Analysis

  • max time kernel
    144s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28/03/2023, 20:05

General

  • Target

    f789b6a10d5ebe4ac93b8dd714707e449725cf49c945456efeb2c554c54a8719.exe

  • Size

    693KB

  • MD5

    61d612079867f35d97b425f6c7fb371a

  • SHA1

    d0bb9bc260cee545a0b70ae3de5b4bbfec4a22cf

  • SHA256

    f789b6a10d5ebe4ac93b8dd714707e449725cf49c945456efeb2c554c54a8719

  • SHA512

    ae75508fcac3e7c6aae9599c8e030ca5c1aec06b32117695c9aba16fc1f438ac614951ab821e84dcc1443eba90abcc65fed8979ad6f4c4af552bac7bea474bbf

  • SSDEEP

    12288:oMrLy90MfQliUZbJ80yBeSR2BGtqOR1uzlRCbQyi0DolGR2nUH6oN7CZTRp:zy+lPZV8x6GtqA1vnMlZUHN63

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

muse

C2

176.113.115.145:4125

Attributes
  • auth_value

    b91988a63a24940038d9262827a5320c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f789b6a10d5ebe4ac93b8dd714707e449725cf49c945456efeb2c554c54a8719.exe
    "C:\Users\Admin\AppData\Local\Temp\f789b6a10d5ebe4ac93b8dd714707e449725cf49c945456efeb2c554c54a8719.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3900
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un905314.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un905314.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3912
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2316.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2316.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5100
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3077.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3077.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3872
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si846214.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si846214.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4144

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si846214.exe

    Filesize

    175KB

    MD5

    71be210d2cef8cba16c1a16f77db8a4e

    SHA1

    5a019419d3db8e0d5a9dfe25d9a42973473d90b3

    SHA256

    43006bc20df2c1efb5935ce4af6e20d2d7a88cf09c46c33513b58d7c7cce6b56

    SHA512

    6bbe3496ea473d757412bbc81f7b4c3222ad38b3f2ad4a1f4a5e827b66dbe513bde8046dc7ebc3d9bc6cb52d025e4f8114bf24922a294b49dbebbc9497528ae5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si846214.exe

    Filesize

    175KB

    MD5

    71be210d2cef8cba16c1a16f77db8a4e

    SHA1

    5a019419d3db8e0d5a9dfe25d9a42973473d90b3

    SHA256

    43006bc20df2c1efb5935ce4af6e20d2d7a88cf09c46c33513b58d7c7cce6b56

    SHA512

    6bbe3496ea473d757412bbc81f7b4c3222ad38b3f2ad4a1f4a5e827b66dbe513bde8046dc7ebc3d9bc6cb52d025e4f8114bf24922a294b49dbebbc9497528ae5

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un905314.exe

    Filesize

    552KB

    MD5

    0dad81df77548880cb7a24d54de53cca

    SHA1

    79df1ffcce929dfe15c2687daa0c323e08b6165c

    SHA256

    bd65f2bbcd35f7b2568883416aa9a0cc9d582afab8d855fa4d607f492ad9479a

    SHA512

    edd3b0d5d122852b60e8d4c047bc43e8ea5814a616198d1d82eea14297a3d69820a03412b99e3a2123fc2495ce5c89de0aaf0864487047852ce640b0f548f372

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un905314.exe

    Filesize

    552KB

    MD5

    0dad81df77548880cb7a24d54de53cca

    SHA1

    79df1ffcce929dfe15c2687daa0c323e08b6165c

    SHA256

    bd65f2bbcd35f7b2568883416aa9a0cc9d582afab8d855fa4d607f492ad9479a

    SHA512

    edd3b0d5d122852b60e8d4c047bc43e8ea5814a616198d1d82eea14297a3d69820a03412b99e3a2123fc2495ce5c89de0aaf0864487047852ce640b0f548f372

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2316.exe

    Filesize

    345KB

    MD5

    41e4f708e5350e1fb8c16a1ff389b06d

    SHA1

    f344a1bce665f6cd686e2660279c4c05b032b378

    SHA256

    b515f5c4e4446249cfaba72725f76bdf3797d1bac02fc340345a751cd1c5d48e

    SHA512

    e2854ac73cdbb42282b0ed7176a75028ff37b1583736532a0fbe9f11b0bfb4ed8ebfe35b42343917d0a0032f28529d23cdfbad3141667e793de3fed17d87b390

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2316.exe

    Filesize

    345KB

    MD5

    41e4f708e5350e1fb8c16a1ff389b06d

    SHA1

    f344a1bce665f6cd686e2660279c4c05b032b378

    SHA256

    b515f5c4e4446249cfaba72725f76bdf3797d1bac02fc340345a751cd1c5d48e

    SHA512

    e2854ac73cdbb42282b0ed7176a75028ff37b1583736532a0fbe9f11b0bfb4ed8ebfe35b42343917d0a0032f28529d23cdfbad3141667e793de3fed17d87b390

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3077.exe

    Filesize

    403KB

    MD5

    0d69f3f53799fc7febb34a626417c8d3

    SHA1

    f23771ec7a1bd2b65fba7377349185b87b812ad4

    SHA256

    583386f50d5979e27a071dffc72a987ca13942de6a04f68caf6473a533a84bb3

    SHA512

    5c36ed1c5df328161c9633def3caba357a99d7d7828016a71f7bbc0be1275ac1fd89130d433f393a95a72329320abcf31420750d8b6f11671ed425d6a673fcfb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3077.exe

    Filesize

    403KB

    MD5

    0d69f3f53799fc7febb34a626417c8d3

    SHA1

    f23771ec7a1bd2b65fba7377349185b87b812ad4

    SHA256

    583386f50d5979e27a071dffc72a987ca13942de6a04f68caf6473a533a84bb3

    SHA512

    5c36ed1c5df328161c9633def3caba357a99d7d7828016a71f7bbc0be1275ac1fd89130d433f393a95a72329320abcf31420750d8b6f11671ed425d6a673fcfb

  • memory/3872-1091-0x0000000007CC0000-0x00000000082C6000-memory.dmp

    Filesize

    6.0MB

  • memory/3872-1092-0x0000000007730000-0x000000000783A000-memory.dmp

    Filesize

    1.0MB

  • memory/3872-208-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3872-205-0x0000000004710000-0x0000000004720000-memory.dmp

    Filesize

    64KB

  • memory/3872-206-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3872-201-0x0000000004710000-0x0000000004720000-memory.dmp

    Filesize

    64KB

  • memory/3872-1107-0x000000000A710000-0x000000000A760000-memory.dmp

    Filesize

    320KB

  • memory/3872-1106-0x000000000A690000-0x000000000A706000-memory.dmp

    Filesize

    472KB

  • memory/3872-1105-0x0000000004710000-0x0000000004720000-memory.dmp

    Filesize

    64KB

  • memory/3872-1104-0x0000000008B00000-0x000000000902C000-memory.dmp

    Filesize

    5.2MB

  • memory/3872-1103-0x0000000008930000-0x0000000008AF2000-memory.dmp

    Filesize

    1.8MB

  • memory/3872-1102-0x0000000004710000-0x0000000004720000-memory.dmp

    Filesize

    64KB

  • memory/3872-1101-0x0000000004710000-0x0000000004720000-memory.dmp

    Filesize

    64KB

  • memory/3872-1100-0x0000000004710000-0x0000000004720000-memory.dmp

    Filesize

    64KB

  • memory/3872-1099-0x0000000008720000-0x00000000087B2000-memory.dmp

    Filesize

    584KB

  • memory/3872-1098-0x0000000007B70000-0x0000000007BD6000-memory.dmp

    Filesize

    408KB

  • memory/3872-1096-0x0000000004710000-0x0000000004720000-memory.dmp

    Filesize

    64KB

  • memory/3872-1095-0x00000000079E0000-0x0000000007A2B000-memory.dmp

    Filesize

    300KB

  • memory/3872-194-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3872-1094-0x0000000007890000-0x00000000078CE000-memory.dmp

    Filesize

    248KB

  • memory/3872-1093-0x0000000007870000-0x0000000007882000-memory.dmp

    Filesize

    72KB

  • memory/3872-210-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3872-199-0x0000000002BA0000-0x0000000002BEB000-memory.dmp

    Filesize

    300KB

  • memory/3872-218-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3872-216-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3872-179-0x0000000004730000-0x0000000004776000-memory.dmp

    Filesize

    280KB

  • memory/3872-180-0x0000000004C10000-0x0000000004C54000-memory.dmp

    Filesize

    272KB

  • memory/3872-181-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3872-184-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3872-182-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3872-186-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3872-188-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3872-196-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3872-190-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3872-214-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3872-192-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3872-212-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3872-198-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/3872-203-0x0000000004710000-0x0000000004720000-memory.dmp

    Filesize

    64KB

  • memory/3872-202-0x0000000004C10000-0x0000000004C4F000-memory.dmp

    Filesize

    252KB

  • memory/4144-1113-0x0000000000260000-0x0000000000292000-memory.dmp

    Filesize

    200KB

  • memory/4144-1114-0x0000000004B80000-0x0000000004B90000-memory.dmp

    Filesize

    64KB

  • memory/4144-1115-0x0000000004CA0000-0x0000000004CEB000-memory.dmp

    Filesize

    300KB

  • memory/4144-1116-0x0000000004B80000-0x0000000004B90000-memory.dmp

    Filesize

    64KB

  • memory/5100-169-0x0000000000400000-0x0000000002B83000-memory.dmp

    Filesize

    39.5MB

  • memory/5100-136-0x00000000049A0000-0x00000000049B0000-memory.dmp

    Filesize

    64KB

  • memory/5100-139-0x0000000004980000-0x0000000004998000-memory.dmp

    Filesize

    96KB

  • memory/5100-137-0x00000000049A0000-0x00000000049B0000-memory.dmp

    Filesize

    64KB

  • memory/5100-138-0x00000000070C0000-0x00000000075BE000-memory.dmp

    Filesize

    5.0MB

  • memory/5100-173-0x0000000000400000-0x0000000002B83000-memory.dmp

    Filesize

    39.5MB

  • memory/5100-174-0x00000000049A0000-0x00000000049B0000-memory.dmp

    Filesize

    64KB

  • memory/5100-171-0x00000000049A0000-0x00000000049B0000-memory.dmp

    Filesize

    64KB

  • memory/5100-170-0x00000000049A0000-0x00000000049B0000-memory.dmp

    Filesize

    64KB

  • memory/5100-168-0x00000000049A0000-0x00000000049B0000-memory.dmp

    Filesize

    64KB

  • memory/5100-167-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/5100-165-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/5100-163-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/5100-161-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/5100-159-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/5100-157-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/5100-155-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/5100-153-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/5100-151-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/5100-149-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/5100-147-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/5100-135-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/5100-134-0x0000000004800000-0x000000000481A000-memory.dmp

    Filesize

    104KB

  • memory/5100-145-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/5100-143-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/5100-141-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB

  • memory/5100-140-0x0000000004980000-0x0000000004992000-memory.dmp

    Filesize

    72KB