Analysis

  • max time kernel
    106s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 15:42

General

  • Target

    313b76e0acb17de32d4eaec6332d927eb5afdb068e58c0f972426d52ddc3bfa7.exe

  • Size

    699KB

  • MD5

    19b0f87b079dfaef8f3679fa89dad42d

  • SHA1

    37297cc3c87dca448479440e1e7b98af2dbfcf17

  • SHA256

    313b76e0acb17de32d4eaec6332d927eb5afdb068e58c0f972426d52ddc3bfa7

  • SHA512

    895b617d2fbc3af85c3cad1371a8fa20b0a7ee23fd05b94a2a961a499ea58f53dacc68075e747db1ae2176b6fee4305d3e9c0466f8424818f146ca843c5be3d5

  • SSDEEP

    12288:BMrKy903ex6VS9n6kk6YI7AYq1Fmxueo+IOgZZxX9BRvDkXRYPa0xLd:nyPOS0krPlmW7IOg5X93kYaQ

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\313b76e0acb17de32d4eaec6332d927eb5afdb068e58c0f972426d52ddc3bfa7.exe
    "C:\Users\Admin\AppData\Local\Temp\313b76e0acb17de32d4eaec6332d927eb5afdb068e58c0f972426d52ddc3bfa7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1760
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un636152.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un636152.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3368
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2209.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2209.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3352
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3352 -s 1084
          4⤵
          • Program crash
          PID:4188
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3992.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3992.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4784
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4784 -s 1708
          4⤵
          • Program crash
          PID:4400
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si865092.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si865092.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4368
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3352 -ip 3352
    1⤵
      PID:3624
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4784 -ip 4784
      1⤵
        PID:5068

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si865092.exe

        Filesize

        175KB

        MD5

        21ef22541c551e90c5d1fe0641a0709f

        SHA1

        7fd0983f7bb04a3f74514c6bf8f4ab856b86af97

        SHA256

        a4456f35f6759628f6a2de4d05934708193763a9ba477d49608c8943b49d315b

        SHA512

        a36178a7874d078c99112f60e7aa16940d0ac6ed2ef9d72153aa07b4c1a82db6306f92deecc93f1d53c234614fd997138fff2cbe3fdd18bbf61133656a6a1203

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si865092.exe

        Filesize

        175KB

        MD5

        21ef22541c551e90c5d1fe0641a0709f

        SHA1

        7fd0983f7bb04a3f74514c6bf8f4ab856b86af97

        SHA256

        a4456f35f6759628f6a2de4d05934708193763a9ba477d49608c8943b49d315b

        SHA512

        a36178a7874d078c99112f60e7aa16940d0ac6ed2ef9d72153aa07b4c1a82db6306f92deecc93f1d53c234614fd997138fff2cbe3fdd18bbf61133656a6a1203

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un636152.exe

        Filesize

        557KB

        MD5

        e21216c624e0b283017e9b76170477c5

        SHA1

        7ea9c000a32a262d44583f02aa4230a5d132ab6d

        SHA256

        caf5c75c6b99c3603b070ccb0a0ab6bb7317df6911dec1027ea51689e2c880a9

        SHA512

        d9e0ba57d93e5c931360a29bd9d775a80134ac103fc6482b5dc11c9c1db3f818d445354e72c40d9775a401b69472027d33d09815e1135fa1ec5ee8c72fd16bd8

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un636152.exe

        Filesize

        557KB

        MD5

        e21216c624e0b283017e9b76170477c5

        SHA1

        7ea9c000a32a262d44583f02aa4230a5d132ab6d

        SHA256

        caf5c75c6b99c3603b070ccb0a0ab6bb7317df6911dec1027ea51689e2c880a9

        SHA512

        d9e0ba57d93e5c931360a29bd9d775a80134ac103fc6482b5dc11c9c1db3f818d445354e72c40d9775a401b69472027d33d09815e1135fa1ec5ee8c72fd16bd8

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2209.exe

        Filesize

        308KB

        MD5

        44432e929ab253442ec18646a0082b24

        SHA1

        a9970827339bf32c010efc59c1ddb47e180d39d1

        SHA256

        9541eec81f3676d67bae0501b7176e283ce633e9872c9ac40e98a3461dcde6b1

        SHA512

        e563b7af49c7b5c79435603bdc47fd598b6a588ef7ec751aa2c26267ce7c29eb1bfe3a8b9538b849dc3a3ef4d5a57a8cd738f56c13bce1d316633f0ea1ad1ded

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2209.exe

        Filesize

        308KB

        MD5

        44432e929ab253442ec18646a0082b24

        SHA1

        a9970827339bf32c010efc59c1ddb47e180d39d1

        SHA256

        9541eec81f3676d67bae0501b7176e283ce633e9872c9ac40e98a3461dcde6b1

        SHA512

        e563b7af49c7b5c79435603bdc47fd598b6a588ef7ec751aa2c26267ce7c29eb1bfe3a8b9538b849dc3a3ef4d5a57a8cd738f56c13bce1d316633f0ea1ad1ded

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3992.exe

        Filesize

        366KB

        MD5

        0e80a38becfcb1c9876b0655ec1675b2

        SHA1

        ad70b9f8713bd43c01da4daedc1d445590b5eda5

        SHA256

        11d41787418436b29629c69cbde69baef53aeb0a2c2c991da49ced62de356532

        SHA512

        ceaa237eddfd062ec7a2df28123e63949e77965078faa5b8b52745cd663442956e8d6c9035e22b96bbc3125eab17b22c34e8fd894cd0a3cf2392fceea131bf40

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3992.exe

        Filesize

        366KB

        MD5

        0e80a38becfcb1c9876b0655ec1675b2

        SHA1

        ad70b9f8713bd43c01da4daedc1d445590b5eda5

        SHA256

        11d41787418436b29629c69cbde69baef53aeb0a2c2c991da49ced62de356532

        SHA512

        ceaa237eddfd062ec7a2df28123e63949e77965078faa5b8b52745cd663442956e8d6c9035e22b96bbc3125eab17b22c34e8fd894cd0a3cf2392fceea131bf40

      • memory/3352-148-0x0000000004DA0000-0x0000000005344000-memory.dmp

        Filesize

        5.6MB

      • memory/3352-149-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/3352-150-0x0000000004D90000-0x0000000004DA0000-memory.dmp

        Filesize

        64KB

      • memory/3352-151-0x0000000004D90000-0x0000000004DA0000-memory.dmp

        Filesize

        64KB

      • memory/3352-152-0x0000000004D90000-0x0000000004DA0000-memory.dmp

        Filesize

        64KB

      • memory/3352-153-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/3352-156-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/3352-154-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/3352-158-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/3352-160-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/3352-162-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/3352-164-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/3352-166-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/3352-168-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/3352-170-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/3352-172-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/3352-174-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/3352-176-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/3352-178-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/3352-180-0x0000000004C80000-0x0000000004C92000-memory.dmp

        Filesize

        72KB

      • memory/3352-181-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/3352-182-0x0000000004D90000-0x0000000004DA0000-memory.dmp

        Filesize

        64KB

      • memory/3352-183-0x0000000004D90000-0x0000000004DA0000-memory.dmp

        Filesize

        64KB

      • memory/3352-184-0x0000000004D90000-0x0000000004DA0000-memory.dmp

        Filesize

        64KB

      • memory/3352-186-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/4368-1122-0x0000000000870000-0x00000000008A2000-memory.dmp

        Filesize

        200KB

      • memory/4368-1123-0x0000000005270000-0x0000000005280000-memory.dmp

        Filesize

        64KB

      • memory/4784-194-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4784-226-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4784-196-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4784-198-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4784-200-0x0000000000860000-0x00000000008AB000-memory.dmp

        Filesize

        300KB

      • memory/4784-201-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4784-204-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4784-202-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/4784-205-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/4784-207-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/4784-208-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4784-210-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4784-212-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4784-214-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4784-216-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4784-218-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4784-220-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4784-222-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4784-224-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4784-192-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4784-228-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4784-1101-0x0000000005470000-0x0000000005A88000-memory.dmp

        Filesize

        6.1MB

      • memory/4784-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/4784-1103-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/4784-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/4784-1105-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/4784-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/4784-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/4784-1109-0x0000000006850000-0x00000000068C6000-memory.dmp

        Filesize

        472KB

      • memory/4784-1110-0x00000000068E0000-0x0000000006930000-memory.dmp

        Filesize

        320KB

      • memory/4784-1111-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/4784-1112-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/4784-1113-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/4784-191-0x0000000004CF0000-0x0000000004D2E000-memory.dmp

        Filesize

        248KB

      • memory/4784-1114-0x0000000006940000-0x0000000006B02000-memory.dmp

        Filesize

        1.8MB

      • memory/4784-1115-0x0000000006B10000-0x000000000703C000-memory.dmp

        Filesize

        5.2MB

      • memory/4784-1116-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB