Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 12:10

General

  • Target

    60f45d8ab33b1be493595bb5fb01623931df78dd791fa49dfc434b4f653fedef.exe

  • Size

    686KB

  • MD5

    f9c1d31447ab86ccee167fed18f59f47

  • SHA1

    6fc3e641453ef21be6b1b45eaa5637b5eb650022

  • SHA256

    60f45d8ab33b1be493595bb5fb01623931df78dd791fa49dfc434b4f653fedef

  • SHA512

    61d6fe77ffda97e307c626e13137a6c1f886ca75db102bca399897b319e0c0b7680de136f59324f1ee4417101e244e77e7148f653567120cc7ea6d262eff9107

  • SSDEEP

    12288:/Mr3y90DJOVNaqQgKScO8VSJpYTWGlq8SV7FC3ZIE5Xe+1diij:wyoJOVNaxgTcOGaKTWWqZGZp1di0

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\60f45d8ab33b1be493595bb5fb01623931df78dd791fa49dfc434b4f653fedef.exe
    "C:\Users\Admin\AppData\Local\Temp\60f45d8ab33b1be493595bb5fb01623931df78dd791fa49dfc434b4f653fedef.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4936
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un280087.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un280087.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4964
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3989.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3989.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1936
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1936 -s 1080
          4⤵
          • Program crash
          PID:724
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0070.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0070.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1976
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1976 -s 1476
          4⤵
          • Program crash
          PID:3336
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si890732.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si890732.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2416
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 376 -p 1936 -ip 1936
    1⤵
      PID:4140
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 1976 -ip 1976
      1⤵
        PID:3220

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si890732.exe

        Filesize

        175KB

        MD5

        3a06bde945f200e7d5b877f3bf89e0f6

        SHA1

        73cd7ea05f0fd6eb72b79d9eabf4cc8dbf513b8b

        SHA256

        aa11770acb511e387b80808a4a750fb0e9278cf5b99aca845cd16f4245863eed

        SHA512

        b1e0dae8f5067bf36b2b2bc390c3c755b14112dad6a69b3e78c8f17c4103f0995813866527a99d2c18a49c7ff65d0c9fa235012f6241407bbaedd9ec470c04f8

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si890732.exe

        Filesize

        175KB

        MD5

        3a06bde945f200e7d5b877f3bf89e0f6

        SHA1

        73cd7ea05f0fd6eb72b79d9eabf4cc8dbf513b8b

        SHA256

        aa11770acb511e387b80808a4a750fb0e9278cf5b99aca845cd16f4245863eed

        SHA512

        b1e0dae8f5067bf36b2b2bc390c3c755b14112dad6a69b3e78c8f17c4103f0995813866527a99d2c18a49c7ff65d0c9fa235012f6241407bbaedd9ec470c04f8

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un280087.exe

        Filesize

        545KB

        MD5

        86ab47acae5e7a4365d0895884d1e5e4

        SHA1

        7dece10f74bf9bb62b2a810ad3084086f5e1aafb

        SHA256

        a4933a5e61fcd9bfeefa6cf91b9efcc1f66631ba3c7d692b0e1399f2dd9c18cc

        SHA512

        79b0bb2b63ac7238d830410f62c8771ef1f2682fcb07aeb4ac3ec949c89ede5c170347ef50aac25f76a9161683db5993c4e8d37542494305606186677d4d5f49

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un280087.exe

        Filesize

        545KB

        MD5

        86ab47acae5e7a4365d0895884d1e5e4

        SHA1

        7dece10f74bf9bb62b2a810ad3084086f5e1aafb

        SHA256

        a4933a5e61fcd9bfeefa6cf91b9efcc1f66631ba3c7d692b0e1399f2dd9c18cc

        SHA512

        79b0bb2b63ac7238d830410f62c8771ef1f2682fcb07aeb4ac3ec949c89ede5c170347ef50aac25f76a9161683db5993c4e8d37542494305606186677d4d5f49

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3989.exe

        Filesize

        300KB

        MD5

        3f38f584378fc80b43ace82694cb153f

        SHA1

        6c4b94872c4b0172a0c3d15c76de977c59d767b4

        SHA256

        7d21c338443cdc2f13b9bf0fc1554b83d92a254779171384237017b1298a78ec

        SHA512

        4d6240991c87442216bba73c425dbb787bcebd93b9e6657973e552a5f89dc6ee15a3734349c5b3780af70e402d5ec91a7c5ce89a69b6428ea50a1899da1688a8

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3989.exe

        Filesize

        300KB

        MD5

        3f38f584378fc80b43ace82694cb153f

        SHA1

        6c4b94872c4b0172a0c3d15c76de977c59d767b4

        SHA256

        7d21c338443cdc2f13b9bf0fc1554b83d92a254779171384237017b1298a78ec

        SHA512

        4d6240991c87442216bba73c425dbb787bcebd93b9e6657973e552a5f89dc6ee15a3734349c5b3780af70e402d5ec91a7c5ce89a69b6428ea50a1899da1688a8

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0070.exe

        Filesize

        359KB

        MD5

        8b546194a8249fb52348cbc9fb6c64a6

        SHA1

        e629eeb1d811a64f44110fd58376c8c8e8452af0

        SHA256

        a1d4083a15e584bdda9bfe385f38491ea8072104d7a3c0ea7c9b23df77bbc2ae

        SHA512

        51902b9b3327489d329cacb74874cbc50b589a50de0cb84afb459ef84ca31124be463ec14a44a80904d1f807e550f4f53423b505ca8611d0946f0d3432983020

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0070.exe

        Filesize

        359KB

        MD5

        8b546194a8249fb52348cbc9fb6c64a6

        SHA1

        e629eeb1d811a64f44110fd58376c8c8e8452af0

        SHA256

        a1d4083a15e584bdda9bfe385f38491ea8072104d7a3c0ea7c9b23df77bbc2ae

        SHA512

        51902b9b3327489d329cacb74874cbc50b589a50de0cb84afb459ef84ca31124be463ec14a44a80904d1f807e550f4f53423b505ca8611d0946f0d3432983020

      • memory/1936-148-0x0000000000820000-0x000000000084D000-memory.dmp

        Filesize

        180KB

      • memory/1936-149-0x0000000004F10000-0x00000000054B4000-memory.dmp

        Filesize

        5.6MB

      • memory/1936-150-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1936-151-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1936-153-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1936-155-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1936-157-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1936-159-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1936-161-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1936-163-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1936-165-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1936-167-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1936-169-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1936-171-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1936-173-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1936-175-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1936-177-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1936-178-0x0000000004F00000-0x0000000004F10000-memory.dmp

