Analysis

  • max time kernel
    79s
  • max time network
    81s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 13:05

General

  • Target

    6c6c77bb1f375072ae683cb0bfae06c6ff31d7f6097fb5b5832ade48aabdf663.exe

  • Size

    685KB

  • MD5

    aa1954f01bf2372ea6d7e1f6ae360780

  • SHA1

    86d8495cd6b7c06b4c616be6ac1bd8ab4f3f8c2a

  • SHA256

    6c6c77bb1f375072ae683cb0bfae06c6ff31d7f6097fb5b5832ade48aabdf663

  • SHA512

    bbf96a72de075a82cf5220002acf8a421cc86fbd4e75b2889f907ee34678999ab6a38c268373521ddfd45632518700d3dfbc53c55f451943b5a6107ddde45f4e

  • SSDEEP

    12288:hMrey90kGTQhJNY9FFTjzAtPmwIgNF4sfmKpcpgjlKqBKIDullvgEqG:HyzEg4FTPAtuCN6sr+gJKH/voW

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c6c77bb1f375072ae683cb0bfae06c6ff31d7f6097fb5b5832ade48aabdf663.exe
    "C:\Users\Admin\AppData\Local\Temp\6c6c77bb1f375072ae683cb0bfae06c6ff31d7f6097fb5b5832ade48aabdf663.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1780
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un479959.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un479959.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:512
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2359.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2359.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:924
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4187.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4187.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:952
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si644730.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si644730.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3800

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si644730.exe

    Filesize

    175KB

    MD5

    280b7ea781e31ed22d5cef23b3a3f78d

    SHA1

    98aff95648db08491dec414efe336201e92a7c27

    SHA256

    0ee7f90e13c8a9831b0e43541c19fe6cf0f5c1e0261b430871a63dd9367bd366

    SHA512

    4847af3697b7599a68d65a4432d8e157030a8c314cbdb026dfd770a8723b08ab41867339a9aa3d2f83043c4d9842f5eec35c1e273cdab84624bfc4f380a46653

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si644730.exe

    Filesize

    175KB

    MD5

    280b7ea781e31ed22d5cef23b3a3f78d

    SHA1

    98aff95648db08491dec414efe336201e92a7c27

    SHA256

    0ee7f90e13c8a9831b0e43541c19fe6cf0f5c1e0261b430871a63dd9367bd366

    SHA512

    4847af3697b7599a68d65a4432d8e157030a8c314cbdb026dfd770a8723b08ab41867339a9aa3d2f83043c4d9842f5eec35c1e273cdab84624bfc4f380a46653

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un479959.exe

    Filesize

    544KB

    MD5

    c8dac05231194b3cce1940dce4e6b057

    SHA1

    2121c71dda07bfea54c28dbd67c891a750f23438

    SHA256

    175629421b649f5814ad4081f1fb00b79904855da934b1a7750343e535a4c4d8

    SHA512

    2e292d4de68bed4489ff7a8162c3a1aff92fd328311a615e570f481baca1adb70279368d29af9e902bc35223893a880a5a13231d84f8b0e707e72f0eef28dbc2

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un479959.exe

    Filesize

    544KB

    MD5

    c8dac05231194b3cce1940dce4e6b057

    SHA1

    2121c71dda07bfea54c28dbd67c891a750f23438

    SHA256

    175629421b649f5814ad4081f1fb00b79904855da934b1a7750343e535a4c4d8

    SHA512

    2e292d4de68bed4489ff7a8162c3a1aff92fd328311a615e570f481baca1adb70279368d29af9e902bc35223893a880a5a13231d84f8b0e707e72f0eef28dbc2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2359.exe

    Filesize

    292KB

    MD5

    e6f6a36e27234513464fbb560b467fe0

    SHA1

    7083c9b55f660f93d7f9c0a2721e431a7ef05892

    SHA256

    5de3380daca8c0ae2c33475f21e21f95e6f21ca4b0fb050a0913464b98ccda1d

    SHA512

    e9843c3ae1048069c9210de61bd95568f51ef9b8328a01e40108b84908ea360d6a0dfe64517c567ed4533f29d1bcdaf794352b6f006789b8a67d74955bbcac42

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2359.exe

    Filesize

    292KB

    MD5

    e6f6a36e27234513464fbb560b467fe0

    SHA1

    7083c9b55f660f93d7f9c0a2721e431a7ef05892

    SHA256

    5de3380daca8c0ae2c33475f21e21f95e6f21ca4b0fb050a0913464b98ccda1d

    SHA512

    e9843c3ae1048069c9210de61bd95568f51ef9b8328a01e40108b84908ea360d6a0dfe64517c567ed4533f29d1bcdaf794352b6f006789b8a67d74955bbcac42

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4187.exe

    Filesize

    350KB

    MD5

    0ec84b52b0540e525d0a3df3f02ecfec

    SHA1

    ad4e6f366629004eb7b44dd46aff3198bc1b7f50

    SHA256

    7cc8b1d21674347e9736c5b3b39c02c158c6203522043a01768a0f1727f2c6df

    SHA512

    3040cc6b0e450439f8ff9e4508edb252f603e7e1f9d8723dae5c710d29a22399caa7bc8d691667718ffe8f20429dcc1dbcc7b1561fbe74073e420a27bcbb4b22

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4187.exe

    Filesize

    350KB

    MD5

    0ec84b52b0540e525d0a3df3f02ecfec

    SHA1

    ad4e6f366629004eb7b44dd46aff3198bc1b7f50

    SHA256

    7cc8b1d21674347e9736c5b3b39c02c158c6203522043a01768a0f1727f2c6df

    SHA512

    3040cc6b0e450439f8ff9e4508edb252f603e7e1f9d8723dae5c710d29a22399caa7bc8d691667718ffe8f20429dcc1dbcc7b1561fbe74073e420a27bcbb4b22

  • memory/924-133-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/924-134-0x0000000000A40000-0x0000000000A5A000-memory.dmp

