Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 08:01

General

  • Target

    20a0faac6e7adea6c66e2b98f1054e2390d0882e51384a087ad7e480f4d398c0.exe

  • Size

    684KB

  • MD5

    3f88cb36704b591c794170a1e218d38e

  • SHA1

    6fa7f1941e43f973e4389ef81167225139341037

  • SHA256

    20a0faac6e7adea6c66e2b98f1054e2390d0882e51384a087ad7e480f4d398c0

  • SHA512

    0a77f7c1b6969716cb0479632a5be3eb0e6bf9dc8680e2ec44884138f5369894c278bf8e3b5b069b986f1bd1b4a2719336ec3202defa788b8f6242cc29d1392d

  • SSDEEP

    12288:9Mr2y90j8Vsgy1O33W/TWOY85WAYM+FU48m7L3K9:jyE8GgCTW45LY/F2m7LU

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\20a0faac6e7adea6c66e2b98f1054e2390d0882e51384a087ad7e480f4d398c0.exe
    "C:\Users\Admin\AppData\Local\Temp\20a0faac6e7adea6c66e2b98f1054e2390d0882e51384a087ad7e480f4d398c0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un992148.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un992148.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2635.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2635.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3896
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5800.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5800.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4664
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si014910.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si014910.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5100

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si014910.exe
    Filesize

    175KB

    MD5

    6efa25c26be8b5c15a761d31ae6a2d44

    SHA1

    be3e836eb74fae552794b84e230bc7f944deb86b

    SHA256

    121e4e191ce00a7e9c0adecfd344c71117318aac7d2f6ca9b4f9a8cb3f7d5149

    SHA512

    14c49bfb32116a87383f19b09937e6c9a26fec71a1971a7c66fe7e01d39d1d2a5acf50d8e36f87b554a6f75c4afbd4d35895f77758e6a91b922c465a472e8223

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si014910.exe
    Filesize

    175KB

    MD5

    6efa25c26be8b5c15a761d31ae6a2d44

    SHA1

    be3e836eb74fae552794b84e230bc7f944deb86b

    SHA256

    121e4e191ce00a7e9c0adecfd344c71117318aac7d2f6ca9b4f9a8cb3f7d5149

    SHA512

    14c49bfb32116a87383f19b09937e6c9a26fec71a1971a7c66fe7e01d39d1d2a5acf50d8e36f87b554a6f75c4afbd4d35895f77758e6a91b922c465a472e8223

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un992148.exe
    Filesize

    542KB

    MD5

    c82e5814a72402533ee4cfd63b34076c

    SHA1

    7f32c7d1fda877d6ede29f240bf3c26956815563

    SHA256

    ec5672533e1e62c262c454adf5fda2f145d2574fd2e741232f245df89026a21b

    SHA512

    c7ca4712acf0d46cd618366ac8d9200e52175d06fe7b5892a50dcc5738fd58356d64f641d712bed3deed38cfab614a8cc6130d3bf07f4b1fb05fae44da8f66ae

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un992148.exe
    Filesize

    542KB

    MD5

    c82e5814a72402533ee4cfd63b34076c

    SHA1

    7f32c7d1fda877d6ede29f240bf3c26956815563

    SHA256

    ec5672533e1e62c262c454adf5fda2f145d2574fd2e741232f245df89026a21b

    SHA512

    c7ca4712acf0d46cd618366ac8d9200e52175d06fe7b5892a50dcc5738fd58356d64f641d712bed3deed38cfab614a8cc6130d3bf07f4b1fb05fae44da8f66ae

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2635.exe
    Filesize

    321KB

    MD5

    1f027f994c3237234b228f0835628b66

    SHA1

    ab7e955622a6edc99dbd3953b01a8c757ae4787f

    SHA256

    ff76f44cd32b2b5efe691d5c6d49526af3d610093ebbd13ca0325c600d9c1208

    SHA512

    838eee96ae6c8f63a28f26833b12e1cb1b69bac489c284b1b36db8bcfde8bcdbd99375c42f1c3acfa09475c04c63229e78e0cdf87de4ff5948d210affcee4ffc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2635.exe
    Filesize

