Analysis

  • max time kernel
    51s
  • max time network
    74s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 02:44

General

  • Target

    0164d104283fe71a5e3df0342e6b8aec4cbbbf202432e4903947ebd8b6429612.exe

  • Size

    689KB

  • MD5

    54556c196facf71d949eb5d8eefa2d89

  • SHA1

    3dd7ab05e9b0e349305c1a2450591e77b07efa37

  • SHA256

    0164d104283fe71a5e3df0342e6b8aec4cbbbf202432e4903947ebd8b6429612

  • SHA512

    3fdc3515b8b692a2d48f748376f440dc751608027d4010af695cfc7238d3ff0ecc7478a68e92c6fdf0c4138aa88878ac6f0b18725dc4bd511fc94327516aa0ee

  • SSDEEP

    12288:xMrvy90/Lz+CAJIzHaEYOGyQ65hLu9ahpD2hMw4NDQ0RozvDFJIfig9d5I:qyq/+CioaETTvfaAgCYZJIag+

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0164d104283fe71a5e3df0342e6b8aec4cbbbf202432e4903947ebd8b6429612.exe
    "C:\Users\Admin\AppData\Local\Temp\0164d104283fe71a5e3df0342e6b8aec4cbbbf202432e4903947ebd8b6429612.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3944
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un863673.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un863673.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5028
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6696.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6696.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3560
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3112.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3112.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3532
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si297109.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si297109.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4464

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si297109.exe

    Filesize

    175KB

    MD5

    0d9cdc529af14c01671b0f2b96898316

    SHA1

    1ff6d52f5e23260415a4f123b673fda3c981d9bf

    SHA256

    a0b1a30b58b18cb49796e29f87e44af8598953b778f8315f73cccaf8c93eeba5

    SHA512

    49c3b430dd7c8b3816c0efe19be4e74f833f12b57a6bdbec1959c196bfb7a6fbcb533b81cca84ddc7bb6ee37054aa8ebf64c768b6b5ae952203c7b6598efca8b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si297109.exe

    Filesize

    175KB

    MD5

    0d9cdc529af14c01671b0f2b96898316

    SHA1

    1ff6d52f5e23260415a4f123b673fda3c981d9bf

    SHA256

    a0b1a30b58b18cb49796e29f87e44af8598953b778f8315f73cccaf8c93eeba5

    SHA512

    49c3b430dd7c8b3816c0efe19be4e74f833f12b57a6bdbec1959c196bfb7a6fbcb533b81cca84ddc7bb6ee37054aa8ebf64c768b6b5ae952203c7b6598efca8b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un863673.exe

    Filesize

    547KB

    MD5

    7848e2e40343297995b079a1ea72c3b6

    SHA1

    f102d6d47d6759f117dc4bb92fbcc38aaaa73895

    SHA256

    42e71ae0dbc29b99d96d49c51c958aa2ca200eaf51ad517bd13fe26c28baef6e

    SHA512

    d6d1d29cb752caab9ec24601056ab9d175c65934c2953127ba8f5db88f91548e107590befa573c4a1403dbd912e14a3b49d2d9aa4babe3d7040877c955d2be80

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un863673.exe

    Filesize

    547KB

    MD5

    7848e2e40343297995b079a1ea72c3b6

    SHA1

    f102d6d47d6759f117dc4bb92fbcc38aaaa73895

    SHA256

    42e71ae0dbc29b99d96d49c51c958aa2ca200eaf51ad517bd13fe26c28baef6e

    SHA512

    d6d1d29cb752caab9ec24601056ab9d175c65934c2953127ba8f5db88f91548e107590befa573c4a1403dbd912e14a3b49d2d9aa4babe3d7040877c955d2be80

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6696.exe

    Filesize

    291KB

    MD5

    45b9622bbf7b7c2bbccbb31a99c53483

    SHA1

    71d8dd01cfababacec80fdefbeb7c7262da427c3

    SHA256

    304d747a673bc6022ce012712000c3bf1dc7249f8fb0b47c95110f5feaf076d9

    SHA512

    103e25b5fd6276f4819fb5d2db65d0f7fe3f5aba4c004cbd332b23070f110bfe176547f90cdbc5a5aa3a74b9f41dfc5f9d0f28ff75a1abaf2f6ea46e15a363d6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6696.exe

