Analysis

  • max time kernel
    50s
  • max time network
    71s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 03:39

General

  • Target

    bc98f16854ff84d8cc9088ac309b9965eab77190040fa1233faae967eef9feb0.exe

  • Size

    690KB

  • MD5

    59199d5fff9d92987061f08ce72a57cc

  • SHA1

    3a51db8485af16b027d89a2513787c05ad28bf5e

  • SHA256

    bc98f16854ff84d8cc9088ac309b9965eab77190040fa1233faae967eef9feb0

  • SHA512

    975bb66da1f60fae0185dd293364955f8ece9158f213016139d5070f6f35b97f600118fe905fb40fe4a3bcee43ec485fa3148502598f25590537e6c10baa39a6

  • SSDEEP

    12288:AMruy90sa6Tg3hYlrHIam2gyK65hLuTgyK3ZuSHP3somVzF/6tvqFC0figq7ad/Y:eyva6PRHIwx5facyKpuuLmC0agQZvz

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc98f16854ff84d8cc9088ac309b9965eab77190040fa1233faae967eef9feb0.exe
    "C:\Users\Admin\AppData\Local\Temp\bc98f16854ff84d8cc9088ac309b9965eab77190040fa1233faae967eef9feb0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un944913.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un944913.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3924
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3078.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3078.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4960
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1436.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1436.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4868
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si460234.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si460234.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2748

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si460234.exe

    Filesize

    175KB

    MD5

    9efb3429fae1d87429751fb6952ad924

    SHA1

    a6366061ac96b8fdeaed4852aa9434e638a6c0db

    SHA256

    eeca8fde2910aa2002e52549fff72f9e6f53e4dbbd9c400ab3afbfc5347b285f

    SHA512

    f0ff82a716aba8a7d965b7b5794a6950db7230a39ce3634550251d90e62fa26455639a74436ab506f8be1397597397b2920cc30bed0351d35aa2b9e9b3ce5199

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si460234.exe

    Filesize

    175KB

    MD5

    9efb3429fae1d87429751fb6952ad924

    SHA1

    a6366061ac96b8fdeaed4852aa9434e638a6c0db

    SHA256

    eeca8fde2910aa2002e52549fff72f9e6f53e4dbbd9c400ab3afbfc5347b285f

    SHA512

    f0ff82a716aba8a7d965b7b5794a6950db7230a39ce3634550251d90e62fa26455639a74436ab506f8be1397597397b2920cc30bed0351d35aa2b9e9b3ce5199

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un944913.exe

    Filesize

    548KB

    MD5

    3bba1099d1372fef51a99b090d71a276

    SHA1

    99d2cc3b319a164b7621c0350018b312fd552bb9

    SHA256

    55b5a2eb6d0c4a4895a676f93283b39a86557aacf654268ae59907a4365753ea

    SHA512

    1873a21bc4bc45c9df50639582e2539acb1176f078634881125f31aec72e7669ac371d5166a6cc7526513b020e63c85ce3a685831912e889ebf2dacabf2a8ece

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un944913.exe

    Filesize

    548KB

    MD5

    3bba1099d1372fef51a99b090d71a276

    SHA1

    99d2cc3b319a164b7621c0350018b312fd552bb9

    SHA256

    55b5a2eb6d0c4a4895a676f93283b39a86557aacf654268ae59907a4365753ea

    SHA512

    1873a21bc4bc45c9df50639582e2539acb1176f078634881125f31aec72e7669ac371d5166a6cc7526513b020e63c85ce3a685831912e889ebf2dacabf2a8ece

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3078.exe

    Filesize

    291KB

    MD5

    feb007b9af183ed759996ec4ad32ead4

    SHA1

    5970d2b9d34af2ca6b226bc145020740aa8ef91a

    SHA256

    b61270cdabf81fbf9e39ea468acaf0e2d39897d06edb1f998fde3eb697743b53

    SHA512

    3510063d21e49bc266a51830d0180a98ee5a00a21b89b8d59719dedd4b0037f7d8c736947653fa81225deb70bcfccae1d064024dd504e1563ab24b5ac4561287

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3078.exe

    Filesize

    291KB

    MD5

    feb007b9af183ed759996ec4ad32ead4

    SHA1

    5970d2b9d34af2ca6b226bc145020740aa8ef91a

    SHA256

    b61270cdabf81fbf9e39ea468acaf0e2d39897d06edb1f998fde3eb697743b53

    SHA512

    3510063d21e49bc266a51830d0180a98ee5a00a21b89b8d59719dedd4b0037f7d8c736947653fa81225deb70bcfccae1d064024dd504e1563ab24b5ac4561287

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1436.exe

    Filesize

    345KB

    MD5

    14e68cd86972fcb3b99414941658969c

    SHA1

    196e99abefbb6fb0025800fa895975158d4eca3f

    SHA256

    b8198401833b7f91bd8955fcfb3c98b7dd8488be7de6b748094375adabc6306e

    SHA512

    74d350eb3e979d42636e89581570314d3f0fad53eb497d586dfbe216184b4aedd9524e8b5e5a7a44a40eaeb5415523458352551b2a5e2195edf03c1ab8d1fa27

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1436.exe

    Filesize

    345KB

    MD5

    14e68cd86972fcb3b99414941658969c

    SHA1

    196e99abefbb6fb0025800fa895975158d4eca3f

    SHA256

    b8198401833b7f91bd8955fcfb3c98b7dd8488be7de6b748094375adabc6306e

    SHA512

    74d350eb3e979d42636e89581570314d3f0fad53eb497d586dfbe216184b4aedd9524e8b5e5a7a44a40eaeb5415523458352551b2a5e2195edf03c1ab8d1fa27

  • memory/2748-1112-0x00000000059D0000-0x00000000059E0000-memory.dmp

    Filesize

    64KB

  • memory/2748-1111-0x0000000005820000-0x000000000586B000-memory.dmp

    Filesize

    300KB

  • memory/2748-1110-0x0000000000DE0000-0x0000000000E12000-memory.dmp

    Filesize

    200KB

  • memory/4868-1088-0x00000000066E0000-0x0000000006CE6000-memory.dmp

    Filesize

    6.0MB

  • memory/4868-1091-0x0000000006E50000-0x0000000006E62000-memory.dmp

    Filesize

    72KB

  • memory/4868-1104-0x0000000003B30000-0x0000000003B40000-memory.dmp

    Filesize

    64KB

  • memory/4868-1103-0x0000000003B30000-0x0000000003B40000-memory.dmp

    Filesize

    64KB

  • memory/4868-1101-0x0000000003B30000-0x0000000003B40000-memory.dmp

    Filesize

    64KB

  • memory/4868-1102-0x0000000003B30000-0x0000000003B40000-memory.dmp

    Filesize

    64KB

  • memory/4868-1100-0x0000000007BB0000-0x00000000080DC000-memory.dmp

    Filesize

    5.2MB

  • memory/4868-1099-0x00000000079D0000-0x0000000007B92000-memory.dmp

    Filesize

    1.8MB

  • memory/4868-1098-0x0000000007950000-0x00000000079A0000-memory.dmp

    Filesize

    320KB

  • memory/4868-1097-0x00000000078B0000-0x0000000007926000-memory.dmp

    Filesize

    472KB

  • memory/4868-1095-0x00000000071F0000-0x0000000007256000-memory.dmp

    Filesize

    408KB

  • memory/4868-1094-0x0000000007150000-0x00000000071E2000-memory.dmp

    Filesize

    584KB

  • memory/4868-1093-0x0000000006FC0000-0x000000000700B000-memory.dmp

    Filesize

    300KB

  • memory/4868-1092-0x0000000006E70000-0x0000000006EAE000-memory.dmp

    Filesize

    248KB

  • memory/4868-1090-0x0000000003B30000-0x0000000003B40000-memory.dmp

    Filesize

    64KB

  • memory/4868-1089-0x0000000006D10000-0x0000000006E1A000-memory.dmp

    Filesize

    1.0MB

  • memory/4868-211-0x0000000003B30000-0x0000000003B40000-memory.dmp

    Filesize

    64KB

  • memory/4868-215-0x0000000003940000-0x000000000397F000-memory.dmp

    Filesize

    252KB

  • memory/4868-212-0x0000000003940000-0x000000000397F000-memory.dmp

    Filesize

    252KB

  • memory/4868-213-0x0000000003B30000-0x0000000003B40000-memory.dmp

    Filesize

    64KB

  • memory/4868-210-0x0000000003B30000-0x0000000003B40000-memory.dmp

    Filesize

    64KB

  • memory/4868-208-0x0000000001B00000-0x0000000001B4B000-memory.dmp

    Filesize

    300KB

  • memory/4868-176-0x00000000038B0000-0x00000000038F6000-memory.dmp

    Filesize

    280KB

  • memory/4868-177-0x0000000003940000-0x0000000003984000-memory.dmp

    Filesize

    272KB

  • memory/4868-178-0x0000000003940000-0x000000000397F000-memory.dmp

    Filesize

    252KB

  • memory/4868-179-0x0000000003940000-0x000000000397F000-memory.dmp

    Filesize

    252KB

  • memory/4868-181-0x0000000003940000-0x000000000397F000-memory.dmp

    Filesize

    252KB

  • memory/4868-183-0x0000000003940000-0x000000000397F000-memory.dmp

    Filesize

    252KB

  • memory/4868-185-0x0000000003940000-0x000000000397F000-memory.dmp

    Filesize

    252KB

  • memory/4868-187-0x0000000003940000-0x000000000397F000-memory.dmp

    Filesize

    252KB

  • memory/4868-189-0x0000000003940000-0x000000000397F000-memory.dmp

    Filesize

    252KB

  • memory/4868-191-0x0000000003940000-0x000000000397F000-memory.dmp

    Filesize

    252KB

  • memory/4868-193-0x0000000003940000-0x000000000397F000-memory.dmp

    Filesize

    252KB

  • memory/4868-195-0x0000000003940000-0x000000000397F000-memory.dmp

    Filesize

    252KB

  • memory/4868-197-0x0000000003940000-0x000000000397F000-memory.dmp

    Filesize

    252KB

  • memory/4868-199-0x0000000003940000-0x000000000397F000-memory.dmp

    Filesize

    252KB

  • memory/4868-201-0x0000000003940000-0x000000000397F000-memory.dmp

    Filesize

    252KB

  • memory/4868-203-0x0000000003940000-0x000000000397F000-memory.dmp

    Filesize

    252KB

  • memory/4868-205-0x0000000003940000-0x000000000397F000-memory.dmp

    Filesize

    252KB

  • memory/4868-207-0x0000000003940000-0x000000000397F000-memory.dmp

    Filesize

    252KB

  • memory/4960-159-0x00000000024E0000-0x00000000024F2000-memory.dmp

    Filesize

    72KB

  • memory/4960-131-0x0000000000AD0000-0x0000000000AEA000-memory.dmp

    Filesize

    104KB

  • memory/4960-137-0x0000000004E30000-0x0000000004E40000-memory.dmp

    Filesize

    64KB

  • memory/4960-169-0x0000000004E30000-0x0000000004E40000-memory.dmp

    Filesize

    64KB

  • memory/4960-168-0x0000000004E30000-0x0000000004E40000-memory.dmp

    Filesize

    64KB

  • memory/4960-167-0x0000000004E30000-0x0000000004E40000-memory.dmp

    Filesize

    64KB

  • memory/4960-136-0x00000000024E0000-0x00000000024F8000-memory.dmp

    Filesize

    96KB

  • memory/4960-166-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/4960-165-0x00000000024E0000-0x00000000024F2000-memory.dmp

    Filesize

    72KB

  • memory/4960-139-0x00000000024E0000-0x00000000024F2000-memory.dmp

    Filesize

    72KB

  • memory/4960-163-0x00000000024E0000-0x00000000024F2000-memory.dmp

    Filesize

    72KB

  • memory/4960-161-0x00000000024E0000-0x00000000024F2000-memory.dmp

    Filesize

    72KB

  • memory/4960-171-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/4960-141-0x00000000024E0000-0x00000000024F2000-memory.dmp

    Filesize

    72KB

  • memory/4960-138-0x00000000024E0000-0x00000000024F2000-memory.dmp

    Filesize

    72KB

  • memory/4960-153-0x00000000024E0000-0x00000000024F2000-memory.dmp

    Filesize

    72KB

  • memory/4960-151-0x00000000024E0000-0x00000000024F2000-memory.dmp

    Filesize

    72KB

  • memory/4960-149-0x00000000024E0000-0x00000000024F2000-memory.dmp

    Filesize

    72KB

  • memory/4960-147-0x00000000024E0000-0x00000000024F2000-memory.dmp

    Filesize

    72KB

  • memory/4960-145-0x00000000024E0000-0x00000000024F2000-memory.dmp

    Filesize

    72KB

  • memory/4960-143-0x00000000024E0000-0x00000000024F2000-memory.dmp

    Filesize

    72KB

  • memory/4960-155-0x00000000024E0000-0x00000000024F2000-memory.dmp

    Filesize

    72KB

  • memory/4960-135-0x0000000004E30000-0x0000000004E40000-memory.dmp

    Filesize

    64KB

  • memory/4960-134-0x0000000004E30000-0x0000000004E40000-memory.dmp

    Filesize

    64KB

  • memory/4960-133-0x0000000004E40000-0x000000000533E000-memory.dmp

    Filesize

    5.0MB

  • memory/4960-132-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4960-157-0x00000000024E0000-0x00000000024F2000-memory.dmp

    Filesize

    72KB