Analysis

  • max time kernel
    135s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 14:57

General

  • Target

    637286932ccdb745842f7eb44369ee850ea8c55eaf30c2eaafe2df616782ff8a.exe

  • Size

    685KB

  • MD5

    915e931144085cc6ad36e7a9b57b2f6d

  • SHA1

    61d03487102a42ff1e7ca20c99df427e2640cc51

  • SHA256

    637286932ccdb745842f7eb44369ee850ea8c55eaf30c2eaafe2df616782ff8a

  • SHA512

    b906c09d105d529a4118dbd2be902bc31e58266f220e65d2f63df56839cfec1ad334b45b459d013556da45a7adabc1a627ac4037158d237e0f9083b012c6f05f

  • SSDEEP

    12288:dMrSy903LqlVIyIeBF3tfWxP9hw5QgvgU7BIBoEPoI2NTI5NmyF9:nym0XIeL5Wx6QGgkaBoEPKNTSJF9

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\637286932ccdb745842f7eb44369ee850ea8c55eaf30c2eaafe2df616782ff8a.exe
    "C:\Users\Admin\AppData\Local\Temp\637286932ccdb745842f7eb44369ee850ea8c55eaf30c2eaafe2df616782ff8a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1456
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un530930.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un530930.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1532
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2431.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2431.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5100
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5100 -s 1084
          4⤵
          • Program crash
          PID:2604
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6824.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6824.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4792
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4792 -s 1624
          4⤵
          • Program crash
          PID:2556
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si421147.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si421147.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4132
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 5100 -ip 5100
    1⤵
      PID:3688
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 4792 -ip 4792
      1⤵
        PID:408

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si421147.exe

        Filesize

        175KB

        MD5

        9040192de1fd4b4411ba21bff28fe9ff

        SHA1

        93fde229123df6faeddd87e0cd00aa79ee13451e

        SHA256

        c9f6d55e4512781cc18893fd27618d68b8de1b0c00609bb3a61e55f65f6f75f3

        SHA512

        9975ed429b6a27832385a77b9ef679b23bcca9f664f12d3451fb5387046484f31dcea30b4110d7aba5d89beed56242b2e9352ebc9f3ffe9248d2e56f00b25e2a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si421147.exe

        Filesize

        175KB

        MD5

        9040192de1fd4b4411ba21bff28fe9ff

        SHA1

        93fde229123df6faeddd87e0cd00aa79ee13451e

        SHA256

        c9f6d55e4512781cc18893fd27618d68b8de1b0c00609bb3a61e55f65f6f75f3

        SHA512

        9975ed429b6a27832385a77b9ef679b23bcca9f664f12d3451fb5387046484f31dcea30b4110d7aba5d89beed56242b2e9352ebc9f3ffe9248d2e56f00b25e2a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un530930.exe

        Filesize

        543KB

        MD5

        f595205d987a56970664a7a44948acc3

        SHA1

        67ff9ec82f2079ac3f55f599e3c9916d25e03b42

        SHA256

        ec5d3a6ef34792ce42788ff7a425700e5fcaa24af4f15b9b6e8d4f4c1a001d4f

        SHA512

        ffa09e99b5da0121d063c5c0366a93c08d9652c8cfbda1f4f39e3ee7f1ea96908480bf0162d070ece3cb585243ec278219a4c2bbe652e03bde04b5b99eb4753e

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un530930.exe

        Filesize

        543KB

        MD5

        f595205d987a56970664a7a44948acc3

        SHA1

        67ff9ec82f2079ac3f55f599e3c9916d25e03b42

        SHA256

        ec5d3a6ef34792ce42788ff7a425700e5fcaa24af4f15b9b6e8d4f4c1a001d4f

        SHA512

        ffa09e99b5da0121d063c5c0366a93c08d9652c8cfbda1f4f39e3ee7f1ea96908480bf0162d070ece3cb585243ec278219a4c2bbe652e03bde04b5b99eb4753e

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2431.exe

        Filesize

        292KB

        MD5

        30082e53b22e7761a61fd6fad7ee8672

        SHA1

        fa16c23252a142eab9812b2dfd8cb7720d236274

        SHA256

        03bb18974d19ae8a89cafc65f4c581162ceaacc49d950d445da5f8da9b5c9a5d

        SHA512

        4f6dc4f4eaa5749df70c1634e558905108c31100e6ae2462fe2f5277a24a1d19ef93bbc833d474a64748d2baa485f5388fe1fcdde568738fede854ad40227855

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2431.exe

        Filesize

        292KB

        MD5

        30082e53b22e7761a61fd6fad7ee8672

        SHA1

        fa16c23252a142eab9812b2dfd8cb7720d236274

        SHA256

        03bb18974d19ae8a89cafc65f4c581162ceaacc49d950d445da5f8da9b5c9a5d

        SHA512

        4f6dc4f4eaa5749df70c1634e558905108c31100e6ae2462fe2f5277a24a1d19ef93bbc833d474a64748d2baa485f5388fe1fcdde568738fede854ad40227855

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6824.exe

        Filesize

        350KB

        MD5

        a37e30ae653cec1cf746082a40ca04e9

        SHA1

        787dbf36359ad9e5b0640f5fa1ae6aacd6c9bf9c

        SHA256

        b1365cd4b7195f6a972500b2070b8b9f0a6c15e407c38dabf0c51b812d307232

        SHA512

        512d65fd7663e20a169de2cc577f90d7aaa6aa5387cb0fb22cab862dc85b1a7890c135f75ca6948680e04a53812b9bc983c113f6cab12a80e0b1cefa43ba93e6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6824.exe

        Filesize

        350KB

        MD5

        a37e30ae653cec1cf746082a40ca04e9

        SHA1

        787dbf36359ad9e5b0640f5fa1ae6aacd6c9bf9c

        SHA256

        b1365cd4b7195f6a972500b2070b8b9f0a6c15e407c38dabf0c51b812d307232

        SHA512

        512d65fd7663e20a169de2cc577f90d7aaa6aa5387cb0fb22cab862dc85b1a7890c135f75ca6948680e04a53812b9bc983c113f6cab12a80e0b1cefa43ba93e6

      • memory/4132-1122-0x0000000004B20000-0x0000000004B30000-memory.dmp

        Filesize

        64KB

      • memory/4132-1121-0x0000000000250000-0x0000000000282000-memory.dmp

        Filesize

        200KB

      • memory/4792-227-0x0000000002770000-0x00000000027AE000-memory.dmp

        Filesize

        248KB

      • memory/4792-1104-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/4792-1115-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/4792-1114-0x0000000006FA0000-0x0000000006FF0000-memory.dmp

        Filesize

        320KB

      • memory/4792-1113-0x0000000006F20000-0x0000000006F96000-memory.dmp

        Filesize

        472KB

      • memory/4792-1112-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/4792-1109-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/4792-1110-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/4792-1111-0x00000000068B0000-0x0000000006DDC000-memory.dmp

        Filesize

        5.2MB

      • memory/4792-1107-0x00000000066D0000-0x0000000006892000-memory.dmp

        Filesize

        1.8MB

      • memory/4792-1106-0x00000000065D0000-0x0000000006662000-memory.dmp

        Filesize

        584KB

      • memory/4792-1105-0x0000000005E10000-0x0000000005E76000-memory.dmp

        Filesize

        408KB

      • memory/4792-1103-0x0000000005B20000-0x0000000005B5C000-memory.dmp

        Filesize

        240KB

      • memory/4792-1102-0x0000000004E10000-0x0000000004E22000-memory.dmp

        Filesize

        72KB

      • memory/4792-1101-0x0000000005A10000-0x0000000005B1A000-memory.dmp

        Filesize

        1.0MB

      • memory/4792-1100-0x00000000053F0000-0x0000000005A08000-memory.dmp

        Filesize

        6.1MB

      • memory/4792-225-0x0000000002770000-0x00000000027AE000-memory.dmp

        Filesize

        248KB

      • memory/4792-223-0x0000000002770000-0x00000000027AE000-memory.dmp

        Filesize

        248KB

      • memory/4792-221-0x0000000002770000-0x00000000027AE000-memory.dmp

        Filesize

        248KB

      • memory/4792-219-0x0000000002770000-0x00000000027AE000-memory.dmp

        Filesize

        248KB

      • memory/4792-217-0x0000000002770000-0x00000000027AE000-memory.dmp

        Filesize

        248KB

      • memory/4792-191-0x0000000000980000-0x00000000009CB000-memory.dmp

        Filesize

        300KB

      • memory/4792-192-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/4792-193-0x0000000004E30000-0x0000000004E40000-memory.dmp

        Filesize

        64KB

      • memory/4792-194-0x0000000002770000-0x00000000027AE000-memory.dmp

        Filesize

        248KB

      • memory/4792-195-0x0000000002770000-0x00000000027AE000-memory.dmp

        Filesize

        248KB

      • memory/4792-197-0x0000000002770000-0x00000000027AE000-memory.dmp

        Filesize

        248KB

      • memory/4792-199-0x0000000002770000-0x00000000027AE000-memory.dmp

        Filesize

        248KB

      • memory/4792-201-0x0000000002770000-0x00000000027AE000-memory.dmp

        Filesize

        248KB

      • memory/4792-203-0x0000000002770000-0x00000000027AE000-memory.dmp

        Filesize

        248KB

      • memory/4792-205-0x0000000002770000-0x00000000027AE000-memory.dmp

        Filesize

        248KB

      • memory/4792-207-0x0000000002770000-0x00000000027AE000-memory.dmp

        Filesize

        248KB

      • memory/4792-209-0x0000000002770000-0x00000000027AE000-memory.dmp

        Filesize

        248KB

      • memory/4792-211-0x0000000002770000-0x00000000027AE000-memory.dmp

        Filesize

        248KB

      • memory/4792-213-0x0000000002770000-0x00000000027AE000-memory.dmp

        Filesize

        248KB

      • memory/4792-215-0x0000000002770000-0x00000000027AE000-memory.dmp

        Filesize

        248KB

      • memory/5100-174-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/5100-183-0x0000000004C60000-0x0000000004C70000-memory.dmp

        Filesize

        64KB

      • memory/5100-153-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/5100-184-0x0000000004C60000-0x0000000004C70000-memory.dmp

        Filesize

        64KB

      • memory/5100-172-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/5100-152-0x0000000004C60000-0x0000000004C70000-memory.dmp

        Filesize

        64KB

      • memory/5100-182-0x0000000004C60000-0x0000000004C70000-memory.dmp

        Filesize

        64KB

      • memory/5100-170-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/5100-180-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/5100-178-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/5100-156-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/5100-176-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/5100-186-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/5100-154-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/5100-181-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/5100-168-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/5100-166-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/5100-164-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/5100-162-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/5100-160-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/5100-158-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/5100-151-0x0000000004C60000-0x0000000004C70000-memory.dmp

        Filesize

        64KB

      • memory/5100-150-0x0000000004C60000-0x0000000004C70000-memory.dmp

        Filesize

        64KB

      • memory/5100-149-0x0000000004C70000-0x0000000005214000-memory.dmp

        Filesize

        5.6MB

      • memory/5100-148-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB