Analysis

  • max time kernel
    56s
  • max time network
    73s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 01:52

General

  • Target

    717dea3c02191bcebe369f536886a5619237dcb4b204027e40c06a6d33c28dd1.exe

  • Size

    689KB

  • MD5

    5465949c610da7a6dffcb181a30108c7

  • SHA1

    349e7e5f066439e47e532ae8cfa94c2d21c3c32a

  • SHA256

    717dea3c02191bcebe369f536886a5619237dcb4b204027e40c06a6d33c28dd1

  • SHA512

    cb9583c836e3ebdeb300099863a888f653294b19fda65c733e6d76589d915d60b78f50b5b62a7bc67d693733979bb51c3601a39f7679ffc657bae15fc8f52f89

  • SSDEEP

    12288:AMr+y90G9Ju/IQox4fgZiyS65hLu4kDq0MSKI3Vq/d0K6LgquXvmFDyfig4A5/Ls:OyD9YQQou4ZvBfaY0LZ3Vq/uDLCXiDya

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\717dea3c02191bcebe369f536886a5619237dcb4b204027e40c06a6d33c28dd1.exe
    "C:\Users\Admin\AppData\Local\Temp\717dea3c02191bcebe369f536886a5619237dcb4b204027e40c06a6d33c28dd1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:8
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un100294.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un100294.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3968
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0584.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0584.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:848
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1531.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1531.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3536
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si858806.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si858806.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5072

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si858806.exe
    Filesize

    175KB

    MD5

    633d8990dfc54b10c09fe5e866df5e97

    SHA1

    95b1ad84710537dd3b31af8b8dca78ba1a3dd1df

    SHA256

    0c033f85cc26c4e0dd031c8ed79a9d4d7f55306d966739d2829c500555961c63

    SHA512

    ab136b0c4f23e96e4430854cd528b1c27590b98ffc8d593023b60f013c986f5f9a30febd915951233524d7d807141d6ff5706593ec055201ab48636d147e6ec1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si858806.exe
    Filesize

    175KB

    MD5

    633d8990dfc54b10c09fe5e866df5e97

    SHA1

    95b1ad84710537dd3b31af8b8dca78ba1a3dd1df

    SHA256

    0c033f85cc26c4e0dd031c8ed79a9d4d7f55306d966739d2829c500555961c63

    SHA512

    ab136b0c4f23e96e4430854cd528b1c27590b98ffc8d593023b60f013c986f5f9a30febd915951233524d7d807141d6ff5706593ec055201ab48636d147e6ec1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un100294.exe
    Filesize

    547KB

    MD5

    8ee9b66ed43f33fe2118d7faf00b4b1e

    SHA1

    551b21abe2bf90b7de7e411dd21b9a4f70000dc4

    SHA256

    6f30d584697c8f7d0abe96dfd29b41ecf4dcc0b732e097e14a2aa80cf818feb9

    SHA512

    6a481adee92589422278b4e06e2003ddc6861f67c22fb95af10dd04da843b99f232b5c02fd7a8f60d66125f28179472b369303b959ae4336e324c91bfda2fa05

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un100294.exe
    Filesize

    547KB

    MD5

    8ee9b66ed43f33fe2118d7faf00b4b1e

    SHA1

    551b21abe2bf90b7de7e411dd21b9a4f70000dc4

    SHA256

    6f30d584697c8f7d0abe96dfd29b41ecf4dcc0b732e097e14a2aa80cf818feb9

    SHA512

    6a481adee92589422278b4e06e2003ddc6861f67c22fb95af10dd04da843b99f232b5c02fd7a8f60d66125f28179472b369303b959ae4336e324c91bfda2fa05

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0584.exe
    Filesize

    291KB

    MD5

    b9f71d999f724d74ed83fdd82f4b84e0

    SHA1

    358e0588a41077d53708dc125077958e6c22337e

    SHA256

    cab268b09f1e9c4086d3d784efbc548685c92412578b25f53c34d9281866ed27

    SHA512

    c2da11a2b2824979b705a828c7a3a15ec1eeb6ab616fee82d3353ad65375f170282d6d8e1dfe3095a08d7d3820eb15d79d2ca0dbb20ac5a00a0a5651fb349948

