Analysis

  • max time kernel
    56s
  • max time network
    58s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 03:53

General

  • Target

    f04e7be862db92a41712450e514f37701d6f6dbb387e0cc0c05bebd87172e6c1.exe

  • Size

    689KB

  • MD5

    f574eaf4c99bbfdde3d833cf56bc505f

  • SHA1

    88c8a199d3e5b3ade5b54a18663662b047a50126

  • SHA256

    f04e7be862db92a41712450e514f37701d6f6dbb387e0cc0c05bebd87172e6c1

  • SHA512

    07ba876e7d5e630561ef3730f89423f410d09ffa4ae1581865879bc3dbfe03809619398b30e6f3c9078fb41327b95d5cbd1c268e25ffb53b1e64149636c5c4a9

  • SSDEEP

    12288:3Mrfy90Q/GQ5/Obl4y965hLutgmw8oaQU/OpgY/dmJLvqF7ifig7KPEVa9f7zcJV:wyf/h2PQfatgIQU/OWmmJLW7iagMEs9G

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f04e7be862db92a41712450e514f37701d6f6dbb387e0cc0c05bebd87172e6c1.exe
    "C:\Users\Admin\AppData\Local\Temp\f04e7be862db92a41712450e514f37701d6f6dbb387e0cc0c05bebd87172e6c1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4156
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un195402.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un195402.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4140
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4595.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4595.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3560
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4961.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4961.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4424
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si264378.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si264378.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4820

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si264378.exe
    Filesize

    175KB

    MD5

    be80436c757061ce81beff671b56195c

    SHA1

    f25c203ca114fab2e919ce5d349ffae51f8d50ff

    SHA256

    bcd7f02d83b1d5e0f181dc73a60b7afe9c7ff71ee659bc57c78b99736649f9ca

    SHA512

    537cce6b74e4a9d41e40a3165184c351e98a099682125a3ba2b9f63a943e386900c53bbeab4d43b489dacdf7e32722f84ec213532df05e6e6276a18b44b5219f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si264378.exe
    Filesize

    175KB

    MD5

    be80436c757061ce81beff671b56195c

    SHA1

    f25c203ca114fab2e919ce5d349ffae51f8d50ff

    SHA256

    bcd7f02d83b1d5e0f181dc73a60b7afe9c7ff71ee659bc57c78b99736649f9ca

    SHA512

    537cce6b74e4a9d41e40a3165184c351e98a099682125a3ba2b9f63a943e386900c53bbeab4d43b489dacdf7e32722f84ec213532df05e6e6276a18b44b5219f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un195402.exe
    Filesize

    547KB

    MD5

    b2bd8c5c22268b6fa576463d3d90e883

    SHA1

    90d0ffcaf38b8c289b525e3a3aa9f2c228165e0c

    SHA256

    aa28668d5dd5f67c157d9214018c3ba233e9cb440a0c31a41cacdfde7d5301ef

    SHA512

    5b56074ededc61701e05af8ab3d64f9468ab61460dd8c2a0b8fc1b6d9697678160d070d9ef959c3922ab2355a9533041487c65fbdbad9675d7654ca72a744653

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un195402.exe
    Filesize

    547KB

    MD5

    b2bd8c5c22268b6fa576463d3d90e883

    SHA1

    90d0ffcaf38b8c289b525e3a3aa9f2c228165e0c

    SHA256

    aa28668d5dd5f67c157d9214018c3ba233e9cb440a0c31a41cacdfde7d5301ef

    SHA512

    5b56074ededc61701e05af8ab3d64f9468ab61460dd8c2a0b8fc1b6d9697678160d070d9ef959c3922ab2355a9533041487c65fbdbad9675d7654ca72a744653

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4595.exe
    Filesize

    291KB

    MD5

    4771a80bef515315e5f1c4b5d2d5d376

    SHA1

    228cece560d2095776193566b7774d9b2f4dfef2

    SHA256

    a902084d23371747024310b572204b20ae1746f265f124e5d7116062849f88ca

    SHA512

    6458b8d39c599d3a435420c7424f7b7bc80f98ca8db77e21e33bae8fbc26c59540a51c1fefdb90efec9710cee5bffdeeb0a8d02758afb6d26c23bd35ded7dd59

