Analysis

  • max time kernel
    127s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 15:27

General

  • Target

    443e9eebf52f3c72ff19795c37b689dccea37d51de0e04540f18a183c7e0846b.exe

  • Size

    685KB

  • MD5

    f9749f360798af67604f0f84352fd8de

  • SHA1

    1eeb1a7f0427469eb321ea1fdf714eb12fa7f0dc

  • SHA256

    443e9eebf52f3c72ff19795c37b689dccea37d51de0e04540f18a183c7e0846b

  • SHA512

    79f8424bba7eaf6ce2eceb5635cca12da7ad2a2d7bedc18324da8576f6c5a3b91efa938fdf5927e3b186f7004fe5dc714fb2017f2599a38e55f2a226c26c79db

  • SSDEEP

    12288:XMryy90mxStzjxmv6JUkDO2mlUw/N53KDE7f445BnW0EphbqgL89EQW2Iq:ByYtztfBnY1NhF7f465W0EzqgL8JW2r

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\443e9eebf52f3c72ff19795c37b689dccea37d51de0e04540f18a183c7e0846b.exe
    "C:\Users\Admin\AppData\Local\Temp\443e9eebf52f3c72ff19795c37b689dccea37d51de0e04540f18a183c7e0846b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:516
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un609375.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un609375.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:564
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2628.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2628.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:640
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 640 -s 1084
          4⤵
          • Program crash
          PID:4460
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7515.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7515.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4840
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 972
          4⤵
          • Program crash
          PID:4328
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si338740.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si338740.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2000
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 640 -ip 640
    1⤵
      PID:5020
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 4840 -ip 4840
      1⤵
        PID:1860
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:3272

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si338740.exe

        Filesize

        175KB

        MD5

        19a6601c25bc54ab6b3ef092f99721b4

        SHA1

        5c349277fc9efed07cdb7dfd2d85961bfa25c10c

        SHA256

        342f3ef7fbe9026817b557fe1e7d0a170f59c00de16ee7f24bab2a80c150d479

        SHA512

        7465d15642d66eb93cdc59ae536860cc74acf11de4ebdd9eb9ca5fb8c4489a728f45e3053dcc84e5018d3fc2d8c948dcb30e6911e4e0bbf8df27273606bd0912

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si338740.exe

        Filesize

        175KB

        MD5

        19a6601c25bc54ab6b3ef092f99721b4

        SHA1

        5c349277fc9efed07cdb7dfd2d85961bfa25c10c

        SHA256

        342f3ef7fbe9026817b557fe1e7d0a170f59c00de16ee7f24bab2a80c150d479

        SHA512

        7465d15642d66eb93cdc59ae536860cc74acf11de4ebdd9eb9ca5fb8c4489a728f45e3053dcc84e5018d3fc2d8c948dcb30e6911e4e0bbf8df27273606bd0912

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un609375.exe

        Filesize

        543KB

        MD5

        07e9e34cf5f40896ef79804715df43e4

        SHA1

        bced3aa704731125364f72d2487585eab73fbcd0

        SHA256

        a2e3e9123fbd77d29ce7ad6dbef632f9398252a33bff4803d65eb783568d2efb

        SHA512

        54bf294af5f0b338063f611423251eae4d7836f310b97a6f3d288ab4341e49011fd0c64e0adb8053bac0da63fed75a24b00a1a916efbe85ba9e4a5127a9742f3

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un609375.exe

        Filesize

        543KB

        MD5

        07e9e34cf5f40896ef79804715df43e4

        SHA1

        bced3aa704731125364f72d2487585eab73fbcd0

        SHA256

        a2e3e9123fbd77d29ce7ad6dbef632f9398252a33bff4803d65eb783568d2efb

        SHA512

        54bf294af5f0b338063f611423251eae4d7836f310b97a6f3d288ab4341e49011fd0c64e0adb8053bac0da63fed75a24b00a1a916efbe85ba9e4a5127a9742f3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2628.exe

        Filesize

        292KB

        MD5

        6bee0b358a1d7356fdd6b049a99a6635

        SHA1

        939782c4793d7c94f890bc35c9c3865353afdf17

        SHA256

        a90f6535594b6835ee44c3a677f12d9cfa59e0710ab9b87ceb8e0275d1491592

        SHA512

        a0e7692b72637ed64763dfa7f35747dcf07b79d9774b33a353e7d6d1520a59e88e63c3394ddf2a61a5ef43c07571a33605b9692f5cf416ea436e4b537ef6c337

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro2628.exe

        Filesize

        292KB

        MD5

        6bee0b358a1d7356fdd6b049a99a6635

        SHA1

        939782c4793d7c94f890bc35c9c3865353afdf17

        SHA256

        a90f6535594b6835ee44c3a677f12d9cfa59e0710ab9b87ceb8e0275d1491592

        SHA512

        a0e7692b72637ed64763dfa7f35747dcf07b79d9774b33a353e7d6d1520a59e88e63c3394ddf2a61a5ef43c07571a33605b9692f5cf416ea436e4b537ef6c337

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7515.exe

        Filesize

        350KB

        MD5

        5c9f6f1edbd19612090654e214ce4bf5

        SHA1

        fd0fbba1fe4365fcae3e9f7cde3b559c96f7a5d1

        SHA256

        6243acb68a521eab85ca3d30399cf6d5b040a639802f7bf0881ffe0bcce25ae9

        SHA512

        e2c292702a223be67af46c75098ebccb2a6c0e55d6bfbdbe96b9f3e715ad8423e5e7321e74b435221ef39b79e2136c1ea2eb8a685ff237e2044882cdcf0a4a60

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7515.exe

        Filesize

        350KB

        MD5

        5c9f6f1edbd19612090654e214ce4bf5

        SHA1

        fd0fbba1fe4365fcae3e9f7cde3b559c96f7a5d1

        SHA256

        6243acb68a521eab85ca3d30399cf6d5b040a639802f7bf0881ffe0bcce25ae9

        SHA512

        e2c292702a223be67af46c75098ebccb2a6c0e55d6bfbdbe96b9f3e715ad8423e5e7321e74b435221ef39b79e2136c1ea2eb8a685ff237e2044882cdcf0a4a60

      • memory/640-164-0x0000000002550000-0x0000000002562000-memory.dmp

        Filesize

        72KB

      • memory/640-168-0x0000000002550000-0x0000000002562000-memory.dmp

        Filesize

        72KB

      • memory/640-149-0x0000000000710000-0x000000000073D000-memory.dmp

        Filesize

        180KB

      • memory/640-151-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/640-152-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/640-153-0x0000000002550000-0x0000000002562000-memory.dmp

        Filesize

        72KB

      • memory/640-156-0x0000000002550000-0x0000000002562000-memory.dmp

        Filesize

        72KB

      • memory/640-154-0x0000000002550000-0x0000000002562000-memory.dmp

        Filesize

        72KB

      • memory/640-160-0x0000000002550000-0x0000000002562000-memory.dmp

        Filesize

        72KB

      • memory/640-158-0x0000000002550000-0x0000000002562000-memory.dmp

        Filesize

        72KB

      • memory/640-148-0x0000000004F50000-0x00000000054F4000-memory.dmp

        Filesize

        5.6MB

      • memory/640-162-0x0000000002550000-0x0000000002562000-memory.dmp

        Filesize

        72KB

      • memory/640-166-0x0000000002550000-0x0000000002562000-memory.dmp

        Filesize

        72KB

      • memory/640-150-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/640-170-0x0000000002550000-0x0000000002562000-memory.dmp

        Filesize

        72KB

      • memory/640-172-0x0000000002550000-0x0000000002562000-memory.dmp

        Filesize

        72KB

      • memory/640-174-0x0000000002550000-0x0000000002562000-memory.dmp

        Filesize

        72KB

      • memory/640-176-0x0000000002550000-0x0000000002562000-memory.dmp

        Filesize

        72KB

      • memory/640-178-0x0000000002550000-0x0000000002562000-memory.dmp

        Filesize

        72KB

      • memory/640-180-0x0000000002550000-0x0000000002562000-memory.dmp

        Filesize

        72KB

      • memory/640-181-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/640-182-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/640-183-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/640-184-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/640-186-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/2000-1121-0x0000000000E60000-0x0000000000E92000-memory.dmp

        Filesize

        200KB

      • memory/2000-1123-0x00000000056F0000-0x0000000005700000-memory.dmp

        Filesize

        64KB

      • memory/2000-1122-0x00000000056F0000-0x0000000005700000-memory.dmp

        Filesize

        64KB

      • memory/4840-194-0x0000000002670000-0x00000000026AE000-memory.dmp

        Filesize

        248KB

      • memory/4840-196-0x0000000002670000-0x00000000026AE000-memory.dmp

        Filesize

        248KB

      • memory/4840-198-0x0000000002670000-0x00000000026AE000-memory.dmp

        Filesize

        248KB

      • memory/4840-202-0x0000000002670000-0x00000000026AE000-memory.dmp

        Filesize

        248KB

      • memory/4840-201-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/4840-199-0x00000000007F0000-0x000000000083B000-memory.dmp

        Filesize

        300KB

      • memory/4840-203-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/4840-206-0x0000000002670000-0x00000000026AE000-memory.dmp

        Filesize

        248KB

      • memory/4840-205-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/4840-208-0x0000000002670000-0x00000000026AE000-memory.dmp

        Filesize

        248KB

      • memory/4840-210-0x0000000002670000-0x00000000026AE000-memory.dmp

        Filesize

        248KB

      • memory/4840-212-0x0000000002670000-0x00000000026AE000-memory.dmp

        Filesize

        248KB

      • memory/4840-214-0x0000000002670000-0x00000000026AE000-memory.dmp

        Filesize

        248KB

      • memory/4840-216-0x0000000002670000-0x00000000026AE000-memory.dmp

        Filesize

        248KB

      • memory/4840-220-0x0000000002670000-0x00000000026AE000-memory.dmp

        Filesize

        248KB

      • memory/4840-218-0x0000000002670000-0x00000000026AE000-memory.dmp

        Filesize

        248KB

      • memory/4840-222-0x0000000002670000-0x00000000026AE000-memory.dmp

        Filesize

        248KB

      • memory/4840-224-0x0000000002670000-0x00000000026AE000-memory.dmp

        Filesize

        248KB

      • memory/4840-226-0x0000000002670000-0x00000000026AE000-memory.dmp

        Filesize

        248KB

      • memory/4840-228-0x0000000002670000-0x00000000026AE000-memory.dmp

        Filesize

        248KB

      • memory/4840-1101-0x0000000005500000-0x0000000005B18000-memory.dmp

        Filesize

        6.1MB

      • memory/4840-1102-0x0000000005B20000-0x0000000005C2A000-memory.dmp

        Filesize

        1.0MB

      • memory/4840-1103-0x00000000028C0000-0x00000000028D2000-memory.dmp

        Filesize

        72KB

      • memory/4840-1104-0x0000000004E50000-0x0000000004E8C000-memory.dmp

        Filesize

        240KB

      • memory/4840-1105-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/4840-1106-0x0000000005E10000-0x0000000005EA2000-memory.dmp

        Filesize

        584KB

      • memory/4840-1107-0x0000000005EB0000-0x0000000005F16000-memory.dmp

        Filesize

        408KB

      • memory/4840-1108-0x00000000065B0000-0x0000000006626000-memory.dmp

        Filesize

        472KB

      • memory/4840-1109-0x0000000006640000-0x0000000006690000-memory.dmp

        Filesize

        320KB

      • memory/4840-1111-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/4840-1112-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/4840-192-0x0000000002670000-0x00000000026AE000-memory.dmp

        Filesize

        248KB

      • memory/4840-191-0x0000000002670000-0x00000000026AE000-memory.dmp

        Filesize

        248KB

      • memory/4840-1113-0x0000000004F40000-0x0000000004F50000-memory.dmp

        Filesize

        64KB

      • memory/4840-1114-0x0000000007BE0000-0x0000000007DA2000-memory.dmp

        Filesize

        1.8MB

      • memory/4840-1115-0x0000000007DB0000-0x00000000082DC000-memory.dmp

        Filesize

        5.2MB