Analysis

  • max time kernel
    55s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 12:34

General

  • Target

    c33437457ac3f6f8c35aac17300fa0405dff4faaa2d744b67f6120392961ef0d.exe

  • Size

    687KB

  • MD5

    ba4e76f184ec5450c400605747417364

  • SHA1

    11879984df8cf2e40f6c7d0a8934045725aad551

  • SHA256

    c33437457ac3f6f8c35aac17300fa0405dff4faaa2d744b67f6120392961ef0d

  • SHA512

    5f795700e4487bda80715b86381dfab4ff8c5341938591bfba0ba49efd98ff8925b9d4398f7621390a72e8322dc42b372285ece6176b78e705757368da2fe064

  • SSDEEP

    12288:kMrey90ksNOFBGGeT2lN5k/QB5y4py6L3qFMYZGGPZC8g2:qy/wOGGfCQBw4pyicbCO

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c33437457ac3f6f8c35aac17300fa0405dff4faaa2d744b67f6120392961ef0d.exe
    "C:\Users\Admin\AppData\Local\Temp\c33437457ac3f6f8c35aac17300fa0405dff4faaa2d744b67f6120392961ef0d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4228
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un209486.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un209486.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4480
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3361.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3361.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1636
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1636 -s 1084
          4⤵
          • Program crash
          PID:4716
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5328.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5328.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4376
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4376 -s 1348
          4⤵
          • Program crash
          PID:2800
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si767184.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si767184.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1996
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1636 -ip 1636
    1⤵
      PID:3472
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 4376 -ip 4376
      1⤵
        PID:2536

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si767184.exe

        Filesize

        175KB

        MD5

        89e6289b81be8fdfa79dd6cb393acf11

        SHA1

        4c9a0199e22b8f30f1b4bb64a02eb1a875f58fb1

        SHA256

        32bfdb6a4db0b37f71ed9d4ac49a50a7ee639ee62d80831f93a0260220a62e6d

        SHA512

        e2c38db9d933b39017785542b94d040bb0c89d5fcd85adacd775446e8625417714cd552fe312c5d9c20a400bc9a0303da518b2f114cca2e80df7ba27f3af4754

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si767184.exe

        Filesize

        175KB

        MD5

        89e6289b81be8fdfa79dd6cb393acf11

        SHA1

        4c9a0199e22b8f30f1b4bb64a02eb1a875f58fb1

        SHA256

        32bfdb6a4db0b37f71ed9d4ac49a50a7ee639ee62d80831f93a0260220a62e6d

        SHA512

        e2c38db9d933b39017785542b94d040bb0c89d5fcd85adacd775446e8625417714cd552fe312c5d9c20a400bc9a0303da518b2f114cca2e80df7ba27f3af4754

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un209486.exe

        Filesize

        545KB

        MD5

        e5a5b120c81efd67ad40275dd923aacc

        SHA1

        6e83f40fe04f7bef8c1b26e5eae287467aa0f207

        SHA256

        b5a25fd2dac1bb2c565ab000f066110098703c74cb215a236358e0938df97cde

        SHA512

        bb6b3cdd58d930dd9de6437d6f1b79685c5579da67e2cdcc484730876ade35bbc773584909cdf4181d52f02c56addbfae4500e12adf53b97b9d1e520b6048929

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un209486.exe

        Filesize

        545KB

        MD5

        e5a5b120c81efd67ad40275dd923aacc

        SHA1

        6e83f40fe04f7bef8c1b26e5eae287467aa0f207

        SHA256

        b5a25fd2dac1bb2c565ab000f066110098703c74cb215a236358e0938df97cde

        SHA512

        bb6b3cdd58d930dd9de6437d6f1b79685c5579da67e2cdcc484730876ade35bbc773584909cdf4181d52f02c56addbfae4500e12adf53b97b9d1e520b6048929

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3361.exe

        Filesize

        300KB

        MD5

        481552279bb87b34877d2bb872652575

        SHA1

        e02fab108f41114e38266637f709a9dfd46d6fe0

        SHA256

        af5b204bfbbcb6f3582cf1343ed4d92047a7dca1d2da166a12f3614d53748711

        SHA512

        45f12efa5e9aa99e18e3d2f23d66a751a482b003a590907aa2aba2e9182854d99e47b1c59920b88fcf2c4d1d0d56d0dd0fd870b38ef88f5bca01f179a5db7255

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3361.exe

        Filesize

        300KB

        MD5

        481552279bb87b34877d2bb872652575

        SHA1

        e02fab108f41114e38266637f709a9dfd46d6fe0

        SHA256

        af5b204bfbbcb6f3582cf1343ed4d92047a7dca1d2da166a12f3614d53748711

        SHA512

        45f12efa5e9aa99e18e3d2f23d66a751a482b003a590907aa2aba2e9182854d99e47b1c59920b88fcf2c4d1d0d56d0dd0fd870b38ef88f5bca01f179a5db7255

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5328.exe

        Filesize

        359KB

        MD5

        db36c6abf78b3c48ce735f45d7e4b0ea

        SHA1

        07da7080233eb1cb31ec71f6a76873cb99643d6f

        SHA256

        1382a61ecb63a1ccfe5dfdbb4ff49c02689247442151f65f856f65a303db1315

        SHA512

        4326638a4a9fa61a0707a1b66e91165d98f23b1757e1e0e28b35b58f91e53ea89631723035f9391bfe22c4af2b09de1fe743df3b0731608bf23ecc6aeee39b6c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5328.exe

        Filesize

        359KB

        MD5

        db36c6abf78b3c48ce735f45d7e4b0ea

        SHA1

        07da7080233eb1cb31ec71f6a76873cb99643d6f

        SHA256

        1382a61ecb63a1ccfe5dfdbb4ff49c02689247442151f65f856f65a303db1315

        SHA512

        4326638a4a9fa61a0707a1b66e91165d98f23b1757e1e0e28b35b58f91e53ea89631723035f9391bfe22c4af2b09de1fe743df3b0731608bf23ecc6aeee39b6c

      • memory/1636-148-0x0000000000890000-0x00000000008BD000-memory.dmp

        Filesize

        180KB

      • memory/1636-149-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

        Filesize

        64KB

      • memory/1636-150-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

        Filesize

        64KB

      • memory/1636-151-0x0000000004EB0000-0x0000000005454000-memory.dmp

        Filesize

        5.6MB

      • memory/1636-152-0x0000000002880000-0x0000000002892000-memory.dmp

        Filesize

        72KB

      • memory/1636-153-0x0000000002880000-0x0000000002892000-memory.dmp

        Filesize

        72KB

      • memory/1636-155-0x0000000002880000-0x0000000002892000-memory.dmp

        Filesize

        72KB

      • memory/1636-157-0x0000000002880000-0x0000000002892000-memory.dmp

        Filesize

        72KB

      • memory/1636-159-0x0000000002880000-0x0000000002892000-memory.dmp

        Filesize

        72KB

      • memory/1636-161-0x0000000002880000-0x0000000002892000-memory.dmp

        Filesize

        72KB

      • memory/1636-163-0x0000000002880000-0x0000000002892000-memory.dmp

        Filesize

        72KB

      • memory/1636-165-0x0000000002880000-0x0000000002892000-memory.dmp

        Filesize

        72KB

      • memory/1636-167-0x0000000002880000-0x0000000002892000-memory.dmp

        Filesize

        72KB

      • memory/1636-169-0x0000000002880000-0x0000000002892000-memory.dmp

        Filesize

        72KB

      • memory/1636-171-0x0000000002880000-0x0000000002892000-memory.dmp

        Filesize

        72KB

      • memory/1636-173-0x0000000002880000-0x0000000002892000-memory.dmp

        Filesize

        72KB

      • memory/1636-175-0x0000000002880000-0x0000000002892000-memory.dmp

        Filesize

        72KB

      • memory/1636-177-0x0000000002880000-0x0000000002892000-memory.dmp

        Filesize

        72KB

      • memory/1636-179-0x0000000002880000-0x0000000002892000-memory.dmp

        Filesize

        72KB

      • memory/1636-180-0x0000000000400000-0x000000000070E000-memory.dmp

        Filesize

        3.1MB

      • memory/1636-181-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

        Filesize

        64KB

      • memory/1636-183-0x0000000000400000-0x000000000070E000-memory.dmp

        Filesize

        3.1MB

      • memory/1996-1119-0x0000000000AE0000-0x0000000000B12000-memory.dmp

        Filesize

        200KB

      • memory/1996-1120-0x00000000056D0000-0x00000000056E0000-memory.dmp

        Filesize

        64KB

      • memory/4376-193-0x00000000027A0000-0x00000000027DE000-memory.dmp

        Filesize

        248KB

      • memory/4376-350-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/4376-189-0x00000000027A0000-0x00000000027DE000-memory.dmp

        Filesize

        248KB

      • memory/4376-195-0x00000000027A0000-0x00000000027DE000-memory.dmp

        Filesize

        248KB

      • memory/4376-197-0x00000000027A0000-0x00000000027DE000-memory.dmp

        Filesize

        248KB

      • memory/4376-199-0x00000000027A0000-0x00000000027DE000-memory.dmp

        Filesize

        248KB

      • memory/4376-201-0x00000000027A0000-0x00000000027DE000-memory.dmp

        Filesize

        248KB

      • memory/4376-203-0x00000000027A0000-0x00000000027DE000-memory.dmp

        Filesize

        248KB

      • memory/4376-205-0x00000000027A0000-0x00000000027DE000-memory.dmp

        Filesize

        248KB

      • memory/4376-207-0x00000000027A0000-0x00000000027DE000-memory.dmp

        Filesize

        248KB

      • memory/4376-209-0x00000000027A0000-0x00000000027DE000-memory.dmp

        Filesize

        248KB

      • memory/4376-211-0x00000000027A0000-0x00000000027DE000-memory.dmp

        Filesize

        248KB

      • memory/4376-213-0x00000000027A0000-0x00000000027DE000-memory.dmp

        Filesize

        248KB

      • memory/4376-215-0x00000000027A0000-0x00000000027DE000-memory.dmp

        Filesize

        248KB

      • memory/4376-217-0x00000000027A0000-0x00000000027DE000-memory.dmp

        Filesize

        248KB

      • memory/4376-219-0x00000000027A0000-0x00000000027DE000-memory.dmp

        Filesize

        248KB

      • memory/4376-221-0x00000000027A0000-0x00000000027DE000-memory.dmp

        Filesize

        248KB

      • memory/4376-346-0x00000000023E0000-0x000000000242B000-memory.dmp

        Filesize

        300KB

      • memory/4376-348-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/4376-191-0x00000000027A0000-0x00000000027DE000-memory.dmp

        Filesize

        248KB

      • memory/4376-352-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/4376-1098-0x0000000005500000-0x0000000005B18000-memory.dmp

        Filesize

        6.1MB

      • memory/4376-1099-0x0000000005B20000-0x0000000005C2A000-memory.dmp

        Filesize

        1.0MB

      • memory/4376-1100-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/4376-1101-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/4376-1102-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/4376-1103-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/4376-1104-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/4376-1105-0x00000000066F0000-0x0000000006766000-memory.dmp

        Filesize

        472KB

      • memory/4376-1106-0x0000000006780000-0x00000000067D0000-memory.dmp

        Filesize

        320KB

      • memory/4376-1108-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/4376-1109-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/4376-1110-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/4376-188-0x00000000027A0000-0x00000000027DE000-memory.dmp

        Filesize

        248KB

      • memory/4376-1111-0x0000000006900000-0x0000000006AC2000-memory.dmp

        Filesize

        1.8MB

      • memory/4376-1113-0x0000000006B10000-0x000000000703C000-memory.dmp

        Filesize

        5.2MB

      • memory/4376-1112-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB