Analysis

  • max time kernel
    144s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2023, 07:51

General

  • Target

    cbd84c741e7ca361645c1542ea5c7131.exe

  • Size

    660KB

  • MD5

    cbd84c741e7ca361645c1542ea5c7131

  • SHA1

    d8c2438061d125824b228f68bd3406c8317b321a

  • SHA256

    f5b3c296484c5e8aaf165b36f62f5bca75acd3c452603fb262ff334c8a65d390

  • SHA512

    b663131a45fe12f7e196732b88f601a96eb393112ea50768a7edd7905758f14650eeade6a843d03a7909043d757503ce9600b5ddcfcfb886b7f55b6b9a34d19c

  • SSDEEP

    12288:TZJAbAI7qpMP9chlQDrgyhSuEu3OXN/BPoqtEypPxUwyZkDiRpj6pz:tcADS9cHQPDhkzdhoqWypeZkap4

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

dent

C2

193.233.20.33:4125

Attributes
  • auth_value

    e795368557f02e28e8aef6bcb279a3b0

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 33 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cbd84c741e7ca361645c1542ea5c7131.exe
    "C:\Users\Admin\AppData\Local\Temp\cbd84c741e7ca361645c1542ea5c7131.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2672
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKx1693.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKx1693.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4880
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr861184.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr861184.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2184
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku852284.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku852284.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4512
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr048190.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr048190.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1604
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 484
      2⤵
      • Program crash
      PID:4676
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2672 -ip 2672
    1⤵
      PID:4964
    • C:\Windows\system32\sc.exe
      C:\Windows\system32\sc.exe start wuauserv
      1⤵
      • Launches sc.exe
      PID:3708

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr048190.exe

            Filesize

            175KB

            MD5

            19219b1cea9d3d7274683958a3379c04

            SHA1

            3473053331987aa7fe076d18f105d1e5fb331e1e

            SHA256

            36755a2c11e51b0b5f34b6457cb548edae6cc83df489d4d676f6fe2bb87e2db6

            SHA512

            1d5bbf61e0ce25c9708b347e95070a74c743a2008f6ee346173f21de96f3088192c1bf2d8d46ab53154d2fffb1b6c339aaaff76bb9b7531868f386d2c659ad51

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr048190.exe

            Filesize

            175KB

            MD5

            19219b1cea9d3d7274683958a3379c04

            SHA1

            3473053331987aa7fe076d18f105d1e5fb331e1e

            SHA256

            36755a2c11e51b0b5f34b6457cb548edae6cc83df489d4d676f6fe2bb87e2db6

            SHA512

            1d5bbf61e0ce25c9708b347e95070a74c743a2008f6ee346173f21de96f3088192c1bf2d8d46ab53154d2fffb1b6c339aaaff76bb9b7531868f386d2c659ad51

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKx1693.exe

            Filesize

            404KB

            MD5

            cda4eef5211c3f6e9b77d1b75f91c7fc

            SHA1

            78c16cdfbd0ecc679a8c9225907a6005f4de9f66

            SHA256

            c9f275a02b1a1e430084e8749c62abd21892993cfde38e6e919a8b9628f5dede

            SHA512

            19053673a23d1b65286e89d61894748dd863e0795070d0c7f2dd98e0e9bfdf41173ac6168132456b56ce6804498f6b991ef47d57996354c745513bf5c2bcc281

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziKx1693.exe

            Filesize

            404KB

            MD5

            cda4eef5211c3f6e9b77d1b75f91c7fc

            SHA1

            78c16cdfbd0ecc679a8c9225907a6005f4de9f66

            SHA256

            c9f275a02b1a1e430084e8749c62abd21892993cfde38e6e919a8b9628f5dede

            SHA512

            19053673a23d1b65286e89d61894748dd863e0795070d0c7f2dd98e0e9bfdf41173ac6168132456b56ce6804498f6b991ef47d57996354c745513bf5c2bcc281

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr861184.exe

            Filesize

            12KB

            MD5

            2a1d4e8fa8635d36c5e1fd28c9be9763

            SHA1

            0dd0de78735b4590a81620a44c5840e5056e06d7

            SHA256

            a9a15f1329ab6dffd504712262bc3052ad0f80998d0fe0439aee79f5fbb54468

            SHA512

            ed8634d6c4c7bf32d2281e2a14912c436a5d4772a4029289c5608bcb2eb6fdefe6a0a06495d3e04dc1652b0d75a7bb4e49a22455e17c5e59087b1a370f5423e9

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr861184.exe

            Filesize

            12KB

            MD5

            2a1d4e8fa8635d36c5e1fd28c9be9763

            SHA1

            0dd0de78735b4590a81620a44c5840e5056e06d7

            SHA256

            a9a15f1329ab6dffd504712262bc3052ad0f80998d0fe0439aee79f5fbb54468

            SHA512

            ed8634d6c4c7bf32d2281e2a14912c436a5d4772a4029289c5608bcb2eb6fdefe6a0a06495d3e04dc1652b0d75a7bb4e49a22455e17c5e59087b1a370f5423e9

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku852284.exe

            Filesize

            359KB

            MD5

            4287ef62aa410ba04d46f47a369e1864

            SHA1

            63e60a51f2546dc81e0b11863fa1a694ae7033a5

            SHA256

            2b35c97f6a24eba0f65413ed19b88c9db1cfb56fa136e29346cf14bb8a49f605

            SHA512

            3edf39a2c2a251ffc5a244a13691da7ec66f46e39bd78838531942f76f9d4420daa44e54468ee9d9a8ee9d8ed96081fc116670e0d9089ff9380eb53c5f954a86

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku852284.exe

            Filesize

            359KB

            MD5

            4287ef62aa410ba04d46f47a369e1864

            SHA1

            63e60a51f2546dc81e0b11863fa1a694ae7033a5

            SHA256

            2b35c97f6a24eba0f65413ed19b88c9db1cfb56fa136e29346cf14bb8a49f605

            SHA512

            3edf39a2c2a251ffc5a244a13691da7ec66f46e39bd78838531942f76f9d4420daa44e54468ee9d9a8ee9d8ed96081fc116670e0d9089ff9380eb53c5f954a86

          • memory/1604-1090-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

            Filesize

            64KB

          • memory/1604-1089-0x00000000005F0000-0x0000000000622000-memory.dmp

            Filesize

            200KB

          • memory/2184-148-0x00000000005B0000-0x00000000005BA000-memory.dmp

            Filesize

            40KB

          • memory/2672-149-0x00000000024B0000-0x000000000253A000-memory.dmp

            Filesize

            552KB

          • memory/2672-150-0x0000000000400000-0x0000000000767000-memory.dmp

            Filesize

            3.4MB

          • memory/4512-192-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

            Filesize

            248KB

          • memory/4512-204-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

            Filesize

            248KB

          • memory/4512-162-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

            Filesize

            248KB

          • memory/4512-163-0x0000000000870000-0x00000000008BB000-memory.dmp

            Filesize

            300KB

          • memory/4512-166-0x0000000004E30000-0x0000000004E40000-memory.dmp

            Filesize

            64KB

          • memory/4512-165-0x0000000004E30000-0x0000000004E40000-memory.dmp

            Filesize

            64KB

          • memory/4512-169-0x0000000004E30000-0x0000000004E40000-memory.dmp

            Filesize

            64KB

          • memory/4512-167-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

            Filesize

            248KB

          • memory/4512-170-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

            Filesize

            248KB

          • memory/4512-172-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

            Filesize

            248KB

          • memory/4512-174-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

            Filesize

            248KB

          • memory/4512-176-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

            Filesize

            248KB

          • memory/4512-178-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

            Filesize

            248KB

          • memory/4512-180-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

            Filesize

            248KB

          • memory/4512-182-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

            Filesize

            248KB

          • memory/4512-184-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

            Filesize

            248KB

          • memory/4512-186-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

            Filesize

            248KB

          • memory/4512-188-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

            Filesize

            248KB

          • memory/4512-190-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

            Filesize

            248KB

          • memory/4512-158-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

            Filesize

            248KB

          • memory/4512-194-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

            Filesize

            248KB

          • memory/4512-196-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

            Filesize

            248KB

          • memory/4512-198-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

            Filesize

            248KB

          • memory/4512-200-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

            Filesize

            248KB

          • memory/4512-202-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

            Filesize

            248KB

          • memory/4512-160-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

            Filesize

            248KB

          • memory/4512-206-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

            Filesize

            248KB

          • memory/4512-208-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

            Filesize

            248KB

          • memory/4512-210-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

            Filesize

            248KB

          • memory/4512-212-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

            Filesize

            248KB

          • memory/4512-214-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

            Filesize

            248KB

          • memory/4512-216-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

            Filesize

            248KB

          • memory/4512-218-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

            Filesize

            248KB

          • memory/4512-220-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

            Filesize

            248KB

          • memory/4512-222-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

            Filesize

            248KB

          • memory/4512-1067-0x00000000053F0000-0x0000000005A08000-memory.dmp

            Filesize

            6.1MB

          • memory/4512-1068-0x0000000005A10000-0x0000000005B1A000-memory.dmp

            Filesize

            1.0MB

          • memory/4512-1069-0x0000000004E10000-0x0000000004E22000-memory.dmp

            Filesize

            72KB

          • memory/4512-1070-0x0000000005B20000-0x0000000005B5C000-memory.dmp

            Filesize

            240KB

          • memory/4512-1071-0x0000000004E30000-0x0000000004E40000-memory.dmp

            Filesize

            64KB

          • memory/4512-1073-0x0000000005E10000-0x0000000005EA2000-memory.dmp

            Filesize

            584KB

          • memory/4512-1075-0x0000000005EB0000-0x0000000005F16000-memory.dmp

            Filesize

            408KB

          • memory/4512-1076-0x0000000004E30000-0x0000000004E40000-memory.dmp

            Filesize

            64KB

          • memory/4512-1078-0x0000000004E30000-0x0000000004E40000-memory.dmp

            Filesize

            64KB

          • memory/4512-1077-0x0000000004E30000-0x0000000004E40000-memory.dmp

            Filesize

            64KB

          • memory/4512-1079-0x00000000065D0000-0x0000000006646000-memory.dmp

            Filesize

            472KB

          • memory/4512-1080-0x0000000006660000-0x00000000066B0000-memory.dmp

            Filesize

            320KB

          • memory/4512-1081-0x0000000006910000-0x0000000006AD2000-memory.dmp

            Filesize

            1.8MB

          • memory/4512-157-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

            Filesize

            248KB

          • memory/4512-156-0x0000000004E40000-0x00000000053E4000-memory.dmp

            Filesize

            5.6MB

          • memory/4512-1082-0x0000000006AE0000-0x000000000700C000-memory.dmp

            Filesize

            5.2MB

          • memory/4512-1083-0x0000000004E30000-0x0000000004E40000-memory.dmp

            Filesize

            64KB