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4595.exe
    Filesize

    291KB

    MD5

    4771a80bef515315e5f1c4b5d2d5d376

    SHA1

    228cece560d2095776193566b7774d9b2f4dfef2

    SHA256

    a902084d23371747024310b572204b20ae1746f265f124e5d7116062849f88ca

    SHA512

    6458b8d39c599d3a435420c7424f7b7bc80f98ca8db77e21e33bae8fbc26c59540a51c1fefdb90efec9710cee5bffdeeb0a8d02758afb6d26c23bd35ded7dd59

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4961.exe
    Filesize

    345KB

    MD5

    a40552bae8712eb09f8576eb655fd139

    SHA1

    5cc628119b1caa81f0815f31270fc4fc24539985

    SHA256

    504fb283c27f0855968c606a9c96288802c6b0ea43b3d27f8100183708f3ec1f

    SHA512

    b1e1e1d15adecf6631454ac9c3d6214d9a695e05e753d8ec4516ff618fc6b4c1c87c17f349857d8ed66314088313fafca051827e8fe2d6f0d20245d8218bcdc5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4961.exe
    Filesize

    345KB

    MD5

    a40552bae8712eb09f8576eb655fd139

    SHA1

    5cc628119b1caa81f0815f31270fc4fc24539985

    SHA256

    504fb283c27f0855968c606a9c96288802c6b0ea43b3d27f8100183708f3ec1f

    SHA512

    b1e1e1d15adecf6631454ac9c3d6214d9a695e05e753d8ec4516ff618fc6b4c1c87c17f349857d8ed66314088313fafca051827e8fe2d6f0d20245d8218bcdc5

  • memory/3560-136-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/3560-137-0x0000000002330000-0x000000000234A000-memory.dmp
    Filesize

    104KB

  • memory/3560-138-0x0000000004F60000-0x0000000004F70000-memory.dmp
    Filesize

    64KB

  • memory/3560-139-0x0000000004F60000-0x0000000004F70000-memory.dmp
    Filesize

    64KB

  • memory/3560-140-0x0000000004F70000-0x000000000546E000-memory.dmp
    Filesize

    5.0MB

  • memory/3560-141-0x00000000025D0000-0x00000000025E8000-memory.dmp
    Filesize

    96KB

  • memory/3560-142-0x00000000025D0000-0x00000000025E2000-memory.dmp
    Filesize

    72KB

  • memory/3560-143-0x00000000025D0000-0x00000000025E2000-memory.dmp
    Filesize

    72KB

  • memory/3560-145-0x00000000025D0000-0x00000000025E2000-memory.dmp
    Filesize

    72KB

  • memory/3560-147-0x00000000025D0000-0x00000000025E2000-memory.dmp
    Filesize

    72KB

  • memory/3560-149-0x00000000025D0000-0x00000000025E2000-memory.dmp
    Filesize

    72KB

  • memory/3560-157-0x00000000025D0000-0x00000000025E2000-memory.dmp
    Filesize

    72KB

  • memory/3560-155-0x00000000025D0000-0x00000000025E2000-memory.dmp
    Filesize

    72KB

  • memory/3560-153-0x00000000025D0000-0x00000000025E2000-memory.dmp
    Filesize

    72KB

  • memory/3560-151-0x00000000025D0000-0x00000000025E2000-memory.dmp
    Filesize

    72KB

  • memory/3560-161-0x00000000025D0000-0x00000000025E2000-memory.dmp
    Filesize

    72KB

  • memory/3560-163-0x00000000025D0000-0x00000000025E2000-memory.dmp
    Filesize

    72KB

  • memory/3560-159-0x00000000025D0000-0x00000000025E2000-memory.dmp
    Filesize

    72KB

  • memory/3560-169-0x00000000025D0000-0x00000000025E2000-memory.dmp
    Filesize

    72KB

  • memory/3560-167-0x00000000025D0000-0x00000000025E2000-memory.dmp
    Filesize

    72KB

  • memory/3560-165-0x00000000025D0000-0x00000000025E2000-memory.dmp
    Filesize

    72KB

  • memory/3560-170-0x0000000000400000-0x000000000070B000-memory.dmp
    Filesize

    3.0MB

  • memory/3560-172-0x0000000000400000-0x000000000070B000-memory.dmp
    Filesize

    3.0MB

  • memory/4424-177-0x0000000005F00000-0x0000000005F46000-memory.dmp
    Filesize

    280KB

  • memory/4424-178-0x0000000005F90000-0x0000000005FD4000-memory.dmp
    Filesize

    272KB

  • memory/4424-179-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/4424-180-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/4424-182-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/4424-184-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/4424-186-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/4424-188-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/4424-190-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/4424-192-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/4424-194-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/4424-196-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/4424-198-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/4424-200-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/4424-202-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/4424-204-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/4424-206-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/4424-208-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/4424-210-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/4424-212-0x0000000005F90000-0x0000000005FCF000-memory.dmp
    Filesize

    252KB

  • memory/4424-389-0x0000000001B00000-0x0000000001B4B000-memory.dmp
    Filesize

    300KB

  • memory/4424-393-0x00000000060E0000-0x00000000060F0000-memory.dmp
    Filesize

    64KB

  • memory/4424-390-0x00000000060E0000-0x00000000060F0000-memory.dmp
    Filesize

    64KB

  • memory/4424-394-0x00000000060E0000-0x00000000060F0000-memory.dmp
    Filesize

    64KB

  • memory/4424-1089-0x0000000006C00000-0x0000000007206000-memory.dmp
    Filesize

    6.0MB

  • memory/4424-1090-0x00000000065F0000-0x00000000066FA000-memory.dmp
    Filesize

    1.0MB

  • memory/4424-1091-0x0000000006700000-0x0000000006712000-memory.dmp
    Filesize

    72KB

  • memory/4424-1092-0x0000000006720000-0x000000000675E000-memory.dmp
    Filesize

    248KB

  • memory/4424-1093-0x00000000060E0000-0x00000000060F0000-memory.dmp
    Filesize

    64KB

  • memory/4424-1094-0x0000000006870000-0x00000000068BB000-memory.dmp
    Filesize

    300KB

  • memory/4424-1096-0x0000000006A00000-0x0000000006A92000-memory.dmp
    Filesize

    584KB

  • memory/4424-1097-0x0000000006AA0000-0x0000000006B06000-memory.dmp
    Filesize

    408KB

  • memory/4424-1098-0x00000000060E0000-0x00000000060F0000-memory.dmp
    Filesize

    64KB

  • memory/4424-1099-0x00000000060E0000-0x00000000060F0000-memory.dmp
    Filesize

    64KB

  • memory/4424-1100-0x00000000060E0000-0x00000000060F0000-memory.dmp
    Filesize

    64KB

  • memory/4424-1101-0x0000000007790000-0x0000000007806000-memory.dmp
    Filesize

    472KB

  • memory/4424-1102-0x0000000007810000-0x0000000007860000-memory.dmp
    Filesize

    320KB

  • memory/4424-1103-0x00000000060E0000-0x00000000060F0000-memory.dmp
    Filesize

    64KB

  • memory/4424-1104-0x0000000007A70000-0x0000000007C32000-memory.dmp
    Filesize

    1.8MB

  • memory/4424-1105-0x0000000007C40000-0x000000000816C000-memory.dmp
    Filesize

    5.2MB

  • memory/4820-1111-0x0000000000F80000-0x0000000000FB2000-memory.dmp
    Filesize

    200KB

  • memory/4820-1112-0x00000000059C0000-0x0000000005A0B000-memory.dmp
    Filesize

    300KB

  • memory/4820-1113-0x0000000005B30000-0x0000000005B40000-memory.dmp
    Filesize

    64KB