Analysis

  • max time kernel
    55s
  • max time network
    58s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 04:08

General

  • Target

    b4a5ed0894b18515a82c88d215808045305b613d7748990f93f32f661e642158.exe

  • Size

    688KB

  • MD5

    71b1db5f68ed760b11fdafc4333c2ac0

  • SHA1

    32d3ac6d44c3fb38048f2bcebd10c09afb102c7e

  • SHA256

    b4a5ed0894b18515a82c88d215808045305b613d7748990f93f32f661e642158

  • SHA512

    d0ed022ca21bcec96c6d5d1a070182a93c078dedc430a8b7203465045700b22dbbe163f1b40ea991d7df0cfae8a80c05c4ac653603b8f160d66afebbd016f11c

  • SSDEEP

    12288:0Mr3y90TypNv9JZq25ya65hLuCgwWB3BH+FfzEmJQvVFZcfigOxNUNne:jyyC9JdwpfaCgwoB27EmJQnZcagrE

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4a5ed0894b18515a82c88d215808045305b613d7748990f93f32f661e642158.exe
    "C:\Users\Admin\AppData\Local\Temp\b4a5ed0894b18515a82c88d215808045305b613d7748990f93f32f661e642158.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4156
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un545423.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un545423.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4140
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9809.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9809.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3560
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4499.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4499.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3912
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si949654.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si949654.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1140

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si949654.exe
    Filesize

    175KB

    MD5

    1243910c9b0864185de3f6af8a1cb620

    SHA1

    5cfa522116387618ddef2d947c680557d1124a57

    SHA256

    23d95f5140e5c63730dc744b6b6f74e741fc3696a6aabb2a733eb585a2ad93f0

    SHA512

    d863b825c14587ebebab2a0006f537932e3d747b4e997333863cc3db1d50a35ab3fa6826e9a95f933631770ca8c8120e4f6299ea287bc300f836fa6c7cee2ff0

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si949654.exe
    Filesize

    175KB

    MD5

    1243910c9b0864185de3f6af8a1cb620

    SHA1

    5cfa522116387618ddef2d947c680557d1124a57

    SHA256

    23d95f5140e5c63730dc744b6b6f74e741fc3696a6aabb2a733eb585a2ad93f0

    SHA512

    d863b825c14587ebebab2a0006f537932e3d747b4e997333863cc3db1d50a35ab3fa6826e9a95f933631770ca8c8120e4f6299ea287bc300f836fa6c7cee2ff0

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un545423.exe
    Filesize

    547KB

    MD5

    4e86cc0da05dba9f0df85ed8bbdbc65d

    SHA1

    6b0d5224da90797fd1b18181773d37d552490249

    SHA256

    a8c935c369a4c2aa61d21ab6ed9f9abf329ab56aab44d84f6876a2eb9bf35c47

    SHA512

    bbe240af369f48c3782cf53a91d6fcc6cfa0e936b1556f8b83f4ddeb90ab726077ba850395fb5dde88f1f752717e0010e039745d0658b09327c2b4ae7aa26922

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un545423.exe
    Filesize

    547KB

    MD5

    4e86cc0da05dba9f0df85ed8bbdbc65d

    SHA1

    6b0d5224da90797fd1b18181773d37d552490249

    SHA256

    a8c935c369a4c2aa61d21ab6ed9f9abf329ab56aab44d84f6876a2eb9bf35c47

    SHA512

    bbe240af369f48c3782cf53a91d6fcc6cfa0e936b1556f8b83f4ddeb90ab726077ba850395fb5dde88f1f752717e0010e039745d0658b09327c2b4ae7aa26922

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9809.exe
    Filesize

    291KB

    MD5

    21cd21f1e7bbd6bddc8e0341c6cae742

    SHA1

    a39717a728d2b8f244c7ae5087e144db2c242873

    SHA256

    d2bbc95d3fa38a969dbb3bfb6776820398fd3e25a3c51f74aa87f6b2470e901a

    SHA512

    07c8766d861f32d959001937dd77808104115a464a2fc393e58f6e4b7b77be33fc7d298bcd3dee17d102c2eaca39149cb013209b06d2d3e6613eaa802bd1c6bb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9809.exe
    Filesize

    291KB

    MD5

    21cd21f1e7bbd6bddc8e0341c6cae742

    SHA1

    a39717a728d2b8f244c7ae5087e144db2c242873

    SHA256

    d2bbc95d3fa38a969dbb3bfb6776820398fd3e25a3c51f74aa87f6b2470e901a

    SHA512

    07c8766d861f32d959001937dd77808104115a464a2fc393e58f6e4b7b77be33fc7d298bcd3dee17d102c2eaca39149cb013209b06d2d3e6613eaa802bd1c6bb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4499.exe
    Filesize

