Analysis

  • max time kernel
    57s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 08:38

General

  • Target

    022e80b81a2eb0d56295a7d19152b7a87bd6ca0d60c3362010f6b8db119d077f.exe

  • Size

    686KB

  • MD5

    e2710ba609de1d951678ac1e0b8d7b18

  • SHA1

    b8e737c9ea3a870fd8753bc0b0e8d82e2d21a87d

  • SHA256

    022e80b81a2eb0d56295a7d19152b7a87bd6ca0d60c3362010f6b8db119d077f

  • SHA512

    57930d8967bc0fc737038443dccbd7ac4e7e715fc1e9dd3dae334839c424a0538f7823ff556af76e6dd44b15983dc08f6cd87910b7c10feede0297abfcbac5c6

  • SSDEEP

    12288:gMrNy90QvpESxst9izGR6yjg8vA5OtMR2uDUd1uXI7r8fA1r:9yBvpt2tozGTjgL5gO9DKuXywf4r

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\022e80b81a2eb0d56295a7d19152b7a87bd6ca0d60c3362010f6b8db119d077f.exe
    "C:\Users\Admin\AppData\Local\Temp\022e80b81a2eb0d56295a7d19152b7a87bd6ca0d60c3362010f6b8db119d077f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un226450.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un226450.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2608
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2420.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2420.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1508
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4712.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4712.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2812
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si693769.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si693769.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2900

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si693769.exe
    Filesize

    175KB

    MD5

    e379d153fe5db50462570400bb833c1b

    SHA1

    869abf85028f78c96c2bcf0aab6c210fd216ac52

    SHA256

    a4f2d143023f1a748fe7477f9edb80b04a3ced9f335dd4e38f90eb98be0917f2

    SHA512

    3bed30b273011b0c24baa783d30b8980788e34fafa6e3b7e50deddbd7da4c3c81d76fd52c59059fd1b00fca19489612a04ea367ba698ba5be7b2bcdce9c0be92

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si693769.exe
    Filesize

    175KB

    MD5

    e379d153fe5db50462570400bb833c1b

    SHA1

    869abf85028f78c96c2bcf0aab6c210fd216ac52

    SHA256

    a4f2d143023f1a748fe7477f9edb80b04a3ced9f335dd4e38f90eb98be0917f2

    SHA512

    3bed30b273011b0c24baa783d30b8980788e34fafa6e3b7e50deddbd7da4c3c81d76fd52c59059fd1b00fca19489612a04ea367ba698ba5be7b2bcdce9c0be92

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un226450.exe
    Filesize

    545KB

    MD5

    dc6a531cbbbcedc99e32ff6090e6e3db

    SHA1

    dcfd6ae71c020e1a5d530de0c948933b8978c0c2

    SHA256

    75538c7f1a8b772c7f58c330511be6f421da5cc5f859bb05e710252d079bd7a1

    SHA512

    9fa0326257627167d80237b7ecd23689908b3e192c2c1bd466a6dd940172854a70a449861e6fecc947c5475dfda082712e4a3f2e0318cbdb93555b5d350f1eda

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un226450.exe
    Filesize

    545KB

    MD5

    dc6a531cbbbcedc99e32ff6090e6e3db

    SHA1

    dcfd6ae71c020e1a5d530de0c948933b8978c0c2

    SHA256

    75538c7f1a8b772c7f58c330511be6f421da5cc5f859bb05e710252d079bd7a1

    SHA512

    9fa0326257627167d80237b7ecd23689908b3e192c2c1bd466a6dd940172854a70a449861e6fecc947c5475dfda082712e4a3f2e0318cbdb93555b5d350f1eda

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2420.exe
    Filesize

    321KB

    MD5

    0524ab5dfdefcdbcf8fe67f9ef798a9c

    SHA1

    95a21c72b65d51b03a2a033e2ff4c8debf2b9689

    SHA256

    7284e0d570e922446551422a14251ef343b68954724f9b3d8dc245be57f28083

    SHA512

    356a4b246cadde50845720ad2133665d55724ba0c1146860591e5bed2cf55ffd92f4f22d3da66fce369fb747dcc922d08c1ab9c64e41758b5281ffee112d7995