    Filesize

    291KB

    MD5

    45b9622bbf7b7c2bbccbb31a99c53483

    SHA1

    71d8dd01cfababacec80fdefbeb7c7262da427c3

    SHA256

    304d747a673bc6022ce012712000c3bf1dc7249f8fb0b47c95110f5feaf076d9

    SHA512

    103e25b5fd6276f4819fb5d2db65d0f7fe3f5aba4c004cbd332b23070f110bfe176547f90cdbc5a5aa3a74b9f41dfc5f9d0f28ff75a1abaf2f6ea46e15a363d6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3112.exe

    Filesize

    345KB

    MD5

    c20a0f614aed4c2334db7d2654b25364

    SHA1

    b8537daa160ea96d4de74f776b61f7db5fab9b33

    SHA256

    1911df8320c4bb7ce57758c1bce94c13a98e6a54d368da6c377a32bd298b9764

    SHA512

    7ed0a18b62da9f52ff85a89ea2084db662ad94fdf968a2012ea4bcac43a75251ee626a5ecd13193ab190677e2a5dbc288165e98a933d7c21b6fd9614a99d6f0f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3112.exe

    Filesize

    345KB

    MD5

    c20a0f614aed4c2334db7d2654b25364

    SHA1

    b8537daa160ea96d4de74f776b61f7db5fab9b33

    SHA256

    1911df8320c4bb7ce57758c1bce94c13a98e6a54d368da6c377a32bd298b9764

    SHA512

    7ed0a18b62da9f52ff85a89ea2084db662ad94fdf968a2012ea4bcac43a75251ee626a5ecd13193ab190677e2a5dbc288165e98a933d7c21b6fd9614a99d6f0f

