Analysis

  • max time kernel
    53s
  • max time network
    70s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 05:55

General

  • Target

    d610ab5c5e76639605e6bb8a2ae7f6775791e5eb5d7e5c3d968b096e0e569352.exe

  • Size

    683KB

  • MD5

    e9bcb1eb4b38b5080ce705bd63d352f2

  • SHA1

    b075b6572b48ca815e95817cca734147edf969ad

  • SHA256

    d610ab5c5e76639605e6bb8a2ae7f6775791e5eb5d7e5c3d968b096e0e569352

  • SHA512

    db976040ffefd88c22397a01a1216cbeba1b3cea6eb9b4c00cf9db8b067c585e7541da2d3fbe5cb0535a2a6c00307a980b5f81cea98e3a4a97d0a793479fe8a5

  • SSDEEP

    12288:rMrwy90fJhaKk/e2BlNH+nvB+C53YjF06NJsOpR3jQoi4iWtAA1MJil:7ybKkGob+vsC50BzR3so1kA+JY

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d610ab5c5e76639605e6bb8a2ae7f6775791e5eb5d7e5c3d968b096e0e569352.exe
    "C:\Users\Admin\AppData\Local\Temp\d610ab5c5e76639605e6bb8a2ae7f6775791e5eb5d7e5c3d968b096e0e569352.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un156792.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un156792.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4956
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2738.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2738.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4284
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5588.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5588.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1348
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si218774.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si218774.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2128

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si218774.exe

    Filesize

    175KB

    MD5

    569701a3f4eed7663ebd06c99c599a5b

    SHA1

    a2c53ef2cf94f88aef11671e606c634c9b314347

    SHA256

    8ba55b64336a823b6989332e3c5a601fa4da8577932b1ddd61fee8e0ecac1030

    SHA512

    4dc25112df7d1aaf4fb013abf90309210dd759e3c174a0b8d01a22c5c297b9ea9fffe122cd7d9cb7e00dae5e056fe6dc2489d95027fa465bd5a0614ea921be10

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si218774.exe

    Filesize

    175KB

    MD5

    569701a3f4eed7663ebd06c99c599a5b

    SHA1

    a2c53ef2cf94f88aef11671e606c634c9b314347

    SHA256

    8ba55b64336a823b6989332e3c5a601fa4da8577932b1ddd61fee8e0ecac1030

    SHA512

    4dc25112df7d1aaf4fb013abf90309210dd759e3c174a0b8d01a22c5c297b9ea9fffe122cd7d9cb7e00dae5e056fe6dc2489d95027fa465bd5a0614ea921be10

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un156792.exe

    Filesize

    541KB

    MD5

    5eb960a0b19fbf0d416e1da545b6d846

    SHA1

    7859cfec7ec840e3e5a25c8200089962f013cc69

    SHA256

    eb57b0273b06ef3f361a5d180823289d8ac588a55f407b5fb67088e83e5b85aa

    SHA512

    dbae8a50cf477523e286f00a9199aed7551f0dbff148cada19e363b3176da3863a71e9b6acb4a610993c22dbc840086ae9ca55c82168c62c7107d1c6d508c41f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un156792.exe

    Filesize

    541KB

    MD5

    5eb960a0b19fbf0d416e1da545b6d846

    SHA1

    7859cfec7ec840e3e5a25c8200089962f013cc69

    SHA256

    eb57b0273b06ef3f361a5d180823289d8ac588a55f407b5fb67088e83e5b85aa

    SHA512

    dbae8a50cf477523e286f00a9199aed7551f0dbff148cada19e363b3176da3863a71e9b6acb4a610993c22dbc840086ae9ca55c82168c62c7107d1c6d508c41f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2738.exe

    Filesize

    322KB

    MD5

    0bec7643890048e452e4f7f0b0763103

    SHA1

    053a2000ca502f2b3717644bbaadc7da09953df3

    SHA256

    1c31aa33727cbe83acbb0d6409fdf4010420251d871f2498ddf902d94e86e46b

    SHA512

    b940f05e2dacea9fb629f0af3f17f0789217f0117d814de368c32893455ee80e298d64e64a0d97524354c855a78fb608c241a0f4aa6c781ed2b331a85defd286

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2738.exe

    Filesize

    322KB

    MD5

    0bec7643890048e452e4f7f0b0763103

    SHA1

    053a2000ca502f2b3717644bbaadc7da09953df3

    SHA256

    1c31aa33727cbe83acbb0d6409fdf4010420251d871f2498ddf902d94e86e46b

    SHA512

    b940f05e2dacea9fb629f0af3f17f0789217f0117d814de368c32893455ee80e298d64e64a0d97524354c855a78fb608c241a0f4aa6c781ed2b331a85defd286

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5588.exe

    Filesize

    379KB

    MD5

    f25366aa51217dd5ebc6ee4e819e6522

    SHA1

    c326260e96006730d8c261579bb144c8c3d633c0

    SHA256

    da9aed056964b66362cc2fdd939e42f60f12819eef583da4114b069ab2d114fa

    SHA512

    14bdf4ad2ea685fdf31b5bd852207021677df89e1f0a70400443fffd94b0d5c777ed53c9e49234192fbd537ea365465e0e174b355b875ed424340d892ba97796

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5588.exe

    Filesize

    379KB

    MD5

    f25366aa51217dd5ebc6ee4e819e6522

    SHA1

    c326260e96006730d8c261579bb144c8c3d633c0

    SHA256

    da9aed056964b66362cc2fdd939e42f60f12819eef583da4114b069ab2d114fa

    SHA512

    14bdf4ad2ea685fdf31b5bd852207021677df89e1f0a70400443fffd94b0d5c777ed53c9e49234192fbd537ea365465e0e174b355b875ed424340d892ba97796

