Analysis

  • max time kernel
    50s
  • max time network
    66s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28/03/2023, 20:19

General

  • Target

    5901852357f2a61b7475603b76b4188e3df1a10fd842f2c5a9eadaad40d777d6.exe

  • Size

    697KB

  • MD5

    0f1efbead217b6df1cfb2ccf28928983

  • SHA1

    1b8136829b879dec35ccb394bfc5a58842b5bcdb

  • SHA256

    5901852357f2a61b7475603b76b4188e3df1a10fd842f2c5a9eadaad40d777d6

  • SHA512

    0922911e8db2a245a4070a9080ca1dc11e1873cf6911c66a09ba0cdb53a95c4ac36bce5ad50360c56f1e137bdf46b49b99f40c2a995426d19fc4b0ccbe935949

  • SSDEEP

    12288:YMrpy90aKev7G0tFVXKKZYuzEngqS5Ha5B03GQwkUHio/79ieh1pnSXoOuz:xy7Lv7fVXKluz6gqSJak3yxHVJd6XoOM

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

muse

C2

176.113.115.145:4125

Attributes
  • auth_value

    b91988a63a24940038d9262827a5320c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5901852357f2a61b7475603b76b4188e3df1a10fd842f2c5a9eadaad40d777d6.exe
    "C:\Users\Admin\AppData\Local\Temp\5901852357f2a61b7475603b76b4188e3df1a10fd842f2c5a9eadaad40d777d6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2612
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un393747.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un393747.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2584
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4205.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4205.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4128
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8922.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8922.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4280
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si840677.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si840677.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4692

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si840677.exe

    Filesize

    175KB

    MD5

    759455bebca1cc161b8c37754113ff15

    SHA1

    8adcf1dc4b945fc38bc1fc39bce44ba4e8b25907

    SHA256

    8844d05b688d539ff5461c53fe3121078edd84218d47e1aa170be4814c170041

    SHA512

    fab9a9af020a403da2c841516a992cafb8ee53ac7c19e785e9d9c6e221ce637ac3ca25d90732de8fc436092a6160b532de880ecb33ae55c24ca53a8d855cee93

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si840677.exe

    Filesize

    175KB

    MD5

    759455bebca1cc161b8c37754113ff15

    SHA1

    8adcf1dc4b945fc38bc1fc39bce44ba4e8b25907

    SHA256

    8844d05b688d539ff5461c53fe3121078edd84218d47e1aa170be4814c170041

    SHA512

    fab9a9af020a403da2c841516a992cafb8ee53ac7c19e785e9d9c6e221ce637ac3ca25d90732de8fc436092a6160b532de880ecb33ae55c24ca53a8d855cee93

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un393747.exe

    Filesize

    555KB

    MD5

    b2ec6e25384c6499550ab3eb29f8939b

    SHA1

    158e57582ab7d33d7606d74ac47a7d0404d0f4bc

    SHA256

    c078a631157ef8416bbc0e2dc648a68e0dd20d01705fc30300f4fc9076aa3ba6

    SHA512

    95afd5937c35a885b5be633348757290ed85891f7a75119dd5f7ef42e683e7f8111e84a33816d891a4c38258ae93337620060f4615a5a59b512dafe75f3bf04c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un393747.exe

    Filesize

    555KB

    MD5

    b2ec6e25384c6499550ab3eb29f8939b

    SHA1

    158e57582ab7d33d7606d74ac47a7d0404d0f4bc

    SHA256

    c078a631157ef8416bbc0e2dc648a68e0dd20d01705fc30300f4fc9076aa3ba6

    SHA512

    95afd5937c35a885b5be633348757290ed85891f7a75119dd5f7ef42e683e7f8111e84a33816d891a4c38258ae93337620060f4615a5a59b512dafe75f3bf04c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4205.exe

    Filesize

    345KB

    MD5

    31a0ea5618058221aea4a1de363a4644

    SHA1

    e916190024c9aae9c5726056d7f6c4f4c3109dde

    SHA256

    3ec14ddae32806b2f2579ab05728b93be933b04221a4bcfc9319ffc0d6a18596

    SHA512

    cd4e2974c8c77fddce7a91155efb0c5dd7b490d30c964888b19d4ee57f9a2508decc3e521065ca1ea764dc48f0e591160d7db564d952bf5d6592b1ac5156b2d7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4205.exe

