Analysis

  • max time kernel
    133s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 14:54

General

  • Target

    83762cd5c8e11b2d18d3f13cd67e4640c169dbbc833ec90ad20195787dee4ccc.exe

  • Size

    685KB

  • MD5

    78bbd61bdc1abd514dadd0b55b686f4e

  • SHA1

    141bdb17cc7d48e5fc997230c80e0a807f73de8e

  • SHA256

    83762cd5c8e11b2d18d3f13cd67e4640c169dbbc833ec90ad20195787dee4ccc

  • SHA512

    471e4efcfaf430109544013b91ac825c5141b0dc7ada0663438a87a05f69b48a8a20ac4986b8e163b7b4104f415b0ce04a3a66b36b6d114400fb96c1a372c861

  • SSDEEP

    12288:GMrjy90Yzn3P9vJ9TCCmm99sniuYUtvGG5DE0B1mHEv6gWlsVRVVr:pyZ3P5J9TCCmmf2i05GG5bXmHEvjfB

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83762cd5c8e11b2d18d3f13cd67e4640c169dbbc833ec90ad20195787dee4ccc.exe
    "C:\Users\Admin\AppData\Local\Temp\83762cd5c8e11b2d18d3f13cd67e4640c169dbbc833ec90ad20195787dee4ccc.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4536
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un043966.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un043966.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4808
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4503.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4503.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4248
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4248 -s 1084
          4⤵
          • Program crash
          PID:60
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9151.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9151.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4488
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 1728
          4⤵
          • Program crash
          PID:4948
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si017317.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si017317.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3920
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4248 -ip 4248
    1⤵
      PID:4676
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4488 -ip 4488
      1⤵
        PID:1412
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:1500

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si017317.exe

        Filesize

        175KB

        MD5

        8192332adf17ab7fa959000e8fcced48

        SHA1

        df1c474fd2a2ba26e2ebec138a6d5db8dfe489a6

        SHA256

        4c888abb20d8d164f96b719554f2a02bc9efd4faae9787977c3b0efac26ba633

        SHA512

        7f77fe1436d825bf740954b99c8cc5f6870190c53580b41c1f280983e0d2fa20d5584fb487e6f7a265cb7a602047a03f2adc659917e1a422ad0d63b9022c7489

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si017317.exe

        Filesize

        175KB

        MD5

        8192332adf17ab7fa959000e8fcced48

        SHA1

        df1c474fd2a2ba26e2ebec138a6d5db8dfe489a6

        SHA256

        4c888abb20d8d164f96b719554f2a02bc9efd4faae9787977c3b0efac26ba633

        SHA512

        7f77fe1436d825bf740954b99c8cc5f6870190c53580b41c1f280983e0d2fa20d5584fb487e6f7a265cb7a602047a03f2adc659917e1a422ad0d63b9022c7489

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un043966.exe

        Filesize

        543KB

        MD5

        c304f8ffb26f9082ec48c5ecd913b089

        SHA1

        2509bec4d1816bfc8e806bc49804cdbc8d025939

        SHA256

        f7bd4325fbe413daf3f59188dd10516d69fd1bb0fe9db261f60d9abe0f089403

        SHA512

        0b5f7c7bff9b17203f174ecf6bf02bdc305317b5443aea16cf079c121232b9b424c77071b9e9c62683b5501ef6288dbd85a2b410cc8e5b9863135afc4a8957f1

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un043966.exe

        Filesize

        543KB

        MD5

        c304f8ffb26f9082ec48c5ecd913b089

        SHA1

        2509bec4d1816bfc8e806bc49804cdbc8d025939

        SHA256

        f7bd4325fbe413daf3f59188dd10516d69fd1bb0fe9db261f60d9abe0f089403

        SHA512

        0b5f7c7bff9b17203f174ecf6bf02bdc305317b5443aea16cf079c121232b9b424c77071b9e9c62683b5501ef6288dbd85a2b410cc8e5b9863135afc4a8957f1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4503.exe

        Filesize

        292KB

        MD5

        4069bc4370b9fee09fc2af2caece5d48

        SHA1

        03de3f40ce47aa5f99dd6b879b81b9d318f0d22e

        SHA256

        6db068ef7f55e3b3c2cd7fde980cbc45ca800d44c9b6c8321d426e00c9d710e9

        SHA512

        a4ccaef341a407b44a5b246fca101a232e508059ea4329434f67bf27729b9494dfa442fd7f780b522140a2924bf275e1c5d5377931c89d118aff1a5a6fb65c40

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4503.exe

        Filesize

        292KB

        MD5

        4069bc4370b9fee09fc2af2caece5d48

        SHA1

        03de3f40ce47aa5f99dd6b879b81b9d318f0d22e

        SHA256

        6db068ef7f55e3b3c2cd7fde980cbc45ca800d44c9b6c8321d426e00c9d710e9

        SHA512

        a4ccaef341a407b44a5b246fca101a232e508059ea4329434f67bf27729b9494dfa442fd7f780b522140a2924bf275e1c5d5377931c89d118aff1a5a6fb65c40

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9151.exe

        Filesize

        350KB

        MD5

        0778eb3cc8c0c7a3f8954f081370e482

        SHA1

        9a15619497448c18877503697e17d4364c46131b

        SHA256

        70551ba8678e7664e621741ca8bb34d8888cbb8d35922fc82eb3dd94074c1247

        SHA512

        b72945fbbbc3c9be8f3ac1417d60f9ac74b23c246bcacd822439412f5fd03db6f78eb95a2a530021217ce755ff0daa5196976a600f99ae64cff2ba8c0a17d849

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu9151.exe

        Filesize

        350KB

        MD5

        0778eb3cc8c0c7a3f8954f081370e482

        SHA1

        9a15619497448c18877503697e17d4364c46131b

        SHA256

        70551ba8678e7664e621741ca8bb34d8888cbb8d35922fc82eb3dd94074c1247

        SHA512

        b72945fbbbc3c9be8f3ac1417d60f9ac74b23c246bcacd822439412f5fd03db6f78eb95a2a530021217ce755ff0daa5196976a600f99ae64cff2ba8c0a17d849

