Analysis

  • max time kernel
    53s
  • max time network
    72s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 12:48

General

  • Target

    1b43c24c46a6f942102bed02013e70dd36c0c2e850959fee804fea11e934bfd2.exe

  • Size

    687KB

  • MD5

    df7ca19e6895e606ea1a943d59a7d976

  • SHA1

    8661b451c4731709d8cae1635f2175ed06702523

  • SHA256

    1b43c24c46a6f942102bed02013e70dd36c0c2e850959fee804fea11e934bfd2

  • SHA512

    daafea9d00fab0200a0367b63828f6802df2ddd79414c73873cf5db4636dc47002cb62e32754a9d451462c25627a7fbe711fdb39ad06d7bf3f0e4530f7f05c46

  • SSDEEP

    12288:/MrJy90/XMFz2eCx0Q6jjqj2xXGXbOSpMwqeZ4fZpf9dUPKEv/:iyS+GxXijl2XbOSpMeOfZpLUP9v/

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b43c24c46a6f942102bed02013e70dd36c0c2e850959fee804fea11e934bfd2.exe
    "C:\Users\Admin\AppData\Local\Temp\1b43c24c46a6f942102bed02013e70dd36c0c2e850959fee804fea11e934bfd2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un833065.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un833065.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3276
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9786.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9786.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3748
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8230.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8230.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3160
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si692600.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si692600.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3152

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si692600.exe

    Filesize

    175KB

    MD5

    4b2da8d19073295fc26d01525921b8e4

    SHA1

    10520fcd17e172c5b08a117ec4d44f15b93ebb9b

    SHA256

    2617039f13331de2c327a4dbec938ff7f03fbe3810055f184de38b36f60c2f8c

    SHA512

    5f2edc2c3a93c8ee04ef97a61fb39293d5923b3e4d6a20dcba0ef00a28ca93cd89a70a9e85cc36ad80a8944747795755d62f8993b2828739f5217cc959b7e0c2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si692600.exe

    Filesize

    175KB

    MD5

    4b2da8d19073295fc26d01525921b8e4

    SHA1

    10520fcd17e172c5b08a117ec4d44f15b93ebb9b

    SHA256

    2617039f13331de2c327a4dbec938ff7f03fbe3810055f184de38b36f60c2f8c

    SHA512

    5f2edc2c3a93c8ee04ef97a61fb39293d5923b3e4d6a20dcba0ef00a28ca93cd89a70a9e85cc36ad80a8944747795755d62f8993b2828739f5217cc959b7e0c2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un833065.exe

    Filesize

    545KB

    MD5

    9b64a6bdc41d8948c75ef149e9ec9ba7

    SHA1

    b6c13d0bcb13ef7b7ac207cecf3dad396c751967

    SHA256

    e3b3eb1b82bfb05d4b863f940893cb8a333372f44516c06eb9dfcb559ae71fd0

    SHA512

    32ead8d9ce0584015b298a8d98beb4c9e8ce026611d8f66d794c34ce19b1c93818cde62d6180ee140f1b8d5d2f724da410e63dd79713e80ce9629a1cf8ff122d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un833065.exe

    Filesize

    545KB

    MD5

    9b64a6bdc41d8948c75ef149e9ec9ba7

    SHA1

    b6c13d0bcb13ef7b7ac207cecf3dad396c751967

    SHA256

    e3b3eb1b82bfb05d4b863f940893cb8a333372f44516c06eb9dfcb559ae71fd0

    SHA512

    32ead8d9ce0584015b298a8d98beb4c9e8ce026611d8f66d794c34ce19b1c93818cde62d6180ee140f1b8d5d2f724da410e63dd79713e80ce9629a1cf8ff122d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9786.exe

    Filesize

    300KB

    MD5

    8db4ca970d331f7b0e4af64f68945adb

    SHA1

    79dee32ced89c790051cf94a9123728511e00c3e

    SHA256

    06a2135eb93b85cf04366c8d427e813b408d698982028e6e0f95b393cdfa7732

    SHA512

    ccdfc0568cadb0a18d96ffad019885f1c75e3c277aa28519330b527b4032ad5e49dc7b4d14c9c7daedc094ab07da66512d0839f6e5b02adc517bac8b51ab02e1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9786.exe

