Analysis

  • max time kernel
    54s
  • max time network
    139s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 03:15

General

  • Target

    34752ea27e3426df68627345d5152e9f195029bf60a8d22067e23361f2ea4ccb.exe

  • Size

    690KB

  • MD5

    32febfa3ee9da606e7f0dbd3fbc72854

  • SHA1

    6d4097795426c8ae5e8feda997bfe496b2ec8392

  • SHA256

    34752ea27e3426df68627345d5152e9f195029bf60a8d22067e23361f2ea4ccb

  • SHA512

    7fa1c6972e3f120dca09f0cc636ec9fe41fa4f905103f07673d5be606e5579300863f9d7ebf8858c3bb66395e94252b9e03d0083ce453fcf5fff4663f5a96432

  • SSDEEP

    12288:8Mriy90k9ei7vGLnGmpfLPOhh9Gyj65hLubq6/bs+pvLfDHm2DovmF7LfigTT5zz:Wyb9V7eKqfLKTufab5/bs+V7HtDoC7LH

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\34752ea27e3426df68627345d5152e9f195029bf60a8d22067e23361f2ea4ccb.exe
    "C:\Users\Admin\AppData\Local\Temp\34752ea27e3426df68627345d5152e9f195029bf60a8d22067e23361f2ea4ccb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4148
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un173117.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un173117.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3548
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7416.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7416.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2348
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5305.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5305.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4084
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si883945.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si883945.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1528

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si883945.exe

    Filesize

    175KB

    MD5

    096476980714c11dcf53176dadab1db3

    SHA1

    4ac1ac946b441c82dec0f71ceb8c5b28f91c707a

    SHA256

    f8e95e21568225b09baf5ad26242dfd6eb6a25a29def67eb722874752532b76b

    SHA512

    f5d88d06c4e580d1433da8d023f9a7f9c1e1f588822c8195b4300af986ff398400ffeb71a1d005dabb1157e88d6661a01cf0130b4806835155e3f77ce1b3f59a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si883945.exe

    Filesize

    175KB

    MD5

    096476980714c11dcf53176dadab1db3

    SHA1

    4ac1ac946b441c82dec0f71ceb8c5b28f91c707a

    SHA256

    f8e95e21568225b09baf5ad26242dfd6eb6a25a29def67eb722874752532b76b

    SHA512

    f5d88d06c4e580d1433da8d023f9a7f9c1e1f588822c8195b4300af986ff398400ffeb71a1d005dabb1157e88d6661a01cf0130b4806835155e3f77ce1b3f59a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un173117.exe

    Filesize

    548KB

    MD5

    cb0e520d966832dab6b71813e5cdb9ba

    SHA1

    fc591742fe4535a409e52f39f0a9d428d9ff230e

    SHA256

    8859044c0848d5c258ef1d3b465b28c3778b203675f7b99c8424b44162be818e

    SHA512

    be690442e1432401d48b6680e395d30846986e30342609d293a88e8fbf266706ac9ddadd39e200b4d2261f48da14774d26704f892364231363276bf4379c2410

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un173117.exe

    Filesize

    548KB

    MD5

    cb0e520d966832dab6b71813e5cdb9ba

    SHA1

    fc591742fe4535a409e52f39f0a9d428d9ff230e

    SHA256

    8859044c0848d5c258ef1d3b465b28c3778b203675f7b99c8424b44162be818e

    SHA512

    be690442e1432401d48b6680e395d30846986e30342609d293a88e8fbf266706ac9ddadd39e200b4d2261f48da14774d26704f892364231363276bf4379c2410

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7416.exe

    Filesize

    291KB

    MD5

    c807da8e36b2ef8f5cedfabc9ff06665

    SHA1

    b52acca14ff9387bf40a41ff7d380310e261ff18

    SHA256

    8a6d7cac90bf122124ea127f2179ce2128318ddd4093b56c453f989bf4dc099c

    SHA512

    70695dcf04b971790d20e93584bb5013074440955ff2e4bf87cb2f1b411b2ab48a5a70f53695c0418278bd9c98f23109277dcea080f41461bcf0def39764a2eb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7416.exe

