Analysis

  • max time kernel
    135s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2023, 21:01

General

  • Target

    0be6e75898eb9c83a55a3b67c9d51e2bd8b030a4586dac5d963f2d94304118d1.exe

  • Size

    683KB

  • MD5

    3ba3bf8e917106c5c1c8fab2d1109ee4

  • SHA1

    f093699422605e5903c31cb16a3f0947212e1628

  • SHA256

    0be6e75898eb9c83a55a3b67c9d51e2bd8b030a4586dac5d963f2d94304118d1

  • SHA512

    5e56e5a915ce55717c2655b5b3616203a0b0c9b670e0ef68d5dd3083e0e3b72c987961885132ac4402cf43d20c2a2116ce9982a06211eeb5cb72e9d70c289103

  • SSDEEP

    12288:aMrBy9016G54OVpFmj2zlbCXqR6z5NhVmlk0B9RFwVsiV/Knq4cxbuf3ex:Xye0Os2hcNhVmlp9RFw9V/Knq4cxb8ex

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

dent

C2

193.233.20.33:4125

Attributes
  • auth_value

    e795368557f02e28e8aef6bcb279a3b0

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0be6e75898eb9c83a55a3b67c9d51e2bd8b030a4586dac5d963f2d94304118d1.exe
    "C:\Users\Admin\AppData\Local\Temp\0be6e75898eb9c83a55a3b67c9d51e2bd8b030a4586dac5d963f2d94304118d1.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4416
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un982266.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un982266.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3192
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1966.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1966.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3376
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0414.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0414.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4832
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si823106.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si823106.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3616

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si823106.exe

    Filesize

    175KB

    MD5

    931b5059ca7a23cab7cc289f6321e32d

    SHA1

    dc341e19cd03def0982c2e7a91c8ee01ec47a93f

    SHA256

    0614c90c5f5819cdc36c3f9c16a957fa4ebc1ba7364855c83a5f260a4207dc8d

    SHA512

    752c76997cf9ceb0e0cddf7adcc4c9ad4faf26c0ddfcadad85cb0cfe275df1da600fd8c0c8ef2dc980e2cbb4676f9c8b0c63dc748860fdc12a82436ebdc66188

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si823106.exe

    Filesize

    175KB

    MD5

    931b5059ca7a23cab7cc289f6321e32d

    SHA1

    dc341e19cd03def0982c2e7a91c8ee01ec47a93f

    SHA256

    0614c90c5f5819cdc36c3f9c16a957fa4ebc1ba7364855c83a5f260a4207dc8d

    SHA512

    752c76997cf9ceb0e0cddf7adcc4c9ad4faf26c0ddfcadad85cb0cfe275df1da600fd8c0c8ef2dc980e2cbb4676f9c8b0c63dc748860fdc12a82436ebdc66188

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un982266.exe

    Filesize

    541KB

    MD5

    786ac1c80d400ce09bea17a479f33c8e

    SHA1

    c1dd7ab72271c4fddcfa4e4d82d0458cd76acad5

    SHA256

    e492cf96ba4c6094bc4d92aa32de38e68cdfe7a77e11e577baf4abd172db5465

    SHA512

    d4af8eead170ecfd51b1d128baae266c27407d48716c185b8f3ae73c17c2887791e842b60bf7a0683b86c15c6f76ca0f9480e9453ea8b4b02ce25a6a705c5f47

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un982266.exe

    Filesize

    541KB

    MD5

    786ac1c80d400ce09bea17a479f33c8e

    SHA1

    c1dd7ab72271c4fddcfa4e4d82d0458cd76acad5

    SHA256

    e492cf96ba4c6094bc4d92aa32de38e68cdfe7a77e11e577baf4abd172db5465

    SHA512

    d4af8eead170ecfd51b1d128baae266c27407d48716c185b8f3ae73c17c2887791e842b60bf7a0683b86c15c6f76ca0f9480e9453ea8b4b02ce25a6a705c5f47

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1966.exe

    Filesize

    322KB

    MD5

    8c29d48fadb988f9b272ade5fd192012

    SHA1

    96801f8e6315833bc47b92dcb7845428b058a5da

    SHA256

    1d139ce5e249c3b46e8cac4739048ab55b5f66d07ce14703c47bc87ca0de7690

    SHA512

    72890c51add9860348217c1eda7a0bceecd0d5ce744175a1ca5de6006e6185da8a1886e8a2b558fa419448fcafb916fa54e4d75a4a425ef2c31652cea1a6f471

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1966.exe

    Filesize

    322KB

    MD5

    8c29d48fadb988f9b272ade5fd192012

    SHA1

    96801f8e6315833bc47b92dcb7845428b058a5da

    SHA256

    1d139ce5e249c3b46e8cac4739048ab55b5f66d07ce14703c47bc87ca0de7690

    SHA512

    72890c51add9860348217c1eda7a0bceecd0d5ce744175a1ca5de6006e6185da8a1886e8a2b558fa419448fcafb916fa54e4d75a4a425ef2c31652cea1a6f471

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0414.exe

    Filesize

    379KB

    MD5

    8e4bff8bdc4abcd79fb8c163fc2dd530

    SHA1

    f3bfb9e0f9f35648b8b04ec598294b10956dd920

    SHA256

    f867ee6a1eb5ff53494ef15ff21a1eefd9afd96805ced5414e928c694ab37a0b

    SHA512

    abdbaae60a709d3f541fc2bfd4e8c7410928bc8780a01c01206933b9594ee7ab294960164376d0ff37afccbaf1cbc28722ccbc2efd74f3faa169335c9a172d29

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0414.exe

    Filesize

    379KB

    MD5

    8e4bff8bdc4abcd79fb8c163fc2dd530

    SHA1

    f3bfb9e0f9f35648b8b04ec598294b10956dd920

    SHA256

    f867ee6a1eb5ff53494ef15ff21a1eefd9afd96805ced5414e928c694ab37a0b

    SHA512

    abdbaae60a709d3f541fc2bfd4e8c7410928bc8780a01c01206933b9594ee7ab294960164376d0ff37afccbaf1cbc28722ccbc2efd74f3faa169335c9a172d29

  • memory/3376-148-0x0000000002C50000-0x0000000002C7D000-memory.dmp

    Filesize

    180KB

  • memory/3376-149-0x00000000073E0000-0x00000000073F0000-memory.dmp

    Filesize

    64KB

  • memory/3376-150-0x00000000073E0000-0x00000000073F0000-memory.dmp

    Filesize

    64KB

  • memory/3376-151-0x00000000073F0000-0x0000000007994000-memory.dmp

    Filesize

    5.6MB

  • memory/3376-153-0x0000000007240000-0x0000000007252000-memory.dmp

    Filesize

    72KB

  • memory/3376-152-0x0000000007240000-0x0000000007252000-memory.dmp

    Filesize

    72KB

  • memory/3376-155-0x0000000007240000-0x0000000007252000-memory.dmp

    Filesize

    72KB

  • memory/3376-157-0x0000000007240000-0x0000000007252000-memory.dmp

    Filesize

    72KB

  • memory/3376-159-0x0000000007240000-0x0000000007252000-memory.dmp

    Filesize

    72KB

  • memory/3376-161-0x0000000007240000-0x0000000007252000-memory.dmp

    Filesize

    72KB

  • memory/3376-163-0x0000000007240000-0x0000000007252000-memory.dmp

    Filesize

    72KB

  • memory/3376-165-0x0000000007240000-0x0000000007252000-memory.dmp

    Filesize

    72KB

  • memory/3376-167-0x0000000007240000-0x0000000007252000-memory.dmp

    Filesize

    72KB

  • memory/3376-169-0x0000000007240000-0x0000000007252000-memory.dmp

    Filesize

    72KB

  • memory/3376-171-0x0000000007240000-0x0000000007252000-memory.dmp

    Filesize

    72KB

  • memory/3376-173-0x0000000007240000-0x0000000007252000-memory.dmp

    Filesize

    72KB

  • memory/3376-175-0x0000000007240000-0x0000000007252000-memory.dmp

    Filesize

    72KB

  • memory/3376-177-0x0000000007240000-0x0000000007252000-memory.dmp

    Filesize

    72KB

  • memory/3376-179-0x0000000007240000-0x0000000007252000-memory.dmp

    Filesize

    72KB

  • memory/3376-180-0x00000000073E0000-0x00000000073F0000-memory.dmp

    Filesize

    64KB

  • memory/3376-181-0x0000000000400000-0x0000000002B7E000-memory.dmp

    Filesize

    39.5MB

  • memory/3376-182-0x00000000073E0000-0x00000000073F0000-memory.dmp

    Filesize

    64KB

  • memory/3376-183-0x00000000073E0000-0x00000000073F0000-memory.dmp

    Filesize

    64KB

  • memory/3376-185-0x00000000073E0000-0x00000000073F0000-memory.dmp

    Filesize

    64KB

  • memory/3376-186-0x0000000000400000-0x0000000002B7E000-memory.dmp

    Filesize

    39.5MB

  • memory/3616-1122-0x0000000000120000-0x0000000000152000-memory.dmp

    Filesize

    200KB

  • memory/3616-1123-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/4832-194-0x00000000047F0000-0x0000000004800000-memory.dmp

    Filesize

    64KB

  • memory/4832-226-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

    Filesize

    248KB

  • memory/4832-196-0x00000000047F0000-0x0000000004800000-memory.dmp

    Filesize

    64KB

  • memory/4832-200-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

    Filesize

    248KB

  • memory/4832-198-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

    Filesize

    248KB

  • memory/4832-195-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

    Filesize

    248KB

  • memory/4832-193-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

    Filesize

    248KB

  • memory/4832-202-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

    Filesize

    248KB

  • memory/4832-204-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

    Filesize

    248KB

  • memory/4832-206-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

    Filesize

    248KB

  • memory/4832-208-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

    Filesize

    248KB

  • memory/4832-210-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

    Filesize

    248KB

  • memory/4832-212-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

    Filesize

    248KB

  • memory/4832-214-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

    Filesize

    248KB

  • memory/4832-216-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

    Filesize

    248KB

  • memory/4832-218-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

    Filesize

    248KB

  • memory/4832-220-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

    Filesize

    248KB

  • memory/4832-222-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

    Filesize

    248KB

  • memory/4832-224-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

    Filesize

    248KB

  • memory/4832-192-0x00000000047F0000-0x0000000004800000-memory.dmp

    Filesize

    64KB

  • memory/4832-228-0x0000000004BD0000-0x0000000004C0E000-memory.dmp

    Filesize

    248KB

  • memory/4832-1101-0x00000000079E0000-0x0000000007FF8000-memory.dmp

    Filesize

    6.1MB

  • memory/4832-1102-0x0000000008000000-0x000000000810A000-memory.dmp

    Filesize

    1.0MB

  • memory/4832-1103-0x0000000004E80000-0x0000000004E92000-memory.dmp

    Filesize

    72KB

  • memory/4832-1104-0x0000000004EA0000-0x0000000004EDC000-memory.dmp

    Filesize

    240KB

  • memory/4832-1105-0x00000000047F0000-0x0000000004800000-memory.dmp

    Filesize

    64KB

  • memory/4832-1107-0x00000000083C0000-0x0000000008452000-memory.dmp

    Filesize

    584KB

  • memory/4832-1108-0x0000000008460000-0x00000000084C6000-memory.dmp

    Filesize

    408KB

  • memory/4832-1109-0x00000000047F0000-0x0000000004800000-memory.dmp

    Filesize

    64KB

  • memory/4832-1110-0x00000000047F0000-0x0000000004800000-memory.dmp

    Filesize

    64KB

  • memory/4832-1111-0x00000000047F0000-0x0000000004800000-memory.dmp

    Filesize

    64KB

  • memory/4832-1112-0x0000000008C80000-0x0000000008E42000-memory.dmp

    Filesize

    1.8MB

  • memory/4832-1113-0x0000000008E60000-0x000000000938C000-memory.dmp

    Filesize

    5.2MB

  • memory/4832-191-0x0000000002DB0000-0x0000000002DFB000-memory.dmp

    Filesize

    300KB

  • memory/4832-1114-0x00000000094B0000-0x0000000009526000-memory.dmp

    Filesize

    472KB

  • memory/4832-1115-0x0000000009550000-0x00000000095A0000-memory.dmp

    Filesize

    320KB

  • memory/4832-1118-0x00000000047F0000-0x0000000004800000-memory.dmp

    Filesize

    64KB