Analysis

  • max time kernel
    54s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 02:48

General

  • Target

    2cd7e337e09ecc4765bed877ac6d1acecbb0d46684d316b7903d7b177f0a767c.exe

  • Size

    689KB

  • MD5

    b8e1c8ef5918b9f41d1a20549f015ab2

  • SHA1

    407f61853ec180808dafefc14c4752a4302c9493

  • SHA256

    2cd7e337e09ecc4765bed877ac6d1acecbb0d46684d316b7903d7b177f0a767c

  • SHA512

    3caf04112298a3b9694d1c3270a901aad8f808ae2279f0d73e69a1da96cc02c590fec3773da9ec3e13806182b1d5523f00a225022325ad57a9df662c69c14cf0

  • SSDEEP

    12288:XMr8y90Ly3AqQkNS0Au/5ROBIlmyI65hLuAg5K3YuShZRyGLff04mJMvZFlWfigX:7yrwqQw/5R3lznfa55KouklM4mJMblW9

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2cd7e337e09ecc4765bed877ac6d1acecbb0d46684d316b7903d7b177f0a767c.exe
    "C:\Users\Admin\AppData\Local\Temp\2cd7e337e09ecc4765bed877ac6d1acecbb0d46684d316b7903d7b177f0a767c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4212
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un500169.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un500169.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4300
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0081.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0081.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4624
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0701.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0701.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3616
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si656465.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si656465.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4440

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si656465.exe

    Filesize

    175KB

    MD5

    5de128676fa2973b2133223ca1f223f0

    SHA1

    024fd5f1b178a2c26931eead296ad5029caa356f

    SHA256

    639f023bad34010c91a1de6c6c21d7bfc24144c592b6d1594b177e2fa871fa2a

    SHA512

    8a710c906ec28e3389eb645d29ebf4d1e80ba172582e6d7ed4c09b7049047dad006093c341996e73e981b5528d6f2a2d18ce02079ab5e5698ac4f88ab34350f4

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si656465.exe

    Filesize

    175KB

    MD5

    5de128676fa2973b2133223ca1f223f0

    SHA1

    024fd5f1b178a2c26931eead296ad5029caa356f

    SHA256

    639f023bad34010c91a1de6c6c21d7bfc24144c592b6d1594b177e2fa871fa2a

    SHA512

    8a710c906ec28e3389eb645d29ebf4d1e80ba172582e6d7ed4c09b7049047dad006093c341996e73e981b5528d6f2a2d18ce02079ab5e5698ac4f88ab34350f4

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un500169.exe

    Filesize

    547KB

    MD5

    dc6f48546fd2a4dd82b17418b997604f

    SHA1

    3346cbac398afedbe407d2dd892ce34fdf672972

    SHA256

    59b58785db816a5f105f6366d66ac0b2eea512c84d85cb7f37ad331b113fce40

    SHA512

    cca2ef7c21fc533f8e671135b550ae0ec93e816063e38cf084febffa3e72c7568f83069862e72d697a3e022009b791c27db38274eaef70f41a0405f09ea7e43a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un500169.exe

    Filesize

    547KB

    MD5

    dc6f48546fd2a4dd82b17418b997604f

    SHA1

    3346cbac398afedbe407d2dd892ce34fdf672972

    SHA256

    59b58785db816a5f105f6366d66ac0b2eea512c84d85cb7f37ad331b113fce40

    SHA512

    cca2ef7c21fc533f8e671135b550ae0ec93e816063e38cf084febffa3e72c7568f83069862e72d697a3e022009b791c27db38274eaef70f41a0405f09ea7e43a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0081.exe

    Filesize

    291KB

    MD5

    19de3f6506cabcbc26fc76e1da9c45b0

    SHA1

    65ab5496b998fc7041bfad4ea3c133dcc3b03871

    SHA256

    1e3c1cc18dbe5fec640ab1bffa43853fd3bffaff33e907ebbda438e229c7ef66

    SHA512

    d306d9aad5079254ec966798b3e0cabf79dad3879fcc838df3cbc9356c953420ec97cb5cf5a3ddadde1fd0ccce7ee6ea278730b424fb0b7e8f5a648b0fa9d930

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0081.exe

    Filesize

    291KB

    MD5

    19de3f6506cabcbc26fc76e1da9c45b0

    SHA1

    65ab5496b998fc7041bfad4ea3c133dcc3b03871

    SHA256

    1e3c1cc18dbe5fec640ab1bffa43853fd3bffaff33e907ebbda438e229c7ef66

    SHA512

    d306d9aad5079254ec966798b3e0cabf79dad3879fcc838df3cbc9356c953420ec97cb5cf5a3ddadde1fd0ccce7ee6ea278730b424fb0b7e8f5a648b0fa9d930

