Analysis

  • max time kernel
    61s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 14:31

General

  • Target

    800c36b2d869324426f6fb4d8ed085876f2e30e94bc5a5c3e04b01c3d6a87920.exe

  • Size

    685KB

  • MD5

    f82eda0f3e5d9bfcb80ff1ab992f50c5

  • SHA1

    22a3a350216a5482fa0a19f541bf341eec7870e1

  • SHA256

    800c36b2d869324426f6fb4d8ed085876f2e30e94bc5a5c3e04b01c3d6a87920

  • SHA512

    bcbe050dc98b042b7546b14c144ec71e9cefa5dd068f7438de0f10a490d14d70ec7bd1a77b2eb4138113d5883a246cc922cbf7d3a4f1542cef31bdcd8197e010

  • SSDEEP

    12288:/Mriy90k6J3v+DUXERhbEXJAkc3lqSL3v8nRRNAglWqlB0arE0XThDxAA:NyCf+wXERh4XOd3UFH7OarEEhD

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\800c36b2d869324426f6fb4d8ed085876f2e30e94bc5a5c3e04b01c3d6a87920.exe
    "C:\Users\Admin\AppData\Local\Temp\800c36b2d869324426f6fb4d8ed085876f2e30e94bc5a5c3e04b01c3d6a87920.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4980
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un256619.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un256619.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2152
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5477.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5477.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:632
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 632 -s 1084
          4⤵
          • Program crash
          PID:2100
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9342.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9342.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3900
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3900 -s 1180
          4⤵
          • Program crash
          PID:3276
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si593775.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si593775.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3728
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 632 -ip 632
    1⤵
      PID:4420
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3900 -ip 3900
      1⤵
        PID:2184

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si593775.exe

        Filesize

        175KB

        MD5

        de42b31ecf33cf304b73f39f4105ded7

        SHA1

        23c6fbf540f850c1f5fb702f7708a6bf482ef2ea

        SHA256

        4eade413a46ce86ec10920cf7b85cb79d46f608501a1dcef0ccd1f1e8762c9df

        SHA512

        8e627213a3d19862fd4bb4c4ceb2ec779131a5cb3a41365055db85f7c388464f154675beff142ff329e5902e9a859ab4c3a1da1499a0a1097c600b1ec407ddc4

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si593775.exe

        Filesize

        175KB

        MD5

        de42b31ecf33cf304b73f39f4105ded7

        SHA1

        23c6fbf540f850c1f5fb702f7708a6bf482ef2ea

        SHA256

        4eade413a46ce86ec10920cf7b85cb79d46f608501a1dcef0ccd1f1e8762c9df

        SHA512

        8e627213a3d19862fd4bb4c4ceb2ec779131a5cb3a41365055db85f7c388464f154675beff142ff329e5902e9a859ab4c3a1da1499a0a1097c600b1ec407ddc4

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un256619.exe

        Filesize

        543KB

        MD5

        ffd0ab068a373865fb70f27cf4491206

        SHA1

        5a166326bf87dac72ba57d5fdf768ba236d98858

        SHA256

        61f283ee97281a9e6f7e1fb6ba81bd80fdff4fb70afeb002b423217edc3b7e04

        SHA512

        992f5109e8f16ad0eab5650c2403688e502672aaf3242c83e3bbe62120f5a0ae6853db9e6fec38ef496aef5cc5704f0fbfed0218e5af3d5415b79210767de816

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un256619.exe

        Filesize

        543KB

        MD5

        ffd0ab068a373865fb70f27cf4491206

        SHA1

        5a166326bf87dac72ba57d5fdf768ba236d98858

        SHA256

        61f283ee97281a9e6f7e1fb6ba81bd80fdff4fb70afeb002b423217edc3b7e04

        SHA512

        992f5109e8f16ad0eab5650c2403688e502672aaf3242c83e3bbe62120f5a0ae6853db9e6fec38ef496aef5cc5704f0fbfed0218e5af3d5415b79210767de816

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5477.exe

        Filesize

        292KB

        MD5

        3bbc06e967039231521293af10c17437

        SHA1

        2b7c411625a6b970281fffe999daaf0bf592b189

        SHA256

        37f1b120670e3683df5bd2e42fb94bc0e195f8bbcb09a4b61115cb1a42b2ef0b

        SHA512

        3b074453b3f80dc3ac9dff78cd8220f45ace4039bbe187557824080be8d911bd20b850ba9cf97c1b0ed6d8b6b3456554fe2f7eef1ae23f5a167554c0b35100ce

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5477.exe

        Filesize

        292KB

        MD5

        3bbc06e967039231521293af10c17437

        SHA1

        2b7c411625a6b970281fffe999daaf0bf592b189

        SHA256

        37f1b120670e3683df5bd2e42fb94bc0e195f8bbcb09a4b61115cb1a42b2ef0b

        SHA512

        3b074453b3f80dc3ac9dff78cd8220f45ace4039bbe187557824080be8d911bd20b850ba9cf97c1b0ed6d8b6b3456554fe2f7eef1ae23f5a167554c0b35100ce

