Analysis

  • max time kernel
    56s
  • max time network
    73s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 15:18

General

  • Target

    89fff7c65ea2d0d412afd8c34ef38ece23a1c5b6af9dbda1c48c888fb4e53f61.exe

  • Size

    685KB

  • MD5

    108b711803fae477654e6c87f864a86f

  • SHA1

    685be4172fdb9520268d9d38cb6a1d503be3fb00

  • SHA256

    89fff7c65ea2d0d412afd8c34ef38ece23a1c5b6af9dbda1c48c888fb4e53f61

  • SHA512

    00954776847fa4d37bc50cbaec78e553d49c08efc4abdb2100d6082886b0eed2db7ac07fdf172d39a64b7d322359bc9ff1da492e091eebe8fd5336278a35a781

  • SSDEEP

    12288:SMrYy90861hFipmG923s3Fh2XeQrDW+JrpW6kUyBabTEV4MtcPcEI:uyDCaz28VhSWErpxIIbTElcEF

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\89fff7c65ea2d0d412afd8c34ef38ece23a1c5b6af9dbda1c48c888fb4e53f61.exe
    "C:\Users\Admin\AppData\Local\Temp\89fff7c65ea2d0d412afd8c34ef38ece23a1c5b6af9dbda1c48c888fb4e53f61.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4540
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un698340.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un698340.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5032
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3383.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3383.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2080
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3155.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3155.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3812
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si508123.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si508123.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3620

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si508123.exe

    Filesize

    175KB

    MD5

    b4156fe965ff16c15684e6a94dacafa9

    SHA1

    fe6eda1de10f99891285d391a539eb4ae2c6fbca

    SHA256

    93303ee7a666d40063a02775147a4de4469133272ee06d3d8fad6a41a76dc3ae

    SHA512

    9d58503e7f620cbb9478c8f46b2159cd418a3b2440e11df0e676a9ca2cb680f61fedbd4558d733d228f4532466675affc25394fa8fae444eaab2250fb1e4baab

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si508123.exe

    Filesize

    175KB

    MD5

    b4156fe965ff16c15684e6a94dacafa9

    SHA1

    fe6eda1de10f99891285d391a539eb4ae2c6fbca

    SHA256

    93303ee7a666d40063a02775147a4de4469133272ee06d3d8fad6a41a76dc3ae

    SHA512

    9d58503e7f620cbb9478c8f46b2159cd418a3b2440e11df0e676a9ca2cb680f61fedbd4558d733d228f4532466675affc25394fa8fae444eaab2250fb1e4baab

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un698340.exe

    Filesize

    543KB

    MD5

    0b35e90e1290263839a19ceba0f8f8a6

    SHA1

    818c1c52cda4ac0abb645efed92495d99cf78b29

    SHA256

    22473d37d3cf9d8c512f0d7f9b936ba42fc4008885f547c99ecdfab11322059b

    SHA512

    412126412af6bf737b6aa4d30e7f42d9a065e805c2fab6d0d56625a02f1b2034195a16a0af6fd2888a3c535de06242d1ffea91974b743bbda18f8d0462514254

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un698340.exe

    Filesize

    543KB

    MD5

    0b35e90e1290263839a19ceba0f8f8a6

    SHA1

    818c1c52cda4ac0abb645efed92495d99cf78b29

    SHA256

    22473d37d3cf9d8c512f0d7f9b936ba42fc4008885f547c99ecdfab11322059b

    SHA512

    412126412af6bf737b6aa4d30e7f42d9a065e805c2fab6d0d56625a02f1b2034195a16a0af6fd2888a3c535de06242d1ffea91974b743bbda18f8d0462514254

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3383.exe

    Filesize

    292KB

    MD5

    da8fd744a991bf16cd14ada749ad527f

    SHA1

    8a09070d01d728a20424d6e66616c886f9136465

    SHA256

    dc7a77d5ed3c2692b494d2eb49d3970229fd7df82601f6156dcb876aec404e09

    SHA512

    f178357e0fd19ba2d7b508d820c16db842c4b63d6035f9863fe604ff69b4016a60b1bd7b9524736a10e07e46967200c3014bb8bca863ef1890909d845cd12c32

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3383.exe

    Filesize

    292KB

    MD5

    da8fd744a991bf16cd14ada749ad527f

    SHA1

    8a09070d01d728a20424d6e66616c886f9136465

    SHA256

    dc7a77d5ed3c2692b494d2eb49d3970229fd7df82601f6156dcb876aec404e09

    SHA512

    f178357e0fd19ba2d7b508d820c16db842c4b63d6035f9863fe604ff69b4016a60b1bd7b9524736a10e07e46967200c3014bb8bca863ef1890909d845cd12c32

