Analysis

  • max time kernel
    51s
  • max time network
    68s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 01:15

General

  • Target

    d1859a4b0b998f79eca584db4157ac7771c5d9ef14581e5ae71f3c347506f63c.exe

  • Size

    689KB

  • MD5

    c0aceddf89d3ba0abf338d56897a270b

  • SHA1

    275feac0c253c8e0f2aa094c032986ae5c12c6e4

  • SHA256

    d1859a4b0b998f79eca584db4157ac7771c5d9ef14581e5ae71f3c347506f63c

  • SHA512

    3430884e185cfbed7131fbf8a2ec69f7fdca55cc05c667887e6fb4889e507b3cf69f273cf987097df1676de8a9ae444bfa8d9e37b6b57e05ede4e3fdeb98b7af

  • SSDEEP

    12288:AMroy90VrD5AlUzU4xaAFWZy065hLuCqMSKx31LamdtoiOcgYivmFq/figuTnljO:YyKhwExyQ7faCqLw31PtoiOaiCq/agcS

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1859a4b0b998f79eca584db4157ac7771c5d9ef14581e5ae71f3c347506f63c.exe
    "C:\Users\Admin\AppData\Local\Temp\d1859a4b0b998f79eca584db4157ac7771c5d9ef14581e5ae71f3c347506f63c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2264
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un360642.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un360642.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2512
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1949.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1949.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2592
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1642.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1642.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3676
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si504613.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si504613.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4956

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si504613.exe

    Filesize

    175KB

    MD5

    ab75d87ece7f849f9b0ec83aa964a7e8

    SHA1

    5f4421f9f4978823c6f54c364d938ba97980c638

    SHA256

    2ce637adc07123b8d93cf609d2980811ed82a6a633001256211015ea933fb960

    SHA512

    0b7d232d903d5b295aeadc91b1f7daf715cf0e815d14b1a0bf1e627cdd1391284e99c677fbe4441bbe4bf8a0346b15f48e6ac3cab5c3ee935d381a29182c2bc9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si504613.exe

    Filesize

    175KB

    MD5

    ab75d87ece7f849f9b0ec83aa964a7e8

    SHA1

    5f4421f9f4978823c6f54c364d938ba97980c638

    SHA256

    2ce637adc07123b8d93cf609d2980811ed82a6a633001256211015ea933fb960

    SHA512

    0b7d232d903d5b295aeadc91b1f7daf715cf0e815d14b1a0bf1e627cdd1391284e99c677fbe4441bbe4bf8a0346b15f48e6ac3cab5c3ee935d381a29182c2bc9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un360642.exe

    Filesize

    548KB

    MD5

    1f17342a067efe50bf13eedb7f5c7b52

    SHA1

    16e7b64f6cdca68a079e158fe7a6e435bf61dbe9

    SHA256

    729705fe6485a5ff961a7f6c27a65008eff99609cb296b7daa5f9e9162b35945

    SHA512

    1ecade226ea432532df269e9a07b4d9e2b583258ce265d36871faa95faf3c1752be20ac5ced6ff8f9756a36fd331a43f2de5ad2a95ea67adc00d21237627eaa3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un360642.exe

    Filesize

    548KB

    MD5

    1f17342a067efe50bf13eedb7f5c7b52

    SHA1

    16e7b64f6cdca68a079e158fe7a6e435bf61dbe9

    SHA256

    729705fe6485a5ff961a7f6c27a65008eff99609cb296b7daa5f9e9162b35945

    SHA512

    1ecade226ea432532df269e9a07b4d9e2b583258ce265d36871faa95faf3c1752be20ac5ced6ff8f9756a36fd331a43f2de5ad2a95ea67adc00d21237627eaa3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1949.exe

    Filesize

    291KB

    MD5

    82aba3a52b3483dfd4d172627a470f46

    SHA1

    3d1da50b8dfce7db9db8f1953eb0e136d4980b15

    SHA256

    9111981308ce1b80a73232b37d9f7143051e47fd8f81ae4921c4a22555a83443

    SHA512

    1f7e33591157ca5854c13def90d403775239705e8901f7609c858d4ff0f8a3c51becffea8d4a858a008dbb3ba268a5182c8847359e501b69a032794145bb62c9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1949.exe

    Filesize

    291KB

    MD5

    82aba3a52b3483dfd4d172627a470f46

    SHA1

    3d1da50b8dfce7db9db8f1953eb0e136d4980b15

    SHA256

    9111981308ce1b80a73232b37d9f7143051e47fd8f81ae4921c4a22555a83443

    SHA512

    1f7e33591157ca5854c13def90d403775239705e8901f7609c858d4ff0f8a3c51becffea8d4a858a008dbb3ba268a5182c8847359e501b69a032794145bb62c9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1642.exe

    Filesize

    345KB

    MD5

    b627d96a2b956f6463aa94a3d6779f6b

    SHA1

    ac175eed9b6406172cbeb52fd9f7c6b2f5b24296

    SHA256

    ddef246a1c90139d9c6c85983a438b0b0444d0eb7c8da2938cb66effa4ea9504

    SHA512

    fde2ee7c53be88f7dd20ebdc408bf731826b7b0d2b46c25ff23738ccda0a5e6febabc28298392ce7953d3a804a5fd2efd288abc2abd045368c86f434874706d5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1642.exe

    Filesize

    345KB

    MD5

    b627d96a2b956f6463aa94a3d6779f6b

    SHA1

    ac175eed9b6406172cbeb52fd9f7c6b2f5b24296

    SHA256

    ddef246a1c90139d9c6c85983a438b0b0444d0eb7c8da2938cb66effa4ea9504

    SHA512

    fde2ee7c53be88f7dd20ebdc408bf731826b7b0d2b46c25ff23738ccda0a5e6febabc28298392ce7953d3a804a5fd2efd288abc2abd045368c86f434874706d5

  • memory/2592-136-0x0000000002490000-0x00000000024AA000-memory.dmp

    Filesize

    104KB

  • memory/2592-137-0x0000000000810000-0x000000000083D000-memory.dmp

    Filesize

    180KB

  • memory/2592-138-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/2592-139-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/2592-140-0x0000000004E60000-0x000000000535E000-memory.dmp

    Filesize

    5.0MB

  • memory/2592-142-0x0000000002630000-0x0000000002648000-memory.dmp

    Filesize

    96KB

  • memory/2592-141-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/2592-143-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/2592-144-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/2592-146-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/2592-150-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/2592-148-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/2592-154-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/2592-162-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/2592-160-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/2592-168-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/2592-170-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/2592-166-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/2592-164-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/2592-158-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/2592-156-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/2592-152-0x0000000002630000-0x0000000002642000-memory.dmp

    Filesize

    72KB

  • memory/2592-171-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/2592-172-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/2592-173-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/2592-174-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/2592-176-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/3676-181-0x00000000037A0000-0x00000000037E6000-memory.dmp

