Analysis

  • max time kernel
    50s
  • max time network
    64s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 14:20

General

  • Target

    b212dcda0e2ba09c29c7fc1c297e293268a2795285da8dacd0c8a50906fab980.exe

  • Size

    685KB

  • MD5

    aa77576942aa2ce7e15b6ea9acdabbea

  • SHA1

    fae9454d59260cf08ac466cd41f312309dc6b9bf

  • SHA256

    b212dcda0e2ba09c29c7fc1c297e293268a2795285da8dacd0c8a50906fab980

  • SHA512

    9470f84ebb0f66b02792252716179254cebc20b3a6e85f3f4271978e386d634acdaa71381465ba26994ddfaca030d6f0ccf595dbbc8ce4c52b4480ece66fa1a7

  • SSDEEP

    12288:EMrZy90TkaZbVdUsfbvXGEXZKHLs2PmyeWnynORwdrXe7a0B9q0EX4ah+tMRB8:Nyukgb3UsfbvPpKlPmbWnSOadrXed/qG

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b212dcda0e2ba09c29c7fc1c297e293268a2795285da8dacd0c8a50906fab980.exe
    "C:\Users\Admin\AppData\Local\Temp\b212dcda0e2ba09c29c7fc1c297e293268a2795285da8dacd0c8a50906fab980.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un437476.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un437476.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2260
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2112.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2112.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2536
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5115.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5115.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2784
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si657708.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si657708.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4360

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si657708.exe

    Filesize

    175KB

    MD5

    0aa9734c1d8a1cc212a5a378ed3c2c95

    SHA1

    359935a3bb3626d9e6a813b713bf2db07402b348

    SHA256

    ebbbdcce674769f94a0818a20630791e4210cb244f0b99c1bf73d14ac4339d69

    SHA512

    6eb3efd5ce93b5fcd992d686064df76af9e506affa1760b14b790df9af622ddf8c82fc925748c398558e016075ce9f23bf022e107b05cd25a41cbf4c43676a5c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si657708.exe

    Filesize

    175KB

    MD5

    0aa9734c1d8a1cc212a5a378ed3c2c95

    SHA1

    359935a3bb3626d9e6a813b713bf2db07402b348

    SHA256

    ebbbdcce674769f94a0818a20630791e4210cb244f0b99c1bf73d14ac4339d69

    SHA512

    6eb3efd5ce93b5fcd992d686064df76af9e506affa1760b14b790df9af622ddf8c82fc925748c398558e016075ce9f23bf022e107b05cd25a41cbf4c43676a5c

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un437476.exe

    Filesize

    543KB

    MD5

    edc64e047c464130503c26b2d710b303

    SHA1

    a80c06d686baf503e17e04c629c0b2a694b892f7

    SHA256

    d4f0ee19cd656c10e5c42d057d928549b5e0ac35e344aa13008d44a5f119b24a

    SHA512

    f69547d515850938c8b758642fc53cad84573ae9ea7609ec7a9ad99f3bd426582ebf2718608c55ad1243238d49e6ae43a0940ba16111442a8acabef2c164b767

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un437476.exe

    Filesize

    543KB

    MD5

    edc64e047c464130503c26b2d710b303

    SHA1

    a80c06d686baf503e17e04c629c0b2a694b892f7

    SHA256

    d4f0ee19cd656c10e5c42d057d928549b5e0ac35e344aa13008d44a5f119b24a

    SHA512

    f69547d515850938c8b758642fc53cad84573ae9ea7609ec7a9ad99f3bd426582ebf2718608c55ad1243238d49e6ae43a0940ba16111442a8acabef2c164b767

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2112.exe

    Filesize

    292KB

    MD5

    5b525ee866150fe697405543470cd190

    SHA1

    bcd7cffaa72d8717bb0cbed46450fca3ec9b8533

    SHA256

    8126b2fa7dd38667fd750c0503d30a342a8c5c3a98846c1f2110fede434d2493

    SHA512

    ff8e0717bd7545aa0b8a3e48385581aba786253df111b2deabf277809429e551f82ff7461cf3e188280f888200a35c73225612baf604b637a163fdc10cd1da89

