Analysis

  • max time kernel
    99s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2023, 11:18

General

  • Target

    097b01d96bfe652f9b03305076ad6e524a9b31c25c4ffb432272519e4970e7ab.exe

  • Size

    688KB

  • MD5

    f60918781bc446d37cbb16b0177daa8b

  • SHA1

    96be892b7555c3af6e9d203e336bc22c300c5bbd

  • SHA256

    097b01d96bfe652f9b03305076ad6e524a9b31c25c4ffb432272519e4970e7ab

  • SHA512

    548e59e18fbde0e3047cf8e7cdfc8e0655ec050dbf790ce8c34715d14425ab86b31f470d841cb22b88551a68c4c54bb450c18216ce6aa58b403dcee12ccbaa08

  • SSDEEP

    12288:LMrSy906Edg2me+Gha0UpN9z4/8meXWZ0DEyqZsndBwyyu:pyoDMDpXz4/+G+DEjIeyyu

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\097b01d96bfe652f9b03305076ad6e524a9b31c25c4ffb432272519e4970e7ab.exe
    "C:\Users\Admin\AppData\Local\Temp\097b01d96bfe652f9b03305076ad6e524a9b31c25c4ffb432272519e4970e7ab.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un908128.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un908128.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2640
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7796.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7796.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1648
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1648 -s 1080
          4⤵
          • Program crash
          PID:3548
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9238.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9238.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2760
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 1332
          4⤵
          • Program crash
          PID:944
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si363839.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si363839.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4184
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 1648 -ip 1648
    1⤵
      PID:4944
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 572 -p 2760 -ip 2760
      1⤵
        PID:4284

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si363839.exe

              Filesize

              175KB

              MD5

              278ab40e4b9fc7c647a14e1b1e255c5a

              SHA1

              0f40bd85d74c493486290b99ede81e53df952552

              SHA256

              7ff0a007c943701f4de67e06881e6cdc461d7602feb1976da383e2fc2a10ed5f

              SHA512

              b790adfd69b31893eee71c3ae31f9249968d2d147932d8939994b6b398574f820124c46dab483e85e95c474574b72889d73719d9055af460f6c36a1e5ea85698

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si363839.exe

              Filesize

              175KB

              MD5

              278ab40e4b9fc7c647a14e1b1e255c5a

              SHA1

              0f40bd85d74c493486290b99ede81e53df952552

              SHA256

              7ff0a007c943701f4de67e06881e6cdc461d7602feb1976da383e2fc2a10ed5f

              SHA512

              b790adfd69b31893eee71c3ae31f9249968d2d147932d8939994b6b398574f820124c46dab483e85e95c474574b72889d73719d9055af460f6c36a1e5ea85698

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un908128.exe

              Filesize

              545KB

              MD5

              43716da2475a6a4e085e81a1d7c61184

              SHA1

              a2b1506ba6caab7dd11572b9c788ac836a735855

              SHA256

              1a1818e01bb71a40d6af076901a59b2567a90c95cae6c37d6a55c0808d18468f

              SHA512

              d4b5d993fb0563c903fc849ea34e500e2cb914db806b8033543d9ecc5dc77b76221ee2268cd74660f2f3e818bf53be83abbc7af06f5ce76a7eb6a513b3c5a995

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un908128.exe

              Filesize

              545KB

              MD5

              43716da2475a6a4e085e81a1d7c61184

              SHA1

              a2b1506ba6caab7dd11572b9c788ac836a735855

              SHA256

              1a1818e01bb71a40d6af076901a59b2567a90c95cae6c37d6a55c0808d18468f

              SHA512

              d4b5d993fb0563c903fc849ea34e500e2cb914db806b8033543d9ecc5dc77b76221ee2268cd74660f2f3e818bf53be83abbc7af06f5ce76a7eb6a513b3c5a995

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7796.exe

              Filesize

              300KB

              MD5

              cde7418409d40162db2d5d108665025e

              SHA1

              ab5a9ba3c001d281071e75dab8b4062b474472ca

              SHA256

              0e431e5f7c571090b0d00362eefb40a094254f57f401978c858c357755c60fae

              SHA512

              0c6be7c32015c4d7690f17b22a495e80c87117121619bd81caa06e6fa804f41baa251ca348ef13ec7336dcce0e0cbd157442b9433932769fc1f8c8636bf38ce5

