Analysis

  • max time kernel
    135s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 12:36

General

  • Target

    e5f4c4ce331c86a606b21792caa399adec40926687cb4809948d029eb91cfe98.exe

  • Size

    687KB

  • MD5

    62dec9dd0e2ebda204e12e6257017105

  • SHA1

    5ea878272367cb3a49e6e90588f1ecbdcd386957

  • SHA256

    e5f4c4ce331c86a606b21792caa399adec40926687cb4809948d029eb91cfe98

  • SHA512

    56a309444fc848f63dbed279e5fb3f9b8c3be083200da23e8c554cd4bb33413b7375c099bae4e921c27e8b7270572e03fee8d55fa9e332fb750e4cfb4c56f7e9

  • SSDEEP

    12288:iMrAy90OqVXjf9Ag19xTwiuxjONetMjvL317LlrObFxZTvNIlJR0eX9L6A:+yOf971M6NeC7L3Tqbb3uz0eX9Ln

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e5f4c4ce331c86a606b21792caa399adec40926687cb4809948d029eb91cfe98.exe
    "C:\Users\Admin\AppData\Local\Temp\e5f4c4ce331c86a606b21792caa399adec40926687cb4809948d029eb91cfe98.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2140
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un550696.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un550696.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2584
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8626.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8626.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1456
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 1080
          4⤵
          • Program crash
          PID:3292
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4890.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4890.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2124
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 1336
          4⤵
          • Program crash
          PID:2376
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si772213.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si772213.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4168
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1456 -ip 1456
    1⤵
      PID:4716
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 2124 -ip 2124
      1⤵
        PID:4476

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si772213.exe

        Filesize

        175KB

        MD5

        94de44335c2a3b999536d184c8dedfe3

        SHA1

        5767292ed37689545d0d8fd5a06361fc99f02583

        SHA256

        44d837f37b9565839f62f4a2ad5893fee8761578de863cf2a783cefe42b22d14

        SHA512

        dcd0cee4b0bc80c638b5e7035d3db74e1e499384f33cf37137e9ad2a287d536406e37f648ef16359816e8546638e63bcd58da50f4958b4e32bb56501fdaae0f4

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si772213.exe

        Filesize

        175KB

        MD5

        94de44335c2a3b999536d184c8dedfe3

        SHA1

        5767292ed37689545d0d8fd5a06361fc99f02583

        SHA256

        44d837f37b9565839f62f4a2ad5893fee8761578de863cf2a783cefe42b22d14

        SHA512

        dcd0cee4b0bc80c638b5e7035d3db74e1e499384f33cf37137e9ad2a287d536406e37f648ef16359816e8546638e63bcd58da50f4958b4e32bb56501fdaae0f4

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un550696.exe

        Filesize

        546KB

        MD5

        c63c0d46ad71fec768e23c7dd571ab9c

        SHA1

        73ed70307e11c07dcc03ea259569b023a57cd5fe

        SHA256

        fe7380c1d4a36a11a8b1370da301b5288c0cef4ae5d5bf8fbf7606feec15ca34

        SHA512

        86fc170ac52af4bbf3b5505ca631317b9dff297de61a5f55411018bfa842914f893af4590db6cdcaa263815c2f4586c12cd09397ff9b178605d85ba7431226f4

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un550696.exe

        Filesize

        546KB

        MD5

        c63c0d46ad71fec768e23c7dd571ab9c

        SHA1

        73ed70307e11c07dcc03ea259569b023a57cd5fe

        SHA256

        fe7380c1d4a36a11a8b1370da301b5288c0cef4ae5d5bf8fbf7606feec15ca34

        SHA512

        86fc170ac52af4bbf3b5505ca631317b9dff297de61a5f55411018bfa842914f893af4590db6cdcaa263815c2f4586c12cd09397ff9b178605d85ba7431226f4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8626.exe

