Analysis

  • max time kernel
    50s
  • max time network
    64s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 14:53

General

  • Target

    29a1e995a8a9808eaf8d4950139dc2215649aa1df73bb66a8f747dc25eece528.exe

  • Size

    685KB

  • MD5

    efea4eaeed461c7d12cfad2f17d7e561

  • SHA1

    db45975881acb596c9db3469b2d813a6cd6a9c11

  • SHA256

    29a1e995a8a9808eaf8d4950139dc2215649aa1df73bb66a8f747dc25eece528

  • SHA512

    3c24349e5cbd8e4623670326846952e38bec08f137e8d69d66374c0686a1777a80b041f364dfc5e3c823a72d6f9eeed3da9ea4ce009c3e6874ba3de672a77a55

  • SSDEEP

    12288:2Mrny90Zk4m+SmAKoCoHJDk4V1/DKCXi9az8EiPcBFi+EwI2yOu:ty1VCoHdn2kiG8EiEni+ESyZ

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\29a1e995a8a9808eaf8d4950139dc2215649aa1df73bb66a8f747dc25eece528.exe
    "C:\Users\Admin\AppData\Local\Temp\29a1e995a8a9808eaf8d4950139dc2215649aa1df73bb66a8f747dc25eece528.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un741045.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un741045.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2260
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8219.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8219.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2536
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9763.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9763.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2764
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si242315.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si242315.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1544

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si242315.exe

    Filesize

    175KB

    MD5

    ccbc3969f7f7e509bd403641a28c26fb

    SHA1

    2c0dd8f170fe87639f2ba309f68c0ecb16bf4ce8

    SHA256

    f92025ed5915a836f7e3984ca44e13463308922d14c75e4041d3573876b9a061

    SHA512

    0ae24719df16e84a46ad7bbc21964364740133ce7e635f4c7b1a6db030f7b1a4c00f9235a7a7d74d1ca49d701b4f178f00812feee5a9c73699b10e06e3fa9330

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si242315.exe

    Filesize

    175KB

    MD5

    ccbc3969f7f7e509bd403641a28c26fb

    SHA1

    2c0dd8f170fe87639f2ba309f68c0ecb16bf4ce8

    SHA256

    f92025ed5915a836f7e3984ca44e13463308922d14c75e4041d3573876b9a061

    SHA512

    0ae24719df16e84a46ad7bbc21964364740133ce7e635f4c7b1a6db030f7b1a4c00f9235a7a7d74d1ca49d701b4f178f00812feee5a9c73699b10e06e3fa9330

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un741045.exe

    Filesize

    543KB

    MD5

    c4c8650eaf93559e9236d2149b6e6e15

    SHA1

    c5254e14d188d8237a5e6cdda90fab97ab797635

    SHA256

    f3810d2ac15e1a6cdbb6cbd3377b83af3d4ff8adb89400891324ecf1168ee5ab

    SHA512

    fe086510e0102ce67b42b65455260ecbfbe81abdb3e61dd51020712cdd0eeec0cd7d320e52614ce9a08ff47d912f9dd1294786765c92015dafd7098e1b17ac1c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un741045.exe

    Filesize

    543KB

    MD5

    c4c8650eaf93559e9236d2149b6e6e15

    SHA1

    c5254e14d188d8237a5e6cdda90fab97ab797635

    SHA256

    f3810d2ac15e1a6cdbb6cbd3377b83af3d4ff8adb89400891324ecf1168ee5ab

    SHA512

    fe086510e0102ce67b42b65455260ecbfbe81abdb3e61dd51020712cdd0eeec0cd7d320e52614ce9a08ff47d912f9dd1294786765c92015dafd7098e1b17ac1c

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8219.exe

    Filesize

    292KB

    MD5

    00c351e019896e3bc7c63cb8f03f32ba

    SHA1

    c7436c4e6e90ae5d322113db7ac637fa9a44bf35

    SHA256

    b817a4de6dcd311a52e72eadf882243834110e5a0d46e553cc0b8f4254e3a793

    SHA512

    fef23cb1769cc36b197943caa599cddd2a373696170ca07f8286b1a74ecc18be2f0e0186e4eab57eb7c2ddb980f6282eb72eab0d51ea8cc44f457555d6f68631

