Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 06:26

General

  • Target

    c2cc60d018a8e5b89cff4c424c26d7ae39a5ccf2b947c7b70b52fd9c6d048fda.exe

  • Size

    683KB

  • MD5

    92e5995bb06e062871f28493f2e2593d

  • SHA1

    11f5d154153891251ec32b375ffea626beaa3f85

  • SHA256

    c2cc60d018a8e5b89cff4c424c26d7ae39a5ccf2b947c7b70b52fd9c6d048fda

  • SHA512

    0dd782aa5238b034cf42dea1f50be782ab391e39710db301248c451fd663f12840903fc82af9dec198e93482af213021f4c6bdf280ff772b20ca347eb1b87816

  • SSDEEP

    12288:MMr9y901lkm4iVvouMaBTmk0UNGnqlgDGB4ZWH29niD:JyWbj3BykoigDGy3tE

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2cc60d018a8e5b89cff4c424c26d7ae39a5ccf2b947c7b70b52fd9c6d048fda.exe
    "C:\Users\Admin\AppData\Local\Temp\c2cc60d018a8e5b89cff4c424c26d7ae39a5ccf2b947c7b70b52fd9c6d048fda.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un005245.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un005245.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2120
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2883.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2883.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4248
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0384.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0384.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3048
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si620442.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si620442.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4788

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si620442.exe
    Filesize

    175KB

    MD5

    8b0d1b4ed607b542a4b9089d132b89cc

    SHA1

    f08264fe9ccae9e0df42d05cb79870965b328e6b

    SHA256

    0b6bbf4be2095071c409686fc03b24a23bd25ab2da7cda1e6547aa36babe2a99

    SHA512

    8041165f8d55c33434a2fc7667573585170030ea56203a0e7df3aa683228b90d203c920d6ffbdb75f661efda878953eddfe4de9fc0b17ebd04d0a06b1ac05501

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si620442.exe
    Filesize

    175KB

    MD5

    8b0d1b4ed607b542a4b9089d132b89cc

    SHA1

    f08264fe9ccae9e0df42d05cb79870965b328e6b

    SHA256

    0b6bbf4be2095071c409686fc03b24a23bd25ab2da7cda1e6547aa36babe2a99

    SHA512

    8041165f8d55c33434a2fc7667573585170030ea56203a0e7df3aa683228b90d203c920d6ffbdb75f661efda878953eddfe4de9fc0b17ebd04d0a06b1ac05501

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un005245.exe
    Filesize

    542KB

    MD5

    fcb0398333b3b4b8b85fe19fd066f129

    SHA1

    bcfed8b4733f560afc9ec2b8bd318cb1d3b7e739

    SHA256

    47ae599c1c416ea12da16926844df0c0ae8f766eeff7bffcfb75d6bab8e3ca7b

    SHA512

    a78d6a6f8b0f2e17b017df068989eb46a43157f7b97c84303196cb281040b3f1d6bfaa5efa0ef6cfdebcc04179b1549d12fe3618a33d6d06b3f83c6f5d2d662f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un005245.exe
    Filesize

    542KB

    MD5

    fcb0398333b3b4b8b85fe19fd066f129

    SHA1

    bcfed8b4733f560afc9ec2b8bd318cb1d3b7e739

    SHA256

    47ae599c1c416ea12da16926844df0c0ae8f766eeff7bffcfb75d6bab8e3ca7b

    SHA512

    a78d6a6f8b0f2e17b017df068989eb46a43157f7b97c84303196cb281040b3f1d6bfaa5efa0ef6cfdebcc04179b1549d12fe3618a33d6d06b3f83c6f5d2d662f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2883.exe
    Filesize

    322KB

    MD5

    ee38383874c05df6d9de93e737c2bdde

    SHA1

    79d9ca5857a8d30a33d4393efa869ef24fdd5f91

    SHA256

    3175b15815eb08da1ce75a713afefdc6c6dbfbe0a149e10a816c420e88c207a2

    SHA512

    f9ae84b571adfe9194ee6201125cb37eccd6b1c6fd02d4d181f135651982ef2527825bab365cb225e9ca55b4ded4b3eb4b38a4975bb573f3c9a33c72705dacfa

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2883.exe
    Filesize

    322KB

    MD5

    ee38383874c05df6d9de93e737c2bdde

    SHA1

    79d9ca5857a8d30a33d4393efa869ef24fdd5f91

    SHA256

    3175b15815eb08da1ce75a713afefdc6c6dbfbe0a149e10a816c420e88c207a2

    SHA512

    f9ae84b571adfe9194ee6201125cb37eccd6b1c6fd02d4d181f135651982ef2527825bab365cb225e9ca55b4ded4b3eb4b38a4975bb573f3c9a33c72705dacfa

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0384.exe
    Filesize

    379KB

    MD5

    efb99631638e9ce62a73dd7317e9d2b3

    SHA1

    8aea7ea1c50d8a8f1577331b1f6aafa917c34bbf

    SHA256

    809f2080e85201d1ea238f588b04b8a67c62d31b73d195e35c551e992b67f68f

    SHA512

    6d5e503cfb33acd55be291a7f2e626698993554a2e8ace1609622246fe106d51513f7d4450948e8445b40833b18ac83b51fbac6b8d6e0902862c5926898b1988

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0384.exe
    Filesize

    379KB

    MD5

    efb99631638e9ce62a73dd7317e9d2b3

    SHA1

    8aea7ea1c50d8a8f1577331b1f6aafa917c34bbf

    SHA256

    809f2080e85201d1ea238f588b04b8a67c62d31b73d195e35c551e992b67f68f

    SHA512

    6d5e503cfb33acd55be291a7f2e626698993554a2e8ace1609622246fe106d51513f7d4450948e8445b40833b18ac83b51fbac6b8d6e0902862c5926898b1988

  • memory/3048-1092-0x0000000007DF0000-0x00000000083F6000-memory.dmp
    Filesize

    6.0MB

  • memory/3048-219-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/3048-1108-0x0000000004BB0000-0x0000000004BC0000-memory.dmp
    Filesize

    64KB

  • memory/3048-1107-0x0000000009410000-0x0000000009460000-memory.dmp
    Filesize

    320KB

  • memory/3048-1106-0x0000000009390000-0x0000000009406000-memory.dmp
    Filesize

    472KB

  • memory/3048-193-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/3048-1103-0x0000000004BB0000-0x0000000004BC0000-memory.dmp
    Filesize

    64KB

  • memory/3048-1105-0x0000000004BB0000-0x0000000004BC0000-memory.dmp
    Filesize

    64KB

  • memory/3048-1104-0x0000000004BB0000-0x0000000004BC0000-memory.dmp
    Filesize

    64KB

  • memory/3048-1102-0x0000000008C20000-0x000000000914C000-memory.dmp
    Filesize

    5.2MB

  • memory/3048-195-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/3048-1101-0x0000000008A50000-0x0000000008C12000-memory.dmp
    Filesize

    1.8MB

  • memory/3048-1100-0x0000000007D40000-0x0000000007DA6000-memory.dmp
    Filesize

    408KB

  • memory/3048-1099-0x0000000007CA0000-0x0000000007D32000-memory.dmp
    Filesize

    584KB

  • memory/3048-1097-0x0000000007B10000-0x0000000007B5B000-memory.dmp
    Filesize

    300KB

  • memory/3048-1096-0x00000000079C0000-0x00000000079FE000-memory.dmp
    Filesize

    248KB

  • memory/3048-1095-0x0000000004BB0000-0x0000000004BC0000-memory.dmp
    Filesize

    64KB

  • memory/3048-1094-0x00000000079A0000-0x00000000079B2000-memory.dmp
    Filesize

    72KB

  • memory/3048-1093-0x0000000007860000-0x000000000796A000-memory.dmp
    Filesize

    1.0MB

  • memory/3048-203-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/3048-215-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/3048-217-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/3048-213-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/3048-211-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/3048-209-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/3048-180-0x00000000049C0000-0x0000000004A06000-memory.dmp
    Filesize

    280KB

  • memory/3048-181-0x0000000007650000-0x0000000007694000-memory.dmp
    Filesize

    272KB

  • memory/3048-182-0x0000000004580000-0x00000000045CB000-memory.dmp
    Filesize

    300KB

  • memory/3048-183-0x0000000004BB0000-0x0000000004BC0000-memory.dmp
    Filesize

    64KB

  • memory/3048-191-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/3048-187-0x0000000004BB0000-0x0000000004BC0000-memory.dmp
    Filesize

    64KB

  • memory/3048-184-0x0000000004BB0000-0x0000000004BC0000-memory.dmp
    Filesize

    64KB

  • memory/3048-186-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/3048-189-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/3048-185-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/3048-207-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/3048-205-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/3048-197-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/3048-199-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/3048-201-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/4248-170-0x0000000000400000-0x0000000002B7E000-memory.dmp
    Filesize

    39.5MB

  • memory/4248-155-0x0000000004A20000-0x0000000004A32000-memory.dmp
    Filesize

    72KB

  • memory/4248-145-0x0000000004A20000-0x0000000004A32000-memory.dmp
    Filesize

    72KB

  • memory/4248-138-0x00000000071D0000-0x00000000076CE000-memory.dmp
    Filesize

    5.0MB

  • memory/4248-139-0x00000000071C0000-0x00000000071D0000-memory.dmp
    Filesize

    64KB

  • memory/4248-175-0x0000000000400000-0x0000000002B7E000-memory.dmp
    Filesize

    39.5MB

  • memory/4248-173-0x00000000071C0000-0x00000000071D0000-memory.dmp
    Filesize

    64KB

  • memory/4248-172-0x00000000071C0000-0x00000000071D0000-memory.dmp
    Filesize

    64KB

  • memory/4248-171-0x00000000071C0000-0x00000000071D0000-memory.dmp
    Filesize

    64KB

  • memory/4248-136-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/4248-140-0x00000000071C0000-0x00000000071D0000-memory.dmp
    Filesize

    64KB

  • memory/4248-169-0x0000000004A20000-0x0000000004A32000-memory.dmp
    Filesize

    72KB

  • memory/4248-167-0x0000000004A20000-0x0000000004A32000-memory.dmp
    Filesize

    72KB

  • memory/4248-165-0x0000000004A20000-0x0000000004A32000-memory.dmp
    Filesize

    72KB

  • memory/4248-163-0x0000000004A20000-0x0000000004A32000-memory.dmp
    Filesize

    72KB

  • memory/4248-161-0x0000000004A20000-0x0000000004A32000-memory.dmp
    Filesize

    72KB

  • memory/4248-159-0x0000000004A20000-0x0000000004A32000-memory.dmp
    Filesize

    72KB

  • memory/4248-157-0x0000000004A20000-0x0000000004A32000-memory.dmp
    Filesize

    72KB

  • memory/4248-153-0x0000000004A20000-0x0000000004A32000-memory.dmp
    Filesize

    72KB

  • memory/4248-151-0x0000000004A20000-0x0000000004A32000-memory.dmp
    Filesize

    72KB

  • memory/4248-149-0x0000000004A20000-0x0000000004A32000-memory.dmp
    Filesize

    72KB

  • memory/4248-147-0x0000000004A20000-0x0000000004A32000-memory.dmp
    Filesize

    72KB

  • memory/4248-143-0x0000000004A20000-0x0000000004A32000-memory.dmp
    Filesize

    72KB

  • memory/4248-142-0x0000000004A20000-0x0000000004A32000-memory.dmp
    Filesize

    72KB

  • memory/4248-141-0x0000000004A20000-0x0000000004A38000-memory.dmp
    Filesize

    96KB

  • memory/4248-137-0x00000000071C0000-0x00000000071D0000-memory.dmp
    Filesize

    64KB

  • memory/4248-135-0x0000000004990000-0x00000000049AA000-memory.dmp
    Filesize

    104KB

  • memory/4788-1114-0x0000000000B20000-0x0000000000B52000-memory.dmp
    Filesize

    200KB

  • memory/4788-1115-0x0000000005570000-0x00000000055BB000-memory.dmp
    Filesize

    300KB

  • memory/4788-1116-0x00000000056B0000-0x00000000056C0000-memory.dmp
    Filesize

    64KB