Analysis

  • max time kernel
    87s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 12:45

General

  • Target

    35d48cbb5eb7c20e9093ed67c19c1cb34375f63e79827daf3e34b181288d3188.exe

  • Size

    688KB

  • MD5

    68c72f54a49ec5da5b0c4030828d8cf9

  • SHA1

    cc7fbe9f5dbabbed35917573a59a9755ec3ddc7d

  • SHA256

    35d48cbb5eb7c20e9093ed67c19c1cb34375f63e79827daf3e34b181288d3188

  • SHA512

    57fe0df4a4dfd07a2283ea229d6e9b839192a31db2db68aed395a6e438a5bd5ed050a32d50b2992c23c1c59b50f5b31522f2ee786eb1d1f0bab685b92630b818

  • SSDEEP

    12288:LMrny906Fxxcp48Ei+bv5XqzHoJ0bXJcywZ094y3KBh3y:syXFxkENZW60jJm+9LKBh3y

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\35d48cbb5eb7c20e9093ed67c19c1cb34375f63e79827daf3e34b181288d3188.exe
    "C:\Users\Admin\AppData\Local\Temp\35d48cbb5eb7c20e9093ed67c19c1cb34375f63e79827daf3e34b181288d3188.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4112
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un185575.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un185575.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3332
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2963.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2963.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4036
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 1080
          4⤵
          • Program crash
          PID:1440
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2497.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2497.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1180
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1180 -s 1332
          4⤵
          • Program crash
          PID:3904
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si448470.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si448470.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:856
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4036 -ip 4036
    1⤵
      PID:1644
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1180 -ip 1180
      1⤵
        PID:1064

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si448470.exe

        Filesize

        175KB

        MD5

        d4e684d6fe94e21bd7a29cb2bf4c645f

        SHA1

        9fa200e8ecb80d171129f9c190e94299ada68231

        SHA256

        de9d3c1ef3ee3b266099ea6b1cedbbf5ee4552aece1f94582a59987a3feab859

        SHA512

        d7eb14d430c1d83c46d21b3a3aa53d6d098afee020aa5d57bf0f2ade3f44aca9373fa2c2439f4c1b7db97a308517b631d2915ccf74c23043d0b0f332cff5a30d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si448470.exe

        Filesize

        175KB

        MD5

        d4e684d6fe94e21bd7a29cb2bf4c645f

        SHA1

        9fa200e8ecb80d171129f9c190e94299ada68231

        SHA256

        de9d3c1ef3ee3b266099ea6b1cedbbf5ee4552aece1f94582a59987a3feab859

        SHA512

        d7eb14d430c1d83c46d21b3a3aa53d6d098afee020aa5d57bf0f2ade3f44aca9373fa2c2439f4c1b7db97a308517b631d2915ccf74c23043d0b0f332cff5a30d

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un185575.exe

        Filesize

        545KB

        MD5

        8c7d2aa38b8c6f861306a7c019e0b143

        SHA1

        71545845dbe701715437e5bcdc4bcab97ac9cb8b

        SHA256

        f4cadc4241317d5223f36aaee8f2ab8a828a0083690e88b7a3a4a8d6acc9a93b

        SHA512

        e518073f1e92f728b60c0943f0d002645ff7482e40e8460015e7a9a4c2e99cc2e05212d005eb7ca1151da79e4cd3b90715ce552037a8ca04df6c1735c70ba346

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un185575.exe

        Filesize

        545KB

        MD5

        8c7d2aa38b8c6f861306a7c019e0b143

        SHA1

        71545845dbe701715437e5bcdc4bcab97ac9cb8b

        SHA256

        f4cadc4241317d5223f36aaee8f2ab8a828a0083690e88b7a3a4a8d6acc9a93b

        SHA512

        e518073f1e92f728b60c0943f0d002645ff7482e40e8460015e7a9a4c2e99cc2e05212d005eb7ca1151da79e4cd3b90715ce552037a8ca04df6c1735c70ba346

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2963.exe

        Filesize

        300KB

        MD5

        d042c4086a695c69c9e47c0bb2e2603f

        SHA1

        533b2e00a9d7bc7dccdb86d59d06ae45b69ed2de

        SHA256

        cc2898939a766bee713e09ac08275c6879666e42bb8c025f8ae861f72b36925a

        SHA512

        2af9689846d8eaf380d6139a043f4ebc18e9891efe52264dc736fc8ed28bbcc7aa430ce9d28a15b1fed7a94f7eb6d1402ba1942db41ca6c753a0eded82256e0c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2963.exe

