Analysis

  • max time kernel
    55s
  • max time network
    141s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 02:57

General

  • Target

    333242a4e8cd7272200932b37fc74b83c0b96e9d6e095311998919c4d3662688.exe

  • Size

    690KB

  • MD5

    c560088e93c75fa01ff0ab74ff98c40a

  • SHA1

    935f7a8c4a1ee562cf8af634dd19e37266e5aaf9

  • SHA256

    333242a4e8cd7272200932b37fc74b83c0b96e9d6e095311998919c4d3662688

  • SHA512

    966c73b20647c71ead3426c66267c5efc3df76df68d1d10bc132498334bcb84ab218ecc882058ea3b73e0e74656e5d864294707fac5cce7d435ee2b90c67996c

  • SSDEEP

    12288:rMr0y90RtLjEnOQkPyo65hLu6fgL8B8vBF5jfig+/3AL0af:Xy8t0nVHfa6fcS8z5jagKALbf

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\333242a4e8cd7272200932b37fc74b83c0b96e9d6e095311998919c4d3662688.exe
    "C:\Users\Admin\AppData\Local\Temp\333242a4e8cd7272200932b37fc74b83c0b96e9d6e095311998919c4d3662688.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4604
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un543154.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un543154.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9694.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9694.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2140
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2667.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2667.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1920
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si558650.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si558650.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4004

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si558650.exe

    Filesize

    175KB

    MD5

    4c4566f448e4bd74d0ad665643ac729a

    SHA1

    293894686efc30af84440ced577e3c3fc8658cbd

    SHA256

    2f9286c4e7eafa083969dc8fa448bb5f7e98e516903db63f7e82fa7efae91614

    SHA512

    d7b60265d002e1f716dbad42c7590e7ad62ccad2afb25cadd6ceb6fc79840ef0b4a2ec903ff7faa1bb7c880b3185a0e9414246d0d5c2e484e1449425277ed995

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si558650.exe

    Filesize

    175KB

    MD5

    4c4566f448e4bd74d0ad665643ac729a

    SHA1

    293894686efc30af84440ced577e3c3fc8658cbd

    SHA256

    2f9286c4e7eafa083969dc8fa448bb5f7e98e516903db63f7e82fa7efae91614

    SHA512

    d7b60265d002e1f716dbad42c7590e7ad62ccad2afb25cadd6ceb6fc79840ef0b4a2ec903ff7faa1bb7c880b3185a0e9414246d0d5c2e484e1449425277ed995

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un543154.exe

    Filesize

    548KB

    MD5

    899b82e380668f57b8c1e766d1209d0d

    SHA1

    a04966b1b3e1c8357c4a515dc119b6340b29c233

    SHA256

    7a1ae925437ed15b607d3ae8ca602655d8ec3b3c13421c42dd68ca1f77d1237f

    SHA512

    9f0bd2e0b53e7f598d1d5a205b0346fd69a976193cfaf71b1f82cbaef5ec9e358263b7938e77ae64551ff5c12c5a474fcc15e42d5d7c192833748ac2b6151e4a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un543154.exe

    Filesize

    548KB

    MD5

    899b82e380668f57b8c1e766d1209d0d

    SHA1

    a04966b1b3e1c8357c4a515dc119b6340b29c233

    SHA256

    7a1ae925437ed15b607d3ae8ca602655d8ec3b3c13421c42dd68ca1f77d1237f

    SHA512

    9f0bd2e0b53e7f598d1d5a205b0346fd69a976193cfaf71b1f82cbaef5ec9e358263b7938e77ae64551ff5c12c5a474fcc15e42d5d7c192833748ac2b6151e4a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9694.exe

    Filesize

    291KB

    MD5

    663f0a44e1d13ddb0f49cbd89656f276

    SHA1

    b60e56fb74865c8f7961b3cb190c44edb6cafced

    SHA256

    bbe589ef4cda76a4e4f6f51abae23568b30111188cf016b875071c6c917bb50d

    SHA512

    949e2f1c2e95061a0df961bc7a03e0b627f6c4338e70fafba09faf0f47997f96d801de5992ee53c82740f45a7054042b81a6c460d6fee20dbf7e92e6571e32ec

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9694.exe

    Filesize

    291KB

    MD5

    663f0a44e1d13ddb0f49cbd89656f276

    SHA1

    b60e56fb74865c8f7961b3cb190c44edb6cafced

    SHA256

    bbe589ef4cda76a4e4f6f51abae23568b30111188cf016b875071c6c917bb50d

    SHA512

    949e2f1c2e95061a0df961bc7a03e0b627f6c4338e70fafba09faf0f47997f96d801de5992ee53c82740f45a7054042b81a6c460d6fee20dbf7e92e6571e32ec

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2667.exe

    Filesize

    345KB

    MD5

    f0b488c62ece40f9e222df6b197430ab

    SHA1

    86c7357b9b8d718ff9919884436cd676033d405e

    SHA256

    b6bfd77ee2a1199874ebf81ff0aed2c262e51c45521403e42c117c106ad4b622

    SHA512

    855bc7125909732f83ba9e067250e0741f3502675f638cfa97e27c9f18087310dadf892fbc0cb5a3697376fac6a831c05a2e3ccbe6bf1778f0089b0f4011524c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2667.exe

    Filesize

    345KB

    MD5

    f0b488c62ece40f9e222df6b197430ab

    SHA1

    86c7357b9b8d718ff9919884436cd676033d405e

    SHA256

    b6bfd77ee2a1199874ebf81ff0aed2c262e51c45521403e42c117c106ad4b622

    SHA512

    855bc7125909732f83ba9e067250e0741f3502675f638cfa97e27c9f18087310dadf892fbc0cb5a3697376fac6a831c05a2e3ccbe6bf1778f0089b0f4011524c

  • memory/1920-1091-0x0000000006680000-0x0000000006C86000-memory.dmp

    Filesize

    6.0MB

  • memory/1920-216-0x00000000038F0000-0x0000000003900000-memory.dmp

    Filesize

    64KB

  • memory/1920-1107-0x00000000038F0000-0x0000000003900000-memory.dmp

    Filesize

    64KB

  • memory/1920-1106-0x00000000082D0000-0x0000000008320000-memory.dmp

    Filesize

    320KB

  • memory/1920-1105-0x0000000008240000-0x00000000082B6000-memory.dmp

    Filesize

    472KB

  • memory/1920-196-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/1920-1104-0x0000000007BE0000-0x000000000810C000-memory.dmp

    Filesize

    5.2MB

  • memory/1920-1103-0x00000000079F0000-0x0000000007BB2000-memory.dmp

    Filesize

    1.8MB

  • memory/1920-1102-0x00000000038F0000-0x0000000003900000-memory.dmp

    Filesize

    64KB

  • memory/1920-1101-0x00000000038F0000-0x0000000003900000-memory.dmp

    Filesize

    64KB

  • memory/1920-198-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/1920-1100-0x00000000038F0000-0x0000000003900000-memory.dmp

    Filesize

    64KB

  • memory/1920-1098-0x00000000071F0000-0x0000000007256000-memory.dmp

    Filesize

    408KB

  • memory/1920-1097-0x0000000007150000-0x00000000071E2000-memory.dmp

    Filesize

    584KB

  • memory/1920-1096-0x00000000038F0000-0x0000000003900000-memory.dmp

    Filesize

    64KB

  • memory/1920-1095-0x0000000006FC0000-0x000000000700B000-memory.dmp

    Filesize

    300KB

  • memory/1920-1094-0x0000000006E70000-0x0000000006EAE000-memory.dmp

    Filesize

    248KB

  • memory/1920-1093-0x0000000006E50000-0x0000000006E62000-memory.dmp

    Filesize

    72KB

  • memory/1920-1092-0x0000000006D10000-0x0000000006E1A000-memory.dmp

    Filesize

    1.0MB

  • memory/1920-206-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/1920-218-0x00000000038F0000-0x0000000003900000-memory.dmp

    Filesize

    64KB

  • memory/1920-217-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/1920-214-0x00000000038F0000-0x0000000003900000-memory.dmp

    Filesize

    64KB

  • memory/1920-213-0x0000000001A30000-0x0000000001A7B000-memory.dmp

    Filesize

    300KB

  • memory/1920-212-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/1920-179-0x00000000038A0000-0x00000000038E6000-memory.dmp

    Filesize

    280KB

  • memory/1920-180-0x00000000064D0000-0x0000000006514000-memory.dmp

    Filesize

    272KB

  • memory/1920-181-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/1920-182-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/1920-194-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/1920-186-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/1920-188-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/1920-190-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/1920-192-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/1920-184-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/1920-210-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/1920-208-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/1920-200-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/1920-202-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/1920-204-0x00000000064D0000-0x000000000650F000-memory.dmp

    Filesize

    252KB

  • memory/2140-169-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/2140-154-0x0000000002510000-0x0000000002522000-memory.dmp

    Filesize

    72KB

  • memory/2140-144-0x0000000002510000-0x0000000002522000-memory.dmp

    Filesize

    72KB

  • memory/2140-137-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2140-138-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/2140-174-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/2140-172-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/2140-171-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/2140-170-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/2140-136-0x0000000002510000-0x0000000002528000-memory.dmp

    Filesize

    96KB

  • memory/2140-139-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/2140-168-0x0000000002510000-0x0000000002522000-memory.dmp

    Filesize

    72KB

  • memory/2140-166-0x0000000002510000-0x0000000002522000-memory.dmp

    Filesize

    72KB

  • memory/2140-164-0x0000000002510000-0x0000000002522000-memory.dmp

    Filesize

    72KB

  • memory/2140-162-0x0000000002510000-0x0000000002522000-memory.dmp

    Filesize

    72KB

  • memory/2140-160-0x0000000002510000-0x0000000002522000-memory.dmp

    Filesize

    72KB

  • memory/2140-158-0x0000000002510000-0x0000000002522000-memory.dmp

    Filesize

    72KB

  • memory/2140-156-0x0000000002510000-0x0000000002522000-memory.dmp

    Filesize

    72KB

  • memory/2140-152-0x0000000002510000-0x0000000002522000-memory.dmp

    Filesize

    72KB

  • memory/2140-150-0x0000000002510000-0x0000000002522000-memory.dmp

    Filesize

    72KB

  • memory/2140-148-0x0000000002510000-0x0000000002522000-memory.dmp

    Filesize

    72KB

  • memory/2140-146-0x0000000002510000-0x0000000002522000-memory.dmp

    Filesize

    72KB

  • memory/2140-142-0x0000000002510000-0x0000000002522000-memory.dmp

    Filesize

    72KB

  • memory/2140-141-0x0000000002510000-0x0000000002522000-memory.dmp

    Filesize

    72KB

  • memory/2140-140-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

    Filesize

    64KB

  • memory/2140-135-0x0000000004EE0000-0x00000000053DE000-memory.dmp

    Filesize

    5.0MB

  • memory/2140-134-0x0000000002360000-0x000000000237A000-memory.dmp

    Filesize

    104KB

  • memory/4004-1113-0x0000000000030000-0x0000000000062000-memory.dmp

    Filesize

    200KB

  • memory/4004-1114-0x0000000004A70000-0x0000000004ABB000-memory.dmp

    Filesize

    300KB

  • memory/4004-1115-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

    Filesize

    64KB