Analysis

  • max time kernel
    53s
  • max time network
    67s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27/03/2023, 04:50

General

  • Target

    572785891f15dcb8f8ab5ec235d881837e3e348b88e4e31328fc21d7b0aecf1b.exe

  • Size

    685KB

  • MD5

    0f033874839920b9926df9279dc9b127

  • SHA1

    c41557973e921e3ad41499ab60d4d1d0e5e13c08

  • SHA256

    572785891f15dcb8f8ab5ec235d881837e3e348b88e4e31328fc21d7b0aecf1b

  • SHA512

    855b599d6e078c3f1a80d347e7785064a6ec6c833221c548cd76bc5476456cf5cbb672e2ce96e2e8c98ba9391baa039a84c5287b6e8400922705f347a3d2caca

  • SSDEEP

    12288:zMr7y90GFPxEriPnAAdRT68Hd3ZmDLf45kN1oXUrE1Uclw8AkYwsj7/:Ay9tBPRT6MRZmDlN1fcUffkK

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

dent

C2

193.233.20.33:4125

Attributes
  • auth_value

    e795368557f02e28e8aef6bcb279a3b0

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\572785891f15dcb8f8ab5ec235d881837e3e348b88e4e31328fc21d7b0aecf1b.exe
    "C:\Users\Admin\AppData\Local\Temp\572785891f15dcb8f8ab5ec235d881837e3e348b88e4e31328fc21d7b0aecf1b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un167325.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un167325.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2332
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3235.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3235.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2548
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1884.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1884.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3612
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si056230.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si056230.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4864

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si056230.exe

          Filesize

          175KB

          MD5

          8d25d0d01c0978e9fcec18b523044619

          SHA1

          8fe9fbd6ef3085f43c5ea0ce8b9ad8712848e094

          SHA256

          ffddabed94b5a17eff21d9450e34e141994ac9db27bc2c1531f01ae88bb22d6c

          SHA512

          51ef4b626d2f4ddce9ffe2585e3afd53fa50bf2f7a3173a638da56ec292f04a6a7122440fffdc57e851a9175ea5a4320eab91073f71497900e9552e1e25e62e5

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si056230.exe

          Filesize

          175KB

          MD5

          8d25d0d01c0978e9fcec18b523044619

          SHA1

          8fe9fbd6ef3085f43c5ea0ce8b9ad8712848e094

          SHA256

          ffddabed94b5a17eff21d9450e34e141994ac9db27bc2c1531f01ae88bb22d6c

          SHA512

          51ef4b626d2f4ddce9ffe2585e3afd53fa50bf2f7a3173a638da56ec292f04a6a7122440fffdc57e851a9175ea5a4320eab91073f71497900e9552e1e25e62e5

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un167325.exe

          Filesize

          544KB

          MD5

          243fdf7536b48ec81671f913e8d92677

          SHA1

          2426421ab0a0bd3e6c21d31e3091a13cb36c92da

          SHA256

          921e5ae1596a1175b6bb05c9fdb650712814d5c8841b0d8c522af74bb9c46888

          SHA512

          903c2c890fc115f1077e1681f2d4f2219bf01913022c2995a33b3e78d2d02a973f5b51150785a7ad5421fff908b1d92157fe034ce73d1e00477ad3c68e87d9d6

        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un167325.exe

          Filesize

          544KB

          MD5

          243fdf7536b48ec81671f913e8d92677

          SHA1

          2426421ab0a0bd3e6c21d31e3091a13cb36c92da

          SHA256

          921e5ae1596a1175b6bb05c9fdb650712814d5c8841b0d8c522af74bb9c46888

          SHA512

          903c2c890fc115f1077e1681f2d4f2219bf01913022c2995a33b3e78d2d02a973f5b51150785a7ad5421fff908b1d92157fe034ce73d1e00477ad3c68e87d9d6

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3235.exe

          Filesize

          322KB

          MD5

          d470f04e688a84b4d50d6249dca1fb23

          SHA1

          d85aeea12ad8527d3e121525e41d2a533b99dee2

          SHA256

          775171afc44a5ee722a1f6aab3fd7124f46ce9920b9227b269d0f9035d5b5d39

          SHA512

          eeb41287a39c8f1163fc5d7aedb7a0c4349995fa76f13ad23c680afa0b5909111f86ce2cda8bb5ff5afa58f9cdf87712f82df099624bcc15f2b08d6acce21ddb

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3235.exe

          Filesize

          322KB

          MD5

          d470f04e688a84b4d50d6249dca1fb23

          SHA1

          d85aeea12ad8527d3e121525e41d2a533b99dee2

          SHA256

          775171afc44a5ee722a1f6aab3fd7124f46ce9920b9227b269d0f9035d5b5d39

          SHA512

          eeb41287a39c8f1163fc5d7aedb7a0c4349995fa76f13ad23c680afa0b5909111f86ce2cda8bb5ff5afa58f9cdf87712f82df099624bcc15f2b08d6acce21ddb

