Analysis

  • max time kernel
    79s
  • max time network
    81s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 13:32

General

  • Target

    05abe3ed55cd202711ea8138d8fb537c9e457a75b62e2e7e4d0ca0b6f59d955a.exe

  • Size

    682KB

  • MD5

    cd27ed163028ecd2e41ec7addd43cca6

  • SHA1

    b193968d09e02f2afcce16939d90d3beba5251fd

  • SHA256

    05abe3ed55cd202711ea8138d8fb537c9e457a75b62e2e7e4d0ca0b6f59d955a

  • SHA512

    1ed93613626b5a8183b5f6d103b8d6731b376a155116ee2c79b529218bfba3bd6132ccd92abf0d1373f36dacca0880533907665d6718a898f6a449fd1dfcd088

  • SSDEEP

    12288:6K7KRc/2qg5H3fNrHqZ99foYUtoBsaUleNc8EfSzAON8ymWJtMsOYyBu:dmI2tH3fBHqZnfoYUt4rUleNECGy54bB

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05abe3ed55cd202711ea8138d8fb537c9e457a75b62e2e7e4d0ca0b6f59d955a.exe
    "C:\Users\Admin\AppData\Local\Temp\05abe3ed55cd202711ea8138d8fb537c9e457a75b62e2e7e4d0ca0b6f59d955a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1780
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieN6673.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieN6673.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4100
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr806405.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr806405.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4104
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku081645.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku081645.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1452
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr730710.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr730710.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3068

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr730710.exe

    Filesize

    175KB

    MD5

    d4c1f423e14e05d191e0de1520ad2b17

    SHA1

    d7c1c6fe54d004bdf09fa92bcf202196da23fddc

    SHA256

    7ce70c475065028340ec98226d10f272ace0e8dc2bc51a710d9c430163e8e6d7

    SHA512

    2386aba7ee02da49d969fe157db0082429c7d9b09e217542c97dc7453752b34f483b8da88db8fff277eccf5ef2c180d7f747e5f1c044ca2f97cadbc4ec05b82d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr730710.exe

    Filesize

    175KB

    MD5

    d4c1f423e14e05d191e0de1520ad2b17

    SHA1

    d7c1c6fe54d004bdf09fa92bcf202196da23fddc

    SHA256

    7ce70c475065028340ec98226d10f272ace0e8dc2bc51a710d9c430163e8e6d7

    SHA512

    2386aba7ee02da49d969fe157db0082429c7d9b09e217542c97dc7453752b34f483b8da88db8fff277eccf5ef2c180d7f747e5f1c044ca2f97cadbc4ec05b82d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieN6673.exe

    Filesize

    404KB

    MD5

    7a51e103844b277238ff8e58e0e451e7

    SHA1

    837df4df7c0ecb44e00e41b4cb1656653467a802

    SHA256

    46e0ba1cb4f2fd283b3c4b44d5ff8cb319426d701d5168a3da070ccf6a60ac2f

    SHA512

    912c64ddb5884da3ae72d001f7cfa55174e0e8cb1847b83d2a5dcb7b4574a999091c5e655d3c0e35978ae345e0b0b2d0f1c035d9fa3faa3790871bfc25322962

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\zieN6673.exe

    Filesize

    404KB

    MD5

    7a51e103844b277238ff8e58e0e451e7

    SHA1

    837df4df7c0ecb44e00e41b4cb1656653467a802

    SHA256

    46e0ba1cb4f2fd283b3c4b44d5ff8cb319426d701d5168a3da070ccf6a60ac2f

    SHA512

    912c64ddb5884da3ae72d001f7cfa55174e0e8cb1847b83d2a5dcb7b4574a999091c5e655d3c0e35978ae345e0b0b2d0f1c035d9fa3faa3790871bfc25322962

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr806405.exe

    Filesize

    12KB

    MD5

    06c290899c893f40854380588946f1d9

    SHA1

    c5d1fd991ddf4d06a3eaa4a815837ea4a86c92d3

    SHA256

    ea60096faa10d3673f9771411d1519f3d8176cd982a897dffb398885cb921a81

    SHA512

    eeacd2f087d1a288b95068d15e7e78f15689ac9a7ea5fd074c53b5bfcc7fde565673ba40a2f8f69e82d671460000b8c27a661a604e01163af6a838383f25b48d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr806405.exe

