Analysis

  • max time kernel
    53s
  • max time network
    55s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 02:16

General

  • Target

    55fb461dd10d7e906e7d3919963cda3d7f7509b32622028b868ba44e8e432c4b.exe

  • Size

    689KB

  • MD5

    10cdfe061daaa43b3eef3266cfcd8c43

  • SHA1

    a8fdbee84c99ca77268df811c922d5b85a3f017a

  • SHA256

    55fb461dd10d7e906e7d3919963cda3d7f7509b32622028b868ba44e8e432c4b

  • SHA512

    5e3eee0c69680329039d32be4d6bfd96c6e7b0e517c2ca22133a7ebaf72187f50fd17a549eeca8687588f5c365979a50caa9063a174881dd03413cec78eb21c5

  • SSDEEP

    12288:SMroy908m0k7O9gaDaTD5724DbyD65hLu0KIwTobmVezhPOSK5mJfvqF2XfigJf3:2y9kzT44iOfa0hBhPO35mJfW2XagJfrz

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55fb461dd10d7e906e7d3919963cda3d7f7509b32622028b868ba44e8e432c4b.exe
    "C:\Users\Admin\AppData\Local\Temp\55fb461dd10d7e906e7d3919963cda3d7f7509b32622028b868ba44e8e432c4b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un500711.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un500711.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2004
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8297.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8297.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3436
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1762.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1762.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3032
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si252894.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si252894.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3044

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si252894.exe

    Filesize

    175KB

    MD5

    b1cd491d0cd7216942522e24f4dfc1fe

    SHA1

    a0f9a39f166d11f15c98c2c21095cc7ac38d3a89

    SHA256

    e918d8fac1c7f77133c483c2c2ebdb2a175e8f9e18d21efffedd6d7801a70216

    SHA512

    8691561663e38408ed4df722612f06d6bf9e3e3ead47bbc82739bda0512d4329d642f915d2b22e6bd133a180dcdb654e551b5534fc10f095e3eb72a33ed78654

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si252894.exe

    Filesize

    175KB

    MD5

    b1cd491d0cd7216942522e24f4dfc1fe

    SHA1

    a0f9a39f166d11f15c98c2c21095cc7ac38d3a89

    SHA256

    e918d8fac1c7f77133c483c2c2ebdb2a175e8f9e18d21efffedd6d7801a70216

    SHA512

    8691561663e38408ed4df722612f06d6bf9e3e3ead47bbc82739bda0512d4329d642f915d2b22e6bd133a180dcdb654e551b5534fc10f095e3eb72a33ed78654

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un500711.exe

    Filesize

    547KB

    MD5

    d8c30ad94535a60879cda16bf3732573

    SHA1

    182c71c5ced7134bc9742f59e6e25bf6ede6fa49

    SHA256

    3876861375f089067d359940fd7760a2f5370bcbffcd14b8116ca9960f79978f

    SHA512

    05d850b19137b4cdf8c0c73df0f7d79374c8831239a9188066e784d182293faad86b2fca0270d192f2b54f55cf78e697d4260013eff3c4841db0beb2091bc10b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un500711.exe

    Filesize

    547KB

    MD5

    d8c30ad94535a60879cda16bf3732573

    SHA1

    182c71c5ced7134bc9742f59e6e25bf6ede6fa49

    SHA256

    3876861375f089067d359940fd7760a2f5370bcbffcd14b8116ca9960f79978f

    SHA512

    05d850b19137b4cdf8c0c73df0f7d79374c8831239a9188066e784d182293faad86b2fca0270d192f2b54f55cf78e697d4260013eff3c4841db0beb2091bc10b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8297.exe

    Filesize

    291KB

    MD5

    4b007703bcb69263f0c6448b1ce0063f

    SHA1

    a99dded4bfb61327535940065af65627c8db4349

    SHA256

    70669b1055af70b16d11a765150058a79072df6540b926883429f47d0d7e454c

    SHA512

    61177cebeb155169e106c3ab5138ccd3bb0d0282fc55a2fcf57773af0bba84351dcc12b4e955e23415a52c773abca5de51ae0bbba2618dc9082cf2eda472f1fd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8297.exe

    Filesize

    291KB

    MD5

    4b007703bcb69263f0c6448b1ce0063f

    SHA1

    a99dded4bfb61327535940065af65627c8db4349

    SHA256

    70669b1055af70b16d11a765150058a79072df6540b926883429f47d0d7e454c

    SHA512

    61177cebeb155169e106c3ab5138ccd3bb0d0282fc55a2fcf57773af0bba84351dcc12b4e955e23415a52c773abca5de51ae0bbba2618dc9082cf2eda472f1fd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1762.exe

    Filesize

    345KB

    MD5

    adc592d3d7abab50674d0d85bce29d00

    SHA1

    4b0963ae29a8ac9cbf19892608e84045ea6bafc4

    SHA256

    2db1e8b37450eb698da4cf26ee0df45fbf213be01931612976011489291ece0e

    SHA512

    60b925ed4da5c830673e766637ddf79e5b52a3e0c8b3d40a73e2aceffdd71e2cfb5611f780fbcc60602b1df9f367d14fd261d41932f69274b12fd3f90bad6004

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1762.exe

    Filesize

    345KB

    MD5

    adc592d3d7abab50674d0d85bce29d00

    SHA1

    4b0963ae29a8ac9cbf19892608e84045ea6bafc4

    SHA256

    2db1e8b37450eb698da4cf26ee0df45fbf213be01931612976011489291ece0e

    SHA512

    60b925ed4da5c830673e766637ddf79e5b52a3e0c8b3d40a73e2aceffdd71e2cfb5611f780fbcc60602b1df9f367d14fd261d41932f69274b12fd3f90bad6004

  • memory/3032-1093-0x00000000065C0000-0x00000000066CA000-memory.dmp

    Filesize

    1.0MB

  • memory/3032-1094-0x0000000006700000-0x0000000006712000-memory.dmp

    Filesize

    72KB

  • memory/3032-213-0x0000000003A80000-0x0000000003ABF000-memory.dmp

    Filesize

    252KB

  • memory/3032-211-0x0000000003A80000-0x0000000003ABF000-memory.dmp

    Filesize

    252KB

  • memory/3032-209-0x0000000003A80000-0x0000000003ABF000-memory.dmp

    Filesize

    252KB

  • memory/3032-199-0x0000000003A80000-0x0000000003ABF000-memory.dmp

    Filesize

    252KB

  • memory/3032-197-0x0000000003A80000-0x0000000003ABF000-memory.dmp

    Filesize

    252KB

  • memory/3032-1108-0x0000000007E00000-0x000000000832C000-memory.dmp

    Filesize

    5.2MB

  • memory/3032-1107-0x0000000007C30000-0x0000000007DF2000-memory.dmp

    Filesize

    1.8MB

  • memory/3032-201-0x0000000003A80000-0x0000000003ABF000-memory.dmp

    Filesize

    252KB

  • memory/3032-1106-0x0000000007BC0000-0x0000000007C10000-memory.dmp

    Filesize

    320KB

  • memory/3032-1105-0x0000000007B30000-0x0000000007BA6000-memory.dmp

    Filesize

    472KB

  • memory/3032-1104-0x00000000037E0000-0x00000000037F0000-memory.dmp

    Filesize

    64KB

  • memory/3032-1103-0x00000000076D0000-0x0000000007762000-memory.dmp

    Filesize

    584KB

  • memory/3032-1102-0x0000000006A00000-0x0000000006A66000-memory.dmp

    Filesize

    408KB

  • memory/3032-1101-0x00000000037E0000-0x00000000037F0000-memory.dmp

    Filesize

    64KB

  • memory/3032-1100-0x00000000037E0000-0x00000000037F0000-memory.dmp

    Filesize

    64KB

  • memory/3032-1099-0x00000000037E0000-0x00000000037F0000-memory.dmp

    Filesize

    64KB

  • memory/3032-1097-0x00000000037E0000-0x00000000037F0000-memory.dmp

    Filesize

    64KB

  • memory/3032-1096-0x0000000006870000-0x00000000068BB000-memory.dmp

    Filesize

    300KB

  • memory/3032-1095-0x0000000006720000-0x000000000675E000-memory.dmp

    Filesize

    248KB

  • memory/3032-215-0x0000000003A80000-0x0000000003ABF000-memory.dmp

    Filesize

    252KB

  • memory/3032-1092-0x0000000006B80000-0x0000000007186000-memory.dmp

    Filesize

    6.0MB

  • memory/3032-281-0x00000000037E0000-0x00000000037F0000-memory.dmp

    Filesize

    64KB

  • memory/3032-180-0x0000000003800000-0x0000000003846000-memory.dmp

    Filesize

    280KB

  • memory/3032-181-0x0000000003A80000-0x0000000003AC4000-memory.dmp

    Filesize

    272KB

  • memory/3032-182-0x0000000003A80000-0x0000000003ABF000-memory.dmp

    Filesize

    252KB

  • memory/3032-183-0x0000000003A80000-0x0000000003ABF000-memory.dmp

    Filesize

    252KB

  • memory/3032-185-0x0000000003A80000-0x0000000003ABF000-memory.dmp

    Filesize

    252KB

  • memory/3032-187-0x0000000003A80000-0x0000000003ABF000-memory.dmp

    Filesize

    252KB

  • memory/3032-189-0x0000000003A80000-0x0000000003ABF000-memory.dmp

    Filesize

    252KB

  • memory/3032-191-0x0000000003A80000-0x0000000003ABF000-memory.dmp

    Filesize

    252KB

  • memory/3032-193-0x0000000003A80000-0x0000000003ABF000-memory.dmp

    Filesize

    252KB

  • memory/3032-195-0x0000000003A80000-0x0000000003ABF000-memory.dmp

    Filesize

    252KB

  • memory/3032-279-0x00000000037E0000-0x00000000037F0000-memory.dmp

    Filesize

    64KB

  • memory/3032-277-0x00000000037E0000-0x00000000037F0000-memory.dmp

    Filesize

    64KB

  • memory/3032-276-0x0000000001A30000-0x0000000001A7B000-memory.dmp

    Filesize

    300KB

  • memory/3032-203-0x0000000003A80000-0x0000000003ABF000-memory.dmp

    Filesize

    252KB

  • memory/3032-205-0x0000000003A80000-0x0000000003ABF000-memory.dmp

    Filesize

    252KB

  • memory/3032-207-0x0000000003A80000-0x0000000003ABF000-memory.dmp

    Filesize

    252KB

  • memory/3044-1116-0x0000000000DB0000-0x0000000000DE2000-memory.dmp

    Filesize

    200KB

  • memory/3044-1117-0x00000000057F0000-0x000000000583B000-memory.dmp

    Filesize

    300KB

  • memory/3044-1118-0x00000000059A0000-0x00000000059B0000-memory.dmp

    Filesize

    64KB

  • memory/3436-171-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/3436-154-0x00000000026C0000-0x00000000026D2000-memory.dmp

    Filesize

    72KB

  • memory/3436-146-0x00000000026C0000-0x00000000026D2000-memory.dmp

    Filesize

    72KB

  • memory/3436-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/3436-139-0x00000000026C0000-0x00000000026D8000-memory.dmp

    Filesize

    96KB

  • memory/3436-140-0x0000000004DF0000-0x0000000004E00000-memory.dmp

    Filesize

    64KB

  • memory/3436-138-0x0000000004E00000-0x00000000052FE000-memory.dmp

    Filesize

    5.0MB

  • memory/3436-175-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/3436-173-0x0000000004DF0000-0x0000000004E00000-memory.dmp

    Filesize

    64KB

  • memory/3436-172-0x0000000004DF0000-0x0000000004E00000-memory.dmp

    Filesize

    64KB

  • memory/3436-141-0x0000000004DF0000-0x0000000004E00000-memory.dmp

    Filesize

    64KB

  • memory/3436-170-0x00000000026C0000-0x00000000026D2000-memory.dmp

    Filesize

    72KB

  • memory/3436-168-0x00000000026C0000-0x00000000026D2000-memory.dmp

    Filesize

    72KB

  • memory/3436-166-0x00000000026C0000-0x00000000026D2000-memory.dmp

    Filesize

    72KB

  • memory/3436-164-0x00000000026C0000-0x00000000026D2000-memory.dmp

    Filesize

    72KB

  • memory/3436-162-0x00000000026C0000-0x00000000026D2000-memory.dmp

    Filesize

    72KB

  • memory/3436-160-0x00000000026C0000-0x00000000026D2000-memory.dmp

    Filesize

    72KB

  • memory/3436-158-0x00000000026C0000-0x00000000026D2000-memory.dmp

    Filesize

    72KB

  • memory/3436-156-0x00000000026C0000-0x00000000026D2000-memory.dmp

    Filesize

    72KB

  • memory/3436-152-0x00000000026C0000-0x00000000026D2000-memory.dmp

    Filesize

    72KB

  • memory/3436-150-0x00000000026C0000-0x00000000026D2000-memory.dmp

    Filesize

    72KB

  • memory/3436-137-0x00000000023D0000-0x00000000023EA000-memory.dmp

    Filesize

    104KB

  • memory/3436-148-0x00000000026C0000-0x00000000026D2000-memory.dmp

    Filesize

    72KB

  • memory/3436-144-0x00000000026C0000-0x00000000026D2000-memory.dmp

    Filesize

    72KB

  • memory/3436-143-0x00000000026C0000-0x00000000026D2000-memory.dmp

    Filesize

    72KB

  • memory/3436-142-0x0000000004DF0000-0x0000000004E00000-memory.dmp

    Filesize

    64KB