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro8219.exe

    Filesize

    292KB

    MD5

    00c351e019896e3bc7c63cb8f03f32ba

    SHA1

    c7436c4e6e90ae5d322113db7ac637fa9a44bf35

    SHA256

    b817a4de6dcd311a52e72eadf882243834110e5a0d46e553cc0b8f4254e3a793

    SHA512

    fef23cb1769cc36b197943caa599cddd2a373696170ca07f8286b1a74ecc18be2f0e0186e4eab57eb7c2ddb980f6282eb72eab0d51ea8cc44f457555d6f68631

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9763.exe

    Filesize

    350KB

    MD5

    e5cc78017e26e239cf8cc6b4a6ba36fc

    SHA1

    92b7964abae13aefe6f5fa926536b52bad2ac421

    SHA256

    b8c0dc2abed9480d25e746b09a5e8f11e3d10f1cf8a827e1fd26d6c59be80be1

    SHA512

    30d1e47267011651ba1b1ec57e5798d9fda1d0e4b719c582337bd7a2bcb2a09dc33396af802270db51e26c6c5f2de52633d900df9c00749e30c30ca8b847200a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9763.exe

    Filesize

    350KB

    MD5

    e5cc78017e26e239cf8cc6b4a6ba36fc

    SHA1

    92b7964abae13aefe6f5fa926536b52bad2ac421

    SHA256

    b8c0dc2abed9480d25e746b09a5e8f11e3d10f1cf8a827e1fd26d6c59be80be1

    SHA512

    30d1e47267011651ba1b1ec57e5798d9fda1d0e4b719c582337bd7a2bcb2a09dc33396af802270db51e26c6c5f2de52633d900df9c00749e30c30ca8b847200a

  • memory/1544-1117-0x0000000004C50000-0x0000000004C9B000-memory.dmp

    Filesize

    300KB

  • memory/1544-1116-0x0000000000210000-0x0000000000242000-memory.dmp

    Filesize

    200KB

  • memory/1544-1118-0x0000000004E20000-0x0000000004E30000-memory.dmp

    Filesize

    64KB

  • memory/2536-146-0x0000000002420000-0x0000000002432000-memory.dmp

    Filesize

    72KB

  • memory/2536-158-0x0000000002420000-0x0000000002432000-memory.dmp

    Filesize

    72KB

  • memory/2536-140-0x0000000002420000-0x0000000002438000-memory.dmp

    Filesize

    96KB

  • memory/2536-142-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

    Filesize

    64KB

  • memory/2536-141-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

    Filesize

    64KB

  • memory/2536-143-0x0000000002420000-0x0000000002432000-memory.dmp

    Filesize

    72KB

  • memory/2536-144-0x0000000002420000-0x0000000002432000-memory.dmp

    Filesize

    72KB

  • memory/2536-138-0x0000000000AC0000-0x0000000000ADA000-memory.dmp

    Filesize

    104KB

  • memory/2536-148-0x0000000002420000-0x0000000002432000-memory.dmp

    Filesize

    72KB

  • memory/2536-150-0x0000000002420000-0x0000000002432000-memory.dmp

    Filesize

    72KB

  • memory/2536-152-0x0000000002420000-0x0000000002432000-memory.dmp

    Filesize

    72KB

  • memory/2536-154-0x0000000002420000-0x0000000002432000-memory.dmp

    Filesize

    72KB

  • memory/2536-156-0x0000000002420000-0x0000000002432000-memory.dmp

    Filesize

    72KB

  • memory/2536-139-0x0000000004CF0000-0x00000000051EE000-memory.dmp

    Filesize

    5.0MB

  • memory/2536-160-0x0000000002420000-0x0000000002432000-memory.dmp

    Filesize

    72KB

  • memory/2536-162-0x0000000002420000-0x0000000002432000-memory.dmp

    Filesize

    72KB

  • memory/2536-164-0x0000000002420000-0x0000000002432000-memory.dmp

    Filesize

    72KB

  • memory/2536-166-0x0000000002420000-0x0000000002432000-memory.dmp

    Filesize

    72KB

  • memory/2536-168-0x0000000002420000-0x0000000002432000-memory.dmp

    Filesize

    72KB

  • memory/2536-170-0x0000000002420000-0x0000000002432000-memory.dmp

    Filesize

    72KB

  • memory/2536-171-0x0000000000400000-0x000000000070C000-memory.dmp

    Filesize

    3.0MB

  • memory/2536-172-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2536-173-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

