Analysis

  • max time kernel
    52s
  • max time network
    72s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 07:06

General

  • Target

    1a4c6569a35d337111015e1994998e38adab0fcbcddcf07bed00d62d8d8b9f4c.exe

  • Size

    682KB

  • MD5

    c8b443b09ed0e5727d8051a863e7b914

  • SHA1

    cec11f017828fa8ea75682482aec7906db1358e7

  • SHA256

    1a4c6569a35d337111015e1994998e38adab0fcbcddcf07bed00d62d8d8b9f4c

  • SHA512

    4f3235e37a98d5ba12fb83f9acac1e3d11c1a94ae116587bd2c934514b9c97618cf88b836a69dc59acf89c83162eb7dd7c339547b0ee68b8513393e2250f46a3

  • SSDEEP

    12288:uMrwy90arFnuiiTSdE9d7/0HN/KzuHvBxY47WRIVA8yWK387:CyFrAT4ED7/UbvBx7/VlyW7

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a4c6569a35d337111015e1994998e38adab0fcbcddcf07bed00d62d8d8b9f4c.exe
    "C:\Users\Admin\AppData\Local\Temp\1a4c6569a35d337111015e1994998e38adab0fcbcddcf07bed00d62d8d8b9f4c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4212
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un294623.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un294623.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4156
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3167.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3167.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:996
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4114.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4114.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4316
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si742088.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si742088.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4032

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si742088.exe

    Filesize

    175KB

    MD5

    0315a136187835fb0c8c5363d4193fbf

    SHA1

    ecf186e36f3d44e51b12bfd5f5019ca91be05dc4

    SHA256

    6dd89fac7e358bf1034074dbab8df7d7e500dae4df0f1f8b4d4a8021a74acc5d

    SHA512

    524a74622cb1a48b9bc2aa711b7cc24cd3603989a9e058aa787534c6fe9e3a33fad7d1fc6d67acbabf29c24e499834ad252cb17fe16f6f5ac7efe4a9e8974183

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si742088.exe

    Filesize

    175KB

    MD5

    0315a136187835fb0c8c5363d4193fbf

    SHA1

    ecf186e36f3d44e51b12bfd5f5019ca91be05dc4

    SHA256

    6dd89fac7e358bf1034074dbab8df7d7e500dae4df0f1f8b4d4a8021a74acc5d

    SHA512

    524a74622cb1a48b9bc2aa711b7cc24cd3603989a9e058aa787534c6fe9e3a33fad7d1fc6d67acbabf29c24e499834ad252cb17fe16f6f5ac7efe4a9e8974183

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un294623.exe

    Filesize

    541KB

    MD5

    dfa8cf1244b469f45c4614dfe5c69d72

    SHA1

    5b8754ce029590bc1b9d1a9dec4100a276f85d59

    SHA256

    4ca3fccb3c93e20bab76c36382117964108da65f6049863a2ef13453fc0909de

    SHA512

    34abc00eea2de2bc9145d7e11697d60c4d7f33596dda52cd60903701fc466397d6996a1ba1622d15ba90abdec044a6397b4b3651e9a93326f46f878130863d64

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un294623.exe

    Filesize

    541KB

    MD5

    dfa8cf1244b469f45c4614dfe5c69d72

    SHA1

    5b8754ce029590bc1b9d1a9dec4100a276f85d59

    SHA256

    4ca3fccb3c93e20bab76c36382117964108da65f6049863a2ef13453fc0909de

    SHA512

    34abc00eea2de2bc9145d7e11697d60c4d7f33596dda52cd60903701fc466397d6996a1ba1622d15ba90abdec044a6397b4b3651e9a93326f46f878130863d64

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3167.exe

    Filesize

    322KB

    MD5

    b92c371df33c5023a12b913a225879eb

    SHA1

    77999c8fdee85b6ea0e22dde98170e94bdb810c3

    SHA256

    1032346a0a22f4c90cc2d84466d9d9b6971065a4dcd7518063700209e8bb9533

    SHA512

    f95d3cf0a251dce0123881f2baf04f12aad7424f8204d07302c3aa40b766688b62572ed6d281b9653625dfeb94d1a1f5fa445746d60d6519e28802143dc72159

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3167.exe

    Filesize

    322KB

    MD5

    b92c371df33c5023a12b913a225879eb

    SHA1

    77999c8fdee85b6ea0e22dde98170e94bdb810c3

    SHA256

    1032346a0a22f4c90cc2d84466d9d9b6971065a4dcd7518063700209e8bb9533

    SHA512

    f95d3cf0a251dce0123881f2baf04f12aad7424f8204d07302c3aa40b766688b62572ed6d281b9653625dfeb94d1a1f5fa445746d60d6519e28802143dc72159

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4114.exe

    Filesize

    379KB

    MD5

    ea9697cd06acaccfb906d074e337bd3a

    SHA1

    294ec36a8d8f34159d3fe0efd405e7516e648db8

    SHA256

    c6bef242ee68f5f36bdcb5d5bc25abb7d7626e7a0de01cc4e47a01012b9322d6

    SHA512

    8748649f4ab7aaae017dc417f6ff86579940f79a7385f3e4f8ae556f67589610de71c1b40bb4a1702ff2cab5e832d67d98b9e9f43a36231a0b10e0aac179aaa8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4114.exe

    Filesize

    379KB

    MD5

    ea9697cd06acaccfb906d074e337bd3a

    SHA1

    294ec36a8d8f34159d3fe0efd405e7516e648db8

    SHA256

    c6bef242ee68f5f36bdcb5d5bc25abb7d7626e7a0de01cc4e47a01012b9322d6

    SHA512

    8748649f4ab7aaae017dc417f6ff86579940f79a7385f3e4f8ae556f67589610de71c1b40bb4a1702ff2cab5e832d67d98b9e9f43a36231a0b10e0aac179aaa8

  • memory/996-148-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/996-156-0x0000000004B50000-0x0000000004B62000-memory.dmp

    Filesize

    72KB

  • memory/996-135-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/996-137-0x0000000007200000-0x00000000076FE000-memory.dmp

    Filesize

    5.0MB

  • memory/996-138-0x0000000004B50000-0x0000000004B68000-memory.dmp

    Filesize

    96KB

  • memory/996-139-0x0000000004B50000-0x0000000004B62000-memory.dmp

    Filesize

    72KB

  • memory/996-140-0x0000000004B50000-0x0000000004B62000-memory.dmp

    Filesize

    72KB

  • memory/996-142-0x0000000004B50000-0x0000000004B62000-memory.dmp

    Filesize

    72KB

  • memory/996-144-0x0000000004B50000-0x0000000004B62000-memory.dmp

    Filesize

    72KB

  • memory/996-146-0x0000000004B50000-0x0000000004B62000-memory.dmp

    Filesize

    72KB

  • memory/996-134-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/996-150-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/996-149-0x0000000004B50000-0x0000000004B62000-memory.dmp

    Filesize

    72KB

  • memory/996-152-0x0000000004B50000-0x0000000004B62000-memory.dmp

    Filesize

    72KB

  • memory/996-154-0x0000000004B50000-0x0000000004B62000-memory.dmp

    Filesize

    72KB

  • memory/996-136-0x0000000002E10000-0x0000000002E2A000-memory.dmp

    Filesize

    104KB

  • memory/996-158-0x0000000004B50000-0x0000000004B62000-memory.dmp

    Filesize

    72KB

  • memory/996-160-0x0000000004B50000-0x0000000004B62000-memory.dmp

    Filesize

    72KB

  • memory/996-162-0x0000000004B50000-0x0000000004B62000-memory.dmp

    Filesize

    72KB

  • memory/996-164-0x0000000004B50000-0x0000000004B62000-memory.dmp

    Filesize

    72KB

  • memory/996-166-0x0000000004B50000-0x0000000004B62000-memory.dmp

    Filesize

    72KB

  • memory/996-168-0x0000000004B50000-0x0000000004B62000-memory.dmp

    Filesize

    72KB

  • memory/996-169-0x0000000000400000-0x0000000002B7E000-memory.dmp

    Filesize

    39.5MB

  • memory/996-170-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/996-174-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/996-173-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/996-172-0x0000000000400000-0x0000000002B7E000-memory.dmp

    Filesize

    39.5MB

  • memory/4032-1116-0x00000000003E0000-0x0000000000412000-memory.dmp

    Filesize

    200KB

  • memory/4032-1119-0x0000000005010000-0x0000000005020000-memory.dmp

    Filesize

    64KB

  • memory/4032-1118-0x0000000005010000-0x0000000005020000-memory.dmp

    Filesize

    64KB

  • memory/4032-1117-0x0000000004E20000-0x0000000004E6B000-memory.dmp

    Filesize

    300KB

  • memory/4316-181-0x00000000048E0000-0x000000000491F000-memory.dmp

    Filesize

    252KB

  • memory/4316-216-0x00000000048E0000-0x000000000491F000-memory.dmp

    Filesize

    252KB

  • memory/4316-186-0x00000000048E0000-0x000000000491F000-memory.dmp

    Filesize

    252KB

  • memory/4316-188-0x00000000048E0000-0x000000000491F000-memory.dmp

    Filesize

    252KB

  • memory/4316-190-0x00000000048E0000-0x000000000491F000-memory.dmp

    Filesize

    252KB

  • memory/4316-192-0x00000000048E0000-0x000000000491F000-memory.dmp

    Filesize

    252KB

  • memory/4316-194-0x00000000048E0000-0x000000000491F000-memory.dmp

    Filesize

    252KB

  • memory/4316-196-0x00000000048E0000-0x000000000491F000-memory.dmp

    Filesize

    252KB

  • memory/4316-198-0x00000000048E0000-0x000000000491F000-memory.dmp

    Filesize

    252KB

  • memory/4316-202-0x00000000048E0000-0x000000000491F000-memory.dmp

    Filesize

    252KB

  • memory/4316-200-0x00000000048E0000-0x000000000491F000-memory.dmp

    Filesize

    252KB

  • memory/4316-204-0x0000000002B90000-0x0000000002BDB000-memory.dmp

    Filesize

    300KB

  • memory/4316-205-0x00000000048E0000-0x000000000491F000-memory.dmp

    Filesize

    252KB

  • memory/4316-206-0x0000000007230000-0x0000000007240000-memory.dmp

    Filesize

    64KB

  • memory/4316-211-0x0000000007230000-0x0000000007240000-memory.dmp

    Filesize

    64KB

  • memory/4316-209-0x0000000007230000-0x0000000007240000-memory.dmp

    Filesize

    64KB

  • memory/4316-208-0x00000000048E0000-0x000000000491F000-memory.dmp

    Filesize

    252KB

  • memory/4316-212-0x00000000048E0000-0x000000000491F000-memory.dmp

    Filesize

    252KB

  • memory/4316-214-0x00000000048E0000-0x000000000491F000-memory.dmp

    Filesize

    252KB

  • memory/4316-184-0x00000000048E0000-0x000000000491F000-memory.dmp

    Filesize

    252KB

  • memory/4316-218-0x00000000048E0000-0x000000000491F000-memory.dmp

    Filesize

    252KB

  • memory/4316-1091-0x0000000007D50000-0x0000000008356000-memory.dmp

    Filesize

    6.0MB

  • memory/4316-1092-0x0000000007740000-0x000000000784A000-memory.dmp

    Filesize

    1.0MB

  • memory/4316-1093-0x0000000007860000-0x0000000007872000-memory.dmp

    Filesize

    72KB

  • memory/4316-1094-0x0000000007880000-0x00000000078BE000-memory.dmp

    Filesize

    248KB

  • memory/4316-1095-0x00000000079D0000-0x0000000007A1B000-memory.dmp

    Filesize

    300KB

  • memory/4316-1096-0x0000000007230000-0x0000000007240000-memory.dmp

    Filesize

    64KB

  • memory/4316-1098-0x0000000007B60000-0x0000000007BF2000-memory.dmp

    Filesize

    584KB

  • memory/4316-1099-0x0000000007C00000-0x0000000007C66000-memory.dmp

    Filesize

    408KB

  • memory/4316-1100-0x0000000007230000-0x0000000007240000-memory.dmp

    Filesize

    64KB

  • memory/4316-1101-0x0000000007230000-0x0000000007240000-memory.dmp

    Filesize

    64KB

  • memory/4316-1102-0x0000000007230000-0x0000000007240000-memory.dmp

    Filesize

    64KB

  • memory/4316-1103-0x0000000008900000-0x0000000008976000-memory.dmp

    Filesize

    472KB

  • memory/4316-1104-0x0000000008980000-0x00000000089D0000-memory.dmp

    Filesize

    320KB

  • memory/4316-182-0x00000000048E0000-0x000000000491F000-memory.dmp

    Filesize

    252KB

  • memory/4316-180-0x00000000048E0000-0x0000000004924000-memory.dmp

    Filesize

    272KB

  • memory/4316-179-0x00000000046B0000-0x00000000046F6000-memory.dmp

    Filesize

    280KB

  • memory/4316-1105-0x0000000008A00000-0x0000000008BC2000-memory.dmp

    Filesize

    1.8MB

  • memory/4316-1106-0x0000000008BE0000-0x000000000910C000-memory.dmp

    Filesize

    5.2MB

  • memory/4316-1107-0x0000000007230000-0x0000000007240000-memory.dmp

    Filesize

    64KB