Analysis

  • max time kernel
    109s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 15:05

General

  • Target

    769c3fa8ba0ddb035b60edd39573d07d6c7578f7311100cec30a9089019ed391.exe

  • Size

    685KB

  • MD5

    6642cd46cf55ff860915cb6605b62c92

  • SHA1

    fc82cac0ee300d34fd717bceb8b7a0b2ae8ab55f

  • SHA256

    769c3fa8ba0ddb035b60edd39573d07d6c7578f7311100cec30a9089019ed391

  • SHA512

    05b409812afec8a4735a54692d9b0134842ad0dc1280829f4409f556a3f452e878e17b65bb4032a7c9e7b55538292073a59ccb906bc9d91879e796fd9d1e9b2e

  • SSDEEP

    12288:2Mrdy902Vl6OfHR/wxsqSWue4J1URdUO7BUxyEVY44zTphBd:3yJxS8WuDJ6RdUauxyEVYb37T

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\769c3fa8ba0ddb035b60edd39573d07d6c7578f7311100cec30a9089019ed391.exe
    "C:\Users\Admin\AppData\Local\Temp\769c3fa8ba0ddb035b60edd39573d07d6c7578f7311100cec30a9089019ed391.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1704
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un046930.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un046930.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4400
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2106.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2106.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2796
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 1084
          4⤵
          • Program crash
          PID:1572
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5680.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5680.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1940
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1940 -s 1908
          4⤵
          • Program crash
          PID:2628
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si678954.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si678954.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3036
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2796 -ip 2796
    1⤵
      PID:3668
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1940 -ip 1940
      1⤵
        PID:4792

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si678954.exe

        Filesize

        175KB

        MD5

        ccdd1f709158b448586f077e62aa41fb

        SHA1

        1755a2db2581831ce89de5105216648aa6e9231c

        SHA256

        363a7337fe21c1fa13e469b02122e3355c84ce5523f07d5624db9cf4095e08a0

        SHA512

        07b63aa3f241c749e15a442a36697ae06426e48d9913ad246ae32c52956b6774bb68406e4c6038219ad2540d9eefa24d76ddd243f06cb12a8de8fd3d441295c0

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si678954.exe

        Filesize

        175KB

        MD5

        ccdd1f709158b448586f077e62aa41fb

        SHA1

        1755a2db2581831ce89de5105216648aa6e9231c

        SHA256

        363a7337fe21c1fa13e469b02122e3355c84ce5523f07d5624db9cf4095e08a0

        SHA512

        07b63aa3f241c749e15a442a36697ae06426e48d9913ad246ae32c52956b6774bb68406e4c6038219ad2540d9eefa24d76ddd243f06cb12a8de8fd3d441295c0

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un046930.exe

        Filesize

        543KB

        MD5

        b6a4b489712e43f2c4bbd3e50f335fc8

        SHA1

        61980ed681da7a5116ec523b87b8370d3b631d1c

        SHA256

        9e112b632c6dd16860f14b21e8088d95eaac0bd7f5774c2d97076e1bd2eac07b

        SHA512

        96eba4f26da5ac455f515a564ea262254d807dbbebc5932cc72b937dee63d9fbab7cd5fa7e84a9a218aac3b7bcd2ec4f17b70654afbd5b342146c78e2050d09b

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un046930.exe

        Filesize

        543KB

        MD5

        b6a4b489712e43f2c4bbd3e50f335fc8

        SHA1

        61980ed681da7a5116ec523b87b8370d3b631d1c

        SHA256

        9e112b632c6dd16860f14b21e8088d95eaac0bd7f5774c2d97076e1bd2eac07b

        SHA512

        96eba4f26da5ac455f515a564ea262254d807dbbebc5932cc72b937dee63d9fbab7cd5fa7e84a9a218aac3b7bcd2ec4f17b70654afbd5b342146c78e2050d09b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2106.exe

        Filesize

        292KB

        MD5

        12fb48a1bcc5e49657fd3abae867ce57

        SHA1

        7e54ee5fe778037593c89120b49e9188043d293e

        SHA256

        660790f1fb4f527ca9ffbbd5150b8a73faecd53945f0c6e209fb6bb2dc17af73

        SHA512

        579d62ab12e00553c416684adb97cdc5ebf7646e9eb72dd27944474103bfdb6b89c9c160731396a59bbd29779e5247f6caa9006e4596bfc4c62ce456faacef08

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2106.exe

        Filesize

        292KB

        MD5

        12fb48a1bcc5e49657fd3abae867ce57

        SHA1

        7e54ee5fe778037593c89120b49e9188043d293e

        SHA256

        660790f1fb4f527ca9ffbbd5150b8a73faecd53945f0c6e209fb6bb2dc17af73

        SHA512

        579d62ab12e00553c416684adb97cdc5ebf7646e9eb72dd27944474103bfdb6b89c9c160731396a59bbd29779e5247f6caa9006e4596bfc4c62ce456faacef08

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5680.exe

        Filesize

        350KB

        MD5

        db4d930a0e8d2d256e7ffb5a5cc0ea3d

        SHA1

        0bd42f38ae6ead7a82886f1f736f4a3d9dba5dcc

        SHA256

        37c9117a8fff4e0143eec0401f202536d10cd393eb56105cd6d1ed615701c9a9

        SHA512

        e481c28289cc545246559f0cc6a518e33e3dd42203986db4ba31e5957745654830950c5968532232dc11c8832e64d46306b11448ac58fc603a450e0e0d92a6c1

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5680.exe

        Filesize

        350KB

        MD5

        db4d930a0e8d2d256e7ffb5a5cc0ea3d

        SHA1

        0bd42f38ae6ead7a82886f1f736f4a3d9dba5dcc

        SHA256

        37c9117a8fff4e0143eec0401f202536d10cd393eb56105cd6d1ed615701c9a9

        SHA512

        e481c28289cc545246559f0cc6a518e33e3dd42203986db4ba31e5957745654830950c5968532232dc11c8832e64d46306b11448ac58fc603a450e0e0d92a6c1

      • memory/1940-1099-0x0000000005470000-0x0000000005A88000-memory.dmp

        Filesize

        6.1MB

      • memory/1940-1102-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

        Filesize

        64KB

      • memory/1940-1114-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

        Filesize

        64KB

      • memory/1940-1113-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

        Filesize

        64KB

      • memory/1940-1112-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

        Filesize

        64KB

      • memory/1940-1111-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

        Filesize

        64KB

      • memory/1940-1109-0x00000000069C0000-0x0000000006EEC000-memory.dmp

        Filesize

        5.2MB

      • memory/1940-1108-0x00000000067F0000-0x00000000069B2000-memory.dmp

        Filesize

        1.8MB

      • memory/1940-1107-0x0000000006780000-0x00000000067D0000-memory.dmp

        Filesize

        320KB

      • memory/1940-1106-0x00000000066F0000-0x0000000006766000-memory.dmp

        Filesize

        472KB

      • memory/1940-1105-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/1940-1104-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/1940-1103-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/1940-1101-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/1940-1100-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/1940-226-0x0000000004D30000-0x0000000004D6E000-memory.dmp

        Filesize

        248KB

      • memory/1940-225-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

        Filesize

        64KB

      • memory/1940-221-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

        Filesize

        64KB

      • memory/1940-223-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

        Filesize

        64KB

      • memory/1940-222-0x0000000004D30000-0x0000000004D6E000-memory.dmp

        Filesize

        248KB

      • memory/1940-219-0x0000000000830000-0x000000000087B000-memory.dmp

        Filesize

        300KB

      • memory/1940-189-0x0000000004D30000-0x0000000004D6E000-memory.dmp

        Filesize

        248KB

      • memory/1940-190-0x0000000004D30000-0x0000000004D6E000-memory.dmp

        Filesize

        248KB

      • memory/1940-192-0x0000000004D30000-0x0000000004D6E000-memory.dmp

        Filesize

        248KB

      • memory/1940-194-0x0000000004D30000-0x0000000004D6E000-memory.dmp

        Filesize

        248KB

      • memory/1940-196-0x0000000004D30000-0x0000000004D6E000-memory.dmp

        Filesize

        248KB

      • memory/1940-198-0x0000000004D30000-0x0000000004D6E000-memory.dmp

        Filesize

        248KB

      • memory/1940-200-0x0000000004D30000-0x0000000004D6E000-memory.dmp

        Filesize

        248KB

      • memory/1940-202-0x0000000004D30000-0x0000000004D6E000-memory.dmp

        Filesize

        248KB

      • memory/1940-204-0x0000000004D30000-0x0000000004D6E000-memory.dmp

        Filesize

        248KB

      • memory/1940-206-0x0000000004D30000-0x0000000004D6E000-memory.dmp

        Filesize

        248KB

      • memory/1940-208-0x0000000004D30000-0x0000000004D6E000-memory.dmp

        Filesize

        248KB

      • memory/1940-210-0x0000000004D30000-0x0000000004D6E000-memory.dmp

        Filesize

        248KB

      • memory/1940-212-0x0000000004D30000-0x0000000004D6E000-memory.dmp

        Filesize

        248KB

      • memory/1940-214-0x0000000004D30000-0x0000000004D6E000-memory.dmp

        Filesize

        248KB

      • memory/1940-216-0x0000000004D30000-0x0000000004D6E000-memory.dmp

        Filesize

        248KB

      • memory/1940-218-0x0000000004D30000-0x0000000004D6E000-memory.dmp

        Filesize

        248KB

      • memory/2796-172-0x00000000028D0000-0x00000000028E2000-memory.dmp

        Filesize

        72KB

      • memory/2796-181-0x0000000002500000-0x0000000002510000-memory.dmp

        Filesize

        64KB

      • memory/2796-151-0x00000000028D0000-0x00000000028E2000-memory.dmp

        Filesize

        72KB

      • memory/2796-182-0x0000000002500000-0x0000000002510000-memory.dmp

        Filesize

        64KB

      • memory/2796-170-0x00000000028D0000-0x00000000028E2000-memory.dmp

        Filesize

        72KB

      • memory/2796-180-0x0000000002500000-0x0000000002510000-memory.dmp

        Filesize

        64KB

      • memory/2796-150-0x0000000002500000-0x0000000002510000-memory.dmp

        Filesize

        64KB

      • memory/2796-168-0x00000000028D0000-0x00000000028E2000-memory.dmp

        Filesize

        72KB

      • memory/2796-178-0x00000000028D0000-0x00000000028E2000-memory.dmp

        Filesize

        72KB

      • memory/2796-154-0x00000000028D0000-0x00000000028E2000-memory.dmp

        Filesize

        72KB

      • memory/2796-174-0x00000000028D0000-0x00000000028E2000-memory.dmp

        Filesize

        72KB

      • memory/2796-176-0x00000000028D0000-0x00000000028E2000-memory.dmp

        Filesize

        72KB

      • memory/2796-184-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/2796-152-0x00000000028D0000-0x00000000028E2000-memory.dmp

        Filesize

        72KB

      • memory/2796-179-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/2796-166-0x00000000028D0000-0x00000000028E2000-memory.dmp

        Filesize

        72KB

      • memory/2796-164-0x00000000028D0000-0x00000000028E2000-memory.dmp

        Filesize

        72KB

      • memory/2796-162-0x00000000028D0000-0x00000000028E2000-memory.dmp

        Filesize

        72KB

      • memory/2796-160-0x00000000028D0000-0x00000000028E2000-memory.dmp

        Filesize

        72KB

      • memory/2796-158-0x00000000028D0000-0x00000000028E2000-memory.dmp

        Filesize

        72KB

      • memory/2796-156-0x00000000028D0000-0x00000000028E2000-memory.dmp

        Filesize

        72KB

      • memory/2796-149-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/2796-148-0x0000000004E00000-0x00000000053A4000-memory.dmp

        Filesize

        5.6MB

      • memory/3036-1120-0x00000000000B0000-0x00000000000E2000-memory.dmp

        Filesize

        200KB

      • memory/3036-1121-0x0000000004980000-0x0000000004990000-memory.dmp

        Filesize

        64KB