    Filesize

    104KB

  • memory/924-135-0x0000000004E50000-0x000000000534E000-memory.dmp

    Filesize

    5.0MB

  • memory/924-137-0x0000000000AB0000-0x0000000000AC8000-memory.dmp

    Filesize

    96KB

  • memory/924-138-0x0000000004E40000-0x0000000004E50000-memory.dmp

    Filesize

    64KB

  • memory/924-136-0x0000000004E40000-0x0000000004E50000-memory.dmp

    Filesize

    64KB

  • memory/924-139-0x0000000004E40000-0x0000000004E50000-memory.dmp

    Filesize

    64KB

  • memory/924-140-0x0000000000AB0000-0x0000000000AC2000-memory.dmp

    Filesize

    72KB

  • memory/924-141-0x0000000000AB0000-0x0000000000AC2000-memory.dmp

    Filesize

    72KB

  • memory/924-143-0x0000000000AB0000-0x0000000000AC2000-memory.dmp

    Filesize

    72KB

  • memory/924-145-0x0000000000AB0000-0x0000000000AC2000-memory.dmp

    Filesize

    72KB

  • memory/924-147-0x0000000000AB0000-0x0000000000AC2000-memory.dmp

    Filesize

    72KB

  • memory/924-149-0x0000000000AB0000-0x0000000000AC2000-memory.dmp

    Filesize

    72KB

  • memory/924-151-0x0000000000AB0000-0x0000000000AC2000-memory.dmp

    Filesize

    72KB

  • memory/924-153-0x0000000000AB0000-0x0000000000AC2000-memory.dmp

    Filesize

    72KB

  • memory/924-155-0x0000000000AB0000-0x0000000000AC2000-memory.dmp

    Filesize

    72KB

  • memory/924-157-0x0000000000AB0000-0x0000000000AC2000-memory.dmp

    Filesize

    72KB

  • memory/924-159-0x0000000000AB0000-0x0000000000AC2000-memory.dmp

    Filesize

    72KB

  • memory/924-161-0x0000000000AB0000-0x0000000000AC2000-memory.dmp

    Filesize

    72KB

  • memory/924-163-0x0000000000AB0000-0x0000000000AC2000-memory.dmp

    Filesize

    72KB

  • memory/924-165-0x0000000000AB0000-0x0000000000AC2000-memory.dmp

    Filesize

    72KB

  • memory/924-167-0x0000000000AB0000-0x0000000000AC2000-memory.dmp

    Filesize

    72KB

  • memory/924-168-0x0000000000400000-0x000000000070C000-memory.dmp

    Filesize

    3.0MB

  • memory/924-169-0x0000000004E40000-0x0000000004E50000-memory.dmp

    Filesize

    64KB

  • memory/924-170-0x0000000004E40000-0x0000000004E50000-memory.dmp

    Filesize

    64KB

  • memory/924-171-0x0000000004E40000-0x0000000004E50000-memory.dmp

    Filesize

    64KB

  • memory/924-173-0x0000000000400000-0x000000000070C000-memory.dmp

    Filesize

    3.0MB

  • memory/952-178-0x00000000027D0000-0x0000000002816000-memory.dmp

    Filesize

    280KB

  • memory/952-179-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/952-180-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

    Filesize

    64KB

  • memory/952-182-0x0000000004CC0000-0x0000000004D04000-memory.dmp

    Filesize

    272KB

  • memory/952-181-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

    Filesize

    64KB

  • memory/952-183-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/952-184-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/952-186-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/952-188-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/952-190-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/952-192-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/952-194-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/952-196-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/952-198-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/952-200-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/952-202-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/952-204-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/952-206-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/952-208-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/952-210-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/952-212-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/952-214-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/952-216-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

    Filesize

    248KB

  • memory/952-327-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

    Filesize

    64KB

  • memory/952-1090-0x0000000005900000-0x0000000005F06000-memory.dmp

    Filesize

    6.0MB

  • memory/952-1091-0x00000000052F0000-0x00000000053FA000-memory.dmp

    Filesize

    1.0MB

  • memory/952-1092-0x0000000005400000-0x0000000005412000-memory.dmp

    Filesize

    72KB

  • memory/952-1093-0x0000000005420000-0x000000000545E000-memory.dmp

    Filesize

    248KB

  • memory/952-1094-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

    Filesize

    64KB

  • memory/952-1095-0x0000000005560000-0x00000000055AB000-memory.dmp

    Filesize

    300KB

  • memory/952-1097-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

    Filesize

    64KB

  • memory/952-1098-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

    Filesize

    64KB

  • memory/952-1099-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

    Filesize

    64KB

  • memory/952-1100-0x00000000056F0000-0x0000000005756000-memory.dmp

    Filesize

    408KB

  • memory/952-1101-0x00000000063F0000-0x0000000006482000-memory.dmp

    Filesize

    584KB

  • memory/952-1102-0x00000000065B0000-0x0000000006772000-memory.dmp

    Filesize

    1.8MB

  • memory/952-1103-0x0000000006790000-0x0000000006CBC000-memory.dmp

    Filesize

    5.2MB

  • memory/952-1104-0x0000000004DE0000-0x0000000004DF0000-memory.dmp

    Filesize

    64KB

  • memory/952-1105-0x0000000007070000-0x00000000070E6000-memory.dmp

    Filesize

    472KB

  • memory/952-1106-0x0000000007100000-0x0000000007150000-memory.dmp

    Filesize

    320KB

  • memory/3800-1112-0x00000000005A0000-0x00000000005D2000-memory.dmp

    Filesize

    200KB

  • memory/3800-1113-0x0000000004E90000-0x0000000004EA0000-memory.dmp

    Filesize

    64KB

  • memory/3800-1114-0x0000000004E20000-0x0000000004E6B000-memory.dmp

    Filesize

    300KB