Analysis

  • max time kernel
    141s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 14:41

General

  • Target

    0b2ac19a146c76ac104d3fb97a59225da2da1d609998f0d92315e39706f2c96c.exe

  • Size

    685KB

  • MD5

    a6d4ed4138b5d81929c9342bee6bd446

  • SHA1

    4993c44aaa3d741f1aaafd0f3c2f3ca0a4f80edc

  • SHA256

    0b2ac19a146c76ac104d3fb97a59225da2da1d609998f0d92315e39706f2c96c

  • SHA512

    a1ab660cd5eef4b3447dd936d04a122b8bed0b4967bbeecde1b3d99b0f953c36395e4805e9e112680201ffa669625e712c09cb3983103b238cb9d3ee5a70058f

  • SSDEEP

    12288:iMrcy90xZQvPVomfe9N6x1P/JPkyGx7QhooMr+/nmYinBLkiEOdx8Uilr:iyPl4Ex1P/RUoMldBkiEmip

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0b2ac19a146c76ac104d3fb97a59225da2da1d609998f0d92315e39706f2c96c.exe
    "C:\Users\Admin\AppData\Local\Temp\0b2ac19a146c76ac104d3fb97a59225da2da1d609998f0d92315e39706f2c96c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un111932.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un111932.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3824
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5205.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5205.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:840
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 840 -s 1084
          4⤵
          • Program crash
          PID:956
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6465.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6465.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1100
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1100 -s 1788
          4⤵
          • Program crash
          PID:1612
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si758132.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si758132.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1920
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 840 -ip 840
    1⤵
      PID:3288
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1100 -ip 1100
      1⤵
        PID:4964
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:4460

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si758132.exe

        Filesize

        175KB

        MD5

        b6aad4ac7fdfd60a149562e1c54a7c44

        SHA1

        73ca4378598544d047d2e4cfe826bd4009b5e078

        SHA256

        9be65f87ae00c47f5f72ddc0501411244d26aa2b806fc481fe74c63f902d9256

        SHA512

        df53685c59b45c27cf419dd52f1f1c8c7298a49fa465ee7f34c3d897508c2c67e725ac3601753598a380634088f461895c6ad0e2049b895e9d413494ab470fda

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si758132.exe

        Filesize

        175KB

        MD5

        b6aad4ac7fdfd60a149562e1c54a7c44

        SHA1

        73ca4378598544d047d2e4cfe826bd4009b5e078

        SHA256

        9be65f87ae00c47f5f72ddc0501411244d26aa2b806fc481fe74c63f902d9256

        SHA512

        df53685c59b45c27cf419dd52f1f1c8c7298a49fa465ee7f34c3d897508c2c67e725ac3601753598a380634088f461895c6ad0e2049b895e9d413494ab470fda

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un111932.exe

        Filesize

        543KB

        MD5

        1feb4bcd068d5d3081f844063d2c4f6d

        SHA1

        ad92eb0c07089a5ec4a9cfc0bc4b7f3c15ab0c77

        SHA256

        6452c0254ae3ffa2427d17db05069055b60323973ff7129dba82d1e59932907d

        SHA512

        17cf3148c99a2496d66209024299d05d0debd9ad05c22650f32b8bb8d105b8cc9b5b4ea977784efbdc0f8ba63b8ed7bae82189afa8a80c7b65509f5d55f68df8

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un111932.exe

        Filesize

        543KB

        MD5

        1feb4bcd068d5d3081f844063d2c4f6d

        SHA1

        ad92eb0c07089a5ec4a9cfc0bc4b7f3c15ab0c77

        SHA256

        6452c0254ae3ffa2427d17db05069055b60323973ff7129dba82d1e59932907d

        SHA512

        17cf3148c99a2496d66209024299d05d0debd9ad05c22650f32b8bb8d105b8cc9b5b4ea977784efbdc0f8ba63b8ed7bae82189afa8a80c7b65509f5d55f68df8

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5205.exe

        Filesize

        292KB

        MD5

        05af589d8f1d23325892dd9cfa5aef41

        SHA1

        9d542e12e2668de76c69431a3162eac5f9157f9f

        SHA256

        6232548999ac8c2935e3d384e3fdb017f4c7d22422d7dfc058aef39e6f0de944

        SHA512

        01c1108008a70bac66c6a330d0f1800102f952ca744e15d1e474271f68a2c7acf9e8439072f3e804e9174efac9a3978217c05075d5371ce9681b8768362e60d9

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5205.exe

        Filesize

        292KB

        MD5

        05af589d8f1d23325892dd9cfa5aef41

        SHA1

        9d542e12e2668de76c69431a3162eac5f9157f9f

        SHA256

        6232548999ac8c2935e3d384e3fdb017f4c7d22422d7dfc058aef39e6f0de944

        SHA512

        01c1108008a70bac66c6a330d0f1800102f952ca744e15d1e474271f68a2c7acf9e8439072f3e804e9174efac9a3978217c05075d5371ce9681b8768362e60d9

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6465.exe

        Filesize

        350KB

        MD5

        cbd4c17b4008edcfff1ac0c8c74cd243

        SHA1

        359e3269f0c9c0c7d39dd587cadb5ca24f4f28c5

        SHA256

        18b4b5ef130ce01c6f85f0069e0d2485b84be427663e630d73b0e59353bd4cad

        SHA512

        fbaac04f8e112fef773a5ad879b92af30102bc4141cfb08148e3fbd5e210a03d23371e8dd07b1c42fa6aa094dbb456ef7e3a16797f64bbd172407dc5b8d39e8d

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6465.exe

        Filesize

        350KB

        MD5

        cbd4c17b4008edcfff1ac0c8c74cd243

        SHA1

        359e3269f0c9c0c7d39dd587cadb5ca24f4f28c5

        SHA256

        18b4b5ef130ce01c6f85f0069e0d2485b84be427663e630d73b0e59353bd4cad

        SHA512

        fbaac04f8e112fef773a5ad879b92af30102bc4141cfb08148e3fbd5e210a03d23371e8dd07b1c42fa6aa094dbb456ef7e3a16797f64bbd172407dc5b8d39e8d

      • memory/840-148-0x0000000000820000-0x000000000084D000-memory.dmp

        Filesize

        180KB

      • memory/840-150-0x0000000004F70000-0x0000000004F80000-memory.dmp

        Filesize

        64KB

      • memory/840-151-0x0000000004F70000-0x0000000004F80000-memory.dmp

        Filesize

        64KB

      • memory/840-149-0x0000000004F80000-0x0000000005524000-memory.dmp

        Filesize

        5.6MB

      • memory/840-152-0x0000000004F70000-0x0000000004F80000-memory.dmp

        Filesize

        64KB

      • memory/840-153-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/840-154-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/840-156-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/840-158-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/840-160-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/840-162-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/840-164-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/840-166-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/840-168-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/840-170-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/840-172-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/840-174-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/840-176-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/840-178-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/840-180-0x0000000002970000-0x0000000002982000-memory.dmp

        Filesize

        72KB

      • memory/840-181-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/840-182-0x0000000004F70000-0x0000000004F80000-memory.dmp

        Filesize

        64KB

      • memory/840-183-0x0000000004F70000-0x0000000004F80000-memory.dmp

        Filesize

        64KB

      • memory/840-184-0x0000000004F70000-0x0000000004F80000-memory.dmp

        Filesize

        64KB

      • memory/840-186-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/1100-191-0x0000000002780000-0x00000000027BE000-memory.dmp

        Filesize

        248KB

      • memory/1100-192-0x0000000002780000-0x00000000027BE000-memory.dmp

        Filesize

        248KB

      • memory/1100-194-0x0000000002780000-0x00000000027BE000-memory.dmp

        Filesize

        248KB

      • memory/1100-196-0x0000000002780000-0x00000000027BE000-memory.dmp

        Filesize

        248KB

      • memory/1100-198-0x0000000002780000-0x00000000027BE000-memory.dmp

        Filesize

        248KB

      • memory/1100-200-0x0000000002780000-0x00000000027BE000-memory.dmp

        Filesize

        248KB

      • memory/1100-202-0x0000000002780000-0x00000000027BE000-memory.dmp

        Filesize

        248KB

      • memory/1100-204-0x0000000002780000-0x00000000027BE000-memory.dmp

        Filesize

        248KB

      • memory/1100-206-0x0000000002780000-0x00000000027BE000-memory.dmp

        Filesize

        248KB

      • memory/1100-208-0x0000000002780000-0x00000000027BE000-memory.dmp

        Filesize

        248KB

      • memory/1100-210-0x0000000002780000-0x00000000027BE000-memory.dmp

        Filesize

        248KB

      • memory/1100-212-0x0000000002780000-0x00000000027BE000-memory.dmp

        Filesize

        248KB

      • memory/1100-214-0x0000000002780000-0x00000000027BE000-memory.dmp

        Filesize

        248KB

      • memory/1100-216-0x0000000002780000-0x00000000027BE000-memory.dmp

        Filesize

        248KB

      • memory/1100-218-0x0000000002780000-0x00000000027BE000-memory.dmp

        Filesize

        248KB

      • memory/1100-220-0x0000000002780000-0x00000000027BE000-memory.dmp

        Filesize

        248KB

      • memory/1100-222-0x0000000002780000-0x00000000027BE000-memory.dmp

        Filesize

        248KB

      • memory/1100-224-0x0000000002780000-0x00000000027BE000-memory.dmp

        Filesize

        248KB

      • memory/1100-331-0x0000000000720000-0x000000000076B000-memory.dmp

        Filesize

        300KB

      • memory/1100-333-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

        Filesize

        64KB

      • memory/1100-334-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

        Filesize

        64KB

      • memory/1100-336-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

        Filesize

        64KB

      • memory/1100-1101-0x0000000005570000-0x0000000005B88000-memory.dmp

        Filesize

        6.1MB

      • memory/1100-1102-0x0000000005B90000-0x0000000005C9A000-memory.dmp

        Filesize

        1.0MB

      • memory/1100-1103-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

        Filesize

        64KB

      • memory/1100-1104-0x0000000004F50000-0x0000000004F62000-memory.dmp

        Filesize

        72KB

      • memory/1100-1105-0x0000000004F70000-0x0000000004FAC000-memory.dmp

        Filesize

        240KB

      • memory/1100-1107-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

        Filesize

        64KB

      • memory/1100-1108-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

        Filesize

        64KB

      • memory/1100-1109-0x0000000005F50000-0x0000000005FB6000-memory.dmp

        Filesize

        408KB

      • memory/1100-1110-0x0000000006700000-0x0000000006792000-memory.dmp

        Filesize

        584KB

      • memory/1100-1111-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

        Filesize

        64KB

      • memory/1100-1112-0x00000000067F0000-0x0000000006866000-memory.dmp

        Filesize

        472KB

      • memory/1100-1113-0x0000000006880000-0x00000000068D0000-memory.dmp

        Filesize

        320KB

      • memory/1100-1114-0x0000000007CE0000-0x0000000007EA2000-memory.dmp

        Filesize

        1.8MB

      • memory/1100-1115-0x0000000007EB0000-0x00000000083DC000-memory.dmp

        Filesize

        5.2MB

      • memory/1920-1122-0x0000000000E50000-0x0000000000E82000-memory.dmp

        Filesize

        200KB

      • memory/1920-1123-0x00000000059E0000-0x00000000059F0000-memory.dmp

        Filesize

        64KB