Analysis

  • max time kernel
    54s
  • max time network
    56s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 08:50

General

  • Target

    f0dd8f4d0c36a0e3e2a7c9f5c9a39bdaedb3864632491aa04e59bef957a9ada5.exe

  • Size

    683KB

  • MD5

    d5b62f399e3a8519aab01f34fb802d29

  • SHA1

    5a651a033550f74bad8af4eea328dfcbecb8fe5d

  • SHA256

    f0dd8f4d0c36a0e3e2a7c9f5c9a39bdaedb3864632491aa04e59bef957a9ada5

  • SHA512

    3b2881459c07de3aceded7ca905cb74d62cbeb7e35572d70499de57fe38953ddbc45bde06ddd18ab8ea405d8ba0078b78b7f93ba802c2895239031b79fe4e713

  • SSDEEP

    12288:TMrIy905N85DQOJWYdf7pbOxHbopXTsezxU/gmuL3/jO4hhj:nyQiLVmcpXTsezx7muLva4hB

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0dd8f4d0c36a0e3e2a7c9f5c9a39bdaedb3864632491aa04e59bef957a9ada5.exe
    "C:\Users\Admin\AppData\Local\Temp\f0dd8f4d0c36a0e3e2a7c9f5c9a39bdaedb3864632491aa04e59bef957a9ada5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3520
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un313536.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un313536.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4076
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9798.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9798.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3960
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6590.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6590.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4836
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si012751.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si012751.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1060

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si012751.exe
    Filesize

    175KB

    MD5

    808cb32433b6c012a40ec7f2e7394955

    SHA1

    595a482c8dd5e73964e54331aff0a86b95ccf6a2

    SHA256

    d9fb0272784ebd9bd2a052a76dac90ef56a6aff03ec52048c681f8f334dd8663

    SHA512

    17c2e3960ca9e70abddfdc90ed0a6e08f0223096e7d4549c9f96978133a408bae6c435aa289a94ddaf52f7fa959b448a2f15ba42ac0cdcbcf0e012d3ce032db3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si012751.exe
    Filesize

    175KB

    MD5

    808cb32433b6c012a40ec7f2e7394955

    SHA1

    595a482c8dd5e73964e54331aff0a86b95ccf6a2

    SHA256

    d9fb0272784ebd9bd2a052a76dac90ef56a6aff03ec52048c681f8f334dd8663

    SHA512

    17c2e3960ca9e70abddfdc90ed0a6e08f0223096e7d4549c9f96978133a408bae6c435aa289a94ddaf52f7fa959b448a2f15ba42ac0cdcbcf0e012d3ce032db3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un313536.exe
    Filesize

    541KB

    MD5

    6d7759ea1cd615bf897ce11e087640ee

    SHA1

    2ebc653ccb744ca7bd5830184258933248b553c1

    SHA256

    3a47fe9462876d61c3389dd6ee88365a979037571a1b0b09d64a3f1d4f43a05b

    SHA512

    9dbab2a989c5dc0e86a57ec0cfae9fc87ad1cf7bdfacd4b5b858f981496ebd98e071039e358ee125a43fa5cc17f392fa955391dfd2d8f1a528e091bc4a55b899

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un313536.exe
    Filesize

    541KB

    MD5

    6d7759ea1cd615bf897ce11e087640ee

    SHA1

    2ebc653ccb744ca7bd5830184258933248b553c1

    SHA256

    3a47fe9462876d61c3389dd6ee88365a979037571a1b0b09d64a3f1d4f43a05b

    SHA512

    9dbab2a989c5dc0e86a57ec0cfae9fc87ad1cf7bdfacd4b5b858f981496ebd98e071039e358ee125a43fa5cc17f392fa955391dfd2d8f1a528e091bc4a55b899

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9798.exe
    Filesize

    321KB

    MD5

    68124894b053babb1d59663b637ceed5

    SHA1

    0021ad9cfc86c85a5aa4ff1071a83a57b2804b98

    SHA256

    7b28c580570f6c8c4bd8cb91f0e9f26316610cc1f18378ab33a7161cad99e9d1

    SHA512

    342df42232da130da9411096db6d9cea4e06dc696ec07ca844e2b207bf3e1ae08326ba89aae49c2d89e3513254a9f388975c94117387c1c6d3951c206d6de36a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9798.exe
    Filesize

    321KB

    MD5

    68124894b053babb1d59663b637ceed5

    SHA1

    0021ad9cfc86c85a5aa4ff1071a83a57b2804b98

    SHA256

    7b28c580570f6c8c4bd8cb91f0e9f26316610cc1f18378ab33a7161cad99e9d1

    SHA512

    342df42232da130da9411096db6d9cea4e06dc696ec07ca844e2b207bf3e1ae08326ba89aae49c2d89e3513254a9f388975c94117387c1c6d3951c206d6de36a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6590.exe
    Filesize

