Analysis

  • max time kernel
    50s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27-03-2023 16:05

General

  • Target

    76583c1f9002d79b3b5009e8ba1e0f1cc82941756f1fe742069abd89ce55be72.exe

  • Size

    700KB

  • MD5

    70858320a154b629eecdda5e0bbf99d4

  • SHA1

    693db7e8fac2f28a36329500d0eddbb9151a31bc

  • SHA256

    76583c1f9002d79b3b5009e8ba1e0f1cc82941756f1fe742069abd89ce55be72

  • SHA512

    f8363cb39cea6196edf3907e8c55017c467fa2b3f240a5fa5e102f75a1bec5fe6cc53cf9e560a802fab9b83433ec55cd763fe83eb149f7bc76d4186e6a985dd2

  • SSDEEP

    12288:HMrDy90tsQ8nmBuq+IAyqTI1uSRret7BKUMCIQgBRv1GchO2VsH:0y0sjmTXTQuRqt7BKtCvgcchPVsH

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\76583c1f9002d79b3b5009e8ba1e0f1cc82941756f1fe742069abd89ce55be72.exe
    "C:\Users\Admin\AppData\Local\Temp\76583c1f9002d79b3b5009e8ba1e0f1cc82941756f1fe742069abd89ce55be72.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1780
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un320871.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un320871.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2296
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1233.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1233.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2420
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1956.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1956.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3088
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si605079.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si605079.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4264

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si605079.exe

    Filesize

    175KB

    MD5

    123b0e749c2b05dcb98aed37e12595be

    SHA1

    72e9f5ba5ee22588a3fd1956acfb1cf9139b6c44

    SHA256

    6d745976e279c4f9b5b02ce723f9be3c169683db25e07848c6113be9a2ed7659

    SHA512

    3b35b42013e17562bd89eec700f709275c1c49f3a4c7ddf5764e3618c83ac34ad118fa25a8cf51d5b111d8a5a67633ae80beb9eb2cb629dbd0c8ad29eccac2f8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si605079.exe

    Filesize

    175KB

    MD5

    123b0e749c2b05dcb98aed37e12595be

    SHA1

    72e9f5ba5ee22588a3fd1956acfb1cf9139b6c44

    SHA256

    6d745976e279c4f9b5b02ce723f9be3c169683db25e07848c6113be9a2ed7659

    SHA512

    3b35b42013e17562bd89eec700f709275c1c49f3a4c7ddf5764e3618c83ac34ad118fa25a8cf51d5b111d8a5a67633ae80beb9eb2cb629dbd0c8ad29eccac2f8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un320871.exe

    Filesize

    558KB

    MD5

    521ce4353ae007c0c26cc3593eec6339

    SHA1

    83f39191e5fc27318c92cadc2be22edbe2a12bdf

    SHA256

    cce14fe6de5a5aa8481bb83b87427aee7a71586e0694171e4aee123e067d30e4

    SHA512

    3c50673134e8142fdf3f7f4a8f3cafea2a9895f94ca81ae4d8d2c01d09731df5f28af9de30abb12da8558d86e0e9e3c30804946f0b4e553c20153ac228216fa6

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un320871.exe

    Filesize

    558KB

    MD5

    521ce4353ae007c0c26cc3593eec6339

    SHA1

    83f39191e5fc27318c92cadc2be22edbe2a12bdf

    SHA256

    cce14fe6de5a5aa8481bb83b87427aee7a71586e0694171e4aee123e067d30e4

    SHA512

    3c50673134e8142fdf3f7f4a8f3cafea2a9895f94ca81ae4d8d2c01d09731df5f28af9de30abb12da8558d86e0e9e3c30804946f0b4e553c20153ac228216fa6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1233.exe

    Filesize

    308KB

    MD5

    39dfc85845faa700ecf01c7e6f81d8f5

    SHA1

    d68f53a539418419ae9a5e459a3129d47a5c42f8

    SHA256

    846ff4de580aa551e497f2a91aa9c9a4e4411f093bad3773a35efc18b55d72b7

    SHA512

    c5587db8f27b73970da6f81b7905ec1a8babe01c87d1ce4f73bdcd1f1e3953e3caf77be697da96dff9af76bbddd617c04d3ed158fb0fd08dea9535ad331416e4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro1233.exe

    Filesize

    308KB

    MD5

    39dfc85845faa700ecf01c7e6f81d8f5

    SHA1

    d68f53a539418419ae9a5e459a3129d47a5c42f8

    SHA256

    846ff4de580aa551e497f2a91aa9c9a4e4411f093bad3773a35efc18b55d72b7

    SHA512

    c5587db8f27b73970da6f81b7905ec1a8babe01c87d1ce4f73bdcd1f1e3953e3caf77be697da96dff9af76bbddd617c04d3ed158fb0fd08dea9535ad331416e4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1956.exe

    Filesize

    366KB

    MD5

    065e84dcc0b268db8581b44a7748dcac

    SHA1

    7c7f30520c588592c476ed0ff98ce364ff589f04

    SHA256

    fc00dc9c58a519f2230e9558be29d0126d8b36d283751e26433e01536d270f03

    SHA512

    b21546559408f1b8d2837fe3534d47fd30818e570c1c16dc0f55c731ec27a58f4b0a7f142c74e5ca884357750f4c507d66f81185f0b0753541e8b89c3634af23

