Analysis

  • max time kernel
    50s
  • max time network
    70s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 01:29

General

  • Target

    1c07989d482c86a2d49ba44b55f25049f595c70fab0218cf0c59c842a728f2a8.exe

  • Size

    689KB

  • MD5

    2269976bf22c6efa85a0e3e8fdaa6d96

  • SHA1

    6e8099e126f0b397c2a095d871dec5c32685ad91

  • SHA256

    1c07989d482c86a2d49ba44b55f25049f595c70fab0218cf0c59c842a728f2a8

  • SHA512

    fee51354c6571aeec3646039420d86e79427891aeee35d134416876b5e39c382d6fadf62f58b15ba1eab4b8640a8b75c8e2c808231737320d803bbe14e884f3e

  • SSDEEP

    12288:FMrsy90bwtl4mk1hMllNx1yn1IUM9e+DT4Tid2LBU/cajWKmJ+vHF/bfigfjNGk6:Zy+wtam3lNQTj+DTyTU/hNmJ+9/bagJi

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c07989d482c86a2d49ba44b55f25049f595c70fab0218cf0c59c842a728f2a8.exe
    "C:\Users\Admin\AppData\Local\Temp\1c07989d482c86a2d49ba44b55f25049f595c70fab0218cf0c59c842a728f2a8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1484
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un579031.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un579031.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7183.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7183.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4248
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6364.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6364.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3700
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si907339.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si907339.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4740

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si907339.exe

    Filesize

    175KB

    MD5

    822c1099af8d8b27b979af5ac4515156

    SHA1

    c4e3d5f45a7536b20f1fa5d825edb322f5ff7f2a

    SHA256

    520c74bdbea2800fca83034be7eadb4c1dc312372aa6f0ae1ffb2641faf8936f

    SHA512

    d7c699ac35fe29853e969e4fc6af4ef1c712fe0d47ad5408d564d45dde1a6fd89a655787c99db4934e30ee7c0d58aeaac339bb9a963914a3a8eb00f6902371db

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si907339.exe

    Filesize

    175KB

    MD5

    822c1099af8d8b27b979af5ac4515156

    SHA1

    c4e3d5f45a7536b20f1fa5d825edb322f5ff7f2a

    SHA256

    520c74bdbea2800fca83034be7eadb4c1dc312372aa6f0ae1ffb2641faf8936f

    SHA512

    d7c699ac35fe29853e969e4fc6af4ef1c712fe0d47ad5408d564d45dde1a6fd89a655787c99db4934e30ee7c0d58aeaac339bb9a963914a3a8eb00f6902371db

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un579031.exe

    Filesize

    547KB

    MD5

    7e4b0fc66e112ae4c187e06c6ccaea49

    SHA1

    311fdf93876be095987388f3b3acb0cf7ff9e6a1

    SHA256

    7449c7ba37ea8eb6c358b322623fbc2f8e3cf2df60a8b7c98f3bfbe97998f4a9

    SHA512

    ed350fbe0a97ec67fdba9edfd0d9ee07cb1b754053df16c955f3d0a80d7bf8766a4c51dbe689334958e33116618a72f415d4297ffc1af20fae7350e9dba44573

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un579031.exe

    Filesize

    547KB

    MD5

    7e4b0fc66e112ae4c187e06c6ccaea49

    SHA1

    311fdf93876be095987388f3b3acb0cf7ff9e6a1

    SHA256

    7449c7ba37ea8eb6c358b322623fbc2f8e3cf2df60a8b7c98f3bfbe97998f4a9

    SHA512

    ed350fbe0a97ec67fdba9edfd0d9ee07cb1b754053df16c955f3d0a80d7bf8766a4c51dbe689334958e33116618a72f415d4297ffc1af20fae7350e9dba44573

