Analysis

  • max time kernel
    85s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 14:51

General

  • Target

    55d4708d3ae1ebb20238ea1586c064c29b39c9bea6a09ad777b002d126f618e6.exe

  • Size

    685KB

  • MD5

    ac77252cfe06529807885e1dc3adf98d

  • SHA1

    08fcd3c297e4735ba125bcbda89d53f59b62ae19

  • SHA256

    55d4708d3ae1ebb20238ea1586c064c29b39c9bea6a09ad777b002d126f618e6

  • SHA512

    5a9e0628b2a3b42aea906c616e8706ae2fecd1a0a2d807c68c73ce8c3232fb58782d71ffda8a489867b82c43f13c783437edc255fc1fd9a2a4c5dfe10f11ba54

  • SSDEEP

    12288:nMrHy90kVnTsmwM6AylVFdTzjoa+Tr8BlYoEiIxE4:0y/RTsmwM6ZTzjN+8HYoEiJ4

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55d4708d3ae1ebb20238ea1586c064c29b39c9bea6a09ad777b002d126f618e6.exe
    "C:\Users\Admin\AppData\Local\Temp\55d4708d3ae1ebb20238ea1586c064c29b39c9bea6a09ad777b002d126f618e6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un961468.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un961468.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:740
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7485.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7485.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2192
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2192 -s 1084
          4⤵
          • Program crash
          PID:432
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4757.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4757.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3584
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 1980
          4⤵
          • Program crash
          PID:1564
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si523450.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si523450.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:880
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2192 -ip 2192
    1⤵
      PID:5116
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3584 -ip 3584
      1⤵
        PID:2700

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si523450.exe

        Filesize

        175KB

        MD5

        74384e94fd7e0b62a67f27dddf93a89b

        SHA1

        0d2969a20eab3d6410716da377ed24861de317d2

        SHA256

        10d3f27ca2f4de55f0ab28d4c00e80c47cb335e5d8d0b29fa49759b696950a62

        SHA512

        b1907f2652e819c29c3d9a6caa3dcad1e31241168c5c1634f928afbcc73e5bad7d564dc695d5109c30002f64a80ec264b5246d15903a5a1891471275ed3617e7

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si523450.exe

        Filesize

        175KB

        MD5

        74384e94fd7e0b62a67f27dddf93a89b

        SHA1

        0d2969a20eab3d6410716da377ed24861de317d2

        SHA256

        10d3f27ca2f4de55f0ab28d4c00e80c47cb335e5d8d0b29fa49759b696950a62

        SHA512

        b1907f2652e819c29c3d9a6caa3dcad1e31241168c5c1634f928afbcc73e5bad7d564dc695d5109c30002f64a80ec264b5246d15903a5a1891471275ed3617e7

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un961468.exe

        Filesize

        543KB

        MD5

        98866fbc5f379a6593a7d6d005cdb3e3

        SHA1

        f5439258c83cc907ddd62c3862543f2a82f34b2d

        SHA256

        c39368740d78d8536681b98e228ead04266b6536a44425118645fb3e047f0d36

        SHA512

        f5f1e6d71500d54d3f6404863d9d738233980074e23cbdcf10756cfcbe6ee9010786d93dcd55c40a4888a3ff38661cfe41ccf8c5fa3d5bfc9cf1ecaf4273fb0e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un961468.exe

        Filesize

        543KB

        MD5

        98866fbc5f379a6593a7d6d005cdb3e3

        SHA1

        f5439258c83cc907ddd62c3862543f2a82f34b2d

        SHA256

        c39368740d78d8536681b98e228ead04266b6536a44425118645fb3e047f0d36

        SHA512

        f5f1e6d71500d54d3f6404863d9d738233980074e23cbdcf10756cfcbe6ee9010786d93dcd55c40a4888a3ff38661cfe41ccf8c5fa3d5bfc9cf1ecaf4273fb0e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7485.exe

        Filesize

        292KB

        MD5

        8b9a121752e752b632102738105bafe2

        SHA1

        33ce3698a74f3b007da2d6748719cc6f281595a8

        SHA256

        a03a9ced07bf4c21517293f70f6ba0332a0fb8642c484ce5238e6e329019b80c

        SHA512

        15150ad0025fff3afac0a709a46a89d7a93cf383c751137af44e61afbfdff1f556821eabfed875741205f8bc7a8c3d6937137047576d9d0156c3aa4bced73a8b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7485.exe

        Filesize

        292KB

        MD5

        8b9a121752e752b632102738105bafe2

        SHA1

        33ce3698a74f3b007da2d6748719cc6f281595a8

        SHA256

        a03a9ced07bf4c21517293f70f6ba0332a0fb8642c484ce5238e6e329019b80c

        SHA512

        15150ad0025fff3afac0a709a46a89d7a93cf383c751137af44e61afbfdff1f556821eabfed875741205f8bc7a8c3d6937137047576d9d0156c3aa4bced73a8b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4757.exe

        Filesize

        350KB

        MD5

        705b1e42e67896464a253800c923c473

        SHA1

        aab9bc22de1c002ff752bf342fe21a45fca168c6

        SHA256

        d8557b46b3f9cf793653c65d80007bfbce994f380a67c405682dfa75bd8732e4

        SHA512

        7c7305e5999dbbdd265ff721a34a5fbd07fdb0ce66beb53c68ffd08c1b4832ba9205ea5f25295e2907835cec866a69bdea4641110728db2aae3a9ef0a327b22e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4757.exe

        Filesize

        350KB

        MD5

        705b1e42e67896464a253800c923c473

        SHA1

        aab9bc22de1c002ff752bf342fe21a45fca168c6

        SHA256

        d8557b46b3f9cf793653c65d80007bfbce994f380a67c405682dfa75bd8732e4

        SHA512

        7c7305e5999dbbdd265ff721a34a5fbd07fdb0ce66beb53c68ffd08c1b4832ba9205ea5f25295e2907835cec866a69bdea4641110728db2aae3a9ef0a327b22e

      • memory/880-1121-0x0000000005490000-0x00000000054A0000-memory.dmp

        Filesize

        64KB

      • memory/880-1120-0x0000000000A40000-0x0000000000A72000-memory.dmp

        Filesize

        200KB

      • memory/2192-156-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/2192-170-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/2192-151-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/2192-152-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/2192-153-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/2192-154-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/2192-150-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/2192-158-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/2192-160-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/2192-162-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/2192-164-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/2192-166-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/2192-168-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/2192-148-0x00000000007F0000-0x000000000081D000-memory.dmp

        Filesize

        180KB

      • memory/2192-172-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/2192-174-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/2192-176-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/2192-178-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/2192-180-0x0000000002610000-0x0000000002622000-memory.dmp

        Filesize

        72KB

      • memory/2192-181-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/2192-182-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/2192-183-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/2192-184-0x0000000004EE0000-0x0000000004EF0000-memory.dmp

        Filesize

        64KB

      • memory/2192-186-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/2192-149-0x0000000004EF0000-0x0000000005494000-memory.dmp

        Filesize

        5.6MB

      • memory/3584-191-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/3584-194-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/3584-196-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/3584-198-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/3584-200-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/3584-202-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/3584-204-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/3584-206-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/3584-208-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/3584-210-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/3584-212-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/3584-214-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/3584-216-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/3584-218-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/3584-220-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/3584-222-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/3584-224-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/3584-370-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

        Filesize

        64KB

      • memory/3584-372-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

        Filesize

        64KB

      • memory/3584-369-0x0000000000720000-0x000000000076B000-memory.dmp

        Filesize

        300KB

      • memory/3584-1100-0x0000000005460000-0x0000000005A78000-memory.dmp

        Filesize

        6.1MB

      • memory/3584-1101-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/3584-1102-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/3584-1103-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

        Filesize

        64KB

      • memory/3584-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/3584-1105-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/3584-1106-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/3584-1107-0x00000000066F0000-0x0000000006766000-memory.dmp

        Filesize

        472KB

      • memory/3584-1108-0x0000000006780000-0x00000000067D0000-memory.dmp

        Filesize

        320KB

      • memory/3584-1110-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

        Filesize

        64KB

      • memory/3584-1111-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

        Filesize

        64KB

      • memory/3584-192-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/3584-1112-0x0000000006C40000-0x0000000006E02000-memory.dmp

        Filesize

        1.8MB

      • memory/3584-1113-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

        Filesize

        64KB

      • memory/3584-1114-0x0000000006E10000-0x000000000733C000-memory.dmp

        Filesize

        5.2MB