Analysis

  • max time kernel
    136s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 12:13

General

  • Target

    5ebc6cb2d0b385361dbc50c6f7d7a719184509aafe3dc1b9bb64a32bb03205f5.exe

  • Size

    687KB

  • MD5

    c6ec905ba1c71b977a22c3025e0842a2

  • SHA1

    a71d870264009e8edba6e7f18b19c25c8e45ec72

  • SHA256

    5ebc6cb2d0b385361dbc50c6f7d7a719184509aafe3dc1b9bb64a32bb03205f5

  • SHA512

    895f297cb9d3ae8194b5480e9c43467414921ce73bd115e978512393e4df195a55ae681bd3e7b14e21c1d3f1c83b70fe8cb887703d3f26fad56a9b8b63f63b0c

  • SSDEEP

    12288:hMrIy90KLv3e45mclNVtUmjO02m2bkc1YUxjIHh/1mzZpb4zMtQT0z:xyz3vrLVtLjO02m8kcU1k/beOQTe

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ebc6cb2d0b385361dbc50c6f7d7a719184509aafe3dc1b9bb64a32bb03205f5.exe
    "C:\Users\Admin\AppData\Local\Temp\5ebc6cb2d0b385361dbc50c6f7d7a719184509aafe3dc1b9bb64a32bb03205f5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5036
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un792463.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un792463.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2940
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3084.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3084.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1308
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1308 -s 1084
          4⤵
          • Program crash
          PID:3484
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5630.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5630.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4404
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 1336
          4⤵
          • Program crash
          PID:4180
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si428465.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si428465.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:528
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1308 -ip 1308
    1⤵
      PID:3900
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4404 -ip 4404
      1⤵
        PID:5112
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:3964

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si428465.exe

        Filesize

        175KB

        MD5

        4f383965057d913fa85fe1ed6bee59b1

        SHA1

        14a7b43713cd9e25b266cb167ddc696114562358

        SHA256

        34e4aaaed06ff40aa87e0c0bb3e447a0912d44fee9f73a30837bf18068f23d58

        SHA512

        6f6203c4cd29d659164b6a999f57b0abea0707de59d2b61bcde9055d5e37ac4e9ea15a2edade3079c7d7a04540110cbd98d889e734cd53d0df4325699f82847d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si428465.exe

        Filesize

        175KB

        MD5

        4f383965057d913fa85fe1ed6bee59b1

        SHA1

        14a7b43713cd9e25b266cb167ddc696114562358

        SHA256

        34e4aaaed06ff40aa87e0c0bb3e447a0912d44fee9f73a30837bf18068f23d58

        SHA512

        6f6203c4cd29d659164b6a999f57b0abea0707de59d2b61bcde9055d5e37ac4e9ea15a2edade3079c7d7a04540110cbd98d889e734cd53d0df4325699f82847d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un792463.exe

        Filesize

        545KB

        MD5

        1331f7933741c53c66a3af5257dda1a2

        SHA1

        eeab97f5d12848d08c28154c94fd6e80ba0f9ab4

        SHA256

        e26e8686690facd86b274bfceb701f064b19152efdba9a8ebb18f8d7aa9785c5

        SHA512

        989e567ee75f780e7fdd996250317928a1d69b8125922e1d5dfb7d0c08615ec8af4bfce281bdc0fe2fc45c067d8a82eb5c098e74c2b60e395026e9d320a196fe

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un792463.exe

        Filesize

        545KB

        MD5

        1331f7933741c53c66a3af5257dda1a2

        SHA1

        eeab97f5d12848d08c28154c94fd6e80ba0f9ab4

        SHA256

        e26e8686690facd86b274bfceb701f064b19152efdba9a8ebb18f8d7aa9785c5

        SHA512

        989e567ee75f780e7fdd996250317928a1d69b8125922e1d5dfb7d0c08615ec8af4bfce281bdc0fe2fc45c067d8a82eb5c098e74c2b60e395026e9d320a196fe

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3084.exe

        Filesize

        300KB

        MD5

        d9e4391f970fa8a9293833a94956feaf

        SHA1

        953cd0c39d84b0ae9c2a88153d9b374621396f35

        SHA256

        183b66e6052acdbf565eef355c792c9c86f8cad428f6a545ef2f63cdb369622c

        SHA512

        4064a2a39aa00d5ec268a996250c7c34efbc840f457e053c445c10ba7bcf85df440609427d641f1fc67772bbb268e8b66e8e46c7b3f01501fc72db072de9620e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3084.exe

        Filesize

        300KB

        MD5

        d9e4391f970fa8a9293833a94956feaf

        SHA1

        953cd0c39d84b0ae9c2a88153d9b374621396f35

        SHA256

        183b66e6052acdbf565eef355c792c9c86f8cad428f6a545ef2f63cdb369622c

        SHA512

        4064a2a39aa00d5ec268a996250c7c34efbc840f457e053c445c10ba7bcf85df440609427d641f1fc67772bbb268e8b66e8e46c7b3f01501fc72db072de9620e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5630.exe

        Filesize

        359KB

        MD5

        41912b623250263dab61236307e8acd1

        SHA1

        808b288533c185b5a68f4b9340b36dbc85d28310

        SHA256

        d44f5a596635d73456e1812c9ffdd518d7b562736bbc1087fca073f9e53b5106

        SHA512

        87325d19a96a3b80decec6584ff37638187465c15cf5ca8c16a42a420d925ef532941a3fc276b545d80069ea5b84284e1f366818828467bdff08a6eda55ab2b5

