Analysis

  • max time kernel
    54s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 05:43

General

  • Target

    8120c42640fa9125a10712a347b4736597b729cc86c4bc3fcecd8f10a1a67b8e.exe

  • Size

    689KB

  • MD5

    5c27fd4f121ced1a04d79fd576b9e8f6

  • SHA1

    98b1b575828da6ca5b0f9dabb758ff2c670d4f54

  • SHA256

    8120c42640fa9125a10712a347b4736597b729cc86c4bc3fcecd8f10a1a67b8e

  • SHA512

    8fad776bd7898be65c5e0c4325d815007bf7de8ecb0aba74366bd86cab856f9ca5ad78b3a9d50fbc4aac355743e2b013d86b4f395de1b949f00c6ce6ced879d8

  • SSDEEP

    12288:RMrYy90JQ6Tbwtmo+aA2y565hLuAec4MN+D224z2wyG+JvQFrmfigxmBfSMg7NjR:hy76xo+DEfaAeg+D2ULJormagVMgiY

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8120c42640fa9125a10712a347b4736597b729cc86c4bc3fcecd8f10a1a67b8e.exe
    "C:\Users\Admin\AppData\Local\Temp\8120c42640fa9125a10712a347b4736597b729cc86c4bc3fcecd8f10a1a67b8e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:996
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un788416.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un788416.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3728
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5242.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5242.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4156
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9886.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9886.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3952
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si939473.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si939473.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3524

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si939473.exe
    Filesize

    175KB

    MD5

    7ab1fe92a357810dd7acf721887e219d

    SHA1

    c789090317a4772e0ec291062b25fda7c5b8aad6

    SHA256

    6cae0899857b8b90d33c8655a2d0ae6a9754333f0589f8e506d9d2483a2e7b78

    SHA512

    fd07efc9a6b271f3bff8064ef9841b09f7cfdd25854bf2cfd6a9e0fca51228e77c4c3ba7f516817b0b7c61e7d478ccb5c4b18430fbf54c928815dda152c5a8ab

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si939473.exe
    Filesize

    175KB

    MD5

    7ab1fe92a357810dd7acf721887e219d

    SHA1

    c789090317a4772e0ec291062b25fda7c5b8aad6

    SHA256

    6cae0899857b8b90d33c8655a2d0ae6a9754333f0589f8e506d9d2483a2e7b78

    SHA512

    fd07efc9a6b271f3bff8064ef9841b09f7cfdd25854bf2cfd6a9e0fca51228e77c4c3ba7f516817b0b7c61e7d478ccb5c4b18430fbf54c928815dda152c5a8ab

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un788416.exe
    Filesize

    547KB

    MD5

    a38fe9e680fcc634f33d6e218cd03083

    SHA1

    fdb745b422bd576268628e34ed1dd4cb897a9ead

    SHA256

    1b9a2781e457e2b8127e0b07f6dc9fc080ee372ed17ed03a57a7d4d85bfa16f4

    SHA512

    c5d01a2817556c63de5f28b3dc5e4c3d88861bcf77784c7f7c7d5a102a56903d67c860cc92f51b0a670add484b30c2acbae6bfb8a7d18b3f6ed2d7a557a8ba07

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un788416.exe
    Filesize

    547KB

    MD5

    a38fe9e680fcc634f33d6e218cd03083

    SHA1

    fdb745b422bd576268628e34ed1dd4cb897a9ead

    SHA256

    1b9a2781e457e2b8127e0b07f6dc9fc080ee372ed17ed03a57a7d4d85bfa16f4

    SHA512

    c5d01a2817556c63de5f28b3dc5e4c3d88861bcf77784c7f7c7d5a102a56903d67c860cc92f51b0a670add484b30c2acbae6bfb8a7d18b3f6ed2d7a557a8ba07

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5242.exe
    Filesize

    291KB

    MD5

    9ac5f3490a344b6c17ebc856fe09251a

    SHA1

    bc3d4e0298251fad051bae18146ee660aa3cfd71

    SHA256

    0a332a59c1bccf860d8420f91aa0a333f381872024f60b5a3b5cba8e71119ac5

    SHA512

    c1c04b74ba2d29d1859643fba9ce07d57ddec2928020a0f584282c9bfb402ed168e5576af84ecdd06f790e5132499938fe4eec838bb2b0fda825d490bbe4caa3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5242.exe
    Filesize

    291KB

    MD5

    9ac5f3490a344b6c17ebc856fe09251a

    SHA1

    bc3d4e0298251fad051bae18146ee660aa3cfd71

    SHA256

    0a332a59c1bccf860d8420f91aa0a333f381872024f60b5a3b5cba8e71119ac5

    SHA512

    c1c04b74ba2d29d1859643fba9ce07d57ddec2928020a0f584282c9bfb402ed168e5576af84ecdd06f790e5132499938fe4eec838bb2b0fda825d490bbe4caa3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9886.exe
    Filesize

