Analysis

  • max time kernel
    53s
  • max time network
    55s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 13:44

General

  • Target

    be73e3d2d9c2d1b706ba3e3742f7f09f8ecf23439f6547572b48c1f91c27d9be.exe

  • Size

    685KB

  • MD5

    e19eb711c09e440148c1f53121acd2ea

  • SHA1

    b85ce081af6bb5b074d46519c2d4d78d7f3a4732

  • SHA256

    be73e3d2d9c2d1b706ba3e3742f7f09f8ecf23439f6547572b48c1f91c27d9be

  • SHA512

    c2935b000bd8fe0ad21d0b3e0c0c6ae3db0e55c08d9b695f723e264355e568b87fc72bc243e6aa939c584b48692992a8e54957805d282ba2b1e0b00c66d80917

  • SSDEEP

    12288:EMrwy90XQiOF5sLvdE0MZgVPGwkbsdUzjo/Iwcw439RSB/AHEx/3DEZ/:UyZibLVnMiGwbUzjFr29AHEx7W/

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\be73e3d2d9c2d1b706ba3e3742f7f09f8ecf23439f6547572b48c1f91c27d9be.exe
    "C:\Users\Admin\AppData\Local\Temp\be73e3d2d9c2d1b706ba3e3742f7f09f8ecf23439f6547572b48c1f91c27d9be.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1568
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un343367.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un343367.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2404
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4920.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4920.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2568
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0558.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0558.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2208
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si862637.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si862637.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3900

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si862637.exe

    Filesize

    175KB

    MD5

    288f0926cb7239224f066317947769ae

    SHA1

    693e747e45e56a2c10b75a64e533439f3e50a759

    SHA256

    df45d11c5c76f89c40292dbc51cb20fe2b9ab2ebc8038c8c55c9c11320ec2908

    SHA512

    eba2a36bad31ef2a9baaa020f6c6169991cc0aaed4c93266a1ff1f2fc5e9a8ab90382846618110af290690b3f125c77b8070d2b4a8e29760df0add1077a84b98

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si862637.exe

    Filesize

    175KB

    MD5

    288f0926cb7239224f066317947769ae

    SHA1

    693e747e45e56a2c10b75a64e533439f3e50a759

    SHA256

    df45d11c5c76f89c40292dbc51cb20fe2b9ab2ebc8038c8c55c9c11320ec2908

    SHA512

    eba2a36bad31ef2a9baaa020f6c6169991cc0aaed4c93266a1ff1f2fc5e9a8ab90382846618110af290690b3f125c77b8070d2b4a8e29760df0add1077a84b98

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un343367.exe

    Filesize

    543KB

    MD5

    82dfe67b231bb1314fb52ee6df04436d

    SHA1

    eabe77cba1843384c675d5d0650390927fb9d45e

    SHA256

    12fb53787aa4291dc859a9bbae3c2fdcb7cbc35566fd4c3047934229e44ec730

    SHA512

    cbed154625cc302589c50f25e4242b34569e8ae0851ad11557633f91d9f9250059a7daa1b348bef40823628bb2d9fa6167e79225665ecd296b76fd982c885d93

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un343367.exe

    Filesize

    543KB

    MD5

    82dfe67b231bb1314fb52ee6df04436d

    SHA1

    eabe77cba1843384c675d5d0650390927fb9d45e

    SHA256

    12fb53787aa4291dc859a9bbae3c2fdcb7cbc35566fd4c3047934229e44ec730

    SHA512

    cbed154625cc302589c50f25e4242b34569e8ae0851ad11557633f91d9f9250059a7daa1b348bef40823628bb2d9fa6167e79225665ecd296b76fd982c885d93

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4920.exe

    Filesize

    292KB

    MD5

    4e871647efb843e9a9a009087853b65b

    SHA1

    8a770114d8d53bdfdfa0be6e3fcc5b80ee7eeab6

    SHA256

    1be0c3479abbd08eed1e811c06ee9e5f10ef1381efe992a48acc24eb2a62396f

    SHA512

    445eeeb5a3375c50e48a49d8cc9211632a19dc37ce6cb3f6390a86189191df4a1bc5d8cc18f4a2a5d2e35c39e1b0bd31010f67d46108fb99ccf3f77d613338e9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4920.exe

    Filesize

    292KB

    MD5

    4e871647efb843e9a9a009087853b65b

    SHA1

    8a770114d8d53bdfdfa0be6e3fcc5b80ee7eeab6

    SHA256

    1be0c3479abbd08eed1e811c06ee9e5f10ef1381efe992a48acc24eb2a62396f

    SHA512

    445eeeb5a3375c50e48a49d8cc9211632a19dc37ce6cb3f6390a86189191df4a1bc5d8cc18f4a2a5d2e35c39e1b0bd31010f67d46108fb99ccf3f77d613338e9

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0558.exe

    Filesize

    350KB

    MD5

    8ca9c7d6a45634db488aad5083de89ec

    SHA1

    ed2e0012574d70ecefb05101e953561de8db077f

    SHA256

    e13f8bb56bf9048cf81817ec8eb742eafee17f5512fde8b87c5d6ca140c0b03e

    SHA512

    8f8498981c3052d157ecbf92842f42926e41dbb838d96b930632a0b546651fb509d92ac2f7343c73d68a07382a30cd898d05919f14e2c4fbcf887cf040870e2a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0558.exe

    Filesize

    350KB

    MD5

    8ca9c7d6a45634db488aad5083de89ec

    SHA1

    ed2e0012574d70ecefb05101e953561de8db077f

    SHA256

    e13f8bb56bf9048cf81817ec8eb742eafee17f5512fde8b87c5d6ca140c0b03e

    SHA512

    8f8498981c3052d157ecbf92842f42926e41dbb838d96b930632a0b546651fb509d92ac2f7343c73d68a07382a30cd898d05919f14e2c4fbcf887cf040870e2a

  • memory/2208-1093-0x0000000005840000-0x0000000005E46000-memory.dmp

    Filesize

    6.0MB

  • memory/2208-220-0x00000000027D0000-0x000000000280E000-memory.dmp

    Filesize

    248KB

  • memory/2208-1109-0x0000000006FB0000-0x0000000007000000-memory.dmp

    Filesize

    320KB

  • memory/2208-1108-0x0000000006F30000-0x0000000006FA6000-memory.dmp

    Filesize

    472KB

  • memory/2208-1107-0x0000000000AE0000-0x0000000000AF0000-memory.dmp

    Filesize

    64KB

  • memory/2208-198-0x00000000027D0000-0x000000000280E000-memory.dmp

    Filesize

    248KB

  • memory/2208-1106-0x00000000067D0000-0x0000000006CFC000-memory.dmp

    Filesize

    5.2MB

  • memory/2208-1105-0x0000000006600000-0x00000000067C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2208-1104-0x00000000062E0000-0x0000000006372000-memory.dmp

    Filesize

    584KB

  • memory/2208-1103-0x00000000056F0000-0x0000000005756000-memory.dmp

    Filesize

    408KB

  • memory/2208-200-0x00000000027D0000-0x000000000280E000-memory.dmp

    Filesize

    248KB

  • memory/2208-1102-0x0000000000AE0000-0x0000000000AF0000-memory.dmp

    Filesize

    64KB

  • memory/2208-1101-0x0000000000AE0000-0x0000000000AF0000-memory.dmp

    Filesize

    64KB

  • memory/2208-1100-0x0000000000AE0000-0x0000000000AF0000-memory.dmp

    Filesize

    64KB

  • memory/2208-1098-0x0000000005560000-0x00000000055AB000-memory.dmp

    Filesize

    300KB

  • memory/2208-1097-0x0000000005410000-0x000000000544E000-memory.dmp

    Filesize

    248KB

  • memory/2208-1096-0x0000000000AE0000-0x0000000000AF0000-memory.dmp

    Filesize

    64KB

  • memory/2208-1095-0x00000000053F0000-0x0000000005402000-memory.dmp

    Filesize

    72KB

  • memory/2208-1094-0x00000000052B0000-0x00000000053BA000-memory.dmp

    Filesize

    1.0MB

  • memory/2208-206-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/2208-218-0x00000000027D0000-0x000000000280E000-memory.dmp

