Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 09:22

General

  • Target

    15151b21e3a68f48c9539938ece90443ef3db135d44dd90dd63838c44c82b125.exe

  • Size

    683KB

  • MD5

    1db3ee6150ab5e272c27150c5ff77d99

  • SHA1

    89e56a38c555de70cc073296de1266744c2abf3d

  • SHA256

    15151b21e3a68f48c9539938ece90443ef3db135d44dd90dd63838c44c82b125

  • SHA512

    fe0e2415d85446ba573207ab53baa5a2a3e063a6d93976e8a85cba496a92eab93bbc182e2277728685a93bf3402717ec7e6036d120f56cf7424bb009000af0d2

  • SSDEEP

    12288:mMrny90rYW0CB+/QMi4gW4a8HcMbT6mUsIfG0tWOJRXUnCmiL3XbXFfd:1yHWRg/QFpRakP7UDldvmiLHb1F

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

from

C2

176.113.115.145:4125

Attributes
  • auth_value

    8633e283485822a4a48f0a41d5397566

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15151b21e3a68f48c9539938ece90443ef3db135d44dd90dd63838c44c82b125.exe
    "C:\Users\Admin\AppData\Local\Temp\15151b21e3a68f48c9539938ece90443ef3db135d44dd90dd63838c44c82b125.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3632
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un926763.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un926763.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3656
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2612.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2612.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3960
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7588.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7588.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3568
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si694197.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si694197.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5012

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

2
T1089

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si694197.exe
    Filesize

    175KB

    MD5

    630c08adc5702ebb378b2a371d713d37

    SHA1

    40b309b7c409dc47936af19ff24f31d23cd24ea5

    SHA256

    c2f04baeb28e6083478be54694fbde5365d63d442857b1799ecbbabfe6a3fdd6

    SHA512

    875535c21ad6490a97e73dfb4369be5c68944c84b61c2ab8010892263502a0b92138b33894baab508a9ef5916f8768509a5dcc89d6e9174292cfca946dca4ec0

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si694197.exe
    Filesize

    175KB

    MD5

    630c08adc5702ebb378b2a371d713d37

    SHA1

    40b309b7c409dc47936af19ff24f31d23cd24ea5

    SHA256

    c2f04baeb28e6083478be54694fbde5365d63d442857b1799ecbbabfe6a3fdd6

    SHA512

    875535c21ad6490a97e73dfb4369be5c68944c84b61c2ab8010892263502a0b92138b33894baab508a9ef5916f8768509a5dcc89d6e9174292cfca946dca4ec0

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un926763.exe
    Filesize

    541KB

    MD5

    d3e940be63fe7a08fd011973f7c3a859

    SHA1

    5c1ed2a41a0eab447d63d42f9cd4fa81dcdaf659

    SHA256

    7899b4ce0de721a049428eeacf6adbaf46c7d1f5e629f57ad187616b2caadadb

    SHA512

    7d7740e9eaac4a2b5e4d459d7f59744039615aac3518c35933558152f3596feb01c62a476819dd55234ec0a0dfa15d66da404ca9a0f9e3cdb5bde2f3e5aac4a6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un926763.exe
    Filesize

    541KB

    MD5

    d3e940be63fe7a08fd011973f7c3a859

    SHA1

    5c1ed2a41a0eab447d63d42f9cd4fa81dcdaf659

    SHA256

    7899b4ce0de721a049428eeacf6adbaf46c7d1f5e629f57ad187616b2caadadb

    SHA512

    7d7740e9eaac4a2b5e4d459d7f59744039615aac3518c35933558152f3596feb01c62a476819dd55234ec0a0dfa15d66da404ca9a0f9e3cdb5bde2f3e5aac4a6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2612.exe
    Filesize

    321KB

    MD5

    3a50440b49ab053647cc3d7086a667b4

    SHA1

    2b03c9162acde40a049ac591f81bd5a718ef4ccc

    SHA256

    cd795bfe5b123ebd90670997e4a11fd1272244f3e491b2ec1ce8c5d9205f79c7

    SHA512

    710365be7343fbb280654028e73321d379e0607e8f8efbdcde489992f2734554b61a701d09ca6a326d32218392c141681a86be00e19ad47ac7611cdc8e8f1773

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2612.exe
    Filesize

    321KB

    MD5

    3a50440b49ab053647cc3d7086a667b4

    SHA1

    2b03c9162acde40a049ac591f81bd5a718ef4ccc

    SHA256

    cd795bfe5b123ebd90670997e4a11fd1272244f3e491b2ec1ce8c5d9205f79c7

    SHA512

    710365be7343fbb280654028e73321d379e0607e8f8efbdcde489992f2734554b61a701d09ca6a326d32218392c141681a86be00e19ad47ac7611cdc8e8f1773

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7588.exe
    Filesize

    380KB

    MD5

    52f4d6bef8cc1ccc9779677090328db9

    SHA1

    625460d719b64676fdef485741f9849e80aa0342

    SHA256

    7d2214f442555263a1bb80dbd6feae9c987cb4a3f1754957bfc396981679f6ca

    SHA512

    6378e660fed5ff40b00c6d19b27e61484168a314a916d7d82a30da4874645b466308f819a4d6d80427bf049036f56bbd46243f05194d9a47ec66afa7d5d82213

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7588.exe
    Filesize

    380KB

    MD5

    52f4d6bef8cc1ccc9779677090328db9

    SHA1

    625460d719b64676fdef485741f9849e80aa0342

    SHA256

    7d2214f442555263a1bb80dbd6feae9c987cb4a3f1754957bfc396981679f6ca

    SHA512

    6378e660fed5ff40b00c6d19b27e61484168a314a916d7d82a30da4874645b466308f819a4d6d80427bf049036f56bbd46243f05194d9a47ec66afa7d5d82213

  • memory/3568-1092-0x00000000076A0000-0x0000000007CA6000-memory.dmp
    Filesize

    6.0MB

  • memory/3568-219-0x0000000007110000-0x000000000714F000-memory.dmp
    Filesize

    252KB

  • memory/3568-1108-0x0000000007170000-0x0000000007180000-memory.dmp
    Filesize

    64KB

  • memory/3568-1107-0x00000000091D0000-0x0000000009220000-memory.dmp
    Filesize

    320KB

  • memory/3568-1106-0x0000000009150000-0x00000000091C6000-memory.dmp
    Filesize

    472KB

  • memory/3568-193-0x0000000007110000-0x000000000714F000-memory.dmp
    Filesize

    252KB

  • memory/3568-1105-0x0000000008AE0000-0x000000000900C000-memory.dmp
    Filesize

    5.2MB

  • memory/3568-1104-0x0000000008910000-0x0000000008AD2000-memory.dmp
    Filesize

    1.8MB

  • memory/3568-1103-0x0000000008840000-0x00000000088D2000-memory.dmp
    Filesize

    584KB

  • memory/3568-1102-0x0000000008170000-0x00000000081D6000-memory.dmp
    Filesize

    408KB

  • memory/3568-195-0x0000000007110000-0x000000000714F000-memory.dmp
    Filesize

    252KB

  • memory/3568-1101-0x0000000007170000-0x0000000007180000-memory.dmp
    Filesize

    64KB

  • memory/3568-1100-0x0000000007170000-0x0000000007180000-memory.dmp
    Filesize

    64KB

  • memory/3568-1099-0x0000000007170000-0x0000000007180000-memory.dmp
    Filesize

    64KB

  • memory/3568-1097-0x0000000007FE0000-0x000000000802B000-memory.dmp
    Filesize

    300KB

  • memory/3568-1096-0x0000000007170000-0x0000000007180000-memory.dmp
    Filesize

    64KB

  • memory/3568-1095-0x0000000007E90000-0x0000000007ECE000-memory.dmp
    Filesize

    248KB

  • memory/3568-1094-0x0000000007E70000-0x0000000007E82000-memory.dmp
    Filesize

    72KB

  • memory/3568-1093-0x0000000007D30000-0x0000000007E3A000-memory.dmp
    Filesize

    1.0MB

  • memory/3568-203-0x0000000007110000-0x000000000714F000-memory.dmp
    Filesize

    252KB

  • memory/3568-217-0x0000000007110000-0x000000000714F000-memory.dmp
    Filesize

    252KB

  • memory/3568-215-0x0000000007110000-0x000000000714F000-memory.dmp
    Filesize

    252KB

  • memory/3568-213-0x0000000007110000-0x000000000714F000-memory.dmp
    Filesize

    252KB

  • memory/3568-211-0x0000000007110000-0x000000000714F000-memory.dmp
    Filesize

    252KB

  • memory/3568-209-0x0000000007110000-0x000000000714F000-memory.dmp
    Filesize

    252KB

  • memory/3568-180-0x00000000048F0000-0x0000000004936000-memory.dmp
    Filesize

    280KB

  • memory/3568-181-0x0000000007110000-0x0000000007154000-memory.dmp
    Filesize

    272KB

  • memory/3568-182-0x0000000002B90000-0x0000000002BDB000-memory.dmp
    Filesize

    300KB

  • memory/3568-186-0x0000000007110000-0x000000000714F000-memory.dmp
    Filesize

    252KB

  • memory/3568-183-0x0000000007170000-0x0000000007180000-memory.dmp
    Filesize

    64KB

  • memory/3568-187-0x0000000007170000-0x0000000007180000-memory.dmp
    Filesize

    64KB

  • memory/3568-191-0x0000000007110000-0x000000000714F000-memory.dmp
    Filesize

    252KB

  • memory/3568-185-0x0000000007170000-0x0000000007180000-memory.dmp
    Filesize

    64KB

  • memory/3568-184-0x0000000007110000-0x000000000714F000-memory.dmp
    Filesize

    252KB

  • memory/3568-189-0x0000000007110000-0x000000000714F000-memory.dmp
    Filesize

    252KB

  • memory/3568-207-0x0000000007110000-0x000000000714F000-memory.dmp
    Filesize

    252KB

  • memory/3568-205-0x0000000007110000-0x000000000714F000-memory.dmp
    Filesize

    252KB

  • memory/3568-197-0x0000000007110000-0x000000000714F000-memory.dmp
    Filesize

    252KB

  • memory/3568-199-0x0000000007110000-0x000000000714F000-memory.dmp
    Filesize

    252KB

  • memory/3568-201-0x0000000007110000-0x000000000714F000-memory.dmp
    Filesize

    252KB

  • memory/3960-170-0x0000000000400000-0x0000000002B7E000-memory.dmp
    Filesize

    39.5MB

  • memory/3960-155-0x0000000004840000-0x0000000004852000-memory.dmp
    Filesize

    72KB

  • memory/3960-145-0x0000000004840000-0x0000000004852000-memory.dmp
    Filesize

    72KB

  • memory/3960-138-0x0000000004840000-0x0000000004858000-memory.dmp
    Filesize

    96KB

  • memory/3960-140-0x0000000004830000-0x0000000004840000-memory.dmp
    Filesize

    64KB

  • memory/3960-172-0x0000000000400000-0x0000000002B7E000-memory.dmp
    Filesize

    39.5MB

  • memory/3960-174-0x0000000004830000-0x0000000004840000-memory.dmp
    Filesize

    64KB

  • memory/3960-175-0x0000000004830000-0x0000000004840000-memory.dmp
    Filesize

    64KB

  • memory/3960-173-0x0000000004830000-0x0000000004840000-memory.dmp
    Filesize

    64KB

  • memory/3960-137-0x00000000072C0000-0x00000000077BE000-memory.dmp
    Filesize

    5.0MB

  • memory/3960-139-0x0000000004830000-0x0000000004840000-memory.dmp
    Filesize

    64KB

  • memory/3960-169-0x0000000004840000-0x0000000004852000-memory.dmp
    Filesize

    72KB

  • memory/3960-167-0x0000000004840000-0x0000000004852000-memory.dmp
    Filesize

    72KB

  • memory/3960-165-0x0000000004840000-0x0000000004852000-memory.dmp
    Filesize

    72KB

  • memory/3960-163-0x0000000004840000-0x0000000004852000-memory.dmp
    Filesize

    72KB

  • memory/3960-161-0x0000000004840000-0x0000000004852000-memory.dmp
    Filesize

    72KB

  • memory/3960-159-0x0000000004840000-0x0000000004852000-memory.dmp
    Filesize

    72KB

  • memory/3960-157-0x0000000004840000-0x0000000004852000-memory.dmp
    Filesize

    72KB

  • memory/3960-153-0x0000000004840000-0x0000000004852000-memory.dmp
    Filesize

    72KB

  • memory/3960-151-0x0000000004840000-0x0000000004852000-memory.dmp
    Filesize

    72KB

  • memory/3960-149-0x0000000004840000-0x0000000004852000-memory.dmp
    Filesize

    72KB

  • memory/3960-147-0x0000000004840000-0x0000000004852000-memory.dmp
    Filesize

    72KB

  • memory/3960-143-0x0000000004840000-0x0000000004852000-memory.dmp
    Filesize

    72KB

  • memory/3960-142-0x0000000004840000-0x0000000004852000-memory.dmp
    Filesize

    72KB

  • memory/3960-141-0x0000000004830000-0x0000000004840000-memory.dmp
    Filesize

    64KB

  • memory/3960-136-0x0000000002F20000-0x0000000002F3A000-memory.dmp
    Filesize

    104KB

  • memory/3960-135-0x00000000001D0000-0x00000000001FD000-memory.dmp
    Filesize

    180KB

  • memory/5012-1114-0x0000000000310000-0x0000000000342000-memory.dmp
    Filesize

    200KB

  • memory/5012-1115-0x0000000004D60000-0x0000000004DAB000-memory.dmp
    Filesize

    300KB

  • memory/5012-1116-0x0000000004ED0000-0x0000000004EE0000-memory.dmp
    Filesize

    64KB