    Filesize

    64KB

  • memory/2536-174-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

    Filesize

    64KB

  • memory/2536-175-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

    Filesize

    64KB

  • memory/2536-177-0x0000000000400000-0x000000000070C000-memory.dmp

    Filesize

    3.0MB

  • memory/2536-137-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

    Filesize

    64KB

  • memory/2536-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2764-184-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/2764-217-0x00000000027A0000-0x00000000027DE000-memory.dmp

    Filesize

    248KB

  • memory/2764-186-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/2764-183-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/2764-188-0x00000000027A0000-0x00000000027DE000-memory.dmp

    Filesize

    248KB

  • memory/2764-189-0x00000000027A0000-0x00000000027DE000-memory.dmp

    Filesize

    248KB

  • memory/2764-191-0x00000000027A0000-0x00000000027DE000-memory.dmp

    Filesize

    248KB

  • memory/2764-193-0x00000000027A0000-0x00000000027DE000-memory.dmp

    Filesize

    248KB

  • memory/2764-195-0x00000000027A0000-0x00000000027DE000-memory.dmp

    Filesize

    248KB

  • memory/2764-197-0x00000000027A0000-0x00000000027DE000-memory.dmp

    Filesize

    248KB

  • memory/2764-199-0x00000000027A0000-0x00000000027DE000-memory.dmp

    Filesize

    248KB

  • memory/2764-201-0x00000000027A0000-0x00000000027DE000-memory.dmp

    Filesize

    248KB

  • memory/2764-203-0x00000000027A0000-0x00000000027DE000-memory.dmp

    Filesize

    248KB

  • memory/2764-205-0x00000000027A0000-0x00000000027DE000-memory.dmp

    Filesize

    248KB

  • memory/2764-207-0x00000000027A0000-0x00000000027DE000-memory.dmp

    Filesize

    248KB

  • memory/2764-209-0x00000000027A0000-0x00000000027DE000-memory.dmp

    Filesize

    248KB

  • memory/2764-211-0x00000000027A0000-0x00000000027DE000-memory.dmp

    Filesize

    248KB

  • memory/2764-213-0x00000000027A0000-0x00000000027DE000-memory.dmp

    Filesize

    248KB

  • memory/2764-215-0x00000000027A0000-0x00000000027DE000-memory.dmp

    Filesize

    248KB

  • memory/2764-187-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/2764-219-0x00000000027A0000-0x00000000027DE000-memory.dmp

    Filesize

    248KB

  • memory/2764-221-0x00000000027A0000-0x00000000027DE000-memory.dmp

    Filesize

    248KB

  • memory/2764-1094-0x0000000005360000-0x0000000005966000-memory.dmp

    Filesize

    6.0MB

  • memory/2764-1095-0x0000000005970000-0x0000000005A7A000-memory.dmp

    Filesize

    1.0MB

  • memory/2764-1096-0x0000000004DD0000-0x0000000004DE2000-memory.dmp

    Filesize

    72KB

  • memory/2764-1097-0x0000000004DF0000-0x0000000004E2E000-memory.dmp

    Filesize

    248KB

  • memory/2764-1098-0x0000000005B80000-0x0000000005BCB000-memory.dmp

    Filesize

    300KB

  • memory/2764-1099-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/2764-1101-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/2764-1102-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/2764-1103-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/2764-1104-0x0000000005D00000-0x0000000005D66000-memory.dmp

    Filesize

    408KB

  • memory/2764-1105-0x00000000062A0000-0x0000000006332000-memory.dmp

    Filesize

    584KB

  • memory/2764-1106-0x00000000066F0000-0x0000000006766000-memory.dmp

    Filesize

    472KB

  • memory/2764-1107-0x0000000006770000-0x00000000067C0000-memory.dmp

    Filesize

    320KB

  • memory/2764-185-0x00000000027A0000-0x00000000027E4000-memory.dmp

    Filesize

    272KB

  • memory/2764-182-0x0000000002610000-0x0000000002656000-memory.dmp

    Filesize

    280KB

  • memory/2764-1108-0x0000000004E50000-0x0000000004E60000-memory.dmp

    Filesize

    64KB

  • memory/2764-1109-0x00000000067E0000-0x00000000069A2000-memory.dmp

    Filesize

    1.8MB

  • memory/2764-1110-0x00000000069B0000-0x0000000006EDC000-memory.dmp

    Filesize

    5.2MB