000-0x0000000006EBE000-memory.dmp

    Filesize

    248KB

  • memory/4084-1092-0x0000000006FC0000-0x000000000700B000-memory.dmp

    Filesize

    300KB

  • memory/4084-1093-0x0000000006150000-0x0000000006160000-memory.dmp

    Filesize

    64KB

  • memory/4084-1094-0x0000000007150000-0x00000000071B6000-memory.dmp

    Filesize

    408KB

  • memory/4084-1095-0x0000000007810000-0x00000000078A2000-memory.dmp

    Filesize

    584KB

  • memory/4084-1097-0x0000000006150000-0x0000000006160000-memory.dmp

    Filesize

    64KB

  • memory/4084-1098-0x0000000006150000-0x0000000006160000-memory.dmp

    Filesize

    64KB

  • memory/4084-1099-0x0000000006150000-0x0000000006160000-memory.dmp

    Filesize

    64KB

  • memory/4084-1100-0x0000000006150000-0x0000000006160000-memory.dmp

    Filesize

    64KB

  • memory/4084-1101-0x0000000007C70000-0x0000000007CE6000-memory.dmp

    Filesize

    472KB

  • memory/4084-179-0x0000000006060000-0x000000000609F000-memory.dmp

    Filesize

    252KB

  • memory/4084-177-0x0000000006060000-0x00000000060A4000-memory.dmp

    Filesize

    272KB

  • memory/4084-176-0x0000000005FE0000-0x0000000006026000-memory.dmp

    Filesize

    280KB

  • memory/4084-1102-0x0000000007D00000-0x0000000007D50000-memory.dmp

    Filesize

    320KB

  • memory/4084-1103-0x0000000007D70000-0x0000000007F32000-memory.dmp

    Filesize

    1.8MB

  • memory/4084-1104-0x0000000007F40000-0x000000000846C000-memory.dmp

    Filesize

    5.2MB