    Filesize

    291KB

    MD5

    c807da8e36b2ef8f5cedfabc9ff06665

    SHA1

    b52acca14ff9387bf40a41ff7d380310e261ff18

    SHA256

    8a6d7cac90bf122124ea127f2179ce2128318ddd4093b56c453f989bf4dc099c

    SHA512

    70695dcf04b971790d20e93584bb5013074440955ff2e4bf87cb2f1b411b2ab48a5a70f53695c0418278bd9c98f23109277dcea080f41461bcf0def39764a2eb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5305.exe

    Filesize

    345KB

    MD5

    cc8db76073d1f98c9941407baceed231

    SHA1

    844d7e7e440bbb55d670c342102bd71c5ebd38a3

    SHA256

    1e7ece3eed58788cce283b994b09d3e3cda7585934692971d2ec7a679e3d680a

    SHA512

    e6bf9b7b5a443dc8173d55623d1ee4d60ce3eca6f5a9fa37391f8fe71f1f683bcfe9a61c3833794e06422cf16cdbb844711dd3665425431e72aff300bdc57654

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5305.exe

    Filesize

    345KB

    MD5

    cc8db76073d1f98c9941407baceed231

    SHA1

    844d7e7e440bbb55d670c342102bd71c5ebd38a3

    SHA256

    1e7ece3eed58788cce283b994b09d3e3cda7585934692971d2ec7a679e3d680a

    SHA512

    e6bf9b7b5a443dc8173d55623d1ee4d60ce3eca6f5a9fa37391f8fe71f1f683bcfe9a61c3833794e06422cf16cdbb844711dd3665425431e72aff300bdc57654

  • memory/1528-1111-0x0000000004C20000-0x0000000004C30000-memory.dmp

    Filesize

    64KB

  • memory/1528-1110-0x0000000000350000-0x0000000000382000-memory.dmp

    Filesize

    200KB

  • memory/1528-1112-0x0000000004BD0000-0x0000000004C1B000-memory.dmp

    Filesize

    300KB

  • memory/1528-1113-0x0000000004C20000-0x0000000004C30000-memory.dmp

    Filesize

    64KB

  • memory/2348-141-0x0000000002390000-0x00000000023A2000-memory.dmp

    Filesize

    72KB

  • memory/2348-155-0x0000000002390000-0x00000000023A2000-memory.dmp

    Filesize

    72KB

  • memory/2348-136-0x00000000023D0000-0x00000000023E0000-memory.dmp

    Filesize

    64KB

  • memory/2348-137-0x0000000002390000-0x00000000023A8000-memory.dmp

    Filesize

    96KB

  • memory/2348-138-0x0000000002390000-0x00000000023A2000-memory.dmp

    Filesize

    72KB

  • memory/2348-139-0x0000000002390000-0x00000000023A2000-memory.dmp

    Filesize

    72KB

  • memory/2348-134-0x00000000023D0000-0x00000000023E0000-memory.dmp

    Filesize

    64KB

  • memory/2348-143-0x0000000002390000-0x00000000023A2000-memory.dmp

    Filesize

    72KB

  • memory/2348-145-0x0000000002390000-0x00000000023A2000-memory.dmp

    Filesize

    72KB

  • memory/2348-147-0x0000000002390000-0x00000000023A2000-memory.dmp

    Filesize

    72KB

  • memory/2348-149-0x0000000002390000-0x00000000023A2000-memory.dmp

    Filesize

    72KB

  • memory/2348-151-0x0000000002390000-0x00000000023A2000-memory.dmp

    Filesize

    72KB

  • memory/2348-153-0x0000000002390000-0x00000000023A2000-memory.dmp

    Filesize

    72KB

  • memory/2348-135-0x00000000023D0000-0x00000000023E0000-memory.dmp

    Filesize

    64KB

  • memory/2348-157-0x0000000002390000-0x00000000023A2000-memory.dmp

    Filesize

    72KB

  • memory/2348-159-0x0000000002390000-0x00000000023A2000-memory.dmp

    Filesize

    72KB

  • memory/2348-161-0x0000000002390000-0x00000000023A2000-memory.dmp

    Filesize

    72KB

  • memory/2348-163-0x0000000002390000-0x00000000023A2000-memory.dmp

    Filesize

    72KB

  • memory/2348-165-0x0000000002390000-0x00000000023A2000-memory.dmp

    Filesize

    72KB

  • memory/2348-166-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/2348-167-0x00000000023D0000-0x00000000023E0000-memory.dmp

    Filesize

    64KB

  • memory/2348-168-0x00000000023D0000-0x00000000023E0000-memory.dmp

    Filesize

    64KB

  • memory/2348-169-0x00000000023D0000-0x00000000023E0000-memory.dmp

    Filesize

    64KB

  • memory/2348-171-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/2348-133-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2348-132-0x0000000004E50000-0x000000000534E000-memory.dmp

    Filesize

    5.0MB

  • memory/2348-131-0x0000000000B40000-0x0000000000B5A000-memory.dmp

    Filesize

    104KB

  • memory/4084-178-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4084-213-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4084-183-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4084-185-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4084-187-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4084-189-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4084-191-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4084-193-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4084-195-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4084-197-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4084-200-0x0000000001A30000-0x0000000001A7B000-memory.dmp

    Filesize

    300KB

  • memory/4084-202-0x0000000001E90000-0x0000000001EA0000-memory.dmp

    Filesize

    64KB

  • memory/4084-204-0x0000000001E90000-0x0000000001EA0000-memory.dmp

    Filesize

    64KB

  • memory/4084-207-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4084-209-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4084-206-0x0000000001E90000-0x0000000001EA0000-memory.dmp

    Filesize

    64KB

  • memory/4084-203-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4084-199-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4084-211-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4084-181-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4084-215-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4084-1088-0x00000000066B0000-0x0000000006CB6000-memory.dmp

    Filesize

    6.0MB

  • memory/4084-1089-0x0000000006D10000-0x0000000006E1A000-memory.dmp

    Filesize

    1.0MB

  • memory/4084-1090-0x0000000006E50000-0x0000000006E62000-memory.dmp

    Filesize

    72KB

  • memory/4084-1091-0x0000000006E70000-0x0000000006EAE000-memory.dmp

    Filesize

    248KB

  • memory/4084-1092-0x0000000006FC0000-0x000000000700B000-memory.dmp

    Filesize

    300KB

  • memory/4084-1093-0x0000000001E90000-0x0000000001EA0000-memory.dmp

    Filesize

    64KB

  • memory/4084-1094-0x0000000007150000-0x00000000071E2000-memory.dmp

    Filesize

    584KB

  • memory/4084-1095-0x00000000071F0000-0x0000000007256000-memory.dmp

    Filesize

    408KB

  • memory/4084-1097-0x0000000001E90000-0x0000000001EA0000-memory.dmp

    Filesize

    64KB

  • memory/4084-1098-0x0000000001E90000-0x0000000001EA0000-memory.dmp

    Filesize

    64KB

  • memory/4084-1099-0x0000000001E90000-0x0000000001EA0000-memory.dmp

    Filesize

    64KB

  • memory/4084-1100-0x0000000007C80000-0x0000000007E42000-memory.dmp

    Filesize

    1.8MB

  • memory/4084-1101-0x0000000007E60000-0x000000000838C000-memory.dmp

    Filesize

    5.2MB

  • memory/4084-179-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4084-177-0x0000000006530000-0x0000000006574000-memory.dmp

    Filesize

    272KB

  • memory/4084-176-0x0000000005FB0000-0x0000000005FF6000-memory.dmp

    Filesize

    280KB

  • memory/4084-1102-0x0000000005AE0000-0x0000000005B56000-memory.dmp

    Filesize

    472KB

  • memory/4084-1103-0x0000000009660000-0x00000000096B0000-memory.dmp

    Filesize

    320KB

  • memory/4084-1104-0x0000000001E90000-0x0000000001EA0000-memory.dmp

    Filesize

    64KB