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7796.exe

              Filesize

              300KB

              MD5

              cde7418409d40162db2d5d108665025e

              SHA1

              ab5a9ba3c001d281071e75dab8b4062b474472ca

              SHA256

              0e431e5f7c571090b0d00362eefb40a094254f57f401978c858c357755c60fae

              SHA512

              0c6be7c32015c4d7690f17b22a495e80c87117121619bd81caa06e6fa804f41baa251ca348ef13ec7336dcce0e0cbd157442b9433932769fc1f8c8636bf38ce5

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9238.exe

              Filesize

              359KB

              MD5

              1a42876776bf6235cdb4175bb59de171

              SHA1

              0c0e0de20ed07d7b84b2835bf79531f6a0283316

              SHA256

              1874bce898c85a088e02ac0126510f6b1453d7957f739cdad7a84c2b4347e315

              SHA512

              3f527ea863a52fd17dae513e814499e5f7b02a6d0ff854900f8d1dc7a3dd4ba3fdb0c2cbd313b7e8e445c272811da49d66c666222d3e8b1798d46903fd11879f

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9238.exe

              Filesize

              359KB

              MD5

              1a42876776bf6235cdb4175bb59de171

              SHA1

              0c0e0de20ed07d7b84b2835bf79531f6a0283316

              SHA256

              1874bce898c85a088e02ac0126510f6b1453d7957f739cdad7a84c2b4347e315

              SHA512

              3f527ea863a52fd17dae513e814499e5f7b02a6d0ff854900f8d1dc7a3dd4ba3fdb0c2cbd313b7e8e445c272811da49d66c666222d3e8b1798d46903fd11879f

