Analysis

  • max time kernel
    109s
  • max time network
    111s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2023, 13:45 UTC

General

  • Target

    6345e896010685ece1837e611b112347b7b808c46edeb9315d4f522568c11283.exe

  • Size

    684KB

  • MD5

    e7092d8e4d0e976936074e7a2995766d

  • SHA1

    03497f18f80820a99bf81dd7f4d9a96d913b9508

  • SHA256

    6345e896010685ece1837e611b112347b7b808c46edeb9315d4f522568c11283

  • SHA512

    f2b17be85b1812b8e8e8396f5abd1f290657dda1479966e957a49861a3eb14e5fea7a58739838d993d32b226dce6763c90d8aec323896941d666ba212805f041

  • SSDEEP

    12288:9MrQy90ism8iTGSTvJkk/MdL3vXnkFLqqu3x9EN3WBsjqEA6g2y5+Jzw/EW:9ykDuvm3PkFLC3x9EsGjqE3y2kEW

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6345e896010685ece1837e611b112347b7b808c46edeb9315d4f522568c11283.exe
    "C:\Users\Admin\AppData\Local\Temp\6345e896010685ece1837e611b112347b7b808c46edeb9315d4f522568c11283.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3744
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un875665.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un875665.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4828
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7937.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7937.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4516
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4516 -s 1084
          4⤵
          • Program crash
          PID:4308
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8517.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8517.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1512
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1512 -s 1376
          4⤵
          • Program crash
          PID:4632
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si628301.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si628301.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4336
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4516 -ip 4516
    1⤵
      PID:4160
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1512 -ip 1512
      1⤵
        PID:4180

      Network

      • flag-us
        DNS
        14.110.152.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        14.110.152.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        206.23.85.13.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        206.23.85.13.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        149.220.183.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        149.220.183.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        67.31.126.40.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        67.31.126.40.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        241.150.49.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        241.150.49.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        133.211.185.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        133.211.185.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        33.20.233.193.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        33.20.233.193.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        176.122.125.40.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        176.122.125.40.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        2.36.159.162.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        2.36.159.162.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        176.122.125.40.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        176.122.125.40.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        157.123.68.40.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        157.123.68.40.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        240.232.229.192.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        240.232.229.192.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        56.126.166.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        56.126.166.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        233.141.123.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        233.141.123.20.in-addr.arpa
        IN PTR
        Response
      • 52.152.110.14:443
        276 B
        6
      • 52.152.110.14:443
        260 B
        5
      • 193.233.20.33:4125
        qu8517.exe
        1.6MB
        26.5kB
        1216
        508
      • 193.233.20.33:4125
        si628301.exe
        1.6MB
        28.2kB
        1207
        525
      • 20.42.73.25:443
        322 B
        7
      • 209.197.3.8:80
        322 B
        7
      • 209.197.3.8:80
        322 B
        7
      • 173.223.113.164:443
        322 B
        7
      • 173.223.113.131:80
        322 B
        7
      • 204.79.197.203:80
        322 B
        7
      • 8.8.8.8:53
        14.110.152.52.in-addr.arpa
        dns
        72 B
        146 B
        1
        1

        DNS Request

        14.110.152.52.in-addr.arpa

      • 8.8.8.8:53
        206.23.85.13.in-addr.arpa
        dns
        71 B
        145 B
        1
        1

        DNS Request

        206.23.85.13.in-addr.arpa

      • 8.8.8.8:53
        149.220.183.52.in-addr.arpa
        dns
        73 B
        147 B
        1
        1

        DNS Request

        149.220.183.52.in-addr.arpa

      • 8.8.8.8:53
        67.31.126.40.in-addr.arpa
        dns
        71 B
        157 B
        1
        1

        DNS Request

        67.31.126.40.in-addr.arpa

      • 8.8.8.8:53
        241.150.49.20.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        241.150.49.20.in-addr.arpa

      • 8.8.8.8:53
        133.211.185.52.in-addr.arpa
        dns
        73 B
        147 B
        1
        1

        DNS Request

        133.211.185.52.in-addr.arpa

      • 8.8.8.8:53
        33.20.233.193.in-addr.arpa
        dns
        72 B
        127 B
        1
        1

        DNS Request

        33.20.233.193.in-addr.arpa

      • 8.8.8.8:53
        176.122.125.40.in-addr.arpa
        dns
        73 B
        159 B
        1
        1

        DNS Request

        176.122.125.40.in-addr.arpa

      • 8.8.8.8:53
        2.36.159.162.in-addr.arpa
        dns
        71 B
        133 B
        1
        1

        DNS Request

        2.36.159.162.in-addr.arpa

      • 8.8.8.8:53
        176.122.125.40.in-addr.arpa
        dns
        73 B
        159 B
        1
        1

        DNS Request

        176.122.125.40.in-addr.arpa

      • 8.8.8.8:53
        157.123.68.40.in-addr.arpa
        dns
        72 B
        146 B
        1
        1