  • memory/3532-1092-0x0000000006D00000-0x0000000007306000-memory.dmp

    Filesize

    6.0MB

  • memory/3532-219-0x00000000038B0000-0x00000000038EF000-memory.dmp

    Filesize

    252KB

  • memory/3532-1108-0x0000000007CC0000-0x00000000081EC000-memory.dmp

    Filesize

    5.2MB

  • memory/3532-1106-0x0000000007AF0000-0x0000000007CB2000-memory.dmp

    Filesize

    1.8MB

  • memory/3532-1107-0x0000000005FE0000-0x0000000005FF0000-memory.dmp

    Filesize

    64KB

  • memory/3532-197-0x00000000038B0000-0x00000000038EF000-memory.dmp

    Filesize

    252KB

  • memory/3532-1105-0x0000000005FE0000-0x0000000005FF0000-memory.dmp

    Filesize

    64KB

  • memory/3532-1104-0x0000000005FE0000-0x0000000005FF0000-memory.dmp

    Filesize

    64KB

  • memory/3532-1103-0x0000000005FE0000-0x0000000005FF0000-memory.dmp

    Filesize

    64KB

  • memory/3532-1102-0x0000000007960000-0x00000000079B0000-memory.dmp

    Filesize

    320KB

  • memory/3532-199-0x00000000038B0000-0x00000000038EF000-memory.dmp

    Filesize

    252KB

  • memory/3532-1101-0x00000000078E0000-0x0000000007956000-memory.dmp

    Filesize

    472KB

  • memory/3532-1100-0x0000000007810000-0x00000000078A2000-memory.dmp

    Filesize

    584KB

  • memory/3532-1099-0x0000000006B40000-0x0000000006BA6000-memory.dmp

    Filesize

    408KB

  • memory/3532-1097-0x00000000069B0000-0x00000000069FB000-memory.dmp

    Filesize

    300KB

  • memory/3532-1096-0x0000000005FE0000-0x0000000005FF0000-memory.dmp

    Filesize

    64KB

  • memory/3532-1095-0x0000000006860000-0x000000000689E000-memory.dmp

    Filesize

    248KB

  • memory/3532-1094-0x0000000006840000-0x0000000006852000-memory.dmp

    Filesize

    72KB

  • memory/3532-1093-0x0000000006700000-0x000000000680A000-memory.dmp

    Filesize

    1.0MB

  • memory/3532-206-0x0000000005FE0000-0x0000000005FF0000-memory.dmp

    Filesize

    64KB

  • memory/3532-217-0x00000000038B0000-0x00000000038EF000-memory.dmp

    Filesize

    252KB

  • memory/3532-215-0x00000000038B0000-0x00000000038EF000-memory.dmp

    Filesize

    252KB

  • memory/3532-213-0x00000000038B0000-0x00000000038EF000-memory.dmp

    Filesize

    252KB

  • memory/3532-210-0x0000000005FE0000-0x0000000005FF0000-memory.dmp

    Filesize

    64KB

  • memory/3532-211-0x00000000038B0000-0x00000000038EF000-memory.dmp

    Filesize

    252KB

  • memory/3532-180-0x00000000035B0000-0x00000000035F6000-memory.dmp

    Filesize

    280KB

  • memory/3532-181-0x00000000038B0000-0x00000000038F4000-memory.dmp

    Filesize

    272KB

  • memory/3532-182-0x00000000038B0000-0x00000000038EF000-memory.dmp

    Filesize

    252KB

  • memory/3532-183-0x00000000038B0000-0x00000000038EF000-memory.dmp

    Filesize

    252KB

  • memory/3532-195-0x00000000038B0000-0x00000000038EF000-memory.dmp

    Filesize

    252KB

  • memory/3532-187-0x00000000038B0000-0x00000000038EF000-memory.dmp

    Filesize

    252KB

  • memory/3532-189-0x00000000038B0000-0x00000000038EF000-memory.dmp

    Filesize

    252KB

  • memory/3532-191-0x00000000038B0000-0x00000000038EF000-memory.dmp

    Filesize

    252KB

  • memory/3532-193-0x00000000038B0000-0x00000000038EF000-memory.dmp

    Filesize

    252KB

  • memory/3532-185-0x00000000038B0000-0x00000000038EF000-memory.dmp

    Filesize

    252KB

  • memory/3532-208-0x0000000005FE0000-0x0000000005FF0000-memory.dmp

    Filesize

    64KB

  • memory/3532-207-0x00000000038B0000-0x00000000038EF000-memory.dmp

    Filesize

    252KB

  • memory/3532-201-0x00000000038B0000-0x00000000038EF000-memory.dmp

    Filesize

    252KB

  • memory/3532-203-0x00000000038B0000-0x00000000038EF000-memory.dmp

    Filesize

    252KB

  • memory/3532-204-0x0000000001A30000-0x0000000001A7B000-memory.dmp

    Filesize

    300KB

  • memory/3560-170-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/3560-155-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/3560-145-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/3560-138-0x0000000004F10000-0x0000000004F20000-memory.dmp

    Filesize

    64KB

  • memory/3560-139-0x00000000026F0000-0x0000000002708000-memory.dmp

    Filesize

    96KB

  • memory/3560-175-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/3560-173-0x0000000004F10000-0x0000000004F20000-memory.dmp

    Filesize

    64KB

  • memory/3560-171-0x0000000004F10000-0x0000000004F20000-memory.dmp

    Filesize

    64KB

  • memory/3560-172-0x0000000004F10000-0x0000000004F20000-memory.dmp

    Filesize

    64KB

  • memory/3560-137-0x0000000004F20000-0x000000000541E000-memory.dmp

    Filesize

    5.0MB

  • memory/3560-141-0x0000000004F10000-0x0000000004F20000-memory.dmp

    Filesize

    64KB

  • memory/3560-169-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/3560-167-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/3560-165-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/3560-163-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/3560-161-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/3560-159-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/3560-157-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/3560-153-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/3560-151-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/3560-149-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/3560-147-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/3560-143-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/3560-142-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/3560-140-0x0000000004F10000-0x0000000004F20000-memory.dmp

    Filesize

    64KB

  • memory/3560-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/3560-135-0x0000000002260000-0x000000000227A000-memory.dmp

    Filesize

    104KB

  • memory/4464-1114-0x00000000003E0000-0x0000000000412000-memory.dmp

    Filesize

    200KB

  • memory/4464-1115-0x0000000004C30000-0x0000000004C40000-memory.dmp

    Filesize

    64KB

  • memory/4464-1116-0x0000000004E20000-0x0000000004E6B000-memory.dmp

    Filesize

    300KB