Analysis

  • max time kernel
    56s
  • max time network
    75s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 05:44

General

  • Target

    f236e2ac8ae59ad6f69e1cdab9f5bda571610dfccb5fd61fb2d7422b640caef5.exe

  • Size

    713KB

  • MD5

    ead56ee95babb18a07a095a4e7676af0

  • SHA1

    1f3f877e539ab73d68ac713e7879a6526c3711a2

  • SHA256

    f236e2ac8ae59ad6f69e1cdab9f5bda571610dfccb5fd61fb2d7422b640caef5

  • SHA512

    3a8ccab2b1a7fdf5f43f55fb0a2f84b71eabb373bc43386e6e7bef36608c5dac3f144b6ed9c3e4939e33e4f6debdc40acc1266a7bfadc24288f1a511da3cc182

  • SSDEEP

    12288:qMrSy905LaamLIGILCKxorB2TM609DHuvJPvoI7J6uJG+xMv7ZuRfigX8F1vzrqt:QyhFI7LCvoQSRPJ6uJ2NuRagX8F9Gt

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f236e2ac8ae59ad6f69e1cdab9f5bda571610dfccb5fd61fb2d7422b640caef5.exe
    "C:\Users\Admin\AppData\Local\Temp\f236e2ac8ae59ad6f69e1cdab9f5bda571610dfccb5fd61fb2d7422b640caef5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1608
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un279746.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un279746.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3968
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5678.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5678.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1420
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6237.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6237.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4784
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si701762.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si701762.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4740

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si701762.exe

    Filesize

    175KB

    MD5

    5c826cf31fee0131fa634a5460731f4c

    SHA1

    1d6c21fb9951e228553a0161602b8900dd43ee26

    SHA256

    0307cacfa80a28dbf957faf4d4b42863b281dc4ea6fd38d05972f99ffd70f290

    SHA512

    fd377fa6ccce0add22a2132d2c48a36ff77e1f9d68401214dc3b1d645184e55a05efbb5fca5faf606943459f6d84631895213a54d681a16f8fa9f28bdea44f4d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si701762.exe

    Filesize

    175KB

    MD5

    5c826cf31fee0131fa634a5460731f4c

    SHA1

    1d6c21fb9951e228553a0161602b8900dd43ee26

    SHA256

    0307cacfa80a28dbf957faf4d4b42863b281dc4ea6fd38d05972f99ffd70f290

    SHA512

    fd377fa6ccce0add22a2132d2c48a36ff77e1f9d68401214dc3b1d645184e55a05efbb5fca5faf606943459f6d84631895213a54d681a16f8fa9f28bdea44f4d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un279746.exe

    Filesize

    571KB

    MD5

    8e3fbe06f509a188f10053a8d4ab6aa6

    SHA1

    5481f8ebda1c17dfa29cbcb1e5ce2a56d9b319a7

    SHA256

    86b6c6d9104efb81565f5239d33aed89a216993161d268b7b561f0bad905f8d9

    SHA512

    9d4e64419cf3962a36caa36184d76b157f6fabc4554a81e66c8a4ef65effe307462e933442d71fd63e54da77bae2a494fb0b21e3217e163c7eb36e1e15f2a17c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un279746.exe

    Filesize

    571KB

    MD5

    8e3fbe06f509a188f10053a8d4ab6aa6

    SHA1

    5481f8ebda1c17dfa29cbcb1e5ce2a56d9b319a7

    SHA256

    86b6c6d9104efb81565f5239d33aed89a216993161d268b7b561f0bad905f8d9

    SHA512

    9d4e64419cf3962a36caa36184d76b157f6fabc4554a81e66c8a4ef65effe307462e933442d71fd63e54da77bae2a494fb0b21e3217e163c7eb36e1e15f2a17c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5678.exe