    321KB

    MD5

    1f027f994c3237234b228f0835628b66

    SHA1

    ab7e955622a6edc99dbd3953b01a8c757ae4787f

    SHA256

    ff76f44cd32b2b5efe691d5c6d49526af3d610093ebbd13ca0325c600d9c1208

    SHA512

    838eee96ae6c8f63a28f26833b12e1cb1b69bac489c284b1b36db8bcfde8bcdbd99375c42f1c3acfa09475c04c63229e78e0cdf87de4ff5948d210affcee4ffc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5800.exe
    Filesize

    380KB

    MD5

    a0b5c72c4eaa8d00cc3403a9eb6e49ec

    SHA1

    5f7c3d73af2efda49e1730bcf05fe7c0fcce724a

    SHA256

    6981166f48064b6494656fd39c6a181d25e5c984e34de37ccd71567eb7075e23

    SHA512

    3cacca6e79ae67038824dd71314c43075c1b96c76e52f28a6e0adaa95b3c520acd01beaaa5b0d66d0e085e31e24997dc8603917a9a0064075068074eaeb32bbc

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5800.exe
    Filesize

    380KB

    MD5

    a0b5c72c4eaa8d00cc3403a9eb6e49ec

    SHA1

    5f7c3d73af2efda49e1730bcf05fe7c0fcce724a

    SHA256

    6981166f48064b6494656fd39c6a181d25e5c984e34de37ccd71567eb7075e23

    SHA512

    3cacca6e79ae67038824dd71314c43075c1b96c76e52f28a6e0adaa95b3c520acd01beaaa5b0d66d0e085e31e24997dc8603917a9a0064075068074eaeb32bbc

  • memory/3896-136-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/3896-137-0x0000000002DC0000-0x0000000002DDA000-memory.dmp
    Filesize

    104KB

  • memory/3896-138-0x00000000071B0000-0x00000000076AE000-memory.dmp
    Filesize

    5.0MB

  • memory/3896-139-0x0000000004840000-0x0000000004858000-memory.dmp
    Filesize

    96KB

  • memory/3896-141-0x0000000004840000-0x0000000004852000-memory.dmp
    Filesize

    72KB

  • memory/3896-140-0x0000000004840000-0x0000000004852000-memory.dmp
    Filesize

    72KB

  • memory/3896-143-0x0000000004840000-0x0000000004852000-memory.dmp
    Filesize

    72KB

  • memory/3896-145-0x0000000004840000-0x0000000004852000-memory.dmp
    Filesize

    72KB

  • memory/3896-147-0x0000000004840000-0x0000000004852000-memory.dmp
    Filesize

    72KB

  • memory/3896-149-0x0000000004840000-0x0000000004852000-memory.dmp
    Filesize

    72KB

  • memory/3896-151-0x0000000004840000-0x0000000004852000-memory.dmp
    Filesize

    72KB

  • memory/3896-153-0x0000000004840000-0x0000000004852000-memory.dmp
    Filesize

    72KB

  • memory/3896-155-0x0000000004840000-0x0000000004852000-memory.dmp
    Filesize

    72KB

  • memory/3896-157-0x0000000004840000-0x0000000004852000-memory.dmp
    Filesize

    72KB

  • memory/3896-159-0x0000000004840000-0x0000000004852000-memory.dmp
    Filesize

    72KB

  • memory/3896-161-0x0000000004840000-0x0000000004852000-memory.dmp
    Filesize

    72KB

  • memory/3896-163-0x0000000004840000-0x0000000004852000-memory.dmp
    Filesize

    72KB

  • memory/3896-165-0x0000000004840000-0x0000000004852000-memory.dmp
    Filesize

    72KB

  • memory/3896-167-0x0000000004840000-0x0000000004852000-memory.dmp
    Filesize

    72KB

  • memory/3896-169-0x00000000071A0000-0x00000000071B0000-memory.dmp
    Filesize

    64KB

  • memory/3896-168-0x00000000071A0000-0x00000000071B0000-memory.dmp
    Filesize

    64KB

  • memory/3896-170-0x00000000071A0000-0x00000000071B0000-memory.dmp
    Filesize

    64KB

  • memory/3896-171-0x0000000000400000-0x0000000002B7E000-memory.dmp
    Filesize

    39.5MB

  • memory/3896-172-0x00000000071A0000-0x00000000071B0000-memory.dmp
    Filesize

    64KB

  • memory/3896-173-0x00000000071A0000-0x00000000071B0000-memory.dmp
    Filesize

    64KB

  • memory/3896-175-0x0000000000400000-0x0000000002B7E000-memory.dmp
    Filesize

    39.5MB

  • memory/4664-180-0x0000000004A30000-0x0000000004A76000-memory.dmp
    Filesize

    280KB

  • memory/4664-181-0x0000000002CB0000-0x0000000002CFB000-memory.dmp
    Filesize

    300KB

  • memory/4664-184-0x0000000004AB0000-0x0000000004AF4000-memory.dmp
    Filesize

    272KB

  • memory/4664-183-0x00000000072E0000-0x00000000072F0000-memory.dmp
    Filesize

    64KB

  • memory/4664-185-0x00000000072E0000-0x00000000072F0000-memory.dmp
    Filesize

    64KB

  • memory/4664-182-0x00000000072E0000-0x00000000072F0000-memory.dmp
    Filesize

    64KB

  • memory/4664-186-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
    Filesize

    252KB

  • memory/4664-187-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
    Filesize

    252KB

  • memory/4664-189-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
    Filesize

    252KB

  • memory/4664-191-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
    Filesize

    252KB

  • memory/4664-193-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
    Filesize

    252KB

  • memory/4664-197-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
    Filesize

    252KB

  • memory/4664-199-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
    Filesize

    252KB

  • memory/4664-195-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
    Filesize

    252KB

  • memory/4664-201-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
    Filesize

    252KB

  • memory/4664-203-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
    Filesize

    252KB

  • memory/4664-205-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
    Filesize

    252KB

  • memory/4664-207-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
    Filesize

    252KB

  • memory/4664-209-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
    Filesize

    252KB

  • memory/4664-211-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
    Filesize

    252KB

  • memory/4664-213-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
    Filesize

    252KB

  • memory/4664-215-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
    Filesize

    252KB

  • memory/4664-217-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
    Filesize

    252KB

  • memory/4664-219-0x0000000004AB0000-0x0000000004AEF000-memory.dmp
    Filesize

    252KB

  • memory/4664-1092-0x0000000007E00000-0x0000000008406000-memory.dmp
    Filesize

    6.0MB

  • memory/4664-1093-0x00000000077F0000-0x00000000078FA000-memory.dmp
    Filesize

    1.0MB

  • memory/4664-1094-0x0000000007240000-0x0000000007252000-memory.dmp
    Filesize

    72KB

  • memory/4664-1095-0x00000000072E0000-0x00000000072F0000-memory.dmp
    Filesize

    64KB

  • memory/4664-1096-0x0000000007260000-0x000000000729E000-memory.dmp
    Filesize

    248KB

  • memory/4664-1097-0x0000000007A00000-0x0000000007A4B000-memory.dmp
    Filesize

    300KB

  • memory/4664-1099-0x00000000072E0000-0x00000000072F0000-memory.dmp
    Filesize

    64KB

  • memory/4664-1100-0x00000000072E0000-0x00000000072F0000-memory.dmp
    Filesize

    64KB

  • memory/4664-1101-0x0000000007B60000-0x0000000007BF2000-memory.dmp
    Filesize

    584KB

  • memory/4664-1102-0x0000000007C00000-0x0000000007C66000-memory.dmp
    Filesize

    408KB

  • memory/4664-1103-0x0000000008A10000-0x0000000008A86000-memory.dmp
    Filesize

    472KB

  • memory/4664-1104-0x0000000008A90000-0x0000000008AE0000-memory.dmp
    Filesize

    320KB

  • memory/4664-1105-0x0000000008C50000-0x0000000008E12000-memory.dmp
    Filesize

    1.8MB

  • memory/4664-1106-0x0000000008E20000-0x000000000934C000-memory.dmp
    Filesize

    5.2MB

  • memory/4664-1107-0x00000000072E0000-0x00000000072F0000-memory.dmp
    Filesize

    64KB

  • memory/5100-1113-0x00000000005E0000-0x0000000000612000-memory.dmp
    Filesize

    200KB

  • memory/5100-1114-0x0000000005210000-0x0000000005220000-memory.dmp
    Filesize

    64KB

  • memory/5100-1115-0x0000000005020000-0x000000000506B000-memory.dmp
    Filesize

    300KB