    Filesize

    300KB

    MD5

    8db4ca970d331f7b0e4af64f68945adb

    SHA1

    79dee32ced89c790051cf94a9123728511e00c3e

    SHA256

    06a2135eb93b85cf04366c8d427e813b408d698982028e6e0f95b393cdfa7732

    SHA512

    ccdfc0568cadb0a18d96ffad019885f1c75e3c277aa28519330b527b4032ad5e49dc7b4d14c9c7daedc094ab07da66512d0839f6e5b02adc517bac8b51ab02e1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8230.exe

    Filesize

    359KB

    MD5

    b40c6e2859923bebb0035b410acee897

    SHA1

    0fb46b1a347e3ff626a18e2afa6519c3a7891a57

    SHA256

    86033f0fcb200144c9f64dfda47bc22e912be5ad469b8f6d06e99a4656ad2030

    SHA512

    d2c1b52f804bc265345e138837088dbda8a08f216cc3839c228cd8e9be4870998f6cc6a974576f87fef39ec833567032dfc1aacef75ae8734713ae6823957ae0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8230.exe

    Filesize

    359KB

    MD5

    b40c6e2859923bebb0035b410acee897

    SHA1

    0fb46b1a347e3ff626a18e2afa6519c3a7891a57

    SHA256

    86033f0fcb200144c9f64dfda47bc22e912be5ad469b8f6d06e99a4656ad2030

    SHA512

    d2c1b52f804bc265345e138837088dbda8a08f216cc3839c228cd8e9be4870998f6cc6a974576f87fef39ec833567032dfc1aacef75ae8734713ae6823957ae0

  • memory/3152-1116-0x00000000058D0000-0x00000000058E0000-memory.dmp

    Filesize

    64KB

  • memory/3152-1115-0x0000000005860000-0x00000000058AB000-memory.dmp

    Filesize

    300KB

  • memory/3152-1114-0x0000000000FE0000-0x0000000001012000-memory.dmp

    Filesize

    200KB

  • memory/3160-1092-0x0000000005990000-0x0000000005F96000-memory.dmp

    Filesize

    6.0MB

  • memory/3160-1095-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/3160-1108-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/3160-1107-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/3160-1106-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/3160-1105-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/3160-1104-0x0000000006870000-0x0000000006D9C000-memory.dmp

    Filesize

    5.2MB

  • memory/3160-1103-0x00000000066A0000-0x0000000006862000-memory.dmp

    Filesize

    1.8MB

  • memory/3160-1101-0x0000000006630000-0x0000000006680000-memory.dmp

    Filesize

    320KB

  • memory/3160-1100-0x00000000065B0000-0x0000000006626000-memory.dmp

    Filesize

    472KB

  • memory/3160-1099-0x00000000062E0000-0x0000000006372000-memory.dmp

    Filesize

    584KB

  • memory/3160-1098-0x00000000056F0000-0x0000000005756000-memory.dmp

    Filesize

    408KB

  • memory/3160-1097-0x0000000005590000-0x00000000055DB000-memory.dmp

    Filesize

    300KB

  • memory/3160-1096-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/3160-1094-0x0000000004DD0000-0x0000000004DE2000-memory.dmp

    Filesize

    72KB

  • memory/3160-1093-0x0000000005380000-0x000000000548A000-memory.dmp

    Filesize

    1.0MB

  • memory/3160-221-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/3160-223-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/3160-218-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/3160-217-0x0000000000720000-0x000000000076B000-memory.dmp

    Filesize

    300KB

  • memory/3160-215-0x0000000002830000-0x000000000286E000-memory.dmp

    Filesize

    248KB

  • memory/3160-213-0x0000000002830000-0x000000000286E000-memory.dmp

    Filesize

    248KB

  • memory/3160-180-0x00000000027B0000-0x00000000027F6000-memory.dmp

    Filesize

    280KB

  • memory/3160-181-0x0000000002830000-0x0000000002874000-memory.dmp

    Filesize

    272KB

  • memory/3160-182-0x0000000002830000-0x000000000286E000-memory.dmp

    Filesize

    248KB

  • memory/3160-183-0x0000000002830000-0x000000000286E000-memory.dmp

    Filesize

    248KB

  • memory/3160-185-0x0000000002830000-0x000000000286E000-memory.dmp

    Filesize

    248KB

  • memory/3160-187-0x0000000002830000-0x000000000286E000-memory.dmp

    Filesize

    248KB

  • memory/3160-189-0x0000000002830000-0x000000000286E000-memory.dmp

    Filesize

    248KB

  • memory/3160-191-0x0000000002830000-0x000000000286E000-memory.dmp

    Filesize

    248KB

  • memory/3160-193-0x0000000002830000-0x000000000286E000-memory.dmp

    Filesize

    248KB

  • memory/3160-195-0x0000000002830000-0x000000000286E000-memory.dmp

    Filesize

    248KB

  • memory/3160-197-0x0000000002830000-0x000000000286E000-memory.dmp

    Filesize

    248KB

  • memory/3160-199-0x0000000002830000-0x000000000286E000-memory.dmp

    Filesize

    248KB

  • memory/3160-201-0x0000000002830000-0x000000000286E000-memory.dmp

    Filesize

    248KB

  • memory/3160-203-0x0000000002830000-0x000000000286E000-memory.dmp

    Filesize

    248KB

  • memory/3160-205-0x0000000002830000-0x000000000286E000-memory.dmp

    Filesize

    248KB

  • memory/3160-207-0x0000000002830000-0x000000000286E000-memory.dmp

    Filesize

    248KB

  • memory/3160-209-0x0000000002830000-0x000000000286E000-memory.dmp

    Filesize

    248KB

  • memory/3160-211-0x0000000002830000-0x000000000286E000-memory.dmp

    Filesize

    248KB

  • memory/3748-163-0x0000000002370000-0x0000000002382000-memory.dmp

    Filesize

    72KB

  • memory/3748-135-0x00000000022F0000-0x000000000230A000-memory.dmp

    Filesize

    104KB

  • memory/3748-141-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

    Filesize

    64KB

  • memory/3748-173-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

    Filesize

    64KB

  • memory/3748-172-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

    Filesize

    64KB

  • memory/3748-171-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

    Filesize

    64KB

  • memory/3748-140-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

    Filesize

    64KB

  • memory/3748-170-0x0000000000400000-0x000000000070E000-memory.dmp

    Filesize

    3.1MB

  • memory/3748-169-0x0000000002370000-0x0000000002382000-memory.dmp

    Filesize

    72KB

  • memory/3748-143-0x0000000002370000-0x0000000002382000-memory.dmp

    Filesize

    72KB

  • memory/3748-167-0x0000000002370000-0x0000000002382000-memory.dmp

    Filesize

    72KB

  • memory/3748-165-0x0000000002370000-0x0000000002382000-memory.dmp

    Filesize

    72KB

  • memory/3748-175-0x0000000000400000-0x000000000070E000-memory.dmp

    Filesize

    3.1MB

  • memory/3748-142-0x0000000002370000-0x0000000002382000-memory.dmp

    Filesize

    72KB

  • memory/3748-145-0x0000000002370000-0x0000000002382000-memory.dmp

    Filesize

    72KB

  • memory/3748-157-0x0000000002370000-0x0000000002382000-memory.dmp

    Filesize

    72KB

  • memory/3748-155-0x0000000002370000-0x0000000002382000-memory.dmp

    Filesize

    72KB

  • memory/3748-153-0x0000000002370000-0x0000000002382000-memory.dmp

    Filesize

    72KB

  • memory/3748-151-0x0000000002370000-0x0000000002382000-memory.dmp

    Filesize

    72KB

  • memory/3748-149-0x0000000002370000-0x0000000002382000-memory.dmp

    Filesize

    72KB

  • memory/3748-147-0x0000000002370000-0x0000000002382000-memory.dmp

    Filesize

    72KB

  • memory/3748-159-0x0000000002370000-0x0000000002382000-memory.dmp

    Filesize

    72KB

  • memory/3748-139-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

    Filesize

    64KB

  • memory/3748-138-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/3748-137-0x0000000002370000-0x0000000002388000-memory.dmp

    Filesize

    96KB

  • memory/3748-136-0x0000000004DD0000-0x00000000052CE000-memory.dmp

    Filesize

    5.0MB

  • memory/3748-161-0x0000000002370000-0x0000000002382000-memory.dmp

    Filesize

    72KB