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9342.exe

        Filesize

        350KB

        MD5

        ba39203dbd4b02231f31effc6cbc5761

        SHA1

        fcae7dbdd96381fe4400108369c4a054703af55a

        SHA256

        767dc899bcff2bb93c5dbfb66f64d202136c18b46ff850b30be7b74a93ebee38

        SHA512

        ffcee2f5bcbcf851ff4807af6bafb67dbe8c1fc191ba0f3fa2c3eb79e968d00a8cd751486170f5f56c8a4545dc17d61ff884a475ad1979c8545e6330038bdf78

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9342.exe

        Filesize

        350KB

        MD5

        ba39203dbd4b02231f31effc6cbc5761

        SHA1

        fcae7dbdd96381fe4400108369c4a054703af55a

        SHA256

        767dc899bcff2bb93c5dbfb66f64d202136c18b46ff850b30be7b74a93ebee38

        SHA512

        ffcee2f5bcbcf851ff4807af6bafb67dbe8c1fc191ba0f3fa2c3eb79e968d00a8cd751486170f5f56c8a4545dc17d61ff884a475ad1979c8545e6330038bdf78

      • memory/632-148-0x0000000004E60000-0x0000000005404000-memory.dmp

        Filesize

        5.6MB

      • memory/632-149-0x0000000000740000-0x000000000076D000-memory.dmp

        Filesize

        180KB

      • memory/632-150-0x0000000004E50000-0x0000000004E60000-memory.dmp

        Filesize

        64KB

      • memory/632-151-0x0000000004E50000-0x0000000004E60000-memory.dmp

        Filesize

        64KB

      • memory/632-152-0x0000000004E50000-0x0000000004E60000-memory.dmp

        Filesize

        64KB

      • memory/632-154-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/632-153-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/632-156-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/632-162-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/632-160-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/632-176-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/632-178-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/632-180-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/632-174-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/632-172-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/632-170-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/632-168-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/632-166-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/632-164-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/632-158-0x0000000004C70000-0x0000000004C82000-memory.dmp

        Filesize

        72KB

      • memory/632-181-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/632-182-0x0000000004E50000-0x0000000004E60000-memory.dmp

        Filesize

        64KB

      • memory/632-183-0x0000000004E50000-0x0000000004E60000-memory.dmp

        Filesize

        64KB

      • memory/632-185-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/3728-1120-0x0000000000D60000-0x0000000000D92000-memory.dmp

        Filesize

        200KB

      • memory/3728-1121-0x00000000059D0000-0x00000000059E0000-memory.dmp

        Filesize

        64KB

      • memory/3900-190-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/3900-226-0x0000000000850000-0x000000000089B000-memory.dmp

        Filesize

        300KB

      • memory/3900-195-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/3900-197-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/3900-199-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/3900-201-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/3900-203-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/3900-205-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/3900-207-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/3900-209-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/3900-211-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/3900-213-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/3900-215-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/3900-217-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/3900-219-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/3900-221-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/3900-223-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/3900-193-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/3900-228-0x0000000004EF0000-0x0000000004F00000-memory.dmp

        Filesize

        64KB

      • memory/3900-230-0x0000000004EF0000-0x0000000004F00000-memory.dmp

        Filesize

        64KB

      • memory/3900-1099-0x00000000054B0000-0x0000000005AC8000-memory.dmp

        Filesize

        6.1MB

      • memory/3900-1100-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/3900-1101-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/3900-1102-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/3900-1103-0x0000000004EF0000-0x0000000004F00000-memory.dmp

        Filesize

        64KB

      • memory/3900-1104-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/3900-1106-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/3900-1107-0x00000000066F0000-0x0000000006766000-memory.dmp

        Filesize

        472KB

      • memory/3900-1108-0x0000000006780000-0x00000000067D0000-memory.dmp

        Filesize

        320KB

      • memory/3900-1109-0x00000000068F0000-0x0000000006AB2000-memory.dmp

        Filesize

        1.8MB

      • memory/3900-1111-0x0000000006AC0000-0x0000000006FEC000-memory.dmp

        Filesize

        5.2MB

      • memory/3900-1110-0x0000000004EF0000-0x0000000004F00000-memory.dmp

        Filesize

        64KB

      • memory/3900-191-0x00000000028A0000-0x00000000028DE000-memory.dmp

        Filesize

        248KB

      • memory/3900-1112-0x0000000004EF0000-0x0000000004F00000-memory.dmp

        Filesize

        64KB

      • memory/3900-1113-0x0000000004EF0000-0x0000000004F00000-memory.dmp

        Filesize

        64KB

      • memory/3900-1115-0x0000000004EF0000-0x0000000004F00000-memory.dmp

        Filesize

        64KB