Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 16:42

General

  • Target

    45e72fa68831c41f1a7a5edf32bacd2221e69979213b6ea0f6537c0f941e6f22.exe

  • Size

    700KB

  • MD5

    913c44c77c9bc83b7faba6334e5d2c66

  • SHA1

    dd3b6f32bd43a865ce18665efe9c26f81d70b5e3

  • SHA256

    45e72fa68831c41f1a7a5edf32bacd2221e69979213b6ea0f6537c0f941e6f22

  • SHA512

    7c3446a3c2b98918ee71aa4fba297cce0f05b036107e963e10348cba4d1483f0155a68b825f209be32596f365c7a0fcbdff9e13623e4ec0be2e69793ae8851a0

  • SSDEEP

    12288:WMrHy90yP75gFPq63LyDpeXA/qaeeXsuj/IL83EIMHjTBRvJ7GcEh0hRNH:xy95eFDXWftgL80xjT3dhRNH

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 3 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\45e72fa68831c41f1a7a5edf32bacd2221e69979213b6ea0f6537c0f941e6f22.exe
    "C:\Users\Admin\AppData\Local\Temp\45e72fa68831c41f1a7a5edf32bacd2221e69979213b6ea0f6537c0f941e6f22.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un189504.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un189504.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4808
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5921.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5921.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4324
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4324 -s 1092
          4⤵
          • Program crash
          PID:4424
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0890.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0890.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:1564
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4324 -ip 4324
    1⤵
      PID:2560

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un189504.exe

      Filesize

      558KB

      MD5

      b403ad178859c5b759a1ba8b7092742f

      SHA1

      0be48aa08617301aa9426090b5fe3f3f525d60c9

      SHA256

      5184b6975ffbf42b6e34d614b069bb903a600057dad7c9c1bacad755a8ddaa33

      SHA512

      0bd33483f208399f4fe8e14e0ca36692964315077bc46c721a8423b4927810a83a04ad0233f7a74271a01051817ac1e70d3060536ea21cdd044a545ff3a80217

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un189504.exe

      Filesize

      558KB

      MD5

      b403ad178859c5b759a1ba8b7092742f

      SHA1

      0be48aa08617301aa9426090b5fe3f3f525d60c9

      SHA256

      5184b6975ffbf42b6e34d614b069bb903a600057dad7c9c1bacad755a8ddaa33

      SHA512

      0bd33483f208399f4fe8e14e0ca36692964315077bc46c721a8423b4927810a83a04ad0233f7a74271a01051817ac1e70d3060536ea21cdd044a545ff3a80217

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5921.exe

      Filesize

      308KB

      MD5

      30db79ca6eb76f177e88ca8062e7b256

      SHA1

      193033ad97734d3c8b81eb13290e8bec3f588a58

      SHA256

      62a3402016e74bf3734a6cabfcd8a599ff45f2f115a989a94ae979d586aa6607

      SHA512

      8e9ae91837e24f0f46971848d627f134c4400336961a7beca97ef574e6412b0ecdda987f627aa95d0826da105722c3e1bdc4600ba80f445dd6f76c2d4a6c8165

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro5921.exe

      Filesize

      308KB

      MD5

      30db79ca6eb76f177e88ca8062e7b256

      SHA1

      193033ad97734d3c8b81eb13290e8bec3f588a58

      SHA256

      62a3402016e74bf3734a6cabfcd8a599ff45f2f115a989a94ae979d586aa6607

      SHA512

      8e9ae91837e24f0f46971848d627f134c4400336961a7beca97ef574e6412b0ecdda987f627aa95d0826da105722c3e1bdc4600ba80f445dd6f76c2d4a6c8165

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0890.exe

      Filesize

      366KB

      MD5

      c745ac6d1937ec34a26e57215c8c502a

      SHA1

      61709863226370af838210150846f70720625a53

      SHA256

      7f3c712cde14a46aad7bcabaf09ffe0e57f8147df8bd245a70e85e8afdd9e1bd

      SHA512

      63d3193a52d3bb898d7909ef0ccac02ba18b5f901515ddff9c3c36e9ff83630e3d1d69fa4d2595dffda8200271a7ddef3018cfea562202c65a299b52e1d81f10

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu0890.exe

      Filesize

      366KB

      MD5

      c745ac6d1937ec34a26e57215c8c502a

      SHA1

      61709863226370af838210150846f70720625a53

      SHA256

      7f3c712cde14a46aad7bcabaf09ffe0e57f8147df8bd245a70e85e8afdd9e1bd

      SHA512

      63d3193a52d3bb898d7909ef0ccac02ba18b5f901515ddff9c3c36e9ff83630e3d1d69fa4d2595dffda8200271a7ddef3018cfea562202c65a299b52e1d81f10

    • memory/1564-215-0x0000000004C00000-0x0000000004C3E000-memory.dmp

      Filesize

      248KB

    • memory/1564-219-0x0000000004C00000-0x0000000004C3E000-memory.dmp

      Filesize

      248KB

    • memory/1564-1109-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/1564-1108-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/1564-195-0x0000000004C00000-0x0000000004C3E000-memory.dmp

      Filesize

      248KB

    • memory/1564-1106-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/1564-1104-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/1564-1103-0x0000000005B20000-0x0000000005B5C000-memory.dmp