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2420.exe
    Filesize

    321KB

    MD5

    0524ab5dfdefcdbcf8fe67f9ef798a9c

    SHA1

    95a21c72b65d51b03a2a033e2ff4c8debf2b9689

    SHA256

    7284e0d570e922446551422a14251ef343b68954724f9b3d8dc245be57f28083

    SHA512

    356a4b246cadde50845720ad2133665d55724ba0c1146860591e5bed2cf55ffd92f4f22d3da66fce369fb747dcc922d08c1ab9c64e41758b5281ffee112d7995

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4712.exe
    Filesize

    380KB

    MD5

    82781654dadcdc5f7fc19f218477e3ba

    SHA1

    8a85820bfe3cd0ecacbe9b593541367565499253

    SHA256

    2e6c0211566b3c63204ad86ac82e3721fb9413926dd4aa103031041125918f8f

    SHA512

    d6ee2d2b90800964492660e3a78552085e04dc8892844505e35b0dd86b96093df4d5192fd75f0c0172715b26c1f9cff3b7ee2e71c3f4d2c23d97076259271c90

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4712.exe
    Filesize

    380KB

    MD5

    82781654dadcdc5f7fc19f218477e3ba

    SHA1

    8a85820bfe3cd0ecacbe9b593541367565499253

    SHA256

    2e6c0211566b3c63204ad86ac82e3721fb9413926dd4aa103031041125918f8f

    SHA512

    d6ee2d2b90800964492660e3a78552085e04dc8892844505e35b0dd86b96093df4d5192fd75f0c0172715b26c1f9cff3b7ee2e71c3f4d2c23d97076259271c90

  • memory/1508-135-0x0000000002D90000-0x0000000002DAA000-memory.dmp
    Filesize

    104KB

  • memory/1508-136-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/1508-137-0x0000000004BF0000-0x0000000004C00000-memory.dmp
    Filesize

    64KB

  • memory/1508-138-0x0000000007260000-0x000000000775E000-memory.dmp
    Filesize

    5.0MB

  • memory/1508-139-0x0000000004940000-0x0000000004958000-memory.dmp
    Filesize

    96KB

  • memory/1508-140-0x0000000004940000-0x0000000004952000-memory.dmp
    Filesize

    72KB

  • memory/1508-141-0x0000000004940000-0x0000000004952000-memory.dmp
    Filesize

    72KB

  • memory/1508-149-0x0000000004940000-0x0000000004952000-memory.dmp
    Filesize

    72KB

  • memory/1508-147-0x0000000004940000-0x0000000004952000-memory.dmp
    Filesize

    72KB

  • memory/1508-145-0x0000000004940000-0x0000000004952000-memory.dmp
    Filesize

    72KB

  • memory/1508-143-0x0000000004940000-0x0000000004952000-memory.dmp
    Filesize

    72KB

  • memory/1508-151-0x0000000004940000-0x0000000004952000-memory.dmp
    Filesize

    72KB

  • memory/1508-153-0x0000000004940000-0x0000000004952000-memory.dmp
    Filesize

    72KB

  • memory/1508-155-0x0000000004940000-0x0000000004952000-memory.dmp
    Filesize

    72KB

  • memory/1508-157-0x0000000004940000-0x0000000004952000-memory.dmp
    Filesize

    72KB

  • memory/1508-159-0x0000000004940000-0x0000000004952000-memory.dmp
    Filesize

    72KB

  • memory/1508-161-0x0000000004940000-0x0000000004952000-memory.dmp
    Filesize

    72KB

  • memory/1508-163-0x0000000004940000-0x0000000004952000-memory.dmp
    Filesize

    72KB

  • memory/1508-165-0x0000000004940000-0x0000000004952000-memory.dmp
    Filesize

    72KB

  • memory/1508-167-0x0000000004940000-0x0000000004952000-memory.dmp
    Filesize

    72KB

  • memory/1508-168-0x0000000004BF0000-0x0000000004C00000-memory.dmp
    Filesize

    64KB

  • memory/1508-169-0x0000000004BF0000-0x0000000004C00000-memory.dmp
    Filesize

    64KB

  • memory/1508-170-0x0000000000400000-0x0000000002B7E000-memory.dmp
    Filesize

    39.5MB

  • memory/1508-171-0x0000000004BF0000-0x0000000004C00000-memory.dmp
    Filesize

    64KB

  • memory/1508-175-0x0000000004BF0000-0x0000000004C00000-memory.dmp
    Filesize

    64KB

  • memory/1508-173-0x0000000000400000-0x0000000002B7E000-memory.dmp
    Filesize

    39.5MB

  • memory/1508-174-0x0000000004BF0000-0x0000000004C00000-memory.dmp
    Filesize

    64KB

  • memory/2812-180-0x0000000002DC0000-0x0000000002E0B000-memory.dmp
    Filesize

    300KB

  • memory/2812-181-0x0000000004AE0000-0x0000000004B26000-memory.dmp
    Filesize

    280KB

  • memory/2812-182-0x0000000007650000-0x0000000007694000-memory.dmp
    Filesize

    272KB

  • memory/2812-183-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/2812-184-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/2812-186-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/2812-188-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/2812-190-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/2812-192-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/2812-194-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/2812-196-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/2812-198-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/2812-200-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/2812-202-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/2812-204-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/2812-206-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/2812-208-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/2812-210-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/2812-213-0x0000000007140000-0x0000000007150000-memory.dmp
    Filesize

    64KB

  • memory/2812-212-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/2812-216-0x0000000007140000-0x0000000007150000-memory.dmp
    Filesize

    64KB

  • memory/2812-217-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/2812-215-0x0000000007140000-0x0000000007150000-memory.dmp
    Filesize

    64KB

  • memory/2812-219-0x0000000007650000-0x000000000768F000-memory.dmp
    Filesize

    252KB

  • memory/2812-1092-0x0000000007DF0000-0x00000000083F6000-memory.dmp
    Filesize

    6.0MB

  • memory/2812-1093-0x0000000007860000-0x000000000796A000-memory.dmp
    Filesize

    1.0MB

  • memory/2812-1094-0x00000000079A0000-0x00000000079B2000-memory.dmp
    Filesize

    72KB

  • memory/2812-1095-0x00000000079C0000-0x00000000079FE000-memory.dmp
    Filesize

    248KB

  • memory/2812-1096-0x0000000007B10000-0x0000000007B5B000-memory.dmp
    Filesize

    300KB

  • memory/2812-1097-0x0000000007140000-0x0000000007150000-memory.dmp
    Filesize

    64KB

  • memory/2812-1099-0x0000000007CA0000-0x0000000007D32000-memory.dmp
    Filesize

    584KB

  • memory/2812-1100-0x0000000007D40000-0x0000000007DA6000-memory.dmp
    Filesize

    408KB

  • memory/2812-1101-0x0000000008A50000-0x0000000008C12000-memory.dmp
    Filesize

    1.8MB

  • memory/2812-1102-0x0000000008C20000-0x000000000914C000-memory.dmp
    Filesize

    5.2MB

  • memory/2812-1103-0x0000000009390000-0x0000000009406000-memory.dmp
    Filesize

    472KB

  • memory/2812-1104-0x0000000007140000-0x0000000007150000-memory.dmp
    Filesize

    64KB

  • memory/2812-1106-0x0000000009410000-0x0000000009460000-memory.dmp
    Filesize

    320KB

  • memory/2812-1105-0x0000000007140000-0x0000000007150000-memory.dmp
    Filesize

    64KB

  • memory/2812-1107-0x0000000007140000-0x0000000007150000-memory.dmp
    Filesize

    64KB

  • memory/2812-1108-0x0000000007140000-0x0000000007150000-memory.dmp
    Filesize

    64KB

  • memory/2900-1114-0x0000000000160000-0x0000000000192000-memory.dmp
    Filesize

    200KB

  • memory/2900-1115-0x0000000004A40000-0x0000000004A8B000-memory.dmp
    Filesize

    300KB

  • memory/2900-1116-0x00000000049D0000-0x00000000049E0000-memory.dmp
    Filesize

    64KB