        Filesize

        300KB

        MD5

        d042c4086a695c69c9e47c0bb2e2603f

        SHA1

        533b2e00a9d7bc7dccdb86d59d06ae45b69ed2de

        SHA256

        cc2898939a766bee713e09ac08275c6879666e42bb8c025f8ae861f72b36925a

        SHA512

        2af9689846d8eaf380d6139a043f4ebc18e9891efe52264dc736fc8ed28bbcc7aa430ce9d28a15b1fed7a94f7eb6d1402ba1942db41ca6c753a0eded82256e0c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2497.exe

        Filesize

        359KB

        MD5

        2c83257c54be3b12fc11768dde02cb44

        SHA1

        8c73a9ef63b3411776f8f34af3a38e64ab0616ee

        SHA256

        6d0e2608d6563d07e99a67c95d816a1fddf1e194a83cdf836d84754cbe99a0d3

        SHA512

        90b526768911420dc048e535e89754e809828b615559ef75ecb131d402b4ea0082360aa70ba924be87214346122d176ee691804aebac46ca9e9e3f6199434e0f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2497.exe

        Filesize

        359KB

        MD5

        2c83257c54be3b12fc11768dde02cb44

        SHA1

        8c73a9ef63b3411776f8f34af3a38e64ab0616ee

        SHA256

        6d0e2608d6563d07e99a67c95d816a1fddf1e194a83cdf836d84754cbe99a0d3

        SHA512

        90b526768911420dc048e535e89754e809828b615559ef75ecb131d402b4ea0082360aa70ba924be87214346122d176ee691804aebac46ca9e9e3f6199434e0f

      • memory/856-1123-0x0000000005B10000-0x0000000005B20000-memory.dmp

        Filesize

        64KB

      • memory/856-1122-0x0000000000F30000-0x0000000000F62000-memory.dmp

        Filesize

        200KB

      • memory/1180-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/1180-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/1180-1116-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/1180-1115-0x0000000007210000-0x0000000007260000-memory.dmp

        Filesize

        320KB

      • memory/1180-1114-0x0000000007180000-0x00000000071F6000-memory.dmp

        Filesize

        472KB

      • memory/1180-1111-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/1180-1113-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/1180-1112-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/1180-1109-0x00000000068F0000-0x0000000006E1C000-memory.dmp

        Filesize

        5.2MB

      • memory/1180-1108-0x0000000006720000-0x00000000068E2000-memory.dmp

        Filesize

        1.8MB

      • memory/1180-1107-0x0000000006610000-0x00000000066A2000-memory.dmp

        Filesize

        584KB

      • memory/1180-1106-0x0000000005F50000-0x0000000005FB6000-memory.dmp

        Filesize

        408KB

      • memory/1180-1105-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/1180-1103-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/1180-1101-0x00000000054A0000-0x0000000005AB8000-memory.dmp

        Filesize

        6.1MB

      • memory/1180-228-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/1180-226-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/1180-224-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/1180-222-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/1180-219-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/1180-220-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/1180-191-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/1180-194-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/1180-192-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/1180-196-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/1180-198-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/1180-200-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/1180-202-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/1180-204-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/1180-206-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/1180-208-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/1180-210-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/1180-212-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/1180-214-0x0000000000880000-0x00000000008CB000-memory.dmp

        Filesize

        300KB

      • memory/1180-215-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/1180-218-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/1180-216-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/4036-176-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/4036-184-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/4036-154-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/4036-185-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/4036-174-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/4036-182-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/4036-181-0x0000000000400000-0x000000000070E000-memory.dmp

        Filesize

        3.1MB

      • memory/4036-172-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/4036-180-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/4036-158-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/4036-179-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/4036-178-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/4036-186-0x0000000000400000-0x000000000070E000-memory.dmp

        Filesize

        3.1MB

      • memory/4036-156-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/4036-152-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/4036-170-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/4036-168-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/4036-166-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/4036-164-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/4036-162-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/4036-160-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/4036-151-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/4036-150-0x0000000004E80000-0x0000000005424000-memory.dmp

        Filesize

        5.6MB

      • memory/4036-149-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/4036-148-0x0000000000970000-0x000000000099D000-memory.dmp

        Filesize

        180KB