Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28-03-2023 11:37

General

  • Target

    36e2e68a5c0694215ff50f19447e46f3797c3d3dfa606213d2c5a116c8f3d82c.exe

  • Size

    697KB

  • MD5

    4c53a908d7e2c2cf74bd4ae174f19e4f

  • SHA1

    1c32a5b1b5a8ab1ffc1cc0077115d2e899622e14

  • SHA256

    36e2e68a5c0694215ff50f19447e46f3797c3d3dfa606213d2c5a116c8f3d82c

  • SHA512

    edd98ecfc87f27dcec702633e25af6740925e43d4a2728d38efb98f2eff2c467d2be83400a6b33d0b686ede85732d1304260ac9cdc5b15eb070b1086fcacdf45

  • SSDEEP

    12288:qMrLy90GJ2RberFDYPxK/OX5hmicCX9ccv+LL6peGjAAxI9gpaTj5mpe:hyQ1AVN/OX5hmiBzv+nGjRI9wujYpe

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

muse

C2

176.113.115.145:4125

Attributes
  • auth_value

    b91988a63a24940038d9262827a5320c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36e2e68a5c0694215ff50f19447e46f3797c3d3dfa606213d2c5a116c8f3d82c.exe
    "C:\Users\Admin\AppData\Local\Temp\36e2e68a5c0694215ff50f19447e46f3797c3d3dfa606213d2c5a116c8f3d82c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4264
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un440904.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un440904.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3652
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4393.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4393.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4480
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9637.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9637.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4800
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si060423.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si060423.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1196

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si060423.exe

    Filesize

    175KB

    MD5

    c4c54d539b8d8b7f953e34869937cf45

    SHA1

    6aa17e05cd3b0b7cac7bb22640aa4af61bba2cc8

    SHA256

    b4c6ab9df582da5b8582e4456c9db47f780455558835ce6377e88e61c26e194b

    SHA512

    0fc6948fecd8aa2646ae584e332e4e6a27777aa5c84fb19eec00fdcfbcc939f23e59821bfb277fa95d1a51706f36a9eaeeea77325c8a4f0c4b76daca1b2f305b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si060423.exe

    Filesize

    175KB

    MD5

    c4c54d539b8d8b7f953e34869937cf45

    SHA1

    6aa17e05cd3b0b7cac7bb22640aa4af61bba2cc8

    SHA256

    b4c6ab9df582da5b8582e4456c9db47f780455558835ce6377e88e61c26e194b

    SHA512

    0fc6948fecd8aa2646ae584e332e4e6a27777aa5c84fb19eec00fdcfbcc939f23e59821bfb277fa95d1a51706f36a9eaeeea77325c8a4f0c4b76daca1b2f305b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un440904.exe

    Filesize

    555KB

    MD5

    3b654de6d6e81125b9c5e2ebcbc7bc3a

    SHA1

    dfc0b7ef903b2c8b02cc21c94dca5061acb3c9b1

    SHA256

    246371a452fab838647dd6f83055ce8a2c4174d598f6313683fc0e4680a2cf30

    SHA512

    395a4c8ae512c6b9c89d44843bc833d139f26b1d8fb50bff30dde31ddb34d0cf31c5d65765c6b605340d2280f7883fd4c811817a8f442e40944fc9f06f65b9c8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un440904.exe

    Filesize

    555KB

    MD5

    3b654de6d6e81125b9c5e2ebcbc7bc3a

    SHA1

    dfc0b7ef903b2c8b02cc21c94dca5061acb3c9b1

    SHA256

    246371a452fab838647dd6f83055ce8a2c4174d598f6313683fc0e4680a2cf30

    SHA512

    395a4c8ae512c6b9c89d44843bc833d139f26b1d8fb50bff30dde31ddb34d0cf31c5d65765c6b605340d2280f7883fd4c811817a8f442e40944fc9f06f65b9c8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4393.exe