    345KB

    MD5

    d03e18611bb13e02d30e17d707262947

    SHA1

    5b32c3b4ef7c0938f7e43305e8ce53f40d4aea37

    SHA256

    c9ecf5cb580ea7664edf46231cd15c27fe8f3bf3dd4bbbb4597e61cc6e9e36b9

    SHA512

    c58206340d86dbd4f2aa602f65f8cee4843a4b2cf53068bd5878effea226d9bafbb5322ca001f9a59dd4024c441c0297b0904b8e4a03506827486e58aaef984a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9886.exe
    Filesize

    345KB

    MD5

    d03e18611bb13e02d30e17d707262947

    SHA1

    5b32c3b4ef7c0938f7e43305e8ce53f40d4aea37

    SHA256

    c9ecf5cb580ea7664edf46231cd15c27fe8f3bf3dd4bbbb4597e61cc6e9e36b9

    SHA512

    c58206340d86dbd4f2aa602f65f8cee4843a4b2cf53068bd5878effea226d9bafbb5322ca001f9a59dd4024c441c0297b0904b8e4a03506827486e58aaef984a

  • memory/3524-1117-0x0000000005340000-0x0000000005350000-memory.dmp
    Filesize

    64KB

  • memory/3524-1116-0x0000000005340000-0x0000000005350000-memory.dmp
    Filesize

    64KB

  • memory/3524-1115-0x0000000005520000-0x000000000556B000-memory.dmp
    Filesize

    300KB

  • memory/3524-1114-0x0000000000AE0000-0x0000000000B12000-memory.dmp
    Filesize

    200KB

  • memory/3952-1092-0x0000000006680000-0x0000000006C86000-memory.dmp
    Filesize

    6.0MB

  • memory/3952-1096-0x0000000003A60000-0x0000000003A70000-memory.dmp
    Filesize

    64KB

  • memory/3952-1108-0x0000000003A60000-0x0000000003A70000-memory.dmp
    Filesize

    64KB

  • memory/3952-1107-0x00000000082B0000-0x0000000008300000-memory.dmp
    Filesize

    320KB

  • memory/3952-1106-0x0000000008230000-0x00000000082A6000-memory.dmp
    Filesize

    472KB

  • memory/3952-1105-0x0000000003A60000-0x0000000003A70000-memory.dmp
    Filesize

    64KB

  • memory/3952-1104-0x0000000003A60000-0x0000000003A70000-memory.dmp
    Filesize

    64KB

  • memory/3952-1103-0x0000000003A60000-0x0000000003A70000-memory.dmp
    Filesize

    64KB

  • memory/3952-1102-0x0000000007AC0000-0x0000000007FEC000-memory.dmp
    Filesize

    5.2MB

  • memory/3952-1100-0x00000000078F0000-0x0000000007AB2000-memory.dmp
    Filesize

    1.8MB

  • memory/3952-1099-0x0000000007820000-0x00000000078B2000-memory.dmp
    Filesize

    584KB

  • memory/3952-1098-0x0000000007150000-0x00000000071B6000-memory.dmp
    Filesize

    408KB

  • memory/3952-1097-0x0000000006FC0000-0x000000000700B000-memory.dmp
    Filesize

    300KB

  • memory/3952-1095-0x0000000006E70000-0x0000000006EAE000-memory.dmp
    Filesize

    248KB

  • memory/3952-1094-0x0000000006E50000-0x0000000006E62000-memory.dmp
    Filesize

    72KB

  • memory/3952-1093-0x0000000006D10000-0x0000000006E1A000-memory.dmp
    Filesize

    1.0MB

  • memory/3952-271-0x0000000003A60000-0x0000000003A70000-memory.dmp
    Filesize

    64KB

  • memory/3952-269-0x0000000003A60000-0x0000000003A70000-memory.dmp
    Filesize

    64KB

  • memory/3952-265-0x0000000001B40000-0x0000000001B8B000-memory.dmp
    Filesize

    300KB

  • memory/3952-267-0x0000000003A60000-0x0000000003A70000-memory.dmp
    Filesize

    64KB

  • memory/3952-215-0x00000000064D0000-0x000000000650F000-memory.dmp
    Filesize

    252KB

  • memory/3952-180-0x00000000039E0000-0x0000000003A26000-memory.dmp
    Filesize

    280KB

  • memory/3952-181-0x00000000064D0000-0x0000000006514000-memory.dmp
    Filesize

    272KB

  • memory/3952-182-0x00000000064D0000-0x000000000650F000-memory.dmp
    Filesize

    252KB

  • memory/3952-183-0x00000000064D0000-0x000000000650F000-memory.dmp
    Filesize

    252KB

  • memory/3952-185-0x00000000064D0000-0x000000000650F000-memory.dmp
    Filesize

    252KB

  • memory/3952-187-0x00000000064D0000-0x000000000650F000-memory.dmp
    Filesize

    252KB

  • memory/3952-189-0x00000000064D0000-0x000000000650F000-memory.dmp
    Filesize

    252KB

  • memory/3952-191-0x00000000064D0000-0x000000000650F000-memory.dmp
    Filesize

    252KB

  • memory/3952-193-0x00000000064D0000-0x000000000650F000-memory.dmp
    Filesize

    252KB

  • memory/3952-195-0x00000000064D0000-0x000000000650F000-memory.dmp
    Filesize

    252KB

  • memory/3952-197-0x00000000064D0000-0x000000000650F000-memory.dmp
    Filesize

    252KB

  • memory/3952-199-0x00000000064D0000-0x000000000650F000-memory.dmp
    Filesize

    252KB

  • memory/3952-201-0x00000000064D0000-0x000000000650F000-memory.dmp
    Filesize

    252KB

  • memory/3952-203-0x00000000064D0000-0x000000000650F000-memory.dmp
    Filesize

    252KB

  • memory/3952-205-0x00000000064D0000-0x000000000650F000-memory.dmp
    Filesize

    252KB

  • memory/3952-207-0x00000000064D0000-0x000000000650F000-memory.dmp
    Filesize

    252KB

  • memory/3952-209-0x00000000064D0000-0x000000000650F000-memory.dmp
    Filesize

    252KB

  • memory/3952-211-0x00000000064D0000-0x000000000650F000-memory.dmp
    Filesize

    252KB

  • memory/3952-213-0x00000000064D0000-0x000000000650F000-memory.dmp
    Filesize

    252KB

  • memory/4156-165-0x0000000004C30000-0x0000000004C42000-memory.dmp
    Filesize

    72KB

  • memory/4156-135-0x0000000002390000-0x00000000023AA000-memory.dmp
    Filesize

    104KB

  • memory/4156-143-0x0000000004C30000-0x0000000004C42000-memory.dmp
    Filesize

    72KB

  • memory/4156-173-0x0000000004C60000-0x0000000004C70000-memory.dmp
    Filesize

    64KB

  • memory/4156-172-0x0000000004C60000-0x0000000004C70000-memory.dmp
    Filesize

    64KB

  • memory/4156-141-0x0000000004C60000-0x0000000004C70000-memory.dmp
    Filesize

    64KB

  • memory/4156-171-0x0000000004C60000-0x0000000004C70000-memory.dmp
    Filesize

    64KB

  • memory/4156-170-0x0000000000400000-0x000000000070B000-memory.dmp
    Filesize

    3.0MB

  • memory/4156-169-0x0000000004C30000-0x0000000004C42000-memory.dmp
    Filesize

    72KB

  • memory/4156-142-0x0000000004C30000-0x0000000004C42000-memory.dmp
    Filesize

    72KB

  • memory/4156-167-0x0000000004C30000-0x0000000004C42000-memory.dmp
    Filesize

    72KB

  • memory/4156-163-0x0000000004C30000-0x0000000004C42000-memory.dmp
    Filesize

    72KB

  • memory/4156-175-0x0000000000400000-0x000000000070B000-memory.dmp
    Filesize

    3.0MB

  • memory/4156-145-0x0000000004C30000-0x0000000004C42000-memory.dmp
    Filesize

    72KB

  • memory/4156-140-0x0000000004C60000-0x0000000004C70000-memory.dmp
    Filesize

    64KB

  • memory/4156-157-0x0000000004C30000-0x0000000004C42000-memory.dmp
    Filesize

    72KB

  • memory/4156-155-0x0000000004C30000-0x0000000004C42000-memory.dmp
    Filesize

    72KB

  • memory/4156-153-0x0000000004C30000-0x0000000004C42000-memory.dmp
    Filesize

    72KB

  • memory/4156-151-0x0000000004C30000-0x0000000004C42000-memory.dmp
    Filesize

    72KB

  • memory/4156-149-0x0000000004C30000-0x0000000004C42000-memory.dmp
    Filesize

    72KB

  • memory/4156-147-0x0000000004C30000-0x0000000004C42000-memory.dmp
    Filesize

    72KB

  • memory/4156-159-0x0000000004C30000-0x0000000004C42000-memory.dmp
    Filesize

    72KB

  • memory/4156-139-0x0000000004C60000-0x0000000004C70000-memory.dmp
    Filesize

    64KB

  • memory/4156-138-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/4156-137-0x0000000004C30000-0x0000000004C48000-memory.dmp
    Filesize

    96KB

  • memory/4156-136-0x0000000004C70000-0x000000000516E000-memory.dmp
    Filesize

    5.0MB

  • memory/4156-161-0x0000000004C30000-0x0000000004C42000-memory.dmp
    Filesize

    72KB