Analysis

  • max time kernel
    57s
  • max time network
    61s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 15:51

General

  • Target

    ea2b34a66a5cafbec10bec4a602f58e754cfd8331008f7f9e6134b8a23cd1103.exe

  • Size

    700KB

  • MD5

    0759df3330fd841d0828018e1c7b7ad0

  • SHA1

    b4011148794d09202b84ebd6f0919fc8b002e0d0

  • SHA256

    ea2b34a66a5cafbec10bec4a602f58e754cfd8331008f7f9e6134b8a23cd1103

  • SHA512

    0dac49297f6a764959af5cf1b4ae48d36b9fad33503a816e74580acd7baf0103ab986537b08a7f4c07a19a0a59d590d065c2fd67b0b4ee2bb670f2408c2ce7c7

  • SSDEEP

    12288:PMr9y90CTRocufToUF5lAmqXwK717O7KNOiAjBRv7YK+YGT:GyFT/erF3nCZO7uOiAjwKt8

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 21 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea2b34a66a5cafbec10bec4a602f58e754cfd8331008f7f9e6134b8a23cd1103.exe
    "C:\Users\Admin\AppData\Local\Temp\ea2b34a66a5cafbec10bec4a602f58e754cfd8331008f7f9e6134b8a23cd1103.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3712
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un118039.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un118039.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1812
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9558.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9558.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1372
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7154.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7154.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4164
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si981458.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si981458.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4908

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si981458.exe

    Filesize

    175KB

    MD5

    a858dfd4ee7ee382a39f7dc12893acdc

    SHA1

    9253d99f6860b197ddbe2c5e09bc19a45018b6ba

    SHA256

    b3e35c40a276093203c106a1e1300928a4103f422962504c2653e1d37c31f629

    SHA512

    ce20d58b301866fc353822118c97c5da1cd1384407bef61c039f796c83e0308d5d53282ad33595aa5233bdd80e3283ff967012142653901e5b2d06e2f09cad3b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si981458.exe

    Filesize

    175KB

    MD5

    a858dfd4ee7ee382a39f7dc12893acdc

    SHA1

    9253d99f6860b197ddbe2c5e09bc19a45018b6ba

    SHA256

    b3e35c40a276093203c106a1e1300928a4103f422962504c2653e1d37c31f629

    SHA512

    ce20d58b301866fc353822118c97c5da1cd1384407bef61c039f796c83e0308d5d53282ad33595aa5233bdd80e3283ff967012142653901e5b2d06e2f09cad3b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un118039.exe

    Filesize

    558KB

    MD5

    acb0757b60edb43c155d4e80090d9fb3

    SHA1

    2acb15ed4d839cd2cd05be4e0e9d98b03ebf0c0f

    SHA256

    b5c598a8db474c38e3c571be5a7ec8e6fee81245ea59c3aba839739fca370673

    SHA512

    b5922fa6b8af0f28a0a87f0b5fc3fa3c80d0a2db009756546bcbb50aa411be919baf66e26293085478b5dce535576e4f4c1be205e1a23e609604f8ea87de35ba

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un118039.exe

    Filesize

    558KB

    MD5

    acb0757b60edb43c155d4e80090d9fb3

    SHA1

    2acb15ed4d839cd2cd05be4e0e9d98b03ebf0c0f

    SHA256

    b5c598a8db474c38e3c571be5a7ec8e6fee81245ea59c3aba839739fca370673

    SHA512

    b5922fa6b8af0f28a0a87f0b5fc3fa3c80d0a2db009756546bcbb50aa411be919baf66e26293085478b5dce535576e4f4c1be205e1a23e609604f8ea87de35ba

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9558.exe

    Filesize

    308KB

    MD5

    26b6cde7959f64c3458ebddfe1f3825b

    SHA1

    e23ee21193f58250a08da5686080009f538f6070

    SHA256

    5de9ca974f2d617af789454a2498df2e12a7ee2fdfa9888933d81dd1fdd5dab1

    SHA512

    f1940d67b8ad19f3216db75f83a57a6183ca5abf379f1979803e45417f617efb96391dc08369b35f33d58751c19f40f24fc1618170ce2f7d73362249ba48c469

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro9558.exe

    Filesize

    308KB

    MD5

    26b6cde7959f64c3458ebddfe1f3825b

    SHA1

    e23ee21193f58250a08da5686080009f538f6070

    SHA256

    5de9ca974f2d617af789454a2498df2e12a7ee2fdfa9888933d81dd1fdd5dab1

    SHA512

    f1940d67b8ad19f3216db75f83a57a6183ca5abf379f1979803e45417f617efb96391dc08369b35f33d58751c19f40f24fc1618170ce2f7d73362249ba48c469

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7154.exe

    Filesize

    366KB

    MD5

    54cc65e578ed6a3add9f6b552cb40370

    SHA1

    3c01c10a049282cae3a27bd336e1dc8c3757fb57

    SHA256

    7b3860a0e8c27f08aa0644fead5be1cccc7fd3ad3e965698f0d38aa2ea0ac7a4

    SHA512

    8a266d8b9b3287e22848fbc843a6f241a83cfe4480177b95837073710521473ae45bf9c25cce1cc6474bf4be2b44a00050fb599d8e1a5c4c8897e82a8b346717

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu7154.exe

    Filesize

    366KB

    MD5

    54cc65e578ed6a3add9f6b552cb40370

    SHA1

    3c01c10a049282cae3a27bd336e1dc8c3757fb57

    SHA256

    7b3860a0e8c27f08aa0644fead5be1cccc7fd3ad3e965698f0d38aa2ea0ac7a4

    SHA512

    8a266d8b9b3287e22848fbc843a6f241a83cfe4480177b95837073710521473ae45bf9c25cce1cc6474bf4be2b44a00050fb599d8e1a5c4c8897e82a8b346717

  • memory/1372-131-0x0000000000A30000-0x0000000000A4A000-memory.dmp

    Filesize

    104KB

  • memory/1372-132-0x0000000004DB0000-0x00000000052AE000-memory.dmp

    Filesize

    5.0MB

  • memory/1372-133-0x00000000025A0000-0x00000000025B8000-memory.dmp

    Filesize

    96KB

  • memory/1372-134-0x00000000008E0000-0x000000000090D000-memory.dmp

    Filesize

    180KB

  • memory/1372-135-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/1372-136-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/1372-137-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/1372-138-0x00000000025A0000-0x00000000025B2000-memory.dmp

    Filesize

    72KB

  • memory/1372-139-0x00000000025A0000-0x00000000025B2000-memory.dmp

    Filesize

    72KB

  • memory/1372-141-0x00000000025A0000-0x00000000025B2000-memory.dmp

    Filesize

    72KB

  • memory/1372-143-0x00000000025A0000-0x00000000025B2000-memory.dmp

    Filesize

    72KB

  • memory/1372-145-0x00000000025A0000-0x00000000025B2000-memory.dmp

    Filesize

    72KB

  • memory/1372-147-0x00000000025A0000-0x00000000025B2000-memory.dmp

    Filesize

    72KB

  • memory/1372-149-0x00000000025A0000-0x00000000025B2000-memory.dmp

    Filesize

    72KB

  • memory/1372-151-0x00000000025A0000-0x00000000025B2000-memory.dmp

    Filesize

    72KB

  • memory/1372-155-0x00000000025A0000-0x00000000025B2000-memory.dmp

    Filesize

    72KB

  • memory/1372-153-0x00000000025A0000-0x00000000025B2000-memory.dmp

    Filesize

    72KB

  • memory/1372-157-0x00000000025A0000-0x00000000025B2000-memory.dmp

    Filesize

    72KB

  • memory/1372-159-0x00000000025A0000-0x00000000025B2000-memory.dmp

    Filesize

    72KB

  • memory/1372-161-0x00000000025A0000-0x00000000025B2000-memory.dmp

    Filesize

    72KB

  • memory/1372-163-0x00000000025A0000-0x00000000025B2000-memory.dmp

    Filesize

    72KB

  • memory/1372-165-0x00000000025A0000-0x00000000025B2000-memory.dmp

    Filesize

    72KB

  • memory/1372-166-0x0000000000400000-0x0000000000710000-memory.dmp

    Filesize

    3.1MB

  • memory/1372-167-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/1372-168-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/1372-169-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

    Filesize

    64KB

  • memory/1372-171-0x0000000000400000-0x0000000000710000-memory.dmp

    Filesize

    3.1MB

  • memory/4164-176-0x0000000002500000-0x0000000002546000-memory.dmp

    Filesize

    280KB

  • memory/4164-177-0x00000000051C0000-0x0000000005204000-memory.dmp

    Filesize

    272KB

  • memory/4164-179-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/4164-178-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/4164-181-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/4164-183-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/4164-185-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/4164-187-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/4164-189-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/4164-191-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/4164-193-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/4164-195-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/4164-197-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/4164-201-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/4164-203-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/4164-199-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/4164-205-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/4164-207-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/4164-209-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/4164-212-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/4164-211-0x00000000051C0000-0x00000000051FE000-memory.dmp

    Filesize

    248KB

  • memory/4164-216-0x0000000002580000-0x0000000002590000-memory.dmp

    Filesize

    64KB

  • memory/4164-218-0x0000000002580000-0x0000000002590000-memory.dmp

    Filesize

    64KB

  • memory/4164-214-0x0000000002580000-0x0000000002590000-memory.dmp

    Filesize

    64KB

  • memory/4164-1088-0x0000000005980000-0x0000000005F86000-memory.dmp

    Filesize

    6.0MB

  • memory/4164-1089-0x00000000053F0000-0x00000000054FA000-memory.dmp

    Filesize

    1.0MB

  • memory/4164-1090-0x0000000005530000-0x0000000005542000-memory.dmp

    Filesize

    72KB

  • memory/4164-1091-0x0000000002580000-0x0000000002590000-memory.dmp

    Filesize

    64KB

  • memory/4164-1092-0x0000000005550000-0x000000000558E000-memory.dmp

    Filesize

    248KB

  • memory/4164-1093-0x00000000056A0000-0x00000000056EB000-memory.dmp

    Filesize

    300KB

  • memory/4164-1094-0x0000000005830000-0x00000000058C2000-memory.dmp

    Filesize

    584KB

  • memory/4164-1095-0x00000000058D0000-0x0000000005936000-memory.dmp

    Filesize

    408KB

  • memory/4164-1096-0x00000000065E0000-0x00000000067A2000-memory.dmp

    Filesize

    1.8MB

  • memory/4164-1098-0x00000000067B0000-0x0000000006CDC000-memory.dmp

    Filesize

    5.2MB

  • memory/4164-1099-0x0000000002580000-0x0000000002590000-memory.dmp

    Filesize

    64KB

  • memory/4164-1100-0x0000000002580000-0x0000000002590000-memory.dmp

    Filesize

    64KB

  • memory/4164-1101-0x0000000002580000-0x0000000002590000-memory.dmp

    Filesize

    64KB

  • memory/4164-1102-0x0000000007070000-0x00000000070E6000-memory.dmp

    Filesize

    472KB

  • memory/4164-1103-0x00000000070F0000-0x0000000007140000-memory.dmp

    Filesize

    320KB

  • memory/4164-1104-0x0000000002580000-0x0000000002590000-memory.dmp

    Filesize

    64KB

  • memory/4908-1110-0x00000000001A0000-0x00000000001D2000-memory.dmp

    Filesize

    200KB

  • memory/4908-1111-0x0000000004BE0000-0x0000000004C2B000-memory.dmp

    Filesize

    300KB

  • memory/4908-1112-0x0000000004DD0000-0x0000000004DE0000-memory.dmp

    Filesize

    64KB