      Filesize

      240KB

    • memory/1564-1102-0x0000000005B00000-0x0000000005B12000-memory.dmp

      Filesize

      72KB

    • memory/1564-1101-0x00000000059C0000-0x0000000005ACA000-memory.dmp

      Filesize

      1.0MB

    • memory/1564-1100-0x0000000005330000-0x0000000005948000-memory.dmp

      Filesize

      6.1MB

    • memory/1564-227-0x0000000004C00000-0x0000000004C3E000-memory.dmp

      Filesize

      248KB

    • memory/1564-225-0x0000000004C00000-0x0000000004C3E000-memory.dmp

      Filesize

      248KB

    • memory/1564-223-0x0000000004C00000-0x0000000004C3E000-memory.dmp

      Filesize

      248KB

    • memory/1564-221-0x0000000004C00000-0x0000000004C3E000-memory.dmp

      Filesize

      248KB

    • memory/1564-217-0x0000000004C00000-0x0000000004C3E000-memory.dmp

      Filesize

      248KB

    • memory/1564-213-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/1564-197-0x0000000004C00000-0x0000000004C3E000-memory.dmp

      Filesize

      248KB

    • memory/1564-211-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/1564-209-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/1564-208-0x00000000007F0000-0x000000000083B000-memory.dmp

      Filesize

      300KB

    • memory/1564-207-0x0000000004C00000-0x0000000004C3E000-memory.dmp

      Filesize

      248KB

    • memory/1564-193-0x0000000004C00000-0x0000000004C3E000-memory.dmp

      Filesize

      248KB

    • memory/1564-205-0x0000000004C00000-0x0000000004C3E000-memory.dmp

      Filesize

      248KB

    • memory/1564-190-0x0000000004C00000-0x0000000004C3E000-memory.dmp

      Filesize

      248KB

    • memory/1564-191-0x0000000004C00000-0x0000000004C3E000-memory.dmp

      Filesize

      248KB

    • memory/1564-203-0x0000000004C00000-0x0000000004C3E000-memory.dmp

      Filesize

      248KB

    • memory/1564-1107-0x0000000004C70000-0x0000000004C80000-memory.dmp

      Filesize

      64KB

    • memory/1564-212-0x0000000004C00000-0x0000000004C3E000-memory.dmp

      Filesize

      248KB

    • memory/1564-199-0x0000000004C00000-0x0000000004C3E000-memory.dmp

      Filesize

      248KB

    • memory/1564-201-0x0000000004C00000-0x0000000004C3E000-memory.dmp

      Filesize

      248KB

    • memory/4324-183-0x0000000004E80000-0x0000000004E90000-memory.dmp

      Filesize

      64KB

    • memory/4324-155-0x0000000002670000-0x0000000002682000-memory.dmp

      Filesize

      72KB

    • memory/4324-185-0x0000000000400000-0x0000000000710000-memory.dmp

      Filesize

      3.1MB

    • memory/4324-173-0x0000000002670000-0x0000000002682000-memory.dmp

      Filesize

      72KB

    • memory/4324-182-0x0000000004E80000-0x0000000004E90000-memory.dmp

      Filesize

      64KB

    • memory/4324-181-0x0000000004E80000-0x0000000004E90000-memory.dmp

      Filesize

      64KB

    • memory/4324-171-0x0000000002670000-0x0000000002682000-memory.dmp

      Filesize

      72KB

    • memory/4324-179-0x0000000002670000-0x0000000002682000-memory.dmp

      Filesize

      72KB

    • memory/4324-148-0x0000000004E90000-0x0000000005434000-memory.dmp

      Filesize

      5.6MB

    • memory/4324-177-0x0000000002670000-0x0000000002682000-memory.dmp

      Filesize

      72KB

    • memory/4324-152-0x0000000002670000-0x0000000002682000-memory.dmp

      Filesize

      72KB

    • memory/4324-175-0x0000000002670000-0x0000000002682000-memory.dmp

      Filesize

      72KB

    • memory/4324-169-0x0000000002670000-0x0000000002682000-memory.dmp

      Filesize

      72KB

    • memory/4324-180-0x0000000000400000-0x0000000000710000-memory.dmp

      Filesize

      3.1MB

    • memory/4324-151-0x0000000004E80000-0x0000000004E90000-memory.dmp

      Filesize

      64KB

    • memory/4324-167-0x0000000002670000-0x0000000002682000-memory.dmp

      Filesize

      72KB

    • memory/4324-165-0x0000000002670000-0x0000000002682000-memory.dmp

      Filesize

      72KB

    • memory/4324-163-0x0000000002670000-0x0000000002682000-memory.dmp

      Filesize

      72KB

    • memory/4324-161-0x0000000002670000-0x0000000002682000-memory.dmp

      Filesize

      72KB

    • memory/4324-159-0x0000000002670000-0x0000000002682000-memory.dmp

      Filesize

      72KB

    • memory/4324-157-0x0000000002670000-0x0000000002682000-memory.dmp

      Filesize

      72KB

    • memory/4324-149-0x00000000007E0000-0x000000000080D000-memory.dmp

      Filesize

      180KB

    • memory/4324-153-0x0000000002670000-0x0000000002682000-memory.dmp

      Filesize

      72KB

    • memory/4324-150-0x0000000004E80000-0x0000000004E90000-memory.dmp

      Filesize

      64KB