Analysis

  • max time kernel
    54s
  • max time network
    70s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 03:02

General

  • Target

    2076a13a6c5ce418e468e7b9e913a45a591649515365ff4d4a47cb87ab126c1d.exe

  • Size

    689KB

  • MD5

    c8fc016ed51324476332b8b5982b0dcb

  • SHA1

    c023752cdde847023eaa39e113b5a9379415b844

  • SHA256

    2076a13a6c5ce418e468e7b9e913a45a591649515365ff4d4a47cb87ab126c1d

  • SHA512

    0f927d2bc06c3e213dcd3f9a61ad449e2ebc4d053506feea698b59400f7d6796d3113542641d402a616aaa8c737c7a367dd367abae5809c21272f059c819fea9

  • SSDEEP

    12288:cMrEy903DoyDyJ5izMM6odX3N1jJMG+D224e/a4VhzfkvSFtmfighfDBUCJ:oyuDA92F3vR+D2Z4PfkutmagN7

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2076a13a6c5ce418e468e7b9e913a45a591649515365ff4d4a47cb87ab126c1d.exe
    "C:\Users\Admin\AppData\Local\Temp\2076a13a6c5ce418e468e7b9e913a45a591649515365ff4d4a47cb87ab126c1d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4148
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un702289.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un702289.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4984
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1711.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1711.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1512
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6135.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6135.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3048
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si178446.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si178446.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4436

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si178446.exe

    Filesize

    175KB

    MD5

    be5d09360f2350df0d5c384298c3d48c

    SHA1

    fd8aa83083129bde6da50e248c9b75f10b10715c

    SHA256

    72c5ef69a93defc66dbbe797b2103903b3e9c2aaf9748d928c13d486fa570cb9

    SHA512

    1aec15886df7a168f671f1b9562c78ac8785595552cd3496b8442bb2ac886e3bda46827f8d8c719ab984a40f3811a12284d88f95878f792c92576fc377c0455f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si178446.exe

    Filesize

    175KB

    MD5

    be5d09360f2350df0d5c384298c3d48c

    SHA1

    fd8aa83083129bde6da50e248c9b75f10b10715c

    SHA256

    72c5ef69a93defc66dbbe797b2103903b3e9c2aaf9748d928c13d486fa570cb9

    SHA512

    1aec15886df7a168f671f1b9562c78ac8785595552cd3496b8442bb2ac886e3bda46827f8d8c719ab984a40f3811a12284d88f95878f792c92576fc377c0455f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un702289.exe

    Filesize

    547KB

    MD5

    991a908d2e13a6a7b31bba0332147603

    SHA1

    985e4f160ea0e13f0d472b61d027a4aad25b1f6d

    SHA256

    ebd12286fcc477a54fa9fdf0d9d766d14de4b27f5f7e9c761911088995b10e4b

    SHA512

    c471f42d9fae1a0ae78b74a34d47461c702f7fb842aa6c790f2979122e92ccf1d13f85cae7383352a113562a7c9df6afa4e626f06e8d0eeca84342a4cd1b0077

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un702289.exe

    Filesize

    547KB

    MD5

    991a908d2e13a6a7b31bba0332147603

    SHA1

    985e4f160ea0e13f0d472b61d027a4aad25b1f6d

    SHA256

    ebd12286fcc477a54fa9fdf0d9d766d14de4b27f5f7e9c761911088995b10e4b

    SHA512

    c471f42d9fae1a0ae78b74a34d47461c702f7fb842aa6c790f2979122e92ccf1d13f85cae7383352a113562a7c9df6afa4e626f06e8d0eeca84342a4cd1b0077

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1711.exe

    Filesize

    291KB

    MD5

    a8c4573aa67867e28daa18d7a296f6a6

    SHA1

    ab66a49c1fcd0b8e125603900bbf632ff9f1cf7d

    SHA256

    e93a95b67985cf4ebc7f7ae6d553d18b479733d90883b5876e7bb08d37b087ec

    SHA512

    12f19ec7e801cf482495b036b65addc1803a0a710c9f10ca863287cc930fdc24a07ee16d34577594a100e1b525cce6d3d4ddcc00f4c538e7d41b6205042c2f64

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1711.exe

    Filesize

    291KB

    MD5

    a8c4573aa67867e28daa18d7a296f6a6

    SHA1

    ab66a49c1fcd0b8e125603900bbf632ff9f1cf7d

    SHA256

    e93a95b67985cf4ebc7f7ae6d553d18b479733d90883b5876e7bb08d37b087ec

    SHA512

    12f19ec7e801cf482495b036b65addc1803a0a710c9f10ca863287cc930fdc24a07ee16d34577594a100e1b525cce6d3d4ddcc00f4c538e7d41b6205042c2f64

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6135.exe

    Filesize

    345KB

    MD5

    fe861ba02e3d3540523a161b9f8306cf

    SHA1

    34cfd0f701c5097418117620e9bace7af766f1bc

    SHA256

    445b45cc2b00811d2a28f34994b48583dfcc42f99be8c6cc29e9fd7c6de6a021

    SHA512

    19c01f4d23aea513469e9da0a205f8ee53e8c5e25263a39213112efbfbe040e991e95b17475a517542df84c4d495b615d530e8738643a5b1b837ea8cdd56da59

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6135.exe

    Filesize

    345KB

    MD5

    fe861ba02e3d3540523a161b9f8306cf

    SHA1

    34cfd0f701c5097418117620e9bace7af766f1bc

    SHA256

    445b45cc2b00811d2a28f34994b48583dfcc42f99be8c6cc29e9fd7c6de6a021

    SHA512

    19c01f4d23aea513469e9da0a205f8ee53e8c5e25263a39213112efbfbe040e991e95b17475a517542df84c4d495b615d530e8738643a5b1b837ea8cdd56da59

  • memory/1512-135-0x00000000024A0000-0x00000000024BA000-memory.dmp

    Filesize

    104KB

  • memory/1512-136-0x0000000004C20000-0x000000000511E000-memory.dmp

    Filesize

    5.0MB

  • memory/1512-139-0x0000000004C10000-0x0000000004C20000-memory.dmp

    Filesize

    64KB

  • memory/1512-137-0x0000000005140000-0x0000000005158000-memory.dmp

    Filesize

    96KB

  • memory/1512-138-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/1512-140-0x0000000004C10000-0x0000000004C20000-memory.dmp

    Filesize

    64KB

  • memory/1512-141-0x0000000004C10000-0x0000000004C20000-memory.dmp

    Filesize

    64KB

  • memory/1512-142-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/1512-143-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/1512-147-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/1512-145-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/1512-149-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/1512-151-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/1512-153-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/1512-155-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/1512-157-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/1512-159-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/1512-161-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/1512-163-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/1512-165-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/1512-167-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/1512-169-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/1512-170-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/1512-171-0x0000000004C10000-0x0000000004C20000-memory.dmp

    Filesize

    64KB

  • memory/1512-172-0x0000000004C10000-0x0000000004C20000-memory.dmp

    Filesize

    64KB

  • memory/1512-173-0x0000000004C10000-0x0000000004C20000-memory.dmp

    Filesize

    64KB

  • memory/1512-175-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/3048-180-0x00000000038E0000-0x0000000003926000-memory.dmp

    Filesize

    280KB

  • memory/3048-181-0x0000000003980000-0x00000000039C4000-memory.dmp

    Filesize

    272KB

  • memory/3048-182-0x0000000003980000-0x00000000039BF000-memory.dmp

    Filesize

    252KB

  • memory/3048-183-0x0000000003980000-0x00000000039BF000-memory.dmp

    Filesize

    252KB

  • memory/3048-185-0x0000000003980000-0x00000000039BF000-memory.dmp

    Filesize

    252KB

  • memory/3048-187-0x0000000003980000-0x00000000039BF000-memory.dmp

    Filesize

    252KB

  • memory/3048-188-0x0000000001A30000-0x0000000001A7B000-memory.dmp

    Filesize

    300KB

  • memory/3048-191-0x0000000003980000-0x00000000039BF000-memory.dmp

    Filesize

    252KB

  • memory/3048-190-0x0000000003930000-0x0000000003940000-memory.dmp

    Filesize

    64KB

  • memory/3048-192-0x0000000003930000-0x0000000003940000-memory.dmp

    Filesize

    64KB

  • memory/3048-195-0x0000000003980000-0x00000000039BF000-memory.dmp

    Filesize

    252KB

  • memory/3048-194-0x0000000003930000-0x0000000003940000-memory.dmp

    Filesize

    64KB

  • memory/3048-197-0x0000000003980000-0x00000000039BF000-memory.dmp

    Filesize

    252KB

  • memory/3048-201-0x0000000003980000-0x00000000039BF000-memory.dmp

    Filesize

    252KB

  • memory/3048-199-0x0000000003980000-0x00000000039BF000-memory.dmp

    Filesize

    252KB

  • memory/3048-203-0x0000000003980000-0x00000000039BF000-memory.dmp

    Filesize

    252KB

  • memory/3048-205-0x0000000003980000-0x00000000039BF000-memory.dmp

    Filesize

    252KB

  • memory/3048-207-0x0000000003980000-0x00000000039BF000-memory.dmp

    Filesize

    252KB

  • memory/3048-209-0x0000000003980000-0x00000000039BF000-memory.dmp

    Filesize

    252KB

  • memory/3048-211-0x0000000003980000-0x00000000039BF000-memory.dmp

    Filesize

    252KB

  • memory/3048-213-0x0000000003980000-0x00000000039BF000-memory.dmp

    Filesize

    252KB

  • memory/3048-215-0x0000000003980000-0x00000000039BF000-memory.dmp

    Filesize

    252KB

  • memory/3048-217-0x0000000003980000-0x00000000039BF000-memory.dmp

    Filesize

    252KB

  • memory/3048-219-0x0000000003980000-0x00000000039BF000-memory.dmp

    Filesize

    252KB

  • memory/3048-1092-0x00000000066C0000-0x0000000006CC6000-memory.dmp

    Filesize

    6.0MB

  • memory/3048-1093-0x0000000006D10000-0x0000000006E1A000-memory.dmp

    Filesize

    1.0MB

  • memory/3048-1094-0x0000000006E50000-0x0000000006E62000-memory.dmp

    Filesize

    72KB

  • memory/3048-1095-0x0000000006E70000-0x0000000006EAE000-memory.dmp

    Filesize

    248KB

  • memory/3048-1096-0x0000000006FC0000-0x000000000700B000-memory.dmp

    Filesize

    300KB

  • memory/3048-1097-0x0000000003930000-0x0000000003940000-memory.dmp

    Filesize

    64KB

  • memory/3048-1098-0x0000000007150000-0x00000000071E2000-memory.dmp

    Filesize

    584KB

  • memory/3048-1099-0x00000000071F0000-0x0000000007256000-memory.dmp

    Filesize

    408KB

  • memory/3048-1101-0x00000000079D0000-0x0000000007A46000-memory.dmp

    Filesize

    472KB

  • memory/3048-1102-0x0000000007A60000-0x0000000007AB0000-memory.dmp

    Filesize

    320KB

  • memory/3048-1103-0x0000000003930000-0x0000000003940000-memory.dmp

    Filesize

    64KB

  • memory/3048-1104-0x0000000003930000-0x0000000003940000-memory.dmp

    Filesize

    64KB

  • memory/3048-1105-0x0000000003930000-0x0000000003940000-memory.dmp

    Filesize

    64KB

  • memory/3048-1106-0x0000000003930000-0x0000000003940000-memory.dmp

    Filesize

    64KB

  • memory/3048-1107-0x0000000008EA0000-0x0000000009062000-memory.dmp

    Filesize

    1.8MB

  • memory/3048-1108-0x0000000009070000-0x000000000959C000-memory.dmp

    Filesize

    5.2MB

  • memory/4436-1114-0x0000000000B40000-0x0000000000B72000-memory.dmp

    Filesize

    200KB

  • memory/4436-1115-0x0000000005580000-0x00000000055CB000-memory.dmp

    Filesize

    300KB

  • memory/4436-1116-0x0000000005380000-0x0000000005390000-memory.dmp

    Filesize

    64KB

  • memory/4436-1117-0x0000000005380000-0x0000000005390000-memory.dmp

    Filesize

    64KB