Analysis

  • max time kernel
    59s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 15:01

General

  • Target

    2752a4e9fb89b4a64945d1d49db29de349596da5001d84ed2a7401c1bde2ccb6.exe

  • Size

    685KB

  • MD5

    c6c905352e36e28fcef37d7b171983ff

  • SHA1

    404a27825c1636eaf9f50ca8456bd0b649f39115

  • SHA256

    2752a4e9fb89b4a64945d1d49db29de349596da5001d84ed2a7401c1bde2ccb6

  • SHA512

    0f0fbf3c44a7f8157cf79aa0df0f0095ed24da4415d8b7af2e3f58ef6edbe1cf39696c5911653bb76634e9355cbef03cb8e274535d237e8e4db8d0c1a7923603

  • SSDEEP

    12288:HMr2y902wCoxVx/EjU3oorHJUkYGJ/jtT1kNrRLXGs7D5BnopEiQ248RuGe3hV3n:ZyTYXBGCP7vvmrRb5795opEo4WuGehVX

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2752a4e9fb89b4a64945d1d49db29de349596da5001d84ed2a7401c1bde2ccb6.exe
    "C:\Users\Admin\AppData\Local\Temp\2752a4e9fb89b4a64945d1d49db29de349596da5001d84ed2a7401c1bde2ccb6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3340
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un876750.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un876750.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:244
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7760.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7760.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3572
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3572 -s 1088
          4⤵
          • Program crash
          PID:2628
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3362.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3362.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4232
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 1776
          4⤵
          • Program crash
          PID:4308
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si503239.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si503239.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1248
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3572 -ip 3572
    1⤵
      PID:5080
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4232 -ip 4232
      1⤵
        PID:3136

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si503239.exe

        Filesize

        175KB

        MD5

        86e938d4e449ae4ac2703d8cad9a43c6

        SHA1

        c10f5c6311e1c40993dd0d85563e725ff5d9646e

        SHA256

        b347250d82ee13a1c6b01c21be68f287a9a38fc189b464c6f7c3d28696584bd0

        SHA512

        a9f12ad650b805eb063d9d19a2630fac4d0242f8001dd7a1633a417ab10d3950b39cad7578f95e132ef92b9b154141997c821f3a3123712251aad68a4cda7b15

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si503239.exe

        Filesize

        175KB

        MD5

        86e938d4e449ae4ac2703d8cad9a43c6

        SHA1

        c10f5c6311e1c40993dd0d85563e725ff5d9646e

        SHA256

        b347250d82ee13a1c6b01c21be68f287a9a38fc189b464c6f7c3d28696584bd0

        SHA512

        a9f12ad650b805eb063d9d19a2630fac4d0242f8001dd7a1633a417ab10d3950b39cad7578f95e132ef92b9b154141997c821f3a3123712251aad68a4cda7b15

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un876750.exe

        Filesize

        543KB

        MD5

        c11d607b7b0d25931da1795c044d43bd

        SHA1

        e30a326bcfa5cb5d3a8dc6a30dffd1db4699b4eb

        SHA256

        0b25abd0a1c3da31a213f88bac8c35795354a8a049b2511d741027e30193629a

        SHA512

        7e791c88b0ff9836dfca9a91870b6c0f1f7f4e587b3a9022aa96edb1f72c495493c7fb1ca2e54d787a548635bf1c8ebaa4a2f0d80636d03dcf336aaed98fa583

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un876750.exe

        Filesize

        543KB

        MD5

        c11d607b7b0d25931da1795c044d43bd

        SHA1

        e30a326bcfa5cb5d3a8dc6a30dffd1db4699b4eb

        SHA256

        0b25abd0a1c3da31a213f88bac8c35795354a8a049b2511d741027e30193629a

        SHA512

        7e791c88b0ff9836dfca9a91870b6c0f1f7f4e587b3a9022aa96edb1f72c495493c7fb1ca2e54d787a548635bf1c8ebaa4a2f0d80636d03dcf336aaed98fa583

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7760.exe

        Filesize

        292KB

        MD5

        fdf366ce21d01e1dfb39fca0c8c01cfa

        SHA1

        9ab20296e4369463564cbb43ef55ff65fbe8e59f

        SHA256

        ff4e3d409aa2938f85df676fec1e1e674368409b28701ecdf7d316cc8a39982f

        SHA512

        8174c5b5bca965ca28400af3e8b54a148c7d7e3b4fccd5f36b7dcf119389160accd717497946d13d54e954cb8c40d8418ebb8df05fcd6b29a3a573862e7a9a92

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7760.exe

        Filesize

        292KB

        MD5

        fdf366ce21d01e1dfb39fca0c8c01cfa

        SHA1

        9ab20296e4369463564cbb43ef55ff65fbe8e59f

        SHA256

        ff4e3d409aa2938f85df676fec1e1e674368409b28701ecdf7d316cc8a39982f

        SHA512

        8174c5b5bca965ca28400af3e8b54a148c7d7e3b4fccd5f36b7dcf119389160accd717497946d13d54e954cb8c40d8418ebb8df05fcd6b29a3a573862e7a9a92

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3362.exe

        Filesize

        350KB

        MD5

        1ba4de25fc1db3adc8073189879b54de

        SHA1

        feb6d2994dcb92539d397d370a15d1ef07c1dc7d

        SHA256

        003df8f6285a14bae59dfe908ac539125c983c65f2fb37a06e32167738a13d95

        SHA512

        55b193f915e8705efe4fe7794422b9cd6a9398a224532ccd90b46d086f1eb55f441951075f3ffd49e6c5c84006e045ed590bc8c3c87eb5ba865b32899e53d31a

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3362.exe

        Filesize

        350KB

        MD5

        1ba4de25fc1db3adc8073189879b54de

        SHA1

        feb6d2994dcb92539d397d370a15d1ef07c1dc7d

        SHA256

        003df8f6285a14bae59dfe908ac539125c983c65f2fb37a06e32167738a13d95

        SHA512

        55b193f915e8705efe4fe7794422b9cd6a9398a224532ccd90b46d086f1eb55f441951075f3ffd49e6c5c84006e045ed590bc8c3c87eb5ba865b32899e53d31a

      • memory/1248-1121-0x0000000000670000-0x00000000006A2000-memory.dmp

        Filesize

        200KB

      • memory/1248-1122-0x00000000052D0000-0x00000000052E0000-memory.dmp

        Filesize

        64KB

      • memory/3572-158-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3572-166-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3572-151-0x0000000004E50000-0x0000000004E60000-memory.dmp

        Filesize

        64KB

      • memory/3572-152-0x0000000004E50000-0x0000000004E60000-memory.dmp

        Filesize

        64KB

      • memory/3572-153-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3572-154-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3572-149-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/3572-156-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3572-160-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3572-162-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3572-164-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3572-150-0x0000000004E50000-0x0000000004E60000-memory.dmp

        Filesize

        64KB

      • memory/3572-168-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3572-170-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3572-172-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3572-174-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3572-176-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3572-178-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3572-180-0x0000000004DB0000-0x0000000004DC2000-memory.dmp

        Filesize

        72KB

      • memory/3572-181-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/3572-182-0x0000000004E50000-0x0000000004E60000-memory.dmp

        Filesize

        64KB

      • memory/3572-183-0x0000000004E50000-0x0000000004E60000-memory.dmp

        Filesize

        64KB

      • memory/3572-185-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/3572-148-0x0000000004E60000-0x0000000005404000-memory.dmp

        Filesize

        5.6MB

      • memory/4232-191-0x0000000004E80000-0x0000000004E90000-memory.dmp

        Filesize

        64KB

      • memory/4232-225-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4232-193-0x0000000004E80000-0x0000000004E90000-memory.dmp

        Filesize

        64KB

      • memory/4232-194-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4232-195-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4232-197-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4232-199-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4232-201-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4232-203-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4232-205-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4232-209-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4232-207-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4232-211-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4232-213-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4232-215-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4232-217-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4232-219-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4232-221-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4232-223-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4232-192-0x0000000004E80000-0x0000000004E90000-memory.dmp

        Filesize

        64KB

      • memory/4232-227-0x0000000002810000-0x000000000284E000-memory.dmp

        Filesize

        248KB

      • memory/4232-1100-0x0000000005540000-0x0000000005B58000-memory.dmp

        Filesize

        6.1MB

      • memory/4232-1101-0x0000000005B60000-0x0000000005C6A000-memory.dmp

        Filesize

        1.0MB

      • memory/4232-1102-0x0000000004E50000-0x0000000004E62000-memory.dmp

        Filesize

        72KB

      • memory/4232-1103-0x0000000005C70000-0x0000000005CAC000-memory.dmp

        Filesize

        240KB

      • memory/4232-1104-0x0000000004E80000-0x0000000004E90000-memory.dmp

        Filesize

        64KB

      • memory/4232-1105-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/4232-1106-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/4232-1107-0x00000000067F0000-0x0000000006866000-memory.dmp

        Filesize

        472KB

      • memory/4232-1108-0x0000000006880000-0x00000000068D0000-memory.dmp

        Filesize

        320KB

      • memory/4232-1110-0x0000000004E80000-0x0000000004E90000-memory.dmp

        Filesize

        64KB

      • memory/4232-1111-0x0000000004E80000-0x0000000004E90000-memory.dmp

        Filesize

        64KB

      • memory/4232-1112-0x0000000004E80000-0x0000000004E90000-memory.dmp

        Filesize

        64KB

      • memory/4232-190-0x00000000007F0000-0x000000000083B000-memory.dmp

        Filesize

        300KB

      • memory/4232-1113-0x0000000006900000-0x0000000006AC2000-memory.dmp

        Filesize

        1.8MB

      • memory/4232-1114-0x0000000006AD0000-0x0000000006FFC000-memory.dmp

        Filesize

        5.2MB

      • memory/4232-1115-0x0000000004E80000-0x0000000004E90000-memory.dmp

        Filesize

        64KB