    380KB

    MD5

    3652d08a86d663544b4f1a0ac3550026

    SHA1

    91fe83e79307bf28e58b19d78a293d0e8d384ace

    SHA256

    c576f522ca01c237b578f379844f61b5bf6eb68ed9ff3611c9a22fa4e90fa58c

    SHA512

    775d914f43f3a357cdb246ea0321c3a9b9125dae0b7c85065c9dce3b04eb754618a21e8d254ccc1ad531aae363bb985573a819c210bbbc6499c5c95b3b66508d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6590.exe
    Filesize

    380KB

    MD5

    3652d08a86d663544b4f1a0ac3550026

    SHA1

    91fe83e79307bf28e58b19d78a293d0e8d384ace

    SHA256

    c576f522ca01c237b578f379844f61b5bf6eb68ed9ff3611c9a22fa4e90fa58c

    SHA512

    775d914f43f3a357cdb246ea0321c3a9b9125dae0b7c85065c9dce3b04eb754618a21e8d254ccc1ad531aae363bb985573a819c210bbbc6499c5c95b3b66508d

  • memory/1060-1113-0x0000000000020000-0x0000000000052000-memory.dmp
    Filesize

    200KB

  • memory/1060-1114-0x0000000004850000-0x0000000004860000-memory.dmp
    Filesize

    64KB

  • memory/1060-1115-0x0000000004A60000-0x0000000004AAB000-memory.dmp
    Filesize

    300KB

  • memory/3960-144-0x00000000070A0000-0x00000000070B2000-memory.dmp
    Filesize

    72KB

  • memory/3960-156-0x00000000070A0000-0x00000000070B2000-memory.dmp
    Filesize

    72KB

  • memory/3960-138-0x0000000007200000-0x0000000007210000-memory.dmp
    Filesize

    64KB

  • memory/3960-139-0x0000000007200000-0x0000000007210000-memory.dmp
    Filesize

    64KB

  • memory/3960-140-0x0000000007200000-0x0000000007210000-memory.dmp
    Filesize

    64KB

  • memory/3960-141-0x00000000070A0000-0x00000000070B2000-memory.dmp
    Filesize

    72KB

  • memory/3960-142-0x00000000070A0000-0x00000000070B2000-memory.dmp
    Filesize

    72KB

  • memory/3960-136-0x00000000070A0000-0x00000000070B8000-memory.dmp
    Filesize

    96KB

  • memory/3960-146-0x00000000070A0000-0x00000000070B2000-memory.dmp
    Filesize

    72KB

  • memory/3960-148-0x00000000070A0000-0x00000000070B2000-memory.dmp
    Filesize

    72KB

  • memory/3960-150-0x00000000070A0000-0x00000000070B2000-memory.dmp
    Filesize

    72KB

  • memory/3960-152-0x00000000070A0000-0x00000000070B2000-memory.dmp
    Filesize

    72KB

  • memory/3960-154-0x00000000070A0000-0x00000000070B2000-memory.dmp
    Filesize

    72KB

  • memory/3960-137-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/3960-158-0x00000000070A0000-0x00000000070B2000-memory.dmp
    Filesize

    72KB

  • memory/3960-160-0x00000000070A0000-0x00000000070B2000-memory.dmp
    Filesize

    72KB

  • memory/3960-162-0x00000000070A0000-0x00000000070B2000-memory.dmp
    Filesize

    72KB

  • memory/3960-164-0x00000000070A0000-0x00000000070B2000-memory.dmp
    Filesize

    72KB

  • memory/3960-166-0x00000000070A0000-0x00000000070B2000-memory.dmp
    Filesize

    72KB

  • memory/3960-168-0x00000000070A0000-0x00000000070B2000-memory.dmp
    Filesize

    72KB

  • memory/3960-169-0x0000000000400000-0x0000000002B7E000-memory.dmp
    Filesize

    39.5MB

  • memory/3960-171-0x0000000007200000-0x0000000007210000-memory.dmp
    Filesize

    64KB

  • memory/3960-170-0x0000000007200000-0x0000000007210000-memory.dmp
    Filesize

    64KB

  • memory/3960-172-0x0000000007200000-0x0000000007210000-memory.dmp
    Filesize

    64KB

  • memory/3960-174-0x0000000000400000-0x0000000002B7E000-memory.dmp
    Filesize

    39.5MB

  • memory/3960-135-0x0000000007210000-0x000000000770E000-memory.dmp
    Filesize

    5.0MB

  • memory/3960-134-0x0000000004BD0000-0x0000000004BEA000-memory.dmp
    Filesize

    104KB

  • memory/4836-181-0x0000000004920000-0x000000000495F000-memory.dmp
    Filesize

    252KB

  • memory/4836-214-0x0000000004920000-0x000000000495F000-memory.dmp
    Filesize

    252KB

  • memory/4836-184-0x0000000004920000-0x000000000495F000-memory.dmp
    Filesize

    252KB

  • memory/4836-186-0x0000000004920000-0x000000000495F000-memory.dmp
    Filesize

    252KB

  • memory/4836-187-0x0000000002C60000-0x0000000002CAB000-memory.dmp
    Filesize

    300KB

  • memory/4836-190-0x0000000004920000-0x000000000495F000-memory.dmp
    Filesize

    252KB

  • memory/4836-191-0x00000000071A0000-0x00000000071B0000-memory.dmp
    Filesize

    64KB

  • memory/4836-193-0x00000000071A0000-0x00000000071B0000-memory.dmp
    Filesize

    64KB

  • memory/4836-194-0x0000000004920000-0x000000000495F000-memory.dmp
    Filesize

    252KB

  • memory/4836-189-0x00000000071A0000-0x00000000071B0000-memory.dmp
    Filesize

    64KB

  • memory/4836-196-0x0000000004920000-0x000000000495F000-memory.dmp
    Filesize

    252KB

  • memory/4836-198-0x0000000004920000-0x000000000495F000-memory.dmp
    Filesize

    252KB

  • memory/4836-200-0x0000000004920000-0x000000000495F000-memory.dmp
    Filesize

    252KB

  • memory/4836-202-0x0000000004920000-0x000000000495F000-memory.dmp
    Filesize

    252KB

  • memory/4836-204-0x0000000004920000-0x000000000495F000-memory.dmp
    Filesize

    252KB

  • memory/4836-206-0x0000000004920000-0x000000000495F000-memory.dmp
    Filesize

    252KB

  • memory/4836-208-0x0000000004920000-0x000000000495F000-memory.dmp
    Filesize

    252KB

  • memory/4836-210-0x0000000004920000-0x000000000495F000-memory.dmp
    Filesize

    252KB

  • memory/4836-212-0x0000000004920000-0x000000000495F000-memory.dmp
    Filesize

    252KB

  • memory/4836-182-0x0000000004920000-0x000000000495F000-memory.dmp
    Filesize

    252KB

  • memory/4836-216-0x0000000004920000-0x000000000495F000-memory.dmp
    Filesize

    252KB

  • memory/4836-218-0x0000000004920000-0x000000000495F000-memory.dmp
    Filesize

    252KB

  • memory/4836-1091-0x0000000007E00000-0x0000000008406000-memory.dmp
    Filesize

    6.0MB

  • memory/4836-1092-0x0000000007860000-0x000000000796A000-memory.dmp
    Filesize

    1.0MB

  • memory/4836-1093-0x00000000079A0000-0x00000000079B2000-memory.dmp
    Filesize

    72KB

  • memory/4836-1094-0x00000000079C0000-0x00000000079FE000-memory.dmp
    Filesize

    248KB

  • memory/4836-1095-0x0000000007B50000-0x0000000007B9B000-memory.dmp
    Filesize

    300KB

  • memory/4836-1096-0x00000000071A0000-0x00000000071B0000-memory.dmp
    Filesize

    64KB

  • memory/4836-1098-0x0000000007CA0000-0x0000000007D06000-memory.dmp
    Filesize

    408KB

  • memory/4836-1099-0x0000000008990000-0x0000000008A22000-memory.dmp
    Filesize

    584KB

  • memory/4836-1100-0x0000000008A30000-0x0000000008AA6000-memory.dmp
    Filesize

    472KB

  • memory/4836-1101-0x0000000008AB0000-0x0000000008B00000-memory.dmp
    Filesize

    320KB

  • memory/4836-1102-0x00000000071A0000-0x00000000071B0000-memory.dmp
    Filesize

    64KB

  • memory/4836-1103-0x00000000071A0000-0x00000000071B0000-memory.dmp
    Filesize

    64KB

  • memory/4836-1104-0x00000000071A0000-0x00000000071B0000-memory.dmp
    Filesize

    64KB

  • memory/4836-180-0x0000000004920000-0x0000000004964000-memory.dmp
    Filesize

    272KB

  • memory/4836-179-0x0000000004840000-0x0000000004886000-memory.dmp
    Filesize

    280KB

  • memory/4836-1105-0x0000000008D90000-0x0000000008F52000-memory.dmp
    Filesize

    1.8MB

  • memory/4836-1106-0x0000000008F60000-0x000000000948C000-memory.dmp
    Filesize

    5.2MB

  • memory/4836-1107-0x00000000071A0000-0x00000000071B0000-memory.dmp
    Filesize

    64KB