Analysis

  • max time kernel
    50s
  • max time network
    148s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 13:27

General

  • Target

    8d01982f40e89f72514d7a31a539b7910f2c384f30d711d7b9267ed0ea48ea92.exe

  • Size

    685KB

  • MD5

    3373edb3d88329229d97f1eda61aab6c

  • SHA1

    8deabab3a00ca4b32388bfed1d0a8d0a08b4d41a

  • SHA256

    8d01982f40e89f72514d7a31a539b7910f2c384f30d711d7b9267ed0ea48ea92

  • SHA512

    6bf18eac35875d8b46cfb6a09011167a87b6fd384178d8704e43b1aa2e805e337abca48cb0da940b7f2d57a97025f2adf74925912da657d3df9016f175c65305

  • SSDEEP

    12288:bMrBy90LkBCCzrOC6lXzURraj9/cjh/ZhXtcPmjvNxXB7BBavEMXiFXTXB1W3ctL:2y0gSjae9/cjznVvNxXZ7avEMSRxoMd

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8d01982f40e89f72514d7a31a539b7910f2c384f30d711d7b9267ed0ea48ea92.exe
    "C:\Users\Admin\AppData\Local\Temp\8d01982f40e89f72514d7a31a539b7910f2c384f30d711d7b9267ed0ea48ea92.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:400
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un936606.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un936606.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4268
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9454.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9454.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2396
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2518.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2518.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3620
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si947188.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si947188.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4260

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si947188.exe

    Filesize

    175KB

    MD5

    0ae2ff02889ac0c87e8ae99e3e3670f7

    SHA1

    90cea670bb8286b95f99f186a6bcfd34d84e455a

    SHA256

    ad93b083cbb0f88f7087cbad99201020667241c8bcdc932bde64e7ce85f333cc

    SHA512

    954237dc458966378ef5f71189adaaa784fedd833753baeee529b8e05230fe5b7217aa0f3f9ed819c2a5326b08fe6a3159834b0100f84f721d4b3e3934c520d9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si947188.exe

    Filesize

    175KB

    MD5

    0ae2ff02889ac0c87e8ae99e3e3670f7

    SHA1

    90cea670bb8286b95f99f186a6bcfd34d84e455a

    SHA256

    ad93b083cbb0f88f7087cbad99201020667241c8bcdc932bde64e7ce85f333cc

    SHA512

    954237dc458966378ef5f71189adaaa784fedd833753baeee529b8e05230fe5b7217aa0f3f9ed819c2a5326b08fe6a3159834b0100f84f721d4b3e3934c520d9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un936606.exe

    Filesize

    543KB

    MD5

    71cf28c461250a761a4142a645e1e039

    SHA1

    6ecb94e4490d3d2bb8f776a56abf2238ea833d17

    SHA256

    576abd2771f21959fd7d5fe526fb92031ac31dbe5b8c7f93608c2b89b34b2d9f

    SHA512

    c2ad4ee6e1958102959395a703ddbc5f9c10c0292839aaacf3f21e05899d3268281d477821eaaf36bc2921dc4fd396a8e6321d787fe0fd2d843f021da7953434

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un936606.exe

    Filesize

    543KB

    MD5

    71cf28c461250a761a4142a645e1e039

    SHA1

    6ecb94e4490d3d2bb8f776a56abf2238ea833d17

    SHA256

    576abd2771f21959fd7d5fe526fb92031ac31dbe5b8c7f93608c2b89b34b2d9f

    SHA512

    c2ad4ee6e1958102959395a703ddbc5f9c10c0292839aaacf3f21e05899d3268281d477821eaaf36bc2921dc4fd396a8e6321d787fe0fd2d843f021da7953434

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9454.exe

    Filesize

    292KB

    MD5

    f0a701e6d9a5251e9aa2025c256d7f51

    SHA1

    216ab846c90e36c7e3727b3887875d954cb2a5b7

    SHA256

    be35e80f1c6d852fdd1d992c3b6b2d4fde33bc0d6179984f24120c153eda9ef0

    SHA512

    54023fa6e4681dd8e5a990c79a439af689c0b90d14316797888d16071b3d54f51009f4d44c31382ed93152f12d355b96850869698ce7241efb2a10692df8201b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9454.exe

    Filesize

    292KB

    MD5

    f0a701e6d9a5251e9aa2025c256d7f51

    SHA1

    216ab846c90e36c7e3727b3887875d954cb2a5b7

    SHA256

    be35e80f1c6d852fdd1d992c3b6b2d4fde33bc0d6179984f24120c153eda9ef0

    SHA512

    54023fa6e4681dd8e5a990c79a439af689c0b90d14316797888d16071b3d54f51009f4d44c31382ed93152f12d355b96850869698ce7241efb2a10692df8201b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2518.exe