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2112.exe

    Filesize

    292KB

    MD5

    5b525ee866150fe697405543470cd190

    SHA1

    bcd7cffaa72d8717bb0cbed46450fca3ec9b8533

    SHA256

    8126b2fa7dd38667fd750c0503d30a342a8c5c3a98846c1f2110fede434d2493

    SHA512

    ff8e0717bd7545aa0b8a3e48385581aba786253df111b2deabf277809429e551f82ff7461cf3e188280f888200a35c73225612baf604b637a163fdc10cd1da89

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5115.exe

    Filesize

    350KB

    MD5

    51dd23f91e414a8500f707bbd4dadd33

    SHA1

    462f0f517986b8597f361e34e2703887b1b99fb5

    SHA256

    c834b38a220bee4f8212080de11158a58903c0a19e35a44abe4479974f44ca1a

    SHA512

    8ebc7b2f8cce813edc96d022de8e510b377e4b6259ae7e343cfbf5088ca9600d161b60be01f8463c6ad21f417d14c01d47c8cf188a4b6e9e1f9d6d9753c5f4b5

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5115.exe

    Filesize

    350KB

    MD5

    51dd23f91e414a8500f707bbd4dadd33

    SHA1

    462f0f517986b8597f361e34e2703887b1b99fb5

    SHA256

    c834b38a220bee4f8212080de11158a58903c0a19e35a44abe4479974f44ca1a

    SHA512

    8ebc7b2f8cce813edc96d022de8e510b377e4b6259ae7e343cfbf5088ca9600d161b60be01f8463c6ad21f417d14c01d47c8cf188a4b6e9e1f9d6d9753c5f4b5

  • memory/2536-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2536-137-0x0000000002250000-0x000000000226A000-memory.dmp

    Filesize

    104KB

  • memory/2536-138-0x0000000004D90000-0x000000000528E000-memory.dmp

    Filesize

    5.0MB

  • memory/2536-139-0x0000000002740000-0x0000000002758000-memory.dmp

    Filesize

    96KB

  • memory/2536-141-0x0000000004D80000-0x0000000004D90000-memory.dmp

    Filesize

    64KB

  • memory/2536-140-0x0000000004D80000-0x0000000004D90000-memory.dmp

    Filesize

    64KB

  • memory/2536-142-0x0000000004D80000-0x0000000004D90000-memory.dmp

    Filesize

    64KB

  • memory/2536-143-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/2536-144-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/2536-146-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/2536-150-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/2536-148-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/2536-152-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/2536-156-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/2536-162-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/2536-160-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/2536-158-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/2536-154-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/2536-164-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/2536-170-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/2536-168-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/2536-166-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/2536-171-0x0000000000400000-0x000000000070C000-memory.dmp