    345KB

    MD5

    3e4d18156790886461b92c865d885211

    SHA1

    088e202bb17ab1817f19406ecc5ab4d0e22fb8dd

    SHA256

    527db8a1186a7569d56c6ebebe9c1c4771e0648dc5c25f3b30ca867abf7ef4cb

    SHA512

    9ffc5491fbbd314fb17af17ab85c61afd566a4d04c37acb6baca069388c2a4c7fc3bf60065d35c0837e1680006cf718c4fe4dfbe7834f9651894bc00763447ca

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4499.exe
    Filesize

    345KB

    MD5

    3e4d18156790886461b92c865d885211

    SHA1

    088e202bb17ab1817f19406ecc5ab4d0e22fb8dd

    SHA256

    527db8a1186a7569d56c6ebebe9c1c4771e0648dc5c25f3b30ca867abf7ef4cb

    SHA512

    9ffc5491fbbd314fb17af17ab85c61afd566a4d04c37acb6baca069388c2a4c7fc3bf60065d35c0837e1680006cf718c4fe4dfbe7834f9651894bc00763447ca

  • memory/1140-1111-0x0000000000170000-0x00000000001A2000-memory.dmp
    Filesize

    200KB

  • memory/1140-1112-0x0000000004BB0000-0x0000000004BFB000-memory.dmp
    Filesize

    300KB

  • memory/1140-1113-0x0000000004A80000-0x0000000004A90000-memory.dmp
    Filesize

    64KB

  • memory/3560-145-0x0000000004C30000-0x0000000004C42000-memory.dmp
    Filesize

    72KB

  • memory/3560-157-0x0000000004C30000-0x0000000004C42000-memory.dmp
    Filesize

    72KB

  • memory/3560-141-0x0000000004C30000-0x0000000004C48000-memory.dmp
    Filesize

    96KB

  • memory/3560-142-0x0000000004C30000-0x0000000004C42000-memory.dmp
    Filesize

    72KB

  • memory/3560-143-0x0000000004C30000-0x0000000004C42000-memory.dmp
    Filesize

    72KB

  • memory/3560-139-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
    Filesize

    64KB

  • memory/3560-147-0x0000000004C30000-0x0000000004C42000-memory.dmp
    Filesize

    72KB

  • memory/3560-149-0x0000000004C30000-0x0000000004C42000-memory.dmp
    Filesize

    72KB

  • memory/3560-151-0x0000000004C30000-0x0000000004C42000-memory.dmp
    Filesize

    72KB

  • memory/3560-153-0x0000000004C30000-0x0000000004C42000-memory.dmp
    Filesize

    72KB

  • memory/3560-155-0x0000000004C30000-0x0000000004C42000-memory.dmp
    Filesize

    72KB

  • memory/3560-140-0x0000000004CB0000-0x00000000051AE000-memory.dmp
    Filesize

    5.0MB

  • memory/3560-159-0x0000000004C30000-0x0000000004C42000-memory.dmp
    Filesize

    72KB

  • memory/3560-161-0x0000000004C30000-0x0000000004C42000-memory.dmp
    Filesize

    72KB

  • memory/3560-163-0x0000000004C30000-0x0000000004C42000-memory.dmp
    Filesize

    72KB

  • memory/3560-165-0x0000000004C30000-0x0000000004C42000-memory.dmp
    Filesize

    72KB

  • memory/3560-167-0x0000000004C30000-0x0000000004C42000-memory.dmp
    Filesize

    72KB

  • memory/3560-169-0x0000000004C30000-0x0000000004C42000-memory.dmp
    Filesize

    72KB

  • memory/3560-170-0x0000000000400000-0x000000000070B000-memory.dmp
    Filesize

    3.0MB

  • memory/3560-172-0x0000000000400000-0x000000000070B000-memory.dmp
    Filesize

    3.0MB

  • memory/3560-138-0x0000000004CA0000-0x0000000004CB0000-memory.dmp
    Filesize

    64KB

  • memory/3560-137-0x0000000002490000-0x00000000024AA000-memory.dmp
    Filesize

    104KB

  • memory/3560-136-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/3912-184-0x0000000003950000-0x000000000398F000-memory.dmp
    Filesize