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3155.exe

    Filesize

    350KB

    MD5

    53ac9c8d670cb428d5fb7ea64b946ec8

    SHA1

    a95e1337ffd7bbf4069d1550f741bf2296d9ae36

    SHA256

    9d54c557af65fc1a3fee9b4c3f5819736dae7b3179db9eb893b61ee8d4694530

    SHA512

    c4eaac5e098f003a2a027877c80b1540f21c632a714d50bcc0e7791fe0c2115a49a8a7a4f17204f31622d563095a24aaf5aa1bbf2c2ea6a1ac74528768c0a1f2

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu3155.exe

    Filesize

    350KB

    MD5

    53ac9c8d670cb428d5fb7ea64b946ec8

    SHA1

    a95e1337ffd7bbf4069d1550f741bf2296d9ae36

    SHA256

    9d54c557af65fc1a3fee9b4c3f5819736dae7b3179db9eb893b61ee8d4694530

    SHA512

    c4eaac5e098f003a2a027877c80b1540f21c632a714d50bcc0e7791fe0c2115a49a8a7a4f17204f31622d563095a24aaf5aa1bbf2c2ea6a1ac74528768c0a1f2

  • memory/2080-132-0x0000000002210000-0x000000000222A000-memory.dmp

    Filesize

    104KB

  • memory/2080-133-0x0000000004F10000-0x000000000540E000-memory.dmp

    Filesize

    5.0MB

  • memory/2080-134-0x0000000002380000-0x0000000002398000-memory.dmp

    Filesize

    96KB

  • memory/2080-135-0x00000000007E0000-0x000000000080D000-memory.dmp

    Filesize

    180KB

  • memory/2080-137-0x0000000004F00000-0x0000000004F10000-memory.dmp

    Filesize

    64KB

  • memory/2080-136-0x0000000004F00000-0x0000000004F10000-memory.dmp

    Filesize

    64KB

  • memory/2080-138-0x0000000004F00000-0x0000000004F10000-memory.dmp

    Filesize

    64KB

  • memory/2080-139-0x0000000002380000-0x0000000002392000-memory.dmp

    Filesize

    72KB

  • memory/2080-142-0x0000000002380000-0x0000000002392000-memory.dmp

    Filesize

    72KB

  • memory/2080-140-0x0000000002380000-0x0000000002392000-memory.dmp

    Filesize

    72KB

  • memory/2080-144-0x0000000002380000-0x0000000002392000-memory.dmp

    Filesize

    72KB

  • memory/2080-146-0x0000000002380000-0x0000000002392000-memory.dmp

    Filesize

    72KB

  • memory/2080-148-0x0000000002380000-0x0000000002392000-memory.dmp

    Filesize

    72KB

  • memory/2080-150-0x0000000002380000-0x0000000002392000-memory.dmp

    Filesize

    72KB

  • memory/2080-152-0x0000000002380000-0x0000000002392000-memory.dmp

    Filesize

    72KB

  • memory/2080-154-0x0000000002380000-0x0000000002392000-memory.dmp

    Filesize

    72KB

  • memory/2080-156-0x0000000002380000-0x0000000002392000-memory.dmp

    Filesize

    72KB

  • memory/2080-158-0x0000000002380000-0x0000000002392000-memory.dmp

    Filesize

    72KB

  • memory/2080-160-0x0000000002380000-0x0000000002392000-memory.dmp

    Filesize

    72KB

  • memory/2080-162-0x0000000002380000-0x0000000002392000-memory.dmp

    Filesize

    72KB

  • memory/2080-164-0x0000000002380000-0x0000000002392000-memory.dmp

    Filesize

    72KB

  • memory/2080-166-0x0000000002380000-0x0000000002392000-memory.dmp

    Filesize

    72KB

  • memory/2080-167-0x0000000000400000-0x000000000070C000-memory.dmp

    Filesize

    3.0MB

  • memory/2080-168-0x0000000004F00000-0x0000000004F10000-memory.dmp

    Filesize

    64KB

  • memory/2080-169-0x0000000004F00000-0x0000000004F10000-memory.dmp

    Filesize

    64KB

  • memory/2080-170-0x0000000004F00000-0x0000000004F10000-memory.dmp

    Filesize

    64KB

  • memory/2080-172-0x0000000000400000-0x000000000070C000-memory.dmp

    Filesize

    3.0MB

  • memory/3620-1111-0x0000000000C90000-0x0000000000CC2000-memory.dmp

    Filesize

    200KB

  • memory/3620-1113-0x00000000054F0000-0x0000000005500000-memory.dmp

    Filesize

    64KB

  • memory/3620-1112-0x00000000056D0000-0x000000000571B000-memory.dmp

    Filesize

    300KB

  • memory/3812-180-0x0000000002400000-0x000000000243E000-memory.dmp

    Filesize

    248KB

  • memory/3812-249-0x0000000005040000-0x0000000005050000-memory.dmp

    Filesize

    64KB

  • memory/3812-182-0x0000000002400000-0x000000000243E000-memory.dmp

    Filesize

    248KB

  • memory/3812-184-0x0000000002400000-0x000000000243E000-memory.dmp

    Filesize

    248KB

  • memory/3812-186-0x0000000002400000-0x000000000243E000-memory.dmp

    Filesize

    248KB

  • memory/3812-188-0x0000000002400000-0x000000000243E000-memory.dmp

    Filesize

    248KB

  • memory/3812-190-0x0000000002400000-0x000000000243E000-memory.dmp

    Filesize

    248KB

  • memory/3812-192-0x0000000002400000-0x000000000243E000-memory.dmp

    Filesize

    248KB

  • memory/3812-194-0x0000000002400000-0x000000000243E000-memory.dmp

    Filesize

    248KB

  • memory/3812-196-0x0000000002400000-0x000000000243E000-memory.dmp

    Filesize

    248KB

  • memory/3812-198-0x0000000002400000-0x000000000243E000-memory.dmp

    Filesize

    248KB

  • memory/3812-200-0x0000000002400000-0x000000000243E000-memory.dmp

    Filesize

    248KB

  • memory/3812-202-0x0000000002400000-0x000000000243E000-memory.dmp

    Filesize

    248KB

  • memory/3812-204-0x0000000002400000-0x000000000243E000-memory.dmp

    Filesize

    248KB

  • memory/3812-206-0x0000000002400000-0x000000000243E000-memory.dmp

    Filesize

    248KB

  • memory/3812-208-0x0000000002400000-0x000000000243E000-memory.dmp

    Filesize

    248KB

  • memory/3812-210-0x0000000002400000-0x000000000243E000-memory.dmp

    Filesize

    248KB

  • memory/3812-212-0x0000000002400000-0x000000000243E000-memory.dmp

    Filesize

    248KB

  • memory/3812-245-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/3812-179-0x0000000002400000-0x000000000243E000-memory.dmp

    Filesize

    248KB

  • memory/3812-246-0x0000000005040000-0x0000000005050000-memory.dmp

    Filesize

    64KB

  • memory/3812-250-0x0000000005040000-0x0000000005050000-memory.dmp

    Filesize

    64KB

  • memory/3812-1089-0x0000000005B60000-0x0000000006166000-memory.dmp

    Filesize

    6.0MB

  • memory/3812-1090-0x0000000005550000-0x000000000565A000-memory.dmp

    Filesize

    1.0MB

  • memory/3812-1091-0x0000000002AC0000-0x0000000002AD2000-memory.dmp

    Filesize

    72KB

  • memory/3812-1092-0x0000000005040000-0x0000000005050000-memory.dmp

    Filesize

    64KB

  • memory/3812-1093-0x0000000002AE0000-0x0000000002B1E000-memory.dmp

    Filesize

    248KB

  • memory/3812-1094-0x0000000004FC0000-0x000000000500B000-memory.dmp

    Filesize

    300KB

  • memory/3812-1095-0x0000000005830000-0x00000000058C2000-memory.dmp

    Filesize

    584KB

  • memory/3812-1096-0x00000000058D0000-0x0000000005936000-memory.dmp

    Filesize

    408KB

  • memory/3812-1098-0x0000000005040000-0x0000000005050000-memory.dmp

    Filesize

    64KB

  • memory/3812-1099-0x0000000005040000-0x0000000005050000-memory.dmp

    Filesize

    64KB

  • memory/3812-1100-0x0000000005040000-0x0000000005050000-memory.dmp

    Filesize

    64KB

  • memory/3812-1101-0x00000000065C0000-0x0000000006636000-memory.dmp

    Filesize

    472KB

  • memory/3812-1102-0x0000000006650000-0x00000000066A0000-memory.dmp

    Filesize

    320KB

  • memory/3812-178-0x0000000002400000-0x0000000002444000-memory.dmp

    Filesize

    272KB

  • memory/3812-177-0x0000000000A00000-0x0000000000A46000-memory.dmp

    Filesize

    280KB

  • memory/3812-1103-0x00000000066D0000-0x0000000006892000-memory.dmp

    Filesize

    1.8MB

  • memory/3812-1104-0x00000000068A0000-0x0000000006DCC000-memory.dmp

    Filesize

    5.2MB

  • memory/3812-1105-0x0000000005040000-0x0000000005050000-memory.dmp

    Filesize

    64KB