Analysis

  • max time kernel
    53s
  • max time network
    57s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 15:40

General

  • Target

    6d060853fb44d6030f527108d50006e102472e499f4930869e4c6759100c5641.exe

  • Size

    701KB

  • MD5

    feb5d63ab995af8b7df7b53a8bd07ff7

  • SHA1

    d141af780f240ae779817424b2b5a5dcec5152da

  • SHA256

    6d060853fb44d6030f527108d50006e102472e499f4930869e4c6759100c5641

  • SHA512

    f4aa0362f6e0dc9459c40daa48663c27f1f3114a9ce77980c71720475fdeff0ff59f578a3bbf21cc231814566cdaefa35870700890b7409d45f65929ae1cf0cb

  • SSDEEP

    12288:PMrNy90lFBk+ZYajKxTzxNQl1n/VZnOqk4jrLKHjGH+H2zTBRv7u6Zpk:6yYBzGxTFkBVZnO6jrLYCXzTGQe

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6d060853fb44d6030f527108d50006e102472e499f4930869e4c6759100c5641.exe
    "C:\Users\Admin\AppData\Local\Temp\6d060853fb44d6030f527108d50006e102472e499f4930869e4c6759100c5641.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4044
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un733459.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un733459.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3364
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5070.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5070.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4236
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1136.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1136.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3620
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si004667.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si004667.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1632

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si004667.exe

    Filesize

    175KB

    MD5

    a5d755a640757b566b5420dd3e34a607

    SHA1

    8a23743d0856cb03aa934c19db54f4b859ef56e6

    SHA256

    d77c63e0904826af0438497ca0eed6b0dd70fd0e31f428cca0b8fd8ffc5c291a

    SHA512

    b335e99bd0910f80c61556b67e8e0839f012f8ece842e3defb55c8cbcf42d89993300c76648b834cefbab2b24e5d7c83f841032dfbe5876bae9a6dbf754cca45

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si004667.exe

    Filesize

    175KB

    MD5

    a5d755a640757b566b5420dd3e34a607

    SHA1

    8a23743d0856cb03aa934c19db54f4b859ef56e6

    SHA256

    d77c63e0904826af0438497ca0eed6b0dd70fd0e31f428cca0b8fd8ffc5c291a

    SHA512

    b335e99bd0910f80c61556b67e8e0839f012f8ece842e3defb55c8cbcf42d89993300c76648b834cefbab2b24e5d7c83f841032dfbe5876bae9a6dbf754cca45

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un733459.exe

    Filesize

    558KB

    MD5

    1cc3831e9721945e4ac857f34d1bf3d5

    SHA1

    41ee9466c2b130456ca7a2cb4fa9b2e3d5b9fb61

    SHA256

    f5e8e735c4f0de2727ea8469772cc2c4b01c843cb8e8ed9a83351504d02d10b8

    SHA512

    f8064c3065f76d763e3de692cc9ecf8d8a10a72a6135c019070831e966f048117d1888701eecca1f30194ee071cc3ae52e0c5d13a8e8a057d011f30db2cebab3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un733459.exe

    Filesize

    558KB

    MD5

    1cc3831e9721945e4ac857f34d1bf3d5

    SHA1

    41ee9466c2b130456ca7a2cb4fa9b2e3d5b9fb61

    SHA256

    f5e8e735c4f0de2727ea8469772cc2c4b01c843cb8e8ed9a83351504d02d10b8

    SHA512

    f8064c3065f76d763e3de692cc9ecf8d8a10a72a6135c019070831e966f048117d1888701eecca1f30194ee071cc3ae52e0c5d13a8e8a057d011f30db2cebab3

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5070.exe

    Filesize

    308KB

    MD5

    77e574ee207940a9a6684c3607898f41

    SHA1

    a35f4a2741b273f35e3b37619ec682af71abf3bc

    SHA256

    af2811ff175f7ae75950539763d5912c37e296853671fd5760ec982362f24a7c

    SHA512

    2cb4cc16c2c07a0625651b170d16a53d219735abdd6d9a5b8c42932b1962db6856888ba356b13b49841d9b16b02a0b31c661dcc5c242176b5a807f695e122c3f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5070.exe

    Filesize

    308KB

    MD5

    77e574ee207940a9a6684c3607898f41

    SHA1

    a35f4a2741b273f35e3b37619ec682af71abf3bc

    SHA256

    af2811ff175f7ae75950539763d5912c37e296853671fd5760ec982362f24a7c

    SHA512

    2cb4cc16c2c07a0625651b170d16a53d219735abdd6d9a5b8c42932b1962db6856888ba356b13b49841d9b16b02a0b31c661dcc5c242176b5a807f695e122c3f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1136.exe

    Filesize

    366KB

    MD5

    087a003d2d5c5059d3e4c502484488a0

    SHA1

    003623db0090179179afc4fd37b6647476b23c9a

    SHA256

    dffb6a7cd8646f4f3b21f13a03fef2b37c8f8fd2693f05bc9c27fc842b5f4f4e

    SHA512

    c5abcf1d2078ee2d7832f11d17ed566f06f4bb712c684e58bba0a85ec103ddd0f5b6fd2dc52c210682414081dcc4c74ac2dd0986f1ca3014002d6ba5e889827a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1136.exe

    Filesize

    366KB

    MD5

    087a003d2d5c5059d3e4c502484488a0

    SHA1

    003623db0090179179afc4fd37b6647476b23c9a

    SHA256

    dffb6a7cd8646f4f3b21f13a03fef2b37c8f8fd2693f05bc9c27fc842b5f4f4e

    SHA512

    c5abcf1d2078ee2d7832f11d17ed566f06f4bb712c684e58bba0a85ec103ddd0f5b6fd2dc52c210682414081dcc4c74ac2dd0986f1ca3014002d6ba5e889827a

  • memory/1632-1116-0x0000000005930000-0x000000000597B000-memory.dmp

    Filesize

    300KB

  • memory/1632-1115-0x0000000005AE0000-0x0000000005AF0000-memory.dmp

    Filesize

    64KB

  • memory/1632-1114-0x0000000000EF0000-0x0000000000F22000-memory.dmp

    Filesize

    200KB

  • memory/3620-1093-0x0000000005840000-0x0000000005E46000-memory.dmp

    Filesize

    6.0MB

  • memory/3620-1096-0x00000000021E0000-0x00000000021F0000-memory.dmp

    Filesize

    64KB

  • memory/3620-1108-0x0000000006FC0000-0x0000000007010000-memory.dmp

    Filesize

    320KB

  • memory/3620-1107-0x0000000006F30000-0x0000000006FA6000-memory.dmp

    Filesize

    472KB

  • memory/3620-1106-0x00000000068D0000-0x0000000006DFC000-memory.dmp

    Filesize

    5.2MB

  • memory/3620-1105-0x00000000066F0000-0x00000000068B2000-memory.dmp

    Filesize

    1.8MB

  • memory/3620-1104-0x00000000021E0000-0x00000000021F0000-memory.dmp

    Filesize

    64KB

  • memory/3620-1103-0x0000000005790000-0x00000000057F6000-memory.dmp

    Filesize

    408KB

  • memory/3620-1102-0x00000000056F0000-0x0000000005782000-memory.dmp

    Filesize

    584KB

  • memory/3620-1101-0x00000000021E0000-0x00000000021F0000-memory.dmp

    Filesize

    64KB

  • memory/3620-1100-0x00000000021E0000-0x00000000021F0000-memory.dmp

    Filesize

    64KB

  • memory/3620-1098-0x0000000005560000-0x00000000055AB000-memory.dmp

    Filesize

    300KB

  • memory/3620-1097-0x0000000005410000-0x000000000544E000-memory.dmp

    Filesize

    248KB

  • memory/3620-1095-0x00000000053F0000-0x0000000005402000-memory.dmp

    Filesize

    72KB

  • memory/3620-1094-0x00000000052B0000-0x00000000053BA000-memory.dmp

    Filesize

    1.0MB

  • memory/3620-220-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3620-218-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3620-216-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3620-214-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3620-212-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3620-210-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3620-208-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3620-181-0x0000000004AD0000-0x0000000004B16000-memory.dmp

    Filesize

    280KB

  • memory/3620-182-0x0000000000720000-0x000000000076B000-memory.dmp

    Filesize

    300KB

  • memory/3620-184-0x0000000005190000-0x00000000051D4000-memory.dmp

    Filesize

    272KB

  • memory/3620-185-0x00000000021E0000-0x00000000021F0000-memory.dmp

    Filesize

    64KB

  • memory/3620-183-0x00000000021E0000-0x00000000021F0000-memory.dmp

    Filesize

    64KB

  • memory/3620-186-0x00000000021E0000-0x00000000021F0000-memory.dmp

    Filesize

    64KB

  • memory/3620-187-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3620-188-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3620-190-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3620-192-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3620-194-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3620-196-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3620-198-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3620-200-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3620-202-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3620-204-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3620-206-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/4236-164-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/4236-136-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4236-141-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/4236-174-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/4236-173-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/4236-172-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/4236-171-0x0000000000400000-0x0000000000710000-memory.dmp

    Filesize

    3.1MB

  • memory/4236-142-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/4236-170-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/4236-168-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/4236-144-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/4236-166-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/4236-176-0x0000000000400000-0x0000000000710000-memory.dmp

    Filesize

    3.1MB

  • memory/4236-143-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/4236-146-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/4236-158-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/4236-156-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/4236-154-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/4236-152-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/4236-150-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/4236-148-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/4236-160-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB

  • memory/4236-140-0x0000000004CD0000-0x0000000004CE0000-memory.dmp

    Filesize

    64KB

  • memory/4236-139-0x0000000002740000-0x0000000002758000-memory.dmp

    Filesize

    96KB

  • memory/4236-138-0x0000000004CE0000-0x00000000051DE000-memory.dmp

    Filesize

    5.0MB

  • memory/4236-137-0x00000000026A0000-0x00000000026BA000-memory.dmp

    Filesize

    104KB

  • memory/4236-162-0x0000000002740000-0x0000000002752000-memory.dmp

    Filesize

    72KB