    Filesize

    345KB

    MD5

    31a0ea5618058221aea4a1de363a4644

    SHA1

    e916190024c9aae9c5726056d7f6c4f4c3109dde

    SHA256

    3ec14ddae32806b2f2579ab05728b93be933b04221a4bcfc9319ffc0d6a18596

    SHA512

    cd4e2974c8c77fddce7a91155efb0c5dd7b490d30c964888b19d4ee57f9a2508decc3e521065ca1ea764dc48f0e591160d7db564d952bf5d6592b1ac5156b2d7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8922.exe

    Filesize

    403KB

    MD5

    5785786b87afced42063886af9f2e0a7

    SHA1

    bdfd228c85f61ecb4c9676260663845019da7646

    SHA256

    1e624bd4b3da1f774479f0dc2820d6cbc9aeb976d9273ddf98813564c7d752db

    SHA512

    008fad31070be4643194a71ff41207d01a75cb1ec6722e82a0b7da88a823cd658c86097c0a99b26bd811f0a44616bd15dfb7271cde9ee2baf10e3322c43f309d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8922.exe

    Filesize

    403KB

    MD5

    5785786b87afced42063886af9f2e0a7

    SHA1

    bdfd228c85f61ecb4c9676260663845019da7646

    SHA256

    1e624bd4b3da1f774479f0dc2820d6cbc9aeb976d9273ddf98813564c7d752db

    SHA512

    008fad31070be4643194a71ff41207d01a75cb1ec6722e82a0b7da88a823cd658c86097c0a99b26bd811f0a44616bd15dfb7271cde9ee2baf10e3322c43f309d

  • memory/4128-135-0x0000000002DF0000-0x0000000002E0A000-memory.dmp

    Filesize

    104KB

  • memory/4128-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4128-137-0x00000000073F0000-0x0000000007400000-memory.dmp

    Filesize

    64KB

  • memory/4128-138-0x00000000073F0000-0x0000000007400000-memory.dmp

    Filesize

    64KB

  • memory/4128-139-0x0000000007400000-0x00000000078FE000-memory.dmp

    Filesize

    5.0MB

  • memory/4128-140-0x0000000004840000-0x0000000004858000-memory.dmp

    Filesize

    96KB

  • memory/4128-141-0x0000000004840000-0x0000000004852000-memory.dmp

    Filesize

    72KB

  • memory/4128-142-0x0000000004840000-0x0000000004852000-memory.dmp

    Filesize

    72KB

  • memory/4128-144-0x0000000004840000-0x0000000004852000-memory.dmp

    Filesize

    72KB

  • memory/4128-146-0x0000000004840000-0x0000000004852000-memory.dmp

    Filesize

    72KB

  • memory/4128-148-0x0000000004840000-0x0000000004852000-memory.dmp

    Filesize

    72KB

  • memory/4128-150-0x0000000004840000-0x0000000004852000-memory.dmp

    Filesize

    72KB

  • memory/4128-152-0x0000000004840000-0x0000000004852000-memory.dmp

    Filesize

    72KB

  • memory/4128-154-0x0000000004840000-0x0000000004852000-memory.dmp

    Filesize

    72KB

  • memory/4128-156-0x0000000004840000-0x0000000004852000-memory.dmp

    Filesize

    72KB

  • memory/4128-158-0x0000000004840000-0x0000000004852000-memory.dmp

    Filesize

    72KB

  • memory/4128-160-0x0000000004840000-0x0000000004852000-memory.dmp

    Filesize

    72KB

  • memory/4128-162-0x0000000004840000-0x0000000004852000-memory.dmp

    Filesize

    72KB

  • memory/4128-164-0x0000000004840000-0x0000000004852000-memory.dmp

    Filesize

    72KB

  • memory/4128-166-0x0000000004840000-0x0000000004852000-memory.dmp

    Filesize

    72KB

  • memory/4128-168-0x0000000004840000-0x0000000004852000-memory.dmp

    Filesize

    72KB

  • memory/4128-169-0x00000000073F0000-0x0000000007400000-memory.dmp

    Filesize

    64KB

  • memory/4128-170-0x0000000000400000-0x0000000002B83000-memory.dmp

    Filesize

    39.5MB

  • memory/4128-171-0x00000000073F0000-0x0000000007400000-memory.dmp

    Filesize

    64KB

  • memory/4128-174-0x00000000073F0000-0x0000000007400000-memory.dmp

    Filesize

    64KB

  • memory/4128-173-0x0000000000400000-0x0000000002B83000-memory.dmp

    Filesize

    39.5MB

  • memory/4280-179-0x00000000070A0000-0x00000000070E6000-memory.dmp

    Filesize

    280KB

  • memory/4280-180-0x0000000007660000-0x00000000076A4000-memory.dmp

    Filesize

    272KB

  • memory/4280-181-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4280-182-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4280-184-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4280-187-0x0000000007150000-0x0000000007160000-memory.dmp

    Filesize

    64KB

  • memory/4280-188-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4280-189-0x0000000007150000-0x0000000007160000-memory.dmp

    Filesize

    64KB

  • memory/4280-186-0x0000000002CA0000-0x0000000002CEB000-memory.dmp

    Filesize

    300KB

  • memory/4280-192-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4280-194-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4280-191-0x0000000007150000-0x0000000007160000-memory.dmp

    Filesize

    64KB

  • memory/4280-196-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4280-198-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4280-200-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4280-202-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4280-204-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4280-206-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4280-208-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4280-210-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4280-212-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4280-214-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4280-216-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4280-218-0x0000000007660000-0x000000000769F000-memory.dmp

    Filesize

    252KB

  • memory/4280-1091-0x0000000007CC0000-0x00000000082C6000-memory.dmp

    Filesize

    6.0MB

  • memory/4280-1092-0x0000000007730000-0x000000000783A000-memory.dmp

    Filesize

    1.0MB

  • memory/4280-1093-0x0000000007870000-0x0000000007882000-memory.dmp

    Filesize

    72KB

  • memory/4280-1094-0x0000000007150000-0x0000000007160000-memory.dmp

    Filesize

    64KB

  • memory/4280-1095-0x0000000007890000-0x00000000078CE000-memory.dmp

    Filesize

    248KB

  • memory/4280-1096-0x00000000079E0000-0x0000000007A2B000-memory.dmp

    Filesize

    300KB

  • memory/4280-1098-0x0000000007B70000-0x0000000007C02000-memory.dmp

    Filesize

    584KB

  • memory/4280-1099-0x0000000007C10000-0x0000000007C76000-memory.dmp

    Filesize

    408KB

  • memory/4280-1100-0x0000000007150000-0x0000000007160000-memory.dmp

    Filesize

    64KB

  • memory/4280-1101-0x0000000007150000-0x0000000007160000-memory.dmp

    Filesize

    64KB

  • memory/4280-1102-0x0000000007150000-0x0000000007160000-memory.dmp

    Filesize

    64KB

  • memory/4280-1103-0x0000000007150000-0x0000000007160000-memory.dmp

    Filesize

    64KB

  • memory/4280-1104-0x0000000009CE0000-0x0000000009D56000-memory.dmp

    Filesize

    472KB

  • memory/4280-1105-0x0000000009D60000-0x0000000009DB0000-memory.dmp

    Filesize

    320KB

  • memory/4280-1106-0x0000000009DC0000-0x0000000009F82000-memory.dmp

    Filesize

    1.8MB

  • memory/4280-1107-0x0000000009FA0000-0x000000000A4CC000-memory.dmp

    Filesize

    5.2MB

  • memory/4692-1113-0x0000000000E20000-0x0000000000E52000-memory.dmp

    Filesize

    200KB

  • memory/4692-1114-0x0000000005860000-0x00000000058AB000-memory.dmp

    Filesize

    300KB

  • memory/4692-1115-0x0000000005720000-0x0000000005730000-memory.dmp

    Filesize

    64KB

  • memory/4692-1116-0x0000000005720000-0x0000000005730000-memory.dmp

    Filesize

    64KB