Analysis

  • max time kernel
    130s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2023, 07:57

General

  • Target

    f26d49917964620b25915579fcb4c4efb8dc1e639b6b924c455a10cbdede3660.exe

  • Size

    686KB

  • MD5

    03feebe09c9e3c67c4614c181b9c8222

  • SHA1

    6b17f62455b80ed3690f93a0b198952893a3a0b6

  • SHA256

    f26d49917964620b25915579fcb4c4efb8dc1e639b6b924c455a10cbdede3660

  • SHA512

    ba3d5654a23c0b131fa88d8a3dd0b934aee80ff2d1e3c943ea2b33fc462438f6652bd21f67bd0cfec9c8b7625a5d9c3e30e349f0c322a079ed30f50a53c8b8dc

  • SSDEEP

    12288:4Mrfy909K/DHdgpI1Ha4RZSPJ2jmVzv0gWKHh2643xNARbO+X:HynrdPBRZSPJgmFv0gWeA688pX

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

dent

C2

193.233.20.33:4125

Attributes
  • auth_value

    e795368557f02e28e8aef6bcb279a3b0

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f26d49917964620b25915579fcb4c4efb8dc1e639b6b924c455a10cbdede3660.exe
    "C:\Users\Admin\AppData\Local\Temp\f26d49917964620b25915579fcb4c4efb8dc1e639b6b924c455a10cbdede3660.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1608
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un479441.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un479441.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1860
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6796.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6796.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5108
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6453.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6453.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4428
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si899502.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si899502.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4576
  • C:\Windows\system32\sc.exe
    C:\Windows\system32\sc.exe start wuauserv
    1⤵
    • Launches sc.exe
    PID:3908

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si899502.exe

    Filesize

    175KB

    MD5

    7b114d23d2071753dd2fd9fb33afe7e1

    SHA1

    2d05622d7a804fce1bbd1054bc3e7fc9ffcb0f99

    SHA256

    48628bf9ee8b5e93a0b1539f23e2608576adddef97e5b2cedc85d2d0121319ec

    SHA512

    f9d37999397fd975da3ef023921cfd58490970bdef10708da56fdad4db4e9b6e7eb0bc42e3aa231340a65b22731b2aa09bd0b7314d2e38b2b515be2f1a54a050

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si899502.exe

    Filesize

    175KB

    MD5

    7b114d23d2071753dd2fd9fb33afe7e1

    SHA1

    2d05622d7a804fce1bbd1054bc3e7fc9ffcb0f99

    SHA256

    48628bf9ee8b5e93a0b1539f23e2608576adddef97e5b2cedc85d2d0121319ec

    SHA512

    f9d37999397fd975da3ef023921cfd58490970bdef10708da56fdad4db4e9b6e7eb0bc42e3aa231340a65b22731b2aa09bd0b7314d2e38b2b515be2f1a54a050

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un479441.exe

    Filesize

    544KB

    MD5

    e5d8ff8c89f1e76cca707b9a9b71f60d

    SHA1

    b5d38915560a9e3f265a5d15b9cf0bc02f48f757

    SHA256

    5ea90000a1fd3afe182638b4fc70d5fe67117a18c96343cf2a4c90d2983944f8

    SHA512

    7bfcdae06159afb127e66dacad706ef54f410e290ffb2d521c1170740e9d7a9ee308949836799b7d765e1292aabcc800438b3f0f4f780083f7215abe3f674380

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un479441.exe

    Filesize

    544KB

    MD5

    e5d8ff8c89f1e76cca707b9a9b71f60d

    SHA1

    b5d38915560a9e3f265a5d15b9cf0bc02f48f757

    SHA256

    5ea90000a1fd3afe182638b4fc70d5fe67117a18c96343cf2a4c90d2983944f8

    SHA512

    7bfcdae06159afb127e66dacad706ef54f410e290ffb2d521c1170740e9d7a9ee308949836799b7d765e1292aabcc800438b3f0f4f780083f7215abe3f674380

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6796.exe

    Filesize

    300KB

    MD5

    0fd1cc0a6cfa36a878e3c5a9f41b76a1

    SHA1

    ac0ed5d89c9ffc50a06cc6ab027e7a2fe3f57126

    SHA256

    404369f5f067ce409144d6d2ca787860439343371a0f4478c461a7e930446b54

    SHA512

    5221471e7d4e39c4df91774f8499079b4f268568ba87706ac675f01df5b44deaf83400eddaa5bfd23666d4173d7fe7be3d0fd3ca9048354c48a584106ea50fb8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6796.exe

    Filesize

    300KB

    MD5

    0fd1cc0a6cfa36a878e3c5a9f41b76a1

    SHA1

    ac0ed5d89c9ffc50a06cc6ab027e7a2fe3f57126

    SHA256

    404369f5f067ce409144d6d2ca787860439343371a0f4478c461a7e930446b54

    SHA512

    5221471e7d4e39c4df91774f8499079b4f268568ba87706ac675f01df5b44deaf83400eddaa5bfd23666d4173d7fe7be3d0fd3ca9048354c48a584106ea50fb8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6453.exe

    Filesize

    359KB

    MD5

    c4e47e3740dde85cc04f567b4105b136

    SHA1

    60e924a92af8cf99cc7088f200629d1318b09747

    SHA256

    97a7b8ccebb9c041fa829f0d0ec2074af976d83511f7f79e5a8241acc0010fa2

    SHA512

    ed7b0f4bf7d7b6b96862939c0fcb5d3fc7dbe9e507a6b05493981529a2429229f9f8a10a064af8f1512e5bfe77199c8f1151994ff17b81f899ebe322e5aa370d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6453.exe

    Filesize

    359KB

    MD5

    c4e47e3740dde85cc04f567b4105b136

    SHA1

    60e924a92af8cf99cc7088f200629d1318b09747

    SHA256

    97a7b8ccebb9c041fa829f0d0ec2074af976d83511f7f79e5a8241acc0010fa2

    SHA512

    ed7b0f4bf7d7b6b96862939c0fcb5d3fc7dbe9e507a6b05493981529a2429229f9f8a10a064af8f1512e5bfe77199c8f1151994ff17b81f899ebe322e5aa370d

  • memory/4428-349-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/4428-1102-0x0000000005C40000-0x0000000005C52000-memory.dmp

    Filesize

    72KB

  • memory/4428-1115-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/4428-1114-0x0000000006C40000-0x000000000716C000-memory.dmp

    Filesize

    5.2MB

  • memory/4428-1113-0x0000000006A70000-0x0000000006C32000-memory.dmp

    Filesize

    1.8MB

  • memory/4428-1112-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/4428-1111-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/4428-1110-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/4428-1108-0x0000000006790000-0x00000000067E0000-memory.dmp

    Filesize

    320KB

  • memory/4428-1107-0x0000000006710000-0x0000000006786000-memory.dmp

    Filesize

    472KB

  • memory/4428-1106-0x0000000005FF0000-0x0000000006056000-memory.dmp

    Filesize

    408KB

  • memory/4428-1105-0x0000000005F50000-0x0000000005FE2000-memory.dmp

    Filesize

    584KB

  • memory/4428-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp

    Filesize

    240KB

  • memory/4428-1103-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/4428-1101-0x0000000005B30000-0x0000000005C3A000-memory.dmp

    Filesize

    1.0MB

  • memory/4428-1100-0x0000000005510000-0x0000000005B28000-memory.dmp

    Filesize

    6.1MB

  • memory/4428-347-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/4428-345-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/4428-343-0x0000000002320000-0x000000000236B000-memory.dmp

    Filesize

    300KB

  • memory/4428-223-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/4428-221-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/4428-219-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/4428-190-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/4428-191-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/4428-193-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/4428-195-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/4428-197-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/4428-199-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/4428-201-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/4428-203-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/4428-205-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/4428-207-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/4428-209-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/4428-211-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/4428-213-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/4428-215-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/4428-217-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/4576-1121-0x00000000005A0000-0x00000000005D2000-memory.dmp

    Filesize

    200KB

  • memory/4576-1122-0x0000000004E10000-0x0000000004E20000-memory.dmp

    Filesize

    64KB

  • memory/5108-173-0x0000000005230000-0x0000000005242000-memory.dmp

    Filesize

    72KB

  • memory/5108-179-0x0000000005230000-0x0000000005242000-memory.dmp

    Filesize

    72KB

  • memory/5108-182-0x0000000002620000-0x0000000002630000-memory.dmp

    Filesize

    64KB

  • memory/5108-181-0x0000000002620000-0x0000000002630000-memory.dmp

    Filesize

    64KB

  • memory/5108-151-0x0000000002620000-0x0000000002630000-memory.dmp

    Filesize

    64KB

  • memory/5108-180-0x0000000000400000-0x000000000070E000-memory.dmp

    Filesize

    3.1MB

  • memory/5108-171-0x0000000005230000-0x0000000005242000-memory.dmp

    Filesize

    72KB

  • memory/5108-153-0x0000000005230000-0x0000000005242000-memory.dmp

    Filesize

    72KB

  • memory/5108-177-0x0000000005230000-0x0000000005242000-memory.dmp

    Filesize

    72KB

  • memory/5108-175-0x0000000005230000-0x0000000005242000-memory.dmp

    Filesize

    72KB

  • memory/5108-183-0x0000000002620000-0x0000000002630000-memory.dmp

    Filesize

    64KB

  • memory/5108-150-0x0000000002620000-0x0000000002630000-memory.dmp

    Filesize

    64KB

  • memory/5108-161-0x0000000005230000-0x0000000005242000-memory.dmp

    Filesize

    72KB

  • memory/5108-167-0x0000000005230000-0x0000000005242000-memory.dmp

    Filesize

    72KB

  • memory/5108-165-0x0000000005230000-0x0000000005242000-memory.dmp

    Filesize

    72KB

  • memory/5108-163-0x0000000005230000-0x0000000005242000-memory.dmp

    Filesize

    72KB

  • memory/5108-169-0x0000000005230000-0x0000000005242000-memory.dmp

    Filesize

    72KB

  • memory/5108-159-0x0000000005230000-0x0000000005242000-memory.dmp

    Filesize

    72KB

  • memory/5108-157-0x0000000005230000-0x0000000005242000-memory.dmp

    Filesize

    72KB

  • memory/5108-155-0x0000000005230000-0x0000000005242000-memory.dmp

    Filesize

    72KB

  • memory/5108-149-0x0000000000790000-0x00000000007BD000-memory.dmp

    Filesize

    180KB

  • memory/5108-148-0x0000000004C80000-0x0000000005224000-memory.dmp

    Filesize

    5.6MB

  • memory/5108-185-0x0000000000400000-0x000000000070E000-memory.dmp

    Filesize

    3.1MB

  • memory/5108-152-0x0000000005230000-0x0000000005242000-memory.dmp

    Filesize

    72KB