    Filesize

    248KB

  • memory/2208-216-0x00000000027D0000-0x000000000280E000-memory.dmp

    Filesize

    248KB

  • memory/2208-210-0x0000000000AE0000-0x0000000000AF0000-memory.dmp

    Filesize

    64KB

  • memory/2208-211-0x00000000027D0000-0x000000000280E000-memory.dmp

    Filesize

    248KB

  • memory/2208-214-0x00000000027D0000-0x000000000280E000-memory.dmp

    Filesize

    248KB

  • memory/2208-181-0x00000000022B0000-0x00000000022F6000-memory.dmp

    Filesize

    280KB

  • memory/2208-182-0x00000000027D0000-0x0000000002814000-memory.dmp

    Filesize

    272KB

  • memory/2208-183-0x00000000027D0000-0x000000000280E000-memory.dmp

    Filesize

    248KB

  • memory/2208-184-0x00000000027D0000-0x000000000280E000-memory.dmp

    Filesize

    248KB

  • memory/2208-196-0x00000000027D0000-0x000000000280E000-memory.dmp

    Filesize

    248KB

  • memory/2208-188-0x00000000027D0000-0x000000000280E000-memory.dmp

    Filesize

    248KB

  • memory/2208-190-0x00000000027D0000-0x000000000280E000-memory.dmp

    Filesize

    248KB

  • memory/2208-192-0x00000000027D0000-0x000000000280E000-memory.dmp

    Filesize

    248KB

  • memory/2208-194-0x00000000027D0000-0x000000000280E000-memory.dmp

    Filesize

    248KB

  • memory/2208-186-0x00000000027D0000-0x000000000280E000-memory.dmp

    Filesize

    248KB

  • memory/2208-212-0x0000000000AE0000-0x0000000000AF0000-memory.dmp

    Filesize

    64KB

  • memory/2208-208-0x0000000000AE0000-0x0000000000AF0000-memory.dmp

    Filesize

    64KB

  • memory/2208-202-0x00000000027D0000-0x000000000280E000-memory.dmp

    Filesize

    248KB

  • memory/2208-204-0x00000000027D0000-0x000000000280E000-memory.dmp

    Filesize

    248KB

  • memory/2208-207-0x00000000027D0000-0x000000000280E000-memory.dmp

    Filesize

    248KB

  • memory/2568-171-0x0000000000400000-0x000000000070C000-memory.dmp

    Filesize

    3.0MB

  • memory/2568-156-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2568-146-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2568-139-0x0000000004CD0000-0x00000000051CE000-memory.dmp

    Filesize

    5.0MB

  • memory/2568-140-0x00000000026D0000-0x00000000026E8000-memory.dmp

    Filesize

    96KB

  • memory/2568-176-0x0000000000400000-0x000000000070C000-memory.dmp

    Filesize

    3.0MB

  • memory/2568-174-0x0000000002670000-0x0000000002680000-memory.dmp

    Filesize

    64KB

  • memory/2568-173-0x0000000002670000-0x0000000002680000-memory.dmp

    Filesize

    64KB

  • memory/2568-172-0x0000000002670000-0x0000000002680000-memory.dmp

    Filesize

    64KB

  • memory/2568-137-0x0000000002670000-0x0000000002680000-memory.dmp

    Filesize

    64KB

  • memory/2568-141-0x0000000002670000-0x0000000002680000-memory.dmp

    Filesize

    64KB

  • memory/2568-170-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2568-168-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2568-166-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2568-164-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2568-162-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2568-160-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2568-158-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2568-154-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2568-152-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2568-150-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2568-148-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2568-144-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2568-143-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2568-142-0x0000000002670000-0x0000000002680000-memory.dmp

    Filesize

    64KB

  • memory/2568-138-0x0000000002630000-0x000000000264A000-memory.dmp

    Filesize

    104KB

  • memory/2568-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/3900-1115-0x00000000004A0000-0x00000000004D2000-memory.dmp

    Filesize

    200KB

  • memory/3900-1116-0x0000000004EE0000-0x0000000004F2B000-memory.dmp

    Filesize

    300KB

  • memory/3900-1117-0x0000000005080000-0x0000000005090000-memory.dmp

    Filesize

    64KB