Analysis

  • max time kernel
    50s
  • max time network
    56s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 14:35

General

  • Target

    5bdc17ee9e06c36efdaf48b788180c90201ba8c35589e823ab3a2d0e298e827c.exe

  • Size

    685KB

  • MD5

    f650cfcfd7eb78e8559a58c02a82cd27

  • SHA1

    467bca90ba8486da5b2c7e687863d881d5fd0229

  • SHA256

    5bdc17ee9e06c36efdaf48b788180c90201ba8c35589e823ab3a2d0e298e827c

  • SHA512

    bfcc2b349aab647b5a5164f89b43b6cc7b7dfa42e7dbe7307ce345f030cd19d11b8b2c6b58e4006f3731604b59ded883f9b4f9d181431a143642d907b1bd3b34

  • SSDEEP

    12288:3MrSy90GpymuAtp6i7qv7mL8JSkKrf9PG0L4makxF2BPpSEAUuEQxbwmCPK:RyVt0eeizM0V7YNpSEAJvxbwPK

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5bdc17ee9e06c36efdaf48b788180c90201ba8c35589e823ab3a2d0e298e827c.exe
    "C:\Users\Admin\AppData\Local\Temp\5bdc17ee9e06c36efdaf48b788180c90201ba8c35589e823ab3a2d0e298e827c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un528454.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un528454.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2328
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4998.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4998.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2572
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3591.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3591.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4400
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si904967.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si904967.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2848

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si904967.exe

    Filesize

    175KB

    MD5

    8e39d93cc15b1c63746ae755693b52f2

    SHA1

    c5f24086b3e71a6c35eb89acac0d1fc13b3fa0a9

    SHA256

    ccc07487bd040aecac3420ef82b0e0497959423b83574d19e00bb0b6aa6ccfed

    SHA512

    6b4107ed476d3d04dcb73a4307f4edfd904b4cf6266714218c90bb69a5e06a69a073a73c10498c0c6c445902333297485cd1956dff827df4b562a10d8b0df568

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si904967.exe

    Filesize

    175KB

    MD5

    8e39d93cc15b1c63746ae755693b52f2

    SHA1

    c5f24086b3e71a6c35eb89acac0d1fc13b3fa0a9

    SHA256

    ccc07487bd040aecac3420ef82b0e0497959423b83574d19e00bb0b6aa6ccfed

    SHA512

    6b4107ed476d3d04dcb73a4307f4edfd904b4cf6266714218c90bb69a5e06a69a073a73c10498c0c6c445902333297485cd1956dff827df4b562a10d8b0df568

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un528454.exe

    Filesize

    543KB

    MD5

    b33ff468d6e28f01aa803c0aa2724bf7

    SHA1

    bc05817b5a7599f8bd54baf498ee85e6f4a0d79d

    SHA256

    703975d2a62f264c47e4e77ae4d3c71f0594a5033f4a07a72aa47ee8dee1c1a5

    SHA512

    6c8d6924344ee0a4c96b6aeb5038e2ab4a6ce45bedde9751d77031dc3b47f62216354fa55ca268ff2eeeac22d42d19f022fc7e6bb0b29d44e94103d0a7418b44

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un528454.exe

    Filesize

    543KB

    MD5

    b33ff468d6e28f01aa803c0aa2724bf7

    SHA1

    bc05817b5a7599f8bd54baf498ee85e6f4a0d79d

    SHA256

    703975d2a62f264c47e4e77ae4d3c71f0594a5033f4a07a72aa47ee8dee1c1a5

    SHA512

    6c8d6924344ee0a4c96b6aeb5038e2ab4a6ce45bedde9751d77031dc3b47f62216354fa55ca268ff2eeeac22d42d19f022fc7e6bb0b29d44e94103d0a7418b44

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4998.exe

    Filesize

    292KB

    MD5

    0d75b0237daabe9b26b5473a7329db33

    SHA1

    67d1931de01721fc2e2f72352a08e9452575ce53

    SHA256

    38edcc5c4b6e8d88d2b15f33e5afe009a7bbebeffbd52097d97bf6ab766e1edb

    SHA512

    53354761c1e18ef5d71452892de088073f06f5fba89bc0dd9887d191ed248f7d504a848b92bb6f92fa1f73ec877ab1fd6008197d407eaa0f20a41de0cb27a232

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4998.exe

    Filesize

    292KB

    MD5

    0d75b0237daabe9b26b5473a7329db33

    SHA1

    67d1931de01721fc2e2f72352a08e9452575ce53

    SHA256

    38edcc5c4b6e8d88d2b15f33e5afe009a7bbebeffbd52097d97bf6ab766e1edb

    SHA512

    53354761c1e18ef5d71452892de088073f06f5fba89bc0dd9887d191ed248f7d504a848b92bb6f92fa1f73ec877ab1fd6008197d407eaa0f20a41de0cb27a232

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3591.exe

    Filesize

    350KB

    MD5

    20c514ab5c80c5776f61831f1c31d6ba

    SHA1

    44388155d74081bd1ceefd36c5d9271cf25d638d

    SHA256

    70273e97f5fd8c895442fc717da6a6b1c4ca49e70bb98d028eec8b2e0d81c479

    SHA512

    1b29e05ae363d1cd8a663129d3f236cdfdd469c885fc3f4d6fbef739dd1495dd3cf16aff910a49fa4a887d3f17ebe746620756dc0f2b1879f9256fc0e2ed66e6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3591.exe

    Filesize

    350KB

    MD5

    20c514ab5c80c5776f61831f1c31d6ba

    SHA1

    44388155d74081bd1ceefd36c5d9271cf25d638d

    SHA256

    70273e97f5fd8c895442fc717da6a6b1c4ca49e70bb98d028eec8b2e0d81c479

    SHA512

    1b29e05ae363d1cd8a663129d3f236cdfdd469c885fc3f4d6fbef739dd1495dd3cf16aff910a49fa4a887d3f17ebe746620756dc0f2b1879f9256fc0e2ed66e6

  • memory/2572-136-0x0000000002430000-0x000000000244A000-memory.dmp

    Filesize

    104KB

  • memory/2572-137-0x0000000004D40000-0x000000000523E000-memory.dmp

    Filesize

    5.0MB

  • memory/2572-138-0x00000000026D0000-0x00000000026E8000-memory.dmp

    Filesize

    96KB

  • memory/2572-139-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2572-142-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2572-144-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2572-140-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2572-146-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2572-148-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2572-150-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2572-152-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2572-154-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2572-157-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2572-156-0x0000000002730000-0x0000000002740000-memory.dmp

    Filesize

    64KB

  • memory/2572-160-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2572-158-0x0000000002730000-0x0000000002740000-memory.dmp

    Filesize

    64KB

  • memory/2572-153-0x0000000002730000-0x0000000002740000-memory.dmp

    Filesize

    64KB

  • memory/2572-162-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2572-164-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2572-166-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2572-168-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2572-170-0x00000000026D0000-0x00000000026E2000-memory.dmp

    Filesize

    72KB

  • memory/2572-171-0x0000000000400000-0x000000000070C000-memory.dmp

    Filesize

    3.0MB

  • memory/2572-173-0x0000000000400000-0x000000000070C000-memory.dmp

    Filesize

    3.0MB

  • memory/2848-1112-0x0000000000FC0000-0x0000000000FF2000-memory.dmp

    Filesize

    200KB

  • memory/2848-1114-0x0000000005BE0000-0x0000000005BF0000-memory.dmp

    Filesize

    64KB

  • memory/2848-1113-0x0000000005A00000-0x0000000005A4B000-memory.dmp

    Filesize

    300KB

  • memory/4400-180-0x0000000002750000-0x000000000278E000-memory.dmp

    Filesize

    248KB

  • memory/4400-212-0x0000000004E10000-0x0000000004E20000-memory.dmp

    Filesize

    64KB

  • memory/4400-183-0x0000000002750000-0x000000000278E000-memory.dmp

    Filesize

    248KB

  • memory/4400-185-0x0000000002750000-0x000000000278E000-memory.dmp

    Filesize

    248KB

  • memory/4400-187-0x0000000002750000-0x000000000278E000-memory.dmp

    Filesize

    248KB

  • memory/4400-189-0x0000000002750000-0x000000000278E000-memory.dmp

    Filesize

    248KB

  • memory/4400-191-0x0000000002750000-0x000000000278E000-memory.dmp

    Filesize

    248KB

  • memory/4400-193-0x0000000002750000-0x000000000278E000-memory.dmp

    Filesize

    248KB

  • memory/4400-195-0x0000000002750000-0x000000000278E000-memory.dmp

    Filesize

    248KB

  • memory/4400-197-0x0000000002750000-0x000000000278E000-memory.dmp

    Filesize

    248KB

  • memory/4400-199-0x0000000002750000-0x000000000278E000-memory.dmp

    Filesize

    248KB

  • memory/4400-201-0x0000000002750000-0x000000000278E000-memory.dmp

    Filesize

    248KB

  • memory/4400-203-0x0000000002750000-0x000000000278E000-memory.dmp

    Filesize

    248KB

  • memory/4400-205-0x0000000002750000-0x000000000278E000-memory.dmp

    Filesize

    248KB

  • memory/4400-207-0x0000000002750000-0x000000000278E000-memory.dmp

    Filesize

    248KB

  • memory/4400-209-0x0000000000720000-0x000000000076B000-memory.dmp

    Filesize

    300KB

  • memory/4400-211-0x0000000002750000-0x000000000278E000-memory.dmp

    Filesize

    248KB

  • memory/4400-214-0x0000000004E10000-0x0000000004E20000-memory.dmp

    Filesize

    64KB

  • memory/4400-215-0x0000000002750000-0x000000000278E000-memory.dmp

    Filesize

    248KB

  • memory/4400-181-0x0000000002750000-0x000000000278E000-memory.dmp

    Filesize

    248KB

  • memory/4400-210-0x0000000004E10000-0x0000000004E20000-memory.dmp

    Filesize

    64KB

  • memory/4400-217-0x0000000002750000-0x000000000278E000-memory.dmp

    Filesize

    248KB

  • memory/4400-1090-0x0000000005320000-0x0000000005926000-memory.dmp

    Filesize

    6.0MB

  • memory/4400-1091-0x0000000005930000-0x0000000005A3A000-memory.dmp

    Filesize

    1.0MB

  • memory/4400-1092-0x0000000004DD0000-0x0000000004DE2000-memory.dmp

    Filesize

    72KB

  • memory/4400-1093-0x0000000005A40000-0x0000000005A7E000-memory.dmp

    Filesize

    248KB

  • memory/4400-1094-0x0000000004E10000-0x0000000004E20000-memory.dmp

    Filesize

    64KB

  • memory/4400-1095-0x0000000005B80000-0x0000000005BCB000-memory.dmp

    Filesize

    300KB

  • memory/4400-1096-0x0000000005D00000-0x0000000005D66000-memory.dmp

    Filesize

    408KB

  • memory/4400-1098-0x00000000063F0000-0x0000000006482000-memory.dmp

    Filesize

    584KB

  • memory/4400-1099-0x0000000006590000-0x0000000006606000-memory.dmp

    Filesize

    472KB

  • memory/4400-1100-0x0000000006610000-0x0000000006660000-memory.dmp

    Filesize

    320KB

  • memory/4400-1101-0x0000000004E10000-0x0000000004E20000-memory.dmp

    Filesize

    64KB

  • memory/4400-1102-0x0000000004E10000-0x0000000004E20000-memory.dmp

    Filesize

    64KB

  • memory/4400-1103-0x0000000004E10000-0x0000000004E20000-memory.dmp

    Filesize

    64KB

  • memory/4400-179-0x0000000002750000-0x0000000002794000-memory.dmp

    Filesize

    272KB

  • memory/4400-178-0x00000000023D0000-0x0000000002416000-memory.dmp

    Filesize

    280KB

  • memory/4400-1104-0x00000000066A0000-0x0000000006862000-memory.dmp

    Filesize

    1.8MB

  • memory/4400-1105-0x0000000006870000-0x0000000006D9C000-memory.dmp

    Filesize

    5.2MB

  • memory/4400-1108-0x0000000004E10000-0x0000000004E20000-memory.dmp

    Filesize

    64KB