Analysis

  • max time kernel
    102s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 15:53

General

  • Target

    bc9c22f8279e0d144271267623d7a075efec8356614be5881ab9688e3394c1df.exe

  • Size

    700KB

  • MD5

    6e3a072561b4d9204576b9a8f362ac5b

  • SHA1

    fc373910a191a7789110e72e03c465e4180cc9ab

  • SHA256

    bc9c22f8279e0d144271267623d7a075efec8356614be5881ab9688e3394c1df

  • SHA512

    8f4ede90f691bae8c7a213b1fc0e621d9aa5fb5be6df864f87d9d2687db31dc8ee2fe2d950eebc38c987b1f7f227c3a147a63b55d0993cdbb4c8d317ef7740a6

  • SSDEEP

    12288:KMr9y90/Wvg83QiFTAfAv2LYXeugMBhyZDSfjkayacXo1P/BRvgNllOm9xPmd8GQ:HyUg7P4ho8GfjkqP/sjlOm9xOd2

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bc9c22f8279e0d144271267623d7a075efec8356614be5881ab9688e3394c1df.exe
    "C:\Users\Admin\AppData\Local\Temp\bc9c22f8279e0d144271267623d7a075efec8356614be5881ab9688e3394c1df.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5056
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un813008.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un813008.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1448
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7389.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7389.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1168
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 1084
          4⤵
          • Program crash
          PID:1308
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4984.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4984.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4464
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4464 -s 1188
          4⤵
          • Program crash
          PID:2268
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si359753.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si359753.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3044
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 364 -p 1168 -ip 1168
    1⤵
      PID:5096
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 396 -p 4464 -ip 4464
      1⤵
        PID:1552

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si359753.exe

        Filesize

        175KB

        MD5

        bf46024197b62c690cbca48b9f83a480

        SHA1

        caf704c7b7257017eb3ee477d949f74e06bcdd37

        SHA256

        20435357eaadbbd00b6ae609e3154a5a2d5a11354315877da58ceadbc46ade34

        SHA512

        5edb0922782589a21657dc4e4ba47acef880afbe707125a7a63e5d872c78f79830dc1f0c5b3e63501bdfa64643d9d1e4adf8ed642b1030b96223cf5074a60ed1

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si359753.exe

        Filesize

        175KB

        MD5

        bf46024197b62c690cbca48b9f83a480

        SHA1

        caf704c7b7257017eb3ee477d949f74e06bcdd37

        SHA256

        20435357eaadbbd00b6ae609e3154a5a2d5a11354315877da58ceadbc46ade34

        SHA512

        5edb0922782589a21657dc4e4ba47acef880afbe707125a7a63e5d872c78f79830dc1f0c5b3e63501bdfa64643d9d1e4adf8ed642b1030b96223cf5074a60ed1

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un813008.exe

        Filesize

        558KB

        MD5

        c45f0705790c47366b9382e92a5d4ff7

        SHA1

        de0c380351eec47acdebe643004349e179ddd46b

        SHA256

        1c17b3390655254ac9d610c44bac0c442847b247d0a96219c36d9610dd426ef6

        SHA512

        72272ae029d095697a1ebf31dcf387a225c4f78bc2a2987a3e631fea79102881f5a8b410cd5a2146b9b6fee6328828043333f74ba8b7e4e4e5cc00a7ba45bffd

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un813008.exe

        Filesize

        558KB

        MD5

        c45f0705790c47366b9382e92a5d4ff7

        SHA1

        de0c380351eec47acdebe643004349e179ddd46b

        SHA256

        1c17b3390655254ac9d610c44bac0c442847b247d0a96219c36d9610dd426ef6

        SHA512

        72272ae029d095697a1ebf31dcf387a225c4f78bc2a2987a3e631fea79102881f5a8b410cd5a2146b9b6fee6328828043333f74ba8b7e4e4e5cc00a7ba45bffd

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7389.exe

        Filesize

        308KB

        MD5

        d7279cb7544215d0e93a38b7486246fb

        SHA1

        910acd0a8f45d5b9c452027cf50edd68ab4037fb

        SHA256

        0d327c980d4353b62584bf2eeeb590807eff158af1180de0229541f3619f1575

        SHA512

        3cce7e6197ad2842073515caf4a1777b05137bfca33e965b3b9982a7baddee5f3d14fea7ab773e40be2aa9f386a3021c77ceac27616ae96902798c4c9bda1b2b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7389.exe

        Filesize

        308KB

        MD5

        d7279cb7544215d0e93a38b7486246fb

        SHA1

        910acd0a8f45d5b9c452027cf50edd68ab4037fb

        SHA256

        0d327c980d4353b62584bf2eeeb590807eff158af1180de0229541f3619f1575

        SHA512

        3cce7e6197ad2842073515caf4a1777b05137bfca33e965b3b9982a7baddee5f3d14fea7ab773e40be2aa9f386a3021c77ceac27616ae96902798c4c9bda1b2b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4984.exe

        Filesize

        366KB

        MD5

        dc46a47c91baef44cf971a44d5d59964

        SHA1

        3446cb77244e55d61841d5d1144e95f961fad06e

        SHA256

        797ec23ed0edcb289cf034947f87ff97d015170a04a449555dbfcb5a49084375

        SHA512

        da7598352bc1958d7882c5574caa373f485f1e1d0df76e6a60a63e5205b6354a1e8ca2e0e41a2ef8856b46fbc7450de4bfe515fd8c37254c24dd21a2ae0d2690