        Filesize

        300KB

        MD5

        91b8b197537a2fc0f914729edae6e62b

        SHA1

        85fd34dedea35ff588778308012a63cbdcc8895d

        SHA256

        99ba8881244067a50d04028c3513c44315c97515eba02aa0719b58237e775265

        SHA512

        d8aae892b069e551cb48e973183e1bf1c885019ad0feba9b6ca3a35bb5668d03689f8e96dcbc000d2dface58304287c1f5f7a1f140d0072307236dab83c02ed6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8626.exe

        Filesize

        300KB

        MD5

        91b8b197537a2fc0f914729edae6e62b

        SHA1

        85fd34dedea35ff588778308012a63cbdcc8895d

        SHA256

        99ba8881244067a50d04028c3513c44315c97515eba02aa0719b58237e775265

        SHA512

        d8aae892b069e551cb48e973183e1bf1c885019ad0feba9b6ca3a35bb5668d03689f8e96dcbc000d2dface58304287c1f5f7a1f140d0072307236dab83c02ed6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4890.exe

        Filesize

        359KB

        MD5

        d0aa5597efa5e3d7634d18c1ff000de8

        SHA1

        8d1142156c58858bdaf69509f9bbd4f1574d54ce

        SHA256

        2ca778573508a5ea73fe863b793f661db83eec07ec555d26e5f3bed5522fbcdc

        SHA512

        d1d07d4a74956e52b224941f06a3c36fe1f55406cb8c407ce526c8c0a5bf1cb2458b22a452af20b17390a64891920832866ad884bced2e82ce9c0870071b35f8

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4890.exe

        Filesize

        359KB

        MD5

        d0aa5597efa5e3d7634d18c1ff000de8

        SHA1

        8d1142156c58858bdaf69509f9bbd4f1574d54ce

        SHA256

        2ca778573508a5ea73fe863b793f661db83eec07ec555d26e5f3bed5522fbcdc

        SHA512

        d1d07d4a74956e52b224941f06a3c36fe1f55406cb8c407ce526c8c0a5bf1cb2458b22a452af20b17390a64891920832866ad884bced2e82ce9c0870071b35f8

