Analysis

  • max time kernel
    91s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 13:08

General

  • Target

    4a9fcf34066ff7b2309815f4e41563827e8e3b553c7fb223cd7c5c74213b17e3.exe

  • Size

    685KB

  • MD5

    368f7dad82b39ca2d63f15c6c3c0d410

  • SHA1

    0c67cc81fb297678cc6b0c4db6f42da0b4531159

  • SHA256

    4a9fcf34066ff7b2309815f4e41563827e8e3b553c7fb223cd7c5c74213b17e3

  • SHA512

    8b489f565c3a870b3f530c088f6befaadf40f7c6bd044fd62ce935787608d139bae5f7bc5ecee12788065a0caf5c71529b0a8cd0c0b286144890a45e12a789c6

  • SSDEEP

    12288:OMr8y90WRIJ5pwCmfq2tPrBxkwzSDnE02eTZKvWflACDlM48V:+yo5pVWPrBxkwYnE0rk2HpM48V

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a9fcf34066ff7b2309815f4e41563827e8e3b553c7fb223cd7c5c74213b17e3.exe
    "C:\Users\Admin\AppData\Local\Temp\4a9fcf34066ff7b2309815f4e41563827e8e3b553c7fb223cd7c5c74213b17e3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3856
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un629177.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un629177.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2008
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0615.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0615.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1288
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1288 -s 1088
          4⤵
          • Program crash
          PID:2216
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2772.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2772.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2084
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2084 -s 1356
          4⤵
          • Program crash
          PID:1596
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si205911.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si205911.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:224
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1288 -ip 1288
    1⤵
      PID:1528
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2084 -ip 2084
      1⤵
        PID:2232

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si205911.exe

        Filesize

        175KB

        MD5

        863de3cb37053bfce6509ac1bccc98a0

        SHA1

        fc7b3163dacea05b158add41c1c26ac1c58cb56c

        SHA256

        08331949caf4d4f7ab37fbc91cfa8d5d92cb65d6b8446ab8a05ba77a662fb19e

        SHA512

        d3c31586f0d157ba7a4fae7a306ffdd59dc11da725e8e010d6361e2d03de03527c9b58989f34967bbff62c30d1d034a8a6438b2b66fdf949a3ae92fd037d1525

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si205911.exe

        Filesize

        175KB

        MD5

        863de3cb37053bfce6509ac1bccc98a0

        SHA1

        fc7b3163dacea05b158add41c1c26ac1c58cb56c

        SHA256

        08331949caf4d4f7ab37fbc91cfa8d5d92cb65d6b8446ab8a05ba77a662fb19e

        SHA512

        d3c31586f0d157ba7a4fae7a306ffdd59dc11da725e8e010d6361e2d03de03527c9b58989f34967bbff62c30d1d034a8a6438b2b66fdf949a3ae92fd037d1525

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un629177.exe

        Filesize

        543KB

        MD5

        71246319e81938bf21e8b19efcbaa642

        SHA1

        2e24e69ecbb1a0730594e28971f0c9e60fbb408f

        SHA256

        ef37f966783c426c70993db80a49e2e4fbe4bafdb78ac8ab1d5d0ef5a9533c33

        SHA512

        db868472b3ad8880b569cf7c2d90f6935097b9b32ef081af9a4da9d2df2db081e49c476e33e57baad07bd554f7a53d401c60ef26f298fb78de015a8230ac7802

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un629177.exe

        Filesize

        543KB

        MD5

        71246319e81938bf21e8b19efcbaa642

        SHA1

        2e24e69ecbb1a0730594e28971f0c9e60fbb408f

        SHA256

        ef37f966783c426c70993db80a49e2e4fbe4bafdb78ac8ab1d5d0ef5a9533c33

        SHA512

        db868472b3ad8880b569cf7c2d90f6935097b9b32ef081af9a4da9d2df2db081e49c476e33e57baad07bd554f7a53d401c60ef26f298fb78de015a8230ac7802

