Analysis

  • max time kernel
    54s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 15:12

General

  • Target

    4dbcfc0d5fd342a04468a08cd3a8b8f3b8326a891d7573503d8bb1c02f557066.exe

  • Size

    685KB

  • MD5

    17fa825648372b80bfd8390c8820eaa3

  • SHA1

    c1fe513cd5d21b0da758f005e12633a2f8771a42

  • SHA256

    4dbcfc0d5fd342a04468a08cd3a8b8f3b8326a891d7573503d8bb1c02f557066

  • SHA512

    8e37ed1bfe5428015783508df849b1de20ce4ceb7514a9ce9b82f8ff78c425bd0dd7437f676ef62964df3b96db9377ac25704c552ba6141a34e2bfa25a5b02df

  • SSDEEP

    12288:hMrEy90OLrG4PpYYkJ0kf4jzL3vbn/QSPNJb+wGLBSqLEb3hNNilGbU0:1yhvGaYpN4j3jIjAqLEb7r

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4dbcfc0d5fd342a04468a08cd3a8b8f3b8326a891d7573503d8bb1c02f557066.exe
    "C:\Users\Admin\AppData\Local\Temp\4dbcfc0d5fd342a04468a08cd3a8b8f3b8326a891d7573503d8bb1c02f557066.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3724
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un491714.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un491714.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3708
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7571.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7571.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4128
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6939.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6939.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2096
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si037286.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si037286.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3796

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si037286.exe

    Filesize

    175KB

    MD5

    9e960cd9baeaa3467be728ffa2a8a18d

    SHA1

    b8d213950e0feea5d2214aeb396428b4ef109377

    SHA256

    5b029993e7d0ceb190df7d369ee79b50da09b3632bee7d4e8ef926aebe8249bc

    SHA512

    02c16c5d15d981c7df977e0bdea43bcff3b27e8a4ffe33c12ee9149bb703f460f0f13a76b1475fe414660d3d9a854ed7053f4f3841f691973de8b5952970fe63

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si037286.exe

    Filesize

    175KB

    MD5

    9e960cd9baeaa3467be728ffa2a8a18d

    SHA1

    b8d213950e0feea5d2214aeb396428b4ef109377

    SHA256

    5b029993e7d0ceb190df7d369ee79b50da09b3632bee7d4e8ef926aebe8249bc

    SHA512

    02c16c5d15d981c7df977e0bdea43bcff3b27e8a4ffe33c12ee9149bb703f460f0f13a76b1475fe414660d3d9a854ed7053f4f3841f691973de8b5952970fe63

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un491714.exe

    Filesize

    543KB

    MD5

    1f31f8eb4cd3b05545a875b371d122f8

    SHA1

    72685997925ce72d5670357d98e412d151e615da

    SHA256

    d84292019a3fb3ef3716bb12e4a3cf7272b7528921767fd04adc2bacc3d8d3ac

    SHA512

    2791bee9dbd0539929fb2cbd639ed7b9ceb2d12fb7089191580be9d692765c0f3148d0c65ad56d73f8f3eef87581c763479179778138ec1054f02c8fb7a1eefd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un491714.exe

    Filesize

    543KB

    MD5

    1f31f8eb4cd3b05545a875b371d122f8

    SHA1

    72685997925ce72d5670357d98e412d151e615da

    SHA256

    d84292019a3fb3ef3716bb12e4a3cf7272b7528921767fd04adc2bacc3d8d3ac

    SHA512

    2791bee9dbd0539929fb2cbd639ed7b9ceb2d12fb7089191580be9d692765c0f3148d0c65ad56d73f8f3eef87581c763479179778138ec1054f02c8fb7a1eefd

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7571.exe

    Filesize

    292KB

    MD5

    bf835b49bfe271b5506bf5cb16f91399

    SHA1

    928b872084c02aca05c1ec8fb14fca111fc27761

    SHA256

    53b94ac984dca8ec9b7c84047b3122a43e96758c43073071118496e3a7ac45eb

    SHA512

    11329fb30c7180c2204fa99cd11909a3fe5e3b1f13ad52d184ec918dd10d9ab17a881a78b38102866269a5243091ed9668935de3e8cc6d535295f7208b5e7cf1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7571.exe

    Filesize

    292KB

    MD5

    bf835b49bfe271b5506bf5cb16f91399

    SHA1

    928b872084c02aca05c1ec8fb14fca111fc27761

    SHA256

    53b94ac984dca8ec9b7c84047b3122a43e96758c43073071118496e3a7ac45eb

    SHA512

    11329fb30c7180c2204fa99cd11909a3fe5e3b1f13ad52d184ec918dd10d9ab17a881a78b38102866269a5243091ed9668935de3e8cc6d535295f7208b5e7cf1

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6939.exe

    Filesize

    350KB

    MD5

    14dcfa22a7cd593d389bf36532751428

    SHA1

    cb9ac05446d26886beafe4ddb7bff7147d335699

    SHA256

    cf3269f560b7c2f75a6ad25b0370ca62b1670c4cbe88d67a87d698d0a8842f16

    SHA512

    8362cc682bf94f08d4fd62f458b1c4952910237ee92d8b113e7cbf8cb5805b63e47643cfe1973f491df7da821ac5d5d8462d64dc5c3d47971136256ecfed0a12

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6939.exe

    Filesize

    350KB

    MD5

    14dcfa22a7cd593d389bf36532751428

    SHA1

    cb9ac05446d26886beafe4ddb7bff7147d335699

    SHA256

    cf3269f560b7c2f75a6ad25b0370ca62b1670c4cbe88d67a87d698d0a8842f16

    SHA512

    8362cc682bf94f08d4fd62f458b1c4952910237ee92d8b113e7cbf8cb5805b63e47643cfe1973f491df7da821ac5d5d8462d64dc5c3d47971136256ecfed0a12

