Analysis

  • max time kernel
    135s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 13:33

General

  • Target

    3b61d0efc3438c43d9d6ed09dee76bcd8362b115db74caad4fb2794f5cb9a860.exe

  • Size

    685KB

  • MD5

    0624b8681293c7a92abbede08a764cd0

  • SHA1

    ca869a2b9a102130b1577b8400604e300b181753

  • SHA256

    3b61d0efc3438c43d9d6ed09dee76bcd8362b115db74caad4fb2794f5cb9a860

  • SHA512

    35b70cdf7a37fa495af0e12f16b90180b3daee259de6093ecee1d5d3aeab126f6f7a9a6b7d4d214d8f87b479ad30bcb579faa96ef4522dd3237dd9e0d9537b08

  • SSDEEP

    12288:iMr8y90ppHnmpB+J6QGUV9azjcYpS/mxwdaZixkU47BafxEg0dxKUe9+qN:Sy6mIvWzj7LwWixWIfxEDEd

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b61d0efc3438c43d9d6ed09dee76bcd8362b115db74caad4fb2794f5cb9a860.exe
    "C:\Users\Admin\AppData\Local\Temp\3b61d0efc3438c43d9d6ed09dee76bcd8362b115db74caad4fb2794f5cb9a860.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2144
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un142927.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un142927.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1576
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2833.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2833.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4692
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4692 -s 1084
          4⤵
          • Program crash
          PID:3320
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4551.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4551.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3112
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3112 -s 1900
          4⤵
          • Program crash
          PID:4500
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si476284.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si476284.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4964
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4692 -ip 4692
    1⤵
      PID:2004
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3112 -ip 3112
      1⤵
        PID:1200

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si476284.exe

        Filesize

        175KB

        MD5

        946d5a320d6d805b82410bef6f5a5f60

        SHA1

        e88a6d2b91fd6fd3151285997729c13b7a42f94c

        SHA256

        67f1537f4de5758c01ec7243535b72888ff0dfc18f0fe10d386df0c9415428b6

        SHA512

        f0b98c5b4370c86c0155fc22c3080b040ef27b7db138fd0053775bd1bd0de870a43d0c557f5eb0c6257651740f2998b4082b709fcedbd924c22dd2072d0d5d1c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si476284.exe

        Filesize

        175KB

        MD5

        946d5a320d6d805b82410bef6f5a5f60

        SHA1

        e88a6d2b91fd6fd3151285997729c13b7a42f94c

        SHA256

        67f1537f4de5758c01ec7243535b72888ff0dfc18f0fe10d386df0c9415428b6

        SHA512

        f0b98c5b4370c86c0155fc22c3080b040ef27b7db138fd0053775bd1bd0de870a43d0c557f5eb0c6257651740f2998b4082b709fcedbd924c22dd2072d0d5d1c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un142927.exe

        Filesize

        543KB

        MD5

        0952f66a739a1eeeca7945473e5bbfe9

        SHA1

        f806a3fa14fc7c39a8fd4844267c042f551cfe46

        SHA256

        04ebf703ee773887ff70a7fa89a5eaecb20539f17ad69d668e31b3d11d9be8c9

        SHA512

        967e0b50b35281b803e38e43c15c251351501dfa3335d5d2bc1a305fd2622f36e3315cb6beb3c05f34a9a550097b66d95c58aedfb579fc11a95303d06989fb7a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un142927.exe

        Filesize

        543KB

        MD5

        0952f66a739a1eeeca7945473e5bbfe9

        SHA1

        f806a3fa14fc7c39a8fd4844267c042f551cfe46

        SHA256

        04ebf703ee773887ff70a7fa89a5eaecb20539f17ad69d668e31b3d11d9be8c9

        SHA512

        967e0b50b35281b803e38e43c15c251351501dfa3335d5d2bc1a305fd2622f36e3315cb6beb3c05f34a9a550097b66d95c58aedfb579fc11a95303d06989fb7a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2833.exe

        Filesize

        292KB

        MD5

        3272e40a9f6df3b155400d02230acf5c

        SHA1

        b01bfc75f15eb1e0ba784007635355d85a1cfae4

        SHA256

        ee842f4dbbb6d0027b9495209106cb5e4d3fc37eae7cf0cca37e0e96d2939046

        SHA512

        73cb6237097b8292b53df91355e787016e6feb579e3ee3b8bde7df822959e3cff02434db0ad47f730cb9eae9bb34a1347a4366376d27c45fe8d8d5820939e965

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2833.exe

        Filesize

        292KB

        MD5

        3272e40a9f6df3b155400d02230acf5c

        SHA1

        b01bfc75f15eb1e0ba784007635355d85a1cfae4

        SHA256

        ee842f4dbbb6d0027b9495209106cb5e4d3fc37eae7cf0cca37e0e96d2939046

        SHA512

        73cb6237097b8292b53df91355e787016e6feb579e3ee3b8bde7df822959e3cff02434db0ad47f730cb9eae9bb34a1347a4366376d27c45fe8d8d5820939e965