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0701.exe

    Filesize

    345KB

    MD5

    a019c0084ad6c865e8fade8eb62dd51e

    SHA1

    6b2793b7ab6fedba12c1a5e34d6a5809c00e006e

    SHA256

    56848c47ba7dd47f878273aff37052b0afadd2000d40d8f1c259b39d5444283b

    SHA512

    0b6b37e205fba5683035b3ef290cc96ae771e0b96810438a362478b61eacc9fbbbd47a94311165b9b8c946cc7966e5dbe18c196d1fa0022c1acd06f50aa0544e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0701.exe

    Filesize

    345KB

    MD5

    a019c0084ad6c865e8fade8eb62dd51e

    SHA1

    6b2793b7ab6fedba12c1a5e34d6a5809c00e006e

    SHA256

    56848c47ba7dd47f878273aff37052b0afadd2000d40d8f1c259b39d5444283b

    SHA512

    0b6b37e205fba5683035b3ef290cc96ae771e0b96810438a362478b61eacc9fbbbd47a94311165b9b8c946cc7966e5dbe18c196d1fa0022c1acd06f50aa0544e

  • memory/3616-1092-0x0000000006C90000-0x0000000007296000-memory.dmp

    Filesize

    6.0MB

  • memory/3616-1093-0x0000000006700000-0x000000000680A000-memory.dmp

    Filesize

    1.0MB

  • memory/3616-207-0x0000000005FC0000-0x0000000005FFF000-memory.dmp

    Filesize

    252KB

  • memory/3616-205-0x0000000005FC0000-0x0000000005FFF000-memory.dmp

    Filesize

    252KB

  • memory/3616-203-0x0000000005FC0000-0x0000000005FFF000-memory.dmp

    Filesize

    252KB

  • memory/3616-193-0x0000000005FC0000-0x0000000005FFF000-memory.dmp

    Filesize

    252KB

  • memory/3616-1108-0x0000000006010000-0x0000000006020000-memory.dmp

    Filesize

    64KB

  • memory/3616-1107-0x00000000083F0000-0x0000000008440000-memory.dmp

    Filesize

    320KB

  • memory/3616-1106-0x0000000008370000-0x00000000083E6000-memory.dmp

    Filesize

    472KB

  • memory/3616-1105-0x0000000006010000-0x0000000006020000-memory.dmp

    Filesize

    64KB

  • memory/3616-195-0x0000000005FC0000-0x0000000005FFF000-memory.dmp

    Filesize

    252KB

  • memory/3616-1104-0x0000000006010000-0x0000000006020000-memory.dmp

    Filesize

    64KB

  • memory/3616-1103-0x0000000006010000-0x0000000006020000-memory.dmp

    Filesize

    64KB

  • memory/3616-1101-0x0000000007AD0000-0x0000000007FFC000-memory.dmp

    Filesize

    5.2MB

  • memory/3616-1100-0x0000000007900000-0x0000000007AC2000-memory.dmp

    Filesize

    1.8MB

  • memory/3616-1099-0x0000000006BE0000-0x0000000006C46000-memory.dmp

    Filesize

    408KB

  • memory/3616-1098-0x0000000006B40000-0x0000000006BD2000-memory.dmp

    Filesize

    584KB

  • memory/3616-1097-0x0000000006010000-0x0000000006020000-memory.dmp

    Filesize

    64KB

  • memory/3616-1096-0x00000000069B0000-0x00000000069FB000-memory.dmp

    Filesize

    300KB

  • memory/3616-1095-0x0000000006860000-0x000000000689E000-memory.dmp

    Filesize

    248KB

  • memory/3616-1094-0x0000000006840000-0x0000000006852000-memory.dmp

    Filesize

    72KB

  • memory/3616-209-0x0000000005FC0000-0x0000000005FFF000-memory.dmp

    Filesize

    252KB

  • memory/3616-219-0x0000000005FC0000-0x0000000005FFF000-memory.dmp

    Filesize

    252KB

  • memory/3616-217-0x0000000005FC0000-0x0000000005FFF000-memory.dmp

    Filesize

    252KB

  • memory/3616-215-0x0000000005FC0000-0x0000000005FFF000-memory.dmp

    Filesize

    252KB

  • memory/3616-180-0x0000000003910000-0x0000000003956000-memory.dmp

    Filesize

    280KB

  • memory/3616-181-0x0000000005FC0000-0x0000000006004000-memory.dmp

    Filesize

    272KB

  • memory/3616-182-0x0000000001B00000-0x0000000001B4B000-memory.dmp

    Filesize

    300KB

  • memory/3616-184-0x0000000006010000-0x0000000006020000-memory.dmp

    Filesize

    64KB

  • memory/3616-191-0x0000000005FC0000-0x0000000005FFF000-memory.dmp

    Filesize

