Analysis

  • max time kernel
    49s
  • max time network
    64s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 14:48

General

  • Target

    0ecde6058d2b547403884d58cbd295e3f887024bf34def529b8ba5b1d9891bb7.exe

  • Size

    685KB

  • MD5

    02066f65e90b84b01491f2bcdc4d729e

  • SHA1

    a45882589436d23560db3159f23a11f129b235d7

  • SHA256

    0ecde6058d2b547403884d58cbd295e3f887024bf34def529b8ba5b1d9891bb7

  • SHA512

    37a4415639403c815799b015490b9616db652ef792a79d21341a2543d723f9d24819fa4a301ffaa656a6af1dbcf06055c371350e2860548072dfacfaad212a07

  • SSDEEP

    12288:QMriy9081BKPBSIExJ0WX7Af1zcBnKwEGIALtsgP:iyjmPBSmWX7Af2FKwEbE

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ecde6058d2b547403884d58cbd295e3f887024bf34def529b8ba5b1d9891bb7.exe
    "C:\Users\Admin\AppData\Local\Temp\0ecde6058d2b547403884d58cbd295e3f887024bf34def529b8ba5b1d9891bb7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2452
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un401744.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un401744.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2588
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6829.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6829.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3012
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8197.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8197.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1932
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si258840.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si258840.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3472

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si258840.exe

    Filesize

    175KB

    MD5

    b59a32fb03f1d18c5bf6a00844dac6f2

    SHA1

    6636c89481a902b83121463294f980a8a390dad4

    SHA256

    a8ca3581ef9d2f93818fe316768c661ce254fa3d9e68920c862a8c04152bef12

    SHA512

    ebef0230373cdc340b59fe594c8e83f454674bbb0f0224a3442da021682e678d406a062bc774dbbfa4cec7d5f843ad4db9235cbbd8c3e52c0e7fd420d0234792

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si258840.exe

    Filesize

    175KB

    MD5

    b59a32fb03f1d18c5bf6a00844dac6f2

    SHA1

    6636c89481a902b83121463294f980a8a390dad4

    SHA256

    a8ca3581ef9d2f93818fe316768c661ce254fa3d9e68920c862a8c04152bef12

    SHA512

    ebef0230373cdc340b59fe594c8e83f454674bbb0f0224a3442da021682e678d406a062bc774dbbfa4cec7d5f843ad4db9235cbbd8c3e52c0e7fd420d0234792

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un401744.exe

    Filesize

    543KB

    MD5

    0decadaf7d4916271ba19c0d825986e2

    SHA1

    89ea7a0f08cf0ecd1d27918dfd78648a16bddf54

    SHA256

    1957e2e629f39515da8d96a01d4b2f8ac304896f45dce930f64ac81c6f2a2f59

    SHA512

    3b7cb6e66a19aac8d22feaa68a6850bd25fe8ea4178dc722571698ace78f6deb1ba055c1b6105cdc09521c8772ab6122402179c3829b7ae200127398a91015df

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un401744.exe

    Filesize

    543KB

    MD5

    0decadaf7d4916271ba19c0d825986e2

    SHA1

    89ea7a0f08cf0ecd1d27918dfd78648a16bddf54

    SHA256

    1957e2e629f39515da8d96a01d4b2f8ac304896f45dce930f64ac81c6f2a2f59

    SHA512

    3b7cb6e66a19aac8d22feaa68a6850bd25fe8ea4178dc722571698ace78f6deb1ba055c1b6105cdc09521c8772ab6122402179c3829b7ae200127398a91015df

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6829.exe

    Filesize

    292KB

    MD5

    63d8c646b3fd6384509dd2fecde27962

    SHA1

    a98519e61f95a2a98089c44fe17dd5c0d5898f00

    SHA256

    b6e36a4b9890b44ad65764ec4d86fa1134b51f191ca744dcef8bcd54f5c9fb47

    SHA512

    e43e6e1768245c198a6f7b9957d729cd9beba0f12f09057887f58e04d1a9eabc3b0ea79d6d1db295ed4bb9ad95f6135707ab651d678ac4cfa19cda9594ed7108

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6829.exe

    Filesize

    292KB

    MD5

    63d8c646b3fd6384509dd2fecde27962

    SHA1

    a98519e61f95a2a98089c44fe17dd5c0d5898f00

    SHA256

    b6e36a4b9890b44ad65764ec4d86fa1134b51f191ca744dcef8bcd54f5c9fb47

    SHA512

    e43e6e1768245c198a6f7b9957d729cd9beba0f12f09057887f58e04d1a9eabc3b0ea79d6d1db295ed4bb9ad95f6135707ab651d678ac4cfa19cda9594ed7108

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8197.exe

    Filesize

    350KB

    MD5

    50cda2e1f3cf7c94939277bb99d0e631

    SHA1

    89cd717b92e5decb55f4fcdeda323aeb4ba29349

    SHA256

    07fcbb89887d62a1550a5bd10f0b5fd4de138c41097f35ecabaad65d1424be7e

    SHA512

    335606313d599a1293285bebed14c3b245f60e20b82f63ad190ad2c2b02f2112062802f3db47d0fc3d4fe956015f8abe3436b0768b4f317ef218ad7930217591

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8197.exe

    Filesize

    350KB

    MD5

    50cda2e1f3cf7c94939277bb99d0e631

    SHA1

    89cd717b92e5decb55f4fcdeda323aeb4ba29349

    SHA256

    07fcbb89887d62a1550a5bd10f0b5fd4de138c41097f35ecabaad65d1424be7e

    SHA512

    335606313d599a1293285bebed14c3b245f60e20b82f63ad190ad2c2b02f2112062802f3db47d0fc3d4fe956015f8abe3436b0768b4f317ef218ad7930217591

  • memory/1932-1093-0x0000000005850000-0x0000000005E56000-memory.dmp

    Filesize

    6.0MB

  • memory/1932-220-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/1932-1109-0x0000000002750000-0x0000000002760000-memory.dmp

    Filesize

    64KB

  • memory/1932-1108-0x00000000069C0000-0x0000000006EEC000-memory.dmp

    Filesize

    5.2MB

  • memory/1932-1107-0x00000000067F0000-0x00000000069B2000-memory.dmp

    Filesize

    1.8MB

  • memory/1932-198-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/1932-1106-0x0000000006780000-0x00000000067D0000-memory.dmp

    Filesize

    320KB

  • memory/1932-1105-0x00000000066F0000-0x0000000006766000-memory.dmp

    Filesize

    472KB

  • memory/1932-1104-0x0000000002750000-0x0000000002760000-memory.dmp

    Filesize

    64KB

  • memory/1932-1103-0x0000000002750000-0x0000000002760000-memory.dmp

    Filesize

    64KB

  • memory/1932-200-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/1932-1102-0x0000000002750000-0x0000000002760000-memory.dmp

    Filesize

    64KB

  • memory/1932-1100-0x00000000057A0000-0x0000000005806000-memory.dmp

    Filesize

    408KB

  • memory/1932-1099-0x0000000005700000-0x0000000005792000-memory.dmp

    Filesize

    584KB

  • memory/1932-1098-0x0000000005570000-0x00000000055BB000-memory.dmp

    Filesize

    300KB

  • memory/1932-1097-0x0000000002750000-0x0000000002760000-memory.dmp

    Filesize

    64KB

  • memory/1932-1096-0x0000000005420000-0x000000000545E000-memory.dmp

    Filesize

    248KB

  • memory/1932-1095-0x0000000005400000-0x0000000005412000-memory.dmp

    Filesize

    72KB

  • memory/1932-1094-0x00000000052C0000-0x00000000053CA000-memory.dmp

    Filesize

    1.0MB

  • memory/1932-208-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/1932-218-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/1932-216-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/1932-204-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/1932-214-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/1932-211-0x0000000002750000-0x0000000002760000-memory.dmp

    Filesize

    64KB

  • memory/1932-181-0x00000000026B0000-0x00000000026F6000-memory.dmp

    Filesize

    280KB

  • memory/1932-182-0x00000000051C0000-0x0000000005204000-memory.dmp

    Filesize

    272KB

  • memory/1932-184-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/1932-183-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/1932-196-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/1932-188-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/1932-190-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/1932-192-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/1932-194-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/1932-186-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/1932-212-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/1932-209-0x0000000002750000-0x0000000002760000-memory.dmp

