Analysis

  • max time kernel
    53s
  • max time network
    56s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 00:56

General

  • Target

    1987a81f2dc150e05a837da6f2d7ac4c22098b4fcf62c27762b1a1704abf2784.exe

  • Size

    682KB

  • MD5

    0c052812804829404a96096c86951272

  • SHA1

    067236e5d9d93fcd146802fc1a364db714461bf3

  • SHA256

    1987a81f2dc150e05a837da6f2d7ac4c22098b4fcf62c27762b1a1704abf2784

  • SHA512

    871ebf9e570cf17c9ec2cc196d0f37b155df1986742ed3fbb06c7fa7be66447db62342c6f1a610318c0727c00994ee4ef8468706638ac1897ff57478238c3cb7

  • SSDEEP

    12288:DMr2y90GMxFlyoLZan6JWQrExk3BNZpp0D0b1qmaCcSip:hyjElHZJTrExeve0b1qmaC1ip

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

dent

C2

193.233.20.33:4125

Attributes
  • auth_value

    e795368557f02e28e8aef6bcb279a3b0

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1987a81f2dc150e05a837da6f2d7ac4c22098b4fcf62c27762b1a1704abf2784.exe
    "C:\Users\Admin\AppData\Local\Temp\1987a81f2dc150e05a837da6f2d7ac4c22098b4fcf62c27762b1a1704abf2784.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3260
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un356873.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un356873.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2472
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1607.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1607.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4652
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5854.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5854.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3104
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si515619.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si515619.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1216

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si515619.exe

    Filesize

    175KB

    MD5

    f1e978e090d03a0d00266079c0c865c9

    SHA1

    ac7f5c841d0781dde3267a2e85298c4177fb32fd

    SHA256

    1a7250d50c5433749fe5df40af2fe071119e4c959072732ca794621db673fc45

    SHA512

    af59c76711716199ac4feb21da19ba055400007f016fd5afb4c732b22ad1bb729f666f77ece3f34ec3c8cf8c0a90268a7ee3704cebbe68e2384f1a68f0e8c76a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si515619.exe

    Filesize

    175KB

    MD5

    f1e978e090d03a0d00266079c0c865c9

    SHA1

    ac7f5c841d0781dde3267a2e85298c4177fb32fd

    SHA256

    1a7250d50c5433749fe5df40af2fe071119e4c959072732ca794621db673fc45

    SHA512

    af59c76711716199ac4feb21da19ba055400007f016fd5afb4c732b22ad1bb729f666f77ece3f34ec3c8cf8c0a90268a7ee3704cebbe68e2384f1a68f0e8c76a

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un356873.exe

    Filesize

    540KB

    MD5

    4d21f4f8b7bb5145356a893254e1c12e

    SHA1

    d14d9903dcf0a6ca0f1bd8b3d1fd89c638aeaca0

    SHA256

    a4de8d0112ed9bc343f7c4acb2ae071476aaf12154537487173889aae5d014d3

    SHA512

    4dba01ff76666d15a87e093a8f0ef86bb65ff84bd30fadd4daf0ee47c3691c1a638ac342a86eb9af8c0b1e2322aafe9786d7d88d8bbbb9451fd2c8ed1c2ab56b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un356873.exe

    Filesize

    540KB

    MD5

    4d21f4f8b7bb5145356a893254e1c12e

    SHA1

    d14d9903dcf0a6ca0f1bd8b3d1fd89c638aeaca0

    SHA256

    a4de8d0112ed9bc343f7c4acb2ae071476aaf12154537487173889aae5d014d3

    SHA512

    4dba01ff76666d15a87e093a8f0ef86bb65ff84bd30fadd4daf0ee47c3691c1a638ac342a86eb9af8c0b1e2322aafe9786d7d88d8bbbb9451fd2c8ed1c2ab56b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1607.exe

    Filesize

    322KB

    MD5

    64a713a71160c618cf52daea38cf05cd

    SHA1

    6d2b69b032039141537eb19a3e8862106c4bc6b3

    SHA256

    679410f2363c5c52cc941edbcda123cbc3661fe4616c214f455ce71db32df5d7

    SHA512

    cd11106515c1d72b04d4c35cdda724bacd62987e3739de272f8a5ce28f3973b1a2a02a9b61feb9f68bbd30da02363be30c84a6d28b3e0e7eb1eb990690233eee

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1607.exe

    Filesize

    322KB

    MD5

    64a713a71160c618cf52daea38cf05cd

    SHA1

    6d2b69b032039141537eb19a3e8862106c4bc6b3

    SHA256

    679410f2363c5c52cc941edbcda123cbc3661fe4616c214f455ce71db32df5d7

    SHA512

    cd11106515c1d72b04d4c35cdda724bacd62987e3739de272f8a5ce28f3973b1a2a02a9b61feb9f68bbd30da02363be30c84a6d28b3e0e7eb1eb990690233eee

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5854.exe

    Filesize

    379KB

    MD5

    a82c0a3d5980a9dc439ee5dd032f72d1

    SHA1

    53d26901a1a5d557e64bea55c44137b2b436af47

    SHA256

    e481b592640b9811df5c51debd260ed8b826edc160e7efd8653562353e15abdb

    SHA512

    d46197e3af93b062fe49d397abfb9e265296db49789ce66aba3129a0b1a8c8676a4f7079c6f41169a9e8b89edf800d1a770b9d666c14bd524358aec16db4443f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5854.exe

    Filesize

    379KB

    MD5

    a82c0a3d5980a9dc439ee5dd032f72d1

    SHA1

    53d26901a1a5d557e64bea55c44137b2b436af47

    SHA256

    e481b592640b9811df5c51debd260ed8b826edc160e7efd8653562353e15abdb

    SHA512

    d46197e3af93b062fe49d397abfb9e265296db49789ce66aba3129a0b1a8c8676a4f7079c6f41169a9e8b89edf800d1a770b9d666c14bd524358aec16db4443f

  • memory/1216-1115-0x00000000058A0000-0x00000000058B0000-memory.dmp

    Filesize

    64KB

  • memory/1216-1114-0x0000000005850000-0x000000000589B000-memory.dmp

    Filesize

    300KB

  • memory/1216-1113-0x0000000000F50000-0x0000000000F82000-memory.dmp

    Filesize

    200KB

  • memory/3104-1091-0x0000000007D10000-0x0000000008316000-memory.dmp

    Filesize

    6.0MB

  • memory/3104-1094-0x0000000007880000-0x00000000078BE000-memory.dmp

    Filesize

    248KB

  • memory/3104-1107-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/3104-1106-0x0000000008CE0000-0x000000000920C000-memory.dmp

    Filesize

    5.2MB

  • memory/3104-1105-0x0000000008B10000-0x0000000008CD2000-memory.dmp

    Filesize

    1.8MB

  • memory/3104-1104-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/3104-1103-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/3104-1102-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/3104-1101-0x0000000008980000-0x00000000089D0000-memory.dmp

    Filesize

    320KB

  • memory/3104-1100-0x00000000088E0000-0x0000000008956000-memory.dmp

    Filesize

    472KB

  • memory/3104-1099-0x0000000007C00000-0x0000000007C66000-memory.dmp

    Filesize

    408KB

  • memory/3104-1098-0x0000000007B60000-0x0000000007BF2000-memory.dmp

    Filesize

    584KB

  • memory/3104-1096-0x00000000079D0000-0x0000000007A1B000-memory.dmp

    Filesize

    300KB

  • memory/3104-1095-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/3104-1093-0x0000000007860000-0x0000000007872000-memory.dmp

    Filesize

    72KB

  • memory/3104-1092-0x0000000007740000-0x000000000784A000-memory.dmp

    Filesize

    1.0MB

  • memory/3104-218-0x0000000007190000-0x00000000071CE000-memory.dmp

    Filesize

    248KB

  • memory/3104-216-0x0000000007190000-0x00000000071CE000-memory.dmp

    Filesize

    248KB

  • memory/3104-214-0x0000000007190000-0x00000000071CE000-memory.dmp

    Filesize

    248KB

  • memory/3104-212-0x0000000007190000-0x00000000071CE000-memory.dmp

    Filesize

    248KB

  • memory/3104-210-0x0000000007190000-0x00000000071CE000-memory.dmp

    Filesize

    248KB

  • memory/3104-208-0x0000000007190000-0x00000000071CE000-memory.dmp

    Filesize

    248KB

  • memory/3104-179-0x0000000004B70000-0x0000000004BB6000-memory.dmp

    Filesize

    280KB

  • memory/3104-180-0x0000000007190000-0x00000000071D4000-memory.dmp

    Filesize

    272KB

  • memory/3104-182-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/3104-181-0x0000000002C60000-0x0000000002CAB000-memory.dmp

    Filesize

    300KB

  • memory/3104-183-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/3104-185-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/3104-188-0x0000000007190000-0x00000000071CE000-memory.dmp

    Filesize

    248KB

  • memory/3104-190-0x0000000007190000-0x00000000071CE000-memory.dmp

    Filesize

    248KB

  • memory/3104-186-0x0000000007190000-0x00000000071CE000-memory.dmp

    Filesize

    248KB

  • memory/3104-192-0x0000000007190000-0x00000000071CE000-memory.dmp

    Filesize

    248KB

  • memory/3104-194-0x0000000007190000-0x00000000071CE000-memory.dmp

    Filesize

    248KB

  • memory/3104-184-0x0000000007190000-0x00000000071CE000-memory.dmp

    Filesize

    248KB

  • memory/3104-196-0x0000000007190000-0x00000000071CE000-memory.dmp

    Filesize

    248KB

  • memory/3104-198-0x0000000007190000-0x00000000071CE000-memory.dmp

    Filesize

    248KB

  • memory/3104-200-0x0000000007190000-0x00000000071CE000-memory.dmp

    Filesize

    248KB

  • memory/3104-202-0x0000000007190000-0x00000000071CE000-memory.dmp

    Filesize

    248KB

  • memory/3104-204-0x0000000007190000-0x00000000071CE000-memory.dmp

    Filesize

    248KB

  • memory/3104-206-0x0000000007190000-0x00000000071CE000-memory.dmp

    Filesize

    248KB

  • memory/4652-164-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4652-134-0x0000000002E60000-0x0000000002E7A000-memory.dmp

    Filesize

    104KB

  • memory/4652-140-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4652-173-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/4652-174-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/4652-170-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/4652-139-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4652-169-0x0000000000400000-0x0000000002B7E000-memory.dmp

    Filesize

    39.5MB

  • memory/4652-168-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/4652-144-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4652-167-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/4652-166-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4652-172-0x0000000000400000-0x0000000002B7E000-memory.dmp

    Filesize

    39.5MB

  • memory/4652-142-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4652-146-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4652-158-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4652-156-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4652-154-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4652-152-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4652-150-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4652-148-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4652-160-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB

  • memory/4652-138-0x0000000004C40000-0x0000000004C58000-memory.dmp

    Filesize

    96KB

  • memory/4652-137-0x0000000007200000-0x00000000076FE000-memory.dmp

    Filesize

    5.0MB

  • memory/4652-136-0x00000000071F0000-0x0000000007200000-memory.dmp

    Filesize

    64KB

  • memory/4652-135-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4652-162-0x0000000004C40000-0x0000000004C52000-memory.dmp

    Filesize

    72KB