Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28/03/2023, 20:45

General

  • Target

    24eb37b3f59f7fe94f05bd7075e87ad0d6d6ebb371f82d32ce5f0566f65fc2a0.exe

  • Size

    695KB

  • MD5

    a18584247783816894d230c8ad0611ba

  • SHA1

    49c5a1a9c0275a0560c6fb1d5f8adcfeeb6f1e81

  • SHA256

    24eb37b3f59f7fe94f05bd7075e87ad0d6d6ebb371f82d32ce5f0566f65fc2a0

  • SHA512

    3394132d7127a9ef044c91531a79cb8fed69f588155a6467c415065a5cc11a25ba82b75f12285d631aa5438250c4c7519cb5a0ddba24f4a551fba30d1ebc8dc5

  • SSDEEP

    12288:dMrVy90tlWO4viIiiTIaOXGCvmcr69/NOMuuxX+rVWwEwiUHX+FztJba+:Uy6Ht0Ea5cr6jOMlYnittb

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Extracted

Family

redline

Botnet

muse

C2

176.113.115.145:4125

Attributes
  • auth_value

    b91988a63a24940038d9262827a5320c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\24eb37b3f59f7fe94f05bd7075e87ad0d6d6ebb371f82d32ce5f0566f65fc2a0.exe
    "C:\Users\Admin\AppData\Local\Temp\24eb37b3f59f7fe94f05bd7075e87ad0d6d6ebb371f82d32ce5f0566f65fc2a0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3272
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un437833.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un437833.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4468
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3269.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3269.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4824
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0882.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0882.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4884
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si322398.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si322398.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2820

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si322398.exe

          Filesize

          175KB

          MD5

          6b03994fb3c6f5a52e2ec2549243f6eb

          SHA1

          f5225ce492e9fa002ecef12d42c24d10dd9538f9

          SHA256

          8a27b5ec572bc336fbba17a9d1275f1d2ab0f953b9a3a0d724e6a0a14d844fd8

          SHA512

          610c8e4e3ecf130bae896bc67ed77c1648c7c68667a6e4ab354ef639d1e77c4c4912cf2fb49c2d80754fb7165a3889b7b8af849ed542e7531348437f19dbd2df

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si322398.exe

          Filesize

          175KB

          MD5

          6b03994fb3c6f5a52e2ec2549243f6eb

          SHA1

          f5225ce492e9fa002ecef12d42c24d10dd9538f9

          SHA256

          8a27b5ec572bc336fbba17a9d1275f1d2ab0f953b9a3a0d724e6a0a14d844fd8

          SHA512

          610c8e4e3ecf130bae896bc67ed77c1648c7c68667a6e4ab354ef639d1e77c4c4912cf2fb49c2d80754fb7165a3889b7b8af849ed542e7531348437f19dbd2df

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un437833.exe

          Filesize

          554KB

          MD5

          76a657987f58fb24eb11c88316b95ad6

          SHA1

          386cc8fe3804a0b16383b187f2abf7173ebab8c5

          SHA256

          83fad59659c6176aa629d312feb38e3f51f1bc6a0cb5cf4a775a185077defa54

          SHA512

          eb5333ce8e66750a6060d7bfec8eb76c6f499e7076ad0e0e5932f484b71a87d04d891bc697c478bd392184d1e608717449ee3ee43c337de29c012074bba32645

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un437833.exe

          Filesize

          554KB

          MD5

          76a657987f58fb24eb11c88316b95ad6

          SHA1

          386cc8fe3804a0b16383b187f2abf7173ebab8c5

          SHA256

          83fad59659c6176aa629d312feb38e3f51f1bc6a0cb5cf4a775a185077defa54

          SHA512

          eb5333ce8e66750a6060d7bfec8eb76c6f499e7076ad0e0e5932f484b71a87d04d891bc697c478bd392184d1e608717449ee3ee43c337de29c012074bba32645

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3269.exe

          Filesize

          345KB

          MD5

          e0433d8adff71555f2c09f3e61a7c38d

          SHA1

          63fcd0f0945e62db949bc1ae89e526dda449ed01

          SHA256

          28d9cf418015b1500f0880fb10d1fdf57bb3df95099e70f1c9653f50c93857b1

          SHA512

          90f6c7293992f9db39e5381d4b95391ecd77176e15acfa8fd8c675339e2d3c9105b6dccf1c6171e79ad9fbee1f72f515da7c7eecac93e2f9fbc41fb6b74994ad

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3269.exe

          Filesize

          345KB

          MD5

          e0433d8adff71555f2c09f3e61a7c38d

          SHA1

          63fcd0f0945e62db949bc1ae89e526dda449ed01

          SHA256

          28d9cf418015b1500f0880fb10d1fdf57bb3df95099e70f1c9653f50c93857b1

          SHA512

          90f6c7293992f9db39e5381d4b95391ecd77176e15acfa8fd8c675339e2d3c9105b6dccf1c6171e79ad9fbee1f72f515da7c7eecac93e2f9fbc41fb6b74994ad

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0882.exe

          Filesize

          403KB

          MD5

          57f595b69a728187ea2c6dcac4755abe

          SHA1

          be9bc328c9ebedfedef4dadbcfe38da296c1ac17

          SHA256

          0b6a2677887185dc6626b2c9529cfe2d8241515d7d9b21c4c85c67f2e5d41a37

          SHA512

          decd70172649e655751d55e8d819aba3df5a7a78eca5669770477cb9a6edbcb73c448cedb24024b41725ba0441962197ae6bd727688b056b241eaf8333861644

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0882.exe

          Filesize

          403KB

          MD5

          57f595b69a728187ea2c6dcac4755abe

          SHA1

          be9bc328c9ebedfedef4dadbcfe38da296c1ac17

          SHA256

          0b6a2677887185dc6626b2c9529cfe2d8241515d7d9b21c4c85c67f2e5d41a37

          SHA512

          decd70172649e655751d55e8d819aba3df5a7a78eca5669770477cb9a6edbcb73c448cedb24024b41725ba0441962197ae6bd727688b056b241eaf8333861644

        • memory/2820-1114-0x0000000000AA0000-0x0000000000AD2000-memory.dmp

          Filesize

          200KB

        • memory/2820-1115-0x00000000054E0000-0x000000000552B000-memory.dmp

          Filesize

          300KB

        • memory/2820-1116-0x0000000005680000-0x0000000005690000-memory.dmp

          Filesize

          64KB

        • memory/4824-146-0x0000000004C70000-0x0000000004C82000-memory.dmp

          Filesize

          72KB

        • memory/4824-158-0x0000000004C70000-0x0000000004C82000-memory.dmp

          Filesize

          72KB

        • memory/4824-141-0x0000000004D20000-0x0000000004D30000-memory.dmp

          Filesize

          64KB

        • memory/4824-138-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB

        • memory/4824-142-0x0000000004D20000-0x0000000004D30000-memory.dmp

          Filesize

          64KB

        • memory/4824-143-0x0000000004C70000-0x0000000004C82000-memory.dmp

          Filesize

          72KB

        • memory/4824-144-0x0000000004C70000-0x0000000004C82000-memory.dmp

          Filesize

          72KB

        • memory/4824-139-0x0000000004C70000-0x0000000004C88000-memory.dmp

          Filesize

          96KB

        • memory/4824-148-0x0000000004C70000-0x0000000004C82000-memory.dmp

          Filesize

          72KB

        • memory/4824-150-0x0000000004C70000-0x0000000004C82000-memory.dmp

          Filesize

          72KB

        • memory/4824-152-0x0000000004C70000-0x0000000004C82000-memory.dmp

          Filesize

          72KB

        • memory/4824-154-0x0000000004C70000-0x0000000004C82000-memory.dmp

          Filesize

          72KB

        • memory/4824-156-0x0000000004C70000-0x0000000004C82000-memory.dmp

          Filesize

          72KB

        • memory/4824-140-0x0000000004D20000-0x0000000004D30000-memory.dmp

          Filesize

          64KB

        • memory/4824-160-0x0000000004C70000-0x0000000004C82000-memory.dmp

          Filesize

          72KB

        • memory/4824-162-0x0000000004C70000-0x0000000004C82000-memory.dmp

          Filesize

          72KB

        • memory/4824-164-0x0000000004C70000-0x0000000004C82000-memory.dmp

          Filesize

          72KB

        • memory/4824-166-0x0000000004C70000-0x0000000004C82000-memory.dmp

          Filesize

          72KB

        • memory/4824-168-0x0000000004C70000-0x0000000004C82000-memory.dmp

          Filesize

          72KB

        • memory/4824-170-0x0000000004C70000-0x0000000004C82000-memory.dmp

          Filesize

          72KB

        • memory/4824-171-0x0000000000400000-0x0000000002B83000-memory.dmp

          Filesize

          39.5MB

        • memory/4824-172-0x0000000004D20000-0x0000000004D30000-memory.dmp

          Filesize

          64KB

        • memory/4824-173-0x0000000004D20000-0x0000000004D30000-memory.dmp

          Filesize

          64KB

        • memory/4824-174-0x0000000004D20000-0x0000000004D30000-memory.dmp

          Filesize

          64KB

        • memory/4824-176-0x0000000000400000-0x0000000002B83000-memory.dmp

          Filesize

          39.5MB

        • memory/4824-137-0x0000000007190000-0x000000000768E000-memory.dmp

          Filesize

          5.0MB

        • memory/4824-136-0x0000000004800000-0x000000000481A000-memory.dmp

          Filesize

          104KB

        • memory/4884-183-0x0000000007100000-0x000000000713F000-memory.dmp

          Filesize

          252KB

        • memory/4884-336-0x00000000071E0000-0x00000000071F0000-memory.dmp

          Filesize

          64KB

        • memory/4884-188-0x0000000007100000-0x000000000713F000-memory.dmp

          Filesize

          252KB

        • memory/4884-186-0x0000000007100000-0x000000000713F000-memory.dmp

          Filesize

          252KB

        • memory/4884-192-0x0000000007100000-0x000000000713F000-memory.dmp

          Filesize

          252KB

        • memory/4884-190-0x0000000007100000-0x000000000713F000-memory.dmp

          Filesize

          252KB

        • memory/4884-194-0x0000000007100000-0x000000000713F000-memory.dmp

          Filesize

          252KB

        • memory/4884-196-0x0000000007100000-0x000000000713F000-memory.dmp

          Filesize

          252KB

        • memory/4884-198-0x0000000007100000-0x000000000713F000-memory.dmp

          Filesize

          252KB

        • memory/4884-200-0x0000000007100000-0x000000000713F000-memory.dmp

          Filesize

          252KB

        • memory/4884-202-0x0000000007100000-0x000000000713F000-memory.dmp

          Filesize

          252KB

        • memory/4884-204-0x0000000007100000-0x000000000713F000-memory.dmp

          Filesize

          252KB

        • memory/4884-206-0x0000000007100000-0x000000000713F000-memory.dmp

          Filesize

          252KB

        • memory/4884-208-0x0000000007100000-0x000000000713F000-memory.dmp

          Filesize

          252KB

        • memory/4884-212-0x0000000007100000-0x000000000713F000-memory.dmp

          Filesize

          252KB

        • memory/4884-210-0x0000000007100000-0x000000000713F000-memory.dmp

          Filesize

          252KB

        • memory/4884-214-0x0000000007100000-0x000000000713F000-memory.dmp

          Filesize

          252KB

        • memory/4884-216-0x0000000007100000-0x000000000713F000-memory.dmp

          Filesize

          252KB

        • memory/4884-335-0x0000000002BA0000-0x0000000002BEB000-memory.dmp

          Filesize

          300KB

        • memory/4884-184-0x0000000007100000-0x000000000713F000-memory.dmp

          Filesize

          252KB

        • memory/4884-339-0x00000000071E0000-0x00000000071F0000-memory.dmp

          Filesize

          64KB

        • memory/4884-341-0x00000000071E0000-0x00000000071F0000-memory.dmp

          Filesize

          64KB

        • memory/4884-1093-0x00000000076F0000-0x0000000007CF6000-memory.dmp

          Filesize

          6.0MB

        • memory/4884-1094-0x0000000007D40000-0x0000000007E4A000-memory.dmp

          Filesize

          1.0MB

        • memory/4884-1095-0x0000000007E80000-0x0000000007E92000-memory.dmp

          Filesize

          72KB

        • memory/4884-1096-0x0000000007EA0000-0x0000000007EDE000-memory.dmp

          Filesize

          248KB

        • memory/4884-1097-0x0000000007FF0000-0x000000000803B000-memory.dmp

          Filesize

          300KB

        • memory/4884-1099-0x00000000071E0000-0x00000000071F0000-memory.dmp

          Filesize

          64KB

        • memory/4884-1100-0x00000000071E0000-0x00000000071F0000-memory.dmp

          Filesize

          64KB

        • memory/4884-1101-0x00000000071E0000-0x00000000071F0000-memory.dmp

          Filesize

          64KB

        • memory/4884-1102-0x0000000008180000-0x0000000008212000-memory.dmp

          Filesize

          584KB

        • memory/4884-1103-0x0000000008220000-0x0000000008286000-memory.dmp

          Filesize

          408KB

        • memory/4884-1104-0x0000000008A60000-0x0000000008C22000-memory.dmp

          Filesize

          1.8MB

        • memory/4884-1105-0x0000000008C30000-0x000000000915C000-memory.dmp

          Filesize

          5.2MB

        • memory/4884-182-0x0000000007100000-0x0000000007144000-memory.dmp

          Filesize

          272KB

        • memory/4884-181-0x0000000004870000-0x00000000048B6000-memory.dmp

          Filesize

          280KB

        • memory/4884-1106-0x00000000071E0000-0x00000000071F0000-memory.dmp

          Filesize

          64KB

        • memory/4884-1107-0x0000000009290000-0x0000000009306000-memory.dmp

          Filesize

          472KB

        • memory/4884-1108-0x0000000009320000-0x0000000009370000-memory.dmp

          Filesize

          320KB