Analysis

  • max time kernel
    53s
  • max time network
    71s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27/03/2023, 10:53

General

  • Target

    7b8fb730bc12c267f2e83e8af3e2057ddbd9b066d04e95126cbc7905477da9a5.exe

  • Size

    687KB

  • MD5

    ddc5ae571f7a5fd1a0a3109d39c1c5cf

  • SHA1

    e72db1d28f0dadb771a70d5bb30a0f9cae77bcc4

  • SHA256

    7b8fb730bc12c267f2e83e8af3e2057ddbd9b066d04e95126cbc7905477da9a5

  • SHA512

    af8459e310746f43741964f11f80aa04c1320da3602bd4e41d005af646a8fb7a0e2627c67d2d5aba6c0efc8780a941f8eb2e3ab403b0d8f3548fd824ab90ac2b

  • SSDEEP

    12288:cMrqy90gozs27bXE1xsb7A6X2MEyB57WaQA2x0FlIZ0xqc4hJx+4Mrff:+y4nXksPA6DEyB5CaQA2xF+xchIL

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b8fb730bc12c267f2e83e8af3e2057ddbd9b066d04e95126cbc7905477da9a5.exe
    "C:\Users\Admin\AppData\Local\Temp\7b8fb730bc12c267f2e83e8af3e2057ddbd9b066d04e95126cbc7905477da9a5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un370993.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un370993.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3276
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4920.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4920.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3748
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0007.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0007.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2036
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si104092.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si104092.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1500

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si104092.exe

    Filesize

    175KB

    MD5

    8b744a036082be2ad59b87f9a5bec6d7

    SHA1

    c4cbf97deb1ad84a93b358f9b132085a208a3871

    SHA256

    14e4c207fd6d6afa2d769ef1d818dd4c470a5c9ec2629763ae0bd0eaa8065c38

    SHA512

    73f7af6906110fded0cf37a2fdf0e8786a3473d3886b54ab79e611772c10ceab7fdd99735c90762f00630c2bfaae841adc25e92551730732bfc6c537e453dd96

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si104092.exe

    Filesize

    175KB

    MD5

    8b744a036082be2ad59b87f9a5bec6d7

    SHA1

    c4cbf97deb1ad84a93b358f9b132085a208a3871

    SHA256

    14e4c207fd6d6afa2d769ef1d818dd4c470a5c9ec2629763ae0bd0eaa8065c38

    SHA512

    73f7af6906110fded0cf37a2fdf0e8786a3473d3886b54ab79e611772c10ceab7fdd99735c90762f00630c2bfaae841adc25e92551730732bfc6c537e453dd96

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un370993.exe

    Filesize

    544KB

    MD5

    1fcf5182d508d8f7255ac6de013f052a

    SHA1

    2a598549ddfbdf3ad9d1b1481423c90cbd77d4b0

    SHA256

    cd4b21d685bbb0fc8d346079ca5a3fc33a841882e63f91ed0ce6781b36700933

    SHA512

    08685f9baa9990dfcc556ba096b5894732d786418c988b12024610443007fdf773ad4da16359e35d8c17d70db1040606647b405adc3519615054d2ae18d4369b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un370993.exe

    Filesize

    544KB

    MD5

    1fcf5182d508d8f7255ac6de013f052a

    SHA1

    2a598549ddfbdf3ad9d1b1481423c90cbd77d4b0

    SHA256

    cd4b21d685bbb0fc8d346079ca5a3fc33a841882e63f91ed0ce6781b36700933

    SHA512

    08685f9baa9990dfcc556ba096b5894732d786418c988b12024610443007fdf773ad4da16359e35d8c17d70db1040606647b405adc3519615054d2ae18d4369b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4920.exe

    Filesize

    300KB

    MD5

    bfc7f5ae71f07245e3cf0848de81ff80

    SHA1

    95936fef0a4af91b3a73c2f76a89de4533e7a6ef

    SHA256

    e30cff1a50d9523889a1857edd045793a6a0eb9d4fccf831ccd35b0d77aa0380

    SHA512

    160d34d01bd2f81bbb29e715387c5ada53cb2037ac8407f48365a1e7efe5384b36ee9af50ad1baff87aabd865068c66362ce64cf6e9a671262963559961b307c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4920.exe

    Filesize

    300KB

    MD5

    bfc7f5ae71f07245e3cf0848de81ff80

    SHA1

    95936fef0a4af91b3a73c2f76a89de4533e7a6ef

    SHA256

    e30cff1a50d9523889a1857edd045793a6a0eb9d4fccf831ccd35b0d77aa0380

    SHA512

    160d34d01bd2f81bbb29e715387c5ada53cb2037ac8407f48365a1e7efe5384b36ee9af50ad1baff87aabd865068c66362ce64cf6e9a671262963559961b307c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0007.exe

    Filesize

    359KB

    MD5

    df70f2cd16843b6b0bb48fddb9325995

    SHA1

    1044c02d984e01f53a9bfbf01d2c08f833286496

    SHA256

    521441aac49b961f81212dfe27ec1a222c2c11926fed020d4b8565b65dab93d7

    SHA512

    4f1cc85eddf0b90a040becc3871192e7baf229dc8de0f3abc21eff0cc0985343e4ffc2b4c0a21a4e7745e49e42b904054b4310309e249b2a1e13c98b49397581

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0007.exe

    Filesize

    359KB

    MD5

    df70f2cd16843b6b0bb48fddb9325995

    SHA1

    1044c02d984e01f53a9bfbf01d2c08f833286496

    SHA256

    521441aac49b961f81212dfe27ec1a222c2c11926fed020d4b8565b65dab93d7

    SHA512

    4f1cc85eddf0b90a040becc3871192e7baf229dc8de0f3abc21eff0cc0985343e4ffc2b4c0a21a4e7745e49e42b904054b4310309e249b2a1e13c98b49397581

  • memory/1500-1114-0x0000000005580000-0x0000000005590000-memory.dmp

    Filesize

    64KB

  • memory/1500-1113-0x00000000053C0000-0x000000000540B000-memory.dmp

    Filesize

    300KB

  • memory/1500-1112-0x0000000000980000-0x00000000009B2000-memory.dmp

    Filesize

    200KB

  • memory/2036-1092-0x0000000005530000-0x0000000005542000-memory.dmp

    Filesize

    72KB

  • memory/2036-1095-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/2036-1106-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/2036-1105-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/2036-1104-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/2036-1103-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/2036-1102-0x00000000068B0000-0x0000000006DDC000-memory.dmp

    Filesize

    5.2MB

  • memory/2036-1100-0x00000000066E0000-0x00000000068A2000-memory.dmp

    Filesize

    1.8MB

  • memory/2036-1099-0x0000000006670000-0x00000000066C0000-memory.dmp

    Filesize

    320KB

  • memory/2036-1098-0x00000000065F0000-0x0000000006666000-memory.dmp

    Filesize

    472KB

  • memory/2036-1097-0x00000000063E0000-0x0000000006472000-memory.dmp

    Filesize

    584KB

  • memory/2036-1096-0x0000000005830000-0x0000000005896000-memory.dmp

    Filesize

    408KB

  • memory/2036-1094-0x00000000056A0000-0x00000000056EB000-memory.dmp

    Filesize

    300KB

  • memory/2036-1093-0x0000000005550000-0x000000000558E000-memory.dmp

    Filesize

    248KB

  • memory/2036-1091-0x00000000053F0000-0x00000000054FA000-memory.dmp

    Filesize

    1.0MB

  • memory/2036-1090-0x0000000005980000-0x0000000005F86000-memory.dmp

    Filesize

    6.0MB

  • memory/2036-217-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

    Filesize

    248KB

  • memory/2036-213-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

    Filesize

    248KB

  • memory/2036-215-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

    Filesize

    248KB

  • memory/2036-211-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

    Filesize

    248KB

  • memory/2036-178-0x00000000027E0000-0x0000000002826000-memory.dmp

    Filesize

    280KB

  • memory/2036-179-0x0000000004CB0000-0x0000000004CF4000-memory.dmp

    Filesize

    272KB

  • memory/2036-180-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/2036-181-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/2036-182-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

    Filesize

    248KB

  • memory/2036-184-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

    Filesize

    248KB

  • memory/2036-186-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/2036-183-0x0000000004D60000-0x0000000004D70000-memory.dmp

    Filesize

    64KB

  • memory/2036-187-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

    Filesize

    248KB

  • memory/2036-189-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

    Filesize

    248KB

  • memory/2036-191-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

    Filesize

    248KB

  • memory/2036-193-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

    Filesize

    248KB

  • memory/2036-195-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

    Filesize

    248KB

  • memory/2036-197-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

    Filesize

    248KB

  • memory/2036-199-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

    Filesize

    248KB

  • memory/2036-201-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

    Filesize

    248KB

  • memory/2036-203-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

    Filesize

    248KB

  • memory/2036-205-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

    Filesize

    248KB

  • memory/2036-207-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

    Filesize

    248KB

  • memory/2036-209-0x0000000004CB0000-0x0000000004CEE000-memory.dmp

    Filesize

    248KB

  • memory/3748-159-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/3748-138-0x00000000022C0000-0x00000000022D0000-memory.dmp

    Filesize

    64KB

  • memory/3748-173-0x0000000000400000-0x000000000070E000-memory.dmp

    Filesize

    3.1MB

  • memory/3748-171-0x00000000022C0000-0x00000000022D0000-memory.dmp

    Filesize

    64KB

  • memory/3748-170-0x0000000000400000-0x000000000070E000-memory.dmp

    Filesize

    3.1MB

  • memory/3748-169-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/3748-140-0x0000000004D20000-0x000000000521E000-memory.dmp

    Filesize

    5.0MB

  • memory/3748-167-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/3748-165-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/3748-143-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/3748-163-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/3748-161-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/3748-142-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/3748-155-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/3748-141-0x00000000026F0000-0x0000000002708000-memory.dmp

    Filesize

    96KB

  • memory/3748-153-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/3748-151-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/3748-149-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/3748-147-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/3748-145-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/3748-139-0x00000000022C0000-0x00000000022D0000-memory.dmp

    Filesize

    64KB

  • memory/3748-157-0x00000000026F0000-0x0000000002702000-memory.dmp

    Filesize

    72KB

  • memory/3748-137-0x00000000022C0000-0x00000000022D0000-memory.dmp

    Filesize

    64KB

  • memory/3748-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/3748-135-0x0000000002280000-0x000000000229A000-memory.dmp

    Filesize

    104KB