    Filesize

    12KB

    MD5

    06c290899c893f40854380588946f1d9

    SHA1

    c5d1fd991ddf4d06a3eaa4a815837ea4a86c92d3

    SHA256

    ea60096faa10d3673f9771411d1519f3d8176cd982a897dffb398885cb921a81

    SHA512

    eeacd2f087d1a288b95068d15e7e78f15689ac9a7ea5fd074c53b5bfcc7fde565673ba40a2f8f69e82d671460000b8c27a661a604e01163af6a838383f25b48d

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku081645.exe

    Filesize

    359KB

    MD5

    f8274519359c67b43f6bd8dc4b784d36

    SHA1

    ed1e8c923663c099b0c46b306000c3ba28389ee4

    SHA256

    04b68936268ea06c7f33323ea9e86f497c1605bf4127367013ba2abee9200296

    SHA512

    a6d4f9dde4da288234e2d999c24bca951f99c5a786fea4f40cd31283a4a51328b6f3c1bcfd3d9ea6ad81acb16fb7f835dd875af111cf358878ca7b4e1ede08fd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku081645.exe

    Filesize

    359KB

    MD5

    f8274519359c67b43f6bd8dc4b784d36

    SHA1

    ed1e8c923663c099b0c46b306000c3ba28389ee4

    SHA256

    04b68936268ea06c7f33323ea9e86f497c1605bf4127367013ba2abee9200296

    SHA512

    a6d4f9dde4da288234e2d999c24bca951f99c5a786fea4f40cd31283a4a51328b6f3c1bcfd3d9ea6ad81acb16fb7f835dd875af111cf358878ca7b4e1ede08fd

