Analysis

  • max time kernel
    135s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 13:00

General

  • Target

    7d93fc17c6699238382528523dd494ff4175a925855c6d8d7e10c64b9ce2d025.exe

  • Size

    686KB

  • MD5

    f0ccee12b50404dcd2100c5cc058af85

  • SHA1

    c7058da805b56b194f5f5261ac2f4ff28f031270

  • SHA256

    7d93fc17c6699238382528523dd494ff4175a925855c6d8d7e10c64b9ce2d025

  • SHA512

    52cb6778e83e8dde3330799263d94104a286099eee2b19f7706c24aea59eedf4a0724feacc6ce56884edb007934270b7325a997ff599d5b0a3ea22144dfaeaee

  • SSDEEP

    12288:WMrGy90Y/GCBVBZGDke80P0n3Ewx8npkJAvIbfdwTCKSIKl1IvuH/xL:8y7+CHBZkke80PUEweIbiXi+KxL

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d93fc17c6699238382528523dd494ff4175a925855c6d8d7e10c64b9ce2d025.exe
    "C:\Users\Admin\AppData\Local\Temp\7d93fc17c6699238382528523dd494ff4175a925855c6d8d7e10c64b9ce2d025.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1264
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un595465.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un595465.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1188
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9978.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9978.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:880
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 880 -s 1052
          4⤵
          • Program crash
          PID:3028
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0169.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0169.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4928
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4928 -s 1328
          4⤵
          • Program crash
          PID:972
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si310845.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si310845.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4608
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 880 -ip 880
    1⤵
      PID:4944
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4928 -ip 4928
      1⤵
        PID:4476
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:452

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si310845.exe

        Filesize

        175KB

        MD5

        5c24eb9d8b78d752b6347fb2d8b1c624

        SHA1

        dfd6e595815fe207556fe6116b2cfff64e986148

        SHA256

        3081ae9eeabb12c1550d1830f780ed4f4c9a159dd2988e26d084c3662f48d4fb

        SHA512

        e1a65ec72d48a2128b48f02e8fd76adc8d82863c1d59986a2bd897d63aee1be940818c5e35ac5bf50d64c3ad622dbe23bf0934d5758e5337aa7810301b7111f0

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si310845.exe

        Filesize

        175KB

        MD5

        5c24eb9d8b78d752b6347fb2d8b1c624

        SHA1

        dfd6e595815fe207556fe6116b2cfff64e986148

        SHA256

        3081ae9eeabb12c1550d1830f780ed4f4c9a159dd2988e26d084c3662f48d4fb

        SHA512

        e1a65ec72d48a2128b48f02e8fd76adc8d82863c1d59986a2bd897d63aee1be940818c5e35ac5bf50d64c3ad622dbe23bf0934d5758e5337aa7810301b7111f0

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un595465.exe

        Filesize

        544KB

        MD5

        917ac50a568432db0de46d462f9030c0

        SHA1

        aa48eaed6b536dfce28212bfa1e8b378872f93e2

        SHA256

        d75f6918e8c1acb3e07978f098007bb16488dd64e6616dcf67a45e57b69b6b24

        SHA512

        da6cd0ac58ba1017108b3475bf391303bd2eb84c343de69473bdaf829a6f302504f631f133198c09aa42e2f679fa85794bd134f7a459053737fe5b653cfc50e9

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un595465.exe

        Filesize

        544KB

        MD5

        917ac50a568432db0de46d462f9030c0

        SHA1

        aa48eaed6b536dfce28212bfa1e8b378872f93e2

        SHA256

        d75f6918e8c1acb3e07978f098007bb16488dd64e6616dcf67a45e57b69b6b24

        SHA512

        da6cd0ac58ba1017108b3475bf391303bd2eb84c343de69473bdaf829a6f302504f631f133198c09aa42e2f679fa85794bd134f7a459053737fe5b653cfc50e9

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9978.exe

        Filesize

        292KB

        MD5

        aa1471d97ca29e7fb4ca19dd5c218443

        SHA1

        13329c7580a4e493d8b82a40a1d7142aac40c76a

        SHA256

        ed4b0120eeaed5f32668fc3f5ceebed8b6dac020c33e21699dd91e78313abab4

        SHA512

        aa8e77c5b2f2dd7e15aa1b7cf212ab16c6f024e55f5bdff3dad19d8850eadd9a86b713d4a36134493982a69fabff41dbe25f2cf68ca1829fe245f71a5f3aa805

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9978.exe

        Filesize

        292KB

        MD5

        aa1471d97ca29e7fb4ca19dd5c218443

        SHA1

        13329c7580a4e493d8b82a40a1d7142aac40c76a

        SHA256

        ed4b0120eeaed5f32668fc3f5ceebed8b6dac020c33e21699dd91e78313abab4

        SHA512

        aa8e77c5b2f2dd7e15aa1b7cf212ab16c6f024e55f5bdff3dad19d8850eadd9a86b713d4a36134493982a69fabff41dbe25f2cf68ca1829fe245f71a5f3aa805

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0169.exe

        Filesize

        350KB

        MD5

        17ed23da1d5d1c8ccd1b59c183e599b3

        SHA1

        77423416f9ed5ad2f93ca92107e98f73423084fa

        SHA256

        c4273def4cd92fd28dbb4ca5739be2eadb66c94e7d447dd71d70564c71c8bfe4

        SHA512

        bd1c09082cbd16bd9685364177e56d0eb754d4bcc2ecdfe30587594fccd478f247cedd7cc7508ebe16441938b29f72ed5f3aaa182143ead326027fc46c042df3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0169.exe

