Analysis

  • max time kernel
    93s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 12:42

General

  • Target

    a25b9011123e2f14eea0793c295d189c3f65702a55551c2582d6eea9fd453677.exe

  • Size

    687KB

  • MD5

    4f5967af4c1bab7ff3bfddca523694cc

  • SHA1

    a1b5b6eb854da1b7f728934d1cac44ac750deb25

  • SHA256

    a25b9011123e2f14eea0793c295d189c3f65702a55551c2582d6eea9fd453677

  • SHA512

    f663216d8db5120c84d7d43ed012c79c8b11a6a0a5dbded5402c4e4aa232a86b4a3bc11e280191b977c36970e3ed7b483449f087b83979f01f52ea724d9a077a

  • SSDEEP

    12288:JMrwy90lcgcjyFo9mRBAtNA+rvaG9E4gFq5Z2xmEMqsM+IwyPQ:py0cgcuoAkX3vO4XMTPQ

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a25b9011123e2f14eea0793c295d189c3f65702a55551c2582d6eea9fd453677.exe
    "C:\Users\Admin\AppData\Local\Temp\a25b9011123e2f14eea0793c295d189c3f65702a55551c2582d6eea9fd453677.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1652
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un685908.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un685908.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4240
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8248.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8248.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:740
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 740 -s 1080
          4⤵
          • Program crash
          PID:3516
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5325.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5325.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4412
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4412 -s 1348
          4⤵
          • Program crash
          PID:4072
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si247001.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si247001.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5116
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 740 -ip 740
    1⤵
      PID:4956
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 4412 -ip 4412
      1⤵
        PID:680

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si247001.exe

        Filesize

        175KB

        MD5

        dab1b71c6002a4ff98e396dd116ce5f8

        SHA1

        367ed1943917cc78809f4f008cc4aa07ae3516aa

        SHA256

        c738dfb55c45dde09b95a75880bc5952267bfa263feaea39b8e38c26f3b18c90

        SHA512

        681235e38e95e18180d01b0358e3b8290edb5747c7820e168c623da32474621d28d558b4d1991de12ffe66cce787be14d54d59825a5cf9ef15a5e67a9f5a9005

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si247001.exe

        Filesize

        175KB

        MD5

        dab1b71c6002a4ff98e396dd116ce5f8

        SHA1

        367ed1943917cc78809f4f008cc4aa07ae3516aa

        SHA256

        c738dfb55c45dde09b95a75880bc5952267bfa263feaea39b8e38c26f3b18c90

        SHA512

        681235e38e95e18180d01b0358e3b8290edb5747c7820e168c623da32474621d28d558b4d1991de12ffe66cce787be14d54d59825a5cf9ef15a5e67a9f5a9005

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un685908.exe

        Filesize

        545KB

        MD5

        0156e7a1045d78e5940a0ccb5d1563fa

        SHA1

        1f26e6d85d061ae3c8ab39e9f65798f41dd0dc8d

        SHA256

        ac360a8faf2d1cb4a73fb4837308578c6e99faddfe10541b737bcab81a1e5de7

        SHA512

        d9bdc0d566bbcc2391f1c54538e62939b0856a9f66c302bec069760f623b67b50f2298905e7a14bf2cccdd8e63bd3058eb0e600b72301a0e84731b4beb10e8a0

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un685908.exe

        Filesize

        545KB

        MD5

        0156e7a1045d78e5940a0ccb5d1563fa

        SHA1

        1f26e6d85d061ae3c8ab39e9f65798f41dd0dc8d

        SHA256

        ac360a8faf2d1cb4a73fb4837308578c6e99faddfe10541b737bcab81a1e5de7

        SHA512

        d9bdc0d566bbcc2391f1c54538e62939b0856a9f66c302bec069760f623b67b50f2298905e7a14bf2cccdd8e63bd3058eb0e600b72301a0e84731b4beb10e8a0

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8248.exe

        Filesize

        300KB

        MD5

        95d11ef059b05724a6fb01ee90eeb70b

        SHA1

        6038fda9cc94fc4e6d32fb42b1ad70a2f12752c9

        SHA256

        7014055b7abed593839a1f2bcd186c88c4f06938037e16044421a6491e7542a7

        SHA512

        7dca5bec735cd72b1f4076a2481bf4f7538cf7b8039c5c5c52caad666d5621775090c6226a2187ec56c5a4f13893ddb595ff51cfc21b403ed53f0cc0e753a37c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8248.exe

        Filesize

        300KB

        MD5

        95d11ef059b05724a6fb01ee90eeb70b

        SHA1

        6038fda9cc94fc4e6d32fb42b1ad70a2f12752c9

        SHA256

        7014055b7abed593839a1f2bcd186c88c4f06938037e16044421a6491e7542a7

        SHA512

        7dca5bec735cd72b1f4076a2481bf4f7538cf7b8039c5c5c52caad666d5621775090c6226a2187ec56c5a4f13893ddb595ff51cfc21b403ed53f0cc0e753a37c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5325.exe

        Filesize

        359KB

        MD5

        8b554115bec0357fe9b45c764bf48beb

        SHA1

        468b55697f9fcc8815be90bc4a42d05a1d256b99

        SHA256

        9c571d8b0f080af3b29c3d0b114f0ebb6974f832adbd9819c5cc5beba81f75df

        SHA512

        9b8b718952356fb1c0751d429cc9d4ebf575e46387544d83595af6d95d84920600ad40733fccb8b66dfaa542d5a1ea6027cef741c7bc0fbefdb4d4890814e651

