Analysis

  • max time kernel
    87s
  • max time network
    89s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 12:56

General

  • Target

    73f03d463cfb66e29fc11580cf73e8045d95bfeb743cfc3af1a487b1e1547f39.exe

  • Size

    686KB

  • MD5

    feb27cf49245d248c02879fc946a4f19

  • SHA1

    dc68c072e76e4769948aa3b1862ddf4f6b9fcb7c

  • SHA256

    73f03d463cfb66e29fc11580cf73e8045d95bfeb743cfc3af1a487b1e1547f39

  • SHA512

    b8074597e6992fd440ffd4e42efd84de78f1f1f5e6de60ea8b2b19a05da2318fe5055a061b6987e2cf04275f58e268be7c68d7e83b8c783869e43b20db52c64b

  • SSDEEP

    12288:LMrQy90rGly54+Jw5Xg91sCCTXpEZB57W3mt3+7rsFFt+Z0QkAA/FYNhn:zy85BSXRCCTZEZB5C3mt3+0A+QkAyuNd

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 23 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73f03d463cfb66e29fc11580cf73e8045d95bfeb743cfc3af1a487b1e1547f39.exe
    "C:\Users\Admin\AppData\Local\Temp\73f03d463cfb66e29fc11580cf73e8045d95bfeb743cfc3af1a487b1e1547f39.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un612544.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un612544.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1008
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1877.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1877.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4252
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0314.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0314.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3724
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si981521.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si981521.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4620

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si981521.exe

    Filesize

    175KB

    MD5

    bbc3fb1ca4b5adf92484cc69ecc02597

    SHA1

    ef6dfb7da96327052ad13aa9c023ff2f4b3c55fc

    SHA256

    f861e5635dd99b5a1a75ecefc26f0812f670f3c18396dc8e784cce4fedb1f7a7

    SHA512

    1c8025cafc50cd8ff71ca226697f2f9e0a1fa14c514728240062f8bb3979595841a176ca7495b63607238250f7b799f02c8214fd698129d74ccc22676ccd7fa9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si981521.exe

    Filesize

    175KB

    MD5

    bbc3fb1ca4b5adf92484cc69ecc02597

    SHA1

    ef6dfb7da96327052ad13aa9c023ff2f4b3c55fc

    SHA256

    f861e5635dd99b5a1a75ecefc26f0812f670f3c18396dc8e784cce4fedb1f7a7

    SHA512

    1c8025cafc50cd8ff71ca226697f2f9e0a1fa14c514728240062f8bb3979595841a176ca7495b63607238250f7b799f02c8214fd698129d74ccc22676ccd7fa9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un612544.exe

    Filesize

    544KB

    MD5

    993577e1c60514d4484ad11645e718b8

    SHA1

    d958128dd484540d0030ec34078c254acd6b22d4

    SHA256

    4bd7b37321440b5f13cafd5938ce1e1821b2fb87f78977097bfcc99472de0f3b

    SHA512

    5c2b995da9a452bc8cdb7a5bdd1996c56a5a8ef535243b52c76532ba609b9a1e3dfb16ce8075c2ea58dd82633907a4004300359fc2b3991dcfaa1a63d01132f0

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un612544.exe

    Filesize

    544KB

    MD5

    993577e1c60514d4484ad11645e718b8

    SHA1

    d958128dd484540d0030ec34078c254acd6b22d4

    SHA256

    4bd7b37321440b5f13cafd5938ce1e1821b2fb87f78977097bfcc99472de0f3b

    SHA512

    5c2b995da9a452bc8cdb7a5bdd1996c56a5a8ef535243b52c76532ba609b9a1e3dfb16ce8075c2ea58dd82633907a4004300359fc2b3991dcfaa1a63d01132f0

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1877.exe

    Filesize

    300KB

    MD5

    e23ccbaf0bd92dc864fb009a7875842a

    SHA1

    6f02f70b000cdb68231c9a1e11f4186af8d691c8

    SHA256

    343e5a2ba93ef14de3afcd6e260bf71a5fa8113f7461f9b1bbd2b76f885820a4

    SHA512

    00988406a9641a52234b050389a9d6570824aa2306daa5e3895dafbe03bfec8a0c2d90b12d073b10cd6dbaeb9eb77c85bac6acf25f0fd6d21be0dc3bed5f608f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1877.exe

    Filesize

    300KB

    MD5

    e23ccbaf0bd92dc864fb009a7875842a

    SHA1

    6f02f70b000cdb68231c9a1e11f4186af8d691c8

    SHA256

    343e5a2ba93ef14de3afcd6e260bf71a5fa8113f7461f9b1bbd2b76f885820a4

    SHA512

    00988406a9641a52234b050389a9d6570824aa2306daa5e3895dafbe03bfec8a0c2d90b12d073b10cd6dbaeb9eb77c85bac6acf25f0fd6d21be0dc3bed5f608f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0314.exe

    Filesize

    359KB

    MD5

    269464ef78a2197800e1dd1cc2659599

    SHA1

    d2b96fdd99cb6f022dff1b7be7bb2279eaea7067

    SHA256

    a63a5db87e9bc20a4222340c1dfc74fed929ca538d52620b854bc79a64a46c97

    SHA512

    42cd2516032cb4c7ceecf61e6615858fb6dc6b59bac074bf474492cea111f58fda49b7712b7ecfac55a12390f3c952500e5902f7074414ca10a8915de6da88fb

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0314.exe

    Filesize

    359KB

    MD5

    269464ef78a2197800e1dd1cc2659599

    SHA1

    d2b96fdd99cb6f022dff1b7be7bb2279eaea7067

    SHA256

    a63a5db87e9bc20a4222340c1dfc74fed929ca538d52620b854bc79a64a46c97

    SHA512

    42cd2516032cb4c7ceecf61e6615858fb6dc6b59bac074bf474492cea111f58fda49b7712b7ecfac55a12390f3c952500e5902f7074414ca10a8915de6da88fb

  • memory/3724-1091-0x0000000004D90000-0x0000000004DA0000-memory.dmp

    Filesize

    64KB

  • memory/3724-1092-0x0000000005B60000-0x0000000005B9E000-memory.dmp

    Filesize

    248KB

  • memory/3724-1104-0x0000000007230000-0x0000000007280000-memory.dmp

    Filesize

    320KB

  • memory/3724-1103-0x00000000071A0000-0x0000000007216000-memory.dmp

    Filesize

    472KB

  • memory/3724-1102-0x0000000004D90000-0x0000000004DA0000-memory.dmp

    Filesize

    64KB

  • memory/3724-1101-0x0000000006A00000-0x0000000006F2C000-memory.dmp

    Filesize

    5.2MB

  • memory/3724-1100-0x0000000006830000-0x00000000069F2000-memory.dmp

    Filesize

    1.8MB

  • memory/3724-1099-0x0000000004D90000-0x0000000004DA0000-memory.dmp

    Filesize

    64KB

  • memory/3724-1098-0x0000000004D90000-0x0000000004DA0000-memory.dmp

    Filesize

    64KB

  • memory/3724-1097-0x0000000004D90000-0x0000000004DA0000-memory.dmp

    Filesize

    64KB

  • memory/3724-1095-0x0000000006530000-0x00000000065C2000-memory.dmp

    Filesize

    584KB

  • memory/3724-1094-0x0000000005E40000-0x0000000005EA6000-memory.dmp

    Filesize

    408KB

  • memory/3724-1093-0x0000000005CB0000-0x0000000005CFB000-memory.dmp

    Filesize

    300KB

  • memory/3724-195-0x0000000002720000-0x000000000275E000-memory.dmp

    Filesize

    248KB

  • memory/3724-1090-0x0000000005B40000-0x0000000005B52000-memory.dmp

    Filesize

    72KB

  • memory/3724-1089-0x0000000005A00000-0x0000000005B0A000-memory.dmp

    Filesize

    1.0MB

  • memory/3724-1088-0x00000000053A0000-0x00000000059A6000-memory.dmp

    Filesize

    6.0MB

  • memory/3724-215-0x0000000002720000-0x000000000275E000-memory.dmp

    Filesize

    248KB

  • memory/3724-213-0x0000000002720000-0x000000000275E000-memory.dmp

    Filesize

    248KB

  • memory/3724-211-0x0000000002720000-0x000000000275E000-memory.dmp

    Filesize

    248KB

  • memory/3724-209-0x0000000002720000-0x000000000275E000-memory.dmp

    Filesize

    248KB

  • memory/3724-207-0x0000000002720000-0x000000000275E000-memory.dmp

    Filesize

    248KB

  • memory/3724-176-0x0000000002540000-0x0000000002586000-memory.dmp

    Filesize

    280KB

  • memory/3724-177-0x0000000002720000-0x0000000002764000-memory.dmp

    Filesize

    272KB

  • memory/3724-197-0x0000000002720000-0x000000000275E000-memory.dmp

    Filesize

    248KB

  • memory/3724-178-0x0000000002720000-0x000000000275E000-memory.dmp

    Filesize

    248KB

  • memory/3724-181-0x0000000002720000-0x000000000275E000-memory.dmp

    Filesize

    248KB

  • memory/3724-183-0x0000000002720000-0x000000000275E000-memory.dmp

    Filesize

    248KB

  • memory/3724-185-0x0000000002720000-0x000000000275E000-memory.dmp

    Filesize

    248KB

  • memory/3724-187-0x0000000002720000-0x000000000275E000-memory.dmp

    Filesize

    248KB

  • memory/3724-189-0x0000000002720000-0x000000000275E000-memory.dmp

    Filesize

    248KB

  • memory/3724-191-0x0000000002720000-0x000000000275E000-memory.dmp

    Filesize

    248KB

  • memory/3724-203-0x0000000004D90000-0x0000000004DA0000-memory.dmp

    Filesize

    64KB

  • memory/3724-193-0x0000000002720000-0x000000000275E000-memory.dmp

    Filesize

    248KB

  • memory/3724-179-0x0000000002720000-0x000000000275E000-memory.dmp

    Filesize

    248KB

  • memory/3724-200-0x00000000020B0000-0x00000000020FB000-memory.dmp

    Filesize

    300KB

  • memory/3724-199-0x0000000002720000-0x000000000275E000-memory.dmp

    Filesize

    248KB

  • memory/3724-202-0x0000000004D90000-0x0000000004DA0000-memory.dmp

    Filesize

    64KB

  • memory/3724-205-0x0000000004D90000-0x0000000004DA0000-memory.dmp

    Filesize

    64KB

  • memory/3724-204-0x0000000002720000-0x000000000275E000-memory.dmp

    Filesize

    248KB

  • memory/4252-171-0x0000000000400000-0x000000000070E000-memory.dmp

    Filesize

    3.1MB

  • memory/4252-143-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4252-139-0x0000000004DF0000-0x0000000004E00000-memory.dmp

    Filesize

    64KB

  • memory/4252-153-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4252-169-0x0000000004DF0000-0x0000000004E00000-memory.dmp

    Filesize

    64KB

  • memory/4252-168-0x0000000000400000-0x000000000070E000-memory.dmp

    Filesize

    3.1MB

  • memory/4252-167-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4252-165-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4252-163-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4252-136-0x00000000026E0000-0x00000000026F8000-memory.dmp

    Filesize

    96KB

  • memory/4252-151-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4252-159-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4252-157-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4252-137-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4252-145-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4252-138-0x0000000004DF0000-0x0000000004E00000-memory.dmp

    Filesize

    64KB

  • memory/4252-149-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4252-147-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4252-161-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4252-155-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4252-141-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4252-140-0x00000000026E0000-0x00000000026F2000-memory.dmp

    Filesize

    72KB

  • memory/4252-135-0x0000000004E00000-0x00000000052FE000-memory.dmp

    Filesize

    5.0MB

  • memory/4252-134-0x0000000000AC0000-0x0000000000ADA000-memory.dmp

    Filesize

    104KB

  • memory/4620-1110-0x0000000000660000-0x0000000000692000-memory.dmp

    Filesize

    200KB

  • memory/4620-1111-0x00000000050A0000-0x00000000050EB000-memory.dmp

    Filesize

    300KB

  • memory/4620-1112-0x0000000004EF0000-0x0000000004F00000-memory.dmp

    Filesize

    64KB

  • memory/4620-1113-0x0000000004EF0000-0x0000000004F00000-memory.dmp

    Filesize

    64KB