Analysis

  • max time kernel
    57s
  • max time network
    142s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    26/03/2023, 19:43

General

  • Target

    4acda04a34c97af68467794edbc79ecbcf7c325c274b2e9074b00871897f39fb.exe

  • Size

    688KB

  • MD5

    7bee4ec98caa72521a943d4a8bc11b97

  • SHA1

    1a1902a00ac8bcc04f540bdb21b93e0ad0a330d8

  • SHA256

    4acda04a34c97af68467794edbc79ecbcf7c325c274b2e9074b00871897f39fb

  • SHA512

    94728afe4694ef54719a5856875bfa412cd01feaa090cb5129de7d325d80c691ca61c123e241e723bb820ac5fadecab8d27133e18b757a7f66c2eb107a58d795

  • SSDEEP

    12288:6MrUy90kML59cXPl3ABLA2/YTD06e1GnWDgmOcf55Ur:6yyLUOJgW1GnWycB5Ur

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

dent

C2

193.233.20.33:4125

Attributes
  • auth_value

    e795368557f02e28e8aef6bcb279a3b0

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4acda04a34c97af68467794edbc79ecbcf7c325c274b2e9074b00871897f39fb.exe
    "C:\Users\Admin\AppData\Local\Temp\4acda04a34c97af68467794edbc79ecbcf7c325c274b2e9074b00871897f39fb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4616
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un859046.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un859046.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4884
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8900.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8900.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2064
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4561.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4561.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1060
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si311390.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si311390.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4396

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si311390.exe

          Filesize

          175KB

          MD5

          80669213916176a424e58de49380abcf

          SHA1

          46700c6415a21c420d4c3213f664addd3cb9afa3

          SHA256

          6ffe58f010af828067bb1f59c1a0f8ad51aa99f42a00970d83db01d462fb152f

          SHA512

          f89ed348c74014a37bb274851c86f9f44b057356400f920d96d34c84237ca0d9549c462c62e34a2a327694de3feab7bfc3415f0e6b371efa9ac1b2f83f03e7ff

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si311390.exe

          Filesize

          175KB

          MD5

          80669213916176a424e58de49380abcf

          SHA1

          46700c6415a21c420d4c3213f664addd3cb9afa3

          SHA256

          6ffe58f010af828067bb1f59c1a0f8ad51aa99f42a00970d83db01d462fb152f

          SHA512

          f89ed348c74014a37bb274851c86f9f44b057356400f920d96d34c84237ca0d9549c462c62e34a2a327694de3feab7bfc3415f0e6b371efa9ac1b2f83f03e7ff

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un859046.exe

          Filesize

          546KB

          MD5

          5db03564e1a98e16c68e64e9c7433502

          SHA1

          9906f54418d853642ccafaeca4cb3d823066afd5

          SHA256

          6b967b93b698687f39dc62f55d95cf8bde54becf53245dfed589bf6846f660ab

          SHA512

          97833f1680381b61f6f869255d12eb04b9d2ce2124ca2651f21a406bdef56a80debaab2243e97603c17b4e7c8aaca4af132cf0abdd9dc7eb728d78424d49827e

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un859046.exe

          Filesize

          546KB

          MD5

          5db03564e1a98e16c68e64e9c7433502

          SHA1

          9906f54418d853642ccafaeca4cb3d823066afd5

          SHA256

          6b967b93b698687f39dc62f55d95cf8bde54becf53245dfed589bf6846f660ab

          SHA512

          97833f1680381b61f6f869255d12eb04b9d2ce2124ca2651f21a406bdef56a80debaab2243e97603c17b4e7c8aaca4af132cf0abdd9dc7eb728d78424d49827e

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8900.exe

          Filesize

          325KB

          MD5

          f868a91a3074f6811bf8e6d3ebf88c7b

          SHA1

          50818d945faa647f96037c3241aea0ba27c759ea

          SHA256

          bb6e5133570676db27697681dbe943826490657c398e523bc4d5f81f2660fce8

          SHA512

          233e86fa85e69fcd3268eb71d3abf3b9e565267e294d5f0616bea7e950a88eaf50c4fc733cf92f803349b2dd5fc161980725511fd5b1d57bfb4ab1477172fbbf

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8900.exe

          Filesize

          325KB

          MD5

          f868a91a3074f6811bf8e6d3ebf88c7b

          SHA1

          50818d945faa647f96037c3241aea0ba27c759ea

          SHA256

          bb6e5133570676db27697681dbe943826490657c398e523bc4d5f81f2660fce8

          SHA512

          233e86fa85e69fcd3268eb71d3abf3b9e565267e294d5f0616bea7e950a88eaf50c4fc733cf92f803349b2dd5fc161980725511fd5b1d57bfb4ab1477172fbbf

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4561.exe

          Filesize

          384KB

          MD5

          b95fbd16fd9189c917f139b8a8c9d3b0

          SHA1

          89b824f0be13f090bf5a0099bcf3c352fc799709

          SHA256

          83378518fe07a15ea294531b147cb4a2449c961ee6a6ade06e4879f2ce4d8863

          SHA512

          efb4ab22766a4a1961946a08f3482931a2313afab2995a1df07a8f16e26c5942bdc9f63a18ddaa600f391d022332543f2bed3814c52ceb9ba01c07e8c8e12806

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4561.exe

          Filesize

          384KB

          MD5

          b95fbd16fd9189c917f139b8a8c9d3b0

          SHA1

          89b824f0be13f090bf5a0099bcf3c352fc799709

          SHA256

          83378518fe07a15ea294531b147cb4a2449c961ee6a6ade06e4879f2ce4d8863

          SHA512

          efb4ab22766a4a1961946a08f3482931a2313afab2995a1df07a8f16e26c5942bdc9f63a18ddaa600f391d022332543f2bed3814c52ceb9ba01c07e8c8e12806

