Analysis

  • max time kernel
    52s
  • max time network
    72s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 12:49

General

  • Target

    da58ca0265342ac2bc10666d0803771e2751522b1c7bc9cc5ddb3c717105511b.exe

  • Size

    691KB

  • MD5

    89ae8d43eaa724a3cceec8885235f601

  • SHA1

    36be6adad9f7c873e324701f514ec032c0f73346

  • SHA256

    da58ca0265342ac2bc10666d0803771e2751522b1c7bc9cc5ddb3c717105511b

  • SHA512

    349eddfbd5064e183e3a7efecd0b975be547fa522e46c415182915ba86b8aa469eec070f959ca099900ac30fe18382162055f0283e92946f5502a6803623c11d

  • SSDEEP

    12288:ajXKBvlIpVxdoY3596cdUkVcLaKNJbITIIkvg9UnFhsMZx8xT2:0abIpVjtScdfxKT6IIktFhsMgT2

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\da58ca0265342ac2bc10666d0803771e2751522b1c7bc9cc5ddb3c717105511b.exe
    "C:\Users\Admin\AppData\Local\Temp\da58ca0265342ac2bc10666d0803771e2751522b1c7bc9cc5ddb3c717105511b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4212
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieN6673.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieN6673.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2100
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr806405.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr806405.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2132
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku081645.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku081645.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2824
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr730710.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr730710.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4312

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr730710.exe

    Filesize

    175KB

    MD5

    d4c1f423e14e05d191e0de1520ad2b17

    SHA1

    d7c1c6fe54d004bdf09fa92bcf202196da23fddc

    SHA256

    7ce70c475065028340ec98226d10f272ace0e8dc2bc51a710d9c430163e8e6d7

    SHA512

    2386aba7ee02da49d969fe157db0082429c7d9b09e217542c97dc7453752b34f483b8da88db8fff277eccf5ef2c180d7f747e5f1c044ca2f97cadbc4ec05b82d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr730710.exe

    Filesize

    175KB

    MD5

    d4c1f423e14e05d191e0de1520ad2b17

    SHA1

    d7c1c6fe54d004bdf09fa92bcf202196da23fddc

    SHA256

    7ce70c475065028340ec98226d10f272ace0e8dc2bc51a710d9c430163e8e6d7

    SHA512

    2386aba7ee02da49d969fe157db0082429c7d9b09e217542c97dc7453752b34f483b8da88db8fff277eccf5ef2c180d7f747e5f1c044ca2f97cadbc4ec05b82d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieN6673.exe

    Filesize

    404KB

    MD5

    7a51e103844b277238ff8e58e0e451e7

    SHA1

    837df4df7c0ecb44e00e41b4cb1656653467a802

    SHA256

    46e0ba1cb4f2fd283b3c4b44d5ff8cb319426d701d5168a3da070ccf6a60ac2f

    SHA512

    912c64ddb5884da3ae72d001f7cfa55174e0e8cb1847b83d2a5dcb7b4574a999091c5e655d3c0e35978ae345e0b0b2d0f1c035d9fa3faa3790871bfc25322962

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieN6673.exe

    Filesize

    404KB

    MD5

    7a51e103844b277238ff8e58e0e451e7

    SHA1

    837df4df7c0ecb44e00e41b4cb1656653467a802

    SHA256

    46e0ba1cb4f2fd283b3c4b44d5ff8cb319426d701d5168a3da070ccf6a60ac2f

    SHA512

    912c64ddb5884da3ae72d001f7cfa55174e0e8cb1847b83d2a5dcb7b4574a999091c5e655d3c0e35978ae345e0b0b2d0f1c035d9fa3faa3790871bfc25322962

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr806405.exe

    Filesize

    12KB

    MD5

    06c290899c893f40854380588946f1d9

    SHA1

    c5d1fd991ddf4d06a3eaa4a815837ea4a86c92d3

    SHA256

    ea60096faa10d3673f9771411d1519f3d8176cd982a897dffb398885cb921a81

    SHA512

    eeacd2f087d1a288b95068d15e7e78f15689ac9a7ea5fd074c53b5bfcc7fde565673ba40a2f8f69e82d671460000b8c27a661a604e01163af6a838383f25b48d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr806405.exe

    Filesize

    12KB

    MD5

    06c290899c893f40854380588946f1d9

    SHA1

    c5d1fd991ddf4d06a3eaa4a815837ea4a86c92d3

    SHA256

    ea60096faa10d3673f9771411d1519f3d8176cd982a897dffb398885cb921a81

    SHA512

    eeacd2f087d1a288b95068d15e7e78f15689ac9a7ea5fd074c53b5bfcc7fde565673ba40a2f8f69e82d671460000b8c27a661a604e01163af6a838383f25b48d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku081645.exe

    Filesize

    359KB

    MD5

    f8274519359c67b43f6bd8dc4b784d36

    SHA1

    ed1e8c923663c099b0c46b306000c3ba28389ee4

    SHA256

    04b68936268ea06c7f33323ea9e86f497c1605bf4127367013ba2abee9200296

    SHA512

    a6d4f9dde4da288234e2d999c24bca951f99c5a786fea4f40cd31283a4a51328b6f3c1bcfd3d9ea6ad81acb16fb7f835dd875af111cf358878ca7b4e1ede08fd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku081645.exe

    Filesize

    359KB

    MD5

    f8274519359c67b43f6bd8dc4b784d36

    SHA1

    ed1e8c923663c099b0c46b306000c3ba28389ee4

    SHA256

    04b68936268ea06c7f33323ea9e86f497c1605bf4127367013ba2abee9200296

    SHA512

    a6d4f9dde4da288234e2d999c24bca951f99c5a786fea4f40cd31283a4a51328b6f3c1bcfd3d9ea6ad81acb16fb7f835dd875af111cf358878ca7b4e1ede08fd

