Analysis

  • max time kernel
    132s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2023, 05:10

General

  • Target

    a4454e28b92bc7cfaa8750059d6e57c4191bb9bf7ecf50b0d4fcce71a279a4ed.exe

  • Size

    727KB

  • MD5

    088672234b989853ef7a3cfc9932357a

  • SHA1

    a9bf4dfdf72300ff9c9d7e5b191a6c339416bcc4

  • SHA256

    a4454e28b92bc7cfaa8750059d6e57c4191bb9bf7ecf50b0d4fcce71a279a4ed

  • SHA512

    79ede8e9a38b52e665c080b0d9f0ca996f9dcfec3b1fd5e7314a9bae976d9f556ab9111724376bf52a9084be3a68058aeea1203e3387713c94bfff4fc16cf5b9

  • SSDEEP

    12288:SMriy90jNt+uQNTaeYpf3bpN1A8MKlUkdBzZThJP4G1RYU4gps9jfd6vHCwdH:EyeNt+X5YdbBA8MKlUoVjXL4gyFFiH5

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

dent

C2

193.233.20.33:4125

Attributes
  • auth_value

    e795368557f02e28e8aef6bcb279a3b0

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a4454e28b92bc7cfaa8750059d6e57c4191bb9bf7ecf50b0d4fcce71a279a4ed.exe
    "C:\Users\Admin\AppData\Local\Temp\a4454e28b92bc7cfaa8750059d6e57c4191bb9bf7ecf50b0d4fcce71a279a4ed.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un302419.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un302419.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3248
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8366.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8366.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1120
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0529.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0529.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:404
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si549069.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si549069.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3448
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:536

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si549069.exe

    Filesize

    175KB

    MD5

    8c99e8ba20065d7dfe454da1b5a3af7b

    SHA1

    d64901943893fa7adb733c76e7c317994efab839

    SHA256

    d35bf92f5dff6d13e0cc92222b117d17eace42f46dd0988bfed5af06ccb54e78

    SHA512

    1550029ac6871ebd381cf2ec3ac4ca4b32fe552f663eeb943842860eb55f088583692a5002c7bed1fed3abf8dc4e2a3017a30748500fc733faa65b5af63c4936

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si549069.exe

    Filesize

    175KB

    MD5

    8c99e8ba20065d7dfe454da1b5a3af7b

    SHA1

    d64901943893fa7adb733c76e7c317994efab839

    SHA256

    d35bf92f5dff6d13e0cc92222b117d17eace42f46dd0988bfed5af06ccb54e78

    SHA512

    1550029ac6871ebd381cf2ec3ac4ca4b32fe552f663eeb943842860eb55f088583692a5002c7bed1fed3abf8dc4e2a3017a30748500fc733faa65b5af63c4936

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un302419.exe

    Filesize

    585KB

    MD5

    9fe0062bacda7444206e99bf048f478b

    SHA1

    1e317e9599514d7c8943427b9a232ab8523b1094

    SHA256

    d3a338a876374944ed90fed20a8551112a13a81978bcb2d58b1f0a60d4687f12

    SHA512

    a0f46ba9161eca988b25bb916592c896480409529b07b51f2bedb05db27847bd41740e1b785d3381b92633e52df9a6d8845bd49ff827ca0ba32abb53988e9a3d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un302419.exe

    Filesize

    585KB

    MD5

    9fe0062bacda7444206e99bf048f478b

    SHA1

    1e317e9599514d7c8943427b9a232ab8523b1094

    SHA256

    d3a338a876374944ed90fed20a8551112a13a81978bcb2d58b1f0a60d4687f12

    SHA512

    a0f46ba9161eca988b25bb916592c896480409529b07b51f2bedb05db27847bd41740e1b785d3381b92633e52df9a6d8845bd49ff827ca0ba32abb53988e9a3d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8366.exe

    Filesize

    322KB

    MD5

    e456b28633b4de3a902a77cb55f7394a

    SHA1

    f71cc74ed6af2048cf1b186b057a7f5ab01fe855

    SHA256

    db6e7ac6f21c5a7334c4acdc07f4631f7aea7dda117342dbe2293c8222c62881

    SHA512

    1c99c53134a68be14e46aacc3237659bf2f8cf4da6b7d541fcba4eb2d7105f49981fdf6617e7aebd8d6e313d87b7b2602e822d76058fda5f3f1a2281898fa439