      • memory/3920-1119-0x0000000000010000-0x0000000000042000-memory.dmp

        Filesize

        200KB

      • memory/3920-1120-0x00000000048A0000-0x00000000048B0000-memory.dmp

        Filesize

        64KB

      • memory/4248-157-0x0000000002460000-0x0000000002472000-memory.dmp

        Filesize

        72KB

      • memory/4248-167-0x0000000002460000-0x0000000002472000-memory.dmp

        Filesize

        72KB

      • memory/4248-151-0x0000000004E90000-0x0000000005434000-memory.dmp

        Filesize

        5.6MB

      • memory/4248-152-0x0000000002460000-0x0000000002472000-memory.dmp

        Filesize

        72KB

      • memory/4248-153-0x0000000002460000-0x0000000002472000-memory.dmp

        Filesize

        72KB

      • memory/4248-155-0x0000000002460000-0x0000000002472000-memory.dmp

        Filesize

        72KB

      • memory/4248-149-0x0000000004E80000-0x0000000004E90000-memory.dmp

        Filesize

        64KB

      • memory/4248-159-0x0000000002460000-0x0000000002472000-memory.dmp

        Filesize

        72KB

      • memory/4248-161-0x0000000002460000-0x0000000002472000-memory.dmp

        Filesize

        72KB

      • memory/4248-163-0x0000000002460000-0x0000000002472000-memory.dmp

        Filesize

        72KB

      • memory/4248-165-0x0000000002460000-0x0000000002472000-memory.dmp

        Filesize

        72KB

      • memory/4248-150-0x0000000004E80000-0x0000000004E90000-memory.dmp

        Filesize

        64KB

      • memory/4248-169-0x0000000002460000-0x0000000002472000-memory.dmp

        Filesize

        72KB

      • memory/4248-171-0x0000000002460000-0x0000000002472000-memory.dmp

        Filesize

        72KB

      • memory/4248-173-0x0000000002460000-0x0000000002472000-memory.dmp

        Filesize

        72KB

      • memory/4248-175-0x0000000002460000-0x0000000002472000-memory.dmp

        Filesize

        72KB

      • memory/4248-177-0x0000000002460000-0x0000000002472000-memory.dmp

        Filesize

        72KB

      • memory/4248-179-0x0000000002460000-0x0000000002472000-memory.dmp

        Filesize

        72KB

      • memory/4248-180-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/4248-181-0x0000000004E80000-0x0000000004E90000-memory.dmp

        Filesize

        64KB

      • memory/4248-183-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/4248-148-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/4488-193-0x0000000004D10000-0x0000000004D4E000-memory.dmp

        Filesize

        248KB

      • memory/4488-223-0x0000000004D10000-0x0000000004D4E000-memory.dmp

        Filesize

        248KB

      • memory/4488-188-0x0000000004D10000-0x0000000004D4E000-memory.dmp

        Filesize

        248KB

      • memory/4488-195-0x0000000004D10000-0x0000000004D4E000-memory.dmp

        Filesize

        248KB

      • memory/4488-197-0x0000000004D10000-0x0000000004D4E000-memory.dmp

        Filesize

        248KB

      • memory/4488-199-0x0000000004D10000-0x0000000004D4E000-memory.dmp

        Filesize

        248KB

      • memory/4488-201-0x0000000004D10000-0x0000000004D4E000-memory.dmp

        Filesize

        248KB

      • memory/4488-203-0x0000000004D10000-0x0000000004D4E000-memory.dmp

        Filesize

        248KB

      • memory/4488-205-0x0000000004D10000-0x0000000004D4E000-memory.dmp

        Filesize

        248KB

      • memory/4488-207-0x0000000004D10000-0x0000000004D4E000-memory.dmp

        Filesize

        248KB

      • memory/4488-209-0x0000000004D10000-0x0000000004D4E000-memory.dmp

        Filesize

        248KB

      • memory/4488-212-0x0000000000840000-0x000000000088B000-memory.dmp

        Filesize

        300KB

      • memory/4488-211-0x0000000004D10000-0x0000000004D4E000-memory.dmp

        Filesize

        248KB

      • memory/4488-215-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/4488-216-0x0000000004D10000-0x0000000004D4E000-memory.dmp

        Filesize

        248KB

      • memory/4488-219-0x0000000004D10000-0x0000000004D4E000-memory.dmp

        Filesize

        248KB

      • memory/4488-217-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/4488-214-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/4488-221-0x0000000004D10000-0x0000000004D4E000-memory.dmp

        Filesize

        248KB

      • memory/4488-191-0x0000000004D10000-0x0000000004D4E000-memory.dmp

        Filesize

        248KB

      • memory/4488-225-0x0000000004D10000-0x0000000004D4E000-memory.dmp

        Filesize

        248KB

      • memory/4488-1098-0x0000000005470000-0x0000000005A88000-memory.dmp

        Filesize

        6.1MB

      • memory/4488-1099-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/4488-1100-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/4488-1101-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/4488-1102-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/4488-1103-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/4488-1104-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/4488-1106-0x00000000066F0000-0x0000000006766000-memory.dmp

        Filesize

        472KB

      • memory/4488-1107-0x0000000006780000-0x00000000067D0000-memory.dmp

        Filesize

        320KB

      • memory/4488-1108-0x00000000067F0000-0x00000000069B2000-memory.dmp

        Filesize

        1.8MB

      • memory/4488-1109-0x00000000069D0000-0x0000000006EFC000-memory.dmp

        Filesize

        5.2MB

      • memory/4488-1110-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/4488-189-0x0000000004D10000-0x0000000004D4E000-memory.dmp

        Filesize

        248KB

      • memory/4488-1112-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/4488-1111-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB

      • memory/4488-1113-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

        Filesize

        64KB