Analysis

  • max time kernel
    50s
  • max time network
    71s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 04:49

General

  • Target

    9d96632ad4ea5d918bc15120e33afa90dc576db08d3eeedac3879da46170e18c.exe

  • Size

    689KB

  • MD5

    74aaead1c8dd7c6500cc558a72f69e7d

  • SHA1

    ebd653a3d6fd37abd1467704bfa6748cafbd152e

  • SHA256

    9d96632ad4ea5d918bc15120e33afa90dc576db08d3eeedac3879da46170e18c

  • SHA512

    3abc3f5e462713cd873c36ed3ad028dd1117e78ede19de5b23da276de9e78631533b2ad7d843d48d308652aad8e31b9dc992ac69777ef6687981bcb11793a9a9

  • SSDEEP

    12288:5Mruy90wdkETVrnXbp2yKmyt65hLu2usMSKI3VgS7vvmFnwfigRA5/H9T3Dt:vyMKkgfaTsLZ3VgwvinwagA/Hp5

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d96632ad4ea5d918bc15120e33afa90dc576db08d3eeedac3879da46170e18c.exe
    "C:\Users\Admin\AppData\Local\Temp\9d96632ad4ea5d918bc15120e33afa90dc576db08d3eeedac3879da46170e18c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4124
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un618418.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un618418.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3924
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6318.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6318.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4944
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2549.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2549.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2576
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si551798.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si551798.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4180

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si551798.exe

    Filesize

    175KB

    MD5

    66890e8bd8dce78e197ed8c5bee8b150

    SHA1

    483898ece47dae7a1bb74dcff91e288d072b39fc

    SHA256

    89417c0644af1e4313e3aa5967c501342efbe223812c19e4981f75f76503c9fa

    SHA512

    0625ecf0ab2616747a38e3395f4b15e77070eb28487e4e04a8729d369bb27bc69cb8eb86787842768e9139da745066c48dfb42ccc819ca6f8971f0754906ea38

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si551798.exe

    Filesize

    175KB

    MD5

    66890e8bd8dce78e197ed8c5bee8b150

    SHA1

    483898ece47dae7a1bb74dcff91e288d072b39fc

    SHA256

    89417c0644af1e4313e3aa5967c501342efbe223812c19e4981f75f76503c9fa

    SHA512

    0625ecf0ab2616747a38e3395f4b15e77070eb28487e4e04a8729d369bb27bc69cb8eb86787842768e9139da745066c48dfb42ccc819ca6f8971f0754906ea38

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un618418.exe

    Filesize

    547KB

    MD5

    52b63e0cdfbe989b190a1540c77242c3

    SHA1

    d378ea62e824aa358c830b969c5054eab5a7e083

    SHA256

    3db8cfde497c816a0ec62102f035bdc302578d5222036c9dc5f17c4a115ec649

    SHA512

    2339ce909ff5b7094bb15712450b8c8819eff43f590baf256a528f6b8c442552aa44398148592287b8693771cbe51e8a70bcf93cd5fe56a43f1aac1cab599f78

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un618418.exe

    Filesize

    547KB

    MD5

    52b63e0cdfbe989b190a1540c77242c3

    SHA1

    d378ea62e824aa358c830b969c5054eab5a7e083

    SHA256

    3db8cfde497c816a0ec62102f035bdc302578d5222036c9dc5f17c4a115ec649

    SHA512

    2339ce909ff5b7094bb15712450b8c8819eff43f590baf256a528f6b8c442552aa44398148592287b8693771cbe51e8a70bcf93cd5fe56a43f1aac1cab599f78

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6318.exe

    Filesize

    291KB

    MD5

    00c7f95033893c84ac70d0644e4d4169

    SHA1

    37f290252a7ff55c08f24a7d873fb970da34ac35

    SHA256

    9e00f96620543c1905f4812e3ec29be8c53230c740d19971b060d43347e55ac0

    SHA512

    0a56e4d88e1bb12e9edd15b8cac1098ebe56256d089c71a8880bc225b16ef21a2fe9daffa182c24d03e5de307eb40f5ff0c7ae3bcda2491f5f0a7624120a1946

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6318.exe

    Filesize

    291KB

    MD5

    00c7f95033893c84ac70d0644e4d4169

    SHA1

    37f290252a7ff55c08f24a7d873fb970da34ac35

    SHA256

    9e00f96620543c1905f4812e3ec29be8c53230c740d19971b060d43347e55ac0

    SHA512

    0a56e4d88e1bb12e9edd15b8cac1098ebe56256d089c71a8880bc225b16ef21a2fe9daffa182c24d03e5de307eb40f5ff0c7ae3bcda2491f5f0a7624120a1946

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2549.exe

    Filesize

    345KB

    MD5

    edf1682036dbca3e5e253ff587996fae

    SHA1

    2dab6e6049fbf161916f424b71b3546ea9dd657a

    SHA256

    8949e56fc09a07c3e8089629bd560082fa80357de8bf331db415bdf57fa24743

    SHA512

    4c42f1124bf1b50e4eb2740acebf8ebb3a083159f37873115bd7aca1601b9669ffaf0a4701f9e3acbae3b0d5cf4762611b85db9ab230b385ab1f895b23a588c2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2549.exe

