Analysis

  • max time kernel
    138s
  • max time network
    142s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 10:19

General

  • Target

    4d0372e613238ed9f9510b37d7c4bf9bedbd5f1087479b3aa70cfe651e181239.exe

  • Size

    699KB

  • MD5

    04369ad905b3fd71bc450e1c372d5fed

  • SHA1

    838ba1d729d94d16c75afd6b288c984dff033609

  • SHA256

    4d0372e613238ed9f9510b37d7c4bf9bedbd5f1087479b3aa70cfe651e181239

  • SHA512

    867cd9ab74f55ac93d385c5920be7453d6b4297d979689017133b0c73910781d4644d73172d79a08af8b8fa99bec98cd4e60e4b01ce7e4ce349565d7c2c23bc9

  • SSDEEP

    12288:uMrvy90PrsSMhHU06/yjylYTlkVxcckvfMCnZDJmzFEYrM+CwyfwHJm6hiGjqyxN:RySnMiyjvxWcNvbn5J8hM0owsLGjVv9T

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

muse

C2

176.113.115.145:4125

Attributes
  • auth_value

    b91988a63a24940038d9262827a5320c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d0372e613238ed9f9510b37d7c4bf9bedbd5f1087479b3aa70cfe651e181239.exe
    "C:\Users\Admin\AppData\Local\Temp\4d0372e613238ed9f9510b37d7c4bf9bedbd5f1087479b3aa70cfe651e181239.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2896
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un693252.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un693252.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4032
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6589.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6589.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4292
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7926.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7926.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2848
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si329266.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si329266.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4596

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si329266.exe
    Filesize

    175KB

    MD5

    41623a8dddb5d19472c96ea68f063cb3

    SHA1

    11b6c7b6b20b2fa25f5b842aa5572558a3d9bf06

    SHA256

    a38c45f0bae4486ae45a752b287e587791f8233b0df797ea0c47bd632cff808a

    SHA512

    9650cf41516b7dc6ad3c86a5f9c0771489b8f5e10ecadcb0704bfc30ce31133f5b0f0db761f1ed88c625ec43feab1ca6d0a81ba2b077da2e35800c86a4a3d4fa

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si329266.exe
    Filesize

    175KB

    MD5

    41623a8dddb5d19472c96ea68f063cb3

    SHA1

    11b6c7b6b20b2fa25f5b842aa5572558a3d9bf06

    SHA256

    a38c45f0bae4486ae45a752b287e587791f8233b0df797ea0c47bd632cff808a

    SHA512

    9650cf41516b7dc6ad3c86a5f9c0771489b8f5e10ecadcb0704bfc30ce31133f5b0f0db761f1ed88c625ec43feab1ca6d0a81ba2b077da2e35800c86a4a3d4fa

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un693252.exe
    Filesize

    558KB

    MD5

    c910fbec2d120c8162569c157164cd3c

    SHA1

    5371ed55c0df2e35aa0dadd6c95d8d726413e22d

    SHA256

    64199de5437474450ad19f3b1a70d56c779a59a576c5be720e7fa51ced90b26e

    SHA512

    1bcbf6d4b558c0ad2455d344c8b46df209a7d848e6224fd8ea9a38a277e8c7830b9b256f8f99ec42eca6e185a27822e3964433592321f7fb499d11521e77743e

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un693252.exe
    Filesize

    558KB

    MD5

    c910fbec2d120c8162569c157164cd3c

    SHA1

    5371ed55c0df2e35aa0dadd6c95d8d726413e22d

    SHA256

    64199de5437474450ad19f3b1a70d56c779a59a576c5be720e7fa51ced90b26e

    SHA512

    1bcbf6d4b558c0ad2455d344c8b46df209a7d848e6224fd8ea9a38a277e8c7830b9b256f8f99ec42eca6e185a27822e3964433592321f7fb499d11521e77743e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6589.exe
    Filesize

    322KB

    MD5

    58bea7d0275985ccd2bdd36fe8c7562b

    SHA1

    61e8d547da0814709bb636368697e2645e808d81

    SHA256

    cb7b9927073250bb7c8e3c9352074e46d26724e31b143522ec8a740904430301

    SHA512

    8cd2abac9717c8aab9c069d869edb8bf00e74dc1de4ed7b0cd3e352145d2b78a3c9a99a33ff603e9cca7746d71e81af564327e4f50156d6b804f6781ddae4ad9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6589.exe
    Filesize

    322KB

    MD5

    58bea7d0275985ccd2bdd36fe8c7562b

    SHA1

    61e8d547da0814709bb636368697e2645e808d81

    SHA256

    cb7b9927073250bb7c8e3c9352074e46d26724e31b143522ec8a740904430301

    SHA512

    8cd2abac9717c8aab9c069d869edb8bf00e74dc1de4ed7b0cd3e352145d2b78a3c9a99a33ff603e9cca7746d71e81af564327e4f50156d6b804f6781ddae4ad9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7926.exe
    Filesize

    406KB

    MD5

    036415dea39928ac7398645196727613

    SHA1

    1dd10c955bbe067c5580922c5d6564e303e861df

    SHA256

    d01f705ef98abaab024148a351d39d2755310daf0567e69674236129f7bfc05e

    SHA512

    85302119b7018841ba6d39309dd84af0bfcaf5fd83c3f4c6e2c574c227e143a4db026ddb793596cc3773e930863011f20c570cf211ff2733f00ca561972ed287

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7926.exe
    Filesize

    406KB

    MD5

    036415dea39928ac7398645196727613

    SHA1

    1dd10c955bbe067c5580922c5d6564e303e861df

    SHA256

    d01f705ef98abaab024148a351d39d2755310daf0567e69674236129f7bfc05e

    SHA512

    85302119b7018841ba6d39309dd84af0bfcaf5fd83c3f4c6e2c574c227e143a4db026ddb793596cc3773e930863011f20c570cf211ff2733f00ca561972ed287

  • memory/2848-1093-0x0000000007CC0000-0x00000000082C6000-memory.dmp
    Filesize

    6.0MB

  • memory/2848-220-0x0000000007610000-0x000000000764F000-memory.dmp
    Filesize

    252KB

  • memory/2848-192-0x0000000007610000-0x000000000764F000-memory.dmp
    Filesize

    252KB

  • memory/2848-1108-0x0000000008F70000-0x000000000949C000-memory.dmp
    Filesize

    5.2MB

  • memory/2848-1107-0x0000000008DA0000-0x0000000008F62000-memory.dmp
    Filesize

    1.8MB

  • memory/2848-198-0x0000000007610000-0x000000000764F000-memory.dmp
    Filesize

    252KB

  • memory/2848-1106-0x0000000008D30000-0x0000000008D80000-memory.dmp
    Filesize

    320KB

  • memory/2848-1105-0x0000000008CA0000-0x0000000008D16000-memory.dmp
    Filesize

    472KB

  • memory/2848-1104-0x0000000007C10000-0x0000000007C76000-memory.dmp
    Filesize

    408KB

  • memory/2848-199-0x00000000049E0000-0x00000000049F0000-memory.dmp
    Filesize

    64KB

  • memory/2848-1103-0x00000000049E0000-0x00000000049F0000-memory.dmp
    Filesize

    64KB

  • memory/2848-1102-0x00000000049E0000-0x00000000049F0000-memory.dmp
    Filesize

    64KB

  • memory/2848-1101-0x00000000049E0000-0x00000000049F0000-memory.dmp
    Filesize

    64KB

  • memory/2848-1100-0x0000000007B70000-0x0000000007C02000-memory.dmp
    Filesize

    584KB

  • memory/2848-1098-0x00000000079E0000-0x0000000007A2B000-memory.dmp
    Filesize

    300KB

  • memory/2848-1096-0x00000000049E0000-0x00000000049F0000-memory.dmp
    Filesize

    64KB

  • memory/2848-1097-0x0000000007890000-0x00000000078CE000-memory.dmp
    Filesize

    248KB

  • memory/2848-1095-0x0000000007870000-0x0000000007882000-memory.dmp
    Filesize

    72KB

  • memory/2848-1094-0x0000000007730000-0x000000000783A000-memory.dmp
    Filesize

    1.0MB

  • memory/2848-201-0x00000000049E0000-0x00000000049F0000-memory.dmp
    Filesize

    64KB

  • memory/2848-218-0x0000000007610000-0x000000000764F000-memory.dmp
    Filesize

    252KB

  • memory/2848-216-0x0000000007610000-0x000000000764F000-memory.dmp
    Filesize

    252KB

  • memory/2848-214-0x0000000007610000-0x000000000764F000-memory.dmp
    Filesize

    252KB

  • memory/2848-212-0x0000000007610000-0x000000000764F000-memory.dmp
    Filesize

    252KB

  • memory/2848-210-0x0000000007610000-0x000000000764F000-memory.dmp
    Filesize

    252KB

  • memory/2848-181-0x0000000004C00000-0x0000000004C46000-memory.dmp
    Filesize

    280KB

  • memory/2848-182-0x0000000007610000-0x0000000007654000-memory.dmp
    Filesize

    272KB

  • memory/2848-184-0x0000000007610000-0x000000000764F000-memory.dmp
    Filesize

    252KB

  • memory/2848-186-0x0000000007610000-0x000000000764F000-memory.dmp
    Filesize

    252KB

  • memory/2848-183-0x0000000007610000-0x000000000764F000-memory.dmp
    Filesize

    252KB

  • memory/2848-188-0x0000000007610000-0x000000000764F000-memory.dmp
    Filesize

    252KB

  • memory/2848-190-0x0000000007610000-0x000000000764F000-memory.dmp
    Filesize

    252KB

  • memory/2848-194-0x0000000007610000-0x000000000764F000-memory.dmp
    Filesize

    252KB

  • memory/2848-196-0x0000000002C70000-0x0000000002CBB000-memory.dmp
    Filesize

    300KB

  • memory/2848-208-0x0000000007610000-0x000000000764F000-memory.dmp
    Filesize

    252KB

  • memory/2848-206-0x0000000007610000-0x000000000764F000-memory.dmp
    Filesize

    252KB

  • memory/2848-204-0x0000000007610000-0x000000000764F000-memory.dmp
    Filesize

    252KB

  • memory/2848-197-0x00000000049E0000-0x00000000049F0000-memory.dmp
    Filesize

    64KB

  • memory/2848-202-0x0000000007610000-0x000000000764F000-memory.dmp
    Filesize

    252KB

  • memory/4292-171-0x0000000000400000-0x0000000002B7E000-memory.dmp
    Filesize

    39.5MB

  • memory/4292-154-0x0000000004A00000-0x0000000004A12000-memory.dmp
    Filesize

    72KB

  • memory/4292-146-0x0000000004A00000-0x0000000004A12000-memory.dmp
    Filesize

    72KB

  • memory/4292-136-0x0000000002C50000-0x0000000002C7D000-memory.dmp
    Filesize

    180KB

  • memory/4292-139-0x0000000004A00000-0x0000000004A18000-memory.dmp
    Filesize

    96KB

  • memory/4292-140-0x00000000072B0000-0x00000000072C0000-memory.dmp
    Filesize

    64KB

  • memory/4292-176-0x0000000000400000-0x0000000002B7E000-memory.dmp
    Filesize

    39.5MB

  • memory/4292-175-0x00000000072B0000-0x00000000072C0000-memory.dmp
    Filesize

    64KB

  • memory/4292-173-0x00000000072B0000-0x00000000072C0000-memory.dmp
    Filesize

    64KB

  • memory/4292-172-0x00000000072B0000-0x00000000072C0000-memory.dmp
    Filesize

    64KB

  • memory/4292-138-0x00000000072C0000-0x00000000077BE000-memory.dmp
    Filesize

    5.0MB

  • memory/4292-141-0x00000000072B0000-0x00000000072C0000-memory.dmp
    Filesize

    64KB

  • memory/4292-170-0x0000000004A00000-0x0000000004A12000-memory.dmp
    Filesize

    72KB

  • memory/4292-168-0x0000000004A00000-0x0000000004A12000-memory.dmp
    Filesize

    72KB

  • memory/4292-166-0x0000000004A00000-0x0000000004A12000-memory.dmp
    Filesize

    72KB

  • memory/4292-164-0x0000000004A00000-0x0000000004A12000-memory.dmp
    Filesize

    72KB

  • memory/4292-162-0x0000000004A00000-0x0000000004A12000-memory.dmp
    Filesize

    72KB

  • memory/4292-160-0x0000000004A00000-0x0000000004A12000-memory.dmp
    Filesize

    72KB

  • memory/4292-158-0x0000000004A00000-0x0000000004A12000-memory.dmp
    Filesize

    72KB

  • memory/4292-156-0x0000000004A00000-0x0000000004A12000-memory.dmp
    Filesize

    72KB

  • memory/4292-152-0x0000000004A00000-0x0000000004A12000-memory.dmp
    Filesize

    72KB

  • memory/4292-150-0x0000000004A00000-0x0000000004A12000-memory.dmp
    Filesize

    72KB

  • memory/4292-148-0x0000000004A00000-0x0000000004A12000-memory.dmp
    Filesize

    72KB

  • memory/4292-144-0x0000000004A00000-0x0000000004A12000-memory.dmp
    Filesize

    72KB

  • memory/4292-143-0x0000000004A00000-0x0000000004A12000-memory.dmp
    Filesize

    72KB

  • memory/4292-137-0x00000000047A0000-0x00000000047BA000-memory.dmp
    Filesize

    104KB

  • memory/4292-142-0x00000000072B0000-0x00000000072C0000-memory.dmp
    Filesize

    64KB

  • memory/4596-1114-0x0000000000660000-0x0000000000692000-memory.dmp
    Filesize

    200KB

  • memory/4596-1115-0x0000000004F70000-0x0000000004FBB000-memory.dmp
    Filesize

    300KB

  • memory/4596-1116-0x00000000051F0000-0x0000000005200000-memory.dmp
    Filesize

    64KB