Analysis

  • max time kernel
    50s
  • max time network
    52s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 12:27

General

  • Target

    302107787b17ceefb24e2ff9f5b359a606aa8d526e67d1168cf1fe27ff51f329.exe

  • Size

    688KB

  • MD5

    d192f85a46e868ddc7a01f7798eb77c3

  • SHA1

    c179e853894bde484e1b58f1af817619f77abb3f

  • SHA256

    302107787b17ceefb24e2ff9f5b359a606aa8d526e67d1168cf1fe27ff51f329

  • SHA512

    cd76271c6fcece6f6b7c01e7aeea9582d1cdbf89501fe1e7395f79ff7582649410a77039ffffb406f0aac4f51be46d56fa7acef088b09f6c3fd043d936c1eebd

  • SSDEEP

    12288:CMriy90Nq73BU3QrQXrH7faGH1EAh0VReCGcgSSke2MZ0I6JGzaNIfwyY:Uym8cXXfPH1Es0VdXs7t+I6czsh

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\302107787b17ceefb24e2ff9f5b359a606aa8d526e67d1168cf1fe27ff51f329.exe
    "C:\Users\Admin\AppData\Local\Temp\302107787b17ceefb24e2ff9f5b359a606aa8d526e67d1168cf1fe27ff51f329.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4032
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un599678.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un599678.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4212
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9948.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9948.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4216
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5394.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5394.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4748
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si859013.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si859013.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3448

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si859013.exe

    Filesize

    175KB

    MD5

    59864b76cac82a98cb1ed5d58fec36e1

    SHA1

    f43bf1ca7fa184ce1b1e8692ccec9db1fa0ad1dc

    SHA256

    d9341f485ab4fe7a31ecfaa66b95034a847ce5e263ce00aaf6eb1f626ad6ee82

    SHA512

    5fc766f0cf53dc48b6359690e0af038974d8a4480fb7218f956053c451c4d7881367b62e373a616f2fa5ca093f03475f9bcefc31149d77c3bee5fc04d264ac20

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si859013.exe

    Filesize

    175KB

    MD5

    59864b76cac82a98cb1ed5d58fec36e1

    SHA1

    f43bf1ca7fa184ce1b1e8692ccec9db1fa0ad1dc

    SHA256

    d9341f485ab4fe7a31ecfaa66b95034a847ce5e263ce00aaf6eb1f626ad6ee82

    SHA512

    5fc766f0cf53dc48b6359690e0af038974d8a4480fb7218f956053c451c4d7881367b62e373a616f2fa5ca093f03475f9bcefc31149d77c3bee5fc04d264ac20

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un599678.exe

    Filesize

    545KB

    MD5

    d1c7e22e8c70f0ba3db51478c535184f

    SHA1

    25e132c91fa5306ab04794dff1e35ed161adf183

    SHA256

    cb066b0eb11cbf43c732fdafbe9d5ae89de1f3eec78049ffbb90538cf8094dd6

    SHA512

    62b8adcd8fed68ab02d0d2a6ea3ae4be664e2703a26911a374d8799cf7815fc657a9aa527c8e91311df64d689c373acdb8099665e7833717ac48cb3df4036060

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un599678.exe

    Filesize

    545KB

    MD5

    d1c7e22e8c70f0ba3db51478c535184f

    SHA1

    25e132c91fa5306ab04794dff1e35ed161adf183

    SHA256

    cb066b0eb11cbf43c732fdafbe9d5ae89de1f3eec78049ffbb90538cf8094dd6

    SHA512

    62b8adcd8fed68ab02d0d2a6ea3ae4be664e2703a26911a374d8799cf7815fc657a9aa527c8e91311df64d689c373acdb8099665e7833717ac48cb3df4036060

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9948.exe

    Filesize

    300KB

    MD5

    4603c532c02695ae56109c4aaf4c6a9f

    SHA1

    adc9421b5394adee1c9e4d5bca323e5c423ef517

    SHA256

    5e7aca5542dcc8aa7b0738d582e53963e9ffca1453d2ca4bc59b9dd7cecf11e4

    SHA512

    8d7f5908706af70d6f4f1ae2451166cfcfd3be7873d88d211c522421c2bf0ae892c03db143a9f619f9047336a1439953e183ac6f0521138c448f1aa707ddac08

