Analysis

  • max time kernel
    52s
  • max time network
    73s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 00:07

General

  • Target

    55e941b2c4c462c9ad43ae000c08372e64e51a0f26c3cb9b9ce9897ff55cc84f.exe

  • Size

    682KB

  • MD5

    879dc01c8789f17d701d4862b2b7a4a0

  • SHA1

    b09306e8abd43834d7f538b8266eadf8862e731a

  • SHA256

    55e941b2c4c462c9ad43ae000c08372e64e51a0f26c3cb9b9ce9897ff55cc84f

  • SHA512

    e33a10a88830731916a6a0f29c5259813f53dccbc6672a120b78d9b405fcbad153af62abee6fcf46d9dd259e81f88ad59dc1abd8bfdb170b0bc4a53246006659

  • SSDEEP

    12288:YMrny90ZOqjRRth2Y0gBuG/ls1bvu/rjP7gl48ZTkXpeypU4:vyiOqjRR32Y9BRyhG8l48ZTkYYd

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

dent

C2

193.233.20.33:4125

Attributes
  • auth_value

    e795368557f02e28e8aef6bcb279a3b0

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55e941b2c4c462c9ad43ae000c08372e64e51a0f26c3cb9b9ce9897ff55cc84f.exe
    "C:\Users\Admin\AppData\Local\Temp\55e941b2c4c462c9ad43ae000c08372e64e51a0f26c3cb9b9ce9897ff55cc84f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un832736.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un832736.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5032
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9895.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9895.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2080
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5208.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5208.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3784
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si552781.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si552781.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4820

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si552781.exe

    Filesize

    175KB

    MD5

    bdb7a8a688af45d403194453893d842b

    SHA1

    055ccc82c33ee6dbaa3e9ce9e257b6040b71f7ab

    SHA256

    7779ee7b1e731a81fdbba79af9a872ad9779b2b1e2a9eb62d09160c622affbaa

    SHA512

    3e2a9a5dd06453a275c25f20b7bb299a7b0a7de868445d9a71e769f47b7b154008b1e13106e2635d866cf60f73ede36cdd230879ea6da780ff73f6fb8a689e93

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si552781.exe

    Filesize

    175KB

    MD5

    bdb7a8a688af45d403194453893d842b

    SHA1

    055ccc82c33ee6dbaa3e9ce9e257b6040b71f7ab

    SHA256

    7779ee7b1e731a81fdbba79af9a872ad9779b2b1e2a9eb62d09160c622affbaa

    SHA512

    3e2a9a5dd06453a275c25f20b7bb299a7b0a7de868445d9a71e769f47b7b154008b1e13106e2635d866cf60f73ede36cdd230879ea6da780ff73f6fb8a689e93

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un832736.exe

    Filesize

    540KB

    MD5

    4c1a10c50ae4ac19ef0a18d2a83c3881

    SHA1

    3ffd8db20182961041cdefff4561f9297c0ad5d6

    SHA256

    7810ba9ad6366813ff7f9270e5599171e58e2702c796953adf3f049e7ddc2e49

    SHA512

    4e97289a43396ea35509938d44bb2a9f4bde40516a9119b943e79ba0d33ea8b17cb3ef9c38757569384980874f02118dcfe5f6ffae0ab923d0f55ac57394184d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un832736.exe

    Filesize

    540KB

    MD5

    4c1a10c50ae4ac19ef0a18d2a83c3881

    SHA1

    3ffd8db20182961041cdefff4561f9297c0ad5d6

    SHA256

    7810ba9ad6366813ff7f9270e5599171e58e2702c796953adf3f049e7ddc2e49

    SHA512

    4e97289a43396ea35509938d44bb2a9f4bde40516a9119b943e79ba0d33ea8b17cb3ef9c38757569384980874f02118dcfe5f6ffae0ab923d0f55ac57394184d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9895.exe

    Filesize

    322KB

    MD5

    e6273e2d059ff5c363acbb2adfbd1086

    SHA1

    5ea60c04acb16056ac61ec64acbdf7cb3c16d75b

    SHA256

    2529e0e9224491a34b5f79e9a9800a767e8764f676a4c6fc72a7e946d36d38a5

    SHA512

    3e04eb5f93e06a5e88f7421ec3c74c8cdc19101f5b18e6efa7397c9b70dcf60ea182e8b855d4d4c1ed4f51561007a81ae3f22fe9256486093becee48e6ad292a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9895.exe

    Filesize

    322KB

    MD5

    e6273e2d059ff5c363acbb2adfbd1086

    SHA1

    5ea60c04acb16056ac61ec64acbdf7cb3c16d75b

    SHA256

    2529e0e9224491a34b5f79e9a9800a767e8764f676a4c6fc72a7e946d36d38a5

    SHA512

    3e04eb5f93e06a5e88f7421ec3c74c8cdc19101f5b18e6efa7397c9b70dcf60ea182e8b855d4d4c1ed4f51561007a81ae3f22fe9256486093becee48e6ad292a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5208.exe

    Filesize

    379KB

    MD5

    3b68909db5363400505a311680a07d95

    SHA1

    b335aa0850acec66ab03995f909f8c123f7972b0

    SHA256

    8dec3d507b8843736e77a9b685b0dd8a06a689070347e03fc453ce95c4f54348

    SHA512

    10a4abef9f99ce237f233ccd717370e73cabf29605765ac9e92738bdfd45ff78e1ccacf7835474293ff8e5bfaacb426ba0c8d46ff19eee838bb5b7249359a1b4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5208.exe

    Filesize

    379KB

    MD5

    3b68909db5363400505a311680a07d95

    SHA1

    b335aa0850acec66ab03995f909f8c123f7972b0

    SHA256

    8dec3d507b8843736e77a9b685b0dd8a06a689070347e03fc453ce95c4f54348

    SHA512

    10a4abef9f99ce237f233ccd717370e73cabf29605765ac9e92738bdfd45ff78e1ccacf7835474293ff8e5bfaacb426ba0c8d46ff19eee838bb5b7249359a1b4

  • memory/2080-132-0x0000000004640000-0x000000000465A000-memory.dmp

    Filesize

    104KB

  • memory/2080-133-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2080-134-0x0000000007170000-0x0000000007180000-memory.dmp

