Analysis

  • max time kernel
    85s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 15:32

General

  • Target

    7d0d4029404cdf0d0f5bbc8e89583c04273c9327fdfc7609dfc88218db305ebd.exe

  • Size

    701KB

  • MD5

    1daef88f752fac26eba4037075b90294

  • SHA1

    40f6384c96ea60467bb24b6453e932de6ad9fdaa

  • SHA256

    7d0d4029404cdf0d0f5bbc8e89583c04273c9327fdfc7609dfc88218db305ebd

  • SHA512

    3d72b95529159bd3d4f68db1dfe1129970dc6319240b767079b28b7c7228da3f5f0a1f9b06b824fda85afea6ce2fd0b4d3e2c7c9ccba1b9cf646bd955bd1c8f5

  • SSDEEP

    12288:aMrLy90Hercq9xx+HyfpWVWrykQ1PdCCTLZuVWuwNewF1zbBRvrP86kCbI6+:xyGeOScgVnWZN7Dzb3rkW+

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d0d4029404cdf0d0f5bbc8e89583c04273c9327fdfc7609dfc88218db305ebd.exe
    "C:\Users\Admin\AppData\Local\Temp\7d0d4029404cdf0d0f5bbc8e89583c04273c9327fdfc7609dfc88218db305ebd.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4416
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un761664.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un761664.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:896
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6335.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6335.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2176
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 1084
          4⤵
          • Program crash
          PID:3056
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8646.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8646.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3584
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 1484
          4⤵
          • Program crash
          PID:3104
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si161009.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si161009.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1332
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2176 -ip 2176
    1⤵
      PID:5116
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 3584 -ip 3584
      1⤵
        PID:3680

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si161009.exe

        Filesize

        175KB

        MD5

        ed662f4b728aed8bd763b87e1d599748

        SHA1

        090521832789aead88b149b1369ebcd7f4abbc04

        SHA256

        cd5ab39caaf6475dd2aeef19233d983d0c905d5fbed4f381bf19fc3491ffb87a

        SHA512

        11c9e5c684bdf807f9a9ff12a46f986934ca20becb9ebb340fc768864bbd36d54ed4d49edef900c6c3b052f01b3bfc4952a625e6259f9f79ac1e720fcf911aaa

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si161009.exe

        Filesize

        175KB

        MD5

        ed662f4b728aed8bd763b87e1d599748

        SHA1

        090521832789aead88b149b1369ebcd7f4abbc04

        SHA256

        cd5ab39caaf6475dd2aeef19233d983d0c905d5fbed4f381bf19fc3491ffb87a

        SHA512

        11c9e5c684bdf807f9a9ff12a46f986934ca20becb9ebb340fc768864bbd36d54ed4d49edef900c6c3b052f01b3bfc4952a625e6259f9f79ac1e720fcf911aaa

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un761664.exe

        Filesize

        558KB

        MD5

        7e611c6090d6ff61fc5ebce1721d4f32

        SHA1

        9698043e6a72cdfb9994479f1fb7eab736b68bcd

        SHA256

        e2302ded0d277c94e376c774b9af8fb6634e171647f54fea9e30c6a72fc9fb3d

        SHA512

        2209e733f298aad66f75b9faf86df74f2d1e8c8aab45d5ca86cb1d4457a753981553d9611594e0c2b25ccffc0b50027f039079dae9a6255df156a327b711e69c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un761664.exe

        Filesize

        558KB

        MD5

        7e611c6090d6ff61fc5ebce1721d4f32

        SHA1

        9698043e6a72cdfb9994479f1fb7eab736b68bcd

        SHA256

        e2302ded0d277c94e376c774b9af8fb6634e171647f54fea9e30c6a72fc9fb3d

        SHA512

        2209e733f298aad66f75b9faf86df74f2d1e8c8aab45d5ca86cb1d4457a753981553d9611594e0c2b25ccffc0b50027f039079dae9a6255df156a327b711e69c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6335.exe

        Filesize

        308KB

        MD5

        007f766d9eeef7aceb071081b05d5263

        SHA1

        e880ec2eacbbab1f5f19f233514ec458b21b147e

        SHA256

        d85836cb9e7e6e001b6165e6fae90d6ec20ffdce8e745efe83aa610bc7fbcba4

        SHA512

        9471c4fb7f0b915c49e9bb9b5f1170a9ecfd49231dfeb67b27281e047e107831cccb3b978b587990cb2749f99669809cf2607ae0dba021bf7e789874fcf296a0

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro6335.exe

        Filesize

        308KB

        MD5

        007f766d9eeef7aceb071081b05d5263

        SHA1

        e880ec2eacbbab1f5f19f233514ec458b21b147e

        SHA256

        d85836cb9e7e6e001b6165e6fae90d6ec20ffdce8e745efe83aa610bc7fbcba4

        SHA512

        9471c4fb7f0b915c49e9bb9b5f1170a9ecfd49231dfeb67b27281e047e107831cccb3b978b587990cb2749f99669809cf2607ae0dba021bf7e789874fcf296a0

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8646.exe

        Filesize

        366KB

        MD5

        d3f6bcc6fe5beb8a8f42288e7cf43304

        SHA1

        23eb989319634c23c881d3458e0b7a3b94f8dd50

        SHA256

        0db86ecea444327109c0b1596c4676ed0ef73490a67005e6b0ce514729ab03ef

        SHA512

        2f7c7ef9ecee1a1725ef6950d70c2011aea06bba284ef36a9b4c4f8426338c47099fca6c8ff510f929611f6778fd942a479e29c59945e63b7040cc7a8c90a6bc

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu8646.exe

        Filesize

        366KB

        MD5

        d3f6bcc6fe5beb8a8f42288e7cf43304

        SHA1

        23eb989319634c23c881d3458e0b7a3b94f8dd50

        SHA256

        0db86ecea444327109c0b1596c4676ed0ef73490a67005e6b0ce514729ab03ef

        SHA512

        2f7c7ef9ecee1a1725ef6950d70c2011aea06bba284ef36a9b4c4f8426338c47099fca6c8ff510f929611f6778fd942a479e29c59945e63b7040cc7a8c90a6bc

      • memory/1332-1121-0x0000000000560000-0x0000000000592000-memory.dmp

        Filesize

        200KB

      • memory/1332-1122-0x0000000004EB0000-0x0000000004EC0000-memory.dmp

        Filesize

        64KB

      • memory/2176-156-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/2176-166-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/2176-149-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/2176-152-0x00000000026F0000-0x0000000002700000-memory.dmp

        Filesize

        64KB

      • memory/2176-153-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/2176-154-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/2176-150-0x00000000026F0000-0x0000000002700000-memory.dmp

        Filesize

        64KB

      • memory/2176-158-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/2176-160-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/2176-162-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/2176-164-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/2176-151-0x00000000026F0000-0x0000000002700000-memory.dmp

        Filesize

        64KB

      • memory/2176-168-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/2176-170-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/2176-172-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/2176-174-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/2176-176-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/2176-178-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/2176-180-0x0000000002720000-0x0000000002732000-memory.dmp

        Filesize

        72KB

      • memory/2176-181-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/2176-182-0x00000000026F0000-0x0000000002700000-memory.dmp

        Filesize

        64KB

      • memory/2176-183-0x00000000026F0000-0x0000000002700000-memory.dmp

        Filesize

        64KB

      • memory/2176-185-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/2176-148-0x0000000004DE0000-0x0000000005384000-memory.dmp

        Filesize

        5.6MB

      • memory/3584-191-0x0000000004D20000-0x0000000004D5E000-memory.dmp

        Filesize

        248KB

      • memory/3584-225-0x0000000004D20000-0x0000000004D5E000-memory.dmp

        Filesize

        248KB

      • memory/3584-195-0x0000000004D20000-0x0000000004D5E000-memory.dmp

        Filesize

        248KB

      • memory/3584-197-0x0000000004D20000-0x0000000004D5E000-memory.dmp

        Filesize

        248KB

      • memory/3584-199-0x0000000004D20000-0x0000000004D5E000-memory.dmp

        Filesize

        248KB

      • memory/3584-201-0x0000000004D20000-0x0000000004D5E000-memory.dmp

        Filesize

        248KB

      • memory/3584-203-0x0000000004D20000-0x0000000004D5E000-memory.dmp

        Filesize

        248KB

      • memory/3584-206-0x00000000007F0000-0x000000000083B000-memory.dmp

        Filesize

        300KB

      • memory/3584-205-0x0000000004D20000-0x0000000004D5E000-memory.dmp

        Filesize

        248KB

      • memory/3584-209-0x0000000004D20000-0x0000000004D5E000-memory.dmp

        Filesize

        248KB

      • memory/3584-207-0x0000000004D90000-0x0000000004DA0000-memory.dmp

        Filesize

        64KB

      • memory/3584-210-0x0000000004D90000-0x0000000004DA0000-memory.dmp

        Filesize

        64KB

      • memory/3584-212-0x0000000004D90000-0x0000000004DA0000-memory.dmp

        Filesize

        64KB

      • memory/3584-213-0x0000000004D20000-0x0000000004D5E000-memory.dmp

        Filesize

        248KB

      • memory/3584-215-0x0000000004D20000-0x0000000004D5E000-memory.dmp

        Filesize

        248KB

      • memory/3584-217-0x0000000004D20000-0x0000000004D5E000-memory.dmp

        Filesize

        248KB

      • memory/3584-219-0x0000000004D20000-0x0000000004D5E000-memory.dmp

        Filesize

        248KB

      • memory/3584-221-0x0000000004D20000-0x0000000004D5E000-memory.dmp

        Filesize

        248KB

      • memory/3584-223-0x0000000004D20000-0x0000000004D5E000-memory.dmp

        Filesize

        248KB

      • memory/3584-193-0x0000000004D20000-0x0000000004D5E000-memory.dmp

        Filesize

        248KB

      • memory/3584-227-0x0000000004D20000-0x0000000004D5E000-memory.dmp

        Filesize

        248KB

      • memory/3584-1100-0x0000000005490000-0x0000000005AA8000-memory.dmp

        Filesize

        6.1MB

      • memory/3584-1101-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/3584-1102-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/3584-1103-0x0000000005D60000-0x0000000005D9C000-memory.dmp

        Filesize

        240KB

      • memory/3584-1104-0x0000000004D90000-0x0000000004DA0000-memory.dmp

        Filesize

        64KB

      • memory/3584-1105-0x0000000005F50000-0x0000000005FE2000-memory.dmp

        Filesize

        584KB

      • memory/3584-1106-0x0000000005FF0000-0x0000000006056000-memory.dmp

        Filesize

        408KB

      • memory/3584-1107-0x0000000006710000-0x0000000006786000-memory.dmp

        Filesize

        472KB

      • memory/3584-1108-0x0000000006790000-0x00000000067E0000-memory.dmp

        Filesize

        320KB

      • memory/3584-1110-0x0000000004D90000-0x0000000004DA0000-memory.dmp

        Filesize

        64KB

      • memory/3584-1111-0x0000000004D90000-0x0000000004DA0000-memory.dmp

        Filesize

        64KB

      • memory/3584-1112-0x0000000004D90000-0x0000000004DA0000-memory.dmp

        Filesize

        64KB

      • memory/3584-190-0x0000000004D20000-0x0000000004D5E000-memory.dmp

        Filesize

        248KB

      • memory/3584-1113-0x0000000006900000-0x0000000006AC2000-memory.dmp

        Filesize

        1.8MB

      • memory/3584-1114-0x0000000006AE0000-0x000000000700C000-memory.dmp

        Filesize

        5.2MB

      • memory/3584-1116-0x0000000004D90000-0x0000000004DA0000-memory.dmp

        Filesize

        64KB