Analysis

  • max time kernel
    54s
  • max time network
    65s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 14:45

General

  • Target

    71d4ce07babc7d16d753b5bd31ce33b3d333712838618ad900beb7c4d623e0e8.exe

  • Size

    680KB

  • MD5

    32db06c269f153f472f7774370ae81d1

  • SHA1

    822ea3c82c7a28b00fe079b0c3546a3a2a64c627

  • SHA256

    71d4ce07babc7d16d753b5bd31ce33b3d333712838618ad900beb7c4d623e0e8

  • SHA512

    278cf98e5f297e086414b20100b03d204dad72d160f6f6ea0b2891b539d935e3b265aad8087d01d894b59788e1294e0ab5fe04a416070f0686a42fdddc1e519f

  • SSDEEP

    12288:K6gKv6OXMd+PoUzOyWIuQ9QkYro8uiQhAfwpCQvoWevi7XxCkI0uob/:F5VX3PnrKkYPuphAYsQ1t7XxtIw/

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\71d4ce07babc7d16d753b5bd31ce33b3d333712838618ad900beb7c4d623e0e8.exe
    "C:\Users\Admin\AppData\Local\Temp\71d4ce07babc7d16d753b5bd31ce33b3d333712838618ad900beb7c4d623e0e8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4300
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPV5636.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPV5636.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2056
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr247149.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr247149.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4124
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku493232.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku493232.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4548
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr905874.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr905874.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1912

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr905874.exe

    Filesize

    175KB

    MD5

    ab3003e6ebc98cf86aa495f259303e0f

    SHA1

    6366ac26e8598bb949c36a8d7cd22a176f17a791

    SHA256

    dae682152cea59915f784a31d833e3ae3a80e8a0174d9c2d455953d3009f895a

    SHA512

    6d3257c801a240cd348ab6882d9217668d1772ef2aa7c37d67e791fe699b439e47e91135f3d429301172ceea788d610102e7308e75cf9bf2e7f0a49d208ce5ba

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lr905874.exe

    Filesize

    175KB

    MD5

    ab3003e6ebc98cf86aa495f259303e0f

    SHA1

    6366ac26e8598bb949c36a8d7cd22a176f17a791

    SHA256

    dae682152cea59915f784a31d833e3ae3a80e8a0174d9c2d455953d3009f895a

    SHA512

    6d3257c801a240cd348ab6882d9217668d1772ef2aa7c37d67e791fe699b439e47e91135f3d429301172ceea788d610102e7308e75cf9bf2e7f0a49d208ce5ba

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPV5636.exe

    Filesize

    403KB

    MD5

    b25155268ddf34f55b5e0a8d1c92de52

    SHA1

    5579f1cbc8298290de2a3fc0f9edfb72a7df824b

    SHA256

    e20f4e60e7b8d90552cde344ecb9b034264fb6a212403b56088ec4052afa1d2b

    SHA512

    2ad238414b68286599ec8e040bc43992c11b33299810aab4dc3a1a438def650c4cbe338ae55e1f3f025358f84bf9f6d672ce5b08e44599a4524692dc577afa63

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ziPV5636.exe

    Filesize

    403KB

    MD5

    b25155268ddf34f55b5e0a8d1c92de52

    SHA1

    5579f1cbc8298290de2a3fc0f9edfb72a7df824b

    SHA256

    e20f4e60e7b8d90552cde344ecb9b034264fb6a212403b56088ec4052afa1d2b

    SHA512

    2ad238414b68286599ec8e040bc43992c11b33299810aab4dc3a1a438def650c4cbe338ae55e1f3f025358f84bf9f6d672ce5b08e44599a4524692dc577afa63

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr247149.exe

    Filesize

    12KB

    MD5

    d81abf887301bc1fd97cc7593348a5bf

    SHA1

    4e6d98dd66f1fd734ff958a2ca088cff709f9c74

    SHA256

    91560e84e8e0257ab12db2669eed8c5a5ba3bbaa537be93005aaaaff206bacbe

    SHA512

    d7b5b67ff81c6c9ebaeacac4434fb530933fc5765f32610372d7a15c2a0e137c204065a3ceb1ffd5aa6afc34802b79ad636e98f5660d3b6a3f97bb0a302d2cb2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\jr247149.exe

    Filesize

    12KB

    MD5

    d81abf887301bc1fd97cc7593348a5bf

    SHA1

    4e6d98dd66f1fd734ff958a2ca088cff709f9c74

    SHA256

    91560e84e8e0257ab12db2669eed8c5a5ba3bbaa537be93005aaaaff206bacbe

    SHA512

    d7b5b67ff81c6c9ebaeacac4434fb530933fc5765f32610372d7a15c2a0e137c204065a3ceb1ffd5aa6afc34802b79ad636e98f5660d3b6a3f97bb0a302d2cb2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku493232.exe

    Filesize

    350KB

    MD5

    7a7c172bc39da6195b009137d7074025

    SHA1

    adede58202ac295ceab6cc1e76a8cb9f00236b17

    SHA256

    a77e9383f964ca874c2c5769fa458342bfc9e8586e9f3d7af88bb8c06f793f44

    SHA512

    cf874ad3212d1d6c2d11a0b90677842f65e3c2283a2e7711318b6e13c7473b81c9e83496a4871a5349798d8a1d74d36885907326435aeb578e7ec7ca600898f7

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\ku493232.exe

    Filesize

    350KB

    MD5

    7a7c172bc39da6195b009137d7074025

    SHA1

    adede58202ac295ceab6cc1e76a8cb9f00236b17

    SHA256

    a77e9383f964ca874c2c5769fa458342bfc9e8586e9f3d7af88bb8c06f793f44

    SHA512

    cf874ad3212d1d6c2d11a0b90677842f65e3c2283a2e7711318b6e13c7473b81c9e83496a4871a5349798d8a1d74d36885907326435aeb578e7ec7ca600898f7

  • memory/1912-1084-0x0000000005530000-0x0000000005540000-memory.dmp

    Filesize

    64KB

  • memory/1912-1083-0x00000000056F0000-0x000000000573B000-memory.dmp

    Filesize

    300KB

  • memory/1912-1082-0x0000000000CA0000-0x0000000000CD2000-memory.dmp

    Filesize

    200KB

  • memory/4124-138-0x0000000000DB0000-0x0000000000DBA000-memory.dmp

    Filesize

    40KB

  • memory/4300-123-0x00000000044E0000-0x000000000456A000-memory.dmp

    Filesize

    552KB

  • memory/4300-139-0x0000000000400000-0x000000000076D000-memory.dmp

    Filesize

    3.4MB

  • memory/4300-140-0x00000000044E0000-0x000000000456A000-memory.dmp

    Filesize

    552KB

  • memory/4548-182-0x00000000051A0000-0x00000000051DE000-memory.dmp

    Filesize

    248KB

  • memory/4548-198-0x00000000051A0000-0x00000000051DE000-memory.dmp

    Filesize

    248KB

  • memory/4548-154-0x00000000051A0000-0x00000000051DE000-memory.dmp

    Filesize

    248KB

  • memory/4548-150-0x00000000051A0000-0x00000000051DE000-memory.dmp

    Filesize

    248KB

  • memory/4548-156-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/4548-157-0x00000000051A0000-0x00000000051DE000-memory.dmp

    Filesize

    248KB

  • memory/4548-158-0x0000000002600000-0x0000000002610000-memory.dmp

    Filesize

    64KB

  • memory/4548-162-0x0000000002600000-0x0000000002610000-memory.dmp

    Filesize

    64KB

  • memory/4548-164-0x00000000051A0000-0x00000000051DE000-memory.dmp

    Filesize

    248KB

  • memory/4548-161-0x00000000051A0000-0x00000000051DE000-memory.dmp

    Filesize

    248KB

  • memory/4548-166-0x00000000051A0000-0x00000000051DE000-memory.dmp

    Filesize

    248KB

  • memory/4548-160-0x0000000002600000-0x0000000002610000-memory.dmp

    Filesize

    64KB

  • memory/4548-168-0x00000000051A0000-0x00000000051DE000-memory.dmp

    Filesize

    248KB

  • memory/4548-170-0x00000000051A0000-0x00000000051DE000-memory.dmp

    Filesize

    248KB

  • memory/4548-172-0x00000000051A0000-0x00000000051DE000-memory.dmp

    Filesize

    248KB

  • memory/4548-174-0x00000000051A0000-0x00000000051DE000-memory.dmp

    Filesize

    248KB

  • memory/4548-176-0x00000000051A0000-0x00000000051DE000-memory.dmp

    Filesize

    248KB

  • memory/4548-178-0x00000000051A0000-0x00000000051DE000-memory.dmp

    Filesize

    248KB

  • memory/4548-180-0x00000000051A0000-0x00000000051DE000-memory.dmp

    Filesize

    248KB

  • memory/4548-149-0x00000000051A0000-0x00000000051DE000-memory.dmp

    Filesize

    248KB

  • memory/4548-184-0x00000000051A0000-0x00000000051DE000-memory.dmp

    Filesize

    248KB

  • memory/4548-186-0x00000000051A0000-0x00000000051DE000-memory.dmp

    Filesize

    248KB

  • memory/4548-188-0x00000000051A0000-0x00000000051DE000-memory.dmp

    Filesize

    248KB

  • memory/4548-190-0x00000000051A0000-0x00000000051DE000-memory.dmp

    Filesize

    248KB

  • memory/4548-192-0x00000000051A0000-0x00000000051DE000-memory.dmp

    Filesize

    248KB

  • memory/4548-194-0x00000000051A0000-0x00000000051DE000-memory.dmp

    Filesize

    248KB

  • memory/4548-196-0x00000000051A0000-0x00000000051DE000-memory.dmp

    Filesize

    248KB

  • memory/4548-152-0x00000000051A0000-0x00000000051DE000-memory.dmp

    Filesize

    248KB

  • memory/4548-200-0x00000000051A0000-0x00000000051DE000-memory.dmp

    Filesize

    248KB

  • memory/4548-202-0x00000000051A0000-0x00000000051DE000-memory.dmp

    Filesize

    248KB

  • memory/4548-204-0x00000000051A0000-0x00000000051DE000-memory.dmp

    Filesize

    248KB

  • memory/4548-206-0x00000000051A0000-0x00000000051DE000-memory.dmp

    Filesize

    248KB

  • memory/4548-208-0x00000000051A0000-0x00000000051DE000-memory.dmp

    Filesize

    248KB

  • memory/4548-210-0x00000000051A0000-0x00000000051DE000-memory.dmp

    Filesize

    248KB

  • memory/4548-212-0x00000000051A0000-0x00000000051DE000-memory.dmp

    Filesize

    248KB

  • memory/4548-214-0x00000000051A0000-0x00000000051DE000-memory.dmp

    Filesize

    248KB

  • memory/4548-1059-0x0000000005980000-0x0000000005F86000-memory.dmp

    Filesize

    6.0MB

  • memory/4548-1060-0x00000000053F0000-0x00000000054FA000-memory.dmp

    Filesize

    1.0MB

  • memory/4548-1061-0x0000000005530000-0x0000000005542000-memory.dmp

    Filesize

    72KB

  • memory/4548-1062-0x0000000005550000-0x000000000558E000-memory.dmp

    Filesize

    248KB

  • memory/4548-1063-0x00000000056A0000-0x00000000056EB000-memory.dmp

    Filesize

    300KB

  • memory/4548-1064-0x0000000002600000-0x0000000002610000-memory.dmp

    Filesize

    64KB

  • memory/4548-1067-0x0000000005830000-0x0000000005896000-memory.dmp

    Filesize

    408KB

  • memory/4548-1068-0x0000000006510000-0x00000000065A2000-memory.dmp

    Filesize

    584KB

  • memory/4548-1069-0x0000000002600000-0x0000000002610000-memory.dmp

    Filesize

    64KB

  • memory/4548-1070-0x0000000002600000-0x0000000002610000-memory.dmp

    Filesize

    64KB

  • memory/4548-1071-0x0000000002600000-0x0000000002610000-memory.dmp

    Filesize

    64KB

  • memory/4548-1072-0x0000000006600000-0x00000000067C2000-memory.dmp

    Filesize

    1.8MB

  • memory/4548-1073-0x00000000067D0000-0x0000000006CFC000-memory.dmp

    Filesize

    5.2MB

  • memory/4548-1074-0x0000000006F20000-0x0000000006F96000-memory.dmp

    Filesize

    472KB

  • memory/4548-148-0x00000000051A0000-0x00000000051E4000-memory.dmp

    Filesize

    272KB

  • memory/4548-147-0x0000000004C60000-0x000000000515E000-memory.dmp

    Filesize

    5.0MB

  • memory/4548-146-0x0000000002610000-0x0000000002656000-memory.dmp

    Filesize

    280KB

  • memory/4548-1075-0x0000000006FA0000-0x0000000006FF0000-memory.dmp

    Filesize

    320KB

  • memory/4548-1076-0x0000000002600000-0x0000000002610000-memory.dmp

    Filesize

    64KB