Analysis

  • max time kernel
    135s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 14:36

General

  • Target

    17b2bad302d53ba221343020c33083798a5951cee906e201ecd849fc13da4cee.exe

  • Size

    685KB

  • MD5

    1997fdc45a4bc939df03dae80e794462

  • SHA1

    26ebfebacd4e81ba9eee827b37ded1caf0bbaba9

  • SHA256

    17b2bad302d53ba221343020c33083798a5951cee906e201ecd849fc13da4cee

  • SHA512

    4d70f5108ba1d0263f956c3b7f81e6031449fce482107f8ad22872fccd1db299c54231e4543d661fac6086d4175e25b46dac3cb4ba889318e81b16f4588386f1

  • SSDEEP

    12288:VMryy90NeWIT2FFnoh+BlNoop8SsWSJ4tNexF7Bud6EJXnOzlCISX2:3yjUFo4BlNjoWSafAUd6EhOzYIj

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\17b2bad302d53ba221343020c33083798a5951cee906e201ecd849fc13da4cee.exe
    "C:\Users\Admin\AppData\Local\Temp\17b2bad302d53ba221343020c33083798a5951cee906e201ecd849fc13da4cee.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3100
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un474895.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un474895.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4228
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2506.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2506.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1904
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 1084
          4⤵
          • Program crash
          PID:3220
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3606.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3606.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2700
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 1744
          4⤵
          • Program crash
          PID:956
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si402383.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si402383.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2892
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1904 -ip 1904
    1⤵
      PID:4564
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2700 -ip 2700
      1⤵
        PID:1196

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si402383.exe

        Filesize

        175KB

        MD5

        62dcc9a94bdc2fde1b3d9a21c08b1917

        SHA1

        5a8bafa057eaa555bd3166044ba9621879d2e8a6

        SHA256

        e1436c9221c24f05a0e96582e0380ba7e96a69eb3e55030fec206ba927f11c8a

        SHA512

        940bf7aefa41e09ae7d47e783d8a2a81397a0281d39389bf5f7c876003c6f0820fcb5ac20c6c4fd84ce7e7dcfcb2f7c9fb815002da71c55b35a7e1cc0a1ea778

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si402383.exe

        Filesize

        175KB

        MD5

        62dcc9a94bdc2fde1b3d9a21c08b1917

        SHA1

        5a8bafa057eaa555bd3166044ba9621879d2e8a6

        SHA256

        e1436c9221c24f05a0e96582e0380ba7e96a69eb3e55030fec206ba927f11c8a

        SHA512

        940bf7aefa41e09ae7d47e783d8a2a81397a0281d39389bf5f7c876003c6f0820fcb5ac20c6c4fd84ce7e7dcfcb2f7c9fb815002da71c55b35a7e1cc0a1ea778

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un474895.exe

        Filesize

        543KB

        MD5

        fbf0aafbbf0262ec85ec03b1ee5d41a6

        SHA1

        ff45629dd90fcfac4bd0d9f6fcade75da61c2b82

        SHA256

        6b5b5e6e141378de2fb9cc97624a8ac3a81c8ab28400eb71e30cf6d39401eda0

        SHA512

        b9262fa1e63a19ced735abd0413a8497e7874280fb40a21057107a510c516f74440161bfedd6f15238c279761a063a88ca5ba5d962f965aca9de34bea8340502

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un474895.exe

        Filesize

        543KB

        MD5

        fbf0aafbbf0262ec85ec03b1ee5d41a6

        SHA1

        ff45629dd90fcfac4bd0d9f6fcade75da61c2b82

        SHA256

        6b5b5e6e141378de2fb9cc97624a8ac3a81c8ab28400eb71e30cf6d39401eda0

        SHA512

        b9262fa1e63a19ced735abd0413a8497e7874280fb40a21057107a510c516f74440161bfedd6f15238c279761a063a88ca5ba5d962f965aca9de34bea8340502

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2506.exe

        Filesize

        292KB

        MD5

        2150011b64d3ca2c417a0e1dcc900535

        SHA1

        7b88d2a6022ce5405b34d00fda437871f4bed7ca

        SHA256

        e746984c5934c2ceeac66bdce8f13a81a7c6e051a51668e724e6b19c4f29569e

        SHA512

        9d49b45ded82da6c3bb972934753b7dea285747522fe96ce5fd23cab770e298bb4631b867a49982078624f9968e18c7ca115405b2a106c60ae174462f090de12

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2506.exe

        Filesize

        292KB

        MD5

        2150011b64d3ca2c417a0e1dcc900535

        SHA1

        7b88d2a6022ce5405b34d00fda437871f4bed7ca

        SHA256

        e746984c5934c2ceeac66bdce8f13a81a7c6e051a51668e724e6b19c4f29569e

        SHA512

        9d49b45ded82da6c3bb972934753b7dea285747522fe96ce5fd23cab770e298bb4631b867a49982078624f9968e18c7ca115405b2a106c60ae174462f090de12

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3606.exe

        Filesize

        350KB

        MD5

        1ead7dc1c4434af7d8057b1f3c02af72

        SHA1

        5b72f1c3f3231ec07c961f1ee0d081cb95f32a1f

        SHA256

        73aa418ca82c5f0608c1c9768cf7abbeb530a1cadb0afba1bdf735a79b56973d

        SHA512

        7292dcb1dd0c299652f37544fde91055245604a7333dddf6390b5c2a1e133449cf21d6e763ec68b40ebeed09d3ed1e95963de5b3ee710fb6031726e81c97da4c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3606.exe

        Filesize

        350KB

        MD5

        1ead7dc1c4434af7d8057b1f3c02af72

        SHA1

        5b72f1c3f3231ec07c961f1ee0d081cb95f32a1f

        SHA256

        73aa418ca82c5f0608c1c9768cf7abbeb530a1cadb0afba1bdf735a79b56973d

        SHA512

        7292dcb1dd0c299652f37544fde91055245604a7333dddf6390b5c2a1e133449cf21d6e763ec68b40ebeed09d3ed1e95963de5b3ee710fb6031726e81c97da4c

      • memory/1904-149-0x0000000004E20000-0x00000000053C4000-memory.dmp

        Filesize

        5.6MB

      • memory/1904-150-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/1904-148-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/1904-151-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/1904-152-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/1904-153-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1904-154-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1904-156-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1904-158-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1904-160-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1904-162-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1904-166-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1904-164-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1904-168-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1904-170-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1904-172-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1904-174-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1904-176-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1904-178-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1904-180-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/1904-181-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/1904-182-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/1904-183-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/1904-184-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/1904-186-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/2700-191-0x00000000007F0000-0x000000000083B000-memory.dmp

        Filesize

        300KB

      • memory/2700-192-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/2700-193-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/2700-194-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/2700-195-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/2700-198-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/2700-196-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/2700-200-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/2700-202-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/2700-204-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/2700-206-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/2700-208-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/2700-210-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/2700-212-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/2700-214-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/2700-216-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/2700-218-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/2700-220-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/2700-222-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/2700-224-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/2700-226-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/2700-228-0x0000000002990000-0x00000000029CE000-memory.dmp

        Filesize

        248KB

      • memory/2700-1101-0x00000000054D0000-0x0000000005AE8000-memory.dmp

        Filesize

        6.1MB

      • memory/2700-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/2700-1103-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/2700-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/2700-1105-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/2700-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/2700-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/2700-1109-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/2700-1110-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/2700-1111-0x0000000006710000-0x00000000068D2000-memory.dmp

        Filesize

        1.8MB

      • memory/2700-1112-0x00000000068F0000-0x0000000006E1C000-memory.dmp

        Filesize

        5.2MB

      • memory/2700-1113-0x0000000004E10000-0x0000000004E20000-memory.dmp

        Filesize

        64KB

      • memory/2700-1114-0x0000000007190000-0x0000000007206000-memory.dmp

        Filesize

        472KB

      • memory/2700-1115-0x0000000007220000-0x0000000007270000-memory.dmp

        Filesize

        320KB

      • memory/2892-1121-0x0000000000E10000-0x0000000000E42000-memory.dmp

        Filesize

        200KB

      • memory/2892-1122-0x0000000005A30000-0x0000000005A40000-memory.dmp

        Filesize

        64KB

      • memory/2892-1123-0x0000000005A30000-0x0000000005A40000-memory.dmp

        Filesize

        64KB