  • memory/1348-1093-0x0000000007220000-0x000000000732A000-memory.dmp

    Filesize

    1.0MB

  • memory/1348-217-0x0000000004A90000-0x0000000004ACF000-memory.dmp

    Filesize

    252KB

  • memory/1348-192-0x0000000004A90000-0x0000000004ACF000-memory.dmp

    Filesize

    252KB

  • memory/1348-206-0x0000000004A90000-0x0000000004ACF000-memory.dmp

    Filesize

    252KB

  • memory/1348-204-0x0000000004A90000-0x0000000004ACF000-memory.dmp

    Filesize

    252KB

  • memory/1348-202-0x0000000004A90000-0x0000000004ACF000-memory.dmp

    Filesize

    252KB

  • memory/1348-1106-0x000000000A6E0000-0x000000000A730000-memory.dmp

    Filesize

    320KB

  • memory/1348-1105-0x000000000A650000-0x000000000A6C6000-memory.dmp

    Filesize

    472KB

  • memory/1348-1104-0x0000000007400000-0x0000000007410000-memory.dmp

    Filesize

    64KB

  • memory/1348-1103-0x0000000008C30000-0x000000000915C000-memory.dmp

    Filesize

    5.2MB

  • memory/1348-1102-0x0000000008A60000-0x0000000008C22000-memory.dmp

    Filesize

    1.8MB

  • memory/1348-1101-0x0000000007400000-0x0000000007410000-memory.dmp

    Filesize

    64KB

  • memory/1348-1100-0x0000000008210000-0x0000000008276000-memory.dmp

    Filesize

    408KB

  • memory/1348-194-0x0000000004A90000-0x0000000004ACF000-memory.dmp

    Filesize

    252KB

  • memory/1348-1099-0x0000000008170000-0x0000000008202000-memory.dmp

    Filesize

    584KB

  • memory/1348-1097-0x0000000008020000-0x000000000806B000-memory.dmp

    Filesize

    300KB

  • memory/1348-1096-0x0000000007400000-0x0000000007410000-memory.dmp

    Filesize

    64KB

  • memory/1348-1095-0x0000000007370000-0x00000000073AE000-memory.dmp

    Filesize

    248KB

  • memory/1348-1094-0x0000000007350000-0x0000000007362000-memory.dmp

    Filesize

    72KB

  • memory/1348-1092-0x0000000007910000-0x0000000007F16000-memory.dmp

    Filesize

    6.0MB

  • memory/1348-220-0x0000000007400000-0x0000000007410000-memory.dmp

    Filesize

    64KB

  • memory/1348-210-0x0000000004A90000-0x0000000004ACF000-memory.dmp

    Filesize

    252KB

  • memory/1348-218-0x0000000007400000-0x0000000007410000-memory.dmp

    Filesize

    64KB

  • memory/1348-216-0x0000000002C80000-0x0000000002CCB000-memory.dmp

    Filesize

    300KB

  • memory/1348-196-0x0000000004A90000-0x0000000004ACF000-memory.dmp

    Filesize

    252KB

  • memory/1348-181-0x00000000048B0000-0x00000000048F6000-memory.dmp

    Filesize

    280KB

  • memory/1348-182-0x0000000004A90000-0x0000000004AD4000-memory.dmp

    Filesize

    272KB

  • memory/1348-183-0x0000000004A90000-0x0000000004ACF000-memory.dmp

    Filesize

    252KB

  • memory/1348-184-0x0000000004A90000-0x0000000004ACF000-memory.dmp

    Filesize

    252KB

  • memory/1348-186-0x0000000004A90000-0x0000000004ACF000-memory.dmp

    Filesize

    252KB

  • memory/1348-190-0x0000000004A90000-0x0000000004ACF000-memory.dmp

    Filesize

    252KB

  • memory/1348-188-0x0000000004A90000-0x0000000004ACF000-memory.dmp

    Filesize

    252KB

  • memory/1348-208-0x0000000004A90000-0x0000000004ACF000-memory.dmp

    Filesize

    252KB

  • memory/1348-214-0x0000000004A90000-0x0000000004ACF000-memory.dmp

    Filesize

    252KB

  • memory/1348-212-0x0000000004A90000-0x0000000004ACF000-memory.dmp

    Filesize

    252KB

  • memory/1348-198-0x0000000004A90000-0x0000000004ACF000-memory.dmp

    Filesize

    252KB

  • memory/1348-200-0x0000000004A90000-0x0000000004ACF000-memory.dmp

    Filesize

    252KB

  • memory/2128-1112-0x0000000000A80000-0x0000000000AB2000-memory.dmp

    Filesize

    200KB

  • memory/2128-1113-0x0000000005340000-0x000000000538B000-memory.dmp

    Filesize

    300KB

  • memory/2128-1114-0x0000000005330000-0x0000000005340000-memory.dmp

    Filesize

    64KB

  • memory/2128-1115-0x0000000005330000-0x0000000005340000-memory.dmp

    Filesize

    64KB

  • memory/4284-170-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/4284-139-0x00000000070A0000-0x00000000070B8000-memory.dmp

    Filesize

    96KB

  • memory/4284-165-0x00000000070A0000-0x00000000070B2000-memory.dmp

    Filesize

    72KB

  • memory/4284-140-0x00000000070A0000-0x00000000070B2000-memory.dmp

    Filesize

    72KB

  • memory/4284-174-0x0000000000400000-0x0000000002B7E000-memory.dmp

    Filesize

    39.5MB

  • memory/4284-176-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/4284-175-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/4284-173-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/4284-138-0x0000000007200000-0x00000000076FE000-memory.dmp

    Filesize

    5.0MB

  • memory/4284-171-0x0000000000400000-0x0000000002B7E000-memory.dmp

    Filesize

    39.5MB

  • memory/4284-141-0x00000000070A0000-0x00000000070B2000-memory.dmp

    Filesize

    72KB

  • memory/4284-169-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/4284-168-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/4284-167-0x00000000070A0000-0x00000000070B2000-memory.dmp

    Filesize

    72KB

  • memory/4284-163-0x00000000070A0000-0x00000000070B2000-memory.dmp

    Filesize

    72KB

  • memory/4284-161-0x00000000070A0000-0x00000000070B2000-memory.dmp

    Filesize

    72KB

  • memory/4284-159-0x00000000070A0000-0x00000000070B2000-memory.dmp

    Filesize

    72KB

  • memory/4284-157-0x00000000070A0000-0x00000000070B2000-memory.dmp

    Filesize

    72KB

  • memory/4284-155-0x00000000070A0000-0x00000000070B2000-memory.dmp

    Filesize

    72KB

  • memory/4284-153-0x00000000070A0000-0x00000000070B2000-memory.dmp

    Filesize

    72KB

  • memory/4284-151-0x00000000070A0000-0x00000000070B2000-memory.dmp

    Filesize

    72KB

  • memory/4284-137-0x0000000004710000-0x000000000472A000-memory.dmp

    Filesize

    104KB

  • memory/4284-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4284-149-0x00000000070A0000-0x00000000070B2000-memory.dmp

    Filesize

    72KB

  • memory/4284-147-0x00000000070A0000-0x00000000070B2000-memory.dmp

    Filesize

    72KB

  • memory/4284-145-0x00000000070A0000-0x00000000070B2000-memory.dmp

    Filesize

    72KB

  • memory/4284-143-0x00000000070A0000-0x00000000070B2000-memory.dmp

    Filesize

    72KB