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5325.exe

        Filesize

        359KB

        MD5

        8b554115bec0357fe9b45c764bf48beb

        SHA1

        468b55697f9fcc8815be90bc4a42d05a1d256b99

        SHA256

        9c571d8b0f080af3b29c3d0b114f0ebb6974f832adbd9819c5cc5beba81f75df

        SHA512

        9b8b718952356fb1c0751d429cc9d4ebf575e46387544d83595af6d95d84920600ad40733fccb8b66dfaa542d5a1ea6027cef741c7bc0fbefdb4d4890814e651

      • memory/740-148-0x00000000008A0000-0x00000000008CD000-memory.dmp

        Filesize

        180KB

      • memory/740-149-0x0000000004EF0000-0x0000000004F00000-memory.dmp

        Filesize

        64KB

      • memory/740-150-0x0000000004F00000-0x00000000054A4000-memory.dmp

        Filesize

        5.6MB

      • memory/740-152-0x0000000002660000-0x0000000002672000-memory.dmp

        Filesize

        72KB

      • memory/740-151-0x0000000002660000-0x0000000002672000-memory.dmp

        Filesize

        72KB

      • memory/740-154-0x0000000002660000-0x0000000002672000-memory.dmp

        Filesize

        72KB

      • memory/740-156-0x0000000002660000-0x0000000002672000-memory.dmp

        Filesize

        72KB

      • memory/740-158-0x0000000002660000-0x0000000002672000-memory.dmp

        Filesize

        72KB

      • memory/740-160-0x0000000002660000-0x0000000002672000-memory.dmp

        Filesize

        72KB

      • memory/740-162-0x0000000002660000-0x0000000002672000-memory.dmp

        Filesize

        72KB

      • memory/740-164-0x0000000002660000-0x0000000002672000-memory.dmp

        Filesize

        72KB

      • memory/740-166-0x0000000002660000-0x0000000002672000-memory.dmp

        Filesize

        72KB

      • memory/740-168-0x0000000002660000-0x0000000002672000-memory.dmp

        Filesize

        72KB

      • memory/740-170-0x0000000002660000-0x0000000002672000-memory.dmp

        Filesize

        72KB

      • memory/740-172-0x0000000002660000-0x0000000002672000-memory.dmp

        Filesize

        72KB

      • memory/740-174-0x0000000002660000-0x0000000002672000-memory.dmp

        Filesize

        72KB

      • memory/740-176-0x0000000002660000-0x0000000002672000-memory.dmp

        Filesize

        72KB

      • memory/740-178-0x0000000002660000-0x0000000002672000-memory.dmp

        Filesize

        72KB

      • memory/740-179-0x0000000004EF0000-0x0000000004F00000-memory.dmp

        Filesize

        64KB

      • memory/740-180-0x0000000004EF0000-0x0000000004F00000-memory.dmp

        Filesize

        64KB

      • memory/740-181-0x0000000000400000-0x000000000070E000-memory.dmp

        Filesize

        3.1MB

      • memory/740-182-0x0000000004EF0000-0x0000000004F00000-memory.dmp

        Filesize

        64KB

      • memory/740-184-0x0000000004EF0000-0x0000000004F00000-memory.dmp

        Filesize

        64KB

      • memory/740-185-0x0000000004EF0000-0x0000000004F00000-memory.dmp

        Filesize

        64KB

      • memory/740-186-0x0000000000400000-0x000000000070E000-memory.dmp

        Filesize

        3.1MB

      • memory/4412-191-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/4412-192-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/4412-194-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/4412-196-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/4412-198-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/4412-200-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/4412-202-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/4412-204-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/4412-206-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/4412-208-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/4412-210-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/4412-212-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/4412-214-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/4412-216-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/4412-219-0x00000000009A0000-0x00000000009EB000-memory.dmp

        Filesize

        300KB

      • memory/4412-220-0x0000000004F20000-0x0000000004F30000-memory.dmp

        Filesize

        64KB

      • memory/4412-218-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/4412-222-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/4412-223-0x0000000004F20000-0x0000000004F30000-memory.dmp

        Filesize

        64KB

      • memory/4412-225-0x0000000004F20000-0x0000000004F30000-memory.dmp

        Filesize

        64KB

      • memory/4412-226-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/4412-228-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/4412-1101-0x00000000054E0000-0x0000000005AF8000-memory.dmp

        Filesize

        6.1MB

      • memory/4412-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/4412-1103-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/4412-1104-0x0000000004F20000-0x0000000004F30000-memory.dmp

        Filesize

        64KB

      • memory/4412-1105-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/4412-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/4412-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/4412-1109-0x0000000006950000-0x0000000006B12000-memory.dmp

        Filesize

        1.8MB

      • memory/4412-1110-0x0000000006B30000-0x000000000705C000-memory.dmp

        Filesize

        5.2MB

      • memory/4412-1111-0x0000000004F20000-0x0000000004F30000-memory.dmp

        Filesize

        64KB

      • memory/4412-1112-0x0000000004F20000-0x0000000004F30000-memory.dmp

        Filesize

        64KB

      • memory/4412-1113-0x0000000007180000-0x00000000071F6000-memory.dmp

        Filesize

        472KB

      • memory/4412-1114-0x0000000007220000-0x0000000007270000-memory.dmp

        Filesize

        320KB

      • memory/4412-1115-0x0000000004F20000-0x0000000004F30000-memory.dmp

        Filesize

        64KB

      • memory/5116-1121-0x0000000000D90000-0x0000000000DC2000-memory.dmp

        Filesize

        200KB

      • memory/5116-1122-0x0000000005680000-0x0000000005690000-memory.dmp

        Filesize

        64KB