Analysis

  • max time kernel
    57s
  • max time network
    61s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 01:55

General

  • Target

    e10e909d0033602dd871da9242fda9d9a5a74c2bf69e7042f7b76f60968f1546.exe

  • Size

    690KB

  • MD5

    52c91da660906057602e522c57542c83

  • SHA1

    8d319b0c7f200e051aaf283f00274c743095835c

  • SHA256

    e10e909d0033602dd871da9242fda9d9a5a74c2bf69e7042f7b76f60968f1546

  • SHA512

    124956129e4566653fc60b3cff4c2d8c7a95c7961b855f22c0bf1da1075d867f1c5554d135b98da77fd838ea8f3ac2fe99c9814e0d72c1221fed90b219e52c38

  • SSDEEP

    12288:gMrwy90VdujV5qArPZshFyy65hLuDULoVfLfBPm2DmvIoF6kfigPKOSO27ks8Ha:gyEuyArPZnhfaeOZPtDmb6kagSO246

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 22 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e10e909d0033602dd871da9242fda9d9a5a74c2bf69e7042f7b76f60968f1546.exe
    "C:\Users\Admin\AppData\Local\Temp\e10e909d0033602dd871da9242fda9d9a5a74c2bf69e7042f7b76f60968f1546.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2456
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un624483.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un624483.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2872
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2115.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2115.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3364
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6789.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6789.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4732
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si701059.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si701059.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4980

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si701059.exe

    Filesize

    175KB

    MD5

    e50d6ac82b90dccc8f80bf546c69e980

    SHA1

    45e307ed530336401a2b8cb2b312d960217154af

    SHA256

    699c46ec61632c84c6c13bac74a022da6a6e5e8a4749190dad4e58667e329245

    SHA512

    623f4901e71c413ee3816c24429e6e4891f24b51184a51da1815bab71a84a83f7fa0c78ee74cea965e0ff5c2538ce63b7ef409943c87aa7a0373404765887538

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si701059.exe

    Filesize

    175KB

    MD5

    e50d6ac82b90dccc8f80bf546c69e980

    SHA1

    45e307ed530336401a2b8cb2b312d960217154af

    SHA256

    699c46ec61632c84c6c13bac74a022da6a6e5e8a4749190dad4e58667e329245

    SHA512

    623f4901e71c413ee3816c24429e6e4891f24b51184a51da1815bab71a84a83f7fa0c78ee74cea965e0ff5c2538ce63b7ef409943c87aa7a0373404765887538

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un624483.exe

    Filesize

    548KB

    MD5

    b77f18acf40e483e376d94180f079731

    SHA1

    f4b8da579d7358dd49a155b0bd92ef18af10f897

    SHA256

    9b8c23c8939d44f9a112691d09d00178ba2ee2e8ea4575457e3ad3721ed557b1

    SHA512

    16ca5169104e4e1a8fc39aad435b42c81a68d8af5834549b5c0e08a6c32e9c600bd26fd3d059e0b1755d25a0d5dc3962902ea82e5eff37233710b74828ec20af

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un624483.exe

    Filesize

    548KB

    MD5

    b77f18acf40e483e376d94180f079731

    SHA1

    f4b8da579d7358dd49a155b0bd92ef18af10f897

    SHA256

    9b8c23c8939d44f9a112691d09d00178ba2ee2e8ea4575457e3ad3721ed557b1

    SHA512

    16ca5169104e4e1a8fc39aad435b42c81a68d8af5834549b5c0e08a6c32e9c600bd26fd3d059e0b1755d25a0d5dc3962902ea82e5eff37233710b74828ec20af

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2115.exe

    Filesize

    291KB

    MD5

    e48f311aa9be08ceb1928b583725902c

    SHA1

    0cca77f72562100bd896827cad31ce392dddf6ba

    SHA256

    2c7ae2641c279593840ca6a8929ba195727658d5a15938cfc1d28f0d8c242fb2

    SHA512

    4b62fac83294f734516c5abfb69e898ea2317bf2e1127c1ca6309fcaa36db1aaa2d0839225d5ab54f6c5dd6e9863a5f844f15f2ea5577f6113af1568cf973e3c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2115.exe

    Filesize

    291KB

    MD5

    e48f311aa9be08ceb1928b583725902c

    SHA1

    0cca77f72562100bd896827cad31ce392dddf6ba

    SHA256

    2c7ae2641c279593840ca6a8929ba195727658d5a15938cfc1d28f0d8c242fb2

    SHA512

    4b62fac83294f734516c5abfb69e898ea2317bf2e1127c1ca6309fcaa36db1aaa2d0839225d5ab54f6c5dd6e9863a5f844f15f2ea5577f6113af1568cf973e3c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6789.exe

    Filesize

    345KB

    MD5

    20f6fb77d1514868461d47f9f53dc9a4

    SHA1

    3e2885bfe1a7c7bbfd3d473a730384c933a82922

    SHA256

    0ec60c3ab6bf09055c03bd76b8bfc511565e678668aa8f5beda3e9dcb5fe5a38

    SHA512

    28c7ca7b4a7ae20533d75b83941acf035939e58edcdc7ce3ee67c1787b9821e480a9c049b9e1de972c8be5c5fa5fab5e8d0b0b985da637ed1a074c23d393069f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6789.exe

    Filesize

    345KB

    MD5

    20f6fb77d1514868461d47f9f53dc9a4

    SHA1

    3e2885bfe1a7c7bbfd3d473a730384c933a82922

    SHA256

    0ec60c3ab6bf09055c03bd76b8bfc511565e678668aa8f5beda3e9dcb5fe5a38

    SHA512

    28c7ca7b4a7ae20533d75b83941acf035939e58edcdc7ce3ee67c1787b9821e480a9c049b9e1de972c8be5c5fa5fab5e8d0b0b985da637ed1a074c23d393069f

  • memory/3364-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/3364-137-0x0000000002210000-0x000000000222A000-memory.dmp

    Filesize

    104KB

  • memory/3364-138-0x0000000004EA0000-0x000000000539E000-memory.dmp

    Filesize

    5.0MB

  • memory/3364-139-0x0000000002800000-0x0000000002818000-memory.dmp

    Filesize

    96KB

  • memory/3364-140-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/3364-141-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/3364-142-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/3364-143-0x0000000002800000-0x0000000002812000-memory.dmp

    Filesize

    72KB

  • memory/3364-146-0x0000000002800000-0x0000000002812000-memory.dmp

    Filesize

    72KB

  • memory/3364-144-0x0000000002800000-0x0000000002812000-memory.dmp

    Filesize

    72KB

  • memory/3364-150-0x0000000002800000-0x0000000002812000-memory.dmp

    Filesize

    72KB

  • memory/3364-148-0x0000000002800000-0x0000000002812000-memory.dmp

    Filesize

    72KB

  • memory/3364-158-0x0000000002800000-0x0000000002812000-memory.dmp

    Filesize

    72KB

  • memory/3364-156-0x0000000002800000-0x0000000002812000-memory.dmp

    Filesize

    72KB

  • memory/3364-160-0x0000000002800000-0x0000000002812000-memory.dmp

    Filesize

    72KB

  • memory/3364-154-0x0000000002800000-0x0000000002812000-memory.dmp

    Filesize

    72KB

  • memory/3364-162-0x0000000002800000-0x0000000002812000-memory.dmp

    Filesize

    72KB

  • memory/3364-164-0x0000000002800000-0x0000000002812000-memory.dmp

    Filesize

    72KB

  • memory/3364-152-0x0000000002800000-0x0000000002812000-memory.dmp

    Filesize

    72KB

  • memory/3364-166-0x0000000002800000-0x0000000002812000-memory.dmp

    Filesize

    72KB

  • memory/3364-168-0x0000000002800000-0x0000000002812000-memory.dmp

    Filesize

    72KB

  • memory/3364-170-0x0000000002800000-0x0000000002812000-memory.dmp

    Filesize

    72KB

  • memory/3364-171-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/3364-172-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/3364-173-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/3364-175-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/4732-180-0x00000000036C0000-0x0000000003706000-memory.dmp

    Filesize

    280KB

  • memory/4732-181-0x0000000003A30000-0x0000000003A74000-memory.dmp

    Filesize

    272KB

  • memory/4732-182-0x0000000003A30000-0x0000000003A6F000-memory.dmp

    Filesize

    252KB

  • memory/4732-183-0x0000000003A30000-0x0000000003A6F000-memory.dmp

    Filesize

    252KB

  • memory/4732-185-0x0000000003A30000-0x0000000003A6F000-memory.dmp

    Filesize

    252KB

  • memory/4732-187-0x0000000003A30000-0x0000000003A6F000-memory.dmp

    Filesize

    252KB

  • memory/4732-189-0x0000000003A30000-0x0000000003A6F000-memory.dmp

    Filesize

    252KB

  • memory/4732-191-0x0000000003A30000-0x0000000003A6F000-memory.dmp

    Filesize

    252KB

  • memory/4732-193-0x0000000003A30000-0x0000000003A6F000-memory.dmp

    Filesize

    252KB

  • memory/4732-195-0x0000000003A30000-0x0000000003A6F000-memory.dmp

    Filesize

    252KB

  • memory/4732-197-0x0000000003A30000-0x0000000003A6F000-memory.dmp

    Filesize

    252KB

  • memory/4732-199-0x0000000003A30000-0x0000000003A6F000-memory.dmp

    Filesize

    252KB

  • memory/4732-201-0x0000000003A30000-0x0000000003A6F000-memory.dmp

    Filesize

    252KB

  • memory/4732-203-0x0000000003A30000-0x0000000003A6F000-memory.dmp

    Filesize

    252KB

  • memory/4732-205-0x0000000001B00000-0x0000000001B4B000-memory.dmp

    Filesize

    300KB

  • memory/4732-206-0x0000000003A30000-0x0000000003A6F000-memory.dmp

    Filesize

    252KB

  • memory/4732-208-0x0000000006230000-0x0000000006240000-memory.dmp

    Filesize

    64KB

  • memory/4732-211-0x0000000006230000-0x0000000006240000-memory.dmp

    Filesize

    64KB

  • memory/4732-210-0x0000000003A30000-0x0000000003A6F000-memory.dmp

    Filesize

    252KB

  • memory/4732-213-0x0000000003A30000-0x0000000003A6F000-memory.dmp

    Filesize

    252KB

  • memory/4732-215-0x0000000003A30000-0x0000000003A6F000-memory.dmp

    Filesize

    252KB

  • memory/4732-209-0x0000000006230000-0x0000000006240000-memory.dmp

    Filesize

    64KB

  • memory/4732-217-0x0000000003A30000-0x0000000003A6F000-memory.dmp

    Filesize

    252KB

  • memory/4732-219-0x0000000003A30000-0x0000000003A6F000-memory.dmp

    Filesize

    252KB

  • memory/4732-1092-0x0000000006740000-0x0000000006D46000-memory.dmp

    Filesize

    6.0MB

  • memory/4732-1093-0x00000000060C0000-0x00000000061CA000-memory.dmp

    Filesize

    1.0MB

  • memory/4732-1094-0x00000000061F0000-0x0000000006202000-memory.dmp

    Filesize

    72KB

  • memory/4732-1095-0x0000000006230000-0x0000000006240000-memory.dmp

    Filesize

    64KB

  • memory/4732-1096-0x0000000006D50000-0x0000000006D8E000-memory.dmp

    Filesize

    248KB

  • memory/4732-1097-0x0000000006E90000-0x0000000006EDB000-memory.dmp

    Filesize

    300KB

  • memory/4732-1099-0x0000000006230000-0x0000000006240000-memory.dmp

    Filesize

    64KB

  • memory/4732-1100-0x0000000006230000-0x0000000006240000-memory.dmp

    Filesize

    64KB

  • memory/4732-1101-0x0000000006230000-0x0000000006240000-memory.dmp

    Filesize

    64KB

  • memory/4732-1102-0x0000000007010000-0x0000000007076000-memory.dmp

    Filesize

    408KB

  • memory/4732-1103-0x0000000007820000-0x00000000078B2000-memory.dmp

    Filesize

    584KB

  • memory/4732-1104-0x00000000078F0000-0x0000000007AB2000-memory.dmp

    Filesize

    1.8MB

  • memory/4732-1105-0x0000000007AC0000-0x0000000007FEC000-memory.dmp

    Filesize

    5.2MB

  • memory/4732-1106-0x0000000006230000-0x0000000006240000-memory.dmp

    Filesize

    64KB

  • memory/4732-1107-0x0000000008370000-0x00000000083E6000-memory.dmp

    Filesize

    472KB

  • memory/4732-1108-0x0000000008400000-0x0000000008450000-memory.dmp

    Filesize

    320KB

  • memory/4980-1114-0x0000000000510000-0x0000000000542000-memory.dmp

    Filesize

    200KB

  • memory/4980-1115-0x0000000004E40000-0x0000000004E8B000-memory.dmp

    Filesize

    300KB

  • memory/4980-1116-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

    Filesize

    64KB