        • memory/1060-1085-0x0000000007D30000-0x0000000007E3A000-memory.dmp

          Filesize

          1.0MB

        • memory/1060-211-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

          Filesize

          248KB

        • memory/1060-1100-0x000000000B390000-0x000000000B8BC000-memory.dmp

          Filesize

          5.2MB

        • memory/1060-1099-0x000000000B1C0000-0x000000000B382000-memory.dmp

          Filesize

          1.8MB

        • memory/1060-1098-0x000000000B160000-0x000000000B1B0000-memory.dmp

          Filesize

          320KB

        • memory/1060-1097-0x000000000B0D0000-0x000000000B146000-memory.dmp

          Filesize

          472KB

        • memory/1060-1096-0x0000000004B60000-0x0000000004B70000-memory.dmp

          Filesize

          64KB

        • memory/1060-1095-0x0000000004B60000-0x0000000004B70000-memory.dmp

          Filesize

          64KB

        • memory/1060-1094-0x0000000004B60000-0x0000000004B70000-memory.dmp

          Filesize

          64KB

        • memory/1060-1093-0x0000000004B60000-0x0000000004B70000-memory.dmp

          Filesize

          64KB

        • memory/1060-1092-0x0000000008860000-0x00000000088F2000-memory.dmp

          Filesize

          584KB

        • memory/1060-1091-0x0000000008170000-0x00000000081D6000-memory.dmp

          Filesize

          408KB

        • memory/1060-1089-0x0000000007FE0000-0x000000000802B000-memory.dmp

          Filesize

          300KB

        • memory/1060-1088-0x0000000004B60000-0x0000000004B70000-memory.dmp

          Filesize

          64KB

        • memory/1060-1087-0x0000000007E90000-0x0000000007ECE000-memory.dmp

          Filesize

          248KB

        • memory/1060-1086-0x0000000007E70000-0x0000000007E82000-memory.dmp

          Filesize

          72KB

        • memory/1060-191-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

          Filesize

          248KB

        • memory/1060-193-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

          Filesize

          248KB

        • memory/1060-1084-0x00000000076C0000-0x0000000007CC6000-memory.dmp

          Filesize

          6.0MB

        • memory/1060-202-0x0000000004B60000-0x0000000004B70000-memory.dmp

          Filesize

          64KB

        • memory/1060-209-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

          Filesize

          248KB

        • memory/1060-172-0x0000000004B10000-0x0000000004B56000-memory.dmp

          Filesize

          280KB

        • memory/1060-173-0x0000000004CC0000-0x0000000004D04000-memory.dmp

          Filesize

          272KB

        • memory/1060-174-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

          Filesize

          248KB

        • memory/1060-175-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

          Filesize

          248KB

        • memory/1060-177-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

          Filesize

          248KB

        • memory/1060-179-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

          Filesize

          248KB

        • memory/1060-181-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

          Filesize

          248KB

        • memory/1060-183-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

          Filesize

          248KB

        • memory/1060-187-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

          Filesize

          248KB

        • memory/1060-185-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

          Filesize

          248KB

        • memory/1060-189-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

          Filesize

          248KB

        • memory/1060-205-0x0000000004B60000-0x0000000004B70000-memory.dmp

          Filesize

          64KB

        • memory/1060-195-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

          Filesize

          248KB

        • memory/1060-207-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

          Filesize

          248KB

        • memory/1060-197-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

          Filesize

          248KB

        • memory/1060-198-0x0000000002C60000-0x0000000002CAB000-memory.dmp

          Filesize

          300KB

        • memory/1060-201-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

          Filesize

          248KB

        • memory/1060-200-0x0000000004B60000-0x0000000004B70000-memory.dmp

          Filesize

          64KB

        • memory/1060-204-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

          Filesize

          248KB

        • memory/2064-164-0x0000000004B40000-0x0000000004B52000-memory.dmp

          Filesize

          72KB

        • memory/2064-165-0x0000000000400000-0x0000000002B7F000-memory.dmp

          Filesize

          39.5MB

        • memory/2064-136-0x0000000004B40000-0x0000000004B58000-memory.dmp

          Filesize

          96KB

        • memory/2064-134-0x0000000002E90000-0x0000000002EA0000-memory.dmp

          Filesize

          64KB

        • memory/2064-135-0x0000000007250000-0x000000000774E000-memory.dmp

          Filesize

          5.0MB

        • memory/2064-167-0x0000000000400000-0x0000000002B7F000-memory.dmp

          Filesize

          39.5MB

        • memory/2064-133-0x0000000002E90000-0x0000000002EA0000-memory.dmp

          Filesize

          64KB

        • memory/2064-162-0x0000000004B40000-0x0000000004B52000-memory.dmp

          Filesize

          72KB

        • memory/2064-160-0x0000000004B40000-0x0000000004B52000-memory.dmp

          Filesize

          72KB

        • memory/2064-158-0x0000000004B40000-0x0000000004B52000-memory.dmp

          Filesize

          72KB

        • memory/2064-156-0x0000000004B40000-0x0000000004B52000-memory.dmp

          Filesize

          72KB

        • memory/2064-154-0x0000000004B40000-0x0000000004B52000-memory.dmp

          Filesize

          72KB

        • memory/2064-152-0x0000000004B40000-0x0000000004B52000-memory.dmp

          Filesize

          72KB

        • memory/2064-150-0x0000000004B40000-0x0000000004B52000-memory.dmp

          Filesize

          72KB

        • memory/2064-148-0x0000000004B40000-0x0000000004B52000-memory.dmp

          Filesize

          72KB

        • memory/2064-146-0x0000000004B40000-0x0000000004B52000-memory.dmp

          Filesize

          72KB

        • memory/2064-144-0x0000000004B40000-0x0000000004B52000-memory.dmp

          Filesize

          72KB

        • memory/2064-142-0x0000000004B40000-0x0000000004B52000-memory.dmp

          Filesize

          72KB

        • memory/2064-140-0x0000000004B40000-0x0000000004B52000-memory.dmp

          Filesize

          72KB

        • memory/2064-138-0x0000000004B40000-0x0000000004B52000-memory.dmp

          Filesize

          72KB

        • memory/2064-137-0x0000000004B40000-0x0000000004B52000-memory.dmp

          Filesize

          72KB

        • memory/2064-132-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB

        • memory/2064-131-0x0000000004AA0000-0x0000000004ABA000-memory.dmp

          Filesize

          104KB

        • memory/4396-1106-0x0000000000430000-0x0000000000462000-memory.dmp

          Filesize

          200KB

        • memory/4396-1107-0x0000000004E70000-0x0000000004EBB000-memory.dmp

          Filesize

          300KB

        • memory/4396-1108-0x0000000004C90000-0x0000000004CA0000-memory.dmp

          Filesize

          64KB

        • memory/4396-1109-0x0000000004C90000-0x0000000004CA0000-memory.dmp

          Filesize

          64KB