  • memory/2096-1092-0x00000000053E0000-0x00000000059E6000-memory.dmp

    Filesize

    6.0MB

  • memory/2096-1093-0x0000000005A00000-0x0000000005B0A000-memory.dmp

    Filesize

    1.0MB

  • memory/2096-211-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2096-209-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2096-207-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2096-197-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2096-1108-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

    Filesize

    64KB

  • memory/2096-1106-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

    Filesize

    64KB

  • memory/2096-1107-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

    Filesize

    64KB

  • memory/2096-1105-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

    Filesize

    64KB

  • memory/2096-199-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2096-1104-0x0000000006EA0000-0x0000000006EF0000-memory.dmp

    Filesize

    320KB

  • memory/2096-1103-0x0000000006E20000-0x0000000006E96000-memory.dmp

    Filesize

    472KB

  • memory/2096-1102-0x00000000067C0000-0x0000000006CEC000-memory.dmp

    Filesize

    5.2MB

  • memory/2096-1100-0x00000000065F0000-0x00000000067B2000-memory.dmp

    Filesize

    1.8MB

  • memory/2096-1099-0x00000000063E0000-0x0000000006472000-memory.dmp

    Filesize

    584KB

  • memory/2096-1098-0x0000000005E40000-0x0000000005EA6000-memory.dmp

    Filesize

    408KB

  • memory/2096-1097-0x0000000005CB0000-0x0000000005CFB000-memory.dmp

    Filesize

    300KB

  • memory/2096-1096-0x0000000005B60000-0x0000000005B9E000-memory.dmp

    Filesize

    248KB

  • memory/2096-1095-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

    Filesize

    64KB

  • memory/2096-1094-0x0000000005B40000-0x0000000005B52000-memory.dmp

    Filesize

    72KB

  • memory/2096-214-0x0000000000720000-0x000000000076B000-memory.dmp

    Filesize

    300KB

  • memory/2096-217-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

    Filesize

    64KB

  • memory/2096-220-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

    Filesize

    64KB

  • memory/2096-218-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2096-180-0x00000000023C0000-0x0000000002406000-memory.dmp

    Filesize

    280KB

  • memory/2096-181-0x0000000004C90000-0x0000000004CD4000-memory.dmp

    Filesize

    272KB

  • memory/2096-182-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2096-183-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2096-195-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2096-187-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2096-189-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2096-191-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2096-193-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2096-185-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2096-216-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

    Filesize

    64KB

  • memory/2096-213-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2096-201-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2096-203-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/2096-205-0x0000000004C90000-0x0000000004CCE000-memory.dmp

    Filesize

    248KB

  • memory/3796-1114-0x0000000000F20000-0x0000000000F52000-memory.dmp

    Filesize

    200KB

  • memory/3796-1115-0x0000000005960000-0x00000000059AB000-memory.dmp

    Filesize

    300KB

  • memory/3796-1116-0x00000000057C0000-0x00000000057D0000-memory.dmp

    Filesize

    64KB

  • memory/4128-170-0x0000000000400000-0x000000000070C000-memory.dmp

    Filesize

    3.0MB

  • memory/4128-155-0x0000000002410000-0x0000000002422000-memory.dmp

    Filesize

    72KB

  • memory/4128-145-0x0000000002410000-0x0000000002422000-memory.dmp

    Filesize

    72KB

  • memory/4128-138-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/4128-139-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/4128-175-0x0000000000400000-0x000000000070C000-memory.dmp

    Filesize

    3.0MB

  • memory/4128-137-0x0000000002410000-0x0000000002428000-memory.dmp

    Filesize

    96KB

  • memory/4128-173-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/4128-172-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/4128-171-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/4128-140-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB

  • memory/4128-169-0x0000000002410000-0x0000000002422000-memory.dmp

    Filesize

    72KB

  • memory/4128-167-0x0000000002410000-0x0000000002422000-memory.dmp

    Filesize

    72KB

  • memory/4128-165-0x0000000002410000-0x0000000002422000-memory.dmp

    Filesize

    72KB

  • memory/4128-163-0x0000000002410000-0x0000000002422000-memory.dmp

    Filesize

    72KB

  • memory/4128-161-0x0000000002410000-0x0000000002422000-memory.dmp

    Filesize

    72KB

  • memory/4128-159-0x0000000002410000-0x0000000002422000-memory.dmp

    Filesize

    72KB

  • memory/4128-157-0x0000000002410000-0x0000000002422000-memory.dmp

    Filesize

    72KB

  • memory/4128-153-0x0000000002410000-0x0000000002422000-memory.dmp

    Filesize

    72KB

  • memory/4128-151-0x0000000002410000-0x0000000002422000-memory.dmp

    Filesize

    72KB

  • memory/4128-149-0x0000000002410000-0x0000000002422000-memory.dmp

    Filesize

    72KB

  • memory/4128-147-0x0000000002410000-0x0000000002422000-memory.dmp

    Filesize

    72KB

  • memory/4128-136-0x0000000004E80000-0x000000000537E000-memory.dmp

    Filesize

    5.0MB

  • memory/4128-135-0x0000000000A60000-0x0000000000A7A000-memory.dmp

    Filesize

    104KB

  • memory/4128-142-0x0000000002410000-0x0000000002422000-memory.dmp

    Filesize

    72KB

  • memory/4128-143-0x0000000002410000-0x0000000002422000-memory.dmp

    Filesize

    72KB

  • memory/4128-141-0x0000000004E70000-0x0000000004E80000-memory.dmp

    Filesize

    64KB