Analysis

  • max time kernel
    65s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 13:50

General

  • Target

    cb7598bec9144e0910a723b8b35e37169d7d54a7ddba6fd8e602ecdff00495cd.exe

  • Size

    685KB

  • MD5

    0c4bf728035c00a762008b153586681a

  • SHA1

    093e863c446f4ee217ceeb9599ba5f87cd6e2b00

  • SHA256

    cb7598bec9144e0910a723b8b35e37169d7d54a7ddba6fd8e602ecdff00495cd

  • SHA512

    e7580cab46c92a406fe095d4f69f226e7a868c6ffe2342609f42307ad36ad42fa36db78137ed58c18ecdbd214c08b44d3bf474585e4e47e830ecfc39af27ef9f

  • SSDEEP

    12288:nMrGy90majJWUsYa48ulwEFs3YCGiXsSBH1zTHVhgsnnRpAKBz8gEiUuP5zb9g:dyUo//4FaEOtL/VzTvgsnnRjp8gE1uxO

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb7598bec9144e0910a723b8b35e37169d7d54a7ddba6fd8e602ecdff00495cd.exe
    "C:\Users\Admin\AppData\Local\Temp\cb7598bec9144e0910a723b8b35e37169d7d54a7ddba6fd8e602ecdff00495cd.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un180532.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un180532.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3824
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7284.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7284.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:860
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 860 -s 1084
          4⤵
          • Program crash
          PID:2568
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9778.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9778.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4488
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 1940
          4⤵
          • Program crash
          PID:4884
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si031051.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si031051.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4068
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 860 -ip 860
    1⤵
      PID:3892
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4488 -ip 4488
      1⤵
        PID:3904

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si031051.exe

        Filesize

        175KB

        MD5

        6346a8748bf058eaa8e3a029a788973b

        SHA1

        89e678bcb4b8bbd1584e5de9cdc9654a9b7c26cb

        SHA256

        8dae56bc3350bd1256ca826c142335a493c61afc928f57f86386918dddc10138

        SHA512

        31684ef4ede2d95eb67f82c8ae6a505f45f88ef950e317cd2de5c907dfc79c1c4aaecbf35f829c4f15c9ef78f475bbc8d622bc3bd839b23fb8246227d2a8eb09

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si031051.exe

        Filesize

        175KB

        MD5

        6346a8748bf058eaa8e3a029a788973b

        SHA1

        89e678bcb4b8bbd1584e5de9cdc9654a9b7c26cb

        SHA256

        8dae56bc3350bd1256ca826c142335a493c61afc928f57f86386918dddc10138

        SHA512

        31684ef4ede2d95eb67f82c8ae6a505f45f88ef950e317cd2de5c907dfc79c1c4aaecbf35f829c4f15c9ef78f475bbc8d622bc3bd839b23fb8246227d2a8eb09

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un180532.exe

        Filesize

        543KB

        MD5

        d5c3bf9ad3083eed7455d06b73e2d319

        SHA1

        028c7d7b285848a7794b0f1f336f654ca4c445f6

        SHA256

        f87cbbd88825487d7997b15cae6648cb5c063a8b38c7a6ec876ec93a80f0a98f

        SHA512

        7f9e157b70243f450e1f508bbd9c096856473b105e5db704b1853f80153e2ffed8b0dc18f14f35bef8154e2a22f302809f01f2d4a68d20acc6dafd78b3656929

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un180532.exe

        Filesize

        543KB

        MD5

        d5c3bf9ad3083eed7455d06b73e2d319

        SHA1

        028c7d7b285848a7794b0f1f336f654ca4c445f6

        SHA256

        f87cbbd88825487d7997b15cae6648cb5c063a8b38c7a6ec876ec93a80f0a98f

        SHA512

        7f9e157b70243f450e1f508bbd9c096856473b105e5db704b1853f80153e2ffed8b0dc18f14f35bef8154e2a22f302809f01f2d4a68d20acc6dafd78b3656929

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7284.exe

        Filesize

        292KB

        MD5

        369e95e51729a22a25957712385bab68

        SHA1

        1d309ddf4320ce69a11f573ca39ecf7f3e886d8b

        SHA256

        c53a7e02c381fd89a56b0aab8b1a996f58f203599f8348b04b3f2e1b0a99a2e7

        SHA512

        7ed03e104e12528e8d940d6b1c87432e9b7ed965bab1dc2a9f578f8e49d11be990df6925d1ea4fd01d07f492e78c55088133b5551df716d1afc9f1eb870363ee

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7284.exe

        Filesize

        292KB

        MD5

        369e95e51729a22a25957712385bab68

        SHA1

        1d309ddf4320ce69a11f573ca39ecf7f3e886d8b

        SHA256

        c53a7e02c381fd89a56b0aab8b1a996f58f203599f8348b04b3f2e1b0a99a2e7

        SHA512

        7ed03e104e12528e8d940d6b1c87432e9b7ed965bab1dc2a9f578f8e49d11be990df6925d1ea4fd01d07f492e78c55088133b5551df716d1afc9f1eb870363ee