        Filesize

        350KB

        MD5

        17ed23da1d5d1c8ccd1b59c183e599b3

        SHA1

        77423416f9ed5ad2f93ca92107e98f73423084fa

        SHA256

        c4273def4cd92fd28dbb4ca5739be2eadb66c94e7d447dd71d70564c71c8bfe4

        SHA512

        bd1c09082cbd16bd9685364177e56d0eb754d4bcc2ecdfe30587594fccd478f247cedd7cc7508ebe16441938b29f72ed5f3aaa182143ead326027fc46c042df3

      • memory/880-148-0x0000000000860000-0x000000000088D000-memory.dmp

        Filesize

        180KB

      • memory/880-149-0x0000000004DD0000-0x0000000005374000-memory.dmp

        Filesize

        5.6MB

      • memory/880-150-0x0000000002770000-0x0000000002782000-memory.dmp

        Filesize

        72KB

      • memory/880-151-0x0000000002770000-0x0000000002782000-memory.dmp

        Filesize

        72KB

      • memory/880-153-0x0000000002770000-0x0000000002782000-memory.dmp

        Filesize

        72KB

      • memory/880-155-0x0000000002770000-0x0000000002782000-memory.dmp

        Filesize

        72KB

      • memory/880-157-0x0000000002770000-0x0000000002782000-memory.dmp

        Filesize

        72KB

      • memory/880-159-0x0000000002770000-0x0000000002782000-memory.dmp

        Filesize

        72KB

      • memory/880-161-0x0000000002770000-0x0000000002782000-memory.dmp

        Filesize

        72KB

      • memory/880-163-0x0000000002770000-0x0000000002782000-memory.dmp

        Filesize

        72KB

      • memory/880-165-0x0000000002770000-0x0000000002782000-memory.dmp

        Filesize

        72KB

      • memory/880-167-0x0000000002770000-0x0000000002782000-memory.dmp

        Filesize

        72KB

      • memory/880-169-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

        Filesize

        64KB

      • memory/880-170-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

        Filesize

        64KB

      • memory/880-173-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

        Filesize

        64KB

      • memory/880-171-0x0000000002770000-0x0000000002782000-memory.dmp

        Filesize

        72KB

      • memory/880-176-0x0000000002770000-0x0000000002782000-memory.dmp

        Filesize

        72KB

      • memory/880-174-0x0000000002770000-0x0000000002782000-memory.dmp

        Filesize

        72KB

      • memory/880-178-0x0000000002770000-0x0000000002782000-memory.dmp

        Filesize

        72KB

      • memory/880-180-0x0000000002770000-0x0000000002782000-memory.dmp

        Filesize

        72KB

      • memory/880-181-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/880-184-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

        Filesize

        64KB

      • memory/880-183-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

        Filesize

        64KB

      • memory/880-185-0x0000000004DC0000-0x0000000004DD0000-memory.dmp

        Filesize

        64KB

      • memory/880-186-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/4608-1122-0x0000000000180000-0x00000000001B2000-memory.dmp

        Filesize

        200KB

      • memory/4608-1123-0x0000000004D40000-0x0000000004D50000-memory.dmp

        Filesize

        64KB

      • memory/4928-191-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4928-226-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4928-196-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4928-198-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4928-200-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4928-202-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4928-206-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4928-204-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4928-208-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4928-210-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4928-212-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4928-214-0x00000000008C0000-0x000000000090B000-memory.dmp

        Filesize

        300KB

      • memory/4928-216-0x0000000002530000-0x0000000002540000-memory.dmp

        Filesize

        64KB

      • memory/4928-219-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4928-222-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4928-218-0x0000000002530000-0x0000000002540000-memory.dmp

        Filesize

        64KB

      • memory/4928-215-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4928-221-0x0000000002530000-0x0000000002540000-memory.dmp

        Filesize

        64KB

      • memory/4928-224-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4928-194-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4928-228-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4928-1101-0x0000000005330000-0x0000000005948000-memory.dmp

        Filesize

        6.1MB

      • memory/4928-1102-0x00000000059C0000-0x0000000005ACA000-memory.dmp

        Filesize

        1.0MB

      • memory/4928-1103-0x0000000005B00000-0x0000000005B12000-memory.dmp

        Filesize

        72KB

      • memory/4928-1104-0x0000000005B20000-0x0000000005B5C000-memory.dmp

        Filesize

        240KB

      • memory/4928-1105-0x0000000002530000-0x0000000002540000-memory.dmp

        Filesize

        64KB

      • memory/4928-1106-0x0000000005E10000-0x0000000005E76000-memory.dmp

        Filesize

        408KB

      • memory/4928-1107-0x00000000064D0000-0x0000000006562000-memory.dmp

        Filesize

        584KB

      • memory/4928-1108-0x00000000065E0000-0x00000000067A2000-memory.dmp

        Filesize

        1.8MB

      • memory/4928-1110-0x00000000067B0000-0x0000000006CDC000-memory.dmp

        Filesize

        5.2MB

      • memory/4928-1111-0x0000000002530000-0x0000000002540000-memory.dmp

        Filesize

        64KB

      • memory/4928-1112-0x0000000002530000-0x0000000002540000-memory.dmp

        Filesize

        64KB

      • memory/4928-1113-0x0000000002530000-0x0000000002540000-memory.dmp

        Filesize

        64KB

      • memory/4928-192-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4928-1114-0x0000000006F10000-0x0000000006F86000-memory.dmp

        Filesize

        472KB

      • memory/4928-1115-0x0000000006F90000-0x0000000006FE0000-memory.dmp

        Filesize

        320KB

      • memory/4928-1116-0x0000000002530000-0x0000000002540000-memory.dmp

        Filesize

        64KB