    Filesize

    3.0MB

  • memory/2536-172-0x0000000004D80000-0x0000000004D90000-memory.dmp

    Filesize

    64KB

  • memory/2536-173-0x0000000004D80000-0x0000000004D90000-memory.dmp

    Filesize

    64KB

  • memory/2536-174-0x0000000004D80000-0x0000000004D90000-memory.dmp

    Filesize

    64KB

  • memory/2536-176-0x0000000000400000-0x000000000070C000-memory.dmp

    Filesize

    3.0MB

  • memory/2784-181-0x0000000004C40000-0x0000000004C86000-memory.dmp

    Filesize

    280KB

  • memory/2784-182-0x00000000051D0000-0x0000000005214000-memory.dmp

    Filesize

    272KB

  • memory/2784-183-0x00000000051D0000-0x000000000520E000-memory.dmp

    Filesize

    248KB

  • memory/2784-184-0x00000000051D0000-0x000000000520E000-memory.dmp

    Filesize

    248KB

  • memory/2784-186-0x00000000051D0000-0x000000000520E000-memory.dmp

    Filesize

    248KB

  • memory/2784-188-0x00000000051D0000-0x000000000520E000-memory.dmp

    Filesize

    248KB

  • memory/2784-190-0x00000000051D0000-0x000000000520E000-memory.dmp

    Filesize

    248KB

  • memory/2784-192-0x00000000051D0000-0x000000000520E000-memory.dmp

    Filesize

    248KB

  • memory/2784-194-0x00000000051D0000-0x000000000520E000-memory.dmp

    Filesize

    248KB

  • memory/2784-196-0x00000000051D0000-0x000000000520E000-memory.dmp

    Filesize

    248KB

  • memory/2784-198-0x00000000051D0000-0x000000000520E000-memory.dmp

    Filesize

    248KB

  • memory/2784-200-0x00000000051D0000-0x000000000520E000-memory.dmp

    Filesize

    248KB

  • memory/2784-203-0x00000000051D0000-0x000000000520E000-memory.dmp

    Filesize

    248KB

  • memory/2784-202-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/2784-204-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

    Filesize

    64KB

  • memory/2784-205-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

    Filesize

    64KB

  • memory/2784-207-0x00000000051D0000-0x000000000520E000-memory.dmp

    Filesize

    248KB

  • memory/2784-209-0x00000000051D0000-0x000000000520E000-memory.dmp

    Filesize

    248KB

  • memory/2784-211-0x00000000051D0000-0x000000000520E000-memory.dmp

    Filesize

    248KB

  • memory/2784-213-0x00000000051D0000-0x000000000520E000-memory.dmp

    Filesize

    248KB

  • memory/2784-215-0x00000000051D0000-0x000000000520E000-memory.dmp

    Filesize

    248KB

  • memory/2784-217-0x00000000051D0000-0x000000000520E000-memory.dmp

    Filesize

    248KB

  • memory/2784-219-0x00000000051D0000-0x000000000520E000-memory.dmp

    Filesize

    248KB

  • memory/2784-1092-0x0000000005230000-0x0000000005836000-memory.dmp

    Filesize

    6.0MB

  • memory/2784-1093-0x00000000058C0000-0x00000000059CA000-memory.dmp

    Filesize

    1.0MB

  • memory/2784-1094-0x0000000005A00000-0x0000000005A12000-memory.dmp

    Filesize

    72KB

  • memory/2784-1095-0x0000000005A20000-0x0000000005A5E000-memory.dmp

    Filesize

    248KB

  • memory/2784-1096-0x0000000005B70000-0x0000000005BBB000-memory.dmp

    Filesize

    300KB

  • memory/2784-1097-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

    Filesize

    64KB

  • memory/2784-1099-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

    Filesize

    64KB

  • memory/2784-1100-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

    Filesize

    64KB

  • memory/2784-1101-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

    Filesize

    64KB

  • memory/2784-1102-0x0000000005D00000-0x0000000005D92000-memory.dmp

    Filesize

    584KB

  • memory/2784-1103-0x0000000005DA0000-0x0000000005E06000-memory.dmp

    Filesize

    408KB

  • memory/2784-1104-0x0000000006830000-0x00000000069F2000-memory.dmp

    Filesize

    1.8MB

  • memory/2784-1105-0x0000000006A00000-0x0000000006F2C000-memory.dmp

    Filesize

    5.2MB

  • memory/2784-1106-0x00000000071B0000-0x0000000007226000-memory.dmp

    Filesize

    472KB

  • memory/2784-1107-0x0000000007230000-0x0000000007280000-memory.dmp

    Filesize

    320KB

  • memory/2784-1108-0x0000000004CC0000-0x0000000004CD0000-memory.dmp

    Filesize

    64KB

  • memory/4360-1114-0x0000000000800000-0x0000000000832000-memory.dmp

    Filesize

    200KB

  • memory/4360-1115-0x0000000005260000-0x00000000052AB000-memory.dmp

    Filesize

    300KB

  • memory/4360-1116-0x0000000005120000-0x0000000005130000-memory.dmp

    Filesize

    64KB