    Filesize

    322KB

    MD5

    f6c2cdb6ee48252a9c9aa0b55920e5f6

    SHA1

    751969cb1dde41c54aba469f7a2df689d2b194df

    SHA256

    178778ed38ec4e2bce51ef94c36434a44ca14a3cad9a30a75840e1c3755d8f20

    SHA512

    fa9bf6bef65e1308fb238fce2f8368a37c61d9ee778afac721979f07ef21f3c73a104330183b47b4547a4e731963e12f5a6265b89b41e17e0751438756a945cc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5678.exe

    Filesize

    322KB

    MD5

    f6c2cdb6ee48252a9c9aa0b55920e5f6

    SHA1

    751969cb1dde41c54aba469f7a2df689d2b194df

    SHA256

    178778ed38ec4e2bce51ef94c36434a44ca14a3cad9a30a75840e1c3755d8f20

    SHA512

    fa9bf6bef65e1308fb238fce2f8368a37c61d9ee778afac721979f07ef21f3c73a104330183b47b4547a4e731963e12f5a6265b89b41e17e0751438756a945cc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6237.exe

    Filesize

    345KB

    MD5

    d08aa2d3db7c4b7cfffb60a3294a3511

    SHA1

    fbfadf2f8278e5a4fc808d21cbd0288c413ffc82

    SHA256

    1c6b0dc0b1104be74da8844715996db1d280d8f64816bc449b2a30bf6d17d8fa

    SHA512

    f482fbfe3de0409dedd3febcf1a8ed316d101a58c497c169e8b7f7afe5f6d1d2857247ecf210bf6c97e3a4b2ca6534993e6a9989d32960cc081e33cba2d1f86e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6237.exe

    Filesize

    345KB

    MD5

    d08aa2d3db7c4b7cfffb60a3294a3511

    SHA1

    fbfadf2f8278e5a4fc808d21cbd0288c413ffc82

    SHA256

    1c6b0dc0b1104be74da8844715996db1d280d8f64816bc449b2a30bf6d17d8fa

    SHA512

    f482fbfe3de0409dedd3febcf1a8ed316d101a58c497c169e8b7f7afe5f6d1d2857247ecf210bf6c97e3a4b2ca6534993e6a9989d32960cc081e33cba2d1f86e

  • memory/1420-135-0x00000000048B0000-0x00000000048CA000-memory.dmp

    Filesize

    104KB

  • memory/1420-136-0x0000000007120000-0x000000000761E000-memory.dmp

    Filesize

    5.0MB

  • memory/1420-137-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/1420-138-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/1420-139-0x0000000004D60000-0x0000000004D78000-memory.dmp

    Filesize

    96KB

  • memory/1420-140-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/1420-141-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/1420-142-0x0000000004D60000-0x0000000004D72000-memory.dmp

    Filesize

    72KB

  • memory/1420-143-0x0000000004D60000-0x0000000004D72000-memory.dmp

    Filesize

    72KB

  • memory/1420-145-0x0000000004D60000-0x0000000004D72000-memory.dmp

    Filesize

    72KB

  • memory/1420-147-0x0000000004D60000-0x0000000004D72000-memory.dmp

    Filesize

    72KB

  • memory/1420-149-0x0000000004D60000-0x0000000004D72000-memory.dmp

    Filesize

    72KB

  • memory/1420-151-0x0000000004D60000-0x0000000004D72000-memory.dmp

    Filesize

    72KB

  • memory/1420-153-0x0000000004D60000-0x0000000004D72000-memory.dmp

    Filesize

    72KB

  • memory/1420-155-0x0000000004D60000-0x0000000004D72000-memory.dmp

    Filesize

    72KB

  • memory/1420-157-0x0000000004D60000-0x0000000004D72000-memory.dmp

    Filesize

    72KB

  • memory/1420-159-0x0000000004D60000-0x0000000004D72000-memory.dmp

    Filesize

    72KB

  • memory/1420-161-0x0000000004D60000-0x0000000004D72000-memory.dmp

    Filesize

    72KB

  • memory/1420-163-0x0000000004D60000-0x0000000004D72000-memory.dmp

    Filesize

    72KB

  • memory/1420-165-0x0000000004D60000-0x0000000004D72000-memory.dmp

    Filesize

    72KB

  • memory/1420-167-0x0000000004D60000-0x0000000004D72000-memory.dmp

    Filesize

    72KB

  • memory/1420-169-0x0000000004D60000-0x0000000004D72000-memory.dmp

    Filesize

    72KB

  • memory/1420-170-0x0000000000400000-0x0000000002B7E000-memory.dmp

    Filesize

    39.5MB

  • memory/1420-171-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/1420-172-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/1420-173-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

    Filesize

    64KB

  • memory/1420-175-0x0000000000400000-0x0000000002B7E000-memory.dmp

    Filesize

    39.5MB

  • memory/4740-1114-0x0000000000B20000-0x0000000000B52000-memory.dmp

    Filesize

    200KB

  • memory/4740-1116-0x00000000056C0000-0x00000000056D0000-memory.dmp

    Filesize

    64KB

  • memory/4740-1115-0x0000000005560000-0x00000000055AB000-memory.dmp

    Filesize

    300KB

  • memory/4784-183-0x0000000001B00000-0x0000000001B4B000-memory.dmp

    Filesize

    300KB

  • memory/4784-215-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4784-184-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4784-185-0x0000000006020000-0x0000000006030000-memory.dmp

    Filesize

    64KB

  • memory/4784-187-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4784-190-0x0000000006020000-0x0000000006030000-memory.dmp

    Filesize

    64KB

  • memory/4784-188-0x0000000006020000-0x0000000006030000-memory.dmp

    Filesize

    64KB

  • memory/4784-191-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4784-193-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4784-195-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4784-197-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4784-199-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4784-201-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4784-203-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4784-205-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4784-207-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4784-209-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4784-211-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4784-213-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4784-182-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4784-217-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4784-219-0x0000000006530000-0x000000000656F000-memory.dmp

    Filesize

    252KB

  • memory/4784-1092-0x0000000006CC0000-0x00000000072C6000-memory.dmp

    Filesize

    6.0MB

  • memory/4784-1093-0x0000000006700000-0x000000000680A000-memory.dmp

    Filesize

    1.0MB

  • memory/4784-1094-0x0000000006840000-0x0000000006852000-memory.dmp

    Filesize

    72KB

  • memory/4784-1095-0x0000000006860000-0x000000000689E000-memory.dmp

    Filesize

    248KB

  • memory/4784-1096-0x0000000006020000-0x0000000006030000-memory.dmp

    Filesize

    64KB

  • memory/4784-1097-0x00000000069B0000-0x00000000069FB000-memory.dmp

    Filesize

    300KB

  • memory/4784-1099-0x0000000006B40000-0x0000000006BD2000-memory.dmp

    Filesize

    584KB

  • memory/4784-1100-0x0000000006BE0000-0x0000000006C46000-memory.dmp

    Filesize

    408KB

  • memory/4784-1101-0x0000000006020000-0x0000000006030000-memory.dmp

    Filesize

    64KB

  • memory/4784-1102-0x0000000006020000-0x0000000006030000-memory.dmp

    Filesize

    64KB

  • memory/4784-1103-0x0000000006020000-0x0000000006030000-memory.dmp

    Filesize

    64KB

  • memory/4784-1104-0x0000000007B40000-0x0000000007D02000-memory.dmp

    Filesize

    1.8MB

  • memory/4784-1105-0x0000000007D20000-0x000000000824C000-memory.dmp

    Filesize

    5.2MB

  • memory/4784-181-0x0000000006530000-0x0000000006574000-memory.dmp

    Filesize

    272KB

  • memory/4784-180-0x00000000036B0000-0x00000000036F6000-memory.dmp

    Filesize

    280KB

  • memory/4784-1106-0x0000000006020000-0x0000000006030000-memory.dmp

    Filesize

    64KB

  • memory/4784-1107-0x00000000084C0000-0x0000000008536000-memory.dmp

    Filesize

    472KB

  • memory/4784-1108-0x0000000008540000-0x0000000008590000-memory.dmp

    Filesize

    320KB