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7183.exe

    Filesize

    291KB

    MD5

    3dea52574689499f45a399be4aae6a90

    SHA1

    6c1a00a73f0d450dd3d765617d75c8565a523be8

    SHA256

    7c2eb5163b958987aca85adba577b3a4388892783696727278912f3f653c27f8

    SHA512

    ae9f7bcb23dd08ea08977c4df74cd6644598f3c6837085bb5841eb0a750904101c6e3b460cbc3d9b11f3d038605b41abca92c83cfe830091ad7e0cb7ba9cd9f0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7183.exe

    Filesize

    291KB

    MD5

    3dea52574689499f45a399be4aae6a90

    SHA1

    6c1a00a73f0d450dd3d765617d75c8565a523be8

    SHA256

    7c2eb5163b958987aca85adba577b3a4388892783696727278912f3f653c27f8

    SHA512

    ae9f7bcb23dd08ea08977c4df74cd6644598f3c6837085bb5841eb0a750904101c6e3b460cbc3d9b11f3d038605b41abca92c83cfe830091ad7e0cb7ba9cd9f0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6364.exe

    Filesize

    345KB

    MD5

    50a54580b905e38fb607a1548f45d7d9

    SHA1

    31bc27f9baadbd00476085ff89998e7e59a4eaa1

    SHA256

    7dbb90280949eac85caaecccbf7b58d14674e9471c44b5913cede6c3ea31a534

    SHA512

    550c3fe675572de1650f060b24516a192cc4738abe08945bc0bf36aa5fc983b0c7de64e781afc772292cb017243fd4014bde3ca10ce6bd55a778b12b2a5f9330

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6364.exe

    Filesize

    345KB

    MD5

    50a54580b905e38fb607a1548f45d7d9

    SHA1

    31bc27f9baadbd00476085ff89998e7e59a4eaa1

    SHA256

    7dbb90280949eac85caaecccbf7b58d14674e9471c44b5913cede6c3ea31a534

    SHA512

    550c3fe675572de1650f060b24516a192cc4738abe08945bc0bf36aa5fc983b0c7de64e781afc772292cb017243fd4014bde3ca10ce6bd55a778b12b2a5f9330

  • memory/3700-1096-0x0000000006D10000-0x0000000006D22000-memory.dmp

    Filesize

    72KB

  • memory/3700-221-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/3700-1110-0x0000000008F70000-0x000000000949C000-memory.dmp

    Filesize

    5.2MB

  • memory/3700-1109-0x0000000008DA0000-0x0000000008F62000-memory.dmp

    Filesize

    1.8MB

  • memory/3700-191-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/3700-193-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/3700-1108-0x0000000006060000-0x0000000006070000-memory.dmp

    Filesize

    64KB

  • memory/3700-1107-0x0000000007820000-0x0000000007870000-memory.dmp

    Filesize

    320KB

  • memory/3700-1106-0x0000000007790000-0x0000000007806000-memory.dmp

    Filesize

    472KB

  • memory/3700-1105-0x00000000076D0000-0x0000000007762000-memory.dmp

    Filesize

    584KB

  • memory/3700-1104-0x0000000007010000-0x0000000007076000-memory.dmp

    Filesize

    408KB

  • memory/3700-1103-0x0000000006060000-0x0000000006070000-memory.dmp

    Filesize

    64KB

  • memory/3700-1102-0x0000000006060000-0x0000000006070000-memory.dmp

    Filesize

    64KB

  • memory/3700-1101-0x0000000006060000-0x0000000006070000-memory.dmp

    Filesize

    64KB

  • memory/3700-1099-0x0000000006E80000-0x0000000006ECB000-memory.dmp

    Filesize

    300KB

  • memory/3700-1098-0x0000000006060000-0x0000000006070000-memory.dmp

    Filesize

    64KB

  • memory/3700-1097-0x0000000006D30000-0x0000000006D6E000-memory.dmp

    Filesize

    248KB

  • memory/3700-1095-0x0000000006BD0000-0x0000000006CDA000-memory.dmp

    Filesize

    1.0MB

  • memory/3700-1094-0x0000000006570000-0x0000000006B76000-memory.dmp

    Filesize

    6.0MB

  • memory/3700-203-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/3700-219-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/3700-217-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/3700-215-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/3700-213-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/3700-211-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/3700-209-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/3700-182-0x0000000005F10000-0x0000000005F56000-memory.dmp

