Analysis

  • max time kernel
    53s
  • max time network
    71s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 10:38

General

  • Target

    095a1443813575ad4eab627591c3a6cf3ed5cfc53b4b7ee01409d333b0276687.exe

  • Size

    697KB

  • MD5

    9c48eb4f7038e477f3c56d4d9cd40d01

  • SHA1

    c2f302602c538fe7d9e6db591bcf5b28e56b6589

  • SHA256

    095a1443813575ad4eab627591c3a6cf3ed5cfc53b4b7ee01409d333b0276687

  • SHA512

    49eb7e047a090e230329c4912d1864fb172d90fe9099f474732a08a78e540be1aefb63e41c3f223ed494a4d0809f6da071d96277d348e16595bab01c95475cef

  • SSDEEP

    12288:RMrey90LA9jkKSfp8zcPR8zyWUNzlIdDyv7l1v26bL6TLGjmAxI9g34nC2:jyRkPKzyPNzNz+IsGjbI9uD2

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

muse

C2

176.113.115.145:4125

Attributes
  • auth_value

    b91988a63a24940038d9262827a5320c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\095a1443813575ad4eab627591c3a6cf3ed5cfc53b4b7ee01409d333b0276687.exe
    "C:\Users\Admin\AppData\Local\Temp\095a1443813575ad4eab627591c3a6cf3ed5cfc53b4b7ee01409d333b0276687.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5104
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un971468.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un971468.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3624
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6635.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6635.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1868
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3619.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3619.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4004
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si775319.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si775319.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1416

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si775319.exe
    Filesize

    175KB

    MD5

    1397754cfaa071b54436fbbf5f2bbcb3

    SHA1

    b0234b0efa97f9eb33b09c40defe6f117ce4e290

    SHA256

    7865cf01aaa5421db5c18a37dc4783c78d3ecae48a2f3e79d250215adf0495e8

    SHA512

    d667ad6a1fabf6220fbfa814455da0cf0cfc78878ea4c131e7eeaa15a88f3acbc06e2a244ddc5f13979527980177ebd22afcf0b2951e032f6aefc4277de66e20

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si775319.exe
    Filesize

    175KB

    MD5

    1397754cfaa071b54436fbbf5f2bbcb3

    SHA1

    b0234b0efa97f9eb33b09c40defe6f117ce4e290

    SHA256

    7865cf01aaa5421db5c18a37dc4783c78d3ecae48a2f3e79d250215adf0495e8

    SHA512

    d667ad6a1fabf6220fbfa814455da0cf0cfc78878ea4c131e7eeaa15a88f3acbc06e2a244ddc5f13979527980177ebd22afcf0b2951e032f6aefc4277de66e20

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un971468.exe
    Filesize

    555KB

    MD5

    d63179e6f52b7d0233dc67c5cb6778ec

    SHA1

    d6844a4b2e7dcd51f08de4f8fd7241b54468b8f2

    SHA256

    72a1abbcd55ecc5466075bd004efca49fb1a53b88107041ec423bf6bef287386

    SHA512

    f520b43589cf1a261515427a7c975d7ea2af1af6a48937c21f20c181bfe76bdaa6664015d553c272d7b1afe5ad54477b9274554fef65179aca89bae35de40ac5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un971468.exe
    Filesize

    555KB

    MD5

    d63179e6f52b7d0233dc67c5cb6778ec

    SHA1

    d6844a4b2e7dcd51f08de4f8fd7241b54468b8f2

    SHA256

    72a1abbcd55ecc5466075bd004efca49fb1a53b88107041ec423bf6bef287386

    SHA512

    f520b43589cf1a261515427a7c975d7ea2af1af6a48937c21f20c181bfe76bdaa6664015d553c272d7b1afe5ad54477b9274554fef65179aca89bae35de40ac5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6635.exe
    Filesize

    347KB

    MD5

    a613bb319d370b430e423a9ff3bbc687

    SHA1

    b21626e482f4811cf2ef3f45382a42a34223318b

    SHA256

    4caf11449b57782a2d4d9830ac289e8714dfd7033c84c617165100aabf869ce2

    SHA512

    613141e24e4870f6f0ab64898685a802a9cd48766cbb3a7c5c9d6c53550e61dad74b7a8cbe20742051b1bcecb6ebe27ce4a5bea681e4dc33ac73d35529a75671

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6635.exe
    Filesize

    347KB

    MD5

    a613bb319d370b430e423a9ff3bbc687

    SHA1

    b21626e482f4811cf2ef3f45382a42a34223318b

    SHA256

    4caf11449b57782a2d4d9830ac289e8714dfd7033c84c617165100aabf869ce2

    SHA512

    613141e24e4870f6f0ab64898685a802a9cd48766cbb3a7c5c9d6c53550e61dad74b7a8cbe20742051b1bcecb6ebe27ce4a5bea681e4dc33ac73d35529a75671