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0615.exe

        Filesize

        292KB

        MD5

        676eaf0877bac9225f496b2339a62ea9

        SHA1

        4053e6b263dba2223df1899f0e0b88743c262ad4

        SHA256

        fe7eee716e34fc9b9c3dc9595f18a8f75c78667c1f3dd694bfeb4be844a75056

        SHA512

        f2734b1f8a81b2bf8c20467559edb6bfc6033ec4deaa12dc0e41030fff681324e3aff44f1056ac05d37fe2644608b75f7e8081a10cd05ab8ff803cbbfd66db48

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0615.exe

        Filesize

        292KB

        MD5

        676eaf0877bac9225f496b2339a62ea9

        SHA1

        4053e6b263dba2223df1899f0e0b88743c262ad4

        SHA256

        fe7eee716e34fc9b9c3dc9595f18a8f75c78667c1f3dd694bfeb4be844a75056

        SHA512

        f2734b1f8a81b2bf8c20467559edb6bfc6033ec4deaa12dc0e41030fff681324e3aff44f1056ac05d37fe2644608b75f7e8081a10cd05ab8ff803cbbfd66db48

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2772.exe

        Filesize

        350KB

        MD5

        a11d0d2998ae8b8a4223a2b12272dfa2

        SHA1

        d58f14e89437b493c2c9956781e9f2c7f5f99005

        SHA256

        ccd4a5e5d8fe2ab7ed3c2aaf983d1b9e39f0e7e6e5ecc5b64f9a7d307b9a70c7

        SHA512

        3a82d9d3c17fa1d219e74f63e9d4aba8204c2210887147d788a8867e3f0560034609eb615c199936351330b62a91564894816c1d87b8987089a85f81f3884fc2

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2772.exe

        Filesize

        350KB

        MD5

        a11d0d2998ae8b8a4223a2b12272dfa2

        SHA1

        d58f14e89437b493c2c9956781e9f2c7f5f99005

        SHA256

        ccd4a5e5d8fe2ab7ed3c2aaf983d1b9e39f0e7e6e5ecc5b64f9a7d307b9a70c7

        SHA512

        3a82d9d3c17fa1d219e74f63e9d4aba8204c2210887147d788a8867e3f0560034609eb615c199936351330b62a91564894816c1d87b8987089a85f81f3884fc2

      • memory/224-1122-0x00000000008D0000-0x0000000000902000-memory.dmp

        Filesize

        200KB

      • memory/224-1123-0x0000000005550000-0x0000000005560000-memory.dmp

        Filesize

        64KB

      • memory/1288-157-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/1288-171-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/1288-151-0x0000000004F10000-0x00000000054B4000-memory.dmp

        Filesize

        5.6MB

      • memory/1288-152-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/1288-153-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/1288-155-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/1288-149-0x0000000004F00000-0x0000000004F10000-memory.dmp

        Filesize

        64KB

      • memory/1288-159-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/1288-161-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/1288-163-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/1288-165-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/1288-167-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/1288-169-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/1288-150-0x0000000004F00000-0x0000000004F10000-memory.dmp

        Filesize

        64KB

      • memory/1288-173-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/1288-175-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/1288-177-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/1288-179-0x00000000025E0000-0x00000000025F2000-memory.dmp

        Filesize

        72KB

      • memory/1288-180-0x0000000004F00000-0x0000000004F10000-memory.dmp

        Filesize

        64KB

      • memory/1288-181-0x0000000004F00000-0x0000000004F10000-memory.dmp

        Filesize

        64KB

      • memory/1288-182-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/1288-183-0x0000000004F00000-0x0000000004F10000-memory.dmp

        Filesize

        64KB

      • memory/1288-185-0x0000000004F00000-0x0000000004F10000-memory.dmp

        Filesize

        64KB

      • memory/1288-186-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/1288-148-0x00000000008B0000-0x00000000008DD000-memory.dmp

        Filesize

        180KB

      • memory/2084-194-0x0000000005310000-0x000000000534E000-memory.dmp

        Filesize

        248KB

      • memory/2084-233-0x0000000002530000-0x0000000002540000-memory.dmp

        Filesize

        64KB

      • memory/2084-196-0x0000000005310000-0x000000000534E000-memory.dmp

        Filesize

        248KB

      • memory/2084-198-0x0000000005310000-0x000000000534E000-memory.dmp

        Filesize

        248KB

      • memory/2084-200-0x0000000005310000-0x000000000534E000-memory.dmp

        Filesize

        248KB

      • memory/2084-202-0x0000000005310000-0x000000000534E000-memory.dmp

        Filesize

        248KB

      • memory/2084-204-0x0000000005310000-0x000000000534E000-memory.dmp

        Filesize

        248KB

      • memory/2084-206-0x0000000005310000-0x000000000534E000-memory.dmp

        Filesize

        248KB

      • memory/2084-208-0x0000000005310000-0x000000000534E000-memory.dmp

        Filesize

        248KB

      • memory/2084-210-0x0000000005310000-0x000000000534E000-memory.dmp

        Filesize

        248KB

      • memory/2084-212-0x0000000005310000-0x000000000534E000-memory.dmp

        Filesize

        248KB

      • memory/2084-214-0x0000000005310000-0x000000000534E000-memory.dmp

        Filesize

        248KB

      • memory/2084-216-0x0000000005310000-0x000000000534E000-memory.dmp

        Filesize

        248KB

      • memory/2084-218-0x0000000005310000-0x000000000534E000-memory.dmp

        Filesize

        248KB

      • memory/2084-220-0x0000000005310000-0x000000000534E000-memory.dmp

        Filesize

        248KB

      • memory/2084-222-0x0000000005310000-0x000000000534E000-memory.dmp

        Filesize

        248KB

      • memory/2084-224-0x0000000005310000-0x000000000534E000-memory.dmp

        Filesize

        248KB

      • memory/2084-229-0x00000000023E0000-0x000000000242B000-memory.dmp

        Filesize

        300KB

      • memory/2084-231-0x0000000002530000-0x0000000002540000-memory.dmp

        Filesize

        64KB

      • memory/2084-192-0x0000000005310000-0x000000000534E000-memory.dmp

        Filesize

        248KB

      • memory/2084-235-0x0000000002530000-0x0000000002540000-memory.dmp

        Filesize

        64KB

      • memory/2084-1101-0x0000000005490000-0x0000000005AA8000-memory.dmp

        Filesize

        6.1MB

      • memory/2084-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/2084-1103-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/2084-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/2084-1105-0x0000000002530000-0x0000000002540000-memory.dmp

        Filesize

        64KB

      • memory/2084-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/2084-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/2084-1109-0x0000000002530000-0x0000000002540000-memory.dmp

        Filesize

        64KB

      • memory/2084-1110-0x0000000002530000-0x0000000002540000-memory.dmp

        Filesize

        64KB

      • memory/2084-1111-0x0000000002530000-0x0000000002540000-memory.dmp

        Filesize

        64KB

      • memory/2084-1112-0x0000000006950000-0x00000000069C6000-memory.dmp

        Filesize

        472KB

      • memory/2084-1113-0x00000000069E0000-0x0000000006A30000-memory.dmp

        Filesize

        320KB

      • memory/2084-191-0x0000000005310000-0x000000000534E000-memory.dmp

        Filesize

        248KB

      • memory/2084-1114-0x0000000006A40000-0x0000000006C02000-memory.dmp

        Filesize

        1.8MB

      • memory/2084-1115-0x0000000006C20000-0x000000000714C000-memory.dmp

        Filesize

        5.2MB

      • memory/2084-1116-0x0000000002530000-0x0000000002540000-memory.dmp

        Filesize

        64KB