      • memory/1456-148-0x0000000000780000-0x00000000007AD000-memory.dmp

        Filesize

        180KB

      • memory/1456-149-0x0000000004E40000-0x00000000053E4000-memory.dmp

        Filesize

        5.6MB

      • memory/1456-150-0x00000000028E0000-0x00000000028F2000-memory.dmp

        Filesize

        72KB

      • memory/1456-151-0x00000000028E0000-0x00000000028F2000-memory.dmp

        Filesize

        72KB

      • memory/1456-153-0x00000000028E0000-0x00000000028F2000-memory.dmp

        Filesize

        72KB

      • memory/1456-155-0x00000000028E0000-0x00000000028F2000-memory.dmp

        Filesize

        72KB

      • memory/1456-157-0x00000000028E0000-0x00000000028F2000-memory.dmp

        Filesize

        72KB

      • memory/1456-159-0x00000000028E0000-0x00000000028F2000-memory.dmp

        Filesize

        72KB

      • memory/1456-161-0x00000000028E0000-0x00000000028F2000-memory.dmp

        Filesize

        72KB

      • memory/1456-163-0x00000000028E0000-0x00000000028F2000-memory.dmp

        Filesize

        72KB

      • memory/1456-165-0x00000000028E0000-0x00000000028F2000-memory.dmp

        Filesize

        72KB

      • memory/1456-167-0x00000000028E0000-0x00000000028F2000-memory.dmp

        Filesize

        72KB

      • memory/1456-169-0x00000000028E0000-0x00000000028F2000-memory.dmp

        Filesize

        72KB

      • memory/1456-171-0x00000000028E0000-0x00000000028F2000-memory.dmp

        Filesize

        72KB

      • memory/1456-173-0x00000000028E0000-0x00000000028F2000-memory.dmp

        Filesize

        72KB

      • memory/1456-175-0x00000000028E0000-0x00000000028F2000-memory.dmp

        Filesize

        72KB

      • memory/1456-177-0x00000000028E0000-0x00000000028F2000-memory.dmp

        Filesize

        72KB

      • memory/1456-179-0x0000000002650000-0x0000000002660000-memory.dmp

        Filesize

        64KB

      • memory/1456-178-0x0000000002650000-0x0000000002660000-memory.dmp

        Filesize

        64KB

      • memory/1456-180-0x0000000002650000-0x0000000002660000-memory.dmp

        Filesize

        64KB

      • memory/1456-181-0x0000000000400000-0x000000000070E000-memory.dmp

        Filesize

        3.1MB

      • memory/1456-183-0x0000000002650000-0x0000000002660000-memory.dmp

        Filesize

        64KB

      • memory/1456-184-0x0000000002650000-0x0000000002660000-memory.dmp

        Filesize

        64KB

      • memory/1456-185-0x0000000002650000-0x0000000002660000-memory.dmp

        Filesize

        64KB

      • memory/1456-186-0x0000000000400000-0x000000000070E000-memory.dmp

        Filesize

        3.1MB

      • memory/2124-192-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2124-191-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2124-194-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2124-196-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2124-198-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2124-200-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2124-202-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2124-204-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2124-206-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2124-208-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2124-210-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2124-212-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2124-214-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2124-216-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2124-218-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2124-220-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2124-222-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2124-224-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2124-285-0x0000000004E60000-0x0000000004E70000-memory.dmp

        Filesize

        64KB

      • memory/2124-284-0x0000000000870000-0x00000000008BB000-memory.dmp

        Filesize

        300KB

      • memory/2124-287-0x0000000004E60000-0x0000000004E70000-memory.dmp

        Filesize

        64KB

      • memory/2124-290-0x0000000004E60000-0x0000000004E70000-memory.dmp

        Filesize

        64KB

      • memory/2124-1101-0x0000000005520000-0x0000000005B38000-memory.dmp

        Filesize

        6.1MB

      • memory/2124-1102-0x0000000005B40000-0x0000000005C4A000-memory.dmp

        Filesize

        1.0MB

      • memory/2124-1103-0x0000000005C50000-0x0000000005C62000-memory.dmp

        Filesize

        72KB

      • memory/2124-1104-0x0000000004E60000-0x0000000004E70000-memory.dmp

        Filesize

        64KB

      • memory/2124-1105-0x0000000005C70000-0x0000000005CAC000-memory.dmp

        Filesize

        240KB

      • memory/2124-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/2124-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/2124-1108-0x00000000067F0000-0x0000000006866000-memory.dmp

        Filesize

        472KB

      • memory/2124-1109-0x0000000006880000-0x00000000068D0000-memory.dmp

        Filesize

        320KB

      • memory/2124-1111-0x0000000006900000-0x0000000006AC2000-memory.dmp

        Filesize

        1.8MB

      • memory/2124-1112-0x0000000006AD0000-0x0000000006FFC000-memory.dmp

        Filesize

        5.2MB

      • memory/2124-1113-0x0000000004E60000-0x0000000004E70000-memory.dmp

        Filesize

        64KB

      • memory/2124-1114-0x0000000004E60000-0x0000000004E70000-memory.dmp

        Filesize

        64KB

      • memory/2124-1115-0x0000000004E60000-0x0000000004E70000-memory.dmp

        Filesize

        64KB

      • memory/2124-1116-0x0000000004E60000-0x0000000004E70000-memory.dmp

        Filesize

        64KB

      • memory/4168-1122-0x00000000004E0000-0x0000000000512000-memory.dmp

        Filesize

        200KB

      • memory/4168-1123-0x00000000050D0000-0x00000000050E0000-memory.dmp

        Filesize

        64KB