    Filesize

    280KB

  • memory/3676-182-0x00000000064E0000-0x0000000006524000-memory.dmp

    Filesize

    272KB

  • memory/3676-183-0x00000000064E0000-0x000000000651F000-memory.dmp

    Filesize

    252KB

  • memory/3676-186-0x00000000064E0000-0x000000000651F000-memory.dmp

    Filesize

    252KB

  • memory/3676-188-0x00000000064E0000-0x000000000651F000-memory.dmp

    Filesize

    252KB

  • memory/3676-184-0x00000000064E0000-0x000000000651F000-memory.dmp

    Filesize

    252KB

  • memory/3676-190-0x00000000064E0000-0x000000000651F000-memory.dmp

    Filesize

    252KB

  • memory/3676-192-0x00000000064E0000-0x000000000651F000-memory.dmp

    Filesize

    252KB

  • memory/3676-196-0x00000000064E0000-0x000000000651F000-memory.dmp

    Filesize

    252KB

  • memory/3676-194-0x00000000064E0000-0x000000000651F000-memory.dmp

    Filesize

    252KB

  • memory/3676-198-0x00000000064E0000-0x000000000651F000-memory.dmp

    Filesize

    252KB

  • memory/3676-200-0x00000000064E0000-0x000000000651F000-memory.dmp

    Filesize

    252KB

  • memory/3676-202-0x00000000064E0000-0x000000000651F000-memory.dmp

    Filesize

    252KB

  • memory/3676-204-0x00000000064E0000-0x000000000651F000-memory.dmp

    Filesize

    252KB

  • memory/3676-206-0x00000000064E0000-0x000000000651F000-memory.dmp

    Filesize

    252KB

  • memory/3676-208-0x00000000064E0000-0x000000000651F000-memory.dmp

    Filesize

    252KB

  • memory/3676-210-0x00000000064E0000-0x000000000651F000-memory.dmp

    Filesize

    252KB

  • memory/3676-212-0x00000000064E0000-0x000000000651F000-memory.dmp

    Filesize

    252KB

  • memory/3676-214-0x00000000064E0000-0x000000000651F000-memory.dmp

    Filesize

    252KB

  • memory/3676-216-0x00000000064E0000-0x000000000651F000-memory.dmp

    Filesize

    252KB

  • memory/3676-243-0x0000000001B20000-0x0000000001B6B000-memory.dmp

    Filesize

    300KB

  • memory/3676-244-0x0000000001C60000-0x0000000001C70000-memory.dmp

    Filesize

    64KB

  • memory/3676-246-0x0000000001C60000-0x0000000001C70000-memory.dmp

    Filesize

    64KB

  • memory/3676-248-0x0000000001C60000-0x0000000001C70000-memory.dmp

    Filesize

    64KB

  • memory/3676-1093-0x0000000006540000-0x0000000006B46000-memory.dmp

    Filesize

    6.0MB

  • memory/3676-1094-0x0000000006BD0000-0x0000000006CDA000-memory.dmp

    Filesize

    1.0MB

  • memory/3676-1095-0x0000000006D10000-0x0000000006D22000-memory.dmp

    Filesize

    72KB

  • memory/3676-1096-0x0000000006D30000-0x0000000006D6E000-memory.dmp

    Filesize

    248KB

  • memory/3676-1097-0x0000000006E80000-0x0000000006ECB000-memory.dmp

    Filesize

    300KB

  • memory/3676-1098-0x0000000001C60000-0x0000000001C70000-memory.dmp

    Filesize

    64KB

  • memory/3676-1100-0x0000000007010000-0x00000000070A2000-memory.dmp

    Filesize

    584KB

  • memory/3676-1101-0x00000000070B0000-0x0000000007116000-memory.dmp

    Filesize

    408KB

  • memory/3676-1102-0x0000000001C60000-0x0000000001C70000-memory.dmp

    Filesize

    64KB

  • memory/3676-1103-0x0000000001C60000-0x0000000001C70000-memory.dmp

    Filesize

    64KB

  • memory/3676-1104-0x0000000001C60000-0x0000000001C70000-memory.dmp

    Filesize

    64KB

  • memory/3676-1105-0x0000000001C60000-0x0000000001C70000-memory.dmp

    Filesize

    64KB

  • memory/3676-1106-0x0000000008CB0000-0x0000000008D26000-memory.dmp

    Filesize

    472KB

  • memory/3676-1107-0x0000000008D30000-0x0000000008D80000-memory.dmp

    Filesize

    320KB

  • memory/3676-1108-0x0000000008DA0000-0x0000000008F62000-memory.dmp

    Filesize

    1.8MB

  • memory/3676-1109-0x0000000008F70000-0x000000000949C000-memory.dmp

    Filesize

    5.2MB

  • memory/4956-1115-0x0000000000390000-0x00000000003C2000-memory.dmp

    Filesize

    200KB

  • memory/4956-1116-0x0000000004DD0000-0x0000000004E1B000-memory.dmp

    Filesize

    300KB

  • memory/4956-1117-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

    Filesize

    64KB

  • memory/4956-1118-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

    Filesize

    64KB