Analysis

  • max time kernel
    64s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 14:10

General

  • Target

    72895b3ad2b13b2f66d4039249c8fb3d14454f99dd3d0e57e49f2e4c1ff831f3.exe

  • Size

    684KB

  • MD5

    a8f0759e12e005e36ce46bd7c1dc544e

  • SHA1

    367a8a6efd3779663a471bbe55291d16f76c6b40

  • SHA256

    72895b3ad2b13b2f66d4039249c8fb3d14454f99dd3d0e57e49f2e4c1ff831f3

  • SHA512

    1dce96ed0ddbbde317f06be27dbc620fb1e6fb47eb116b376b5f5be4bc2fc129e9cb95e442819f836183db9cc54ef1a12f822b41ba3becd5cf51cd3c2f5c2f05

  • SSDEEP

    12288:fMrby90II5hSD/0qJOkpwLdvH65+1MhAB+LsEat44zRtFtW:MyjIgXGdy5mTkLsEatbNtFY

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\72895b3ad2b13b2f66d4039249c8fb3d14454f99dd3d0e57e49f2e4c1ff831f3.exe
    "C:\Users\Admin\AppData\Local\Temp\72895b3ad2b13b2f66d4039249c8fb3d14454f99dd3d0e57e49f2e4c1ff831f3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4692
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un784038.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un784038.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3824
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2482.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2482.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:860
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 860 -s 1084
          4⤵
          • Program crash
          PID:1904
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6126.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6126.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4500
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4500 -s 1952
          4⤵
          • Program crash
          PID:4340
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si078832.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si078832.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2636
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 204 -p 860 -ip 860
    1⤵
      PID:1236
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4500 -ip 4500
      1⤵
        PID:384

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si078832.exe

        Filesize

        175KB

        MD5

        1edeecf2a5972e2f8661e3a286aac3bb

        SHA1

        646d624edbda42f09af6f53be4b48ec594053bd1

        SHA256

        4ea74285e27e6dfe2390c8f4511b8f40166ef315d47cc949afdb3fb7a95af42d

        SHA512

        04d1d5783237bd9ead5ef47e1733426a68ab898a697f69cbee49a3ea19df1aa56f4dfb9bb913437eb56f3cdda13a4984b401354136081b04698ca1d28a87c06f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si078832.exe

        Filesize

        175KB

        MD5

        1edeecf2a5972e2f8661e3a286aac3bb

        SHA1

        646d624edbda42f09af6f53be4b48ec594053bd1

        SHA256

        4ea74285e27e6dfe2390c8f4511b8f40166ef315d47cc949afdb3fb7a95af42d

        SHA512

        04d1d5783237bd9ead5ef47e1733426a68ab898a697f69cbee49a3ea19df1aa56f4dfb9bb913437eb56f3cdda13a4984b401354136081b04698ca1d28a87c06f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un784038.exe

        Filesize

        543KB

        MD5

        5fece2c97b745e2a66927178e44759ce

        SHA1

        8e64ef2e092bf4e94e7ae43c0efcbc124d5f09d5

        SHA256

        d13eb3e6359bf3bd87c222b51170c3a1b5eef75e60b21462f60e5b170fbc238b

        SHA512

        c1b31d1f3edc6e9cfb810ffe46dabe5b98cbe4be115777375e4fa7769f56e2bc81d1f039e807d4a4dc71ebf3e8631df5d4b97f685dc3cd6b28ef354911b35149

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un784038.exe

        Filesize

        543KB

        MD5

        5fece2c97b745e2a66927178e44759ce

        SHA1

        8e64ef2e092bf4e94e7ae43c0efcbc124d5f09d5

        SHA256

        d13eb3e6359bf3bd87c222b51170c3a1b5eef75e60b21462f60e5b170fbc238b

        SHA512

        c1b31d1f3edc6e9cfb810ffe46dabe5b98cbe4be115777375e4fa7769f56e2bc81d1f039e807d4a4dc71ebf3e8631df5d4b97f685dc3cd6b28ef354911b35149

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2482.exe

        Filesize

        292KB

        MD5

        3fe420846125ba4306a98f9f936caed8

        SHA1

        248e91007d89a4ea95dd7b08ed9aafba72736a59

        SHA256

        4bd3013c9fe2c7be8c4ce5adb45376f723772eb473e5b4580b6fb3d03ef882b9

        SHA512

        cfa756e4a8c9dca6cebe33ac5fb9d884d9be9a9bc16b2c0ce02f39b4182d4f7385fbc78c2efca7df74c0c5cae969f0d45571ec49d5daaf1c286d135c00d1a965

