Analysis

  • max time kernel
    93s
  • max time network
    115s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 14:25

General

  • Target

    db79c69714066cf3c58b20b82d5015b0008c59e99299accdaba410cce58619b0.exe

  • Size

    685KB

  • MD5

    cd05a9321f574f713dca0f349e11290f

  • SHA1

    78bc1f0a648a587c425d9cda1a270608e4cecd15

  • SHA256

    db79c69714066cf3c58b20b82d5015b0008c59e99299accdaba410cce58619b0

  • SHA512

    c321f63f0577a0fb39eee57cf924b22b856d1cc9f4caa604f8a0c8465014a28d9c125886aa4ac90f67dc5225de29f622e9825db632a6360cac5a2c5591316575

  • SSDEEP

    12288:0MrNy90tUsafP0WT7/12UjJ+knjGD9fdskqO3JnlVa4BJ4kEwEAmL/Fc:pyHNN2AzCD5dGGJnl3T4kEwHcc

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db79c69714066cf3c58b20b82d5015b0008c59e99299accdaba410cce58619b0.exe
    "C:\Users\Admin\AppData\Local\Temp\db79c69714066cf3c58b20b82d5015b0008c59e99299accdaba410cce58619b0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:980
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un427921.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un427921.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:684
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0484.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0484.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1696
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1696 -s 1036
          4⤵
          • Program crash
          PID:4416
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1671.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1671.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4280
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 1732
          4⤵
          • Program crash
          PID:1056
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si834007.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si834007.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2164
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1696 -ip 1696
    1⤵
      PID:3396
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4280 -ip 4280
      1⤵
        PID:1908

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si834007.exe

        Filesize

        175KB

        MD5

        c1b29eb99c7369cef99811eb0fe1a983

        SHA1

        af7272aebee628374ea6ae73c9a505bdbb388625

        SHA256

        57ea9aced307cd8a35c7767aaeb59745bbcee22175c490d3d880e230ede15da3

        SHA512

        19ac9917cd20436748c6d285a69b85ffa6e6089bae9630360fd798c8554bd6aa415bd0048bb78b8e18ea59d7de1a641533ddafaed9f7655773e3f58b993de1bd

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si834007.exe

        Filesize

        175KB

        MD5

        c1b29eb99c7369cef99811eb0fe1a983

        SHA1

        af7272aebee628374ea6ae73c9a505bdbb388625

        SHA256

        57ea9aced307cd8a35c7767aaeb59745bbcee22175c490d3d880e230ede15da3

        SHA512

        19ac9917cd20436748c6d285a69b85ffa6e6089bae9630360fd798c8554bd6aa415bd0048bb78b8e18ea59d7de1a641533ddafaed9f7655773e3f58b993de1bd

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un427921.exe

        Filesize

        543KB

        MD5

        4d4b81b4434139744dd636db1b2f6960

        SHA1

        b7f8655861c832b25e65471dfafa6515afdb5950

        SHA256

        57cbfb80d5a0efff92f63665110dc39b0525f1e755bdada8b1bbe32f6ff45864

        SHA512

        d33b7849ed1ecc2d1dd3945c72f75cb5d249ba263046c4459232a1ecc19c56184f7b2d9bf61e34a7d2ee4f1fccd06432cb7e0aaeb8417ca08fc47363fdf0275f

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un427921.exe

        Filesize

        543KB

        MD5

        4d4b81b4434139744dd636db1b2f6960

        SHA1

        b7f8655861c832b25e65471dfafa6515afdb5950

        SHA256

        57cbfb80d5a0efff92f63665110dc39b0525f1e755bdada8b1bbe32f6ff45864

        SHA512

        d33b7849ed1ecc2d1dd3945c72f75cb5d249ba263046c4459232a1ecc19c56184f7b2d9bf61e34a7d2ee4f1fccd06432cb7e0aaeb8417ca08fc47363fdf0275f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0484.exe

        Filesize

        292KB

        MD5

        8d3caddb8ddf8a68ef01c59727ed86d2

        SHA1

        5457fe449bfcb490707d9fe46316313ac1df450f

        SHA256

        f1b959afa2a47ca72e4bc147d0024c0a158e6c74c8deb248e8fb704e6e149c59

        SHA512

        c230dd988d16722f92329dd5116bcb4688cb9a658b51f4fbe435c7c2b20bb2396419ee13e6eb06ef5a626fc4badeab8b5ceaca7149b48dcfdda4e3c3e228265e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro0484.exe

        Filesize

        292KB

        MD5

        8d3caddb8ddf8a68ef01c59727ed86d2

        SHA1

        5457fe449bfcb490707d9fe46316313ac1df450f

        SHA256

        f1b959afa2a47ca72e4bc147d0024c0a158e6c74c8deb248e8fb704e6e149c59

        SHA512

        c230dd988d16722f92329dd5116bcb4688cb9a658b51f4fbe435c7c2b20bb2396419ee13e6eb06ef5a626fc4badeab8b5ceaca7149b48dcfdda4e3c3e228265e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1671.exe

        Filesize

        350KB

        MD5

        a86c85fb40ea044f9af6a9b789167b56

        SHA1

        d42502d19df768c9d08da0acdbad9bfe530dfdb8

        SHA256

        6c99bcd499fb9b5465ca382b2013c903cb7a7215e8da4e24bdff6d8a51e73439

        SHA512

        0c8fffde8861200a889d6a33da959b45e686471cb97435cc469981b40b709852a61a5de620f02cd63272d376916b3832591323c9b027f6cbd6eb0c11ccbd0f8e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1671.exe

        Filesize

        350KB

        MD5

        a86c85fb40ea044f9af6a9b789167b56

        SHA1

        d42502d19df768c9d08da0acdbad9bfe530dfdb8

        SHA256

        6c99bcd499fb9b5465ca382b2013c903cb7a7215e8da4e24bdff6d8a51e73439

        SHA512

        0c8fffde8861200a889d6a33da959b45e686471cb97435cc469981b40b709852a61a5de620f02cd63272d376916b3832591323c9b027f6cbd6eb0c11ccbd0f8e

      • memory/1696-148-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/1696-149-0x0000000004D20000-0x00000000052C4000-memory.dmp

        Filesize

        5.6MB

      • memory/1696-150-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/1696-151-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/1696-155-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/1696-153-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/1696-157-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/1696-159-0x0000000004D10000-0x0000000004D20000-memory.dmp

        Filesize

        64KB

      • memory/1696-161-0x0000000004D10000-0x0000000004D20000-memory.dmp

        Filesize

        64KB

      • memory/1696-160-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/1696-163-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/1696-165-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/1696-167-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/1696-169-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/1696-171-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/1696-173-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/1696-175-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/1696-177-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/1696-179-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/1696-180-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/1696-181-0x0000000004D10000-0x0000000004D20000-memory.dmp

        Filesize

        64KB

      • memory/1696-182-0x0000000004D10000-0x0000000004D20000-memory.dmp

        Filesize

        64KB

      • memory/1696-183-0x0000000004D10000-0x0000000004D20000-memory.dmp

        Filesize

        64KB

      • memory/1696-185-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/2164-1120-0x00000000002A0000-0x00000000002D2000-memory.dmp

        Filesize

        200KB

      • memory/2164-1121-0x0000000004B80000-0x0000000004B90000-memory.dmp

        Filesize

        64KB

      • memory/4280-191-0x0000000005300000-0x000000000533E000-memory.dmp

        Filesize

        248KB

      • memory/4280-494-0x0000000000820000-0x000000000086B000-memory.dmp

        Filesize

        300KB

      • memory/4280-195-0x0000000005300000-0x000000000533E000-memory.dmp

        Filesize

        248KB

      • memory/4280-197-0x0000000005300000-0x000000000533E000-memory.dmp

        Filesize

        248KB

      • memory/4280-199-0x0000000005300000-0x000000000533E000-memory.dmp

        Filesize

        248KB

      • memory/4280-201-0x0000000005300000-0x000000000533E000-memory.dmp

        Filesize

        248KB

      • memory/4280-203-0x0000000005300000-0x000000000533E000-memory.dmp

        Filesize

        248KB

      • memory/4280-205-0x0000000005300000-0x000000000533E000-memory.dmp

        Filesize

        248KB

      • memory/4280-207-0x0000000005300000-0x000000000533E000-memory.dmp

        Filesize

        248KB

      • memory/4280-209-0x0000000005300000-0x000000000533E000-memory.dmp

        Filesize

        248KB

      • memory/4280-211-0x0000000005300000-0x000000000533E000-memory.dmp

        Filesize

        248KB

      • memory/4280-213-0x0000000005300000-0x000000000533E000-memory.dmp

        Filesize

        248KB

      • memory/4280-215-0x0000000005300000-0x000000000533E000-memory.dmp

        Filesize

        248KB

      • memory/4280-217-0x0000000005300000-0x000000000533E000-memory.dmp

        Filesize

        248KB

      • memory/4280-219-0x0000000005300000-0x000000000533E000-memory.dmp

        Filesize

        248KB

      • memory/4280-221-0x0000000005300000-0x000000000533E000-memory.dmp

        Filesize

        248KB

      • memory/4280-223-0x0000000005300000-0x000000000533E000-memory.dmp

        Filesize

        248KB

      • memory/4280-193-0x0000000005300000-0x000000000533E000-memory.dmp

        Filesize

        248KB

      • memory/4280-496-0x0000000004D00000-0x0000000004D10000-memory.dmp

        Filesize

        64KB

      • memory/4280-498-0x0000000004D00000-0x0000000004D10000-memory.dmp

        Filesize

        64KB

      • memory/4280-1099-0x0000000005480000-0x0000000005A98000-memory.dmp

        Filesize

        6.1MB

      • memory/4280-1100-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/4280-1101-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/4280-1102-0x0000000004D00000-0x0000000004D10000-memory.dmp

        Filesize

        64KB

      • memory/4280-1103-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/4280-1104-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/4280-1105-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/4280-1107-0x0000000004D00000-0x0000000004D10000-memory.dmp

        Filesize

        64KB

      • memory/4280-1108-0x0000000004D00000-0x0000000004D10000-memory.dmp

        Filesize

        64KB

      • memory/4280-1109-0x0000000004D00000-0x0000000004D10000-memory.dmp

        Filesize

        64KB

      • memory/4280-1110-0x00000000079C0000-0x0000000007A36000-memory.dmp

        Filesize

        472KB

      • memory/4280-1111-0x0000000007A50000-0x0000000007AA0000-memory.dmp

        Filesize

        320KB

      • memory/4280-190-0x0000000005300000-0x000000000533E000-memory.dmp

        Filesize

        248KB

      • memory/4280-1112-0x0000000004D00000-0x0000000004D10000-memory.dmp

        Filesize

        64KB

      • memory/4280-1113-0x0000000007BB0000-0x0000000007D72000-memory.dmp

        Filesize

        1.8MB

      • memory/4280-1114-0x0000000007D80000-0x00000000082AC000-memory.dmp

        Filesize

        5.2MB