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9778.exe

        Filesize

        350KB

        MD5

        f504e8077c89428bd7c28bb9ecce2119

        SHA1

        2bdb574df0c84482d5b19cb14ac28828a59ae26d

        SHA256

        9ae1cfdbaffc451da29bc31ec55bf4e663b5c659b6f34e0d538a66a03121e314

        SHA512

        f971788436e4d9dfa12553bf4eb34c78985118f38ce0e3f943afdbf49878d1823c80c12b99475b4a3027b963cd594266cfdae6e2e20eecf1f5619645f21fd918

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9778.exe

        Filesize

        350KB

        MD5

        f504e8077c89428bd7c28bb9ecce2119

        SHA1

        2bdb574df0c84482d5b19cb14ac28828a59ae26d

        SHA256

        9ae1cfdbaffc451da29bc31ec55bf4e663b5c659b6f34e0d538a66a03121e314

        SHA512

        f971788436e4d9dfa12553bf4eb34c78985118f38ce0e3f943afdbf49878d1823c80c12b99475b4a3027b963cd594266cfdae6e2e20eecf1f5619645f21fd918

      • memory/860-148-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/860-149-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/860-150-0x0000000004E40000-0x00000000053E4000-memory.dmp

        Filesize

        5.6MB

      • memory/860-151-0x0000000002780000-0x0000000002792000-memory.dmp

        Filesize

        72KB

      • memory/860-152-0x0000000002780000-0x0000000002792000-memory.dmp

        Filesize

        72KB

      • memory/860-154-0x0000000002780000-0x0000000002792000-memory.dmp

        Filesize

        72KB

      • memory/860-159-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/860-157-0x0000000002780000-0x0000000002792000-memory.dmp

        Filesize

        72KB

      • memory/860-156-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/860-160-0x0000000002780000-0x0000000002792000-memory.dmp

        Filesize

        72KB

      • memory/860-162-0x0000000002780000-0x0000000002792000-memory.dmp

        Filesize

        72KB

      • memory/860-164-0x0000000002780000-0x0000000002792000-memory.dmp

        Filesize

        72KB

      • memory/860-166-0x0000000002780000-0x0000000002792000-memory.dmp

        Filesize

        72KB

      • memory/860-168-0x0000000002780000-0x0000000002792000-memory.dmp

        Filesize

        72KB

      • memory/860-170-0x0000000002780000-0x0000000002792000-memory.dmp

        Filesize

        72KB

      • memory/860-172-0x0000000002780000-0x0000000002792000-memory.dmp

        Filesize

        72KB

      • memory/860-174-0x0000000002780000-0x0000000002792000-memory.dmp

        Filesize

        72KB

      • memory/860-176-0x0000000002780000-0x0000000002792000-memory.dmp

        Filesize

        72KB

      • memory/860-178-0x0000000002780000-0x0000000002792000-memory.dmp

        Filesize

        72KB

      • memory/860-180-0x0000000002780000-0x0000000002792000-memory.dmp

        Filesize

        72KB

      • memory/860-181-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/860-182-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/860-184-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/860-185-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/860-186-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/4068-1122-0x00000000008F0000-0x0000000000922000-memory.dmp

        Filesize

        200KB

      • memory/4068-1123-0x0000000005480000-0x0000000005490000-memory.dmp

        Filesize

        64KB

      • memory/4488-194-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/4488-229-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/4488-196-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/4488-198-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/4488-200-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/4488-202-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/4488-204-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/4488-206-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/4488-208-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/4488-210-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/4488-212-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/4488-214-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/4488-220-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/4488-218-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/4488-216-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/4488-222-0x0000000000820000-0x000000000086B000-memory.dmp

        Filesize

        300KB

      • memory/4488-223-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/4488-224-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/4488-227-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/4488-192-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/4488-226-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/4488-1101-0x00000000053C0000-0x00000000059D8000-memory.dmp

        Filesize

        6.1MB

      • memory/4488-1102-0x00000000059E0000-0x0000000005AEA000-memory.dmp

        Filesize

        1.0MB

      • memory/4488-1103-0x0000000005B00000-0x0000000005B12000-memory.dmp

        Filesize

        72KB

      • memory/4488-1104-0x0000000005B20000-0x0000000005B5C000-memory.dmp

        Filesize

        240KB

      • memory/4488-1105-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/4488-1107-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/4488-1108-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/4488-1109-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/4488-1110-0x0000000005E10000-0x0000000005EA2000-memory.dmp

        Filesize

        584KB

      • memory/4488-1111-0x0000000005EB0000-0x0000000005F16000-memory.dmp

        Filesize

        408KB

      • memory/4488-1112-0x0000000004E00000-0x0000000004E10000-memory.dmp

        Filesize

        64KB

      • memory/4488-1113-0x0000000007AC0000-0x0000000007C82000-memory.dmp

        Filesize

        1.8MB

      • memory/4488-191-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/4488-1114-0x0000000007C90000-0x00000000081BC000-memory.dmp

        Filesize

        5.2MB

      • memory/4488-1115-0x0000000008280000-0x00000000082F6000-memory.dmp

        Filesize

        472KB

      • memory/4488-1116-0x0000000008300000-0x0000000008350000-memory.dmp

        Filesize

        320KB