Analysis

  • max time kernel
    148s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 15:44

General

  • Target

    fc14423b5e343d89af178fa866bdd6501ffe02835b8c7f0dc0bf6e0dce21a167.exe

  • Size

    700KB

  • MD5

    601e5fabf6d9ddf1dac7172a41ae10e9

  • SHA1

    d8a34ef5be5152899dc4b58f6f3034d02391d97b

  • SHA256

    fc14423b5e343d89af178fa866bdd6501ffe02835b8c7f0dc0bf6e0dce21a167

  • SHA512

    2605e0be946e8207a8fcf322ec811272241714e61b061112eda9bd0fe30bb24b0f92f83ebae8d055128d598bc73c9f8cb492bd021521ac31634ad01689b06c94

  • SSDEEP

    12288:rMrpy90e/k0JDKmAsmNjrYK6LZuaiuSxptXpBP5cBRvnWMPx6mfhsx4cg:6yhJGmAsmNgBZ0XZcykx6Ysx49

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc14423b5e343d89af178fa866bdd6501ffe02835b8c7f0dc0bf6e0dce21a167.exe
    "C:\Users\Admin\AppData\Local\Temp\fc14423b5e343d89af178fa866bdd6501ffe02835b8c7f0dc0bf6e0dce21a167.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2976
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un830861.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un830861.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2836
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9041.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9041.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3336
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3336 -s 1084
          4⤵
          • Program crash
          PID:5028
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2629.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2629.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2756
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 1376
          4⤵
          • Program crash
          PID:3856
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si868742.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si868742.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3584
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 3336 -ip 3336
    1⤵
      PID:3100
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2756 -ip 2756
      1⤵
        PID:1988
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:1996

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si868742.exe

        Filesize

        175KB

        MD5

        2dc21863acb672b9ca6fb924dd91cdc3

        SHA1

        d2c56ca91df761660f9642d1eee2838f9a34b64f

        SHA256

        45c5aa743ff460b8469c7f3ee0c038fe66eae084fed2460790e3625766a3adb6

        SHA512

        d4fa88f957e7046598d6d7a06910eff6e902b0cca065f256fd3830a51b9ca86c84328c538f3357592bab3f4372ba0c2ddc332b2d4b8314a9cfffd1b788679af2

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si868742.exe

        Filesize

        175KB

        MD5

        2dc21863acb672b9ca6fb924dd91cdc3

        SHA1

        d2c56ca91df761660f9642d1eee2838f9a34b64f

        SHA256

        45c5aa743ff460b8469c7f3ee0c038fe66eae084fed2460790e3625766a3adb6

        SHA512

        d4fa88f957e7046598d6d7a06910eff6e902b0cca065f256fd3830a51b9ca86c84328c538f3357592bab3f4372ba0c2ddc332b2d4b8314a9cfffd1b788679af2

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un830861.exe

        Filesize

        558KB

        MD5

        b32fdc16b397e23dd363aa8c4fd01d83

        SHA1

        97066b66164b87ba62036b42f4d70cf87b851312

        SHA256

        aefadadeb22c389b3d8e01e331fb479d7f20cf893a767a770de95c7ccef02645

        SHA512

        3d091345b6a837fe2f6de3e1bfd03aeb528e7c8af98506efb8dc60622cb3f0730f8adacbca6475bbbc1d3d9962a61088db1a9909459c0537e6ebb7bf902f7ea3

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un830861.exe

        Filesize

        558KB

        MD5

        b32fdc16b397e23dd363aa8c4fd01d83

        SHA1

        97066b66164b87ba62036b42f4d70cf87b851312

        SHA256

        aefadadeb22c389b3d8e01e331fb479d7f20cf893a767a770de95c7ccef02645

        SHA512

        3d091345b6a837fe2f6de3e1bfd03aeb528e7c8af98506efb8dc60622cb3f0730f8adacbca6475bbbc1d3d9962a61088db1a9909459c0537e6ebb7bf902f7ea3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9041.exe

        Filesize

        308KB

        MD5

        d4d57cbc4f2537dd884fe3299aaf8836

        SHA1

        5e20f3bfce36740451aa660553be4f0ea4fa26ba

        SHA256

        6fb827859f8679000c4b2e037997e58de5c400bc3250555f85238f2a952848bd

        SHA512

        4c9bed981d1b580eb71f2182c0e7a2df05faa6c5acdfa6450bde01314c939e4810d59cebda026ecb77892d1d579bf8d54ce202adb89e4b307c31e82c79247e49

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9041.exe

        Filesize

        308KB

        MD5

        d4d57cbc4f2537dd884fe3299aaf8836

        SHA1

        5e20f3bfce36740451aa660553be4f0ea4fa26ba

        SHA256

        6fb827859f8679000c4b2e037997e58de5c400bc3250555f85238f2a952848bd

        SHA512

        4c9bed981d1b580eb71f2182c0e7a2df05faa6c5acdfa6450bde01314c939e4810d59cebda026ecb77892d1d579bf8d54ce202adb89e4b307c31e82c79247e49

