Analysis

  • max time kernel
    50s
  • max time network
    60s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 07:26

General

  • Target

    5021ad08eb1364d9059e2201b5d487d18401b59ad59522f6d94d9243c121d494.exe

  • Size

    684KB

  • MD5

    2b43028df272251a6e11a0ce136dd890

  • SHA1

    e0f729b61a099aaed7ac70b5d3947861b3c7c389

  • SHA256

    5021ad08eb1364d9059e2201b5d487d18401b59ad59522f6d94d9243c121d494

  • SHA512

    de68246e2e7bb51c54542e5e0b383c46598394c8fb2481fbcc14110f61b430d72ceafa8fb922392a51e2e4d8835393e4636fa75c5781f098041b56e34212a965

  • SSDEEP

    12288:vMrRy90guu25J0XUJpr0P8bj1iigoyL1wTDoN5QD5jsbB6frOUUammL3qZycNbcl:iyVu9b0Xopj1ii6L1P5Q6bBsqummL2xW

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5021ad08eb1364d9059e2201b5d487d18401b59ad59522f6d94d9243c121d494.exe
    "C:\Users\Admin\AppData\Local\Temp\5021ad08eb1364d9059e2201b5d487d18401b59ad59522f6d94d9243c121d494.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3588
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un636676.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un636676.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3524
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4144.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4144.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3940
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6173.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6173.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:68
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si176201.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si176201.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1280

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si176201.exe
    Filesize

    175KB

    MD5

    5e592c8bea269323b0658ea513fc055a

    SHA1

    d3efd49bdd7438d1a20d9b4a925e2db435bce2db

    SHA256

    4756a9423a3ae57a0d149b6e5cb81920ab7e1755a9f9042e5da8a6fbc45f74fd

    SHA512

    6f7d1007b5b23c2ce08f04a2518d49004ef9196c57fcbd8876a9ef3dd112596dfea16c259480fc29d888faad7fde3d6b9c9c19eef27037c6c80eb0574cf1fec2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si176201.exe
    Filesize

    175KB

    MD5

    5e592c8bea269323b0658ea513fc055a

    SHA1

    d3efd49bdd7438d1a20d9b4a925e2db435bce2db

    SHA256

    4756a9423a3ae57a0d149b6e5cb81920ab7e1755a9f9042e5da8a6fbc45f74fd

    SHA512

    6f7d1007b5b23c2ce08f04a2518d49004ef9196c57fcbd8876a9ef3dd112596dfea16c259480fc29d888faad7fde3d6b9c9c19eef27037c6c80eb0574cf1fec2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un636676.exe
    Filesize

    542KB

    MD5

    5bc050edeedd9007830fd248fc6cfa3e

    SHA1

    2e40fe01cb64f46a1c3fb0f8868df66d2ea0ead0

    SHA256

    7c9fd4a5a702da4244d14f13ad3de87a28fac1eb9b148a2b034b2ee5d457481b

    SHA512

    836a72bea8f20a559ade429afe39c9f65700d1558c803fd5d95edf241ad039dd0944451554342340803dd01c79406ffdc4ef8f2ff5299f68e925086cd1bb9e59

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un636676.exe
    Filesize

    542KB

    MD5

    5bc050edeedd9007830fd248fc6cfa3e

    SHA1

    2e40fe01cb64f46a1c3fb0f8868df66d2ea0ead0

    SHA256

    7c9fd4a5a702da4244d14f13ad3de87a28fac1eb9b148a2b034b2ee5d457481b

    SHA512

    836a72bea8f20a559ade429afe39c9f65700d1558c803fd5d95edf241ad039dd0944451554342340803dd01c79406ffdc4ef8f2ff5299f68e925086cd1bb9e59

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4144.exe
    Filesize

    321KB

    MD5

    e268bcaad59fae5a7ee485f018c4d1d0

    SHA1

    f45031f1c9555ac3911d7b1e398e888b566efc3a

    SHA256

    c842ad141cfcf5253a335b36055ca3fb24d18949a10e5ad4391489ba84f45e79

    SHA512

    10144476b197446eb9ee523853a57d8a6c05df4de1fdddcdb11e5b5105c1c11710cc9206dacf9b75ae4416aa2bd9f44865fe0274a6e98ec4d56cc584d750fca0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4144.exe
    Filesize

    321KB

    MD5

    e268bcaad59fae5a7ee485f018c4d1d0

    SHA1

    f45031f1c9555ac3911d7b1e398e888b566efc3a

    SHA256

    c842ad141cfcf5253a335b36055ca3fb24d18949a10e5ad4391489ba84f45e79

    SHA512

    10144476b197446eb9ee523853a57d8a6c05df4de1fdddcdb11e5b5105c1c11710cc9206dacf9b75ae4416aa2bd9f44865fe0274a6e98ec4d56cc584d750fca0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6173.exe
    Filesize

    380KB

    MD5

    d0e742c1477a146a8cf1b827336305e1

    SHA1

    a52c1a3266a2aed5a791c723ecf8e230f121ed26

    SHA256

    d5af3f4c4f4f53eed3441b5b7406e1b2168b891c6a5a445c298fa606ff0c2199

    SHA512

    6fec5128587207f72258c1306db6e917d1611577614c548a9c6b5b1a5e87dbcc7dd35ecae82aa5b057f6ad2c2c0bf44d063ee55952300cc8e47fa8a024fe1616

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6173.exe
    Filesize

    380KB

    MD5

    d0e742c1477a146a8cf1b827336305e1

    SHA1

    a52c1a3266a2aed5a791c723ecf8e230f121ed26

    SHA256

    d5af3f4c4f4f53eed3441b5b7406e1b2168b891c6a5a445c298fa606ff0c2199

    SHA512

    6fec5128587207f72258c1306db6e917d1611577614c548a9c6b5b1a5e87dbcc7dd35ecae82aa5b057f6ad2c2c0bf44d063ee55952300cc8e47fa8a024fe1616

  • memory/68-1088-0x0000000007900000-0x0000000007F06000-memory.dmp
    Filesize

    6.0MB

  • memory/68-1090-0x0000000007280000-0x0000000007292000-memory.dmp
    Filesize

    72KB

  • memory/68-209-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
    Filesize

    252KB

  • memory/68-207-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
    Filesize

    252KB

  • memory/68-205-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
    Filesize

    252KB

  • memory/68-1104-0x0000000008F60000-0x000000000948C000-memory.dmp
    Filesize

    5.2MB

  • memory/68-1103-0x0000000008D80000-0x0000000008F42000-memory.dmp
    Filesize

    1.8MB

  • memory/68-189-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
    Filesize

    252KB

  • memory/68-1102-0x0000000008D10000-0x0000000008D60000-memory.dmp
    Filesize

    320KB

  • memory/68-1101-0x0000000008C90000-0x0000000008D06000-memory.dmp
    Filesize

    472KB

  • memory/68-1100-0x00000000072F0000-0x0000000007300000-memory.dmp
    Filesize

    64KB

  • memory/68-1099-0x0000000008970000-0x0000000008A02000-memory.dmp
    Filesize

    584KB

  • memory/68-1098-0x00000000072F0000-0x0000000007300000-memory.dmp
    Filesize

    64KB

  • memory/68-191-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
    Filesize

    252KB

  • memory/68-1096-0x00000000072F0000-0x0000000007300000-memory.dmp
    Filesize

    64KB

  • memory/68-1097-0x00000000072F0000-0x0000000007300000-memory.dmp
    Filesize

    64KB

  • memory/68-1095-0x00000000082B0000-0x0000000008316000-memory.dmp
    Filesize

    408KB

  • memory/68-193-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
    Filesize

    252KB

  • memory/68-1093-0x0000000008120000-0x000000000816B000-memory.dmp
    Filesize

    300KB

  • memory/68-1092-0x00000000072F0000-0x0000000007300000-memory.dmp
    Filesize

    64KB

  • memory/68-1091-0x00000000072A0000-0x00000000072DE000-memory.dmp
    Filesize

    248KB

  • memory/68-211-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
    Filesize

    252KB

  • memory/68-176-0x00000000048B0000-0x00000000048F6000-memory.dmp
    Filesize

    280KB

  • memory/68-178-0x00000000072F0000-0x0000000007300000-memory.dmp
    Filesize

    64KB

  • memory/68-179-0x0000000004BD0000-0x0000000004C14000-memory.dmp
    Filesize

    272KB

  • memory/68-181-0x00000000072F0000-0x0000000007300000-memory.dmp
    Filesize

    64KB

  • memory/68-180-0x00000000072F0000-0x0000000007300000-memory.dmp
    Filesize

    64KB

  • memory/68-177-0x0000000002CB0000-0x0000000002CFB000-memory.dmp
    Filesize

    300KB

  • memory/68-182-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
    Filesize

    252KB

  • memory/68-183-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
    Filesize

    252KB

  • memory/68-185-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
    Filesize

    252KB

  • memory/68-187-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
    Filesize

    252KB

  • memory/68-1089-0x0000000007F10000-0x000000000801A000-memory.dmp
    Filesize

    1.0MB

  • memory/68-215-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
    Filesize

    252KB

  • memory/68-213-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
    Filesize

    252KB

  • memory/68-197-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
    Filesize

    252KB

  • memory/68-195-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
    Filesize

    252KB

  • memory/68-199-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
    Filesize

    252KB

  • memory/68-201-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
    Filesize

    252KB

  • memory/68-203-0x0000000004BD0000-0x0000000004C0F000-memory.dmp
    Filesize

    252KB

  • memory/1280-1110-0x0000000000D70000-0x0000000000DA2000-memory.dmp
    Filesize

    200KB

  • memory/1280-1111-0x00000000057D0000-0x000000000581B000-memory.dmp
    Filesize

    300KB

  • memory/1280-1112-0x0000000005620000-0x0000000005630000-memory.dmp
    Filesize

    64KB

  • memory/3940-166-0x0000000004890000-0x00000000048A2000-memory.dmp
    Filesize

    72KB

  • memory/3940-168-0x0000000004890000-0x00000000048A2000-memory.dmp
    Filesize

    72KB

  • memory/3940-158-0x0000000004890000-0x00000000048A2000-memory.dmp
    Filesize

    72KB

  • memory/3940-136-0x0000000004890000-0x00000000048A8000-memory.dmp
    Filesize

    96KB

  • memory/3940-148-0x0000000004890000-0x00000000048A2000-memory.dmp
    Filesize

    72KB

  • memory/3940-137-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/3940-138-0x0000000002D90000-0x0000000002DA0000-memory.dmp
    Filesize

    64KB

  • memory/3940-171-0x0000000000400000-0x0000000002B7E000-memory.dmp
    Filesize

    39.5MB

  • memory/3940-169-0x0000000000400000-0x0000000002B7E000-memory.dmp
    Filesize

    39.5MB

  • memory/3940-139-0x0000000002D90000-0x0000000002DA0000-memory.dmp
    Filesize

    64KB

  • memory/3940-164-0x0000000004890000-0x00000000048A2000-memory.dmp
    Filesize

    72KB

  • memory/3940-162-0x0000000004890000-0x00000000048A2000-memory.dmp
    Filesize

    72KB

  • memory/3940-160-0x0000000004890000-0x00000000048A2000-memory.dmp
    Filesize

    72KB

  • memory/3940-156-0x0000000004890000-0x00000000048A2000-memory.dmp
    Filesize

    72KB

  • memory/3940-154-0x0000000004890000-0x00000000048A2000-memory.dmp
    Filesize

    72KB

  • memory/3940-152-0x0000000004890000-0x00000000048A2000-memory.dmp
    Filesize

    72KB

  • memory/3940-150-0x0000000004890000-0x00000000048A2000-memory.dmp
    Filesize

    72KB

  • memory/3940-146-0x0000000004890000-0x00000000048A2000-memory.dmp
    Filesize

    72KB

  • memory/3940-144-0x0000000004890000-0x00000000048A2000-memory.dmp
    Filesize

    72KB

  • memory/3940-135-0x00000000072A0000-0x000000000779E000-memory.dmp
    Filesize

    5.0MB

  • memory/3940-134-0x0000000002F20000-0x0000000002F3A000-memory.dmp
    Filesize

    104KB

  • memory/3940-141-0x0000000004890000-0x00000000048A2000-memory.dmp
    Filesize

    72KB

  • memory/3940-142-0x0000000004890000-0x00000000048A2000-memory.dmp
    Filesize

    72KB

  • memory/3940-140-0x0000000002D90000-0x0000000002DA0000-memory.dmp
    Filesize

    64KB