    Filesize

    64KB

  • memory/1932-202-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/1932-205-0x0000000000720000-0x000000000076B000-memory.dmp

    Filesize

    300KB

  • memory/1932-207-0x0000000002750000-0x0000000002760000-memory.dmp

    Filesize

    64KB

  • memory/3012-171-0x0000000000400000-0x000000000070C000-memory.dmp

    Filesize

    3.0MB

  • memory/3012-156-0x0000000004C50000-0x0000000004C62000-memory.dmp

    Filesize

    72KB

  • memory/3012-146-0x0000000004C50000-0x0000000004C62000-memory.dmp

    Filesize

    72KB

  • memory/3012-139-0x0000000000820000-0x000000000084D000-memory.dmp

    Filesize

    180KB

  • memory/3012-140-0x0000000004D30000-0x0000000004D40000-memory.dmp

    Filesize

    64KB

  • memory/3012-176-0x0000000000400000-0x000000000070C000-memory.dmp

    Filesize

    3.0MB

  • memory/3012-174-0x0000000004D30000-0x0000000004D40000-memory.dmp

    Filesize

    64KB

  • memory/3012-173-0x0000000004D30000-0x0000000004D40000-memory.dmp

    Filesize

    64KB

  • memory/3012-172-0x0000000004D30000-0x0000000004D40000-memory.dmp

    Filesize

    64KB

  • memory/3012-138-0x0000000004C50000-0x0000000004C68000-memory.dmp

    Filesize

    96KB

  • memory/3012-141-0x0000000004D30000-0x0000000004D40000-memory.dmp

    Filesize

    64KB

  • memory/3012-170-0x0000000004C50000-0x0000000004C62000-memory.dmp

    Filesize

    72KB

  • memory/3012-168-0x0000000004C50000-0x0000000004C62000-memory.dmp

    Filesize

    72KB

  • memory/3012-166-0x0000000004C50000-0x0000000004C62000-memory.dmp

    Filesize

    72KB

  • memory/3012-164-0x0000000004C50000-0x0000000004C62000-memory.dmp

    Filesize

    72KB

  • memory/3012-162-0x0000000004C50000-0x0000000004C62000-memory.dmp

    Filesize

    72KB

  • memory/3012-160-0x0000000004C50000-0x0000000004C62000-memory.dmp

    Filesize

    72KB

  • memory/3012-158-0x0000000004C50000-0x0000000004C62000-memory.dmp

    Filesize

    72KB

  • memory/3012-154-0x0000000004C50000-0x0000000004C62000-memory.dmp

    Filesize

    72KB

  • memory/3012-152-0x0000000004C50000-0x0000000004C62000-memory.dmp

    Filesize

    72KB

  • memory/3012-150-0x0000000004C50000-0x0000000004C62000-memory.dmp

    Filesize

    72KB

  • memory/3012-148-0x0000000004C50000-0x0000000004C62000-memory.dmp

    Filesize

    72KB

  • memory/3012-143-0x0000000004C50000-0x0000000004C62000-memory.dmp

    Filesize

    72KB

  • memory/3012-144-0x0000000004C50000-0x0000000004C62000-memory.dmp

    Filesize

    72KB

  • memory/3012-142-0x0000000004D30000-0x0000000004D40000-memory.dmp

    Filesize

    64KB

  • memory/3012-137-0x0000000004D40000-0x000000000523E000-memory.dmp

    Filesize

    5.0MB

  • memory/3012-136-0x0000000002390000-0x00000000023AA000-memory.dmp

    Filesize

    104KB

  • memory/3472-1115-0x0000000000D70000-0x0000000000DA2000-memory.dmp

    Filesize

    200KB

  • memory/3472-1116-0x00000000057B0000-0x00000000057FB000-memory.dmp

    Filesize

    300KB

  • memory/3472-1117-0x0000000005980000-0x0000000005990000-memory.dmp

    Filesize

    64KB