Analysis

  • max time kernel
    56s
  • max time network
    63s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 07:03

General

  • Target

    14d84b7e568bf84dbe59d3b0b19ee6ccb00abafd2bb8ae232cc16757a3cbf3cc.exe

  • Size

    684KB

  • MD5

    a20f45102500172c01a958456a208210

  • SHA1

    4aeeb8ac7d3f102a9645711b83b01d407fa042a4

  • SHA256

    14d84b7e568bf84dbe59d3b0b19ee6ccb00abafd2bb8ae232cc16757a3cbf3cc

  • SHA512

    90f1a867db10be654720bf893a2685c4dc2ed18b5a0b65ac41e06e635cdf7b79b08d7726383a48308e831d42bc89cad3d52cd1e900a68ae538feac9b5a118b0f

  • SSDEEP

    12288:VMrcy90H4dvlin/VqiyqbHddqf6StaTHLiDmyhWRaC54lWyytsbp:5yxd9i9q3qb9dJrsqaCK8Ap

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14d84b7e568bf84dbe59d3b0b19ee6ccb00abafd2bb8ae232cc16757a3cbf3cc.exe
    "C:\Users\Admin\AppData\Local\Temp\14d84b7e568bf84dbe59d3b0b19ee6ccb00abafd2bb8ae232cc16757a3cbf3cc.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1840
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un549564.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un549564.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2340
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3229.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3229.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2588
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7761.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7761.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3516
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si049418.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si049418.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2812

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si049418.exe
    Filesize

    175KB

    MD5

    c5ed62b01630e281fc539feef1ca5610

    SHA1

    c4ae0d44780c96c490e082e25087654098c758fe

    SHA256

    8a07699b3ead3aebca2042666182e24d3ffaff0b2d43a746f4e5ee701921c134

    SHA512

    6abd4e5bc192629b46eb7e12b647f665c8681ead7cd2d8a78cd798aa0174ca9129d04a8dd458b7fa02720d25948d6a49db1e57c7eea94571b74c583227b34062

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si049418.exe
    Filesize

    175KB

    MD5

    c5ed62b01630e281fc539feef1ca5610

    SHA1

    c4ae0d44780c96c490e082e25087654098c758fe

    SHA256

    8a07699b3ead3aebca2042666182e24d3ffaff0b2d43a746f4e5ee701921c134

    SHA512

    6abd4e5bc192629b46eb7e12b647f665c8681ead7cd2d8a78cd798aa0174ca9129d04a8dd458b7fa02720d25948d6a49db1e57c7eea94571b74c583227b34062

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un549564.exe
    Filesize

    542KB

    MD5

    06b5a226495479225d1c1a920beb740b

    SHA1

    4d73b60275357376e1a67b759bb2c625abdc2364

    SHA256

    e655a7e7af44a39fd8a503a4b04e14c5e4e19e08c7974910ba731d71b09bb44e

    SHA512

    90739fc5216755de22519746fffe0adb05632c3589e90ac052d088951a75c49b4d73c778fc138784a1efffeb4b85f1daf277a53afa99c101c3e4936b3b640f01

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un549564.exe
    Filesize

    542KB

    MD5

    06b5a226495479225d1c1a920beb740b

    SHA1

    4d73b60275357376e1a67b759bb2c625abdc2364

    SHA256

    e655a7e7af44a39fd8a503a4b04e14c5e4e19e08c7974910ba731d71b09bb44e

    SHA512

    90739fc5216755de22519746fffe0adb05632c3589e90ac052d088951a75c49b4d73c778fc138784a1efffeb4b85f1daf277a53afa99c101c3e4936b3b640f01

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3229.exe
    Filesize

    322KB

    MD5

    53ad9d4b023f2652aa796a5b73ef2b9f

    SHA1

    435ededc95b8724cb3f290c66d08f8de6d0e56ba

    SHA256

    5f2eb03649214658ab8e2e66a97fee47ecfdefc9ee87884bf01a828a599c2386

    SHA512

    c3ebaea79e88b4532a4290639885fe3bb84412449aeeae41682082efe4555f27e9cb3b5b6bfff6f4e46f30170e08c65958747951d1f6b4f874c8a1d9d27f2dfb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3229.exe
    Filesize

    322KB

    MD5

    53ad9d4b023f2652aa796a5b73ef2b9f

    SHA1

    435ededc95b8724cb3f290c66d08f8de6d0e56ba

    SHA256

    5f2eb03649214658ab8e2e66a97fee47ecfdefc9ee87884bf01a828a599c2386

    SHA512

    c3ebaea79e88b4532a4290639885fe3bb84412449aeeae41682082efe4555f27e9cb3b5b6bfff6f4e46f30170e08c65958747951d1f6b4f874c8a1d9d27f2dfb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7761.exe
    Filesize

    379KB

    MD5

    65a14f4eadcf093b84b65e5ab57fc659

    SHA1

    42e96951c42690c34fe9608de79e293e952d9109

    SHA256

    5167fbc79f099606fac5ac7c805f6dc3e4dd7147e2b7534380eb72ce4702c7bb

    SHA512

    e0686f19897355a8ec728b5437d02a2ac2a791e2ef19d537c0d6392b4bb1815a569791b149f87c6136527c22eaa73c524b41ac0ea9a86bacecc0f60352729087

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7761.exe
    Filesize

    379KB

    MD5

    65a14f4eadcf093b84b65e5ab57fc659

    SHA1

    42e96951c42690c34fe9608de79e293e952d9109

    SHA256

    5167fbc79f099606fac5ac7c805f6dc3e4dd7147e2b7534380eb72ce4702c7bb

    SHA512

    e0686f19897355a8ec728b5437d02a2ac2a791e2ef19d537c0d6392b4bb1815a569791b149f87c6136527c22eaa73c524b41ac0ea9a86bacecc0f60352729087

  • memory/2588-148-0x0000000004C70000-0x0000000004C82000-memory.dmp
    Filesize

    72KB

  • memory/2588-158-0x0000000004C70000-0x0000000004C82000-memory.dmp
    Filesize

    72KB

  • memory/2588-138-0x0000000007170000-0x000000000766E000-memory.dmp
    Filesize

    5.0MB

  • memory/2588-139-0x0000000004C70000-0x0000000004C88000-memory.dmp
    Filesize

    96KB

  • memory/2588-140-0x0000000004D10000-0x0000000004D20000-memory.dmp
    Filesize

    64KB

  • memory/2588-141-0x0000000004D10000-0x0000000004D20000-memory.dmp
    Filesize

    64KB

  • memory/2588-142-0x0000000004D10000-0x0000000004D20000-memory.dmp
    Filesize

    64KB

  • memory/2588-143-0x0000000004C70000-0x0000000004C82000-memory.dmp
    Filesize

    72KB

  • memory/2588-144-0x0000000004C70000-0x0000000004C82000-memory.dmp
    Filesize

    72KB

  • memory/2588-146-0x0000000004C70000-0x0000000004C82000-memory.dmp
    Filesize

    72KB

  • memory/2588-136-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/2588-150-0x0000000004C70000-0x0000000004C82000-memory.dmp
    Filesize

    72KB

  • memory/2588-152-0x0000000004C70000-0x0000000004C82000-memory.dmp
    Filesize

    72KB

  • memory/2588-154-0x0000000004C70000-0x0000000004C82000-memory.dmp
    Filesize

    72KB

  • memory/2588-156-0x0000000004C70000-0x0000000004C82000-memory.dmp
    Filesize

    72KB

  • memory/2588-137-0x0000000004650000-0x000000000466A000-memory.dmp
    Filesize

    104KB

  • memory/2588-160-0x0000000004C70000-0x0000000004C82000-memory.dmp
    Filesize

    72KB

  • memory/2588-162-0x0000000004C70000-0x0000000004C82000-memory.dmp
    Filesize

    72KB

  • memory/2588-164-0x0000000004C70000-0x0000000004C82000-memory.dmp
    Filesize

    72KB

  • memory/2588-166-0x0000000004C70000-0x0000000004C82000-memory.dmp
    Filesize

    72KB

  • memory/2588-168-0x0000000004C70000-0x0000000004C82000-memory.dmp
    Filesize

    72KB

  • memory/2588-170-0x0000000004C70000-0x0000000004C82000-memory.dmp
    Filesize

    72KB

  • memory/2588-171-0x0000000000400000-0x0000000002B7E000-memory.dmp
    Filesize

    39.5MB

  • memory/2588-173-0x0000000004D10000-0x0000000004D20000-memory.dmp
    Filesize

    64KB

  • memory/2588-172-0x0000000004D10000-0x0000000004D20000-memory.dmp
    Filesize

    64KB

  • memory/2588-174-0x0000000004D10000-0x0000000004D20000-memory.dmp
    Filesize

    64KB

  • memory/2588-176-0x0000000000400000-0x0000000002B7E000-memory.dmp
    Filesize

    39.5MB

  • memory/2812-1110-0x0000000000010000-0x0000000000042000-memory.dmp
    Filesize

    200KB

  • memory/2812-1111-0x0000000004930000-0x000000000497B000-memory.dmp
    Filesize

    300KB

  • memory/2812-1112-0x00000000048A0000-0x00000000048B0000-memory.dmp
    Filesize

    64KB

  • memory/3516-181-0x00000000048F0000-0x0000000004936000-memory.dmp
    Filesize

    280KB

  • memory/3516-184-0x0000000004A80000-0x0000000004ABF000-memory.dmp
    Filesize

    252KB

  • memory/3516-185-0x0000000004A80000-0x0000000004ABF000-memory.dmp
    Filesize

    252KB

  • memory/3516-187-0x0000000004A80000-0x0000000004ABF000-memory.dmp
    Filesize

    252KB

  • memory/3516-189-0x0000000004A80000-0x0000000004ABF000-memory.dmp
    Filesize

    252KB

  • memory/3516-191-0x0000000004A80000-0x0000000004ABF000-memory.dmp
    Filesize

    252KB

  • memory/3516-193-0x0000000004A80000-0x0000000004ABF000-memory.dmp
    Filesize

    252KB

  • memory/3516-197-0x0000000004A80000-0x0000000004ABF000-memory.dmp
    Filesize

    252KB

  • memory/3516-195-0x0000000004A80000-0x0000000004ABF000-memory.dmp
    Filesize

    252KB

  • memory/3516-199-0x0000000004A80000-0x0000000004ABF000-memory.dmp
    Filesize

    252KB

  • memory/3516-201-0x0000000004A80000-0x0000000004ABF000-memory.dmp
    Filesize

    252KB

  • memory/3516-203-0x0000000004A80000-0x0000000004ABF000-memory.dmp
    Filesize

    252KB

  • memory/3516-205-0x0000000004A80000-0x0000000004ABF000-memory.dmp
    Filesize

    252KB

  • memory/3516-207-0x0000000004A80000-0x0000000004ABF000-memory.dmp
    Filesize

    252KB

  • memory/3516-209-0x0000000004A80000-0x0000000004ABF000-memory.dmp
    Filesize

    252KB

  • memory/3516-211-0x0000000004A80000-0x0000000004ABF000-memory.dmp
    Filesize

    252KB

  • memory/3516-213-0x0000000004A80000-0x0000000004ABF000-memory.dmp
    Filesize

    252KB

  • memory/3516-215-0x0000000004A80000-0x0000000004ABF000-memory.dmp
    Filesize

    252KB

  • memory/3516-217-0x0000000004A80000-0x0000000004ABF000-memory.dmp
    Filesize

    252KB

  • memory/3516-1090-0x0000000007F10000-0x0000000008516000-memory.dmp
    Filesize

    6.0MB

  • memory/3516-1091-0x0000000007900000-0x0000000007A0A000-memory.dmp
    Filesize

    1.0MB

  • memory/3516-1092-0x0000000004CE0000-0x0000000004CF2000-memory.dmp
    Filesize

    72KB

  • memory/3516-1093-0x0000000004E20000-0x0000000004E5E000-memory.dmp
    Filesize

    248KB

  • memory/3516-1094-0x0000000004E60000-0x0000000004EAB000-memory.dmp
    Filesize

    300KB

  • memory/3516-1095-0x00000000073F0000-0x0000000007400000-memory.dmp
    Filesize

    64KB

  • memory/3516-1097-0x00000000073F0000-0x0000000007400000-memory.dmp
    Filesize

    64KB

  • memory/3516-1098-0x0000000007B60000-0x0000000007BC6000-memory.dmp
    Filesize

    408KB

  • memory/3516-1099-0x0000000008830000-0x00000000088C2000-memory.dmp
    Filesize

    584KB

  • memory/3516-1100-0x0000000008910000-0x0000000008986000-memory.dmp
    Filesize

    472KB

  • memory/3516-1101-0x0000000008AE0000-0x0000000008B30000-memory.dmp
    Filesize

    320KB

  • memory/3516-183-0x0000000004A80000-0x0000000004AC4000-memory.dmp
    Filesize

    272KB

  • memory/3516-182-0x0000000002B90000-0x0000000002BDB000-memory.dmp
    Filesize

    300KB

  • memory/3516-1102-0x0000000008C50000-0x0000000008E12000-memory.dmp
    Filesize

    1.8MB

  • memory/3516-1103-0x0000000008E20000-0x000000000934C000-memory.dmp
    Filesize

    5.2MB

  • memory/3516-1104-0x00000000073F0000-0x0000000007400000-memory.dmp
    Filesize

    64KB