    Filesize

    280KB

  • memory/3700-183-0x0000000005F90000-0x0000000005FD4000-memory.dmp

    Filesize

    272KB

  • memory/3700-185-0x0000000006060000-0x0000000006070000-memory.dmp

    Filesize

    64KB

  • memory/3700-184-0x0000000001A30000-0x0000000001A7B000-memory.dmp

    Filesize

    300KB

  • memory/3700-187-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/3700-188-0x0000000006060000-0x0000000006070000-memory.dmp

    Filesize

    64KB

  • memory/3700-189-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/3700-186-0x0000000006060000-0x0000000006070000-memory.dmp

    Filesize

    64KB

  • memory/3700-195-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/3700-207-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/3700-205-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/3700-197-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/3700-199-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/3700-201-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/4248-171-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/4248-144-0x0000000002750000-0x0000000002762000-memory.dmp

    Filesize

    72KB

  • memory/4248-146-0x0000000002750000-0x0000000002762000-memory.dmp

    Filesize

    72KB

  • memory/4248-139-0x0000000002750000-0x0000000002768000-memory.dmp

    Filesize

    96KB

  • memory/4248-140-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/4248-177-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/4248-176-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/4248-175-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/4248-174-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/4248-172-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4248-141-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/4248-170-0x0000000002750000-0x0000000002762000-memory.dmp

    Filesize

    72KB

  • memory/4248-138-0x0000000004D70000-0x000000000526E000-memory.dmp

    Filesize

    5.0MB

  • memory/4248-168-0x0000000002750000-0x0000000002762000-memory.dmp

    Filesize

    72KB

  • memory/4248-166-0x0000000002750000-0x0000000002762000-memory.dmp

    Filesize

    72KB

  • memory/4248-164-0x0000000002750000-0x0000000002762000-memory.dmp

    Filesize

    72KB

  • memory/4248-162-0x0000000002750000-0x0000000002762000-memory.dmp

    Filesize

    72KB

  • memory/4248-160-0x0000000002750000-0x0000000002762000-memory.dmp

    Filesize

    72KB

  • memory/4248-158-0x0000000002750000-0x0000000002762000-memory.dmp

    Filesize

    72KB

  • memory/4248-156-0x0000000002750000-0x0000000002762000-memory.dmp

    Filesize

    72KB

  • memory/4248-154-0x0000000002750000-0x0000000002762000-memory.dmp

    Filesize

    72KB

  • memory/4248-152-0x0000000002750000-0x0000000002762000-memory.dmp

    Filesize

    72KB

  • memory/4248-150-0x0000000002750000-0x0000000002762000-memory.dmp

    Filesize

    72KB

  • memory/4248-148-0x0000000002750000-0x0000000002762000-memory.dmp

    Filesize

    72KB

  • memory/4248-143-0x0000000002750000-0x0000000002762000-memory.dmp

    Filesize

    72KB

  • memory/4248-142-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/4248-137-0x00000000021F0000-0x000000000220A000-memory.dmp

    Filesize

    104KB

  • memory/4248-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4740-1116-0x0000000000A00000-0x0000000000A32000-memory.dmp

    Filesize

    200KB

  • memory/4740-1117-0x0000000005260000-0x0000000005270000-memory.dmp

    Filesize

    64KB

  • memory/4740-1118-0x0000000005440000-0x000000000548B000-memory.dmp

    Filesize

    300KB

  • memory/4740-1119-0x0000000005260000-0x0000000005270000-memory.dmp

    Filesize

    64KB