Analysis

  • max time kernel
    102s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-03-2023 20:46

General

  • Target

    5fecace50261030578df795621efa98217509d41d18d5f4a5489618432aa84eb.exe

  • Size

    684KB

  • MD5

    d3a19b6c70e3715ddc07dee96a9e61d0

  • SHA1

    aff98cbf14f9ffef042427fb224e1f04e6cc1269

  • SHA256

    5fecace50261030578df795621efa98217509d41d18d5f4a5489618432aa84eb

  • SHA512

    44dadcd619a0e68a9b5a77248f9bf2d2b191eb0ca07f8095e634f0d6d8f9ad2d1c23e21838f99264612df34d9fabe626da2bb870b7ed08d094117c8f92d45463

  • SSDEEP

    12288:pMrsy90WD8gFwv62mHTSL0nP/jksBCwEeVUVBcv5XwR:lyjDGv5sSAnP/jBQ2v9wR

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

dent

C2

193.233.20.33:4125

Attributes
  • auth_value

    e795368557f02e28e8aef6bcb279a3b0

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5fecace50261030578df795621efa98217509d41d18d5f4a5489618432aa84eb.exe
    "C:\Users\Admin\AppData\Local\Temp\5fecace50261030578df795621efa98217509d41d18d5f4a5489618432aa84eb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4700
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un657639.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un657639.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2564
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1196.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1196.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5028
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1206.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1206.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:208
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si991417.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si991417.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4588

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si991417.exe

    Filesize

    175KB

    MD5

    6365e9723c550859a7ce79a4d0b681ea

    SHA1

    91c2b3ad78b383319b8a53c79ab0b8d8bddfbb0c

    SHA256

    535ebb9847a52a99d40f26f013ae1e6bd0f3a2753f45849e9e5c08b82bd1fe69

    SHA512

    b7b61d9dfa43016ecb9f8bbb1f87b0805988cf2d9cc7d71227e8e10447c8afcd4970a681c18fddb85422f8859b8b5cbd88f4cacf3ee17b8efda70d759570b0bc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si991417.exe

    Filesize

    175KB

    MD5

    6365e9723c550859a7ce79a4d0b681ea

    SHA1

    91c2b3ad78b383319b8a53c79ab0b8d8bddfbb0c

    SHA256

    535ebb9847a52a99d40f26f013ae1e6bd0f3a2753f45849e9e5c08b82bd1fe69

    SHA512

    b7b61d9dfa43016ecb9f8bbb1f87b0805988cf2d9cc7d71227e8e10447c8afcd4970a681c18fddb85422f8859b8b5cbd88f4cacf3ee17b8efda70d759570b0bc

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un657639.exe

    Filesize

    541KB

    MD5

    2311abd839f9521de66e9a503e6cd13e

    SHA1

    6acb64a244214cd5e8798a9bb064b574ae24a060

    SHA256

    172007c25c93ed06b350029611a7c3a57f1cbe4bcd0294a9e5779ae859e1d61c

    SHA512

    cd06c5e6f8bc6d8e708795e8bc3249ea9b5dee9ed7ef4438db07c7d4882cbefaa1abbf381dd7afb53e3803bb9db251363bd8192334496ba7f49df776581ae8ba

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un657639.exe

    Filesize

    541KB

    MD5

    2311abd839f9521de66e9a503e6cd13e

    SHA1

    6acb64a244214cd5e8798a9bb064b574ae24a060

    SHA256

    172007c25c93ed06b350029611a7c3a57f1cbe4bcd0294a9e5779ae859e1d61c

    SHA512

    cd06c5e6f8bc6d8e708795e8bc3249ea9b5dee9ed7ef4438db07c7d4882cbefaa1abbf381dd7afb53e3803bb9db251363bd8192334496ba7f49df776581ae8ba

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1196.exe

    Filesize

    322KB

    MD5

    f082b052a4f36d14110422480006485b

    SHA1

    6a6aae97d95e544f5ac625ffa5375c9978cc8ea6

    SHA256

    04ad01cd9d41fd2dec1757182c76f5b354fc50b1dc2c5942c9645ae5c864f1c7

    SHA512

    18776a2f08a3f609a3f4248143041b22f2db92fa6a4973ffd54eeb3c6a07fbed9254d3133a563534b28336b9b27ea93b1e0e7141219aefcfbdec68759bb4559e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1196.exe

    Filesize

    322KB

    MD5

    f082b052a4f36d14110422480006485b

    SHA1

    6a6aae97d95e544f5ac625ffa5375c9978cc8ea6

    SHA256

    04ad01cd9d41fd2dec1757182c76f5b354fc50b1dc2c5942c9645ae5c864f1c7

    SHA512

    18776a2f08a3f609a3f4248143041b22f2db92fa6a4973ffd54eeb3c6a07fbed9254d3133a563534b28336b9b27ea93b1e0e7141219aefcfbdec68759bb4559e

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1206.exe

    Filesize

    379KB

    MD5

    df3b161acac5f07369851c8af1f83016

    SHA1

    d732ea81a5ef282859d8d2dd713b602e08c00aa9

    SHA256

    65494b1269ebdf8e1b07a6a4311e102c9dd6b782452b0008b5f7cc3d991877ba

    SHA512

    cbe96ecaa05d253b0c69d1cdbdf2f143454c009e2ea6ee1e30b0d23a72464f17e0498e5291cb15b10922fa8af9e49b2d5c02b501840a021f02953d875c63ff5c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1206.exe

    Filesize

    379KB

    MD5

    df3b161acac5f07369851c8af1f83016

    SHA1

    d732ea81a5ef282859d8d2dd713b602e08c00aa9

    SHA256

    65494b1269ebdf8e1b07a6a4311e102c9dd6b782452b0008b5f7cc3d991877ba

    SHA512

    cbe96ecaa05d253b0c69d1cdbdf2f143454c009e2ea6ee1e30b0d23a72464f17e0498e5291cb15b10922fa8af9e49b2d5c02b501840a021f02953d875c63ff5c

