Analysis

  • max time kernel
    85s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 15:37

General

  • Target

    e0dac704b12a0fd5f6100d5a7a7b1a3d200638263dd0426ea4acc80904c3e050.exe

  • Size

    700KB

  • MD5

    f1c16aa5c55ec117d98707f82e6b7e4a

  • SHA1

    db3fde46739a664ad211c7f484f9ef61d970dbd4

  • SHA256

    e0dac704b12a0fd5f6100d5a7a7b1a3d200638263dd0426ea4acc80904c3e050

  • SHA512

    28626164ed74ef2e7bff04b3064e464172913b66218c8411bc531453e649b808c1e182f8a4a219df9a4e75713d988bfd53e17dc631bcc5ff0b52d8b42cc59276

  • SSDEEP

    12288:MMrWy90AEFAka7oxJgOC9EOFYj+cm+4LBRvrllO5kLWScaoh:6yzEMozg79zWj+cB4LVlO5kLWJaC

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e0dac704b12a0fd5f6100d5a7a7b1a3d200638263dd0426ea4acc80904c3e050.exe
    "C:\Users\Admin\AppData\Local\Temp\e0dac704b12a0fd5f6100d5a7a7b1a3d200638263dd0426ea4acc80904c3e050.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3736
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un760132.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un760132.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:856
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7509.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7509.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1424
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1424 -s 1084
          4⤵
          • Program crash
          PID:4432
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2971.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2971.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4552
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 1712
          4⤵
          • Program crash
          PID:3380
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si668588.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si668588.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4860
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 1424 -ip 1424
    1⤵
      PID:4436
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 476 -p 4552 -ip 4552
      1⤵
        PID:3956

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si668588.exe

        Filesize

        175KB

        MD5

        cac20b2f17675161d904b1eceb1d58f8

        SHA1

        165eb622fe1d6fa15b24efbde4fbac1eac2b6bc1

        SHA256

        294c454c84143ede5d8563ad07911c35e51f797c653c51552559cac4986eb6a4

        SHA512

        74b8a99f047b4984c8f02c0ce6bccbe87102198d1fc45018f454fc6cb9e778783c93d93ec80347ff8f8f01da64994f04288ff0f178eaeba027f3336630e351b8

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si668588.exe

        Filesize

        175KB

        MD5

        cac20b2f17675161d904b1eceb1d58f8

        SHA1

        165eb622fe1d6fa15b24efbde4fbac1eac2b6bc1

        SHA256

        294c454c84143ede5d8563ad07911c35e51f797c653c51552559cac4986eb6a4

        SHA512

        74b8a99f047b4984c8f02c0ce6bccbe87102198d1fc45018f454fc6cb9e778783c93d93ec80347ff8f8f01da64994f04288ff0f178eaeba027f3336630e351b8

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un760132.exe

        Filesize

        558KB

        MD5

        c90fafba75fea619e786feed31ab1606

        SHA1

        b56fd5e42a2a1c257db7ba89e5e713cc27047343

        SHA256

        34bec5631110a6b984b434e1b694884cf73f140c9df6a0cd09a10a6c6ba3ce8b

        SHA512

        10af53a1a5cf099b990519f4ed7d7d8a46c1cb9d01a0d7bbde098e1bc5939aef70c7d33255ab6bd9c794482db296b853278453d1ccf1b04c0c75cbd1c6c592f5

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un760132.exe

        Filesize

        558KB

        MD5

        c90fafba75fea619e786feed31ab1606

        SHA1

        b56fd5e42a2a1c257db7ba89e5e713cc27047343

        SHA256

        34bec5631110a6b984b434e1b694884cf73f140c9df6a0cd09a10a6c6ba3ce8b

        SHA512

        10af53a1a5cf099b990519f4ed7d7d8a46c1cb9d01a0d7bbde098e1bc5939aef70c7d33255ab6bd9c794482db296b853278453d1ccf1b04c0c75cbd1c6c592f5

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7509.exe

        Filesize

        308KB

        MD5

        c3ad64b27c6c1736fc67a222ff589365

        SHA1

        4ecb4abe988cc0b8cfde4c23353784eeaad8d308

        SHA256

        1f0d9a1d44d521894b1f8786dffb72d8f33b119e61841b11955542c1ce36285b

        SHA512

        95bba1ccbd9d769026faa0e3eaed3b6051a5a424b75bbecf64c257ba75b03e8076e86873a8029da4f736defe6f3fa6c6eaf954e6ef95af060cc340106d7e0d0b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7509.exe

        Filesize

        308KB

        MD5

        c3ad64b27c6c1736fc67a222ff589365

        SHA1

        4ecb4abe988cc0b8cfde4c23353784eeaad8d308

        SHA256

        1f0d9a1d44d521894b1f8786dffb72d8f33b119e61841b11955542c1ce36285b

        SHA512

        95bba1ccbd9d769026faa0e3eaed3b6051a5a424b75bbecf64c257ba75b03e8076e86873a8029da4f736defe6f3fa6c6eaf954e6ef95af060cc340106d7e0d0b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2971.exe

        Filesize

        366KB

        MD5

        5ad97f923d1a87e2c92c1ac00f429620

        SHA1

        ef58b86aa61002bed07532fb1517c14665da85af

        SHA256

        ce7edcf0d620cde4be8a2d1345044c059b3df3348a0bf6224f298f9b2f692402

        SHA512

        ff24d30acf431acc94b596655d9d688c89e9c2db14dc1e7f675a3b16dd6224d2383be5382d955e1cba3cb96cbf90b80ff6b927fe84a9cfe684d4c130d5889a9b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2971.exe

        Filesize

        366KB

        MD5

        5ad97f923d1a87e2c92c1ac00f429620

        SHA1

        ef58b86aa61002bed07532fb1517c14665da85af

        SHA256

        ce7edcf0d620cde4be8a2d1345044c059b3df3348a0bf6224f298f9b2f692402

        SHA512

        ff24d30acf431acc94b596655d9d688c89e9c2db14dc1e7f675a3b16dd6224d2383be5382d955e1cba3cb96cbf90b80ff6b927fe84a9cfe684d4c130d5889a9b

      • memory/1424-148-0x0000000004E90000-0x0000000005434000-memory.dmp

        Filesize

        5.6MB

      • memory/1424-149-0x00000000008F0000-0x000000000091D000-memory.dmp

        Filesize

        180KB

      • memory/1424-150-0x0000000004E80000-0x0000000004E90000-memory.dmp

        Filesize

        64KB

      • memory/1424-151-0x0000000004E80000-0x0000000004E90000-memory.dmp

        Filesize

        64KB

      • memory/1424-152-0x0000000004E80000-0x0000000004E90000-memory.dmp

        Filesize

        64KB

      • memory/1424-154-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1424-153-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1424-158-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1424-156-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1424-160-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1424-162-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1424-164-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1424-166-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1424-168-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1424-170-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1424-172-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1424-174-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1424-176-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1424-178-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1424-180-0x0000000002830000-0x0000000002842000-memory.dmp

        Filesize

        72KB

      • memory/1424-181-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/1424-182-0x0000000004E80000-0x0000000004E90000-memory.dmp

        Filesize

        64KB

      • memory/1424-183-0x0000000004E80000-0x0000000004E90000-memory.dmp

        Filesize

        64KB

      • memory/1424-184-0x0000000004E80000-0x0000000004E90000-memory.dmp

        Filesize

        64KB

      • memory/1424-186-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/4552-192-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4552-224-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4552-194-0x00000000007F0000-0x000000000083B000-memory.dmp

        Filesize

        300KB

      • memory/4552-196-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/4552-195-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4552-199-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/4552-198-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4552-201-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/4552-204-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4552-202-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4552-206-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4552-208-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4552-210-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4552-212-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4552-214-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4552-216-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4552-218-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4552-220-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4552-222-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4552-191-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4552-226-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4552-228-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4552-1101-0x00000000054F0000-0x0000000005B08000-memory.dmp

        Filesize

        6.1MB

      • memory/4552-1102-0x0000000005B10000-0x0000000005C1A000-memory.dmp

        Filesize

        1.0MB

      • memory/4552-1103-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/4552-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/4552-1105-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/4552-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/4552-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/4552-1108-0x0000000006710000-0x00000000068D2000-memory.dmp

        Filesize

        1.8MB

      • memory/4552-1109-0x00000000068F0000-0x0000000006E1C000-memory.dmp

        Filesize

        5.2MB

      • memory/4552-1111-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/4552-1112-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/4552-1113-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/4552-1114-0x0000000007190000-0x0000000007206000-memory.dmp

        Filesize

        472KB

      • memory/4552-1115-0x0000000007220000-0x0000000007270000-memory.dmp

        Filesize

        320KB

      • memory/4860-1121-0x0000000000B30000-0x0000000000B62000-memory.dmp

        Filesize

        200KB

      • memory/4860-1122-0x00000000053A0000-0x00000000053B0000-memory.dmp

        Filesize

        64KB