Analysis

  • max time kernel
    91s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 15:31

General

  • Target

    e4a941ca2373966075f471e803bd16906eaea27f443458aa01bb235b304403fc.exe

  • Size

    695KB

  • MD5

    4dc730b1237b797e97f4b402a98696c9

  • SHA1

    ea1f7a59005671334ea05c5d5bf790efbcb4b273

  • SHA256

    e4a941ca2373966075f471e803bd16906eaea27f443458aa01bb235b304403fc

  • SHA512

    1bc42090b6fd73313bcf3ff98428fd30a99b3f73a4514f2faa50df1201b3309ecb69ed0e5478c5ed51ea62b8e4a5dbfefa7143aeaa15f7659b39d51f7ccfd93e

  • SSDEEP

    12288:PMr5y90zEG7gdNVdPABMcFRG5G+eEIoW/yHH9N9H8qBRAAn4qAK:eymJ9MKG5GWWq9TH8q34w

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e4a941ca2373966075f471e803bd16906eaea27f443458aa01bb235b304403fc.exe
    "C:\Users\Admin\AppData\Local\Temp\e4a941ca2373966075f471e803bd16906eaea27f443458aa01bb235b304403fc.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1020
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un698126.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un698126.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4872
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4105.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4105.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4544
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4544 -s 1088
          4⤵
          • Program crash
          PID:1432
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4081.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4081.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1108
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1108 -s 1820
          4⤵
          • Program crash
          PID:636
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si124345.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si124345.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1248
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4544 -ip 4544
    1⤵
      PID:3460
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 1108 -ip 1108
      1⤵
        PID:4388

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si124345.exe

        Filesize

        175KB

        MD5

        6ad65f0cfdeb90cc95c5e312100d1ac6

        SHA1

        3ba0fc118b9f0a5a7d2df544b4e7e6214e7e8242

        SHA256

        91299cb0afc308475131a45f6e812ca839b6eceadd7ca7b96d207541d4756923

        SHA512

        2bc37e4e3ab381fa64477f92e86ffafb52ff2e90e824a779cabd0b6dfa8b2620e90fc08b5965631242ada9f03918a462426a658f354c82890c1611561c2ced33

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si124345.exe

        Filesize

        175KB

        MD5

        6ad65f0cfdeb90cc95c5e312100d1ac6

        SHA1

        3ba0fc118b9f0a5a7d2df544b4e7e6214e7e8242

        SHA256

        91299cb0afc308475131a45f6e812ca839b6eceadd7ca7b96d207541d4756923

        SHA512

        2bc37e4e3ab381fa64477f92e86ffafb52ff2e90e824a779cabd0b6dfa8b2620e90fc08b5965631242ada9f03918a462426a658f354c82890c1611561c2ced33

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un698126.exe

        Filesize

        553KB

        MD5

        5701e076df9aa96546118eaf5398121a

        SHA1

        6545933f7c0d54b9c2b16006a2ed2e047fde7593

        SHA256

        9c3f4652ab0b2ba97bd0549d3315e447e05c24a6a209db3601acda0e81239304

        SHA512

        ae5aea17c1ab9c00688d82e219e523aa165f6a9e1097510adc26184613b9c679508c073359f0b46cd80f9ae894c318c7d0f68f09ca8b52bd2b292312437435c6

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un698126.exe

        Filesize

        553KB

        MD5

        5701e076df9aa96546118eaf5398121a

        SHA1

        6545933f7c0d54b9c2b16006a2ed2e047fde7593

        SHA256

        9c3f4652ab0b2ba97bd0549d3315e447e05c24a6a209db3601acda0e81239304

        SHA512

        ae5aea17c1ab9c00688d82e219e523aa165f6a9e1097510adc26184613b9c679508c073359f0b46cd80f9ae894c318c7d0f68f09ca8b52bd2b292312437435c6

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4105.exe

        Filesize

        292KB

        MD5

        9c6154c8e20e175d4dee607b9b8e59ae

        SHA1

        437328721dbbbf19c1960f56450becc9264139fc

        SHA256

        e5b9866b502afeca5a02a2355b32009bd5a496f892aeae9a6307590e5bb061a7

        SHA512

        bad766b7919e5a1f51cd33006956fc9d941e58e82306fb1043158ac1f138e3f16b456b2004b93d5b3a07bc4578ecab1c1b7c8aa835796aecc172de8f6d8b8cb4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro4105.exe

        Filesize

        292KB

        MD5

        9c6154c8e20e175d4dee607b9b8e59ae

        SHA1

        437328721dbbbf19c1960f56450becc9264139fc

        SHA256

        e5b9866b502afeca5a02a2355b32009bd5a496f892aeae9a6307590e5bb061a7

        SHA512

        bad766b7919e5a1f51cd33006956fc9d941e58e82306fb1043158ac1f138e3f16b456b2004b93d5b3a07bc4578ecab1c1b7c8aa835796aecc172de8f6d8b8cb4

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4081.exe

        Filesize

        366KB

        MD5

        3e88c5b4166135391274443012da2134

        SHA1

        a69cfa9e1b315507b7c2b088bc979065bdf3427b

        SHA256

        7f6c784673307a06fc55ae846928da3e7f55315b74c18840328a24dd462d098e

        SHA512

        b2b8a8042f7b02f41e091669431228181715302549eb058544640fc6b6eef41bb73f36bd28adb903579350075650484a327fdafb4f7070847b2dafceae1a3f9b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4081.exe

        Filesize

        366KB

        MD5

        3e88c5b4166135391274443012da2134

        SHA1

        a69cfa9e1b315507b7c2b088bc979065bdf3427b

        SHA256

        7f6c784673307a06fc55ae846928da3e7f55315b74c18840328a24dd462d098e

        SHA512

        b2b8a8042f7b02f41e091669431228181715302549eb058544640fc6b6eef41bb73f36bd28adb903579350075650484a327fdafb4f7070847b2dafceae1a3f9b

      • memory/1108-1102-0x0000000005AC0000-0x0000000005BCA000-memory.dmp

        Filesize

        1.0MB

      • memory/1108-1101-0x0000000005420000-0x0000000005A38000-memory.dmp

        Filesize

        6.1MB

      • memory/1108-216-0x00000000053B0000-0x00000000053EE000-memory.dmp

        Filesize

        248KB

      • memory/1108-214-0x00000000053B0000-0x00000000053EE000-memory.dmp

        Filesize

        248KB

      • memory/1108-201-0x0000000002770000-0x0000000002780000-memory.dmp

        Filesize

        64KB

      • memory/1108-202-0x00000000053B0000-0x00000000053EE000-memory.dmp

        Filesize

        248KB

      • memory/1108-1115-0x0000000006990000-0x0000000006EBC000-memory.dmp

        Filesize

        5.2MB

      • memory/1108-1114-0x00000000067C0000-0x0000000006982000-memory.dmp

        Filesize

        1.8MB

      • memory/1108-1113-0x0000000006740000-0x0000000006790000-memory.dmp

        Filesize

        320KB

      • memory/1108-1112-0x00000000066B0000-0x0000000006726000-memory.dmp

        Filesize

        472KB

      • memory/1108-204-0x00000000053B0000-0x00000000053EE000-memory.dmp

        Filesize

        248KB

      • memory/1108-1111-0x0000000002770000-0x0000000002780000-memory.dmp

        Filesize

        64KB

      • memory/1108-1110-0x0000000002770000-0x0000000002780000-memory.dmp

        Filesize

        64KB

      • memory/1108-1109-0x0000000002770000-0x0000000002780000-memory.dmp

        Filesize

        64KB

      • memory/1108-1107-0x0000000005FB0000-0x0000000006016000-memory.dmp

        Filesize

        408KB

      • memory/1108-1106-0x0000000005F10000-0x0000000005FA2000-memory.dmp

        Filesize

        584KB

      • memory/1108-1105-0x0000000002770000-0x0000000002780000-memory.dmp

        Filesize

        64KB

      • memory/1108-1104-0x0000000005C20000-0x0000000005C5C000-memory.dmp

        Filesize

        240KB

      • memory/1108-1103-0x0000000005C00000-0x0000000005C12000-memory.dmp

        Filesize

        72KB

      • memory/1108-218-0x00000000053B0000-0x00000000053EE000-memory.dmp

        Filesize

        248KB

      • memory/1108-228-0x00000000053B0000-0x00000000053EE000-memory.dmp

        Filesize

        248KB

      • memory/1108-226-0x00000000053B0000-0x00000000053EE000-memory.dmp

        Filesize

        248KB

      • memory/1108-224-0x00000000053B0000-0x00000000053EE000-memory.dmp

        Filesize

        248KB

      • memory/1108-191-0x00000000053B0000-0x00000000053EE000-memory.dmp

        Filesize

        248KB

      • memory/1108-192-0x00000000053B0000-0x00000000053EE000-memory.dmp

        Filesize

        248KB

      • memory/1108-194-0x0000000002130000-0x000000000217B000-memory.dmp

        Filesize

        300KB

      • memory/1108-195-0x00000000053B0000-0x00000000053EE000-memory.dmp

        Filesize

        248KB

      • memory/1108-198-0x00000000053B0000-0x00000000053EE000-memory.dmp

        Filesize

        248KB

      • memory/1108-197-0x0000000002770000-0x0000000002780000-memory.dmp

        Filesize

        64KB

      • memory/1108-199-0x0000000002770000-0x0000000002780000-memory.dmp

        Filesize

        64KB

      • memory/1108-222-0x00000000053B0000-0x00000000053EE000-memory.dmp

        Filesize

        248KB

      • memory/1108-1116-0x0000000002770000-0x0000000002780000-memory.dmp

        Filesize

        64KB

      • memory/1108-220-0x00000000053B0000-0x00000000053EE000-memory.dmp

        Filesize

        248KB

      • memory/1108-206-0x00000000053B0000-0x00000000053EE000-memory.dmp

        Filesize

        248KB

      • memory/1108-208-0x00000000053B0000-0x00000000053EE000-memory.dmp

        Filesize

        248KB

      • memory/1108-210-0x00000000053B0000-0x00000000053EE000-memory.dmp

        Filesize

        248KB

      • memory/1108-212-0x00000000053B0000-0x00000000053EE000-memory.dmp

        Filesize

        248KB

      • memory/1248-1122-0x0000000000680000-0x00000000006B2000-memory.dmp

        Filesize

        200KB

      • memory/1248-1123-0x00000000052F0000-0x0000000005300000-memory.dmp

        Filesize

        64KB

      • memory/4544-181-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/4544-170-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/4544-148-0x0000000000810000-0x000000000083D000-memory.dmp

        Filesize

        180KB

      • memory/4544-151-0x00000000024A0000-0x00000000024B0000-memory.dmp

        Filesize

        64KB

      • memory/4544-152-0x00000000024A0000-0x00000000024B0000-memory.dmp

        Filesize

        64KB

      • memory/4544-186-0x0000000000400000-0x000000000070C000-memory.dmp

        Filesize

        3.0MB

      • memory/4544-184-0x00000000024A0000-0x00000000024B0000-memory.dmp

        Filesize

        64KB

      • memory/4544-150-0x0000000004DA0000-0x0000000005344000-memory.dmp

        Filesize

        5.6MB

      • memory/4544-183-0x00000000024A0000-0x00000000024B0000-memory.dmp

        Filesize

        64KB

      • memory/4544-182-0x00000000024A0000-0x00000000024B0000-memory.dmp

        Filesize

        64KB

      • memory/4544-153-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/4544-180-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/4544-178-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/4544-176-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/4544-174-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/4544-172-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/4544-168-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/4544-166-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/4544-162-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/4544-164-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/4544-160-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/4544-149-0x00000000024A0000-0x00000000024B0000-memory.dmp

        Filesize

        64KB

      • memory/4544-158-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/4544-156-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB

      • memory/4544-154-0x00000000026D0000-0x00000000026E2000-memory.dmp

        Filesize

        72KB