  • memory/208-227-0x0000000004E40000-0x0000000004E7E000-memory.dmp

    Filesize

    248KB

  • memory/208-1102-0x0000000007F70000-0x0000000007F82000-memory.dmp

    Filesize

    72KB

  • memory/208-1115-0x0000000002E80000-0x0000000002E90000-memory.dmp

    Filesize

    64KB

  • memory/208-1114-0x0000000008FA0000-0x00000000094CC000-memory.dmp

    Filesize

    5.2MB

  • memory/208-1113-0x0000000008DD0000-0x0000000008F92000-memory.dmp

    Filesize

    1.8MB

  • memory/208-1112-0x0000000008D50000-0x0000000008DA0000-memory.dmp

    Filesize

    320KB

  • memory/208-1111-0x0000000008CD0000-0x0000000008D46000-memory.dmp

    Filesize

    472KB

  • memory/208-1110-0x0000000002E80000-0x0000000002E90000-memory.dmp

    Filesize

    64KB

  • memory/208-1109-0x0000000002E80000-0x0000000002E90000-memory.dmp

    Filesize

    64KB

  • memory/208-1108-0x0000000002E80000-0x0000000002E90000-memory.dmp

    Filesize

    64KB

  • memory/208-1107-0x0000000008320000-0x0000000008386000-memory.dmp

    Filesize

    408KB

  • memory/208-1106-0x0000000008280000-0x0000000008312000-memory.dmp

    Filesize

    584KB

  • memory/208-1104-0x0000000007F90000-0x0000000007FCC000-memory.dmp

    Filesize

    240KB

  • memory/208-1103-0x0000000002E80000-0x0000000002E90000-memory.dmp

    Filesize

    64KB

  • memory/208-1101-0x0000000007E30000-0x0000000007F3A000-memory.dmp

    Filesize

    1.0MB

  • memory/208-1100-0x0000000007790000-0x0000000007DA8000-memory.dmp

    Filesize

    6.1MB

  • memory/208-225-0x0000000004E40000-0x0000000004E7E000-memory.dmp

    Filesize

    248KB

  • memory/208-223-0x0000000004E40000-0x0000000004E7E000-memory.dmp

    Filesize

    248KB

  • memory/208-221-0x0000000004E40000-0x0000000004E7E000-memory.dmp

    Filesize

    248KB

  • memory/208-219-0x0000000004E40000-0x0000000004E7E000-memory.dmp

    Filesize

    248KB

  • memory/208-217-0x0000000004E40000-0x0000000004E7E000-memory.dmp

    Filesize

    248KB

  • memory/208-215-0x0000000004E40000-0x0000000004E7E000-memory.dmp

    Filesize

    248KB

  • memory/208-190-0x0000000002C60000-0x0000000002CAB000-memory.dmp

    Filesize

    300KB

  • memory/208-191-0x0000000002E80000-0x0000000002E90000-memory.dmp

    Filesize

    64KB

  • memory/208-192-0x0000000004E40000-0x0000000004E7E000-memory.dmp

    Filesize

    248KB

  • memory/208-193-0x0000000002E80000-0x0000000002E90000-memory.dmp

    Filesize

    64KB

  • memory/208-195-0x0000000002E80000-0x0000000002E90000-memory.dmp

    Filesize

    64KB

  • memory/208-197-0x0000000004E40000-0x0000000004E7E000-memory.dmp

    Filesize

    248KB

  • memory/208-194-0x0000000004E40000-0x0000000004E7E000-memory.dmp

    Filesize

    248KB

  • memory/208-199-0x0000000004E40000-0x0000000004E7E000-memory.dmp

    Filesize

    248KB

  • memory/208-201-0x0000000004E40000-0x0000000004E7E000-memory.dmp

    Filesize

    248KB

  • memory/208-203-0x0000000004E40000-0x0000000004E7E000-memory.dmp

    Filesize

    248KB

  • memory/208-205-0x0000000004E40000-0x0000000004E7E000-memory.dmp

    Filesize

    248KB

  • memory/208-207-0x0000000004E40000-0x0000000004E7E000-memory.dmp

    Filesize

    248KB

  • memory/208-209-0x0000000004E40000-0x0000000004E7E000-memory.dmp

    Filesize

    248KB

  • memory/208-211-0x0000000004E40000-0x0000000004E7E000-memory.dmp

    Filesize

    248KB

  • memory/208-213-0x0000000004E40000-0x0000000004E7E000-memory.dmp

    Filesize

    248KB

  • memory/4588-1121-0x0000000000540000-0x0000000000572000-memory.dmp

    Filesize

    200KB

  • memory/4588-1122-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

    Filesize

    64KB

  • memory/5028-172-0x0000000007220000-0x0000000007232000-memory.dmp

    Filesize

    72KB

  • memory/5028-148-0x0000000002CB0000-0x0000000002CDD000-memory.dmp

    Filesize

    180KB

  • memory/5028-182-0x0000000007290000-0x00000000072A0000-memory.dmp

    Filesize

    64KB

  • memory/5028-181-0x0000000000400000-0x0000000002B7E000-memory.dmp

    Filesize

    39.5MB

  • memory/5028-150-0x0000000007290000-0x00000000072A0000-memory.dmp

    Filesize

    64KB

  • memory/5028-180-0x0000000007220000-0x0000000007232000-memory.dmp

    Filesize

    72KB

  • memory/5028-178-0x0000000007220000-0x0000000007232000-memory.dmp

    Filesize

    72KB

  • memory/5028-153-0x0000000007220000-0x0000000007232000-memory.dmp

    Filesize

    72KB

  • memory/5028-176-0x0000000007220000-0x0000000007232000-memory.dmp

    Filesize

    72KB

  • memory/5028-174-0x0000000007220000-0x0000000007232000-memory.dmp

    Filesize

    72KB

  • memory/5028-152-0x00000000072A0000-0x0000000007844000-memory.dmp

    Filesize

    5.6MB

  • memory/5028-183-0x0000000007290000-0x00000000072A0000-memory.dmp

    Filesize

    64KB

  • memory/5028-164-0x0000000007220000-0x0000000007232000-memory.dmp

    Filesize

    72KB

  • memory/5028-166-0x0000000007220000-0x0000000007232000-memory.dmp

    Filesize

    72KB

  • memory/5028-168-0x0000000007220000-0x0000000007232000-memory.dmp

    Filesize

    72KB

  • memory/5028-162-0x0000000007220000-0x0000000007232000-memory.dmp

    Filesize

    72KB

  • memory/5028-160-0x0000000007220000-0x0000000007232000-memory.dmp

    Filesize

    72KB

  • memory/5028-158-0x0000000007220000-0x0000000007232000-memory.dmp

    Filesize

    72KB

  • memory/5028-156-0x0000000007220000-0x0000000007232000-memory.dmp

    Filesize

    72KB

  • memory/5028-154-0x0000000007220000-0x0000000007232000-memory.dmp

    Filesize

    72KB

  • memory/5028-149-0x0000000007290000-0x00000000072A0000-memory.dmp

    Filesize

    64KB

  • memory/5028-170-0x0000000007220000-0x0000000007232000-memory.dmp

    Filesize

    72KB

  • memory/5028-185-0x0000000000400000-0x0000000002B7E000-memory.dmp

    Filesize

    39.5MB

  • memory/5028-151-0x0000000007290000-0x00000000072A0000-memory.dmp

    Filesize

    64KB