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0584.exe
    Filesize

    291KB

    MD5

    b9f71d999f724d74ed83fdd82f4b84e0

    SHA1

    358e0588a41077d53708dc125077958e6c22337e

    SHA256

    cab268b09f1e9c4086d3d784efbc548685c92412578b25f53c34d9281866ed27

    SHA512

    c2da11a2b2824979b705a828c7a3a15ec1eeb6ab616fee82d3353ad65375f170282d6d8e1dfe3095a08d7d3820eb15d79d2ca0dbb20ac5a00a0a5651fb349948

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1531.exe
    Filesize

    345KB

    MD5

    12563c92849f145cf99a474b55c2cee9

    SHA1

    75894eecec0ecc39c127fc62268b85d304ce9266

    SHA256

    f8a37190bae9556a6ef3afbe113e14ff09a5a030926cce048740126814a20c1e

    SHA512

    a2a202cabc0da197a731c2c92bdda628bcb1de0f1a4bbc5bb7de7f70d1c4ac72e4f00773e9e5ed210be8e9e6502d632e52df237c270a75857ff6e4669a93c6b0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1531.exe
    Filesize

    345KB

    MD5

    12563c92849f145cf99a474b55c2cee9

    SHA1

    75894eecec0ecc39c127fc62268b85d304ce9266

    SHA256

    f8a37190bae9556a6ef3afbe113e14ff09a5a030926cce048740126814a20c1e

    SHA512

    a2a202cabc0da197a731c2c92bdda628bcb1de0f1a4bbc5bb7de7f70d1c4ac72e4f00773e9e5ed210be8e9e6502d632e52df237c270a75857ff6e4669a93c6b0

  • memory/848-132-0x0000000000AD0000-0x0000000000AEA000-memory.dmp
    Filesize

    104KB

  • memory/848-133-0x0000000004EE0000-0x00000000053DE000-memory.dmp
    Filesize

    5.0MB

  • memory/848-134-0x0000000002530000-0x0000000002548000-memory.dmp
    Filesize

    96KB

  • memory/848-135-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/848-137-0x0000000004ED0000-0x0000000004EE0000-memory.dmp
    Filesize