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9948.exe

    Filesize

    300KB

    MD5

    4603c532c02695ae56109c4aaf4c6a9f

    SHA1

    adc9421b5394adee1c9e4d5bca323e5c423ef517

    SHA256

    5e7aca5542dcc8aa7b0738d582e53963e9ffca1453d2ca4bc59b9dd7cecf11e4

    SHA512

    8d7f5908706af70d6f4f1ae2451166cfcfd3be7873d88d211c522421c2bf0ae892c03db143a9f619f9047336a1439953e183ac6f0521138c448f1aa707ddac08

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5394.exe

    Filesize

    359KB

    MD5

    8afce580adbffae93476349953ea1c8e

    SHA1

    4cf8bca77b3ce478bfec483ead86d7a472a27361

    SHA256

    a3d2a2280394a30c1d2d1f97626980e7a204ad7e423e8567906ff42ca9a1fd44

    SHA512

    96653cd2cb6cab76d38d123fc7d9027fe667ca90762a698685118dc9bf6fae0ca07ef3350e6f9d5aa9e99152a3c7a75f98bc7922f4a36500e7a440ca2c7e9168

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5394.exe

    Filesize

    359KB

    MD5

    8afce580adbffae93476349953ea1c8e

    SHA1

    4cf8bca77b3ce478bfec483ead86d7a472a27361

    SHA256

    a3d2a2280394a30c1d2d1f97626980e7a204ad7e423e8567906ff42ca9a1fd44

    SHA512

    96653cd2cb6cab76d38d123fc7d9027fe667ca90762a698685118dc9bf6fae0ca07ef3350e6f9d5aa9e99152a3c7a75f98bc7922f4a36500e7a440ca2c7e9168

  • memory/3448-1113-0x00000000003C0000-0x00000000003F2000-memory.dmp

    Filesize

    200KB

  • memory/3448-1114-0x0000000004E00000-0x0000000004E4B000-memory.dmp

    Filesize

    300KB

  • memory/3448-1115-0x0000000004F40000-0x0000000004F50000-memory.dmp

    Filesize

    64KB

  • memory/4216-147-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/4216-159-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/4216-140-0x0000000004DF0000-0x00000000052EE000-memory.dmp

    Filesize

    5.0MB

  • memory/4216-141-0x00000000027F0000-0x0000000002808000-memory.dmp

    Filesize

    96KB

  • memory/4216-142-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/4216-143-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/4216-145-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/4216-138-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

    Filesize

    64KB

  • memory/4216-149-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/4216-151-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/4216-153-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/4216-155-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/4216-157-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/4216-139-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

    Filesize

    64KB

  • memory/4216-161-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/4216-163-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/4216-165-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/4216-167-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/4216-169-0x00000000027F0000-0x0000000002802000-memory.dmp

    Filesize

    72KB

  • memory/4216-170-0x0000000000400000-0x000000000070E000-memory.dmp

    Filesize

    3.1MB

  • memory/4216-171-0x00000000007E0000-0x000000000080D000-memory.dmp

    Filesize

    180KB

  • memory/4216-172-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

    Filesize

    64KB

  • memory/4216-174-0x0000000000400000-0x000000000070E000-memory.dmp

    Filesize

    3.1MB

  • memory/4216-137-0x0000000002320000-0x000000000233A000-memory.dmp

    Filesize

    104KB

  • memory/4216-136-0x00000000007E0000-0x000000000080D000-memory.dmp

    Filesize

    180KB

  • memory/4748-184-0x0000000002520000-0x000000000255E000-memory.dmp

    Filesize

    248KB

  • memory/4748-244-0x0000000000A70000-0x0000000000A80000-memory.dmp

    Filesize

    64KB

  • memory/4748-181-0x0000000002520000-0x000000000255E000-memory.dmp

    Filesize

    248KB

  • memory/4748-186-0x0000000002520000-0x000000000255E000-memory.dmp

    Filesize

    248KB

  • memory/4748-188-0x0000000002520000-0x000000000255E000-memory.dmp

    Filesize

    248KB

  • memory/4748-190-0x0000000002520000-0x000000000255E000-memory.dmp

    Filesize

    248KB

  • memory/4748-192-0x0000000002520000-0x000000000255E000-memory.dmp

    Filesize

    248KB

  • memory/4748-194-0x0000000002520000-0x000000000255E000-memory.dmp

    Filesize

    248KB

  • memory/4748-196-0x0000000002520000-0x000000000255E000-memory.dmp

    Filesize

    248KB

  • memory/4748-198-0x0000000002520000-0x000000000255E000-memory.dmp

    Filesize

    248KB

  • memory/4748-200-0x0000000002520000-0x000000000255E000-memory.dmp

    Filesize

    248KB

  • memory/4748-202-0x0000000002520000-0x000000000255E000-memory.dmp

    Filesize

    248KB

  • memory/4748-204-0x0000000002520000-0x000000000255E000-memory.dmp

    Filesize

    248KB

  • memory/4748-206-0x0000000002520000-0x000000000255E000-memory.dmp

    Filesize

    248KB

  • memory/4748-208-0x0000000002520000-0x000000000255E000-memory.dmp

    Filesize

    248KB

  • memory/4748-210-0x0000000002520000-0x000000000255E000-memory.dmp

    Filesize

    248KB

  • memory/4748-212-0x0000000002520000-0x000000000255E000-memory.dmp

    Filesize

    248KB

  • memory/4748-214-0x0000000002520000-0x000000000255E000-memory.dmp

    Filesize

    248KB

  • memory/4748-242-0x0000000000720000-0x000000000076B000-memory.dmp

    Filesize

    300KB

  • memory/4748-182-0x0000000002520000-0x000000000255E000-memory.dmp

    Filesize

    248KB

  • memory/4748-246-0x0000000000A70000-0x0000000000A80000-memory.dmp

    Filesize

    64KB

  • memory/4748-249-0x0000000000A70000-0x0000000000A80000-memory.dmp

    Filesize

    64KB

  • memory/4748-1091-0x0000000005320000-0x0000000005926000-memory.dmp

    Filesize

    6.0MB

  • memory/4748-1092-0x0000000005930000-0x0000000005A3A000-memory.dmp

    Filesize

    1.0MB

  • memory/4748-1093-0x0000000002890000-0x00000000028A2000-memory.dmp

    Filesize

    72KB

  • memory/4748-1094-0x0000000000A70000-0x0000000000A80000-memory.dmp

    Filesize

    64KB

  • memory/4748-1095-0x0000000005A40000-0x0000000005A7E000-memory.dmp

    Filesize

    248KB

  • memory/4748-1096-0x0000000005B80000-0x0000000005BCB000-memory.dmp

    Filesize

    300KB

  • memory/4748-1098-0x0000000000A70000-0x0000000000A80000-memory.dmp

    Filesize

    64KB

  • memory/4748-1099-0x0000000000A70000-0x0000000000A80000-memory.dmp

    Filesize

    64KB

  • memory/4748-1100-0x0000000000A70000-0x0000000000A80000-memory.dmp

    Filesize

    64KB

  • memory/4748-1101-0x0000000005D00000-0x0000000005D66000-memory.dmp

    Filesize

    408KB

  • memory/4748-1102-0x00000000063C0000-0x0000000006452000-memory.dmp

    Filesize

    584KB

  • memory/4748-1103-0x0000000006460000-0x00000000064D6000-memory.dmp

    Filesize

    472KB

  • memory/4748-1104-0x0000000006500000-0x0000000006550000-memory.dmp

    Filesize

    320KB

  • memory/4748-180-0x0000000002520000-0x0000000002564000-memory.dmp

    Filesize

    272KB

  • memory/4748-179-0x0000000002370000-0x00000000023B6000-memory.dmp

    Filesize

    280KB

  • memory/4748-1105-0x0000000000A70000-0x0000000000A80000-memory.dmp

    Filesize

    64KB

  • memory/4748-1106-0x00000000066E0000-0x00000000068A2000-memory.dmp

    Filesize

    1.8MB

  • memory/4748-1107-0x00000000068B0000-0x0000000006DDC000-memory.dmp

    Filesize

    5.2MB