Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 16:37

General

  • Target

    cf5e865ed5562b06f9379261eeb1a03777ab750ae027f9b24331285ca1d703c0.exe

  • Size

    700KB

  • MD5

    960e70f2fc9f1d96d9fff7112204cf19

  • SHA1

    d9b37954335e38fc380400ba2c556bce907c7eab

  • SHA256

    cf5e865ed5562b06f9379261eeb1a03777ab750ae027f9b24331285ca1d703c0

  • SHA512

    c4edfbeafd93e9505359da380a436c9d6e871ee6ec901f6ccf3f6bef52cee69df7ba34cdc0f2577c0a0cadae92b3b83f882b5b8ed650f63957d49a82132f468c

  • SSDEEP

    12288:fMr2y90krjXZk3T5oLZFr+pa4unSO7X20afJBRvZKAjOGy:py3fQ5c88z7ifJFOD

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf5e865ed5562b06f9379261eeb1a03777ab750ae027f9b24331285ca1d703c0.exe
    "C:\Users\Admin\AppData\Local\Temp\cf5e865ed5562b06f9379261eeb1a03777ab750ae027f9b24331285ca1d703c0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un811237.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un811237.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1596
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7286.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7286.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1984
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 1088
          4⤵
          • Program crash
          PID:5104
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6762.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6762.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1104
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1984 -ip 1984
    1⤵
      PID:4100

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un811237.exe

      Filesize

      558KB

      MD5

      800d3d8601475ea9862c4e10d7f03751

      SHA1

      234af468c7581b1c901783445554c5c14726abfc

      SHA256

      7a7fa820f811fc622dbf303bc07111105f6dcedaf1eae40e0801c796e06c3196

      SHA512

      b62bf008b52e1a449a6360a62d604219e696e7a4e49a3c2bf7a48b7c6713b47fd967bd235f216b2c25ee1e83156fb575078b8698202cfd1f5e971346d3543bbb

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un811237.exe

      Filesize

      558KB

      MD5

      800d3d8601475ea9862c4e10d7f03751

      SHA1

      234af468c7581b1c901783445554c5c14726abfc

      SHA256

      7a7fa820f811fc622dbf303bc07111105f6dcedaf1eae40e0801c796e06c3196

      SHA512

      b62bf008b52e1a449a6360a62d604219e696e7a4e49a3c2bf7a48b7c6713b47fd967bd235f216b2c25ee1e83156fb575078b8698202cfd1f5e971346d3543bbb

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7286.exe

      Filesize

      308KB

      MD5

      13b4e0a321e2062d73e7b6f4f42b29e8

      SHA1

      234812f0a239ae777d09d01873208be68f0e8fcd

      SHA256

      f0fb8c31caab3ca580568855be68fa92d2af2034faef33365fce6c4d1800991a

      SHA512

      7d6c024b2da84a34646222e0c8f49465938095e64d23b1114d7dc57fe9c6f246198383d60e1a1db537b440c328ee3030d9fcffddaf28862610de4ddf38376cf5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7286.exe

      Filesize

      308KB

      MD5

      13b4e0a321e2062d73e7b6f4f42b29e8

      SHA1

      234812f0a239ae777d09d01873208be68f0e8fcd

      SHA256

      f0fb8c31caab3ca580568855be68fa92d2af2034faef33365fce6c4d1800991a

      SHA512

      7d6c024b2da84a34646222e0c8f49465938095e64d23b1114d7dc57fe9c6f246198383d60e1a1db537b440c328ee3030d9fcffddaf28862610de4ddf38376cf5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6762.exe

      Filesize

      366KB

      MD5

      ddbaa62506f235f09ba2fb4fc7ab0fff

      SHA1

      9cba03ec0c725a5ce40d60a5ec75cc1535d2bcaa

      SHA256

      601029b0360c2167799f36cfe03e06b8afce13615fbe4ca1da1153c271e6c09f

      SHA512

      1cfd43bd9c5b03269b2bcb11a8350a27c3f2d8a664762cb88f13ce70729e54c6d62a277b0fb51a1ea72af5e37d59fa15d952a750e9f753e2e56ba65249948ba5

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu6762.exe

      Filesize

      366KB

      MD5

      ddbaa62506f235f09ba2fb4fc7ab0fff

      SHA1

      9cba03ec0c725a5ce40d60a5ec75cc1535d2bcaa

      SHA256

      601029b0360c2167799f36cfe03e06b8afce13615fbe4ca1da1153c271e6c09f

      SHA512

      1cfd43bd9c5b03269b2bcb11a8350a27c3f2d8a664762cb88f13ce70729e54c6d62a277b0fb51a1ea72af5e37d59fa15d952a750e9f753e2e56ba65249948ba5

    • memory/1104-219-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/1104-218-0x0000000004D60000-0x0000000004D70000-memory.dmp

      Filesize

      64KB

    • memory/1104-1109-0x0000000004D60000-0x0000000004D70000-memory.dmp

      Filesize

      64KB

    • memory/1104-1108-0x0000000004D60000-0x0000000004D70000-memory.dmp

      Filesize

      64KB

    • memory/1104-195-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/1104-1106-0x0000000004D60000-0x0000000004D70000-memory.dmp

      Filesize

      64KB

    • memory/1104-1104-0x0000000004D60000-0x0000000004D70000-memory.dmp

      Filesize

      64KB

    • memory/1104-1103-0x0000000005B50000-0x0000000005B8C000-memory.dmp

      Filesize

      240KB

    • memory/1104-1102-0x0000000004D10000-0x0000000004D22000-memory.dmp

      Filesize

      72KB

    • memory/1104-1101-0x0000000005A40000-0x0000000005B4A000-memory.dmp

      Filesize

      1.0MB

    • memory/1104-1100-0x0000000005420000-0x0000000005A38000-memory.dmp

      Filesize

      6.1MB

    • memory/1104-227-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/1104-225-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/1104-221-0x0000000004D60000-0x0000000004D70000-memory.dmp

      Filesize

      64KB

    • memory/1104-223-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/1104-220-0x0000000004D60000-0x0000000004D70000-memory.dmp

      Filesize

      64KB

    • memory/1104-216-0x0000000000830000-0x000000000087B000-memory.dmp

      Filesize

      300KB

    • memory/1104-197-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/1104-213-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/1104-211-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/1104-209-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/1104-207-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/1104-193-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/1104-205-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/1104-190-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/1104-191-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/1104-203-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/1104-1107-0x0000000004D60000-0x0000000004D70000-memory.dmp

      Filesize

      64KB

    • memory/1104-215-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/1104-199-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/1104-201-0x0000000002790000-0x00000000027CE000-memory.dmp

      Filesize

      248KB

    • memory/1984-184-0x0000000004F70000-0x0000000004F80000-memory.dmp

      Filesize

      64KB

    • memory/1984-157-0x0000000002960000-0x0000000002972000-memory.dmp

      Filesize

      72KB

    • memory/1984-185-0x0000000000400000-0x0000000000710000-memory.dmp

      Filesize

      3.1MB

    • memory/1984-173-0x0000000002960000-0x0000000002972000-memory.dmp

      Filesize

      72KB

    • memory/1984-183-0x0000000004F70000-0x0000000004F80000-memory.dmp

      Filesize

      64KB

    • memory/1984-182-0x0000000004F70000-0x0000000004F80000-memory.dmp

      Filesize

      64KB

    • memory/1984-171-0x0000000002960000-0x0000000002972000-memory.dmp

      Filesize

      72KB

    • memory/1984-179-0x0000000002960000-0x0000000002972000-memory.dmp

      Filesize

      72KB

    • memory/1984-148-0x0000000000710000-0x000000000073D000-memory.dmp

      Filesize

      180KB

    • memory/1984-177-0x0000000002960000-0x0000000002972000-memory.dmp

      Filesize

      72KB

    • memory/1984-153-0x0000000002960000-0x0000000002972000-memory.dmp

      Filesize

      72KB

    • memory/1984-175-0x0000000002960000-0x0000000002972000-memory.dmp

      Filesize

      72KB

    • memory/1984-169-0x0000000002960000-0x0000000002972000-memory.dmp

      Filesize

      72KB

    • memory/1984-180-0x0000000000400000-0x0000000000710000-memory.dmp

      Filesize

      3.1MB

    • memory/1984-150-0x0000000002960000-0x0000000002972000-memory.dmp

      Filesize

      72KB

    • memory/1984-166-0x0000000004F70000-0x0000000004F80000-memory.dmp

      Filesize

      64KB

    • memory/1984-167-0x0000000002960000-0x0000000002972000-memory.dmp

      Filesize

      72KB

    • memory/1984-163-0x0000000002960000-0x0000000002972000-memory.dmp

      Filesize

      72KB

    • memory/1984-164-0x0000000004F70000-0x0000000004F80000-memory.dmp

      Filesize

      64KB

    • memory/1984-161-0x0000000002960000-0x0000000002972000-memory.dmp

      Filesize

      72KB

    • memory/1984-159-0x0000000002960000-0x0000000002972000-memory.dmp

      Filesize

      72KB

    • memory/1984-149-0x0000000004F80000-0x0000000005524000-memory.dmp

      Filesize

      5.6MB

    • memory/1984-155-0x0000000002960000-0x0000000002972000-memory.dmp

      Filesize

      72KB

    • memory/1984-151-0x0000000002960000-0x0000000002972000-memory.dmp

      Filesize

      72KB