    64KB

  • memory/848-136-0x0000000004ED0000-0x0000000004EE0000-memory.dmp
    Filesize

    64KB

  • memory/848-138-0x0000000004ED0000-0x0000000004EE0000-memory.dmp
    Filesize

    64KB

  • memory/848-139-0x0000000002530000-0x0000000002542000-memory.dmp
    Filesize

    72KB

  • memory/848-140-0x0000000002530000-0x0000000002542000-memory.dmp
    Filesize

    72KB

  • memory/848-142-0x0000000002530000-0x0000000002542000-memory.dmp
    Filesize

    72KB

  • memory/848-144-0x0000000002530000-0x0000000002542000-memory.dmp
    Filesize

    72KB

  • memory/848-148-0x0000000002530000-0x0000000002542000-memory.dmp
    Filesize

    72KB

  • memory/848-146-0x0000000002530000-0x0000000002542000-memory.dmp
    Filesize

    72KB

  • memory/848-150-0x0000000002530000-0x0000000002542000-memory.dmp
    Filesize

    72KB

  • memory/848-152-0x0000000002530000-0x0000000002542000-memory.dmp
    Filesize

    72KB

  • memory/848-154-0x0000000002530000-0x0000000002542000-memory.dmp
    Filesize

    72KB

  • memory/848-156-0x0000000002530000-0x0000000002542000-memory.dmp
    Filesize

    72KB

  • memory/848-158-0x0000000002530000-0x0000000002542000-memory.dmp
    Filesize

    72KB

  • memory/848-160-0x0000000002530000-0x0000000002542000-memory.dmp
    Filesize

    72KB

  • memory/848-162-0x0000000002530000-0x0000000002542000-memory.dmp
    Filesize

    72KB

  • memory/848-164-0x0000000002530000-0x0000000002542000-memory.dmp
    Filesize

    72KB

  • memory/848-166-0x0000000002530000-0x0000000002542000-memory.dmp
    Filesize

    72KB

  • memory/848-167-0x0000000000400000-0x000000000070B000-memory.dmp
    Filesize

    3.0MB

  • memory/848-168-0x0000000004ED0000-0x0000000004EE0000-memory.dmp
    Filesize

    64KB

  • memory/848-170-0x0000000000400000-0x000000000070B000-memory.dmp
    Filesize

    3.0MB

  • memory/3536-175-0x0000000005F10000-0x0000000005F56000-memory.dmp
    Filesize

    280KB

  • memory/3536-176-0x0000000005F90000-0x0000000005FD4000-memory.dmp
    Filesize

    272KB

  • memory/3536-177-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/3536-178-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/3536-180-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/3536-182-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/3536-184-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/3536-186-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/3536-188-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/3536-190-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/3536-192-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/3536-194-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/3536-196-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/3536-198-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/3536-200-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/3536-202-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/3536-204-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/3536-207-0x0000000001B90000-0x0000000001BDB000-memory.dmp
    Filesize

    300KB

  • memory/3536-210-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/3536-206-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/3536-209-0x00000000060A0000-0x00000000060B0000-memory.dmp
    Filesize

    64KB

  • memory/3536-211-0x00000000060A0000-0x00000000060B0000-memory.dmp
    Filesize

    64KB

  • memory/3536-214-0x00000000060A0000-0x00000000060B0000-memory.dmp
    Filesize

    64KB

  • memory/3536-213-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/3536-1087-0x0000000006CC0000-0x00000000072C6000-memory.dmp
    Filesize

    6.0MB

  • memory/3536-1088-0x0000000006700000-0x000000000680A000-memory.dmp
    Filesize

    1.0MB

  • memory/3536-1089-0x0000000006840000-0x0000000006852000-memory.dmp
    Filesize

    72KB

  • memory/3536-1090-0x0000000006860000-0x000000000689E000-memory.dmp
    Filesize

    248KB

  • memory/3536-1091-0x00000000069F0000-0x0000000006A3B000-memory.dmp
    Filesize

    300KB

  • memory/3536-1092-0x00000000060A0000-0x00000000060B0000-memory.dmp
    Filesize

    64KB

  • memory/3536-1093-0x0000000006B40000-0x0000000006BD2000-memory.dmp
    Filesize

    584KB

  • memory/3536-1094-0x0000000006BE0000-0x0000000006C46000-memory.dmp
    Filesize

    408KB

  • memory/3536-1096-0x00000000079F0000-0x0000000007BB2000-memory.dmp
    Filesize

    1.8MB

  • memory/3536-1097-0x0000000007BD0000-0x00000000080FC000-memory.dmp
    Filesize

    5.2MB

  • memory/3536-1098-0x00000000060A0000-0x00000000060B0000-memory.dmp
    Filesize

    64KB

  • memory/3536-1099-0x00000000060A0000-0x00000000060B0000-memory.dmp
    Filesize

    64KB

  • memory/3536-1100-0x00000000060A0000-0x00000000060B0000-memory.dmp
    Filesize

    64KB

  • memory/3536-1101-0x00000000060A0000-0x00000000060B0000-memory.dmp
    Filesize

    64KB

  • memory/3536-1102-0x00000000084C0000-0x0000000008536000-memory.dmp
    Filesize

    472KB

  • memory/3536-1103-0x0000000008550000-0x00000000085A0000-memory.dmp
    Filesize

    320KB

  • memory/5072-1109-0x0000000000070000-0x00000000000A2000-memory.dmp
    Filesize

    200KB

  • memory/5072-1110-0x0000000004AB0000-0x0000000004AFB000-memory.dmp
    Filesize

    300KB

  • memory/5072-1111-0x0000000004980000-0x0000000004990000-memory.dmp
    Filesize

    64KB

  • memory/5072-1112-0x0000000004980000-0x0000000004990000-memory.dmp
    Filesize

    64KB