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1884.exe

          Filesize

          379KB

          MD5

          a35c6b8b25fa2f45664fa08a27aa27b3

          SHA1

          b7c292ea4ac1166e0a2a759d6a894ab3c9ec3703

          SHA256

          526841afeee9be80830c98d6cb66bb6f02bc5bfa63fa83618161378f21a465ae

          SHA512

          aef79634a949b3ce0fe808f917480366e8bf16c2699b8029ca0aa058d6f5c3f27c218445d0cad03379149cad05ddd38510b0620fe68c179f04b7cd332de5efdf

        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1884.exe

          Filesize

          379KB

          MD5

          a35c6b8b25fa2f45664fa08a27aa27b3

          SHA1

          b7c292ea4ac1166e0a2a759d6a894ab3c9ec3703

          SHA256

          526841afeee9be80830c98d6cb66bb6f02bc5bfa63fa83618161378f21a465ae

          SHA512

          aef79634a949b3ce0fe808f917480366e8bf16c2699b8029ca0aa058d6f5c3f27c218445d0cad03379149cad05ddd38510b0620fe68c179f04b7cd332de5efdf

        • memory/2548-136-0x0000000007020000-0x000000000703A000-memory.dmp

          Filesize

          104KB

        • memory/2548-137-0x00000000070C0000-0x00000000075BE000-memory.dmp

          Filesize

          5.0MB

        • memory/2548-138-0x00000000075C0000-0x00000000075D8000-memory.dmp

          Filesize

          96KB

        • memory/2548-139-0x00000000001D0000-0x00000000001FD000-memory.dmp

          Filesize

          180KB

        • memory/2548-140-0x00000000070B0000-0x00000000070C0000-memory.dmp

          Filesize

          64KB

        • memory/2548-141-0x00000000070B0000-0x00000000070C0000-memory.dmp

          Filesize

          64KB

        • memory/2548-142-0x00000000070B0000-0x00000000070C0000-memory.dmp

          Filesize

          64KB

        • memory/2548-143-0x00000000075C0000-0x00000000075D2000-memory.dmp

          Filesize

          72KB

        • memory/2548-144-0x00000000075C0000-0x00000000075D2000-memory.dmp

          Filesize

          72KB

        • memory/2548-146-0x00000000075C0000-0x00000000075D2000-memory.dmp

          Filesize

          72KB

        • memory/2548-148-0x00000000075C0000-0x00000000075D2000-memory.dmp

          Filesize

          72KB

        • memory/2548-150-0x00000000075C0000-0x00000000075D2000-memory.dmp

          Filesize

          72KB

        • memory/2548-152-0x00000000075C0000-0x00000000075D2000-memory.dmp

          Filesize

          72KB

        • memory/2548-154-0x00000000075C0000-0x00000000075D2000-memory.dmp

          Filesize

          72KB

        • memory/2548-156-0x00000000075C0000-0x00000000075D2000-memory.dmp

          Filesize

          72KB

        • memory/2548-158-0x00000000075C0000-0x00000000075D2000-memory.dmp

          Filesize

          72KB

        • memory/2548-160-0x00000000075C0000-0x00000000075D2000-memory.dmp

          Filesize

          72KB

        • memory/2548-162-0x00000000075C0000-0x00000000075D2000-memory.dmp

          Filesize

          72KB

        • memory/2548-164-0x00000000075C0000-0x00000000075D2000-memory.dmp

          Filesize

          72KB

        • memory/2548-166-0x00000000075C0000-0x00000000075D2000-memory.dmp

          Filesize

          72KB

        • memory/2548-168-0x00000000075C0000-0x00000000075D2000-memory.dmp

          Filesize

          72KB

        • memory/2548-170-0x00000000075C0000-0x00000000075D2000-memory.dmp

          Filesize

          72KB

        • memory/2548-171-0x0000000000400000-0x0000000002B7E000-memory.dmp

          Filesize

          39.5MB

        • memory/2548-174-0x00000000070B0000-0x00000000070C0000-memory.dmp

          Filesize

          64KB

        • memory/2548-175-0x00000000070B0000-0x00000000070C0000-memory.dmp

          Filesize

          64KB

        • memory/2548-173-0x0000000000400000-0x0000000002B7E000-memory.dmp

          Filesize

          39.5MB

        • memory/3612-180-0x0000000004980000-0x00000000049C6000-memory.dmp

          Filesize

          280KB

        • memory/3612-181-0x0000000004A20000-0x0000000004A64000-memory.dmp

          Filesize

          272KB

        • memory/3612-182-0x0000000004A20000-0x0000000004A5E000-memory.dmp

          Filesize

          248KB

        • memory/3612-183-0x0000000004A20000-0x0000000004A5E000-memory.dmp

          Filesize

          248KB

        • memory/3612-185-0x0000000004A20000-0x0000000004A5E000-memory.dmp

          Filesize

          248KB

        • memory/3612-189-0x0000000004A20000-0x0000000004A5E000-memory.dmp

          Filesize

          248KB

        • memory/3612-191-0x0000000004A20000-0x0000000004A5E000-memory.dmp

          Filesize

          248KB

        • memory/3612-187-0x0000000004A20000-0x0000000004A5E000-memory.dmp

          Filesize

          248KB

        • memory/3612-193-0x0000000004A20000-0x0000000004A5E000-memory.dmp

          Filesize

          248KB

        • memory/3612-195-0x0000000004A20000-0x0000000004A5E000-memory.dmp

          Filesize

          248KB

        • memory/3612-197-0x0000000004A20000-0x0000000004A5E000-memory.dmp

          Filesize

          248KB

        • memory/3612-199-0x0000000004A20000-0x0000000004A5E000-memory.dmp

          Filesize

          248KB

        • memory/3612-200-0x0000000002C90000-0x0000000002CDB000-memory.dmp

          Filesize

          300KB

        • memory/3612-202-0x0000000004A10000-0x0000000004A20000-memory.dmp

          Filesize

          64KB

        • memory/3612-204-0x0000000004A10000-0x0000000004A20000-memory.dmp

          Filesize

          64KB

        • memory/3612-203-0x0000000004A20000-0x0000000004A5E000-memory.dmp

          Filesize

          248KB

        • memory/3612-206-0x0000000004A10000-0x0000000004A20000-memory.dmp

          Filesize

          64KB

        • memory/3612-207-0x0000000004A20000-0x0000000004A5E000-memory.dmp

          Filesize

          248KB

        • memory/3612-209-0x0000000004A20000-0x0000000004A5E000-memory.dmp

          Filesize

          248KB

        • memory/3612-211-0x0000000004A20000-0x0000000004A5E000-memory.dmp

          Filesize

          248KB

        • memory/3612-213-0x0000000004A20000-0x0000000004A5E000-memory.dmp

          Filesize

          248KB

        • memory/3612-215-0x0000000004A20000-0x0000000004A5E000-memory.dmp

          Filesize

          248KB

        • memory/3612-217-0x0000000004A20000-0x0000000004A5E000-memory.dmp

          Filesize

          248KB

        • memory/3612-219-0x0000000004A20000-0x0000000004A5E000-memory.dmp

          Filesize

          248KB

        • memory/3612-1092-0x00000000076B0000-0x0000000007CB6000-memory.dmp

          Filesize

          6.0MB

        • memory/3612-1093-0x0000000007D30000-0x0000000007E3A000-memory.dmp

          Filesize

          1.0MB

        • memory/3612-1095-0x0000000004A10000-0x0000000004A20000-memory.dmp

          Filesize

          64KB

        • memory/3612-1094-0x0000000007E70000-0x0000000007E82000-memory.dmp

          Filesize

          72KB

        • memory/3612-1096-0x0000000007E90000-0x0000000007ECE000-memory.dmp

          Filesize

          248KB

        • memory/3612-1097-0x0000000007FE0000-0x000000000802B000-memory.dmp

          Filesize

          300KB

        • memory/3612-1099-0x0000000008170000-0x0000000008202000-memory.dmp

          Filesize

          584KB

        • memory/3612-1100-0x0000000008210000-0x0000000008276000-memory.dmp

          Filesize

          408KB

        • memory/3612-1101-0x0000000004A10000-0x0000000004A20000-memory.dmp

          Filesize

          64KB

        • memory/3612-1102-0x0000000004A10000-0x0000000004A20000-memory.dmp

          Filesize

          64KB

        • memory/3612-1103-0x0000000008A20000-0x0000000008BE2000-memory.dmp

          Filesize

          1.8MB

        • memory/3612-1104-0x0000000008BF0000-0x000000000911C000-memory.dmp

          Filesize

          5.2MB

        • memory/3612-1105-0x0000000009250000-0x00000000092C6000-memory.dmp

          Filesize

          472KB

        • memory/3612-1106-0x00000000092E0000-0x0000000009330000-memory.dmp

          Filesize

          320KB

        • memory/3612-1107-0x0000000004A10000-0x0000000004A20000-memory.dmp

          Filesize

          64KB

        • memory/4864-1113-0x00000000000D0000-0x0000000000102000-memory.dmp

          Filesize

          200KB

        • memory/4864-1114-0x0000000004B50000-0x0000000004B9B000-memory.dmp

          Filesize

          300KB

        • memory/4864-1115-0x0000000004A10000-0x0000000004A20000-memory.dmp

          Filesize

          64KB