Analysis

  • max time kernel
    66s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 14:44

General

  • Target

    fb19ae621b623f19a51faf4e36478f25be321c522f37ac12bd4af674730e7d89.exe

  • Size

    685KB

  • MD5

    06d3169043f2d148447213dadaa64f21

  • SHA1

    87c46249990a22c25a2087489071929209c38cd4

  • SHA256

    fb19ae621b623f19a51faf4e36478f25be321c522f37ac12bd4af674730e7d89

  • SHA512

    b9067343cba67c24ad160179627b016c924c24b2e525fadfa6f0861eeba5b90b763f76bd862e9bc587ca327fd7cafe8bd8671107b4a13a3dbbf72a739d16fbf0

  • SSDEEP

    12288:6Mrky90Xt2k07ePJ6PJFO+FRuYqPzTHV4d76Ez2CYBHx4EED44zUgoy:yyitNmflqPzTed76Ez4lx4EEDbggF

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb19ae621b623f19a51faf4e36478f25be321c522f37ac12bd4af674730e7d89.exe
    "C:\Users\Admin\AppData\Local\Temp\fb19ae621b623f19a51faf4e36478f25be321c522f37ac12bd4af674730e7d89.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un496342.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un496342.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3832
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4557.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4557.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3132
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3132 -s 1088
          4⤵
          • Program crash
          PID:3516
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8663.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8663.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4652
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4652 -s 2020
          4⤵
          • Program crash
          PID:4420
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si881669.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si881669.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3820
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3132 -ip 3132
    1⤵
      PID:956
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4652 -ip 4652
      1⤵
        PID:3220

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si881669.exe

        Filesize

        175KB

        MD5

        13b73a19258e031b8efde35bb68afa65

        SHA1

        128fceb432cc2b72062350ab7626b0f3f93e682e

        SHA256

        bce6d3db1b4f110bd40b12fa8494e550916db92e896ed51e3789deb0e891bd98

        SHA512

        6b2a09537143275de1d5b6fc2799b2d8989def5cab7827c0d5d06565d911a904fbed9867966a61e287a32fecfd65a5f66b0f27f97ce28caf722062d3afb126bd

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si881669.exe

        Filesize

        175KB

        MD5

        13b73a19258e031b8efde35bb68afa65

        SHA1

        128fceb432cc2b72062350ab7626b0f3f93e682e

        SHA256

        bce6d3db1b4f110bd40b12fa8494e550916db92e896ed51e3789deb0e891bd98

        SHA512

        6b2a09537143275de1d5b6fc2799b2d8989def5cab7827c0d5d06565d911a904fbed9867966a61e287a32fecfd65a5f66b0f27f97ce28caf722062d3afb126bd

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un496342.exe

        Filesize

        543KB

        MD5

        c78b0cea599f4caac0888aeeab553571

        SHA1

        6b7e5956a11d0786ba855c9c8df3cb36ffc3ae87

        SHA256

        02f7d14036029f2d65c0438af3fae9dd3bac7bb88f579a8620f011da4b2dd20b

        SHA512

        9159a3cde498688944ed3f30545eb0ead58c61eafc635ffcfda2f95298fda09091c68511739457fbbd4fec82d78341e3ad2b87da2ee07d7aa94dece02082bb96

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un496342.exe

        Filesize

        543KB

        MD5

        c78b0cea599f4caac0888aeeab553571

        SHA1

        6b7e5956a11d0786ba855c9c8df3cb36ffc3ae87

        SHA256

        02f7d14036029f2d65c0438af3fae9dd3bac7bb88f579a8620f011da4b2dd20b

        SHA512

        9159a3cde498688944ed3f30545eb0ead58c61eafc635ffcfda2f95298fda09091c68511739457fbbd4fec82d78341e3ad2b87da2ee07d7aa94dece02082bb96

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4557.exe

        Filesize

        292KB

        MD5

        725092286da25f165dbd034486366659

        SHA1

        b3512687e42fb4c13f300db0ea96995b2f08a0ae

        SHA256

        9fbbfd9950bfeb6346966caed11bfe89a6d3b37c556a4c5ec3df3abd42c1d547

        SHA512

        9a475800638b6fed39f0318e219578748b677331f4f189233f73392dfc0c35a25a4f97d61342c4c5caa04af6010594c0bab8e51cd886d2805220d7fb0af34b1e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4557.exe

        Filesize

        292KB

        MD5

        725092286da25f165dbd034486366659

        SHA1

        b3512687e42fb4c13f300db0ea96995b2f08a0ae

        SHA256

        9fbbfd9950bfeb6346966caed11bfe89a6d3b37c556a4c5ec3df3abd42c1d547

        SHA512

        9a475800638b6fed39f0318e219578748b677331f4f189233f73392dfc0c35a25a4f97d61342c4c5caa04af6010594c0bab8e51cd886d2805220d7fb0af34b1e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8663.exe

        Filesize

        350KB

        MD5

        235a269ead64da996ef591b3b1483dd9

        SHA1

        08115fcee461292b700e562ebf7733c76bf79631

        SHA256

        89a2f17c2596e1cef1999cffbd4eead5ef52411b763ac18e26caf4972211545d

        SHA512

        69a73f100d0279ebfd34a5da986cf522c9264213720159fe9535511c166a2627dfb6612b4138b05d0c33fe9aa1eb721aee94ef14e1bfa19505dbb4190766b3c4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8663.exe

        Filesize

        350KB

        MD5

        235a269ead64da996ef591b3b1483dd9

        SHA1

        08115fcee461292b700e562ebf7733c76bf79631

        SHA256

        89a2f17c2596e1cef1999cffbd4eead5ef52411b763ac18e26caf4972211545d

        SHA512

        69a73f100d0279ebfd34a5da986cf522c9264213720159fe9535511c166a2627dfb6612b4138b05d0c33fe9aa1eb721aee94ef14e1bfa19505dbb4190766b3c4

      • memory/3132-148-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/3132-149-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

        Filesize

        64KB

      • memory/3132-150-0x0000000004CE0000-0x0000000005284000-memory.dmp

        Filesize

        5.6MB

      • memory/3132-151-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3132-152-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3132-154-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3132-156-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3132-158-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3132-160-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3132-163-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

        Filesize

        64KB

      • memory/3132-162-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3132-164-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

        Filesize

        64KB

      • memory/3132-166-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3132-168-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3132-170-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3132-172-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3132-174-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3132-176-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3132-178-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3132-180-0x0000000002750000-0x0000000002762000-memory.dmp

        Filesize

        72KB

      • memory/3132-181-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/3132-182-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

        Filesize

        64KB

      • memory/3132-183-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

        Filesize

        64KB

      • memory/3132-185-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/3820-1121-0x0000000000AE0000-0x0000000000B12000-memory.dmp

        Filesize

        200KB

      • memory/3820-1123-0x00000000053A0000-0x00000000053B0000-memory.dmp

        Filesize

        64KB

      • memory/3820-1122-0x00000000053A0000-0x00000000053B0000-memory.dmp

        Filesize

        64KB

      • memory/4652-195-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4652-227-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4652-197-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4652-199-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4652-201-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4652-203-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4652-205-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4652-207-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4652-209-0x0000000000820000-0x000000000086B000-memory.dmp

        Filesize

        300KB

      • memory/4652-211-0x0000000004E20000-0x0000000004E30000-memory.dmp

        Filesize

        64KB

      • memory/4652-210-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4652-215-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4652-214-0x0000000004E20000-0x0000000004E30000-memory.dmp

        Filesize

        64KB

      • memory/4652-212-0x0000000004E20000-0x0000000004E30000-memory.dmp

        Filesize

        64KB

      • memory/4652-217-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4652-219-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4652-221-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4652-223-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4652-225-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4652-193-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4652-1100-0x00000000053E0000-0x00000000059F8000-memory.dmp

        Filesize

        6.1MB

      • memory/4652-1101-0x0000000005A00000-0x0000000005B0A000-memory.dmp

        Filesize

        1.0MB

      • memory/4652-1102-0x0000000005B10000-0x0000000005B22000-memory.dmp

        Filesize

        72KB

      • memory/4652-1103-0x0000000005B30000-0x0000000005B6C000-memory.dmp

        Filesize

        240KB

      • memory/4652-1104-0x0000000004E20000-0x0000000004E30000-memory.dmp

        Filesize

        64KB

      • memory/4652-1106-0x0000000004E20000-0x0000000004E30000-memory.dmp

        Filesize

        64KB

      • memory/4652-1107-0x0000000004E20000-0x0000000004E30000-memory.dmp

        Filesize

        64KB

      • memory/4652-1108-0x0000000004E20000-0x0000000004E30000-memory.dmp

        Filesize

        64KB

      • memory/4652-1109-0x0000000005E10000-0x0000000005EA2000-memory.dmp

        Filesize

        584KB

      • memory/4652-1110-0x0000000005EB0000-0x0000000005F16000-memory.dmp

        Filesize

        408KB

      • memory/4652-1111-0x0000000006710000-0x00000000068D2000-memory.dmp

        Filesize

        1.8MB

      • memory/4652-1112-0x00000000068E0000-0x0000000006E0C000-memory.dmp

        Filesize

        5.2MB

      • memory/4652-191-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4652-190-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4652-1113-0x0000000004E20000-0x0000000004E30000-memory.dmp

        Filesize

        64KB

      • memory/4652-1114-0x0000000006F60000-0x0000000006FD6000-memory.dmp

        Filesize

        472KB

      • memory/4652-1115-0x0000000006FE0000-0x0000000007030000-memory.dmp

        Filesize

        320KB