Analysis

  • max time kernel
    60s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2023, 21:33

General

  • Target

    184568c8cc14fe9c7c8bfbbe6e6f3911daf338cfa07936d7b6b3d5a74378e5ef.exe

  • Size

    682KB

  • MD5

    aa0311f20c784cd4ea69bde6da7b79a2

  • SHA1

    a8e73d8bd2ea31be179d9c75c90da2004c55bf92

  • SHA256

    184568c8cc14fe9c7c8bfbbe6e6f3911daf338cfa07936d7b6b3d5a74378e5ef

  • SHA512

    a60668cbb00951363e49f3b155ce464666cce9253d871c3315c737808404fa053d2bcf1a360aa999358d5cc454f74d54706b652482ff08303afc3dc5ab129df4

  • SSDEEP

    12288:6MrWy90i0tKuHV1VPkrUejSYFjSZyLkDBw/X4hHqEbg+GvYQ:oyReHLJUU7YhqyL2eX4hHqEbgBvYQ

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

dent

C2

193.233.20.33:4125

Attributes
  • auth_value

    e795368557f02e28e8aef6bcb279a3b0

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\184568c8cc14fe9c7c8bfbbe6e6f3911daf338cfa07936d7b6b3d5a74378e5ef.exe
    "C:\Users\Admin\AppData\Local\Temp\184568c8cc14fe9c7c8bfbbe6e6f3911daf338cfa07936d7b6b3d5a74378e5ef.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5104
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un059225.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un059225.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4368
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1357.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1357.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1676
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4522.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4522.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2184
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si256427.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si256427.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4908

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si256427.exe

          Filesize

          175KB

          MD5

          b08dbe8503efbdfff0b87a6206f0c83d

          SHA1

          916ebe6be8666cb15f9a033e8fb52384e3e93055

          SHA256

          785fa88f3dfd43436f7f72693553b8757c043049454135d4aaacb239a524fe2a

          SHA512

          4e4385fe4ea663831e7802b8036a1cef3f7c1d39b6086e204a6e8578c8eb961d346a21254761f5a4194c7c4f05d28e7f7f85aae2823f4d0ab4bdf5c7c0b222e3

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si256427.exe

          Filesize

          175KB

          MD5

          b08dbe8503efbdfff0b87a6206f0c83d

          SHA1

          916ebe6be8666cb15f9a033e8fb52384e3e93055

          SHA256

          785fa88f3dfd43436f7f72693553b8757c043049454135d4aaacb239a524fe2a

          SHA512

          4e4385fe4ea663831e7802b8036a1cef3f7c1d39b6086e204a6e8578c8eb961d346a21254761f5a4194c7c4f05d28e7f7f85aae2823f4d0ab4bdf5c7c0b222e3

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un059225.exe

          Filesize

          540KB

          MD5

          b4393b69ecaefc691d9a888e98f5eea2

          SHA1

          408d06dd2899db838509b3520a8a7b0ea15487af

          SHA256

          162af17b5f326a28d8e7fc84504615c03d68cb4a7e76134f8d23c462fb9f7a97

          SHA512

          d95eabf197ffeb7c99ecd88ec08ed6b7a72190a1111b910b259f2a72dee96f984238c4b90a6e65eaecddca527a573c15af396fff457016b92717f3c85fe06854

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un059225.exe

          Filesize

          540KB

          MD5

          b4393b69ecaefc691d9a888e98f5eea2

          SHA1

          408d06dd2899db838509b3520a8a7b0ea15487af

          SHA256

          162af17b5f326a28d8e7fc84504615c03d68cb4a7e76134f8d23c462fb9f7a97

          SHA512

          d95eabf197ffeb7c99ecd88ec08ed6b7a72190a1111b910b259f2a72dee96f984238c4b90a6e65eaecddca527a573c15af396fff457016b92717f3c85fe06854

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1357.exe

          Filesize

          322KB

          MD5

          c4aa77882568cbdc9cd654b7fe02128a

          SHA1

          5ba88a3e81731d3505bab2aa21063803155ecfbc

          SHA256

          9708af5bb2fb114402fbd4ec70465eafc3ac16901ba458697be5e41ef1cc4604

          SHA512

          ff59fd5fb25520a2dcf31690b040522f1663b17da05ab3df69aad5899bfd48c1fed4d3cb3a9c28072b64b25263b058924be025bbcc10d547ee9a1cfbcee8b7ab

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1357.exe

          Filesize

          322KB

          MD5

          c4aa77882568cbdc9cd654b7fe02128a

          SHA1

          5ba88a3e81731d3505bab2aa21063803155ecfbc

          SHA256

          9708af5bb2fb114402fbd4ec70465eafc3ac16901ba458697be5e41ef1cc4604

          SHA512

          ff59fd5fb25520a2dcf31690b040522f1663b17da05ab3df69aad5899bfd48c1fed4d3cb3a9c28072b64b25263b058924be025bbcc10d547ee9a1cfbcee8b7ab

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4522.exe

          Filesize

          379KB

          MD5

          533d0ad576cf36cb1f7f31d82856db69

          SHA1

          948a43dc88573a27525422a224789d20e45f83b5

          SHA256

          b0d5f22232ecc26c2b3ff40dfd6d0dc714cd45f8ebb86594925b379843bd47af

          SHA512

          7ac9e4b29dba41928ba4152b04e8b58c6a33d396e83ce63c2be9e0bb357b84ba30e0bfd8e5298c8316cd9d0b8a63e6b46f4b556d4adb4bfac5da803e9996b597

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4522.exe

          Filesize

          379KB

          MD5

          533d0ad576cf36cb1f7f31d82856db69

          SHA1

          948a43dc88573a27525422a224789d20e45f83b5

          SHA256

          b0d5f22232ecc26c2b3ff40dfd6d0dc714cd45f8ebb86594925b379843bd47af

          SHA512

          7ac9e4b29dba41928ba4152b04e8b58c6a33d396e83ce63c2be9e0bb357b84ba30e0bfd8e5298c8316cd9d0b8a63e6b46f4b556d4adb4bfac5da803e9996b597

        • memory/1676-148-0x0000000002B80000-0x0000000002BAD000-memory.dmp

          Filesize

          180KB

        • memory/1676-149-0x0000000007240000-0x00000000077E4000-memory.dmp

          Filesize

          5.6MB

        • memory/1676-150-0x0000000004C90000-0x0000000004CA2000-memory.dmp

          Filesize

          72KB

        • memory/1676-151-0x0000000004C90000-0x0000000004CA2000-memory.dmp

          Filesize

          72KB

        • memory/1676-153-0x0000000004C90000-0x0000000004CA2000-memory.dmp

          Filesize

          72KB

        • memory/1676-155-0x0000000004C90000-0x0000000004CA2000-memory.dmp

          Filesize

          72KB

        • memory/1676-157-0x0000000004C90000-0x0000000004CA2000-memory.dmp

          Filesize

          72KB

        • memory/1676-159-0x0000000004C90000-0x0000000004CA2000-memory.dmp

          Filesize

          72KB

        • memory/1676-161-0x0000000004C90000-0x0000000004CA2000-memory.dmp

          Filesize

          72KB

        • memory/1676-163-0x0000000004C90000-0x0000000004CA2000-memory.dmp

          Filesize

          72KB

        • memory/1676-165-0x0000000004C90000-0x0000000004CA2000-memory.dmp

          Filesize

          72KB

        • memory/1676-167-0x0000000004C90000-0x0000000004CA2000-memory.dmp

          Filesize

          72KB

        • memory/1676-169-0x0000000004C90000-0x0000000004CA2000-memory.dmp

          Filesize

          72KB

        • memory/1676-171-0x0000000004C90000-0x0000000004CA2000-memory.dmp

          Filesize

          72KB

        • memory/1676-173-0x0000000004C90000-0x0000000004CA2000-memory.dmp

          Filesize

          72KB

        • memory/1676-175-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

          Filesize

          64KB

        • memory/1676-176-0x0000000004C90000-0x0000000004CA2000-memory.dmp

          Filesize

          72KB

        • memory/1676-177-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

          Filesize

          64KB

        • memory/1676-178-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

          Filesize

          64KB

        • memory/1676-180-0x0000000004C90000-0x0000000004CA2000-memory.dmp

          Filesize

          72KB

        • memory/1676-181-0x0000000000400000-0x0000000002B7E000-memory.dmp

          Filesize

          39.5MB

        • memory/1676-182-0x0000000002B80000-0x0000000002BAD000-memory.dmp

          Filesize

          180KB

        • memory/1676-183-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

          Filesize

          64KB

        • memory/1676-184-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

          Filesize

          64KB

        • memory/1676-185-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

          Filesize

          64KB

        • memory/1676-187-0x0000000000400000-0x0000000002B7E000-memory.dmp

          Filesize

          39.5MB

        • memory/2184-192-0x0000000004BF0000-0x0000000004C2E000-memory.dmp

          Filesize

          248KB

        • memory/2184-193-0x0000000004BF0000-0x0000000004C2E000-memory.dmp

          Filesize

          248KB

        • memory/2184-195-0x0000000004BF0000-0x0000000004C2E000-memory.dmp

          Filesize

          248KB

        • memory/2184-197-0x0000000004BF0000-0x0000000004C2E000-memory.dmp

          Filesize

          248KB

        • memory/2184-199-0x0000000004BF0000-0x0000000004C2E000-memory.dmp

          Filesize

          248KB

        • memory/2184-201-0x0000000004BF0000-0x0000000004C2E000-memory.dmp

          Filesize

          248KB

        • memory/2184-203-0x0000000004BF0000-0x0000000004C2E000-memory.dmp

          Filesize

          248KB

        • memory/2184-205-0x0000000004BF0000-0x0000000004C2E000-memory.dmp

          Filesize

          248KB

        • memory/2184-206-0x0000000002C60000-0x0000000002CAB000-memory.dmp

          Filesize

          300KB

        • memory/2184-209-0x0000000004BF0000-0x0000000004C2E000-memory.dmp

          Filesize

          248KB

        • memory/2184-208-0x0000000004C70000-0x0000000004C80000-memory.dmp

          Filesize

          64KB

        • memory/2184-210-0x0000000004C70000-0x0000000004C80000-memory.dmp

          Filesize

          64KB

        • memory/2184-213-0x0000000004C70000-0x0000000004C80000-memory.dmp

          Filesize

          64KB

        • memory/2184-212-0x0000000004BF0000-0x0000000004C2E000-memory.dmp

          Filesize

          248KB

        • memory/2184-215-0x0000000004BF0000-0x0000000004C2E000-memory.dmp

          Filesize

          248KB

        • memory/2184-217-0x0000000004BF0000-0x0000000004C2E000-memory.dmp

          Filesize

          248KB

        • memory/2184-219-0x0000000004BF0000-0x0000000004C2E000-memory.dmp

          Filesize

          248KB

        • memory/2184-221-0x0000000004BF0000-0x0000000004C2E000-memory.dmp

          Filesize

          248KB

        • memory/2184-223-0x0000000004BF0000-0x0000000004C2E000-memory.dmp

          Filesize

          248KB

        • memory/2184-225-0x0000000004BF0000-0x0000000004C2E000-memory.dmp

          Filesize

          248KB

        • memory/2184-227-0x0000000004BF0000-0x0000000004C2E000-memory.dmp

          Filesize

          248KB

        • memory/2184-229-0x0000000004BF0000-0x0000000004C2E000-memory.dmp

          Filesize

          248KB

        • memory/2184-1102-0x00000000077A0000-0x0000000007DB8000-memory.dmp

          Filesize

          6.1MB

        • memory/2184-1103-0x0000000007E30000-0x0000000007F3A000-memory.dmp

          Filesize

          1.0MB

        • memory/2184-1104-0x0000000007F70000-0x0000000007F82000-memory.dmp

          Filesize

          72KB

        • memory/2184-1105-0x0000000004C70000-0x0000000004C80000-memory.dmp

          Filesize

          64KB

        • memory/2184-1106-0x0000000007F90000-0x0000000007FCC000-memory.dmp

          Filesize

          240KB

        • memory/2184-1108-0x0000000008280000-0x0000000008312000-memory.dmp

          Filesize

          584KB

        • memory/2184-1109-0x0000000008320000-0x0000000008386000-memory.dmp

          Filesize

          408KB

        • memory/2184-1110-0x0000000008B50000-0x0000000008D12000-memory.dmp

          Filesize

          1.8MB

        • memory/2184-1111-0x0000000008D20000-0x000000000924C000-memory.dmp

          Filesize

          5.2MB

        • memory/2184-1112-0x0000000004C70000-0x0000000004C80000-memory.dmp

          Filesize

          64KB

        • memory/2184-1113-0x0000000004C70000-0x0000000004C80000-memory.dmp

          Filesize

          64KB

        • memory/2184-1114-0x0000000004C70000-0x0000000004C80000-memory.dmp

          Filesize

          64KB

        • memory/2184-1115-0x0000000009390000-0x0000000009406000-memory.dmp

          Filesize

          472KB

        • memory/2184-1116-0x0000000009410000-0x0000000009460000-memory.dmp

          Filesize

          320KB

        • memory/2184-1119-0x0000000004C70000-0x0000000004C80000-memory.dmp

          Filesize

          64KB

        • memory/4908-1123-0x00000000005C0000-0x00000000005F2000-memory.dmp

          Filesize

          200KB

        • memory/4908-1124-0x0000000005240000-0x0000000005250000-memory.dmp

          Filesize

          64KB