Analysis

  • max time kernel
    135s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 15:09

General

  • Target

    0ab1d5e2fa033c390b846748ea3757d518035cbe73386c3de1e11b875f71cf80.exe

  • Size

    685KB

  • MD5

    7e7eaa3440c8c57494cd1c2f8d6ce795

  • SHA1

    b4a3ffa4c0245cac55faa8962fb9fc6561b852c6

  • SHA256

    0ab1d5e2fa033c390b846748ea3757d518035cbe73386c3de1e11b875f71cf80

  • SHA512

    157d02f02d33e7a501f577486518960a5b797b43377081ac149dedbe5f9cc6df9761a56d42a5b3c086565665b578141ff7ce8fb986b9ee77c6b98530f0e763a6

  • SSDEEP

    12288:XMrey90ONMEq2fAn4UvVW/+Hs8f/C7PPjcBpdJE/sTxBWuy:pybq2fAnDvk+H5fiPAzdJE/sbWb

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ab1d5e2fa033c390b846748ea3757d518035cbe73386c3de1e11b875f71cf80.exe
    "C:\Users\Admin\AppData\Local\Temp\0ab1d5e2fa033c390b846748ea3757d518035cbe73386c3de1e11b875f71cf80.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4460
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un905260.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un905260.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3588
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6739.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6739.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2000
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 1100
          4⤵
          • Program crash
          PID:1120
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2920.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2920.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4180
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4180 -s 1788
          4⤵
          • Program crash
          PID:832
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si524835.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si524835.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2588
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2000 -ip 2000
    1⤵
      PID:5020
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4180 -ip 4180
      1⤵
        PID:1496

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si524835.exe

        Filesize

        175KB

        MD5

        8d88ce986886396a50b33d306769cc94

        SHA1

        7e3a2bcea8fe43b7f555e7c63014a01542b5fd9f

        SHA256

        69a337e03a1347e2dd8952964192fa9d9cd6132d64bcaf179196b13bb0fe36a6

        SHA512

        dbf06269ac4e1fc364081cfa7a35fe1becad879d481fdb4b052422bf567dc968ed0883a169b1cb82a07264bf918b6df8d543073a452ca2907f782528d1a3f3e8

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si524835.exe

        Filesize

        175KB

        MD5

        8d88ce986886396a50b33d306769cc94

        SHA1

        7e3a2bcea8fe43b7f555e7c63014a01542b5fd9f

        SHA256

        69a337e03a1347e2dd8952964192fa9d9cd6132d64bcaf179196b13bb0fe36a6

        SHA512

        dbf06269ac4e1fc364081cfa7a35fe1becad879d481fdb4b052422bf567dc968ed0883a169b1cb82a07264bf918b6df8d543073a452ca2907f782528d1a3f3e8

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un905260.exe

        Filesize

        543KB

        MD5

        7e408d4f02dc596758f472a8735a663e

        SHA1

        30efd0d82944f74edb50019edfc0fec5eecef15a

        SHA256

        4e5a9f67ce1d4dd7363ecc9bdba5a3ac0cf27851ffa0e08711cf820713362a6a

        SHA512

        f43c2297837d86a67ee9fda7b7add952035c0349b335bc4e0f6c709ffbc36a076b415e51280e9a69ffc8a593f5b6d8bb0d957e178e9bf1969dd2643add78b695

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un905260.exe

        Filesize

        543KB

        MD5

        7e408d4f02dc596758f472a8735a663e

        SHA1

        30efd0d82944f74edb50019edfc0fec5eecef15a

        SHA256

        4e5a9f67ce1d4dd7363ecc9bdba5a3ac0cf27851ffa0e08711cf820713362a6a

        SHA512

        f43c2297837d86a67ee9fda7b7add952035c0349b335bc4e0f6c709ffbc36a076b415e51280e9a69ffc8a593f5b6d8bb0d957e178e9bf1969dd2643add78b695

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6739.exe

        Filesize

        292KB

        MD5

        127e2190510594ea00d18f892945121d

        SHA1

        9627fc654dcdd60bffee6e03d0fb8a1c03dc0dfb

        SHA256

        7706a55b1e4094d2e20e8dad8bdc88244c84b8cc40d764b8100b48089ffc95f1

        SHA512

        93159c2a77efd34a7383c5c896d532e2df2511ad28f262b32f7ef69e98172e3620ead1c3020acba232579d3b31d8f70efd96f475232698cfff8d6e2833eabaaa

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6739.exe

        Filesize

        292KB

        MD5

        127e2190510594ea00d18f892945121d

        SHA1

        9627fc654dcdd60bffee6e03d0fb8a1c03dc0dfb

        SHA256

        7706a55b1e4094d2e20e8dad8bdc88244c84b8cc40d764b8100b48089ffc95f1

        SHA512

        93159c2a77efd34a7383c5c896d532e2df2511ad28f262b32f7ef69e98172e3620ead1c3020acba232579d3b31d8f70efd96f475232698cfff8d6e2833eabaaa

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2920.exe

        Filesize

        350KB

        MD5

        d7f7a27f236617e304ff56be60c542f7

        SHA1

        0b3734a1857bbee8f364c471f34812218adbf990

        SHA256

        1b3ba75751bdbd936d823650db229e55c471b2bc2312a24a23ad0c57644ce90e

        SHA512

        592ea09c62df8c4932c982919a4601b7fd1ccd62d5bd6868fe357b826bfe7400bf5d04d29d6efdbd926fb72047d1fac876ccbf19594b90af843d1c88110ede3f

