Analysis

  • max time kernel
    55s
  • max time network
    58s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 04:04

General

  • Target

    db14e4762f76deb03acdf0c9964d6d5f3bc014cdac45744c601a553af7407854.exe

  • Size

    690KB

  • MD5

    debb5c08af9a7d0debcac4a7c9e9f9ae

  • SHA1

    1ac93686603cb2955c849903b7523bffb62099dd

  • SHA256

    db14e4762f76deb03acdf0c9964d6d5f3bc014cdac45744c601a553af7407854

  • SHA512

    7ff9ff6ba984809d0f9cab98a64555aeb485cd6156aba7e9433bbfbc470b22b1cb1718ed456a1b24c20a3a0965c905202423fc10e546f17ce5fd86fa42fa0a55

  • SSDEEP

    12288:oMray90WylFne3zMW7X6VeyP65hLuj+hJjNvl5cXmevQF4Efig0zk2AFcj:yySeQE6dCfajGR95cWeI4EagkkI

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db14e4762f76deb03acdf0c9964d6d5f3bc014cdac45744c601a553af7407854.exe
    "C:\Users\Admin\AppData\Local\Temp\db14e4762f76deb03acdf0c9964d6d5f3bc014cdac45744c601a553af7407854.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1012
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un422743.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un422743.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5401.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5401.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1340
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6636.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6636.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2092
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si183017.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si183017.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3048

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si183017.exe
    Filesize

    175KB

    MD5

    31494ba44659677a725ff898039e484c

    SHA1

    08b2790e12ce9f0ff5f503870cb0fd9d4d472d4e

    SHA256

    3065cfd1b166f6baceeb42224b8767df119b3e5a61c5048bbee60c2f5e833850

    SHA512

    6afc568d61dae67bd576d7812463eba80559acc6224db0b323da2c0625d51a1be5a8e42345e13035a626574023348ebc9ac5d00f7b4d9adb4123bd8c5d036998

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si183017.exe
    Filesize

    175KB

    MD5

    31494ba44659677a725ff898039e484c

    SHA1

    08b2790e12ce9f0ff5f503870cb0fd9d4d472d4e

    SHA256

    3065cfd1b166f6baceeb42224b8767df119b3e5a61c5048bbee60c2f5e833850

    SHA512

    6afc568d61dae67bd576d7812463eba80559acc6224db0b323da2c0625d51a1be5a8e42345e13035a626574023348ebc9ac5d00f7b4d9adb4123bd8c5d036998

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un422743.exe
    Filesize

    548KB

    MD5

    e0a5bb5cd78e82417364100a63627726

    SHA1

    7e15ed46ca49a310c1af18429819177cf9a1cada

    SHA256

    1aef4fc34cd40fea5547ad98ffb17dea2c29f4bd0c4036550b0d4d5d9bbf1545

    SHA512

    a96d4183f8c578945b0308f54c696a92753d54adeee1c7f450b924f54896b53ebe8473d9fe6a171eb26540d94e4fde8a013c1671fc31d81fa8dd5dc63cd0ff63

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un422743.exe
    Filesize

    548KB

    MD5

    e0a5bb5cd78e82417364100a63627726

    SHA1

    7e15ed46ca49a310c1af18429819177cf9a1cada

    SHA256

    1aef4fc34cd40fea5547ad98ffb17dea2c29f4bd0c4036550b0d4d5d9bbf1545

    SHA512

    a96d4183f8c578945b0308f54c696a92753d54adeee1c7f450b924f54896b53ebe8473d9fe6a171eb26540d94e4fde8a013c1671fc31d81fa8dd5dc63cd0ff63

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5401.exe
    Filesize

    291KB

    MD5

    e23e7a4272470b86552e35843de0ee4c

    SHA1

    956a9102c883fdb0d5442df193362794d0b31ae4

    SHA256

    2dfa9453ae096836a408771c7fd6c3242581e521fbbbbb685dd7bf02ced5fa86

    SHA512

    48f108328d1b72ca3f003d182cc71fa8ed791e3cb7fe05f3eab881925cc3bb7677c3c039021968ee20d8efb61d1705d51f945a89c8c1169740421ce5ff74f041

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5401.exe
    Filesize

    291KB

    MD5

    e23e7a4272470b86552e35843de0ee4c

    SHA1

    956a9102c883fdb0d5442df193362794d0b31ae4

    SHA256

    2dfa9453ae096836a408771c7fd6c3242581e521fbbbbb685dd7bf02ced5fa86

    SHA512

    48f108328d1b72ca3f003d182cc71fa8ed791e3cb7fe05f3eab881925cc3bb7677c3c039021968ee20d8efb61d1705d51f945a89c8c1169740421ce5ff74f041

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6636.exe
    Filesize

    345KB

    MD5

    dcc3d40315338b7694b686c154fa96b6

    SHA1

    1d2ba1c41e5f433e15372878e8bd90ff893a1847

    SHA256

    d4070ba47124228944b823827a39cd821b480fe06fd4a8860f8bd48320cde14a

    SHA512

    975637d12d8ade7131f5624858bb09e0616f375ea7a1a1eb9d80aa2b4f5c586da38ee21c45dcd2a72873b622bf8afa4607c2f038f428d9529cd6a133482c6027

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6636.exe
    Filesize

    345KB

    MD5

    dcc3d40315338b7694b686c154fa96b6

    SHA1

    1d2ba1c41e5f433e15372878e8bd90ff893a1847

    SHA256

    d4070ba47124228944b823827a39cd821b480fe06fd4a8860f8bd48320cde14a

    SHA512

    975637d12d8ade7131f5624858bb09e0616f375ea7a1a1eb9d80aa2b4f5c586da38ee21c45dcd2a72873b622bf8afa4607c2f038f428d9529cd6a133482c6027

  • memory/1340-136-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/1340-137-0x0000000000C30000-0x0000000000C4A000-memory.dmp
    Filesize

    104KB

  • memory/1340-139-0x0000000004EC0000-0x00000000053BE000-memory.dmp
    Filesize

    5.0MB

  • memory/1340-138-0x0000000004EB0000-0x0000000004EC0000-memory.dmp
    Filesize

    64KB

  • memory/1340-140-0x0000000004EB0000-0x0000000004EC0000-memory.dmp
    Filesize

    64KB

  • memory/1340-141-0x0000000004EB0000-0x0000000004EC0000-memory.dmp
    Filesize

    64KB

  • memory/1340-142-0x0000000000D50000-0x0000000000D68000-memory.dmp
    Filesize

    96KB

  • memory/1340-143-0x0000000000D50000-0x0000000000D62000-memory.dmp
    Filesize

    72KB

  • memory/1340-144-0x0000000000D50000-0x0000000000D62000-memory.dmp
    Filesize

    72KB

  • memory/1340-146-0x0000000000D50000-0x0000000000D62000-memory.dmp
    Filesize

    72KB

  • memory/1340-148-0x0000000000D50000-0x0000000000D62000-memory.dmp
    Filesize

    72KB

  • memory/1340-150-0x0000000000D50000-0x0000000000D62000-memory.dmp
    Filesize

    72KB

  • memory/1340-152-0x0000000000D50000-0x0000000000D62000-memory.dmp
    Filesize

    72KB

  • memory/1340-154-0x0000000000D50000-0x0000000000D62000-memory.dmp
    Filesize

    72KB

  • memory/1340-156-0x0000000000D50000-0x0000000000D62000-memory.dmp
    Filesize

    72KB

  • memory/1340-158-0x0000000000D50000-0x0000000000D62000-memory.dmp
    Filesize

    72KB

  • memory/1340-160-0x0000000000D50000-0x0000000000D62000-memory.dmp
    Filesize

    72KB

  • memory/1340-162-0x0000000000D50000-0x0000000000D62000-memory.dmp
    Filesize

    72KB

  • memory/1340-164-0x0000000000D50000-0x0000000000D62000-memory.dmp
    Filesize

    72KB

  • memory/1340-166-0x0000000000D50000-0x0000000000D62000-memory.dmp
    Filesize

    72KB

  • memory/1340-168-0x0000000000D50000-0x0000000000D62000-memory.dmp
    Filesize

    72KB

  • memory/1340-170-0x0000000000D50000-0x0000000000D62000-memory.dmp
    Filesize

    72KB

  • memory/1340-171-0x0000000000400000-0x000000000070B000-memory.dmp
    Filesize

    3.0MB

  • memory/1340-172-0x0000000004EB0000-0x0000000004EC0000-memory.dmp
    Filesize

    64KB

  • memory/1340-174-0x0000000000400000-0x000000000070B000-memory.dmp
    Filesize

    3.0MB

  • memory/2092-179-0x00000000038A0000-0x00000000038E6000-memory.dmp
    Filesize

    280KB

  • memory/2092-180-0x0000000003970000-0x00000000039B4000-memory.dmp
    Filesize

    272KB

  • memory/2092-181-0x0000000001B50000-0x0000000001B9B000-memory.dmp
    Filesize

    300KB

  • memory/2092-182-0x0000000006120000-0x0000000006130000-memory.dmp
    Filesize

    64KB

  • memory/2092-183-0x0000000006120000-0x0000000006130000-memory.dmp
    Filesize

    64KB

  • memory/2092-184-0x0000000006120000-0x0000000006130000-memory.dmp