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3619.exe
    Filesize

    406KB

    MD5

    c440ba8486c694267005374fae06d07c

    SHA1

    891a18f218d8465d63a28464c8113264e19bfde7

    SHA256

    7660a192c54ad6e1d94d5433dc4307b258bf5ff2315c67d7d1cc474e7608624a

    SHA512

    5c386b045e1c8e6ba26b2ffa085f08240b34016e29d0499fa7ecbf689da6047786da345e0037bdaad464802643802a5e2513e820a194dfb3ffc9807e36d7001c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3619.exe
    Filesize

    406KB

    MD5

    c440ba8486c694267005374fae06d07c

    SHA1

    891a18f218d8465d63a28464c8113264e19bfde7

    SHA256

    7660a192c54ad6e1d94d5433dc4307b258bf5ff2315c67d7d1cc474e7608624a

    SHA512

    5c386b045e1c8e6ba26b2ffa085f08240b34016e29d0499fa7ecbf689da6047786da345e0037bdaad464802643802a5e2513e820a194dfb3ffc9807e36d7001c

  • memory/1416-1109-0x0000000000E40000-0x0000000000E72000-memory.dmp
    Filesize

    200KB

  • memory/1416-1110-0x0000000005740000-0x000000000578B000-memory.dmp
    Filesize

    300KB

  • memory/1416-1111-0x00000000059D0000-0x00000000059E0000-memory.dmp
    Filesize

    64KB

  • memory/1868-145-0x00000000070B0000-0x00000000070C2000-memory.dmp
    Filesize

    72KB

  • memory/1868-155-0x00000000070B0000-0x00000000070C2000-memory.dmp
    Filesize

    72KB

  • memory/1868-136-0x00000000070B0000-0x00000000070C2000-memory.dmp
    Filesize

    72KB

  • memory/1868-137-0x00000000070B0000-0x00000000070C2000-memory.dmp
    Filesize

    72KB

  • memory/1868-139-0x00000000070B0000-0x00000000070C2000-memory.dmp
    Filesize

    72KB

  • memory/1868-141-0x00000000070B0000-0x00000000070C2000-memory.dmp
    Filesize

    72KB

  • memory/1868-143-0x00000000070B0000-0x00000000070C2000-memory.dmp
    Filesize

    72KB

  • memory/1868-134-0x00000000070F0000-0x00000000075EE000-memory.dmp
    Filesize

    5.0MB

  • memory/1868-147-0x00000000070B0000-0x00000000070C2000-memory.dmp
    Filesize

    72KB

  • memory/1868-149-0x00000000070B0000-0x00000000070C2000-memory.dmp
    Filesize

    72KB

  • memory/1868-151-0x00000000070B0000-0x00000000070C2000-memory.dmp
    Filesize

    72KB

  • memory/1868-153-0x00000000070B0000-0x00000000070C2000-memory.dmp
    Filesize

    72KB

  • memory/1868-157-0x00000000070B0000-0x00000000070C2000-memory.dmp
    Filesize

    72KB

  • memory/1868-135-0x00000000070B0000-0x00000000070C8000-memory.dmp
    Filesize

    96KB

  • memory/1868-159-0x00000000070B0000-0x00000000070C2000-memory.dmp
    Filesize

    72KB

  • memory/1868-161-0x00000000070B0000-0x00000000070C2000-memory.dmp
    Filesize

    72KB

  • memory/1868-163-0x00000000070B0000-0x00000000070C2000-memory.dmp
    Filesize

    72KB

  • memory/1868-164-0x00000000070E0000-0x00000000070F0000-memory.dmp
    Filesize

    64KB

  • memory/1868-165-0x00000000070E0000-0x00000000070F0000-memory.dmp
    Filesize

    64KB

  • memory/1868-166-0x00000000070E0000-0x00000000070F0000-memory.dmp
    Filesize

    64KB

  • memory/1868-167-0x0000000000400000-0x0000000002B84000-memory.dmp
    Filesize

    39.5MB

  • memory/1868-169-0x00000000070E0000-0x00000000070F0000-memory.dmp
    Filesize

    64KB

  • memory/1868-170-0x00000000070E0000-0x00000000070F0000-memory.dmp
    Filesize

    64KB

  • memory/1868-171-0x00000000070E0000-0x00000000070F0000-memory.dmp
    Filesize

    64KB

  • memory/1868-172-0x0000000000400000-0x0000000002B84000-memory.dmp
    Filesize

    39.5MB

  • memory/1868-133-0x0000000004780000-0x000000000479A000-memory.dmp
    Filesize

    104KB

  • memory/1868-132-0x0000000002B90000-0x0000000002BBD000-memory.dmp
    Filesize

    180KB

  • memory/4004-179-0x0000000007130000-0x0000000007140000-memory.dmp
    Filesize

    64KB

  • memory/4004-180-0x0000000007680000-0x00000000076C4000-memory.dmp
    Filesize

    272KB

  • memory/4004-181-0x0000000007680000-0x00000000076BF000-memory.dmp
    Filesize

    252KB

  • memory/4004-182-0x0000000007680000-0x00000000076BF000-memory.dmp
    Filesize

    252KB

  • memory/4004-185-0x0000000007130000-0x0000000007140000-memory.dmp
    Filesize

    64KB

  • memory/4004-184-0x0000000007680000-0x00000000076BF000-memory.dmp
    Filesize

    252KB

  • memory/4004-187-0x0000000007680000-0x00000000076BF000-memory.dmp
    Filesize

    252KB

  • memory/4004-189-0x0000000007680000-0x00000000076BF000-memory.dmp
    Filesize

    252KB

  • memory/4004-191-0x0000000007680000-0x00000000076BF000-memory.dmp
    Filesize

    252KB

  • memory/4004-193-0x0000000007680000-0x00000000076BF000-memory.dmp
    Filesize

    252KB

  • memory/4004-195-0x0000000007680000-0x00000000076BF000-memory.dmp
    Filesize

    252KB

  • memory/4004-197-0x0000000007680000-0x00000000076BF000-memory.dmp
    Filesize

    252KB

  • memory/4004-199-0x0000000007680000-0x00000000076BF000-memory.dmp
    Filesize

    252KB

  • memory/4004-201-0x0000000007680000-0x00000000076BF000-memory.dmp
    Filesize

    252KB

  • memory/4004-203-0x0000000007680000-0x00000000076BF000-memory.dmp
    Filesize

    252KB

  • memory/4004-205-0x0000000007680000-0x00000000076BF000-memory.dmp
    Filesize

    252KB

  • memory/4004-207-0x0000000007680000-0x00000000076BF000-memory.dmp
    Filesize

    252KB

  • memory/4004-209-0x0000000007680000-0x00000000076BF000-memory.dmp
    Filesize

    252KB

  • memory/4004-211-0x0000000007680000-0x00000000076BF000-memory.dmp
    Filesize

    252KB

  • memory/4004-213-0x0000000007680000-0x00000000076BF000-memory.dmp
    Filesize

    252KB

  • memory/4004-215-0x0000000007680000-0x00000000076BF000-memory.dmp
    Filesize

    252KB

  • memory/4004-1088-0x0000000007E10000-0x0000000008416000-memory.dmp
    Filesize

    6.0MB

  • memory/4004-1089-0x0000000007870000-0x000000000797A000-memory.dmp
    Filesize

    1.0MB

  • memory/4004-1090-0x00000000079B0000-0x00000000079C2000-memory.dmp
    Filesize

    72KB

  • memory/4004-1091-0x00000000079D0000-0x0000000007A0E000-memory.dmp
    Filesize

    248KB

  • memory/4004-1092-0x0000000007B20000-0x0000000007B6B000-memory.dmp
    Filesize

    300KB

  • memory/4004-1093-0x0000000007130000-0x0000000007140000-memory.dmp
    Filesize

    64KB

  • memory/4004-1095-0x0000000007130000-0x0000000007140000-memory.dmp
    Filesize

    64KB

  • memory/4004-1096-0x0000000007CB0000-0x0000000007D42000-memory.dmp
    Filesize

    584KB

  • memory/4004-1097-0x0000000007D50000-0x0000000007DB6000-memory.dmp
    Filesize

    408KB

  • memory/4004-1098-0x0000000007130000-0x0000000007140000-memory.dmp
    Filesize

    64KB

  • memory/4004-1099-0x0000000008A20000-0x0000000008A96000-memory.dmp
    Filesize

    472KB

  • memory/4004-1100-0x0000000008AC0000-0x0000000008B10000-memory.dmp
    Filesize

    320KB

  • memory/4004-178-0x0000000002BE0000-0x0000000002C2B000-memory.dmp
    Filesize

    300KB

  • memory/4004-177-0x0000000004A20000-0x0000000004A66000-memory.dmp
    Filesize

    280KB

  • memory/4004-1101-0x0000000007130000-0x0000000007140000-memory.dmp
    Filesize

    64KB

  • memory/4004-1102-0x0000000008C60000-0x0000000008E22000-memory.dmp
    Filesize

    1.8MB

  • memory/4004-1103-0x0000000008E30000-0x000000000935C000-memory.dmp
    Filesize

    5.2MB