Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 04:19

General

  • Target

    b1d0fd9add2ab6dc3ca0129d415d21f2920efbb7be8d80867c7e38cd386653fe.exe

  • Size

    689KB

  • MD5

    07ed681afdd63b403a239a9b39415c42

  • SHA1

    7c650691c8fc3ebd7b00ba49b98133a65b7f069a

  • SHA256

    b1d0fd9add2ab6dc3ca0129d415d21f2920efbb7be8d80867c7e38cd386653fe

  • SHA512

    52c7b12e8d5dd3bc8a3a261055d0cc9ccfc9a946403a19831fc2e68411a05f39c72510fc44c1cb6515c6deb3425efbddad5c36fe13b78e88f8d3d694d278cf74

  • SSDEEP

    12288:TMrMy90+5kfIk22ok1vg+XkwI+yf65hLuGjDeMSKI3V2ZSL7kmJGvVF/ofig3g9Z:PyNkm2v1C7yfaG3eLZ3V2KkmJGH/oag8

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1d0fd9add2ab6dc3ca0129d415d21f2920efbb7be8d80867c7e38cd386653fe.exe
    "C:\Users\Admin\AppData\Local\Temp\b1d0fd9add2ab6dc3ca0129d415d21f2920efbb7be8d80867c7e38cd386653fe.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:420
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un020711.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un020711.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:712
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5160.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5160.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4544
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0651.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0651.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4744
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si557988.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si557988.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1544

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si557988.exe
    Filesize

    175KB

    MD5

    250c6cc146a12511d6722781fabfd4d5

    SHA1

    37408f4ef5901da14321e5622da7523d8cf2bc70

    SHA256

    4466f018f57d774d4439a46f1123c95c344a28b67556722ce296a963e49756e6

    SHA512

    5fd741e22de984f553f8cf8403f4a9df41893fbe5476698517d809b600738c30eb29fd5df2a425325a18e360529fbcfdc8622e9c2b2f73b3a92bf294c63b38f1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si557988.exe
    Filesize

    175KB

    MD5

    250c6cc146a12511d6722781fabfd4d5

    SHA1

    37408f4ef5901da14321e5622da7523d8cf2bc70

    SHA256

    4466f018f57d774d4439a46f1123c95c344a28b67556722ce296a963e49756e6

    SHA512

    5fd741e22de984f553f8cf8403f4a9df41893fbe5476698517d809b600738c30eb29fd5df2a425325a18e360529fbcfdc8622e9c2b2f73b3a92bf294c63b38f1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un020711.exe
    Filesize

    547KB

    MD5

    86c9bc4692fe8857cc0fe6dc383d6bfb

    SHA1

    b740558806975dd598095669369a48c5b01d9645

    SHA256

    ee006a3ec52ae2b79d4ceac9a1412b6ebb36e25467027036e950c5fbddca2ae9

    SHA512

    30d4b662f26c7823b82fabef9b46fb3763a36a3ced0beb4e320528de4c2eb93d92cb33769fc43820f0a250ca0f09b32bfb3cc194d3ebd236e00ba8b7b0c8d712

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un020711.exe
    Filesize

    547KB

    MD5

    86c9bc4692fe8857cc0fe6dc383d6bfb

    SHA1

    b740558806975dd598095669369a48c5b01d9645

    SHA256

    ee006a3ec52ae2b79d4ceac9a1412b6ebb36e25467027036e950c5fbddca2ae9

    SHA512

    30d4b662f26c7823b82fabef9b46fb3763a36a3ced0beb4e320528de4c2eb93d92cb33769fc43820f0a250ca0f09b32bfb3cc194d3ebd236e00ba8b7b0c8d712

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5160.exe
    Filesize

    291KB

    MD5

    fed4381093b5849e3bb649d2c86044ec

    SHA1

    c13ed560a57d173afc61d5140c7f569d82b24b38

    SHA256

    aa9570851342dd6f9dfc4babee9cf3b2807f39624cf74028727bd51239acecc4

    SHA512

    6598aa08b458e1b45ac4e732ff4d898161e8e8df6713f087f44c7dd7d36767566b0b42d98624a3ba92f4b39ad109ced4cef637e1a781534b03cfd00052de99d8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5160.exe
    Filesize

    291KB

    MD5

    fed4381093b5849e3bb649d2c86044ec

    SHA1

    c13ed560a57d173afc61d5140c7f569d82b24b38

    SHA256

    aa9570851342dd6f9dfc4babee9cf3b2807f39624cf74028727bd51239acecc4

    SHA512

    6598aa08b458e1b45ac4e732ff4d898161e8e8df6713f087f44c7dd7d36767566b0b42d98624a3ba92f4b39ad109ced4cef637e1a781534b03cfd00052de99d8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0651.exe
    Filesize