            • memory/1648-148-0x0000000004E40000-0x00000000053E4000-memory.dmp

              Filesize

              5.6MB

            • memory/1648-149-0x00000000009F0000-0x0000000000A1D000-memory.dmp

              Filesize

              180KB

            • memory/1648-151-0x0000000004E30000-0x0000000004E40000-memory.dmp

              Filesize

              64KB

            • memory/1648-150-0x0000000004E30000-0x0000000004E40000-memory.dmp

              Filesize

              64KB

            • memory/1648-152-0x0000000004E30000-0x0000000004E40000-memory.dmp

              Filesize

              64KB

            • memory/1648-153-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

              Filesize

              72KB

            • memory/1648-154-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

              Filesize

              72KB

            • memory/1648-156-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

              Filesize

              72KB

            • memory/1648-158-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

              Filesize

              72KB

            • memory/1648-160-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

              Filesize

              72KB

            • memory/1648-162-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

              Filesize

              72KB

            • memory/1648-164-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

              Filesize

              72KB

            • memory/1648-166-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

              Filesize

              72KB

            • memory/1648-168-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

              Filesize

              72KB

            • memory/1648-170-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

              Filesize

              72KB

            • memory/1648-172-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

              Filesize

              72KB

            • memory/1648-174-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

              Filesize

              72KB

            • memory/1648-176-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

              Filesize

              72KB

            • memory/1648-178-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

              Filesize

              72KB

            • memory/1648-180-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

              Filesize

              72KB

            • memory/1648-181-0x0000000000400000-0x000000000070E000-memory.dmp

              Filesize

              3.1MB

            • memory/1648-182-0x0000000004E30000-0x0000000004E40000-memory.dmp

              Filesize

              64KB

            • memory/1648-183-0x0000000004E30000-0x0000000004E40000-memory.dmp

              Filesize

              64KB

            • memory/1648-185-0x0000000000400000-0x000000000070E000-memory.dmp

              Filesize

              3.1MB

            • memory/2760-190-0x00000000027D0000-0x000000000280E000-memory.dmp

              Filesize

              248KB

            • memory/2760-191-0x00000000027D0000-0x000000000280E000-memory.dmp

              Filesize

              248KB

            • memory/2760-193-0x00000000027D0000-0x000000000280E000-memory.dmp

              Filesize

              248KB

            • memory/2760-195-0x00000000027D0000-0x000000000280E000-memory.dmp

              Filesize

              248KB

            • memory/2760-197-0x00000000027D0000-0x000000000280E000-memory.dmp

              Filesize

              248KB

            • memory/2760-199-0x00000000027D0000-0x000000000280E000-memory.dmp

              Filesize

              248KB

            • memory/2760-201-0x00000000027D0000-0x000000000280E000-memory.dmp

              Filesize

              248KB

            • memory/2760-203-0x00000000027D0000-0x000000000280E000-memory.dmp

              Filesize

              248KB

            • memory/2760-205-0x00000000027D0000-0x000000000280E000-memory.dmp

              Filesize

              248KB

            • memory/2760-207-0x00000000027D0000-0x000000000280E000-memory.dmp

              Filesize

              248KB

            • memory/2760-209-0x00000000027D0000-0x000000000280E000-memory.dmp

              Filesize

              248KB

            • memory/2760-211-0x00000000027D0000-0x000000000280E000-memory.dmp

              Filesize

              248KB

            • memory/2760-213-0x00000000027D0000-0x000000000280E000-memory.dmp

              Filesize

              248KB

            • memory/2760-215-0x00000000027D0000-0x000000000280E000-memory.dmp

              Filesize

              248KB

            • memory/2760-217-0x00000000027D0000-0x000000000280E000-memory.dmp

              Filesize

              248KB

            • memory/2760-219-0x00000000027D0000-0x000000000280E000-memory.dmp

              Filesize

              248KB

            • memory/2760-221-0x00000000027D0000-0x000000000280E000-memory.dmp

              Filesize

              248KB

            • memory/2760-223-0x00000000027D0000-0x000000000280E000-memory.dmp

              Filesize

              248KB

            • memory/2760-407-0x00000000008E0000-0x000000000092B000-memory.dmp

              Filesize

              300KB

            • memory/2760-412-0x0000000004E30000-0x0000000004E40000-memory.dmp

              Filesize

              64KB

            • memory/2760-410-0x0000000004E30000-0x0000000004E40000-memory.dmp

              Filesize

              64KB

            • memory/2760-1099-0x00000000053F0000-0x0000000005A08000-memory.dmp

              Filesize

              6.1MB

            • memory/2760-1100-0x0000000005A10000-0x0000000005B1A000-memory.dmp

              Filesize

              1.0MB

            • memory/2760-1101-0x0000000004E10000-0x0000000004E22000-memory.dmp

              Filesize

              72KB

            • memory/2760-1102-0x0000000004E30000-0x0000000004E40000-memory.dmp

              Filesize

              64KB

            • memory/2760-1103-0x0000000005B20000-0x0000000005B5C000-memory.dmp

              Filesize

              240KB

            • memory/2760-1104-0x0000000005E10000-0x0000000005E76000-memory.dmp

              Filesize

              408KB

            • memory/2760-1105-0x00000000064E0000-0x0000000006572000-memory.dmp

              Filesize

              584KB

            • memory/2760-1107-0x0000000004E30000-0x0000000004E40000-memory.dmp

              Filesize

              64KB

            • memory/2760-1108-0x0000000004E30000-0x0000000004E40000-memory.dmp

              Filesize

              64KB

            • memory/2760-1109-0x0000000004E30000-0x0000000004E40000-memory.dmp

              Filesize

              64KB

            • memory/2760-1110-0x0000000007990000-0x0000000007B52000-memory.dmp

              Filesize

              1.8MB

            • memory/2760-1111-0x0000000007B60000-0x000000000808C000-memory.dmp

              Filesize

              5.2MB

            • memory/2760-1112-0x0000000004E30000-0x0000000004E40000-memory.dmp

              Filesize

              64KB

            • memory/2760-1113-0x0000000008110000-0x0000000008186000-memory.dmp

              Filesize

              472KB

            • memory/2760-1114-0x00000000081B0000-0x0000000008200000-memory.dmp

              Filesize

              320KB

            • memory/4184-1120-0x00000000004A0000-0x00000000004D2000-memory.dmp

              Filesize

              200KB

            • memory/4184-1121-0x0000000004D50000-0x0000000004D60000-memory.dmp

              Filesize

              64KB