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu4984.exe

        Filesize

        366KB

        MD5

        dc46a47c91baef44cf971a44d5d59964

        SHA1

        3446cb77244e55d61841d5d1144e95f961fad06e

        SHA256

        797ec23ed0edcb289cf034947f87ff97d015170a04a449555dbfcb5a49084375

        SHA512

        da7598352bc1958d7882c5574caa373f485f1e1d0df76e6a60a63e5205b6354a1e8ca2e0e41a2ef8856b46fbc7450de4bfe515fd8c37254c24dd21a2ae0d2690

      • memory/1168-148-0x0000000004EB0000-0x0000000005454000-memory.dmp

        Filesize

        5.6MB

      • memory/1168-149-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/1168-151-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

        Filesize

        64KB

      • memory/1168-150-0x0000000002680000-0x0000000002692000-memory.dmp

        Filesize

        72KB

      • memory/1168-153-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

        Filesize

        64KB

      • memory/1168-152-0x0000000002680000-0x0000000002692000-memory.dmp

        Filesize

        72KB

      • memory/1168-156-0x0000000002680000-0x0000000002692000-memory.dmp

        Filesize

        72KB

      • memory/1168-158-0x0000000002680000-0x0000000002692000-memory.dmp

        Filesize

        72KB

      • memory/1168-155-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

        Filesize

        64KB

      • memory/1168-160-0x0000000002680000-0x0000000002692000-memory.dmp

        Filesize

        72KB

      • memory/1168-162-0x0000000002680000-0x0000000002692000-memory.dmp

        Filesize

        72KB

      • memory/1168-164-0x0000000002680000-0x0000000002692000-memory.dmp

        Filesize

        72KB

      • memory/1168-166-0x0000000002680000-0x0000000002692000-memory.dmp

        Filesize

        72KB

      • memory/1168-168-0x0000000002680000-0x0000000002692000-memory.dmp

        Filesize

        72KB

      • memory/1168-170-0x0000000002680000-0x0000000002692000-memory.dmp

        Filesize

        72KB

      • memory/1168-172-0x0000000002680000-0x0000000002692000-memory.dmp

        Filesize

        72KB

      • memory/1168-174-0x0000000002680000-0x0000000002692000-memory.dmp

        Filesize

        72KB

      • memory/1168-176-0x0000000002680000-0x0000000002692000-memory.dmp

        Filesize

        72KB

      • memory/1168-178-0x0000000002680000-0x0000000002692000-memory.dmp

        Filesize

        72KB

      • memory/1168-180-0x0000000002680000-0x0000000002692000-memory.dmp

        Filesize

        72KB

      • memory/1168-181-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/1168-182-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

        Filesize

        64KB

      • memory/1168-183-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

        Filesize

        64KB

      • memory/1168-184-0x0000000004EA0000-0x0000000004EB0000-memory.dmp

        Filesize

        64KB

      • memory/1168-186-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/3044-1123-0x00000000056A0000-0x00000000056B0000-memory.dmp

        Filesize

        64KB

      • memory/3044-1122-0x0000000000DF0000-0x0000000000E22000-memory.dmp

        Filesize

        200KB

      • memory/4464-196-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4464-228-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4464-198-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4464-200-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4464-202-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4464-204-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4464-206-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4464-208-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4464-211-0x00000000007F0000-0x000000000083B000-memory.dmp

        Filesize

        300KB

      • memory/4464-214-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4464-213-0x0000000004D50000-0x0000000004D60000-memory.dmp

        Filesize

        64KB

      • memory/4464-215-0x0000000004D50000-0x0000000004D60000-memory.dmp

        Filesize

        64KB

      • memory/4464-210-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4464-218-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4464-220-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4464-217-0x0000000004D50000-0x0000000004D60000-memory.dmp

        Filesize

        64KB

      • memory/4464-222-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4464-224-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4464-226-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4464-194-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4464-1101-0x0000000005320000-0x0000000005938000-memory.dmp

        Filesize

        6.1MB

      • memory/4464-1102-0x00000000059C0000-0x0000000005ACA000-memory.dmp

        Filesize

        1.0MB

      • memory/4464-1103-0x0000000005B00000-0x0000000005B12000-memory.dmp

        Filesize

        72KB

      • memory/4464-1104-0x0000000005B20000-0x0000000005B5C000-memory.dmp

        Filesize

        240KB

      • memory/4464-1105-0x0000000004D50000-0x0000000004D60000-memory.dmp

        Filesize

        64KB

      • memory/4464-1106-0x0000000005E10000-0x0000000005EA2000-memory.dmp

        Filesize

        584KB

      • memory/4464-1107-0x0000000005EB0000-0x0000000005F16000-memory.dmp

        Filesize

        408KB

      • memory/4464-1109-0x0000000004D50000-0x0000000004D60000-memory.dmp

        Filesize

        64KB

      • memory/4464-1110-0x0000000004D50000-0x0000000004D60000-memory.dmp

        Filesize

        64KB

      • memory/4464-1111-0x0000000004D50000-0x0000000004D60000-memory.dmp

        Filesize

        64KB

      • memory/4464-1112-0x00000000066D0000-0x0000000006746000-memory.dmp

        Filesize

        472KB

      • memory/4464-1113-0x0000000006760000-0x00000000067B0000-memory.dmp

        Filesize

        320KB

      • memory/4464-1114-0x0000000006910000-0x0000000006AD2000-memory.dmp

        Filesize

        1.8MB

      • memory/4464-192-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4464-191-0x0000000004D00000-0x0000000004D3E000-memory.dmp

        Filesize

        248KB

      • memory/4464-1115-0x0000000006AE0000-0x000000000700C000-memory.dmp

        Filesize

        5.2MB

      • memory/4464-1116-0x0000000004D50000-0x0000000004D60000-memory.dmp

        Filesize

        64KB