    Filesize

    350KB

    MD5

    5e216c34686ea61681f5addc0c4cbee0

    SHA1

    b7238944e815597ce5e917c46fa4c1795468d538

    SHA256

    11c79c09fa71082d1ca2249401365bb6f0a07831c8513354cfa306f685bcbf52

    SHA512

    8901d2e0c91db600d4571492022b01e8d78a71ebdcdf09eb83e6e49f3ef1036c534b17c3c01b0e110245a9fdb2637fd9a3cfc5d658834f534ee7ca6bd5601890

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2518.exe

    Filesize

    350KB

    MD5

    5e216c34686ea61681f5addc0c4cbee0

    SHA1

    b7238944e815597ce5e917c46fa4c1795468d538

    SHA256

    11c79c09fa71082d1ca2249401365bb6f0a07831c8513354cfa306f685bcbf52

    SHA512

    8901d2e0c91db600d4571492022b01e8d78a71ebdcdf09eb83e6e49f3ef1036c534b17c3c01b0e110245a9fdb2637fd9a3cfc5d658834f534ee7ca6bd5601890

  • memory/2396-136-0x0000000004BC0000-0x0000000004BDA000-memory.dmp

    Filesize

    104KB

  • memory/2396-137-0x0000000004CC0000-0x00000000051BE000-memory.dmp

    Filesize

    5.0MB

  • memory/2396-138-0x0000000004C30000-0x0000000004C48000-memory.dmp

    Filesize

    96KB

  • memory/2396-139-0x00000000007E0000-0x000000000080D000-memory.dmp

    Filesize

    180KB

  • memory/2396-140-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

    Filesize

    64KB

  • memory/2396-141-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

    Filesize

    64KB

  • memory/2396-142-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

    Filesize

    64KB

  • memory/2396-143-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/2396-144-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/2396-146-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/2396-148-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/2396-150-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/2396-152-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/2396-154-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/2396-156-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/2396-158-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/2396-160-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/2396-162-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/2396-164-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/2396-166-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/2396-168-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/2396-170-0x0000000004C30000-0x0000000004C42000-memory.dmp

    Filesize

    72KB

  • memory/2396-171-0x0000000000400000-0x000000000070C000-memory.dmp

    Filesize

    3.0MB

  • memory/2396-172-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

    Filesize

    64KB

  • memory/2396-173-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

    Filesize

    64KB

  • memory/2396-174-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

    Filesize

    64KB

  • memory/2396-176-0x0000000000400000-0x000000000070C000-memory.dmp

    Filesize

    3.0MB

  • memory/3620-181-0x0000000004C80000-0x0000000004CC6000-memory.dmp

    Filesize

    280KB

  • memory/3620-182-0x0000000004D00000-0x0000000004D44000-memory.dmp

    Filesize

    272KB

  • memory/3620-183-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/3620-184-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/3620-186-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/3620-188-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/3620-190-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/3620-194-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/3620-192-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/3620-196-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/3620-198-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/3620-201-0x0000000000720000-0x000000000076B000-memory.dmp

    Filesize

    300KB

  • memory/3620-200-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/3620-204-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/3620-205-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/3620-207-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/3620-208-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/3620-203-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/3620-210-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/3620-212-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/3620-214-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/3620-216-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/3620-218-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/3620-220-0x0000000004D00000-0x0000000004D3E000-memory.dmp

    Filesize

    248KB

  • memory/3620-1093-0x00000000058C0000-0x0000000005EC6000-memory.dmp

    Filesize

    6.0MB

  • memory/3620-1094-0x00000000052B0000-0x00000000053BA000-memory.dmp

    Filesize

    1.0MB

  • memory/3620-1095-0x00000000053F0000-0x0000000005402000-memory.dmp

    Filesize

    72KB

  • memory/3620-1096-0x0000000005410000-0x000000000544E000-memory.dmp

    Filesize

    248KB

  • memory/3620-1097-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/3620-1098-0x0000000005560000-0x00000000055AB000-memory.dmp

    Filesize

    300KB

  • memory/3620-1099-0x00000000056F0000-0x0000000005782000-memory.dmp

    Filesize

    584KB

  • memory/3620-1100-0x0000000005790000-0x00000000057F6000-memory.dmp

    Filesize

    408KB

  • memory/3620-1102-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/3620-1103-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/3620-1104-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/3620-1105-0x00000000066F0000-0x0000000006766000-memory.dmp

    Filesize

    472KB

  • memory/3620-1106-0x0000000006770000-0x00000000067C0000-memory.dmp

    Filesize

    320KB

  • memory/3620-1107-0x00000000067E0000-0x00000000069A2000-memory.dmp

    Filesize

    1.8MB

  • memory/3620-1108-0x00000000069B0000-0x0000000006EDC000-memory.dmp

    Filesize

    5.2MB

  • memory/3620-1109-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/4260-1115-0x0000000000A60000-0x0000000000A92000-memory.dmp

    Filesize

    200KB

  • memory/4260-1116-0x00000000054A0000-0x00000000054EB000-memory.dmp

    Filesize

    300KB

  • memory/4260-1117-0x00000000055C0000-0x00000000055D0000-memory.dmp

    Filesize

    64KB