Analysis

  • max time kernel
    68s
  • max time network
    131s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 12:24

General

  • Target

    f0425b5dae143571aab33f7105417961b0bd9d1edc365912ef94461a0866def5.exe

  • Size

    687KB

  • MD5

    a2ab38f4605d255a20041b5faec7117e

  • SHA1

    d7081177a288ed81fd6d2b86e3450a343b63694d

  • SHA256

    f0425b5dae143571aab33f7105417961b0bd9d1edc365912ef94461a0866def5

  • SHA512

    5ca776358fe57f3fe5d199d72b7c3725376124c0bebd11b67485be9ad2f5b794eef183410ae20acf620cbc58811000a01a4845796cb64dc557200dbeec29ccb4

  • SSDEEP

    12288:EMrOy90IagEL1XKhxOJYoI+KZ0a80bgxaIy7:yyqL1XKhxOJYo0+a8I2BK

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0425b5dae143571aab33f7105417961b0bd9d1edc365912ef94461a0866def5.exe
    "C:\Users\Admin\AppData\Local\Temp\f0425b5dae143571aab33f7105417961b0bd9d1edc365912ef94461a0866def5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1560
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un165951.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un165951.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2272
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7095.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7095.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2624
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2058.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2058.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2540
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si410725.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si410725.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3736

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si410725.exe

    Filesize

    175KB

    MD5

    e4626d75594951a61300a5791ba4b3f6

    SHA1

    ad4ed854ba801a3a47db2186c719e526ddaf3ef4

    SHA256

    d730088a46e6cf19b1ae4c267422fd1c6a131641d0731153d75390a3f2276911

    SHA512

    bf8881d8a11cef1d0361a4edb08302cdcc0be76fc8d4ecf26cfadcfac4cfcf146cddae93476b7d3a2712a1d79435480ceb36cc56d31c393d48239030d6de61bd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si410725.exe

    Filesize

    175KB

    MD5

    e4626d75594951a61300a5791ba4b3f6

    SHA1

    ad4ed854ba801a3a47db2186c719e526ddaf3ef4

    SHA256

    d730088a46e6cf19b1ae4c267422fd1c6a131641d0731153d75390a3f2276911

    SHA512

    bf8881d8a11cef1d0361a4edb08302cdcc0be76fc8d4ecf26cfadcfac4cfcf146cddae93476b7d3a2712a1d79435480ceb36cc56d31c393d48239030d6de61bd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un165951.exe

    Filesize

    545KB

    MD5

    3455529c98efd5280939fb15aab61b86

    SHA1

    8b62d13db657f31f86e0c5260ad0a5a508c69201

    SHA256

    d1fcd8a6159af8add2ba41ee277577371b6e44a8e38f91e9a47ef89ec0d23fbc

    SHA512

    241d78121b4cdf7fcfd5b484393b032a8ee1c6d50d81b17fc1d6a925c1e1aedd6757baf48a97507c284f9bf864e59f575d118b483a7f9a09f59dfdf05e3528e3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un165951.exe

    Filesize

    545KB

    MD5

    3455529c98efd5280939fb15aab61b86

    SHA1

    8b62d13db657f31f86e0c5260ad0a5a508c69201

    SHA256

    d1fcd8a6159af8add2ba41ee277577371b6e44a8e38f91e9a47ef89ec0d23fbc

    SHA512

    241d78121b4cdf7fcfd5b484393b032a8ee1c6d50d81b17fc1d6a925c1e1aedd6757baf48a97507c284f9bf864e59f575d118b483a7f9a09f59dfdf05e3528e3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7095.exe

    Filesize

    300KB

    MD5

    7c88e609d3b2ff9a0dab3a7df18d0b4f

    SHA1

    98ee7f83b3ba49b8c4f2802c51457044ce0bef5f

    SHA256

    0bdaff475b7cb1ae6ae9cb9efdf63b5339ae68d0e7f525fd5afc32d7c3ea03cb

    SHA512

    d456ae23e9d2ef34a9916905ec7160a54754b1d3984f8d647232e88c37bab7d92afd94f9d44fb7ff39b57892156710cf9caa210b02750a63a98f79cae39686b8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7095.exe

    Filesize

    300KB

    MD5

    7c88e609d3b2ff9a0dab3a7df18d0b4f

    SHA1

    98ee7f83b3ba49b8c4f2802c51457044ce0bef5f

    SHA256

    0bdaff475b7cb1ae6ae9cb9efdf63b5339ae68d0e7f525fd5afc32d7c3ea03cb

    SHA512

    d456ae23e9d2ef34a9916905ec7160a54754b1d3984f8d647232e88c37bab7d92afd94f9d44fb7ff39b57892156710cf9caa210b02750a63a98f79cae39686b8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2058.exe

    Filesize

    359KB

    MD5

    9151fa81d2d47cb87244be30feef015c

    SHA1

    f4117bd5bca74faa1deaef3dcbff4d8ce8ac6298

    SHA256

    cd2756de60cddf717c54958890588c982078b1afa92b58e02d0c250448ea4347

    SHA512

    5b1d81b8bba6bdd84be9d4046cad9ec1845f1682930c0ed2d267e0b0f1a2b952890fe76b45fe5ea1081ab8ea31e07f8a2a8f28fa4a0a2d1973fd21a8b3c84df4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2058.exe