        DNS Request

        157.123.68.40.in-addr.arpa

      • 8.8.8.8:53
        240.232.229.192.in-addr.arpa
        dns
        74 B
        145 B
        1
        1

        DNS Request

        240.232.229.192.in-addr.arpa

      • 8.8.8.8:53
        56.126.166.20.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        56.126.166.20.in-addr.arpa

      • 8.8.8.8:53
        233.141.123.20.in-addr.arpa
        dns
        73 B
        159 B
        1
        1

        DNS Request

        233.141.123.20.in-addr.arpa

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si628301.exe

        Filesize

        175KB

        MD5

        00cf00dae0d5eafcd19cf2ac0eeed881

        SHA1

        83a447375603a0adeb5918f77216b1a222013b87

        SHA256

        c9bebd9f054ee2c15bf497e18a2c8cba6ac34c44f46c331fc56b27eb3cf5a218

        SHA512

        8ff6de40703a86f6bbda32d46c4e6de7821b34e773a0019c32a003267542bec09eaf562300e860a0f1a1c5d57488a7b5af5885df391837e90cb494ab28c44a59

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si628301.exe

        Filesize

        175KB

        MD5

        00cf00dae0d5eafcd19cf2ac0eeed881

        SHA1

        83a447375603a0adeb5918f77216b1a222013b87

        SHA256

        c9bebd9f054ee2c15bf497e18a2c8cba6ac34c44f46c331fc56b27eb3cf5a218

        SHA512

        8ff6de40703a86f6bbda32d46c4e6de7821b34e773a0019c32a003267542bec09eaf562300e860a0f1a1c5d57488a7b5af5885df391837e90cb494ab28c44a59

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un875665.exe

        Filesize

        543KB

        MD5

        85b80fd63b7e5ea6bc87c94b74533800

        SHA1

        3441876323f0fc82242848bb1ea95f26cedd06b7

        SHA256

        37cb4279d7cb00de79abe3a458a0a8d7be3adce094b524387188da0cddad8d9f

        SHA512

        68325f04bb309c4b5e679da2309347daeb4df018c4bfcbf02ee0fae9cff422b83128c098858f61b85ada3811b6ce7a618e0d366caf166a0e1e1d684d4dbbfe75

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un875665.exe

        Filesize

        543KB

        MD5

        85b80fd63b7e5ea6bc87c94b74533800

        SHA1

        3441876323f0fc82242848bb1ea95f26cedd06b7

        SHA256

        37cb4279d7cb00de79abe3a458a0a8d7be3adce094b524387188da0cddad8d9f

        SHA512

        68325f04bb309c4b5e679da2309347daeb4df018c4bfcbf02ee0fae9cff422b83128c098858f61b85ada3811b6ce7a618e0d366caf166a0e1e1d684d4dbbfe75

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7937.exe

        Filesize

        292KB

        MD5

        7397b4dccdb80f13835fb18a5130f097

        SHA1

        3a57aee709a8945d85476705a93186555bd08396

        SHA256

        f690012711c9bfb7f70400eca19e3bc32a596780c7365c45c14385526b2df27d

        SHA512

        39a1f256ba0962b6c8ae9902e500e1e5fb3df230bf178ab0d21b5d03202c535ea96e9edb50ff80f38fa7fe94b514259fec5aa70ef5c65b9e788a54fd5cfe6b70

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7937.exe

        Filesize

        292KB

        MD5

        7397b4dccdb80f13835fb18a5130f097

        SHA1

        3a57aee709a8945d85476705a93186555bd08396

        SHA256

        f690012711c9bfb7f70400eca19e3bc32a596780c7365c45c14385526b2df27d

        SHA512

        39a1f256ba0962b6c8ae9902e500e1e5fb3df230bf178ab0d21b5d03202c535ea96e9edb50ff80f38fa7fe94b514259fec5aa70ef5c65b9e788a54fd5cfe6b70

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8517.exe

        Filesize

        350KB

        MD5

        866df39e9dfa4fc20b0c114b953bcbf0

        SHA1

        2efc221e1e58b64b4a9c6ae234d61cca35cbdc24

        SHA256

        49437d49956e93fa919cf6fbeb0e73bef9a95c8bc7de35afb07e4f79c721efcd

        SHA512

        9b8d792d96180c5041a3876aa07ae4b94cc0829a19c7d12fbc4ac1d9122f2472585a82aa969da218a82b5b45d28bdd6819baa86b069fdd7ba02f7397bfd6e42e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8517.exe

        Filesize

        350KB

        MD5

        866df39e9dfa4fc20b0c114b953bcbf0

        SHA1

        2efc221e1e58b64b4a9c6ae234d61cca35cbdc24

        SHA256

        49437d49956e93fa919cf6fbeb0e73bef9a95c8bc7de35afb07e4f79c721efcd

        SHA512

        9b8d792d96180c5041a3876aa07ae4b94cc0829a19c7d12fbc4ac1d9122f2472585a82aa969da218a82b5b45d28bdd6819baa86b069fdd7ba02f7397bfd6e42e

      • memory/1512-1099-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/1512-1102-0x0000000002540000-0x0000000002550000-memory.dmp

        Filesize

        64KB

      • memory/1512-1114-0x0000000002540000-0x0000000002550000-memory.dmp

        Filesize

        64KB

      • memory/1512-1112-0x0000000007440000-0x0000000007490000-memory.dmp

        Filesize

        320KB

      • memory/1512-1111-0x00000000073C0000-0x0000000007436000-memory.dmp

        Filesize

        472KB

      • memory/1512-1110-0x0000000002540000-0x0000000002550000-memory.dmp

        Filesize

        64KB

      • memory/1512-1109-0x0000000002540000-0x0000000002550000-memory.dmp

        Filesize

        64KB

      • memory/1512-1108-0x0000000002540000-0x0000000002550000-memory.dmp

        Filesize

        64KB

      • memory/1512-1107-0x00000000068F0000-0x0000000006E1C000-memory.dmp

        Filesize

        5.2MB

      • memory/1512-1105-0x0000000006710000-0x00000000068D2000-memory.dmp

        Filesize

        1.8MB

      • memory/1512-1104-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/1512-1103-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/1512-1101-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/1512-1100-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/1512-1098-0x0000000005460000-0x0000000005A78000-memory.dmp

        Filesize

        6.1MB

      • memory/1512-374-0x0000000002540000-0x0000000002550000-memory.dmp

        Filesize

        64KB

      • memory/1512-372-0x0000000002540000-0x0000000002550000-memory.dmp

        Filesize

        64KB

      • memory/1512-370-0x0000000000860000-0x00000000008AB000-memory.dmp

        Filesize

        300KB

      • memory/1512-222-0x00000000028C0000-0x00000000028FE000-memory.dmp

        Filesize

        248KB

      • memory/1512-220-0x00000000028C0000-0x00000000028FE000-memory.dmp

        Filesize

        248KB

      • memory/1512-218-0x00000000028C0000-0x00000000028FE000-memory.dmp

        Filesize

        248KB

      • memory/1512-189-0x00000000028C0000-0x00000000028FE000-memory.dmp

        Filesize

        248KB

      • memory/1512-190-0x00000000028C0000-0x00000000028FE000-memory.dmp

        Filesize

        248KB

      • memory/1512-192-0x00000000028C0000-0x00000000028FE000-memory.dmp

        Filesize

        248KB

      • memory/1512-194-0x00000000028C0000-0x00000000028FE000-memory.dmp

        Filesize

        248KB

      • memory/1512-196-0x00000000028C0000-0x00000000028FE000-memory.dmp

        Filesize

        248KB

      • memory/1512-198-0x00000000028C0000-0x00000000028FE000-memory.dmp

        Filesize

        248KB

      • memory/1512-200-0x00000000028C0000-0x00000000028FE000-memory.dmp

        Filesize

        248KB

      • memory/1512-202-0x00000000028C0000-0x00000000028FE000-memory.dmp

        Filesize

        248KB

      • memory/1512-204-0x00000000028C0000-0x00000000028FE000-memory.dmp

        Filesize

        248KB

      • memory/1512-206-0x00000000028C0000-0x00000000028FE000-memory.dmp

        Filesize

        248KB

      • memory/1512-208-0x00000000028C0000-0x00000000028FE000-memory.dmp

        Filesize

        248KB

      • memory/1512-210-0x00000000028C0000-0x00000000028FE000-memory.dmp

        Filesize

        248KB

      • memory/1512-212-0x00000000028C0000-0x00000000028FE000-memory.dmp

        Filesize

        248KB

      • memory/1512-214-0x00000000028C0000-0x00000000028FE000-memory.dmp

        Filesize

        248KB

      • memory/1512-216-0x00000000028C0000-0x00000000028FE000-memory.dmp

        Filesize

        248KB

      • memory/4336-1119-0x0000000000260000-0x0000000000292000-memory.dmp

        Filesize

        200KB

      • memory/4336-1120-0x0000000004E50000-0x0000000004E60000-memory.dmp

        Filesize

        64KB

      • memory/4516-172-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/4516-152-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/4516-182-0x00000000023F0000-0x0000000002400000-memory.dmp

        Filesize

        64KB

      • memory/4516-180-0x00000000023F0000-0x0000000002400000-memory.dmp

        Filesize

        64KB

      • memory/4516-179-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/4516-150-0x00000000023F0000-0x0000000002400000-memory.dmp

        Filesize

        64KB

      • memory/4516-178-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/4516-168-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/4516-170-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/4516-174-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/4516-181-0x00000000023F0000-0x0000000002400000-memory.dmp

        Filesize

        64KB

      • memory/4516-151-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/4516-176-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/4516-166-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/4516-164-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/4516-162-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/4516-160-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/4516-158-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/4516-156-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/4516-149-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/4516-148-0x0000000004E10000-0x00000000053B4000-memory.dmp

        Filesize

        5.6MB

      • memory/4516-184-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/4516-154-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.