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8366.exe

    Filesize

    322KB

    MD5

    e456b28633b4de3a902a77cb55f7394a

    SHA1

    f71cc74ed6af2048cf1b186b057a7f5ab01fe855

    SHA256

    db6e7ac6f21c5a7334c4acdc07f4631f7aea7dda117342dbe2293c8222c62881

    SHA512

    1c99c53134a68be14e46aacc3237659bf2f8cf4da6b7d541fcba4eb2d7105f49981fdf6617e7aebd8d6e313d87b7b2602e822d76058fda5f3f1a2281898fa439

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0529.exe

    Filesize

    359KB

    MD5

    23a3fc51acc8eb0b92a83e8dd66fff63

    SHA1

    38935f2a2fbdb808377a1580a5a185c82ef466aa

    SHA256

    d8e91d97ea4dd04b972bcef0ef9bb9b108faeed7849df13459a0f4bcb203d6b8

    SHA512

    9e70f34b8ef9641c9e33b2013fdea719076f9e98ce8fb1afd887f7bde7564973539c6ea8f8aed62bb9bc4956ce5f583dbb59f083e046c681e6f0de7e22ccc84a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0529.exe

    Filesize

    359KB

    MD5

    23a3fc51acc8eb0b92a83e8dd66fff63

    SHA1

    38935f2a2fbdb808377a1580a5a185c82ef466aa

    SHA256

    d8e91d97ea4dd04b972bcef0ef9bb9b108faeed7849df13459a0f4bcb203d6b8

    SHA512

    9e70f34b8ef9641c9e33b2013fdea719076f9e98ce8fb1afd887f7bde7564973539c6ea8f8aed62bb9bc4956ce5f583dbb59f083e046c681e6f0de7e22ccc84a

