Analysis

  • max time kernel
    146s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 15:39

General

  • Target

    aba2ca1615ad7d9e745287646760f7ae3bbd3efe56cffab14de922dd1c739814.exe

  • Size

    701KB

  • MD5

    e01591c3a9aed43001ce521b4c3e9a99

  • SHA1

    9718f87249ec21e0ec8e0cfe6d6d906e2ce24b9b

  • SHA256

    aba2ca1615ad7d9e745287646760f7ae3bbd3efe56cffab14de922dd1c739814

  • SHA512

    dd63efd383e7778f8036d12249c6adb85d96f5a2ec39734a6a6ddfdb2a1d4238eb0d4747f7cd616fb99340f6c0f8c3ae9886abac5b8a01dd041e8b630ea1eee5

  • SSDEEP

    12288:WMrmy90oF0Zt99gamgHqueRpNijA4mOHdggGQIuV//BAEQiMQ5T7BRvyikryKQZT:AyLKZtw17NijA2HOgGu3BAEQiVh7cryJ

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aba2ca1615ad7d9e745287646760f7ae3bbd3efe56cffab14de922dd1c739814.exe
    "C:\Users\Admin\AppData\Local\Temp\aba2ca1615ad7d9e745287646760f7ae3bbd3efe56cffab14de922dd1c739814.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3388
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un011911.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un011911.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3624
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4416.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4416.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3132
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3132 -s 1084
          4⤵
          • Program crash
          PID:4568
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4265.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4265.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4344
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4344 -s 1792
          4⤵
          • Program crash
          PID:4632
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si173865.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si173865.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4792
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3132 -ip 3132
    1⤵
      PID:3216
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4344 -ip 4344
      1⤵
        PID:4408
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:1676

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si173865.exe

        Filesize

        175KB

        MD5

        45490597b0dbfd2c9eb82397bd685fbf

        SHA1

        b5bde8795fac9f5562a287ea2352335958671e85

        SHA256

        d89ffbe8fb2b6e897523e1af90d9145eb5db7a6da63e0c362941a68c13712fa5

        SHA512

        a32907237948d4faa07dbc01599df829c9562f659eb76300553636963e64a198b382a0e65d9997fe160e75586b2f6e6e8426f6d51691aa447719591127624dd2

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si173865.exe

        Filesize

        175KB

        MD5

        45490597b0dbfd2c9eb82397bd685fbf

        SHA1

        b5bde8795fac9f5562a287ea2352335958671e85

        SHA256

        d89ffbe8fb2b6e897523e1af90d9145eb5db7a6da63e0c362941a68c13712fa5

        SHA512

        a32907237948d4faa07dbc01599df829c9562f659eb76300553636963e64a198b382a0e65d9997fe160e75586b2f6e6e8426f6d51691aa447719591127624dd2

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un011911.exe

        Filesize

        558KB

        MD5

        8abfe1a74e5f71da855e224f5b976e3f

        SHA1

        a3adf869eba7ccd5ae6191de8b7bcba1c5725d2a

        SHA256

        932a5b790ef3c27316ec12315a2318ee56ce7c82b1fa26cf59458d30e6ed24d8

        SHA512

        242fd1336c8252c2345f9f8c7405a4a6455fe55ae4ee059ea518e3d3c0a91932a2f89e7908a3c96585c12675bdf4c90eab823a447d48117d6a91d5019278cbea

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un011911.exe

        Filesize

        558KB

        MD5

        8abfe1a74e5f71da855e224f5b976e3f

        SHA1

        a3adf869eba7ccd5ae6191de8b7bcba1c5725d2a

        SHA256

        932a5b790ef3c27316ec12315a2318ee56ce7c82b1fa26cf59458d30e6ed24d8

        SHA512

        242fd1336c8252c2345f9f8c7405a4a6455fe55ae4ee059ea518e3d3c0a91932a2f89e7908a3c96585c12675bdf4c90eab823a447d48117d6a91d5019278cbea

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4416.exe

        Filesize

        308KB

        MD5

        33d5668292708d22f1aeef274a69f536

        SHA1

        a08415b31bbc3b56a4eb385f11159e1295ad5745

        SHA256

        9222edeaa8bba53acfa2f0bd7a8e0d5e8851275dfdc6049d3c20d890039841a3

        SHA512

        db082673f5398366d36cc973f935ebc9ccb51dc08fb6cfac13af7e674606aa2acc77b74f011834ec807f788b86181a5b77e031f92b369adb2a22d618c609905e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4416.exe

        Filesize

        308KB

        MD5

        33d5668292708d22f1aeef274a69f536

        SHA1

        a08415b31bbc3b56a4eb385f11159e1295ad5745

        SHA256

        9222edeaa8bba53acfa2f0bd7a8e0d5e8851275dfdc6049d3c20d890039841a3

        SHA512

        db082673f5398366d36cc973f935ebc9ccb51dc08fb6cfac13af7e674606aa2acc77b74f011834ec807f788b86181a5b77e031f92b369adb2a22d618c609905e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4265.exe

        Filesize

        366KB

        MD5

        8a33bf438fe1c9a4e7bad07751a5d7e8

        SHA1

        9db74aa9ffa4b26602f5a8db99b26fee3e0a0d3a

        SHA256

        2ae6875c18933f0fe405c0b46db759cb88502927668bd854eca37c3c169c3d72

        SHA512

        78d5437eba7b29ab1942c18ffb34b714f01ff8c3e80e7c72e2ca6ddcbb50f7125eeb25abdc5ad7b71de3898cd673a1d53c9367cfac7df553a4f6e3426dd806b3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4265.exe

        Filesize

        366KB

        MD5

        8a33bf438fe1c9a4e7bad07751a5d7e8

        SHA1

        9db74aa9ffa4b26602f5a8db99b26fee3e0a0d3a

        SHA256

        2ae6875c18933f0fe405c0b46db759cb88502927668bd854eca37c3c169c3d72

        SHA512

        78d5437eba7b29ab1942c18ffb34b714f01ff8c3e80e7c72e2ca6ddcbb50f7125eeb25abdc5ad7b71de3898cd673a1d53c9367cfac7df553a4f6e3426dd806b3

      • memory/3132-148-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/3132-150-0x0000000002570000-0x0000000002580000-memory.dmp

        Filesize

        64KB

      • memory/3132-149-0x0000000004E40000-0x00000000053E4000-memory.dmp

        Filesize

        5.6MB

      • memory/3132-151-0x0000000002570000-0x0000000002580000-memory.dmp

        Filesize

        64KB

      • memory/3132-152-0x0000000002570000-0x0000000002580000-memory.dmp

        Filesize

        64KB

      • memory/3132-153-0x00000000028E0000-0x00000000028F2000-memory.dmp

        Filesize

        72KB

      • memory/3132-154-0x00000000028E0000-0x00000000028F2000-memory.dmp

        Filesize

        72KB

      • memory/3132-156-0x00000000028E0000-0x00000000028F2000-memory.dmp

        Filesize

        72KB

      • memory/3132-158-0x00000000028E0000-0x00000000028F2000-memory.dmp

        Filesize

        72KB

      • memory/3132-160-0x00000000028E0000-0x00000000028F2000-memory.dmp

        Filesize

        72KB

      • memory/3132-162-0x00000000028E0000-0x00000000028F2000-memory.dmp

        Filesize

        72KB

      • memory/3132-164-0x00000000028E0000-0x00000000028F2000-memory.dmp

        Filesize

        72KB

      • memory/3132-166-0x00000000028E0000-0x00000000028F2000-memory.dmp

        Filesize

        72KB

      • memory/3132-168-0x00000000028E0000-0x00000000028F2000-memory.dmp

        Filesize

        72KB

      • memory/3132-170-0x00000000028E0000-0x00000000028F2000-memory.dmp

        Filesize

        72KB

      • memory/3132-172-0x00000000028E0000-0x00000000028F2000-memory.dmp

        Filesize

        72KB

      • memory/3132-174-0x00000000028E0000-0x00000000028F2000-memory.dmp

        Filesize

        72KB

      • memory/3132-176-0x00000000028E0000-0x00000000028F2000-memory.dmp

        Filesize

        72KB

      • memory/3132-178-0x00000000028E0000-0x00000000028F2000-memory.dmp

        Filesize

        72KB

      • memory/3132-180-0x00000000028E0000-0x00000000028F2000-memory.dmp

        Filesize

        72KB

      • memory/3132-181-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/3132-182-0x0000000002570000-0x0000000002580000-memory.dmp

        Filesize

        64KB

      • memory/3132-183-0x0000000002570000-0x0000000002580000-memory.dmp

        Filesize

        64KB

      • memory/3132-184-0x0000000002570000-0x0000000002580000-memory.dmp

        Filesize

        64KB

      • memory/3132-186-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/4344-191-0x0000000000720000-0x000000000076B000-memory.dmp

        Filesize

        300KB

      • memory/4344-192-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

        Filesize

        64KB

      • memory/4344-193-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

        Filesize

        64KB

      • memory/4344-194-0x00000000029E0000-0x0000000002A1E000-memory.dmp

        Filesize

        248KB

      • memory/4344-195-0x00000000029E0000-0x0000000002A1E000-memory.dmp

        Filesize

        248KB

      • memory/4344-197-0x00000000029E0000-0x0000000002A1E000-memory.dmp

        Filesize

        248KB

      • memory/4344-199-0x00000000029E0000-0x0000000002A1E000-memory.dmp

        Filesize

        248KB

      • memory/4344-201-0x00000000029E0000-0x0000000002A1E000-memory.dmp

        Filesize

        248KB

      • memory/4344-203-0x00000000029E0000-0x0000000002A1E000-memory.dmp

        Filesize

        248KB

      • memory/4344-207-0x00000000029E0000-0x0000000002A1E000-memory.dmp

        Filesize

        248KB

      • memory/4344-205-0x00000000029E0000-0x0000000002A1E000-memory.dmp

        Filesize

        248KB

      • memory/4344-209-0x00000000029E0000-0x0000000002A1E000-memory.dmp

        Filesize

        248KB

      • memory/4344-211-0x00000000029E0000-0x0000000002A1E000-memory.dmp

        Filesize

        248KB

      • memory/4344-215-0x00000000029E0000-0x0000000002A1E000-memory.dmp

        Filesize

        248KB

      • memory/4344-213-0x00000000029E0000-0x0000000002A1E000-memory.dmp

        Filesize

        248KB

      • memory/4344-217-0x00000000029E0000-0x0000000002A1E000-memory.dmp

        Filesize

        248KB

      • memory/4344-219-0x00000000029E0000-0x0000000002A1E000-memory.dmp

        Filesize

        248KB

      • memory/4344-221-0x00000000029E0000-0x0000000002A1E000-memory.dmp

        Filesize

        248KB

      • memory/4344-223-0x00000000029E0000-0x0000000002A1E000-memory.dmp

        Filesize

        248KB

      • memory/4344-225-0x00000000029E0000-0x0000000002A1E000-memory.dmp

        Filesize

        248KB

      • memory/4344-227-0x00000000029E0000-0x0000000002A1E000-memory.dmp

        Filesize

        248KB

      • memory/4344-595-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

        Filesize

        64KB

      • memory/4344-1101-0x0000000005560000-0x0000000005B78000-memory.dmp

        Filesize

        6.1MB

      • memory/4344-1102-0x0000000005B80000-0x0000000005C8A000-memory.dmp

        Filesize

        1.0MB

      • memory/4344-1103-0x0000000004E50000-0x0000000004E62000-memory.dmp

        Filesize

        72KB

      • memory/4344-1104-0x0000000005C90000-0x0000000005CCC000-memory.dmp

        Filesize

        240KB

      • memory/4344-1105-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

        Filesize

        64KB

      • memory/4344-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/4344-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/4344-1109-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

        Filesize

        64KB

      • memory/4344-1110-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

        Filesize

        64KB

      • memory/4344-1111-0x0000000006850000-0x0000000006A12000-memory.dmp

        Filesize

        1.8MB

      • memory/4344-1112-0x0000000006A30000-0x0000000006F5C000-memory.dmp

        Filesize

        5.2MB

      • memory/4344-1113-0x0000000007190000-0x0000000007206000-memory.dmp

        Filesize

        472KB

      • memory/4344-1114-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

        Filesize

        64KB

      • memory/4344-1115-0x0000000007220000-0x0000000007270000-memory.dmp

        Filesize

        320KB

      • memory/4792-1121-0x00000000009F0000-0x0000000000A22000-memory.dmp

        Filesize

        200KB

      • memory/4792-1122-0x0000000005640000-0x0000000005650000-memory.dmp

        Filesize

        64KB