    Filesize

    347KB

    MD5

    4a21515dc5da145c2fadb8f23d385e97

    SHA1

    780bd36bb65b331127b3518901c5e9b85e80d2d2

    SHA256

    734decfb2786014d1f7d71df6ce555b43ba738bf705804be8ba109541c7defc5

    SHA512

    65820b6a8d8649e9f21ccfceaa7591905af70a88079a52e5e053db55653bd98659ceb6ade947786443645b36a3e9774797ea3b010a6bbb96a52427342148c5f2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4393.exe

    Filesize

    347KB

    MD5

    4a21515dc5da145c2fadb8f23d385e97

    SHA1

    780bd36bb65b331127b3518901c5e9b85e80d2d2

    SHA256

    734decfb2786014d1f7d71df6ce555b43ba738bf705804be8ba109541c7defc5

    SHA512

    65820b6a8d8649e9f21ccfceaa7591905af70a88079a52e5e053db55653bd98659ceb6ade947786443645b36a3e9774797ea3b010a6bbb96a52427342148c5f2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9637.exe

    Filesize

    406KB

    MD5

    97d62a7a6f615973ca572b532edcec35

    SHA1

    f70ea63eb53e47c2e184b407839de279fab98e0e

    SHA256

    592e76dcf30c4dfe8a4fe29eb49030369718b6d833ad0af97811f0a79be52baa

    SHA512

    e1d68a754efbe3b408c7e35bb8f47961eee3032cc63b1c5760b410cc404873588eab1abb328701465f4692309514a8b37f8de3cc5f10bf9439cba93b04889876

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9637.exe

    Filesize

    406KB

    MD5

    97d62a7a6f615973ca572b532edcec35

    SHA1

    f70ea63eb53e47c2e184b407839de279fab98e0e

    SHA256

    592e76dcf30c4dfe8a4fe29eb49030369718b6d833ad0af97811f0a79be52baa

    SHA512

    e1d68a754efbe3b408c7e35bb8f47961eee3032cc63b1c5760b410cc404873588eab1abb328701465f4692309514a8b37f8de3cc5f10bf9439cba93b04889876

  • memory/1196-1112-0x0000000000F90000-0x0000000000FC2000-memory.dmp

    Filesize

    200KB

  • memory/1196-1113-0x00000000059D0000-0x0000000005A1B000-memory.dmp

    Filesize

    300KB

  • memory/1196-1114-0x00000000057D0000-0x00000000057E0000-memory.dmp

    Filesize

    64KB

  • memory/1196-1115-0x00000000057D0000-0x00000000057E0000-memory.dmp

    Filesize

    64KB

  • memory/4480-144-0x0000000004A20000-0x0000000004A32000-memory.dmp

    Filesize

    72KB

  • memory/4480-158-0x0000000004A20000-0x0000000004A32000-memory.dmp

    Filesize

    72KB

  • memory/4480-139-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

    Filesize

    64KB

  • memory/4480-140-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

    Filesize

    64KB

  • memory/4480-141-0x0000000004A20000-0x0000000004A32000-memory.dmp

    Filesize

    72KB

  • memory/4480-142-0x0000000004A20000-0x0000000004A32000-memory.dmp

    Filesize

    72KB

  • memory/4480-137-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

    Filesize

    64KB

  • memory/4480-146-0x0000000004A20000-0x0000000004A32000-memory.dmp

    Filesize

    72KB

  • memory/4480-148-0x0000000004A20000-0x0000000004A32000-memory.dmp

    Filesize

    72KB

  • memory/4480-150-0x0000000004A20000-0x0000000004A32000-memory.dmp

    Filesize

    72KB

  • memory/4480-152-0x0000000004A20000-0x0000000004A32000-memory.dmp

    Filesize

    72KB

  • memory/4480-154-0x0000000004A20000-0x0000000004A32000-memory.dmp

    Filesize

    72KB

  • memory/4480-156-0x0000000004A20000-0x0000000004A32000-memory.dmp

    Filesize

    72KB

  • memory/4480-138-0x0000000004A20000-0x0000000004A38000-memory.dmp

    Filesize

    96KB

  • memory/4480-160-0x0000000004A20000-0x0000000004A32000-memory.dmp

    Filesize

    72KB

  • memory/4480-162-0x0000000004A20000-0x0000000004A32000-memory.dmp

    Filesize

    72KB

  • memory/4480-164-0x0000000004A20000-0x0000000004A32000-memory.dmp

    Filesize

    72KB

  • memory/4480-166-0x0000000004A20000-0x0000000004A32000-memory.dmp

    Filesize

    72KB

  • memory/4480-168-0x0000000004A20000-0x0000000004A32000-memory.dmp

    Filesize

    72KB

  • memory/4480-169-0x0000000000400000-0x0000000002B84000-memory.dmp

    Filesize

    39.5MB

  • memory/4480-170-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

    Filesize

    64KB

  • memory/4480-171-0x0000000004CA0000-0x0000000004CB0000-memory.dmp

    Filesize

    64KB

  • memory/4480-173-0x0000000000400000-0x0000000002B84000-memory.dmp

    Filesize

    39.5MB

  • memory/4480-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4480-135-0x0000000007180000-0x000000000767E000-memory.dmp

    Filesize

    5.0MB

  • memory/4480-134-0x00000000046E0000-0x00000000046FA000-memory.dmp

    Filesize

    104KB

  • memory/4800-180-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4800-215-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4800-185-0x00000000049A0000-0x00000000049B0000-memory.dmp

    Filesize

    64KB

  • memory/4800-183-0x00000000049A0000-0x00000000049B0000-memory.dmp

    Filesize

    64KB

  • memory/4800-186-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4800-189-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4800-188-0x00000000049A0000-0x00000000049B0000-memory.dmp

    Filesize

    64KB

  • memory/4800-191-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4800-193-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4800-195-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4800-197-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4800-199-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4800-201-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4800-203-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4800-205-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4800-207-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4800-209-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4800-211-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4800-213-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4800-181-0x0000000002C70000-0x0000000002CBB000-memory.dmp

    Filesize

    300KB

  • memory/4800-217-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4800-1090-0x0000000007CC0000-0x00000000082C6000-memory.dmp

    Filesize

    6.0MB

  • memory/4800-1091-0x0000000007730000-0x000000000783A000-memory.dmp

    Filesize

    1.0MB

  • memory/4800-1092-0x0000000007870000-0x0000000007882000-memory.dmp

    Filesize

    72KB

  • memory/4800-1093-0x0000000007890000-0x00000000078CE000-memory.dmp

    Filesize

    248KB

  • memory/4800-1094-0x00000000079E0000-0x0000000007A2B000-memory.dmp

    Filesize

    300KB

  • memory/4800-1095-0x00000000049A0000-0x00000000049B0000-memory.dmp

    Filesize

    64KB

  • memory/4800-1097-0x0000000007B70000-0x0000000007BD6000-memory.dmp

    Filesize

    408KB

  • memory/4800-1098-0x0000000008840000-0x00000000088D2000-memory.dmp

    Filesize

    584KB

  • memory/4800-1099-0x00000000049A0000-0x00000000049B0000-memory.dmp

    Filesize

    64KB

  • memory/4800-1100-0x00000000049A0000-0x00000000049B0000-memory.dmp

    Filesize

    64KB

  • memory/4800-1101-0x00000000049A0000-0x00000000049B0000-memory.dmp

    Filesize

    64KB

  • memory/4800-1102-0x0000000008A60000-0x0000000008C22000-memory.dmp

    Filesize

    1.8MB

  • memory/4800-1103-0x0000000008C40000-0x000000000916C000-memory.dmp

    Filesize

    5.2MB

  • memory/4800-182-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4800-179-0x0000000007660000-0x00000000076A4000-memory.dmp

    Filesize

    272KB

  • memory/4800-178-0x0000000004AF0000-0x0000000004B36000-memory.dmp

    Filesize

    280KB

  • memory/4800-1104-0x00000000049A0000-0x00000000049B0000-memory.dmp

    Filesize

    64KB

  • memory/4800-1105-0x00000000093C0000-0x0000000009436000-memory.dmp

    Filesize

    472KB

  • memory/4800-1106-0x0000000009440000-0x0000000009490000-memory.dmp

    Filesize

    320KB