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2482.exe

        Filesize

        292KB

        MD5

        3fe420846125ba4306a98f9f936caed8

        SHA1

        248e91007d89a4ea95dd7b08ed9aafba72736a59

        SHA256

        4bd3013c9fe2c7be8c4ce5adb45376f723772eb473e5b4580b6fb3d03ef882b9

        SHA512

        cfa756e4a8c9dca6cebe33ac5fb9d884d9be9a9bc16b2c0ce02f39b4182d4f7385fbc78c2efca7df74c0c5cae969f0d45571ec49d5daaf1c286d135c00d1a965

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6126.exe

        Filesize

        350KB

        MD5

        c5b367757a79b285169a4748fd0832c7

        SHA1

        c13068d7fde1c9415abf72808594802a717d8153

        SHA256

        56240f806bd9a922ac41b0e19e1848dd6e751f0c60550378b507f9f9103d220d

        SHA512

        37d952296e71143c0495642877be3c3859b7ccee17214ab9d5138eb84b8a578c683e5bd137818cbc6e4bbac79b37d99024760a8ab3d538b8c0b582f27e504e80

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6126.exe

        Filesize

        350KB

        MD5

        c5b367757a79b285169a4748fd0832c7

        SHA1

        c13068d7fde1c9415abf72808594802a717d8153

        SHA256

        56240f806bd9a922ac41b0e19e1848dd6e751f0c60550378b507f9f9103d220d

        SHA512

        37d952296e71143c0495642877be3c3859b7ccee17214ab9d5138eb84b8a578c683e5bd137818cbc6e4bbac79b37d99024760a8ab3d538b8c0b582f27e504e80

      • memory/860-148-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/860-149-0x0000000004E80000-0x0000000005424000-memory.dmp

        Filesize

        5.6MB

      • memory/860-150-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/860-152-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/860-151-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/860-153-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/860-154-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/860-156-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/860-158-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/860-160-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/860-162-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/860-164-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/860-166-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/860-168-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/860-170-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/860-172-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/860-174-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/860-176-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/860-178-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/860-180-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/860-181-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/860-182-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/860-183-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/860-184-0x0000000004E70000-0x0000000004E80000-memory.dmp

        Filesize

        64KB

      • memory/860-186-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/2636-1122-0x0000000000660000-0x0000000000692000-memory.dmp

        Filesize

        200KB

      • memory/2636-1123-0x0000000005330000-0x0000000005340000-memory.dmp

        Filesize

        64KB

      • memory/4500-194-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4500-229-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB

      • memory/4500-196-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4500-198-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4500-200-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4500-202-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4500-204-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4500-206-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4500-208-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4500-210-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4500-212-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4500-214-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4500-216-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4500-218-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4500-220-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4500-222-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4500-225-0x0000000000830000-0x000000000087B000-memory.dmp

        Filesize

        300KB

      • memory/4500-224-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4500-227-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB

      • memory/4500-192-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4500-231-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB

      • memory/4500-1101-0x0000000005340000-0x0000000005958000-memory.dmp

        Filesize

        6.1MB

      • memory/4500-1102-0x00000000059C0000-0x0000000005ACA000-memory.dmp

        Filesize

        1.0MB

      • memory/4500-1103-0x0000000005B00000-0x0000000005B12000-memory.dmp

        Filesize

        72KB

      • memory/4500-1104-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB

      • memory/4500-1105-0x0000000005B20000-0x0000000005B5C000-memory.dmp

        Filesize

        240KB

      • memory/4500-1107-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB

      • memory/4500-1108-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB

      • memory/4500-1109-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB

      • memory/4500-1110-0x0000000005E10000-0x0000000005EA2000-memory.dmp

        Filesize

        584KB

      • memory/4500-1111-0x0000000005EB0000-0x0000000005F16000-memory.dmp

        Filesize

        408KB

      • memory/4500-1112-0x0000000004D80000-0x0000000004D90000-memory.dmp

        Filesize

        64KB

      • memory/4500-1113-0x0000000006830000-0x00000000069F2000-memory.dmp

        Filesize

        1.8MB

      • memory/4500-191-0x0000000004CD0000-0x0000000004D0E000-memory.dmp

        Filesize

        248KB

      • memory/4500-1114-0x0000000006A00000-0x0000000006F2C000-memory.dmp

        Filesize

        5.2MB

      • memory/4500-1115-0x0000000008350000-0x00000000083C6000-memory.dmp

        Filesize

        472KB

      • memory/4500-1116-0x00000000083D0000-0x0000000008420000-memory.dmp

        Filesize

        320KB