    Filesize

    64KB

  • memory/2080-135-0x0000000007180000-0x000000000767E000-memory.dmp

    Filesize

    5.0MB

  • memory/2080-136-0x0000000004930000-0x0000000004948000-memory.dmp

    Filesize

    96KB

  • memory/2080-137-0x0000000004930000-0x0000000004942000-memory.dmp

    Filesize

    72KB

  • memory/2080-138-0x0000000004930000-0x0000000004942000-memory.dmp

    Filesize

    72KB

  • memory/2080-140-0x0000000004930000-0x0000000004942000-memory.dmp

    Filesize

    72KB

  • memory/2080-142-0x0000000004930000-0x0000000004942000-memory.dmp

    Filesize

    72KB

  • memory/2080-144-0x0000000004930000-0x0000000004942000-memory.dmp

    Filesize

    72KB

  • memory/2080-146-0x0000000004930000-0x0000000004942000-memory.dmp

    Filesize

    72KB

  • memory/2080-148-0x0000000004930000-0x0000000004942000-memory.dmp

    Filesize

    72KB

  • memory/2080-150-0x0000000004930000-0x0000000004942000-memory.dmp

    Filesize

    72KB

  • memory/2080-152-0x0000000004930000-0x0000000004942000-memory.dmp

    Filesize

    72KB

  • memory/2080-154-0x0000000004930000-0x0000000004942000-memory.dmp

    Filesize

    72KB

  • memory/2080-156-0x0000000004930000-0x0000000004942000-memory.dmp

    Filesize

    72KB

  • memory/2080-158-0x0000000004930000-0x0000000004942000-memory.dmp

    Filesize

    72KB

  • memory/2080-160-0x0000000004930000-0x0000000004942000-memory.dmp

    Filesize

    72KB

  • memory/2080-162-0x0000000004930000-0x0000000004942000-memory.dmp

    Filesize

    72KB

  • memory/2080-164-0x0000000004930000-0x0000000004942000-memory.dmp

    Filesize

    72KB

  • memory/2080-165-0x0000000007170000-0x0000000007180000-memory.dmp

    Filesize

    64KB

  • memory/2080-166-0x0000000007170000-0x0000000007180000-memory.dmp

    Filesize

    64KB

  • memory/2080-167-0x0000000000400000-0x0000000002B7E000-memory.dmp

    Filesize

    39.5MB

  • memory/2080-169-0x0000000007170000-0x0000000007180000-memory.dmp

    Filesize

    64KB

  • memory/2080-170-0x0000000000400000-0x0000000002B7E000-memory.dmp

    Filesize

    39.5MB

  • memory/3784-175-0x0000000004930000-0x0000000004976000-memory.dmp

    Filesize

    280KB

  • memory/3784-176-0x0000000006FF0000-0x0000000007034000-memory.dmp

    Filesize

    272KB

  • memory/3784-177-0x0000000006FF0000-0x000000000702E000-memory.dmp

    Filesize

    248KB

  • memory/3784-178-0x0000000006FF0000-0x000000000702E000-memory.dmp

    Filesize

    248KB

  • memory/3784-181-0x0000000006FF0000-0x000000000702E000-memory.dmp

    Filesize

    248KB

  • memory/3784-182-0x0000000007050000-0x0000000007060000-memory.dmp

    Filesize

    64KB

  • memory/3784-180-0x0000000002C60000-0x0000000002CAB000-memory.dmp

    Filesize

    300KB

  • memory/3784-185-0x0000000006FF0000-0x000000000702E000-memory.dmp

    Filesize

    248KB

  • memory/3784-187-0x0000000006FF0000-0x000000000702E000-memory.dmp

    Filesize

    248KB

  • memory/3784-184-0x0000000007050000-0x0000000007060000-memory.dmp

    Filesize

    64KB

  • memory/3784-189-0x0000000006FF0000-0x000000000702E000-memory.dmp

    Filesize

    248KB

  • memory/3784-191-0x0000000006FF0000-0x000000000702E000-memory.dmp

    Filesize

    248KB

  • memory/3784-193-0x0000000006FF0000-0x000000000702E000-memory.dmp

    Filesize

    248KB

  • memory/3784-195-0x0000000006FF0000-0x000000000702E000-memory.dmp

    Filesize

    248KB

  • memory/3784-197-0x0000000006FF0000-0x000000000702E000-memory.dmp

    Filesize

    248KB

  • memory/3784-199-0x0000000006FF0000-0x000000000702E000-memory.dmp

    Filesize

    248KB

  • memory/3784-201-0x0000000006FF0000-0x000000000702E000-memory.dmp

    Filesize

    248KB

  • memory/3784-203-0x0000000006FF0000-0x000000000702E000-memory.dmp

    Filesize

    248KB

  • memory/3784-205-0x0000000006FF0000-0x000000000702E000-memory.dmp

    Filesize

    248KB

  • memory/3784-207-0x0000000006FF0000-0x000000000702E000-memory.dmp

    Filesize

    248KB

  • memory/3784-209-0x0000000006FF0000-0x000000000702E000-memory.dmp

    Filesize

    248KB

  • memory/3784-211-0x0000000006FF0000-0x000000000702E000-memory.dmp

    Filesize

    248KB

  • memory/3784-213-0x0000000006FF0000-0x000000000702E000-memory.dmp

    Filesize

    248KB

  • memory/3784-1086-0x0000000007CB0000-0x00000000082B6000-memory.dmp

    Filesize

    6.0MB

  • memory/3784-1087-0x0000000007720000-0x000000000782A000-memory.dmp

    Filesize

    1.0MB

  • memory/3784-1088-0x0000000007860000-0x0000000007872000-memory.dmp

    Filesize

    72KB

  • memory/3784-1089-0x0000000007880000-0x00000000078BE000-memory.dmp

    Filesize

    248KB

  • memory/3784-1090-0x0000000007050000-0x0000000007060000-memory.dmp

    Filesize

    64KB

  • memory/3784-1091-0x00000000079D0000-0x0000000007A1B000-memory.dmp

    Filesize

    300KB

  • memory/3784-1093-0x0000000007B60000-0x0000000007BC6000-memory.dmp

    Filesize

    408KB

  • memory/3784-1094-0x0000000008840000-0x00000000088D2000-memory.dmp

    Filesize

    584KB

  • memory/3784-1095-0x0000000008A20000-0x0000000008BE2000-memory.dmp

    Filesize

    1.8MB

  • memory/3784-1096-0x0000000008BF0000-0x000000000911C000-memory.dmp

    Filesize

    5.2MB

  • memory/3784-1097-0x0000000007050000-0x0000000007060000-memory.dmp

    Filesize

    64KB

  • memory/3784-1098-0x0000000007050000-0x0000000007060000-memory.dmp

    Filesize

    64KB

  • memory/3784-1099-0x0000000009390000-0x0000000009406000-memory.dmp

    Filesize

    472KB

  • memory/3784-1100-0x0000000009410000-0x0000000009460000-memory.dmp

    Filesize

    320KB

  • memory/3784-1101-0x0000000007050000-0x0000000007060000-memory.dmp

    Filesize

    64KB

  • memory/4820-1107-0x0000000000840000-0x0000000000872000-memory.dmp

    Filesize

    200KB

  • memory/4820-1108-0x0000000005280000-0x00000000052CB000-memory.dmp

    Filesize

    300KB

  • memory/4820-1109-0x0000000005140000-0x0000000005150000-memory.dmp

    Filesize

    64KB