  • memory/1452-198-0x0000000002640000-0x000000000267E000-memory.dmp

    Filesize

    248KB

  • memory/1452-208-0x0000000002640000-0x000000000267E000-memory.dmp

    Filesize

    248KB

  • memory/1452-148-0x0000000002640000-0x0000000002684000-memory.dmp

    Filesize

    272KB

  • memory/1452-149-0x0000000002640000-0x000000000267E000-memory.dmp

    Filesize

    248KB

  • memory/1452-150-0x0000000002640000-0x000000000267E000-memory.dmp

    Filesize

    248KB

  • memory/1452-154-0x0000000002640000-0x000000000267E000-memory.dmp

    Filesize

    248KB

  • memory/1452-152-0x0000000002640000-0x000000000267E000-memory.dmp

    Filesize

    248KB

  • memory/1452-156-0x0000000002640000-0x000000000267E000-memory.dmp

    Filesize

    248KB

  • memory/1452-158-0x0000000002640000-0x000000000267E000-memory.dmp

    Filesize

    248KB

  • memory/1452-166-0x0000000002640000-0x000000000267E000-memory.dmp

    Filesize

    248KB

  • memory/1452-164-0x0000000002640000-0x000000000267E000-memory.dmp

    Filesize

    248KB

  • memory/1452-162-0x0000000002640000-0x000000000267E000-memory.dmp

    Filesize

    248KB

  • memory/1452-160-0x0000000002640000-0x000000000267E000-memory.dmp

    Filesize

    248KB

  • memory/1452-168-0x0000000002640000-0x000000000267E000-memory.dmp

    Filesize

    248KB

  • memory/1452-170-0x0000000002640000-0x000000000267E000-memory.dmp

    Filesize

    248KB

  • memory/1452-172-0x0000000002640000-0x000000000267E000-memory.dmp

    Filesize

    248KB

  • memory/1452-174-0x0000000002640000-0x000000000267E000-memory.dmp

    Filesize

    248KB

  • memory/1452-176-0x0000000002640000-0x000000000267E000-memory.dmp

    Filesize

    248KB

  • memory/1452-178-0x0000000002640000-0x000000000267E000-memory.dmp

    Filesize

    248KB

  • memory/1452-180-0x0000000002640000-0x000000000267E000-memory.dmp

    Filesize

    248KB

  • memory/1452-186-0x0000000002640000-0x000000000267E000-memory.dmp

    Filesize

    248KB

  • memory/1452-196-0x0000000002640000-0x000000000267E000-memory.dmp

    Filesize

    248KB

  • memory/1452-194-0x0000000002640000-0x000000000267E000-memory.dmp

    Filesize

    248KB

  • memory/1452-200-0x0000000002640000-0x000000000267E000-memory.dmp

    Filesize

    248KB

  • memory/1452-146-0x0000000002480000-0x0000000002490000-memory.dmp

    Filesize

    64KB

  • memory/1452-192-0x0000000002640000-0x000000000267E000-memory.dmp

    Filesize

    248KB

  • memory/1452-204-0x0000000002640000-0x000000000267E000-memory.dmp

    Filesize

    248KB

  • memory/1452-206-0x0000000002640000-0x000000000267E000-memory.dmp

    Filesize

    248KB

  • memory/1452-210-0x0000000002640000-0x000000000267E000-memory.dmp

    Filesize

    248KB

  • memory/1452-147-0x0000000004D10000-0x000000000520E000-memory.dmp

    Filesize

    5.0MB

  • memory/1452-202-0x0000000002640000-0x000000000267E000-memory.dmp

    Filesize

    248KB

  • memory/1452-190-0x0000000002640000-0x000000000267E000-memory.dmp

    Filesize

    248KB

  • memory/1452-188-0x0000000002640000-0x000000000267E000-memory.dmp

    Filesize

    248KB

  • memory/1452-184-0x0000000002640000-0x000000000267E000-memory.dmp

    Filesize

    248KB

  • memory/1452-182-0x0000000002640000-0x000000000267E000-memory.dmp

    Filesize

    248KB

  • memory/1452-1055-0x0000000005840000-0x0000000005E46000-memory.dmp

    Filesize

    6.0MB

  • memory/1452-1056-0x00000000052B0000-0x00000000053BA000-memory.dmp

    Filesize

    1.0MB

  • memory/1452-1057-0x00000000053F0000-0x0000000005402000-memory.dmp

    Filesize

    72KB

  • memory/1452-1058-0x0000000005410000-0x000000000544E000-memory.dmp

    Filesize

    248KB

  • memory/1452-1059-0x0000000002480000-0x0000000002490000-memory.dmp

    Filesize

    64KB

  • memory/1452-1060-0x0000000005560000-0x00000000055AB000-memory.dmp

    Filesize

    300KB

  • memory/1452-1063-0x00000000056F0000-0x0000000005782000-memory.dmp

    Filesize

    584KB

  • memory/1452-1064-0x0000000005790000-0x00000000057F6000-memory.dmp

    Filesize

    408KB

  • memory/1452-1065-0x00000000066D0000-0x0000000006746000-memory.dmp

    Filesize

    472KB

  • memory/1452-1066-0x0000000006750000-0x00000000067A0000-memory.dmp

    Filesize

    320KB

  • memory/1452-1067-0x00000000067E0000-0x00000000069A2000-memory.dmp

    Filesize

    1.8MB

  • memory/1452-1068-0x00000000069B0000-0x0000000006EDC000-memory.dmp

    Filesize

    5.2MB

  • memory/1452-1069-0x0000000002480000-0x0000000002490000-memory.dmp

    Filesize

    64KB

  • memory/1452-145-0x00000000022A0000-0x00000000022E6000-memory.dmp

    Filesize

    280KB

  • memory/1452-144-0x0000000000840000-0x000000000088B000-memory.dmp

    Filesize

    300KB

  • memory/1780-121-0x00000000044A0000-0x000000000452A000-memory.dmp

    Filesize

    552KB

  • memory/1780-137-0x0000000000400000-0x000000000076D000-memory.dmp

    Filesize

    3.4MB

  • memory/1780-138-0x00000000044A0000-0x000000000452A000-memory.dmp

    Filesize

    552KB

  • memory/3068-1076-0x00000000007C0000-0x00000000007F2000-memory.dmp

    Filesize

    200KB

  • memory/3068-1077-0x00000000051F0000-0x000000000523B000-memory.dmp

    Filesize

    300KB

  • memory/3068-1078-0x0000000005330000-0x0000000005340000-memory.dmp

    Filesize

    64KB

  • memory/4104-136-0x0000000000B60000-0x0000000000B6A000-memory.dmp

    Filesize

    40KB