    252KB

  • memory/3616-186-0x0000000005FC0000-0x0000000005FFF000-memory.dmp

    Filesize

    252KB

  • memory/3616-187-0x0000000005FC0000-0x0000000005FFF000-memory.dmp

    Filesize

    252KB

  • memory/3616-185-0x0000000006010000-0x0000000006020000-memory.dmp

    Filesize

    64KB

  • memory/3616-189-0x0000000005FC0000-0x0000000005FFF000-memory.dmp

    Filesize

    252KB

  • memory/3616-183-0x0000000006010000-0x0000000006020000-memory.dmp

    Filesize

    64KB

  • memory/3616-213-0x0000000005FC0000-0x0000000005FFF000-memory.dmp

    Filesize

    252KB

  • memory/3616-211-0x0000000005FC0000-0x0000000005FFF000-memory.dmp

    Filesize

    252KB

  • memory/3616-197-0x0000000005FC0000-0x0000000005FFF000-memory.dmp

    Filesize

    252KB

  • memory/3616-199-0x0000000005FC0000-0x0000000005FFF000-memory.dmp

    Filesize

    252KB

  • memory/3616-201-0x0000000005FC0000-0x0000000005FFF000-memory.dmp

    Filesize

    252KB

  • memory/4440-1114-0x0000000000090000-0x00000000000C2000-memory.dmp

    Filesize

    200KB

  • memory/4440-1115-0x0000000004AD0000-0x0000000004B1B000-memory.dmp

    Filesize

    300KB

  • memory/4440-1116-0x0000000004920000-0x0000000004930000-memory.dmp

    Filesize

    64KB

  • memory/4624-170-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/4624-155-0x00000000023A0000-0x00000000023B2000-memory.dmp

    Filesize

    72KB

  • memory/4624-145-0x00000000023A0000-0x00000000023B2000-memory.dmp

    Filesize

    72KB

  • memory/4624-138-0x0000000004F80000-0x0000000004F90000-memory.dmp

    Filesize

    64KB

  • memory/4624-140-0x00000000023A0000-0x00000000023B8000-memory.dmp

    Filesize

    96KB

  • memory/4624-175-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/4624-137-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4624-173-0x0000000004F80000-0x0000000004F90000-memory.dmp

    Filesize

    64KB

  • memory/4624-171-0x0000000004F80000-0x0000000004F90000-memory.dmp

    Filesize

    64KB

  • memory/4624-172-0x0000000004F80000-0x0000000004F90000-memory.dmp

    Filesize

    64KB

  • memory/4624-141-0x0000000004F80000-0x0000000004F90000-memory.dmp

    Filesize

    64KB

  • memory/4624-169-0x00000000023A0000-0x00000000023B2000-memory.dmp

    Filesize

    72KB

  • memory/4624-167-0x00000000023A0000-0x00000000023B2000-memory.dmp

    Filesize

    72KB

  • memory/4624-165-0x00000000023A0000-0x00000000023B2000-memory.dmp

    Filesize

    72KB

  • memory/4624-163-0x00000000023A0000-0x00000000023B2000-memory.dmp

    Filesize

    72KB

  • memory/4624-161-0x00000000023A0000-0x00000000023B2000-memory.dmp

    Filesize

    72KB

  • memory/4624-159-0x00000000023A0000-0x00000000023B2000-memory.dmp

    Filesize

    72KB

  • memory/4624-157-0x00000000023A0000-0x00000000023B2000-memory.dmp

    Filesize

    72KB

  • memory/4624-153-0x00000000023A0000-0x00000000023B2000-memory.dmp

    Filesize

    72KB

  • memory/4624-149-0x00000000023A0000-0x00000000023B2000-memory.dmp

    Filesize

    72KB

  • memory/4624-151-0x00000000023A0000-0x00000000023B2000-memory.dmp

    Filesize

    72KB

  • memory/4624-147-0x00000000023A0000-0x00000000023B2000-memory.dmp

    Filesize

    72KB

  • memory/4624-136-0x0000000004F90000-0x000000000548E000-memory.dmp

    Filesize

    5.0MB

  • memory/4624-135-0x00000000009B0000-0x00000000009CA000-memory.dmp

    Filesize

    104KB

  • memory/4624-143-0x00000000023A0000-0x00000000023B2000-memory.dmp

    Filesize

    72KB

  • memory/4624-142-0x00000000023A0000-0x00000000023B2000-memory.dmp

    Filesize

    72KB

  • memory/4624-139-0x0000000004F80000-0x0000000004F90000-memory.dmp

    Filesize

    64KB