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2629.exe

        Filesize

        366KB

        MD5

        a225e8b3a342fbd28459c85591840c23

        SHA1

        7e07de7d528e87bd659a2bc76d64b995e4adbf7a

        SHA256

        a33944fd5489f481cd33f368cc6e95c8706d5e134e434c7efc0df51a49c9293e

        SHA512

        a688667c710ab4137b99a01bba7ba4fdc8ca8c44bd556af24a7845bc970cceaab61418abddfe86448bbc4aeb9d62cda474bc6a0ab4dfc70f7fcbebf298902b39

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2629.exe

        Filesize

        366KB

        MD5

        a225e8b3a342fbd28459c85591840c23

        SHA1

        7e07de7d528e87bd659a2bc76d64b995e4adbf7a

        SHA256

        a33944fd5489f481cd33f368cc6e95c8706d5e134e434c7efc0df51a49c9293e

        SHA512

        a688667c710ab4137b99a01bba7ba4fdc8ca8c44bd556af24a7845bc970cceaab61418abddfe86448bbc4aeb9d62cda474bc6a0ab4dfc70f7fcbebf298902b39

      • memory/2756-227-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2756-1102-0x0000000005B00000-0x0000000005B12000-memory.dmp

        Filesize

        72KB

      • memory/2756-1116-0x0000000002750000-0x0000000002760000-memory.dmp

        Filesize

        64KB

      • memory/2756-1114-0x0000000007230000-0x0000000007280000-memory.dmp

        Filesize

        320KB

      • memory/2756-1113-0x00000000071B0000-0x0000000007226000-memory.dmp

        Filesize

        472KB

      • memory/2756-1112-0x00000000069F0000-0x0000000006F1C000-memory.dmp

        Filesize

        5.2MB

      • memory/2756-1111-0x0000000006810000-0x00000000069D2000-memory.dmp

        Filesize

        1.8MB

      • memory/2756-1110-0x0000000002750000-0x0000000002760000-memory.dmp

        Filesize

        64KB

      • memory/2756-1108-0x0000000002750000-0x0000000002760000-memory.dmp

        Filesize

        64KB

      • memory/2756-1109-0x0000000002750000-0x0000000002760000-memory.dmp

        Filesize

        64KB

      • memory/2756-1106-0x0000000005EB0000-0x0000000005F16000-memory.dmp

        Filesize

        408KB

      • memory/2756-1105-0x0000000005E10000-0x0000000005EA2000-memory.dmp

        Filesize

        584KB

      • memory/2756-1104-0x0000000002750000-0x0000000002760000-memory.dmp

        Filesize

        64KB

      • memory/2756-1103-0x0000000005B60000-0x0000000005B9C000-memory.dmp

        Filesize

        240KB

      • memory/2756-1101-0x00000000059C0000-0x0000000005ACA000-memory.dmp

        Filesize

        1.0MB

      • memory/2756-1100-0x0000000005350000-0x0000000005968000-memory.dmp

        Filesize

        6.1MB

      • memory/2756-225-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2756-223-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2756-221-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2756-219-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2756-217-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2756-215-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2756-190-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2756-191-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2756-193-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2756-195-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2756-197-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2756-199-0x0000000000830000-0x000000000087B000-memory.dmp

        Filesize

        300KB

      • memory/2756-201-0x0000000002750000-0x0000000002760000-memory.dmp

        Filesize

        64KB

      • memory/2756-200-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2756-203-0x0000000002750000-0x0000000002760000-memory.dmp

        Filesize

        64KB

      • memory/2756-204-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2756-205-0x0000000002750000-0x0000000002760000-memory.dmp

        Filesize

        64KB

      • memory/2756-207-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2756-209-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2756-211-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/2756-213-0x0000000002880000-0x00000000028BE000-memory.dmp

        Filesize

        248KB

      • memory/3336-172-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/3336-185-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/3336-170-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/3336-166-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/3336-182-0x0000000002870000-0x0000000002880000-memory.dmp

        Filesize

        64KB

      • memory/3336-181-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/3336-150-0x0000000002870000-0x0000000002880000-memory.dmp

        Filesize

        64KB

      • memory/3336-180-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/3336-178-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/3336-153-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/3336-176-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/3336-174-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/3336-151-0x0000000002870000-0x0000000002880000-memory.dmp

        Filesize

        64KB

      • memory/3336-152-0x0000000002870000-0x0000000002880000-memory.dmp

        Filesize

        64KB

      • memory/3336-183-0x0000000002870000-0x0000000002880000-memory.dmp

        Filesize

        64KB

      • memory/3336-168-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/3336-164-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/3336-162-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/3336-160-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/3336-158-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/3336-156-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/3336-154-0x0000000002810000-0x0000000002822000-memory.dmp

        Filesize

        72KB

      • memory/3336-149-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/3336-148-0x0000000004DD0000-0x0000000005374000-memory.dmp

        Filesize

        5.6MB

      • memory/3584-1121-0x00000000001B0000-0x00000000001E2000-memory.dmp

        Filesize

        200KB

      • memory/3584-1122-0x0000000004A70000-0x0000000004A80000-memory.dmp

        Filesize

        64KB