    Filesize

    345KB

    MD5

    edf1682036dbca3e5e253ff587996fae

    SHA1

    2dab6e6049fbf161916f424b71b3546ea9dd657a

    SHA256

    8949e56fc09a07c3e8089629bd560082fa80357de8bf331db415bdf57fa24743

    SHA512

    4c42f1124bf1b50e4eb2740acebf8ebb3a083159f37873115bd7aca1601b9669ffaf0a4701f9e3acbae3b0d5cf4762611b85db9ab230b385ab1f895b23a588c2

  • memory/2576-1085-0x0000000006680000-0x0000000006C86000-memory.dmp

    Filesize

    6.0MB

  • memory/2576-1087-0x0000000006E50000-0x0000000006E62000-memory.dmp

    Filesize

    72KB

  • memory/2576-281-0x0000000001A30000-0x0000000001A7B000-memory.dmp

    Filesize

    300KB

  • memory/2576-208-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/2576-206-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/2576-1101-0x0000000006020000-0x0000000006030000-memory.dmp

    Filesize

    64KB

  • memory/2576-1100-0x0000000007E10000-0x000000000833C000-memory.dmp

    Filesize

    5.2MB

  • memory/2576-190-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/2576-1099-0x0000000007C40000-0x0000000007E02000-memory.dmp

    Filesize

    1.8MB

  • memory/2576-1098-0x0000000007A60000-0x0000000007AB0000-memory.dmp

    Filesize

    320KB

  • memory/2576-1097-0x00000000079D0000-0x0000000007A46000-memory.dmp

    Filesize

    472KB

  • memory/2576-1096-0x0000000006020000-0x0000000006030000-memory.dmp

    Filesize

    64KB

  • memory/2576-1095-0x0000000006020000-0x0000000006030000-memory.dmp

    Filesize

    64KB

  • memory/2576-192-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/2576-1094-0x0000000006020000-0x0000000006030000-memory.dmp

    Filesize

    64KB

  • memory/2576-1092-0x0000000007810000-0x00000000078A2000-memory.dmp

    Filesize

    584KB

  • memory/2576-1091-0x0000000007150000-0x00000000071B6000-memory.dmp

    Filesize

    408KB

  • memory/2576-194-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/2576-1090-0x0000000006020000-0x0000000006030000-memory.dmp

    Filesize

    64KB

  • memory/2576-1089-0x0000000006FC0000-0x000000000700B000-memory.dmp

    Filesize

    300KB

  • memory/2576-1088-0x0000000006E70000-0x0000000006EAE000-memory.dmp

    Filesize

    248KB

  • memory/2576-282-0x0000000006020000-0x0000000006030000-memory.dmp

    Filesize

    64KB

  • memory/2576-173-0x0000000005F10000-0x0000000005F56000-memory.dmp

    Filesize

    280KB

  • memory/2576-174-0x0000000005F90000-0x0000000005FD4000-memory.dmp

    Filesize

    272KB

  • memory/2576-176-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/2576-178-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/2576-175-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/2576-180-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/2576-182-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/2576-184-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/2576-186-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/2576-188-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/2576-1086-0x0000000006D10000-0x0000000006E1A000-memory.dmp

    Filesize

    1.0MB

  • memory/2576-286-0x0000000006020000-0x0000000006030000-memory.dmp

    Filesize

    64KB

  • memory/2576-284-0x0000000006020000-0x0000000006030000-memory.dmp

    Filesize

    64KB

  • memory/2576-196-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/2576-198-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/2576-200-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/2576-202-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/2576-204-0x0000000005F90000-0x0000000005FCF000-memory.dmp

    Filesize

    252KB

  • memory/4180-1107-0x0000000000A10000-0x0000000000A42000-memory.dmp

    Filesize

    200KB

  • memory/4180-1108-0x0000000005450000-0x000000000549B000-memory.dmp

    Filesize

    300KB

  • memory/4180-1109-0x0000000005600000-0x0000000005610000-memory.dmp

    Filesize

    64KB

  • memory/4944-164-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/4944-165-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/4944-160-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/4944-133-0x0000000004EA0000-0x000000000539E000-memory.dmp

    Filesize

    5.0MB

  • memory/4944-148-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/4944-134-0x00000000028E0000-0x00000000028F8000-memory.dmp

    Filesize

    96KB

  • memory/4944-135-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/4944-168-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/4944-166-0x0000000000400000-0x000000000070B000-memory.dmp

    Filesize

    3.0MB

  • memory/4944-136-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/4944-163-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/4944-162-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/4944-158-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/4944-156-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/4944-154-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/4944-152-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/4944-150-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/4944-146-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/4944-144-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/4944-132-0x0000000002520000-0x000000000253A000-memory.dmp

    Filesize

    104KB

  • memory/4944-131-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4944-142-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/4944-140-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB

  • memory/4944-138-0x00000000028E0000-0x00000000028F2000-memory.dmp

    Filesize

    72KB