    345KB

    MD5

    9b4d8a0bed812441f6093431f711637e

    SHA1

    baf49c07a613149a699005cebd9606eaef9e795f

    SHA256

    a5b2b367cf0892e42b1e29f76667fdd77585d8d6530a048dfa666ea0380f9682

    SHA512

    82468fe9f8d9600f7b2b5fe9834f61da47b63bcb392678682678c43130f5fca1b00a7cf1129e940597a5788202c77b72664792b92144885d8c3dd345f58c6f2a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0651.exe
    Filesize

    345KB

    MD5

    9b4d8a0bed812441f6093431f711637e

    SHA1

    baf49c07a613149a699005cebd9606eaef9e795f

    SHA256

    a5b2b367cf0892e42b1e29f76667fdd77585d8d6530a048dfa666ea0380f9682

    SHA512

    82468fe9f8d9600f7b2b5fe9834f61da47b63bcb392678682678c43130f5fca1b00a7cf1129e940597a5788202c77b72664792b92144885d8c3dd345f58c6f2a

  • memory/1544-1109-0x0000000000260000-0x0000000000292000-memory.dmp
    Filesize

    200KB

  • memory/1544-1110-0x0000000004B20000-0x0000000004B6B000-memory.dmp
    Filesize

    300KB

  • memory/1544-1111-0x0000000004B10000-0x0000000004B20000-memory.dmp
    Filesize

    64KB

  • memory/4544-144-0x0000000004C40000-0x0000000004C52000-memory.dmp
    Filesize

    72KB

  • memory/4544-154-0x0000000004C40000-0x0000000004C52000-memory.dmp
    Filesize

    72KB

  • memory/4544-136-0x0000000004C40000-0x0000000004C52000-memory.dmp
    Filesize

    72KB

  • memory/4544-138-0x0000000004C40000-0x0000000004C52000-memory.dmp
    Filesize

    72KB

  • memory/4544-140-0x0000000004C40000-0x0000000004C52000-memory.dmp
    Filesize

    72KB

  • memory/4544-142-0x0000000004C40000-0x0000000004C52000-memory.dmp
    Filesize

    72KB

  • memory/4544-145-0x0000000000710000-0x000000000073D000-memory.dmp
    Filesize

    180KB

  • memory/4544-134-0x0000000004C40000-0x0000000004C58000-memory.dmp
    Filesize

    96KB

  • memory/4544-147-0x0000000004D30000-0x0000000004D40000-memory.dmp
    Filesize

    64KB

  • memory/4544-149-0x0000000004D30000-0x0000000004D40000-memory.dmp
    Filesize

    64KB

  • memory/4544-148-0x0000000004C40000-0x0000000004C52000-memory.dmp
    Filesize

    72KB

  • memory/4544-152-0x0000000004C40000-0x0000000004C52000-memory.dmp
    Filesize

    72KB

  • memory/4544-151-0x0000000004D30000-0x0000000004D40000-memory.dmp
    Filesize

    64KB

  • memory/4544-135-0x0000000004C40000-0x0000000004C52000-memory.dmp
    Filesize

    72KB

  • memory/4544-156-0x0000000004C40000-0x0000000004C52000-memory.dmp
    Filesize

    72KB

  • memory/4544-158-0x0000000004C40000-0x0000000004C52000-memory.dmp
    Filesize

    72KB

  • memory/4544-160-0x0000000004C40000-0x0000000004C52000-memory.dmp
    Filesize

    72KB

  • memory/4544-162-0x0000000004C40000-0x0000000004C52000-memory.dmp
    Filesize

    72KB

  • memory/4544-164-0x0000000004C40000-0x0000000004C52000-memory.dmp
    Filesize

    72KB

  • memory/4544-166-0x0000000004C40000-0x0000000004C52000-memory.dmp
    Filesize

    72KB

  • memory/4544-167-0x0000000000400000-0x000000000070B000-memory.dmp
    Filesize

    3.0MB

  • memory/4544-168-0x0000000004D30000-0x0000000004D40000-memory.dmp
    Filesize

    64KB

  • memory/4544-169-0x0000000004D30000-0x0000000004D40000-memory.dmp
    Filesize

    64KB

  • memory/4544-170-0x0000000004D30000-0x0000000004D40000-memory.dmp
    Filesize

    64KB

  • memory/4544-172-0x0000000000400000-0x000000000070B000-memory.dmp
    Filesize

    3.0MB

  • memory/4544-133-0x0000000004D40000-0x000000000523E000-memory.dmp
    Filesize

    5.0MB

  • memory/4544-132-0x0000000002320000-0x000000000233A000-memory.dmp
    Filesize

    104KB

  • memory/4744-180-0x0000000006520000-0x000000000655F000-memory.dmp
    Filesize

    252KB

  • memory/4744-179-0x0000000006520000-0x000000000655F000-memory.dmp
    Filesize

    252KB

  • memory/4744-182-0x0000000006520000-0x000000000655F000-memory.dmp
    Filesize

    252KB

  • memory/4744-184-0x0000000006520000-0x000000000655F000-memory.dmp
    Filesize

    252KB

  • memory/4744-186-0x0000000006520000-0x000000000655F000-memory.dmp
    Filesize

    252KB

  • memory/4744-188-0x0000000006520000-0x000000000655F000-memory.dmp
    Filesize

    252KB

  • memory/4744-190-0x0000000006520000-0x000000000655F000-memory.dmp
    Filesize

    252KB

  • memory/4744-192-0x0000000006520000-0x000000000655F000-memory.dmp
    Filesize

    252KB

  • memory/4744-194-0x0000000006520000-0x000000000655F000-memory.dmp
    Filesize

    252KB

  • memory/4744-196-0x0000000006520000-0x000000000655F000-memory.dmp
    Filesize

    252KB

  • memory/4744-198-0x0000000006520000-0x000000000655F000-memory.dmp
    Filesize

    252KB

  • memory/4744-200-0x0000000006520000-0x000000000655F000-memory.dmp
    Filesize

    252KB

  • memory/4744-202-0x0000000006520000-0x000000000655F000-memory.dmp
    Filesize

    252KB

  • memory/4744-204-0x0000000006520000-0x000000000655F000-memory.dmp
    Filesize

    252KB

  • memory/4744-206-0x0000000006520000-0x000000000655F000-memory.dmp
    Filesize

    252KB

  • memory/4744-208-0x0000000006520000-0x000000000655F000-memory.dmp
    Filesize

    252KB

  • memory/4744-210-0x0000000006520000-0x000000000655F000-memory.dmp
    Filesize

    252KB

  • memory/4744-212-0x0000000006520000-0x000000000655F000-memory.dmp
    Filesize

    252KB

  • memory/4744-216-0x0000000003420000-0x000000000346B000-memory.dmp
    Filesize

    300KB

  • memory/4744-220-0x0000000005FD0000-0x0000000005FE0000-memory.dmp
    Filesize

    64KB

  • memory/4744-218-0x0000000005FD0000-0x0000000005FE0000-memory.dmp
    Filesize

    64KB

  • memory/4744-222-0x0000000005FD0000-0x0000000005FE0000-memory.dmp
    Filesize

    64KB

  • memory/4744-1089-0x0000000006560000-0x0000000006B66000-memory.dmp
    Filesize

    6.0MB

  • memory/4744-1090-0x0000000006BD0000-0x0000000006CDA000-memory.dmp
    Filesize

    1.0MB

  • memory/4744-1091-0x0000000006D10000-0x0000000006D22000-memory.dmp
    Filesize

    72KB

  • memory/4744-1092-0x0000000005FD0000-0x0000000005FE0000-memory.dmp
    Filesize

    64KB

  • memory/4744-1093-0x0000000006D30000-0x0000000006D6E000-memory.dmp
    Filesize

    248KB

  • memory/4744-1094-0x0000000006E80000-0x0000000006ECB000-memory.dmp
    Filesize

    300KB

  • memory/4744-1095-0x0000000007010000-0x0000000007076000-memory.dmp
    Filesize

    408KB

  • memory/4744-1096-0x00000000076E0000-0x0000000007772000-memory.dmp
    Filesize

    584KB

  • memory/4744-1098-0x00000000077B0000-0x0000000007972000-memory.dmp
    Filesize

    1.8MB

  • memory/4744-1099-0x0000000007980000-0x0000000007EAC000-memory.dmp
    Filesize

    5.2MB

  • memory/4744-1100-0x0000000005FD0000-0x0000000005FE0000-memory.dmp
    Filesize

    64KB

  • memory/4744-178-0x0000000006520000-0x0000000006564000-memory.dmp
    Filesize

    272KB

  • memory/4744-177-0x0000000003AA0000-0x0000000003AE6000-memory.dmp
    Filesize

    280KB

  • memory/4744-1101-0x0000000008230000-0x00000000082A6000-memory.dmp
    Filesize

    472KB

  • memory/4744-1102-0x00000000082B0000-0x0000000008300000-memory.dmp
    Filesize

    320KB

  • memory/4744-1103-0x0000000005FD0000-0x0000000005FE0000-memory.dmp
    Filesize

    64KB