Analysis

  • max time kernel
    56s
  • max time network
    58s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 04:48

General

  • Target

    07a44e730b6ce74444f627a556a6c9f2355a3abf0cd9e4bbc4ac563a44091b5d.exe

  • Size

    689KB

  • MD5

    ab59048fb4173d37fd805389f3b781fd

  • SHA1

    e95c0cac6d47b4882c4d1c5c7a4f0b75d2902d7f

  • SHA256

    07a44e730b6ce74444f627a556a6c9f2355a3abf0cd9e4bbc4ac563a44091b5d

  • SHA512

    124ba90f165d97267a154766892cb2be36605910ac3e0d736877df6b3bd29154af97dc1684a18b8bfd5705206b43f41c65b41eb95ad90194ca313d05ec60bd5a

  • SSDEEP

    12288:DMroy909QF4EoaGiv29tyV65hLuvK3muSvtRpmcmJWvvFuifigflfRQdNjDqyO:XyPHoajvKkIfavK2uqtRpNmJWVuiagff

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07a44e730b6ce74444f627a556a6c9f2355a3abf0cd9e4bbc4ac563a44091b5d.exe
    "C:\Users\Admin\AppData\Local\Temp\07a44e730b6ce74444f627a556a6c9f2355a3abf0cd9e4bbc4ac563a44091b5d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4156
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un434573.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un434573.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3564
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1574.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1574.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4296
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1738.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1738.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4548
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si211544.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si211544.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3628

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si211544.exe

    Filesize

    175KB

    MD5

    23aa197abe3148af46e59fc49f607074

    SHA1

    00e5337f820fc4b4d76a74321309127775c5bcf4

    SHA256

    780e8e8376860d8d7bb0f6976c5b7344617115e4a8473a6635d97cb9728dd6b7

    SHA512

    280be284beadcfba12196afa1b2e02e1f2b173b2a3f6bd2dfead1f350773fa84e4f354eb3c030abd298f32be08ef00e52b0049e840f6e3ab2e34014fe6fdabf8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si211544.exe

    Filesize

    175KB

    MD5

    23aa197abe3148af46e59fc49f607074

    SHA1

    00e5337f820fc4b4d76a74321309127775c5bcf4

    SHA256

    780e8e8376860d8d7bb0f6976c5b7344617115e4a8473a6635d97cb9728dd6b7

    SHA512

    280be284beadcfba12196afa1b2e02e1f2b173b2a3f6bd2dfead1f350773fa84e4f354eb3c030abd298f32be08ef00e52b0049e840f6e3ab2e34014fe6fdabf8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un434573.exe

    Filesize

    547KB

    MD5

    23b50a383c2a974244074c1175079e74

    SHA1

    a3e52600fe0706a20696ece04748be68f2f323af

    SHA256

    90b46f0d64cd09895fd4899f9ac5db430f27d7db02aec0e43027a2fef477f383

    SHA512

    4a6445cca9823dff32f22012ec5d847a9fb6bf150e9e3f066ee346b689f6fd4eeef81f587d96af4702543c80e5c90e129f72d24b8d4e36ab9b470746bd80ee01

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un434573.exe

    Filesize

    547KB

    MD5

    23b50a383c2a974244074c1175079e74

    SHA1

    a3e52600fe0706a20696ece04748be68f2f323af

    SHA256

    90b46f0d64cd09895fd4899f9ac5db430f27d7db02aec0e43027a2fef477f383

    SHA512

    4a6445cca9823dff32f22012ec5d847a9fb6bf150e9e3f066ee346b689f6fd4eeef81f587d96af4702543c80e5c90e129f72d24b8d4e36ab9b470746bd80ee01

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1574.exe

    Filesize

    291KB

    MD5

    cb8d6b0125adaacbe9cdddb46866fe2e

    SHA1

    3204e403ff5f098b58e58cbef5a4f73557ee775e

    SHA256

    2fb8f124e644e65b2047159a9eb754db9269c065251cea714ebc7b10cd1cb601

    SHA512

    c24386531e1eb3c40d8f7ee5095202ebc3d7a98cd3603e85e2f45aea486907b4c6b694c134f39e442a2773a5311f7dfa54157089d8e3b8a554887d0150c9e0f3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1574.exe

    Filesize

    291KB

    MD5

    cb8d6b0125adaacbe9cdddb46866fe2e

    SHA1

    3204e403ff5f098b58e58cbef5a4f73557ee775e

    SHA256

    2fb8f124e644e65b2047159a9eb754db9269c065251cea714ebc7b10cd1cb601

    SHA512

    c24386531e1eb3c40d8f7ee5095202ebc3d7a98cd3603e85e2f45aea486907b4c6b694c134f39e442a2773a5311f7dfa54157089d8e3b8a554887d0150c9e0f3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1738.exe

    Filesize

    345KB

    MD5

    618e6c05ccd66199be45891f71acfc9b

    SHA1

    0d70c36bf97b021c3a74c7b8ce4b3e540e7c641b

    SHA256

    fa85b604a24839fe72cb0e0ae02715b99c54932e2f24949c044f21af60bf848d

    SHA512

    c56cd6f99226fd362979a146e7ef34a1c6d96f6ee5c26e81c356d4534a9e5cc2bb968d90fc9f89beb0f84069d78ee6c44db03131c137df9d90556cbf3cfab452

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1738.exe

    Filesize

    345KB

    MD5

    618e6c05ccd66199be45891f71acfc9b

    SHA1

    0d70c36bf97b021c3a74c7b8ce4b3e540e7c641b

    SHA256

    fa85b604a24839fe72cb0e0ae02715b99c54932e2f24949c044f21af60bf848d

    SHA512

    c56cd6f99226fd362979a146e7ef34a1c6d96f6ee5c26e81c356d4534a9e5cc2bb968d90fc9f89beb0f84069d78ee6c44db03131c137df9d90556cbf3cfab452

  • memory/3628-1112-0x0000000000D10000-0x0000000000D42000-memory.dmp

    Filesize

    200KB

  • memory/3628-1113-0x0000000005630000-0x000000000567B000-memory.dmp

    Filesize

    300KB

  • memory/3628-1114-0x00000000059B0000-0x00000000059C0000-memory.dmp

    Filesize

    64KB

  • memory/4296-143-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/4296-158-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/4296-140-0x0000000004E30000-0x0000000004E40000-memory.dmp

    Filesize

    64KB

  • memory/4296-141-0x0000000004E40000-0x000000000533E000-memory.dmp

    Filesize

    5.0MB

  • memory/4296-142-0x0000000002520000-0x0000000002538000-memory.dmp

    Filesize

    96KB

  • memory/4296-138-0x0000000004E30000-0x0000000004E40000-memory.dmp

    Filesize

    64KB

  • memory/4296-144-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/4296-146-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/4296-148-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/4296-150-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/4296-152-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/4296-139-0x0000000004E30000-0x0000000004E40000-memory.dmp

    Filesize

    64KB

  • memory/4296-156-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/4296-154-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/4296-160-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/4296-162-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/4296-164-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/4296-166-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/4296-168-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/4296-170-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/4296-171-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/4296-173-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/4296-137-0x0000000000A50000-0x0000000000A6A000-memory.dmp

    Filesize

    104KB

  • memory/4296-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4548-181-0x0000000003970000-0x00000000039AF000-memory.dmp

    Filesize

    252KB

  • memory/4548-377-0x0000000006170000-0x0000000006180000-memory.dmp

    Filesize

    64KB

  • memory/4548-183-0x0000000003970000-0x00000000039AF000-memory.dmp

    Filesize

    252KB

  • memory/4548-185-0x0000000003970000-0x00000000039AF000-memory.dmp

    Filesize

    252KB

  • memory/4548-187-0x0000000003970000-0x00000000039AF000-memory.dmp

    Filesize

    252KB

  • memory/4548-189-0x0000000003970000-0x00000000039AF000-memory.dmp

    Filesize

    252KB

  • memory/4548-191-0x0000000003970000-0x00000000039AF000-memory.dmp

    Filesize

    252KB

  • memory/4548-193-0x0000000003970000-0x00000000039AF000-memory.dmp

    Filesize

    252KB

  • memory/4548-195-0x0000000003970000-0x00000000039AF000-memory.dmp

    Filesize

    252KB

  • memory/4548-197-0x0000000003970000-0x00000000039AF000-memory.dmp

    Filesize

    252KB

  • memory/4548-199-0x0000000003970000-0x00000000039AF000-memory.dmp

    Filesize

    252KB

  • memory/4548-201-0x0000000003970000-0x00000000039AF000-memory.dmp

    Filesize

    252KB

  • memory/4548-203-0x0000000003970000-0x00000000039AF000-memory.dmp

    Filesize

    252KB

  • memory/4548-205-0x0000000003970000-0x00000000039AF000-memory.dmp

    Filesize

    252KB

  • memory/4548-207-0x0000000003970000-0x00000000039AF000-memory.dmp

    Filesize

    252KB

  • memory/4548-209-0x0000000003970000-0x00000000039AF000-memory.dmp

    Filesize

    252KB

  • memory/4548-211-0x0000000003970000-0x00000000039AF000-memory.dmp

    Filesize

    252KB

  • memory/4548-213-0x0000000003970000-0x00000000039AF000-memory.dmp

    Filesize

    252KB

  • memory/4548-373-0x0000000001B50000-0x0000000001B9B000-memory.dmp

    Filesize

    300KB

  • memory/4548-180-0x0000000003970000-0x00000000039AF000-memory.dmp

    Filesize

    252KB

  • memory/4548-379-0x0000000006170000-0x0000000006180000-memory.dmp

    Filesize

    64KB

  • memory/4548-375-0x0000000006170000-0x0000000006180000-memory.dmp

    Filesize

    64KB

  • memory/4548-1090-0x0000000006C90000-0x0000000007296000-memory.dmp

    Filesize

    6.0MB

  • memory/4548-1091-0x0000000006680000-0x000000000678A000-memory.dmp

    Filesize

    1.0MB

  • memory/4548-1092-0x00000000060E0000-0x00000000060F2000-memory.dmp

    Filesize

    72KB

  • memory/4548-1093-0x0000000006100000-0x000000000613E000-memory.dmp

    Filesize

    248KB

  • memory/4548-1094-0x0000000006890000-0x00000000068DB000-memory.dmp

    Filesize

    300KB

  • memory/4548-1095-0x0000000006170000-0x0000000006180000-memory.dmp

    Filesize

    64KB

  • memory/4548-1097-0x0000000006170000-0x0000000006180000-memory.dmp

    Filesize

    64KB

  • memory/4548-1098-0x0000000006170000-0x0000000006180000-memory.dmp

    Filesize

    64KB

  • memory/4548-1099-0x0000000006170000-0x0000000006180000-memory.dmp

    Filesize

    64KB

  • memory/4548-1100-0x0000000006A00000-0x0000000006A92000-memory.dmp

    Filesize

    584KB

  • memory/4548-1101-0x0000000006AA0000-0x0000000006B06000-memory.dmp

    Filesize

    408KB

  • memory/4548-1102-0x0000000007A80000-0x0000000007C42000-memory.dmp

    Filesize

    1.8MB

  • memory/4548-1103-0x0000000007C50000-0x000000000817C000-memory.dmp

    Filesize

    5.2MB

  • memory/4548-179-0x0000000003970000-0x00000000039B4000-memory.dmp

    Filesize

    272KB

  • memory/4548-178-0x00000000038F0000-0x0000000003936000-memory.dmp

    Filesize

    280KB

  • memory/4548-1104-0x0000000006170000-0x0000000006180000-memory.dmp

    Filesize

    64KB

  • memory/4548-1105-0x0000000008280000-0x00000000082F6000-memory.dmp

    Filesize

    472KB

  • memory/4548-1106-0x0000000008300000-0x0000000008350000-memory.dmp

    Filesize

    320KB