    Filesize

    359KB

    MD5

    9151fa81d2d47cb87244be30feef015c

    SHA1

    f4117bd5bca74faa1deaef3dcbff4d8ce8ac6298

    SHA256

    cd2756de60cddf717c54958890588c982078b1afa92b58e02d0c250448ea4347

    SHA512

    5b1d81b8bba6bdd84be9d4046cad9ec1845f1682930c0ed2d267e0b0f1a2b952890fe76b45fe5ea1081ab8ea31e07f8a2a8f28fa4a0a2d1973fd21a8b3c84df4

  • memory/2540-1093-0x00000000058C0000-0x00000000059CA000-memory.dmp

    Filesize

    1.0MB

  • memory/2540-1092-0x0000000005230000-0x0000000005836000-memory.dmp

    Filesize

    6.0MB

  • memory/2540-194-0x0000000004C60000-0x0000000004C70000-memory.dmp

    Filesize

    64KB

  • memory/2540-1108-0x0000000004C60000-0x0000000004C70000-memory.dmp

    Filesize

    64KB

  • memory/2540-1107-0x0000000006AF0000-0x000000000701C000-memory.dmp

    Filesize

    5.2MB

  • memory/2540-197-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/2540-1106-0x0000000006920000-0x0000000006AE2000-memory.dmp

    Filesize

    1.8MB

  • memory/2540-1105-0x0000000006510000-0x0000000006560000-memory.dmp

    Filesize

    320KB

  • memory/2540-1104-0x0000000006480000-0x00000000064F6000-memory.dmp

    Filesize

    472KB

  • memory/2540-190-0x0000000004C60000-0x0000000004C70000-memory.dmp

    Filesize

    64KB

  • memory/2540-1103-0x0000000004C60000-0x0000000004C70000-memory.dmp

    Filesize

    64KB

  • memory/2540-1102-0x0000000004C60000-0x0000000004C70000-memory.dmp

    Filesize

    64KB

  • memory/2540-1101-0x0000000004C60000-0x0000000004C70000-memory.dmp

    Filesize

    64KB

  • memory/2540-1100-0x0000000005DA0000-0x0000000005E06000-memory.dmp

    Filesize

    408KB

  • memory/2540-1099-0x0000000005D00000-0x0000000005D92000-memory.dmp

    Filesize

    584KB

  • memory/2540-1097-0x0000000005B70000-0x0000000005BBB000-memory.dmp

    Filesize

    300KB

  • memory/2540-1096-0x0000000005A20000-0x0000000005A5E000-memory.dmp

    Filesize

    248KB

  • memory/2540-1095-0x0000000004C60000-0x0000000004C70000-memory.dmp

    Filesize

    64KB

  • memory/2540-1094-0x0000000005A00000-0x0000000005A12000-memory.dmp

    Filesize

    72KB

  • memory/2540-205-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/2540-219-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/2540-217-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/2540-215-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/2540-213-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/2540-180-0x0000000004C20000-0x0000000004C66000-memory.dmp

    Filesize

    280KB

  • memory/2540-181-0x00000000051B0000-0x00000000051F4000-memory.dmp

    Filesize

    272KB

  • memory/2540-182-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/2540-183-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/2540-185-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/2540-188-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/2540-187-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/2540-191-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/2540-192-0x0000000004C60000-0x0000000004C70000-memory.dmp

    Filesize

    64KB

  • memory/2540-195-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/2540-211-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/2540-209-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/2540-207-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/2540-199-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/2540-201-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/2540-203-0x00000000051B0000-0x00000000051EE000-memory.dmp

    Filesize

    248KB

  • memory/2624-171-0x0000000000400000-0x000000000070E000-memory.dmp

    Filesize

    3.1MB

  • memory/2624-154-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2624-146-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2624-136-0x0000000000B90000-0x0000000000BAA000-memory.dmp

    Filesize

    104KB

  • memory/2624-140-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

    Filesize

    64KB

  • memory/2624-139-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2624-175-0x0000000000400000-0x000000000070E000-memory.dmp

    Filesize

    3.1MB

  • memory/2624-173-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

    Filesize

    64KB

  • memory/2624-172-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

    Filesize

    64KB

  • memory/2624-138-0x00000000026D0000-0x00000000026E8000-memory.dmp

    Filesize

    96KB

  • memory/2624-141-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

    Filesize

    64KB

  • memory/2624-170-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2624-168-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2624-166-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2624-164-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2624-162-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2624-160-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2624-158-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2624-156-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2624-152-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2624-150-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2624-148-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2624-144-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2624-143-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2624-137-0x0000000004FF0000-0x00000000054EE000-memory.dmp

    Filesize

    5.0MB

  • memory/2624-142-0x0000000004FE0000-0x0000000004FF0000-memory.dmp

    Filesize

    64KB

  • memory/3736-1114-0x0000000000910000-0x0000000000942000-memory.dmp

    Filesize

    200KB

  • memory/3736-1115-0x0000000005350000-0x000000000539B000-memory.dmp

    Filesize

    300KB

  • memory/3736-1116-0x00000000051A0000-0x00000000051B0000-memory.dmp

    Filesize

    64KB