        Filesize

        64KB

      • memory/1936-179-0x0000000004F00000-0x0000000004F10000-memory.dmp

        Filesize

        64KB

      • memory/1936-180-0x0000000004F00000-0x0000000004F10000-memory.dmp

        Filesize

        64KB

      • memory/1936-181-0x0000000000400000-0x000000000070E000-memory.dmp

        Filesize

        3.1MB

      • memory/1936-183-0x0000000004F00000-0x0000000004F10000-memory.dmp

        Filesize

        64KB

      • memory/1936-184-0x0000000004F00000-0x0000000004F10000-memory.dmp

        Filesize

        64KB

      • memory/1936-185-0x0000000004F00000-0x0000000004F10000-memory.dmp

        Filesize

        64KB

      • memory/1936-186-0x0000000000400000-0x000000000070E000-memory.dmp

        Filesize

        3.1MB

      • memory/1976-191-0x0000000002630000-0x000000000266E000-memory.dmp

        Filesize

        248KB

      • memory/1976-192-0x0000000002630000-0x000000000266E000-memory.dmp

        Filesize

        248KB

      • memory/1976-194-0x0000000002630000-0x000000000266E000-memory.dmp

        Filesize

        248KB

      • memory/1976-196-0x0000000002630000-0x000000000266E000-memory.dmp

        Filesize

        248KB

      • memory/1976-198-0x0000000002630000-0x000000000266E000-memory.dmp

        Filesize

        248KB

      • memory/1976-200-0x0000000002630000-0x000000000266E000-memory.dmp

        Filesize

        248KB

      • memory/1976-202-0x0000000002630000-0x000000000266E000-memory.dmp

        Filesize

        248KB

      • memory/1976-204-0x0000000002630000-0x000000000266E000-memory.dmp

        Filesize

        248KB

      • memory/1976-206-0x0000000002630000-0x000000000266E000-memory.dmp

        Filesize

        248KB

      • memory/1976-208-0x0000000002630000-0x000000000266E000-memory.dmp

        Filesize

        248KB

      • memory/1976-210-0x0000000002630000-0x000000000266E000-memory.dmp

        Filesize

        248KB

      • memory/1976-212-0x0000000002630000-0x000000000266E000-memory.dmp

        Filesize

        248KB

      • memory/1976-214-0x0000000002630000-0x000000000266E000-memory.dmp

        Filesize

        248KB

      • memory/1976-216-0x0000000002630000-0x000000000266E000-memory.dmp

        Filesize

        248KB

      • memory/1976-218-0x0000000002630000-0x000000000266E000-memory.dmp

        Filesize

        248KB

      • memory/1976-220-0x0000000002630000-0x000000000266E000-memory.dmp

        Filesize

        248KB

      • memory/1976-222-0x0000000002630000-0x000000000266E000-memory.dmp

        Filesize

        248KB

      • memory/1976-224-0x0000000002630000-0x000000000266E000-memory.dmp

        Filesize

        248KB

      • memory/1976-328-0x0000000004F70000-0x0000000004F80000-memory.dmp

        Filesize

        64KB

      • memory/1976-326-0x0000000000890000-0x00000000008DB000-memory.dmp

        Filesize

        300KB

      • memory/1976-330-0x0000000004F70000-0x0000000004F80000-memory.dmp

        Filesize

        64KB

      • memory/1976-332-0x0000000004F70000-0x0000000004F80000-memory.dmp

        Filesize

        64KB

      • memory/1976-1101-0x0000000005530000-0x0000000005B48000-memory.dmp

        Filesize

        6.1MB

      • memory/1976-1102-0x0000000004E60000-0x0000000004F6A000-memory.dmp

        Filesize

        1.0MB

      • memory/1976-1103-0x0000000002AC0000-0x0000000002AD2000-memory.dmp

        Filesize

        72KB

      • memory/1976-1104-0x0000000005B50000-0x0000000005B8C000-memory.dmp

        Filesize

        240KB

      • memory/1976-1105-0x0000000004F70000-0x0000000004F80000-memory.dmp

        Filesize

        64KB

      • memory/1976-1106-0x0000000005E10000-0x0000000005EA2000-memory.dmp

        Filesize

        584KB

      • memory/1976-1107-0x0000000005EB0000-0x0000000005F16000-memory.dmp

        Filesize

        408KB

      • memory/1976-1109-0x0000000004F70000-0x0000000004F80000-memory.dmp

        Filesize

        64KB

      • memory/1976-1110-0x0000000004F70000-0x0000000004F80000-memory.dmp

        Filesize

        64KB

      • memory/1976-1111-0x0000000004F70000-0x0000000004F80000-memory.dmp

        Filesize

        64KB

      • memory/1976-1112-0x0000000006950000-0x0000000006B12000-memory.dmp

        Filesize

        1.8MB

      • memory/1976-1113-0x0000000006B30000-0x000000000705C000-memory.dmp

        Filesize

        5.2MB

      • memory/1976-1114-0x0000000004F70000-0x0000000004F80000-memory.dmp

        Filesize

        64KB

      • memory/1976-1115-0x0000000007180000-0x00000000071F6000-memory.dmp

        Filesize

        472KB

      • memory/1976-1116-0x0000000007220000-0x0000000007270000-memory.dmp

        Filesize

        320KB

      • memory/2416-1122-0x0000000000160000-0x0000000000192000-memory.dmp

        Filesize

        200KB

      • memory/2416-1123-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB