Analysis

  • max time kernel
    82s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 13:12

General

  • Target

    4a74568da4919b8a0eb3c4aa44781a17aab607692f6721a9765a3154e300b9a5.exe

  • Size

    686KB

  • MD5

    e5f9212180cc22c56345dda510d84d98

  • SHA1

    0e8e7f4bb11926ef6d4269a1f2f844adef7a4f2b

  • SHA256

    4a74568da4919b8a0eb3c4aa44781a17aab607692f6721a9765a3154e300b9a5

  • SHA512

    52a1162c686f4e2a4790f337829335df1ce33524120b35b3b6797299148c61dfe0fdb0b16954593103cf5d03f460974ef959cba700d6146c1d11c99ec9ac2ef5

  • SSDEEP

    12288:IMrKy90Xsfp7Ja3I/TxTkS8GPCSdj3GFf8Bf5R0YKZsyl+pwhIHhm:iyushda36CGPCi3GFKc1vyHhm

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4a74568da4919b8a0eb3c4aa44781a17aab607692f6721a9765a3154e300b9a5.exe
    "C:\Users\Admin\AppData\Local\Temp\4a74568da4919b8a0eb3c4aa44781a17aab607692f6721a9765a3154e300b9a5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4632
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un396925.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un396925.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5032
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9148.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9148.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4944
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 1084
          4⤵
          • Program crash
          PID:220
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8264.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8264.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4844
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4844 -s 1348
          4⤵
          • Program crash
          PID:5112
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si062377.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si062377.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4448
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4944 -ip 4944
    1⤵
      PID:3860
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 4844 -ip 4844
      1⤵
        PID:4784

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si062377.exe

        Filesize

        175KB

        MD5

        8e760a607ee3f02a2271286e5a5985e6

        SHA1

        886e287de76f961f10b82f33fe750ef2b892ba85

        SHA256

        9fdf81ee4042922b4dccfafa680ea61f970421aa7e713492ec04d195cb44f751

        SHA512

        98fd411afa65a218c5f39483a3c115ba80260716e20eac5a105c27e9018b641b4b069220a033954833cd7922ef9d3c152db7b3338390898ee8611c6c31a724ca

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si062377.exe

        Filesize

        175KB

        MD5

        8e760a607ee3f02a2271286e5a5985e6

        SHA1

        886e287de76f961f10b82f33fe750ef2b892ba85

        SHA256

        9fdf81ee4042922b4dccfafa680ea61f970421aa7e713492ec04d195cb44f751

        SHA512

        98fd411afa65a218c5f39483a3c115ba80260716e20eac5a105c27e9018b641b4b069220a033954833cd7922ef9d3c152db7b3338390898ee8611c6c31a724ca

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un396925.exe

        Filesize

        544KB

        MD5

        95174f43434c4eab6617f666cee14311

        SHA1

        901a73a9840ce02c6a1be099956cb124721d83bc

        SHA256

        c57dc6734170c74b255d523e0baf0ff3509d98fe4bc38ef10774514b4775ec88

        SHA512

        f54453811f23650dfa4f8a4ab2eb3f7fa2fd0f6dd63e11f80582880500f9c4ef7ec946948cc4e2b8d3dc471e87f04eeb17158319e28bdf8be725e1db230fa589

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un396925.exe

        Filesize

        544KB

        MD5

        95174f43434c4eab6617f666cee14311

        SHA1

        901a73a9840ce02c6a1be099956cb124721d83bc

        SHA256

        c57dc6734170c74b255d523e0baf0ff3509d98fe4bc38ef10774514b4775ec88

        SHA512

        f54453811f23650dfa4f8a4ab2eb3f7fa2fd0f6dd63e11f80582880500f9c4ef7ec946948cc4e2b8d3dc471e87f04eeb17158319e28bdf8be725e1db230fa589

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9148.exe

        Filesize

        292KB

        MD5

        d125862b25a3bf2f09b892cdd65eada4

        SHA1

        89c15790483ce7578b1982109e267f744344177e

        SHA256

        e7f7425f59bcf4ee14f3edded2ddebe7a835a993b9de6a92b0500a0909df9b55

        SHA512

        28ac963785ab20f7a80c674b10b19bf84b2508be2af88a18ac5251b0ac60f4f51a856ede0414c7872b2f02742829d1236783f712055f919b7f657f234baef18f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9148.exe

        Filesize

        292KB

        MD5

        d125862b25a3bf2f09b892cdd65eada4

        SHA1

        89c15790483ce7578b1982109e267f744344177e

        SHA256

        e7f7425f59bcf4ee14f3edded2ddebe7a835a993b9de6a92b0500a0909df9b55

        SHA512

        28ac963785ab20f7a80c674b10b19bf84b2508be2af88a18ac5251b0ac60f4f51a856ede0414c7872b2f02742829d1236783f712055f919b7f657f234baef18f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8264.exe

        Filesize

        350KB

        MD5

        c39ec450ff9e03568e922c2c7ac14b00

        SHA1

        84f0047eee220dacc8eca70822f3d5a908403641

        SHA256

        8727011af99e685e88dfa8c3fedb84d029b7e984180db39538395b1a49c4562a

        SHA512

        0718a2c28e2327badbd764e20d40b4834b9542d6a2265f72ebcace39b5bfb14aa9c4cc3eb2f6a21a36e48c542051e5526f508819c7259907ac2e3cbe7003cce5

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8264.exe

        Filesize

        350KB

        MD5

        c39ec450ff9e03568e922c2c7ac14b00

        SHA1

        84f0047eee220dacc8eca70822f3d5a908403641

        SHA256

        8727011af99e685e88dfa8c3fedb84d029b7e984180db39538395b1a49c4562a

        SHA512

        0718a2c28e2327badbd764e20d40b4834b9542d6a2265f72ebcace39b5bfb14aa9c4cc3eb2f6a21a36e48c542051e5526f508819c7259907ac2e3cbe7003cce5

      • memory/4448-1123-0x00000000056D0000-0x00000000056E0000-memory.dmp

        Filesize

        64KB

      • memory/4448-1122-0x0000000000E60000-0x0000000000E92000-memory.dmp

        Filesize

        200KB

      • memory/4844-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/4844-1104-0x0000000004D90000-0x0000000004DA0000-memory.dmp

        Filesize

        64KB

      • memory/4844-1116-0x0000000004D90000-0x0000000004DA0000-memory.dmp

        Filesize

        64KB

      • memory/4844-1115-0x0000000006AE0000-0x000000000700C000-memory.dmp

        Filesize

        5.2MB

      • memory/4844-1114-0x0000000006900000-0x0000000006AC2000-memory.dmp

        Filesize

        1.8MB

      • memory/4844-1113-0x0000000004D90000-0x0000000004DA0000-memory.dmp

        Filesize

        64KB

      • memory/4844-1112-0x0000000004D90000-0x0000000004DA0000-memory.dmp

        Filesize

        64KB

      • memory/4844-1111-0x0000000004D90000-0x0000000004DA0000-memory.dmp

        Filesize

        64KB

      • memory/4844-1110-0x00000000068A0000-0x00000000068F0000-memory.dmp

        Filesize

        320KB

      • memory/4844-1109-0x0000000006810000-0x0000000006886000-memory.dmp

        Filesize

        472KB

      • memory/4844-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/4844-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/4844-1105-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/4844-1103-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/4844-1101-0x0000000005460000-0x0000000005A78000-memory.dmp

        Filesize

        6.1MB

      • memory/4844-472-0x0000000004D90000-0x0000000004DA0000-memory.dmp

        Filesize

        64KB

      • memory/4844-476-0x0000000004D90000-0x0000000004DA0000-memory.dmp

        Filesize

        64KB

      • memory/4844-474-0x0000000004D90000-0x0000000004DA0000-memory.dmp

        Filesize

        64KB

      • memory/4844-225-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4844-223-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4844-221-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4844-191-0x00000000009E0000-0x0000000000A2B000-memory.dmp

        Filesize

        300KB

      • memory/4844-193-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4844-192-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4844-195-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4844-197-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4844-199-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4844-201-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4844-203-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4844-205-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4844-207-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4844-209-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4844-211-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4844-213-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4844-215-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4844-217-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4844-219-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4944-176-0x0000000002640000-0x0000000002652000-memory.dmp

        Filesize

        72KB

      • memory/4944-183-0x0000000002660000-0x0000000002670000-memory.dmp

        Filesize

        64KB

      • memory/4944-154-0x0000000002640000-0x0000000002652000-memory.dmp

        Filesize

        72KB

      • memory/4944-184-0x0000000002660000-0x0000000002670000-memory.dmp

        Filesize

        64KB

      • memory/4944-174-0x0000000002640000-0x0000000002652000-memory.dmp

        Filesize

        72KB

      • memory/4944-182-0x0000000002660000-0x0000000002670000-memory.dmp

        Filesize

        64KB

      • memory/4944-181-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/4944-172-0x0000000002640000-0x0000000002652000-memory.dmp

        Filesize

        72KB

      • memory/4944-180-0x0000000002660000-0x0000000002670000-memory.dmp

        Filesize

        64KB

      • memory/4944-158-0x0000000002640000-0x0000000002652000-memory.dmp

        Filesize

        72KB

      • memory/4944-179-0x0000000002660000-0x0000000002670000-memory.dmp

        Filesize

        64KB

      • memory/4944-178-0x0000000002640000-0x0000000002652000-memory.dmp

        Filesize

        72KB

      • memory/4944-186-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/4944-156-0x0000000002640000-0x0000000002652000-memory.dmp

        Filesize

        72KB

      • memory/4944-152-0x0000000002640000-0x0000000002652000-memory.dmp

        Filesize

        72KB

      • memory/4944-170-0x0000000002640000-0x0000000002652000-memory.dmp

        Filesize

        72KB

      • memory/4944-168-0x0000000002640000-0x0000000002652000-memory.dmp

        Filesize

        72KB

      • memory/4944-166-0x0000000002640000-0x0000000002652000-memory.dmp

        Filesize

        72KB

      • memory/4944-164-0x0000000002640000-0x0000000002652000-memory.dmp

        Filesize

        72KB

      • memory/4944-162-0x0000000002640000-0x0000000002652000-memory.dmp

        Filesize

        72KB

      • memory/4944-160-0x0000000002640000-0x0000000002652000-memory.dmp

        Filesize

        72KB

      • memory/4944-151-0x0000000002640000-0x0000000002652000-memory.dmp

        Filesize

        72KB

      • memory/4944-150-0x0000000004DE0000-0x0000000005384000-memory.dmp

        Filesize

        5.6MB

      • memory/4944-149-0x0000000002660000-0x0000000002670000-memory.dmp

        Filesize

        64KB

      • memory/4944-148-0x00000000008B0000-0x00000000008DD000-memory.dmp

        Filesize

        180KB