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5630.exe

        Filesize

        359KB

        MD5

        41912b623250263dab61236307e8acd1

        SHA1

        808b288533c185b5a68f4b9340b36dbc85d28310

        SHA256

        d44f5a596635d73456e1812c9ffdd518d7b562736bbc1087fca073f9e53b5106

        SHA512

        87325d19a96a3b80decec6584ff37638187465c15cf5ca8c16a42a420d925ef532941a3fc276b545d80069ea5b84284e1f366818828467bdff08a6eda55ab2b5

      • memory/528-1119-0x0000000000BA0000-0x0000000000BD2000-memory.dmp

        Filesize

        200KB

      • memory/528-1120-0x0000000005780000-0x0000000005790000-memory.dmp

        Filesize

        64KB

      • memory/1308-159-0x0000000002670000-0x0000000002682000-memory.dmp

        Filesize

        72KB

      • memory/1308-171-0x0000000002670000-0x0000000002682000-memory.dmp

        Filesize

        72KB

      • memory/1308-152-0x0000000002670000-0x0000000002682000-memory.dmp

        Filesize

        72KB

      • memory/1308-153-0x0000000002670000-0x0000000002682000-memory.dmp

        Filesize

        72KB

      • memory/1308-155-0x0000000002670000-0x0000000002682000-memory.dmp

        Filesize

        72KB

      • memory/1308-157-0x0000000002670000-0x0000000002682000-memory.dmp

        Filesize

        72KB

      • memory/1308-150-0x0000000004DF0000-0x0000000004E00000-memory.dmp

        Filesize

        64KB

      • memory/1308-161-0x0000000002670000-0x0000000002682000-memory.dmp

        Filesize

        72KB

      • memory/1308-163-0x0000000002670000-0x0000000002682000-memory.dmp

        Filesize

        72KB

      • memory/1308-165-0x0000000002670000-0x0000000002682000-memory.dmp

        Filesize

        72KB

      • memory/1308-167-0x0000000002670000-0x0000000002682000-memory.dmp

        Filesize

        72KB

      • memory/1308-151-0x0000000004E00000-0x00000000053A4000-memory.dmp

        Filesize

        5.6MB

      • memory/1308-169-0x0000000002670000-0x0000000002682000-memory.dmp

        Filesize

        72KB

      • memory/1308-175-0x0000000002670000-0x0000000002682000-memory.dmp

        Filesize

        72KB

      • memory/1308-173-0x0000000002670000-0x0000000002682000-memory.dmp

        Filesize

        72KB

      • memory/1308-177-0x0000000002670000-0x0000000002682000-memory.dmp

        Filesize

        72KB

      • memory/1308-179-0x0000000002670000-0x0000000002682000-memory.dmp

        Filesize

        72KB

      • memory/1308-180-0x0000000000400000-0x000000000070E000-memory.dmp

        Filesize

        3.1MB

      • memory/1308-181-0x0000000004DF0000-0x0000000004E00000-memory.dmp

        Filesize

        64KB

      • memory/1308-183-0x0000000000400000-0x000000000070E000-memory.dmp

        Filesize

        3.1MB

      • memory/1308-149-0x0000000004DF0000-0x0000000004E00000-memory.dmp

        Filesize

        64KB

      • memory/1308-148-0x0000000000860000-0x000000000088D000-memory.dmp

        Filesize

        180KB

      • memory/4404-195-0x0000000004D40000-0x0000000004D50000-memory.dmp

        Filesize

        64KB

      • memory/4404-225-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4404-192-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4404-196-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4404-197-0x0000000004D40000-0x0000000004D50000-memory.dmp

        Filesize

        64KB

      • memory/4404-199-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4404-193-0x0000000004D40000-0x0000000004D50000-memory.dmp

        Filesize

        64KB

      • memory/4404-201-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4404-203-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4404-205-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4404-207-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4404-209-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4404-211-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4404-213-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4404-215-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4404-217-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4404-219-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4404-221-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4404-223-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4404-191-0x0000000002220000-0x000000000226B000-memory.dmp

        Filesize

        300KB

      • memory/4404-1098-0x0000000005460000-0x0000000005A78000-memory.dmp

        Filesize

        6.1MB

      • memory/4404-1099-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/4404-1100-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/4404-1101-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/4404-1102-0x0000000004D40000-0x0000000004D50000-memory.dmp

        Filesize

        64KB

      • memory/4404-1103-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/4404-1104-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/4404-1106-0x0000000004D40000-0x0000000004D50000-memory.dmp

        Filesize

        64KB

      • memory/4404-1107-0x0000000004D40000-0x0000000004D50000-memory.dmp

        Filesize

        64KB

      • memory/4404-1108-0x0000000004D40000-0x0000000004D50000-memory.dmp

        Filesize

        64KB

      • memory/4404-1109-0x0000000004D40000-0x0000000004D50000-memory.dmp

        Filesize

        64KB

      • memory/4404-1110-0x0000000006A90000-0x0000000006B06000-memory.dmp

        Filesize

        472KB

      • memory/4404-1111-0x0000000006B30000-0x0000000006B80000-memory.dmp

        Filesize

        320KB

      • memory/4404-189-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4404-188-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4404-1112-0x0000000006BB0000-0x0000000006D72000-memory.dmp

        Filesize

        1.8MB

      • memory/4404-1113-0x0000000006D80000-0x00000000072AC000-memory.dmp

        Filesize

        5.2MB