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2920.exe

        Filesize

        350KB

        MD5

        d7f7a27f236617e304ff56be60c542f7

        SHA1

        0b3734a1857bbee8f364c471f34812218adbf990

        SHA256

        1b3ba75751bdbd936d823650db229e55c471b2bc2312a24a23ad0c57644ce90e

        SHA512

        592ea09c62df8c4932c982919a4601b7fd1ccd62d5bd6868fe357b826bfe7400bf5d04d29d6efdbd926fb72047d1fac876ccbf19594b90af843d1c88110ede3f

      • memory/2000-148-0x0000000004D60000-0x0000000005304000-memory.dmp

        Filesize

        5.6MB

      • memory/2000-149-0x00000000009B0000-0x00000000009DD000-memory.dmp

        Filesize

        180KB

      • memory/2000-150-0x0000000004D50000-0x0000000004D60000-memory.dmp

        Filesize

        64KB

      • memory/2000-151-0x0000000004D50000-0x0000000004D60000-memory.dmp

        Filesize

        64KB

      • memory/2000-152-0x0000000004D50000-0x0000000004D60000-memory.dmp

        Filesize

        64KB

      • memory/2000-153-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/2000-154-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/2000-156-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/2000-158-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/2000-160-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/2000-162-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/2000-164-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/2000-166-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/2000-168-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/2000-170-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/2000-172-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/2000-174-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/2000-176-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/2000-178-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/2000-180-0x0000000005370000-0x0000000005382000-memory.dmp

        Filesize

        72KB

      • memory/2000-181-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/2000-182-0x0000000004D50000-0x0000000004D60000-memory.dmp

        Filesize

        64KB

      • memory/2000-183-0x0000000004D50000-0x0000000004D60000-memory.dmp

        Filesize

        64KB

      • memory/2000-184-0x0000000004D50000-0x0000000004D60000-memory.dmp

        Filesize

        64KB

      • memory/2000-186-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/2588-1122-0x00000000006F0000-0x0000000000722000-memory.dmp

        Filesize

        200KB

      • memory/2588-1124-0x0000000005360000-0x0000000005370000-memory.dmp

        Filesize

        64KB

      • memory/2588-1123-0x0000000005360000-0x0000000005370000-memory.dmp

        Filesize

        64KB

      • memory/4180-195-0x00000000007F0000-0x000000000083B000-memory.dmp

        Filesize

        300KB

      • memory/4180-228-0x0000000002760000-0x000000000279E000-memory.dmp

        Filesize

        248KB

      • memory/4180-197-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/4180-199-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/4180-198-0x0000000002760000-0x000000000279E000-memory.dmp

        Filesize

        248KB

      • memory/4180-201-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/4180-202-0x0000000002760000-0x000000000279E000-memory.dmp

        Filesize

        248KB

      • memory/4180-204-0x0000000002760000-0x000000000279E000-memory.dmp

        Filesize

        248KB

      • memory/4180-206-0x0000000002760000-0x000000000279E000-memory.dmp

        Filesize

        248KB

      • memory/4180-208-0x0000000002760000-0x000000000279E000-memory.dmp

        Filesize

        248KB

      • memory/4180-210-0x0000000002760000-0x000000000279E000-memory.dmp

        Filesize

        248KB

      • memory/4180-212-0x0000000002760000-0x000000000279E000-memory.dmp

        Filesize

        248KB

      • memory/4180-214-0x0000000002760000-0x000000000279E000-memory.dmp

        Filesize

        248KB

      • memory/4180-216-0x0000000002760000-0x000000000279E000-memory.dmp

        Filesize

        248KB

      • memory/4180-218-0x0000000002760000-0x000000000279E000-memory.dmp

        Filesize

        248KB

      • memory/4180-220-0x0000000002760000-0x000000000279E000-memory.dmp

        Filesize

        248KB

      • memory/4180-222-0x0000000002760000-0x000000000279E000-memory.dmp

        Filesize

        248KB

      • memory/4180-224-0x0000000002760000-0x000000000279E000-memory.dmp

        Filesize

        248KB

      • memory/4180-226-0x0000000002760000-0x000000000279E000-memory.dmp

        Filesize

        248KB

      • memory/4180-194-0x0000000002760000-0x000000000279E000-memory.dmp

        Filesize

        248KB

      • memory/4180-1101-0x00000000054D0000-0x0000000005AE8000-memory.dmp

        Filesize

        6.1MB

      • memory/4180-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/4180-1103-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/4180-1104-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/4180-1105-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/4180-1106-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/4180-1107-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/4180-1108-0x0000000006720000-0x00000000068E2000-memory.dmp

        Filesize

        1.8MB

      • memory/4180-1109-0x00000000068F0000-0x0000000006E1C000-memory.dmp

        Filesize

        5.2MB

      • memory/4180-1111-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/4180-1112-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/4180-1113-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB

      • memory/4180-192-0x0000000002760000-0x000000000279E000-memory.dmp

        Filesize

        248KB

      • memory/4180-191-0x0000000002760000-0x000000000279E000-memory.dmp

        Filesize

        248KB

      • memory/4180-1114-0x0000000007190000-0x0000000007206000-memory.dmp

        Filesize

        472KB

      • memory/4180-1115-0x0000000007210000-0x0000000007260000-memory.dmp

        Filesize

        320KB

      • memory/4180-1116-0x0000000004F10000-0x0000000004F20000-memory.dmp

        Filesize

        64KB