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4551.exe

        Filesize

        350KB

        MD5

        b48d1e4612517b7bab20c2b836c89c3f

        SHA1

        c7ae914c6af9c7a2ec5dff148a0523221a51ee0c

        SHA256

        4bf8dfdc813aea91e2477b459141188cc3690e669f11e071c7de40a0d365305b

        SHA512

        ecbb4c2c9096ba5823eacf57e3f5f1fed725386bc663556f17facd499c204adefb2f4405220d0bee35ab7c1037b5dad1ba8f9be4a9b9f8d9ead805084354850b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4551.exe

        Filesize

        350KB

        MD5

        b48d1e4612517b7bab20c2b836c89c3f

        SHA1

        c7ae914c6af9c7a2ec5dff148a0523221a51ee0c

        SHA256

        4bf8dfdc813aea91e2477b459141188cc3690e669f11e071c7de40a0d365305b

        SHA512

        ecbb4c2c9096ba5823eacf57e3f5f1fed725386bc663556f17facd499c204adefb2f4405220d0bee35ab7c1037b5dad1ba8f9be4a9b9f8d9ead805084354850b

      • memory/3112-1096-0x0000000005370000-0x0000000005988000-memory.dmp

        Filesize

        6.1MB

      • memory/3112-1099-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/3112-1110-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/3112-1109-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/3112-1108-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/3112-1107-0x0000000006E90000-0x0000000006EE0000-memory.dmp

        Filesize

        320KB

      • memory/3112-1106-0x0000000006DF0000-0x0000000006E66000-memory.dmp

        Filesize

        472KB

      • memory/3112-1104-0x00000000067A0000-0x0000000006CCC000-memory.dmp

        Filesize

        5.2MB

      • memory/3112-1103-0x00000000065D0000-0x0000000006792000-memory.dmp

        Filesize

        1.8MB

      • memory/3112-1102-0x00000000064E0000-0x0000000006572000-memory.dmp

        Filesize

        584KB

      • memory/3112-1101-0x0000000005E10000-0x0000000005E76000-memory.dmp

        Filesize

        408KB

      • memory/3112-1100-0x0000000005B20000-0x0000000005B5C000-memory.dmp

        Filesize

        240KB

      • memory/3112-1098-0x0000000005B00000-0x0000000005B12000-memory.dmp

        Filesize

        72KB

      • memory/3112-1097-0x00000000059C0000-0x0000000005ACA000-memory.dmp

        Filesize

        1.0MB

      • memory/3112-289-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/3112-285-0x0000000000840000-0x000000000088B000-memory.dmp

        Filesize

        300KB

      • memory/3112-287-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/3112-220-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3112-218-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3112-187-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3112-188-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3112-190-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3112-192-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3112-194-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3112-196-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3112-198-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3112-200-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3112-202-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3112-204-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3112-206-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3112-208-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3112-210-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3112-212-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3112-214-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/3112-216-0x0000000004CE0000-0x0000000004D1E000-memory.dmp

        Filesize

        248KB

      • memory/4692-171-0x0000000002560000-0x0000000002572000-memory.dmp

        Filesize

        72KB

      • memory/4692-159-0x0000000002560000-0x0000000002572000-memory.dmp

        Filesize

        72KB

      • memory/4692-151-0x0000000004DF0000-0x0000000005394000-memory.dmp

        Filesize

        5.6MB

      • memory/4692-180-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/4692-179-0x0000000002560000-0x0000000002572000-memory.dmp

        Filesize

        72KB

      • memory/4692-150-0x0000000002960000-0x0000000002970000-memory.dmp

        Filesize

        64KB

      • memory/4692-177-0x0000000002560000-0x0000000002572000-memory.dmp

        Filesize

        72KB

      • memory/4692-175-0x0000000002560000-0x0000000002572000-memory.dmp

        Filesize

        72KB

      • memory/4692-153-0x0000000002560000-0x0000000002572000-memory.dmp

        Filesize

        72KB

      • memory/4692-167-0x0000000002560000-0x0000000002572000-memory.dmp

        Filesize

        72KB

      • memory/4692-182-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/4692-169-0x0000000002560000-0x0000000002572000-memory.dmp

        Filesize

        72KB

      • memory/4692-173-0x0000000002560000-0x0000000002572000-memory.dmp

        Filesize

        72KB

      • memory/4692-165-0x0000000002560000-0x0000000002572000-memory.dmp

        Filesize

        72KB

      • memory/4692-163-0x0000000002560000-0x0000000002572000-memory.dmp

        Filesize

        72KB

      • memory/4692-161-0x0000000002560000-0x0000000002572000-memory.dmp

        Filesize

        72KB

      • memory/4692-152-0x0000000002560000-0x0000000002572000-memory.dmp

        Filesize

        72KB

      • memory/4692-157-0x0000000002560000-0x0000000002572000-memory.dmp

        Filesize

        72KB

      • memory/4692-155-0x0000000002560000-0x0000000002572000-memory.dmp

        Filesize

        72KB

      • memory/4692-149-0x0000000002960000-0x0000000002970000-memory.dmp

        Filesize

        64KB

      • memory/4692-148-0x0000000000800000-0x000000000082D000-memory.dmp

        Filesize

        180KB

      • memory/4964-1116-0x00000000006A0000-0x00000000006D2000-memory.dmp

        Filesize

        200KB

      • memory/4964-1117-0x0000000004FF0000-0x0000000005000000-memory.dmp

        Filesize

        64KB