Analysis

  • max time kernel
    84s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2023, 10:35

General

  • Target

    6e6f7b51c0b2012717c80f331d402f85febcf300fe4a7a2fc9408509898986da.exe

  • Size

    686KB

  • MD5

    a0245a89ddbe5c7414aa9051fa1e1061

  • SHA1

    6e3120c5b55d27aae00a0f29b57fca04712bc736

  • SHA256

    6e6f7b51c0b2012717c80f331d402f85febcf300fe4a7a2fc9408509898986da

  • SHA512

    e75d66158e1eb68aeaf92d9bbeaa6e341a7d4db31667d391c2476c780e4560c5eae15d7adbb000115fbf753bc55466e29249a133186c84a4f730b30375f9bfb3

  • SSDEEP

    12288:pMr4y90Ywy1nwau2ZKD2llyI+WE5B57W3wFWsezNXfFx2Z05TBPMn:xyHq2ZDlyINE5B5C3qWsWa+5T9Mn

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e6f7b51c0b2012717c80f331d402f85febcf300fe4a7a2fc9408509898986da.exe
    "C:\Users\Admin\AppData\Local\Temp\6e6f7b51c0b2012717c80f331d402f85febcf300fe4a7a2fc9408509898986da.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4000
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un990862.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un990862.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3468
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1602.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1602.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1496
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1496 -s 1080
          4⤵
          • Program crash
          PID:3464
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6972.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6972.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1068
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1068 -s 1852
          4⤵
          • Program crash
          PID:4956
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si927776.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si927776.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4368
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1496 -ip 1496
    1⤵
      PID:1880
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1068 -ip 1068
      1⤵
        PID:4348

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si927776.exe

        Filesize

        175KB

        MD5

        c64863241514f75062e1a45a5e10640b

        SHA1

        e9435ea48bdf6a2b3966cfca87614a9fcbf7f308

        SHA256

        c32a2220385b6383a0de1b13594718255503e1fbddb84d6bc27749dc98252e14

        SHA512

        989de4b03d33568a249d293c9dc60892d58486628a76c2caacfb2318e18ac5278468cf54b557fe75fa393249942e0826bee8cbce4ff449b9c3844d869c231cbf

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si927776.exe

        Filesize

        175KB

        MD5

        c64863241514f75062e1a45a5e10640b

        SHA1

        e9435ea48bdf6a2b3966cfca87614a9fcbf7f308

        SHA256

        c32a2220385b6383a0de1b13594718255503e1fbddb84d6bc27749dc98252e14

        SHA512

        989de4b03d33568a249d293c9dc60892d58486628a76c2caacfb2318e18ac5278468cf54b557fe75fa393249942e0826bee8cbce4ff449b9c3844d869c231cbf

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un990862.exe

        Filesize

        544KB

        MD5

        4ca88141b51f85329c3b290e92a5db6a

        SHA1

        85bbcad75667b63648c44d0064b741232f0a58e8

        SHA256

        adcf89d9376ca41ccdd21303c8cb7fcc50d41fa2aa4d049d714919ccbb84ee5a

        SHA512

        8f78bfffa9cffd1a13601e773cb0d4aeeab4d97dbf0c08a60ccbdb3a6634f5ada3d24ca608939c45c35395750f0ade02a28bf8cc292794a927bef4e6834abf36

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un990862.exe

        Filesize

        544KB

        MD5

        4ca88141b51f85329c3b290e92a5db6a

        SHA1

        85bbcad75667b63648c44d0064b741232f0a58e8

        SHA256

        adcf89d9376ca41ccdd21303c8cb7fcc50d41fa2aa4d049d714919ccbb84ee5a

        SHA512

        8f78bfffa9cffd1a13601e773cb0d4aeeab4d97dbf0c08a60ccbdb3a6634f5ada3d24ca608939c45c35395750f0ade02a28bf8cc292794a927bef4e6834abf36

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1602.exe

        Filesize

        300KB

        MD5

        e4f74eb30852a23e085640271322683f

        SHA1

        9dea471d5aa6ced757dff975fdcc0a66d75ce61d

        SHA256

        ae11dec4e8435ac5a3b5d36275ef61ae42613d5f900c438f4b96bba51c955a66

        SHA512

        21a2eb7b6ade722ec63d4c183ed3f7181e11cff6c87c71d857fd90e71217b4bade42160b45952cabff386c23d2ae8d7a2f9ecd6c4ecb299c7fede2d6b8e9ca0a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1602.exe

        Filesize

        300KB

        MD5

        e4f74eb30852a23e085640271322683f

        SHA1

        9dea471d5aa6ced757dff975fdcc0a66d75ce61d

        SHA256

        ae11dec4e8435ac5a3b5d36275ef61ae42613d5f900c438f4b96bba51c955a66

        SHA512

        21a2eb7b6ade722ec63d4c183ed3f7181e11cff6c87c71d857fd90e71217b4bade42160b45952cabff386c23d2ae8d7a2f9ecd6c4ecb299c7fede2d6b8e9ca0a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6972.exe

        Filesize

        359KB

        MD5

        ac6f0f303c7350c4f52b0bf9edd3aa2c

        SHA1

        c71ac2cb93c3c36cb270edcb90710ba75be079d7

        SHA256

        e6faa52c555a92d0d5003ed5260bb859076b689a1525818c9af1f4fb858f8520

        SHA512

        f3ff13c64e505839aa6d2301e4d022476dd715df46d80a087d8867505205f19477693d7734f02ae6bac80e4e7971f48966b5ac5df5d28b871d535ce4dd993f60

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6972.exe

        Filesize

        359KB

        MD5

        ac6f0f303c7350c4f52b0bf9edd3aa2c

        SHA1

        c71ac2cb93c3c36cb270edcb90710ba75be079d7

        SHA256

        e6faa52c555a92d0d5003ed5260bb859076b689a1525818c9af1f4fb858f8520

        SHA512

        f3ff13c64e505839aa6d2301e4d022476dd715df46d80a087d8867505205f19477693d7734f02ae6bac80e4e7971f48966b5ac5df5d28b871d535ce4dd993f60

      • memory/1068-1101-0x0000000005320000-0x0000000005938000-memory.dmp

        Filesize

        6.1MB

      • memory/1068-1104-0x0000000005B20000-0x0000000005B5C000-memory.dmp

        Filesize

        240KB

      • memory/1068-1116-0x00000000083F0000-0x0000000008440000-memory.dmp

        Filesize

        320KB

      • memory/1068-1115-0x0000000002600000-0x0000000002676000-memory.dmp

        Filesize

        472KB

      • memory/1068-1114-0x0000000006A00000-0x0000000006F2C000-memory.dmp

        Filesize

        5.2MB

      • memory/1068-1113-0x0000000006810000-0x00000000069D2000-memory.dmp

        Filesize

        1.8MB

      • memory/1068-1112-0x0000000004D50000-0x0000000004D60000-memory.dmp

        Filesize

        64KB

      • memory/1068-1111-0x0000000004D50000-0x0000000004D60000-memory.dmp

        Filesize

        64KB

      • memory/1068-1110-0x0000000004D50000-0x0000000004D60000-memory.dmp

        Filesize

        64KB

      • memory/1068-1109-0x0000000004D50000-0x0000000004D60000-memory.dmp

        Filesize

        64KB

      • memory/1068-1107-0x00000000064E0000-0x0000000006572000-memory.dmp

        Filesize

        584KB

      • memory/1068-1106-0x0000000005E10000-0x0000000005E76000-memory.dmp

        Filesize

        408KB

      • memory/1068-1105-0x0000000004D50000-0x0000000004D60000-memory.dmp

        Filesize

        64KB

      • memory/1068-1103-0x0000000005B00000-0x0000000005B12000-memory.dmp

        Filesize

        72KB

      • memory/1068-1102-0x00000000059C0000-0x0000000005ACA000-memory.dmp

        Filesize

        1.0MB

      • memory/1068-506-0x0000000004D50000-0x0000000004D60000-memory.dmp

        Filesize

        64KB

      • memory/1068-503-0x0000000004D50000-0x0000000004D60000-memory.dmp

        Filesize

        64KB

      • memory/1068-501-0x0000000004D50000-0x0000000004D60000-memory.dmp

        Filesize

        64KB

      • memory/1068-499-0x0000000002260000-0x00000000022AB000-memory.dmp

        Filesize

        300KB

      • memory/1068-222-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/1068-220-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/1068-218-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/1068-192-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/1068-194-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/1068-191-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/1068-196-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/1068-198-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/1068-200-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/1068-202-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/1068-204-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/1068-206-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/1068-208-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/1068-210-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/1068-212-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/1068-214-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/1068-216-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/1496-172-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/1496-149-0x0000000000970000-0x000000000099D000-memory.dmp

        Filesize

        180KB

      • memory/1496-186-0x0000000000400000-0x000000000070E000-memory.dmp

        Filesize

        3.1MB

      • memory/1496-183-0x00000000024A0000-0x00000000024B0000-memory.dmp

        Filesize

        64KB

      • memory/1496-182-0x00000000024A0000-0x00000000024B0000-memory.dmp

        Filesize

        64KB

      • memory/1496-181-0x0000000000400000-0x000000000070E000-memory.dmp

        Filesize

        3.1MB

      • memory/1496-180-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/1496-150-0x00000000024A0000-0x00000000024B0000-memory.dmp

        Filesize

        64KB

      • memory/1496-178-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/1496-176-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/1496-153-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/1496-174-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/1496-152-0x00000000024A0000-0x00000000024B0000-memory.dmp

        Filesize

        64KB

      • memory/1496-151-0x00000000024A0000-0x00000000024B0000-memory.dmp

        Filesize

        64KB

      • memory/1496-160-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/1496-166-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/1496-164-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/1496-162-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/1496-168-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/1496-158-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/1496-156-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/1496-154-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/1496-170-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/1496-148-0x0000000004DD0000-0x0000000005374000-memory.dmp

        Filesize

        5.6MB

      • memory/4368-1122-0x0000000000EE0000-0x0000000000F12000-memory.dmp

        Filesize

        200KB

      • memory/4368-1123-0x0000000005770000-0x0000000005780000-memory.dmp

        Filesize

        64KB