    252KB

  • memory/3912-214-0x0000000003950000-0x000000000398F000-memory.dmp
    Filesize

    252KB

  • memory/3912-180-0x0000000003950000-0x000000000398F000-memory.dmp
    Filesize

    252KB

  • memory/3912-186-0x0000000003950000-0x000000000398F000-memory.dmp
    Filesize

    252KB

  • memory/3912-188-0x0000000003950000-0x000000000398F000-memory.dmp
    Filesize

    252KB

  • memory/3912-190-0x0000000003950000-0x000000000398F000-memory.dmp
    Filesize

    252KB

  • memory/3912-192-0x0000000003950000-0x000000000398F000-memory.dmp
    Filesize

    252KB

  • memory/3912-194-0x0000000003950000-0x000000000398F000-memory.dmp
    Filesize

    252KB

  • memory/3912-196-0x0000000003950000-0x000000000398F000-memory.dmp
    Filesize

    252KB

  • memory/3912-198-0x0000000003950000-0x000000000398F000-memory.dmp
    Filesize

    252KB

  • memory/3912-200-0x0000000003950000-0x000000000398F000-memory.dmp
    Filesize

    252KB

  • memory/3912-202-0x0000000003950000-0x000000000398F000-memory.dmp
    Filesize

    252KB

  • memory/3912-204-0x0000000001A30000-0x0000000001A7B000-memory.dmp
    Filesize

    300KB

  • memory/3912-209-0x0000000003950000-0x000000000398F000-memory.dmp
    Filesize

    252KB

  • memory/3912-206-0x0000000001E60000-0x0000000001E70000-memory.dmp
    Filesize

    64KB

  • memory/3912-205-0x0000000003950000-0x000000000398F000-memory.dmp
    Filesize

    252KB

  • memory/3912-208-0x0000000001E60000-0x0000000001E70000-memory.dmp
    Filesize

    64KB

  • memory/3912-210-0x0000000001E60000-0x0000000001E70000-memory.dmp
    Filesize

    64KB

  • memory/3912-212-0x0000000003950000-0x000000000398F000-memory.dmp
    Filesize

    252KB

  • memory/3912-182-0x0000000003950000-0x000000000398F000-memory.dmp
    Filesize

    252KB

  • memory/3912-216-0x0000000003950000-0x000000000398F000-memory.dmp
    Filesize

    252KB

  • memory/3912-1089-0x0000000006BB0000-0x00000000071B6000-memory.dmp
    Filesize

    6.0MB

  • memory/3912-1090-0x00000000065C0000-0x00000000066CA000-memory.dmp
    Filesize

    1.0MB

  • memory/3912-1091-0x0000000006700000-0x0000000006712000-memory.dmp
    Filesize

    72KB

  • memory/3912-1092-0x0000000006720000-0x000000000675E000-memory.dmp
    Filesize

    248KB

  • memory/3912-1093-0x0000000006870000-0x00000000068BB000-memory.dmp
    Filesize

    300KB

  • memory/3912-1094-0x0000000001E60000-0x0000000001E70000-memory.dmp
    Filesize

    64KB

  • memory/3912-1096-0x0000000001E60000-0x0000000001E70000-memory.dmp
    Filesize

    64KB

  • memory/3912-1097-0x0000000001E60000-0x0000000001E70000-memory.dmp
    Filesize

    64KB

  • memory/3912-1098-0x0000000001E60000-0x0000000001E70000-memory.dmp
    Filesize

    64KB

  • memory/3912-1099-0x0000000006A00000-0x0000000006A92000-memory.dmp
    Filesize

    584KB

  • memory/3912-1100-0x0000000006AA0000-0x0000000006B06000-memory.dmp
    Filesize

    408KB

  • memory/3912-1101-0x0000000007980000-0x0000000007B42000-memory.dmp
    Filesize

    1.8MB

  • memory/3912-1102-0x0000000007B50000-0x000000000807C000-memory.dmp
    Filesize

    5.2MB

  • memory/3912-1103-0x0000000001E60000-0x0000000001E70000-memory.dmp
    Filesize

    64KB

  • memory/3912-179-0x0000000003950000-0x000000000398F000-memory.dmp
    Filesize

    252KB

  • memory/3912-178-0x0000000003950000-0x0000000003994000-memory.dmp
    Filesize

    272KB

  • memory/3912-177-0x0000000003770000-0x00000000037B6000-memory.dmp
    Filesize

    280KB

  • memory/3912-1104-0x0000000008280000-0x00000000082F6000-memory.dmp
    Filesize

    472KB

  • memory/3912-1105-0x0000000007930000-0x0000000007980000-memory.dmp
    Filesize

    320KB