Analysis

  • max time kernel
    54s
  • max time network
    71s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 13:51

General

  • Target

    7bedb574b210ae4158b323f6aad90d0064337d0efa11dc53e24e0db2d2df32eb.exe

  • Size

    685KB

  • MD5

    57f3660d212a30d2736cc974d72e804a

  • SHA1

    a22d88e044eebbc7ce57ead5a3cd49858ca0a2f4

  • SHA256

    7bedb574b210ae4158b323f6aad90d0064337d0efa11dc53e24e0db2d2df32eb

  • SHA512

    5ba66931244bea5e73a5c388c947382fea58c6fd7f54141ef456eccf86b9336bab21e6995e9cc7f2caaef951cc912ed2775341aec2b8e9f09f8968907280d14f

  • SSDEEP

    12288:HMryy90/jO36MET1itmEMrceG0/AxyZUZ0aMzusQ8BliMEuFiIY8kxARRi/:py0jO36rRifwnG0AyU+zuMHiME1Fmq

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7bedb574b210ae4158b323f6aad90d0064337d0efa11dc53e24e0db2d2df32eb.exe
    "C:\Users\Admin\AppData\Local\Temp\7bedb574b210ae4158b323f6aad90d0064337d0efa11dc53e24e0db2d2df32eb.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3240
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un609760.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un609760.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3276
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1502.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1502.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3748
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3544.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3544.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2036
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si156300.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si156300.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4816

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si156300.exe

    Filesize

    175KB

    MD5

    6dcfb56af334fcccf0abd4709bde36f2

    SHA1

    3a104d3ec3b438b5a59ccefbc9b25a82b9517f04

    SHA256

    bce23d20eac8713e95046e212bab975e2f7e1bbe8e94c262417c5f1856a0e009

    SHA512

    6f03864f3aa7291af334d14ef000a81895139ee82afe9397826a5131107b088479762d588811d7f786febf754115337e7e18a0d6817ee792e6a3ceb6307b7521

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si156300.exe

    Filesize

    175KB

    MD5

    6dcfb56af334fcccf0abd4709bde36f2

    SHA1

    3a104d3ec3b438b5a59ccefbc9b25a82b9517f04

    SHA256

    bce23d20eac8713e95046e212bab975e2f7e1bbe8e94c262417c5f1856a0e009

    SHA512

    6f03864f3aa7291af334d14ef000a81895139ee82afe9397826a5131107b088479762d588811d7f786febf754115337e7e18a0d6817ee792e6a3ceb6307b7521

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un609760.exe

    Filesize

    543KB

    MD5

    b217fd5641f12885a7482edde7de6d9b

    SHA1

    8c1d33450e1c01a3f265786f304bba14026f1ec2

    SHA256

    86cc99f4d2de8b311af4523f74e820cc6176fb89b86c64d83e7c7e2139013743

    SHA512

    e023f1150ea996c9e604c5065da4f984e0d99d2e8ae4c7c673cf0cb5852eb1b74b664d73fe20b192e987f6502e7a68785a82022bfa74a97724e7a01cb86805db

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un609760.exe

    Filesize

    543KB

    MD5

    b217fd5641f12885a7482edde7de6d9b

    SHA1

    8c1d33450e1c01a3f265786f304bba14026f1ec2

    SHA256

    86cc99f4d2de8b311af4523f74e820cc6176fb89b86c64d83e7c7e2139013743

    SHA512

    e023f1150ea996c9e604c5065da4f984e0d99d2e8ae4c7c673cf0cb5852eb1b74b664d73fe20b192e987f6502e7a68785a82022bfa74a97724e7a01cb86805db

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1502.exe

    Filesize

    292KB

    MD5

    f8beddefa2d809e87e72b23ecb0ca3eb

    SHA1

    b13cb43c7eb8f52bc236a17ca980100a346931b6

    SHA256

    2fd3909c28dac7a86063971c42b80cd48b1a99cd6daf6757ac0e09ccd5b0a5a5

    SHA512

    e7156293d453ae59c62c40255d5f5a6c4428872b6f3d4bea421442b1c8d99bbadbcd922fccf8020ef1a1ea0e0395528143f4bef36208ffc3b41ae1905f15a5b5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1502.exe

    Filesize

    292KB

    MD5

    f8beddefa2d809e87e72b23ecb0ca3eb

    SHA1

    b13cb43c7eb8f52bc236a17ca980100a346931b6

    SHA256

    2fd3909c28dac7a86063971c42b80cd48b1a99cd6daf6757ac0e09ccd5b0a5a5

    SHA512

    e7156293d453ae59c62c40255d5f5a6c4428872b6f3d4bea421442b1c8d99bbadbcd922fccf8020ef1a1ea0e0395528143f4bef36208ffc3b41ae1905f15a5b5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3544.exe

    Filesize

    350KB

    MD5

    a945f3c479278f71dd7b20091f56c96a

    SHA1

    0271e93d3d6da6b6664b2ca40b374c6422f1e3da

    SHA256

    f02a4bfb45cda59fda0b87df515e1ff805bab8c70f6b665c3224528cc1ebd519

    SHA512

    cd0dc52710dc12e23d9a796af2682c003297fc78dd2dacb70dcabd37dc697723563e1b0a7794f69f88393c16b8cf7fe27356dacfff5380ae2931cf8c7141e459

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3544.exe

    Filesize

    350KB

    MD5

    a945f3c479278f71dd7b20091f56c96a

    SHA1

    0271e93d3d6da6b6664b2ca40b374c6422f1e3da

    SHA256

    f02a4bfb45cda59fda0b87df515e1ff805bab8c70f6b665c3224528cc1ebd519

    SHA512

    cd0dc52710dc12e23d9a796af2682c003297fc78dd2dacb70dcabd37dc697723563e1b0a7794f69f88393c16b8cf7fe27356dacfff5380ae2931cf8c7141e459

  • memory/2036-1092-0x0000000004E10000-0x0000000004E22000-memory.dmp

    Filesize

    72KB

  • memory/2036-1093-0x0000000005570000-0x00000000055AE000-memory.dmp

    Filesize

    248KB

  • memory/2036-1106-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/2036-1105-0x0000000006AF0000-0x000000000701C000-memory.dmp

    Filesize

    5.2MB

  • memory/2036-1104-0x0000000006920000-0x0000000006AE2000-memory.dmp

    Filesize

    1.8MB

  • memory/2036-1103-0x00000000068B0000-0x0000000006900000-memory.dmp

    Filesize

    320KB

  • memory/2036-1102-0x0000000006820000-0x0000000006896000-memory.dmp

    Filesize

    472KB

  • memory/2036-1101-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/2036-1100-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/2036-1099-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/2036-1097-0x0000000006530000-0x00000000065C2000-memory.dmp

    Filesize

    584KB

  • memory/2036-1096-0x0000000005830000-0x0000000005896000-memory.dmp

    Filesize

    408KB

  • memory/2036-1095-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/2036-195-0x0000000004D20000-0x0000000004D5E000-memory.dmp

    Filesize

    248KB

  • memory/2036-1094-0x00000000056B0000-0x00000000056FB000-memory.dmp

    Filesize

    300KB

  • memory/2036-1091-0x0000000005460000-0x000000000556A000-memory.dmp

    Filesize

    1.0MB

  • memory/2036-1090-0x0000000005A70000-0x0000000006076000-memory.dmp

    Filesize

    6.0MB

  • memory/2036-301-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/2036-299-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/2036-297-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/2036-295-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/2036-213-0x0000000004D20000-0x0000000004D5E000-memory.dmp

    Filesize

    248KB

  • memory/2036-211-0x0000000004D20000-0x0000000004D5E000-memory.dmp

    Filesize

    248KB

  • memory/2036-178-0x0000000004CA0000-0x0000000004CE6000-memory.dmp

    Filesize

    280KB

  • memory/2036-197-0x0000000004D20000-0x0000000004D5E000-memory.dmp

    Filesize

    248KB

  • memory/2036-180-0x0000000004D20000-0x0000000004D5E000-memory.dmp

    Filesize

    248KB

  • memory/2036-181-0x0000000004D20000-0x0000000004D5E000-memory.dmp

    Filesize

    248KB

  • memory/2036-183-0x0000000004D20000-0x0000000004D5E000-memory.dmp

    Filesize

    248KB

  • memory/2036-185-0x0000000004D20000-0x0000000004D5E000-memory.dmp

    Filesize

    248KB

  • memory/2036-187-0x0000000004D20000-0x0000000004D5E000-memory.dmp

    Filesize

    248KB

  • memory/2036-189-0x0000000004D20000-0x0000000004D5E000-memory.dmp

    Filesize

    248KB

  • memory/2036-191-0x0000000004D20000-0x0000000004D5E000-memory.dmp

    Filesize

    248KB

  • memory/2036-209-0x0000000004D20000-0x0000000004D5E000-memory.dmp

    Filesize

    248KB

  • memory/2036-193-0x0000000004D20000-0x0000000004D5E000-memory.dmp

    Filesize

    248KB

  • memory/2036-179-0x0000000004D20000-0x0000000004D64000-memory.dmp

    Filesize

    272KB

  • memory/2036-199-0x0000000004D20000-0x0000000004D5E000-memory.dmp

    Filesize

    248KB

  • memory/2036-201-0x0000000004D20000-0x0000000004D5E000-memory.dmp

    Filesize

    248KB

  • memory/2036-203-0x0000000004D20000-0x0000000004D5E000-memory.dmp

    Filesize

    248KB

  • memory/2036-205-0x0000000004D20000-0x0000000004D5E000-memory.dmp

    Filesize

    248KB

  • memory/2036-207-0x0000000004D20000-0x0000000004D5E000-memory.dmp

    Filesize

    248KB

  • memory/3748-173-0x0000000000400000-0x000000000070C000-memory.dmp

    Filesize

    3.0MB

  • memory/3748-147-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/3748-139-0x0000000002540000-0x0000000002558000-memory.dmp

    Filesize

    96KB

  • memory/3748-157-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/3748-171-0x00000000024F0000-0x0000000002500000-memory.dmp

    Filesize

    64KB

  • memory/3748-170-0x0000000000400000-0x000000000070C000-memory.dmp

    Filesize

    3.0MB

  • memory/3748-169-0x00000000024F0000-0x0000000002500000-memory.dmp

    Filesize

    64KB

  • memory/3748-168-0x00000000024F0000-0x0000000002500000-memory.dmp

    Filesize

    64KB

  • memory/3748-167-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/3748-137-0x00000000024F0000-0x0000000002500000-memory.dmp

    Filesize

    64KB

  • memory/3748-155-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/3748-165-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/3748-161-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/3748-138-0x0000000004CD0000-0x00000000051CE000-memory.dmp

    Filesize

    5.0MB

  • memory/3748-149-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/3748-140-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/3748-153-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/3748-151-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/3748-163-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/3748-159-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/3748-145-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/3748-143-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/3748-141-0x0000000002540000-0x0000000002552000-memory.dmp

    Filesize

    72KB

  • memory/3748-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/3748-135-0x0000000002370000-0x000000000238A000-memory.dmp

    Filesize

    104KB

  • memory/4816-1112-0x00000000002E0000-0x0000000000312000-memory.dmp

    Filesize

    200KB

  • memory/4816-1113-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

    Filesize

    64KB

  • memory/4816-1114-0x0000000004B60000-0x0000000004BAB000-memory.dmp

    Filesize

    300KB