    Filesize

    64KB

  • memory/2092-185-0x0000000003970000-0x00000000039AF000-memory.dmp
    Filesize

    252KB

  • memory/2092-186-0x0000000003970000-0x00000000039AF000-memory.dmp
    Filesize

    252KB

  • memory/2092-188-0x0000000003970000-0x00000000039AF000-memory.dmp
    Filesize

    252KB

  • memory/2092-190-0x0000000003970000-0x00000000039AF000-memory.dmp
    Filesize

    252KB

  • memory/2092-192-0x0000000003970000-0x00000000039AF000-memory.dmp
    Filesize

    252KB

  • memory/2092-194-0x0000000003970000-0x00000000039AF000-memory.dmp
    Filesize

    252KB

  • memory/2092-196-0x0000000003970000-0x00000000039AF000-memory.dmp
    Filesize

    252KB

  • memory/2092-198-0x0000000003970000-0x00000000039AF000-memory.dmp
    Filesize

    252KB

  • memory/2092-200-0x0000000003970000-0x00000000039AF000-memory.dmp
    Filesize

    252KB

  • memory/2092-202-0x0000000003970000-0x00000000039AF000-memory.dmp
    Filesize

    252KB

  • memory/2092-204-0x0000000003970000-0x00000000039AF000-memory.dmp
    Filesize

    252KB

  • memory/2092-206-0x0000000003970000-0x00000000039AF000-memory.dmp
    Filesize

    252KB

  • memory/2092-208-0x0000000003970000-0x00000000039AF000-memory.dmp
    Filesize

    252KB

  • memory/2092-210-0x0000000003970000-0x00000000039AF000-memory.dmp
    Filesize

    252KB

  • memory/2092-212-0x0000000003970000-0x00000000039AF000-memory.dmp
    Filesize

    252KB

  • memory/2092-214-0x0000000003970000-0x00000000039AF000-memory.dmp
    Filesize

    252KB

  • memory/2092-216-0x0000000003970000-0x00000000039AF000-memory.dmp
    Filesize

    252KB

  • memory/2092-218-0x0000000003970000-0x00000000039AF000-memory.dmp
    Filesize

    252KB

  • memory/2092-1091-0x0000000006630000-0x0000000006C36000-memory.dmp
    Filesize

    6.0MB

  • memory/2092-1092-0x0000000006C40000-0x0000000006D4A000-memory.dmp
    Filesize

    1.0MB

  • memory/2092-1093-0x0000000006120000-0x0000000006130000-memory.dmp
    Filesize

    64KB

  • memory/2092-1094-0x00000000060E0000-0x00000000060F2000-memory.dmp
    Filesize

    72KB

  • memory/2092-1095-0x0000000006D50000-0x0000000006D8E000-memory.dmp
    Filesize

    248KB

  • memory/2092-1096-0x0000000006E90000-0x0000000006EDB000-memory.dmp
    Filesize

    300KB

  • memory/2092-1098-0x0000000006120000-0x0000000006130000-memory.dmp
    Filesize

    64KB

  • memory/2092-1099-0x0000000006120000-0x0000000006130000-memory.dmp
    Filesize

    64KB

  • memory/2092-1100-0x0000000006120000-0x0000000006130000-memory.dmp
    Filesize

    64KB

  • memory/2092-1101-0x0000000007010000-0x00000000070A2000-memory.dmp
    Filesize

    584KB

  • memory/2092-1102-0x00000000070B0000-0x0000000007116000-memory.dmp
    Filesize

    408KB

  • memory/2092-1103-0x0000000006120000-0x0000000006130000-memory.dmp
    Filesize

    64KB

  • memory/2092-1104-0x00000000079F0000-0x0000000007BB2000-memory.dmp
    Filesize

    1.8MB

  • memory/2092-1105-0x0000000007BE0000-0x000000000810C000-memory.dmp
    Filesize

    5.2MB

  • memory/2092-1106-0x0000000009500000-0x0000000009576000-memory.dmp
    Filesize

    472KB

  • memory/2092-1107-0x0000000009590000-0x00000000095E0000-memory.dmp
    Filesize

    320KB

  • memory/3048-1114-0x00000000004C0000-0x00000000004F2000-memory.dmp
    Filesize

    200KB

  • memory/3048-1115-0x0000000004D40000-0x0000000004D8B000-memory.dmp
    Filesize

    300KB

  • memory/3048-1116-0x0000000004DA0000-0x0000000004DB0000-memory.dmp
    Filesize

    64KB

  • memory/3048-1117-0x0000000004DA0000-0x0000000004DB0000-memory.dmp
    Filesize

    64KB