  • memory/404-227-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

    Filesize

    248KB

  • memory/404-1102-0x0000000005C40000-0x0000000005C52000-memory.dmp

    Filesize

    72KB

  • memory/404-1115-0x0000000004D20000-0x0000000004D30000-memory.dmp

    Filesize

    64KB

  • memory/404-1114-0x0000000008500000-0x0000000008550000-memory.dmp

    Filesize

    320KB

  • memory/404-1113-0x0000000008480000-0x00000000084F6000-memory.dmp

    Filesize

    472KB

  • memory/404-1112-0x0000000006A30000-0x0000000006F5C000-memory.dmp

    Filesize

    5.2MB

  • memory/404-1111-0x0000000004D20000-0x0000000004D30000-memory.dmp

    Filesize

    64KB

  • memory/404-1110-0x0000000004D20000-0x0000000004D30000-memory.dmp

    Filesize

    64KB

  • memory/404-1108-0x0000000004D20000-0x0000000004D30000-memory.dmp

    Filesize

    64KB

  • memory/404-1109-0x0000000006850000-0x0000000006A12000-memory.dmp

    Filesize

    1.8MB

  • memory/404-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp

    Filesize

    408KB

  • memory/404-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp

    Filesize

    584KB

  • memory/404-1104-0x0000000004D20000-0x0000000004D30000-memory.dmp

    Filesize

    64KB

  • memory/404-1103-0x0000000005C60000-0x0000000005C9C000-memory.dmp

    Filesize

    240KB

  • memory/404-1101-0x0000000005B00000-0x0000000005C0A000-memory.dmp

    Filesize

    1.0MB

  • memory/404-1100-0x0000000005460000-0x0000000005A78000-memory.dmp

    Filesize

    6.1MB

  • memory/404-225-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

    Filesize

    248KB

  • memory/404-223-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

    Filesize

    248KB

  • memory/404-221-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

    Filesize

    248KB

  • memory/404-219-0x0000000004D20000-0x0000000004D30000-memory.dmp

    Filesize

    64KB

  • memory/404-218-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

    Filesize

    248KB

  • memory/404-217-0x0000000004D20000-0x0000000004D30000-memory.dmp

    Filesize

    64KB

  • memory/404-190-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

    Filesize

    248KB

  • memory/404-191-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

    Filesize

    248KB

  • memory/404-193-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

    Filesize

    248KB

  • memory/404-195-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

    Filesize

    248KB

  • memory/404-197-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

    Filesize

    248KB

  • memory/404-199-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

    Filesize

    248KB

  • memory/404-201-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

    Filesize

    248KB

  • memory/404-203-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

    Filesize

    248KB

  • memory/404-207-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

    Filesize

    248KB

  • memory/404-205-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

    Filesize

    248KB

  • memory/404-209-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

    Filesize

    248KB

  • memory/404-211-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

    Filesize

    248KB

  • memory/404-214-0x0000000002270000-0x00000000022BB000-memory.dmp

    Filesize

    300KB

  • memory/404-213-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

    Filesize

    248KB

  • memory/404-216-0x0000000004D20000-0x0000000004D30000-memory.dmp

    Filesize

    64KB

  • memory/1120-173-0x0000000004AF0000-0x0000000004B02000-memory.dmp

    Filesize

    72KB

  • memory/1120-149-0x00000000071C0000-0x0000000007764000-memory.dmp

    Filesize

    5.6MB

  • memory/1120-185-0x0000000000400000-0x0000000002B7E000-memory.dmp

    Filesize

    39.5MB

  • memory/1120-183-0x00000000071B0000-0x00000000071C0000-memory.dmp

    Filesize

    64KB

  • memory/1120-181-0x00000000071B0000-0x00000000071C0000-memory.dmp

    Filesize

    64KB

  • memory/1120-182-0x00000000071B0000-0x00000000071C0000-memory.dmp

    Filesize

    64KB

  • memory/1120-150-0x00000000071B0000-0x00000000071C0000-memory.dmp

    Filesize

    64KB

  • memory/1120-180-0x0000000000400000-0x0000000002B7E000-memory.dmp

    Filesize

    39.5MB

  • memory/1120-179-0x0000000004AF0000-0x0000000004B02000-memory.dmp

    Filesize

    72KB

  • memory/1120-153-0x0000000004AF0000-0x0000000004B02000-memory.dmp

    Filesize

    72KB

  • memory/1120-177-0x0000000004AF0000-0x0000000004B02000-memory.dmp

    Filesize

    72KB

  • memory/1120-175-0x0000000004AF0000-0x0000000004B02000-memory.dmp

    Filesize

    72KB

  • memory/1120-152-0x0000000004AF0000-0x0000000004B02000-memory.dmp

    Filesize

    72KB

  • memory/1120-151-0x00000000071B0000-0x00000000071C0000-memory.dmp

    Filesize

    64KB

  • memory/1120-161-0x0000000004AF0000-0x0000000004B02000-memory.dmp

    Filesize

    72KB

  • memory/1120-167-0x0000000004AF0000-0x0000000004B02000-memory.dmp

    Filesize

    72KB

  • memory/1120-165-0x0000000004AF0000-0x0000000004B02000-memory.dmp

    Filesize

    72KB

  • memory/1120-163-0x0000000004AF0000-0x0000000004B02000-memory.dmp

    Filesize

    72KB

  • memory/1120-169-0x0000000004AF0000-0x0000000004B02000-memory.dmp

    Filesize

    72KB

  • memory/1120-159-0x0000000004AF0000-0x0000000004B02000-memory.dmp

    Filesize

    72KB

  • memory/1120-157-0x0000000004AF0000-0x0000000004B02000-memory.dmp

    Filesize

    72KB

  • memory/1120-155-0x0000000004AF0000-0x0000000004B02000-memory.dmp

    Filesize

    72KB

  • memory/1120-171-0x0000000004AF0000-0x0000000004B02000-memory.dmp

    Filesize

    72KB

  • memory/1120-148-0x0000000002C60000-0x0000000002C8D000-memory.dmp

    Filesize

    180KB

  • memory/3448-1121-0x0000000000470000-0x00000000004A2000-memory.dmp

    Filesize

    200KB

  • memory/3448-1122-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

    Filesize

    64KB