  • memory/2132-137-0x0000000000770000-0x000000000077A000-memory.dmp

    Filesize

    40KB

  • memory/2824-184-0x00000000025D0000-0x000000000260E000-memory.dmp

    Filesize

    248KB

  • memory/2824-192-0x00000000025D0000-0x000000000260E000-memory.dmp

    Filesize

    248KB

  • memory/2824-146-0x0000000004F30000-0x0000000004F40000-memory.dmp

    Filesize

    64KB

  • memory/2824-147-0x0000000004F40000-0x000000000543E000-memory.dmp

    Filesize

    5.0MB

  • memory/2824-148-0x00000000025D0000-0x0000000002614000-memory.dmp

    Filesize

    272KB

  • memory/2824-149-0x00000000025D0000-0x000000000260E000-memory.dmp

    Filesize

    248KB

  • memory/2824-150-0x00000000025D0000-0x000000000260E000-memory.dmp

    Filesize

    248KB

  • memory/2824-152-0x00000000025D0000-0x000000000260E000-memory.dmp

    Filesize

    248KB

  • memory/2824-154-0x00000000025D0000-0x000000000260E000-memory.dmp

    Filesize

    248KB

  • memory/2824-156-0x00000000025D0000-0x000000000260E000-memory.dmp

    Filesize

    248KB

  • memory/2824-158-0x00000000025D0000-0x000000000260E000-memory.dmp

    Filesize

    248KB

  • memory/2824-160-0x00000000025D0000-0x000000000260E000-memory.dmp

    Filesize

    248KB

  • memory/2824-162-0x00000000025D0000-0x000000000260E000-memory.dmp

    Filesize

    248KB

  • memory/2824-164-0x00000000025D0000-0x000000000260E000-memory.dmp

    Filesize

    248KB

  • memory/2824-166-0x00000000025D0000-0x000000000260E000-memory.dmp

    Filesize

    248KB

  • memory/2824-168-0x00000000025D0000-0x000000000260E000-memory.dmp

    Filesize

    248KB

  • memory/2824-170-0x00000000025D0000-0x000000000260E000-memory.dmp

    Filesize

    248KB

  • memory/2824-172-0x00000000025D0000-0x000000000260E000-memory.dmp

    Filesize

    248KB

  • memory/2824-174-0x00000000025D0000-0x000000000260E000-memory.dmp

    Filesize

    248KB

  • memory/2824-176-0x00000000025D0000-0x000000000260E000-memory.dmp

    Filesize

    248KB

  • memory/2824-178-0x00000000025D0000-0x000000000260E000-memory.dmp

    Filesize

    248KB

  • memory/2824-180-0x00000000025D0000-0x000000000260E000-memory.dmp

    Filesize

    248KB

  • memory/2824-182-0x00000000025D0000-0x000000000260E000-memory.dmp

    Filesize

    248KB

  • memory/2824-144-0x00000000022E0000-0x0000000002326000-memory.dmp

    Filesize

    280KB

  • memory/2824-186-0x00000000025D0000-0x000000000260E000-memory.dmp

    Filesize

    248KB

  • memory/2824-188-0x00000000025D0000-0x000000000260E000-memory.dmp

    Filesize

    248KB

  • memory/2824-190-0x00000000025D0000-0x000000000260E000-memory.dmp

    Filesize

    248KB

  • memory/2824-145-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/2824-194-0x00000000025D0000-0x000000000260E000-memory.dmp

    Filesize

    248KB

  • memory/2824-196-0x00000000025D0000-0x000000000260E000-memory.dmp

    Filesize

    248KB

  • memory/2824-198-0x00000000025D0000-0x000000000260E000-memory.dmp

    Filesize

    248KB

  • memory/2824-200-0x00000000025D0000-0x000000000260E000-memory.dmp

    Filesize

    248KB

  • memory/2824-202-0x00000000025D0000-0x000000000260E000-memory.dmp

    Filesize

    248KB

  • memory/2824-204-0x00000000025D0000-0x000000000260E000-memory.dmp

    Filesize

    248KB

  • memory/2824-206-0x00000000025D0000-0x000000000260E000-memory.dmp

    Filesize

    248KB

  • memory/2824-208-0x00000000025D0000-0x000000000260E000-memory.dmp

    Filesize

    248KB

  • memory/2824-210-0x00000000025D0000-0x000000000260E000-memory.dmp

    Filesize

    248KB

  • memory/2824-1055-0x0000000005A50000-0x0000000006056000-memory.dmp

    Filesize

    6.0MB

  • memory/2824-1056-0x0000000004DB0000-0x0000000004EBA000-memory.dmp

    Filesize

    1.0MB

  • memory/2824-1057-0x0000000004EE0000-0x0000000004EF2000-memory.dmp

    Filesize

    72KB

  • memory/2824-1058-0x0000000005440000-0x000000000547E000-memory.dmp

    Filesize

    248KB

  • memory/2824-1059-0x0000000005580000-0x00000000055CB000-memory.dmp

    Filesize

    300KB

  • memory/2824-1060-0x0000000004F30000-0x0000000004F40000-memory.dmp

    Filesize

    64KB

  • memory/2824-1063-0x00000000056F0000-0x0000000005756000-memory.dmp

    Filesize

    408KB

  • memory/2824-1064-0x00000000063F0000-0x0000000006482000-memory.dmp

    Filesize

    584KB

  • memory/2824-1065-0x00000000065B0000-0x0000000006772000-memory.dmp

    Filesize

    1.8MB

  • memory/2824-1066-0x0000000006790000-0x0000000006CBC000-memory.dmp

    Filesize

    5.2MB

  • memory/2824-1067-0x0000000004F30000-0x0000000004F40000-memory.dmp

    Filesize

    64KB

  • memory/2824-1068-0x0000000006E00000-0x0000000006E76000-memory.dmp

    Filesize

    472KB

  • memory/2824-1069-0x0000000006E80000-0x0000000006ED0000-memory.dmp

    Filesize

    320KB

  • memory/4212-127-0x0000000004540000-0x00000000045CA000-memory.dmp

    Filesize

    552KB

  • memory/4212-138-0x0000000000400000-0x000000000076F000-memory.dmp

    Filesize

    3.4MB

  • memory/4312-1075-0x0000000000A30000-0x0000000000A62000-memory.dmp

    Filesize

    200KB

  • memory/4312-1076-0x0000000005460000-0x00000000054AB000-memory.dmp

    Filesize

    300KB

  • memory/4312-1077-0x0000000005650000-0x0000000005660000-memory.dmp

    Filesize

    64KB

  • memory/4312-1079-0x0000000005650000-0x0000000005660000-memory.dmp

    Filesize

    64KB