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu1956.exe

    Filesize

    366KB

    MD5

    065e84dcc0b268db8581b44a7748dcac

    SHA1

    7c7f30520c588592c476ed0ff98ce364ff589f04

    SHA256

    fc00dc9c58a519f2230e9558be29d0126d8b36d283751e26433e01536d270f03

    SHA512

    b21546559408f1b8d2837fe3534d47fd30818e570c1c16dc0f55c731ec27a58f4b0a7f142c74e5ca884357750f4c507d66f81185f0b0753541e8b89c3634af23

  • memory/2420-136-0x0000000002550000-0x000000000256A000-memory.dmp

    Filesize

    104KB

  • memory/2420-137-0x0000000004C00000-0x00000000050FE000-memory.dmp

    Filesize

    5.0MB

  • memory/2420-138-0x0000000005140000-0x0000000005158000-memory.dmp

    Filesize

    96KB

  • memory/2420-139-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/2420-140-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/2420-142-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/2420-144-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/2420-148-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/2420-146-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/2420-150-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/2420-153-0x00000000001D0000-0x00000000001FD000-memory.dmp

    Filesize

    180KB

  • memory/2420-155-0x00000000026E0000-0x00000000026F0000-memory.dmp

    Filesize

    64KB

  • memory/2420-152-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/2420-157-0x00000000026E0000-0x00000000026F0000-memory.dmp

    Filesize

    64KB

  • memory/2420-156-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/2420-160-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/2420-159-0x00000000026E0000-0x00000000026F0000-memory.dmp

    Filesize

    64KB

  • memory/2420-162-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/2420-166-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/2420-168-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/2420-170-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/2420-164-0x0000000005140000-0x0000000005152000-memory.dmp

    Filesize

    72KB

  • memory/2420-171-0x0000000000400000-0x0000000000710000-memory.dmp

    Filesize

    3.1MB

  • memory/2420-173-0x0000000000400000-0x0000000000710000-memory.dmp

    Filesize

    3.1MB

  • memory/2420-174-0x00000000026E0000-0x00000000026F0000-memory.dmp

    Filesize

    64KB

  • memory/2420-175-0x00000000026E0000-0x00000000026F0000-memory.dmp

    Filesize

    64KB

  • memory/3088-180-0x0000000004C00000-0x0000000004C46000-memory.dmp

    Filesize

    280KB

  • memory/3088-181-0x0000000005190000-0x00000000051D4000-memory.dmp

    Filesize

    272KB

  • memory/3088-182-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-183-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-185-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-187-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-189-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-191-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-193-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-195-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-197-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-199-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-201-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-203-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-205-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-207-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-209-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-211-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-213-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-215-0x0000000005190000-0x00000000051CE000-memory.dmp

    Filesize

    248KB

  • memory/3088-219-0x00000000007F0000-0x000000000083B000-memory.dmp

    Filesize

    300KB

  • memory/3088-220-0x0000000004C80000-0x0000000004C90000-memory.dmp

    Filesize

    64KB

  • memory/3088-222-0x0000000004C80000-0x0000000004C90000-memory.dmp

    Filesize

    64KB

  • memory/3088-224-0x0000000004C80000-0x0000000004C90000-memory.dmp

    Filesize

    64KB

  • memory/3088-1092-0x0000000005840000-0x0000000005E46000-memory.dmp

    Filesize

    6.0MB

  • memory/3088-1093-0x00000000052B0000-0x00000000053BA000-memory.dmp

    Filesize

    1.0MB

  • memory/3088-1094-0x00000000053F0000-0x0000000005402000-memory.dmp

    Filesize

    72KB

  • memory/3088-1095-0x0000000005410000-0x000000000544E000-memory.dmp

    Filesize

    248KB

  • memory/3088-1096-0x0000000005560000-0x00000000055AB000-memory.dmp

    Filesize

    300KB

  • memory/3088-1097-0x0000000004C80000-0x0000000004C90000-memory.dmp

    Filesize

    64KB

  • memory/3088-1098-0x00000000056F0000-0x0000000005756000-memory.dmp

    Filesize

    408KB

  • memory/3088-1100-0x00000000063D0000-0x0000000006462000-memory.dmp

    Filesize

    584KB

  • memory/3088-1101-0x0000000004C80000-0x0000000004C90000-memory.dmp

    Filesize

    64KB

  • memory/3088-1102-0x0000000004C80000-0x0000000004C90000-memory.dmp

    Filesize

    64KB

  • memory/3088-1103-0x0000000004C80000-0x0000000004C90000-memory.dmp

    Filesize

    64KB

  • memory/3088-1104-0x0000000006820000-0x00000000069E2000-memory.dmp

    Filesize

    1.8MB

  • memory/3088-1105-0x0000000006A10000-0x0000000006F3C000-memory.dmp

    Filesize

    5.2MB

  • memory/3088-1106-0x00000000081F0000-0x0000000008266000-memory.dmp

    Filesize

    472KB

  • memory/3088-1107-0x0000000008290000-0x00000000082E0000-memory.dmp

    Filesize

    320KB

  • memory/3088-1110-0x0000000004C80000-0x0000000004C90000-memory.dmp

    Filesize

    64KB

  • memory/4264-1114-0x00000000003C0000-0x00000000003F2000-memory.dmp

    Filesize

    200KB

  • memory/4264-1115-0x0000000004C40000-0x0000000004C8B000-memory.dmp

    Filesize

    300KB

  • memory/4264-1116-0x0000000004C90000-0x0000000004CA0000-memory.dmp

    Filesize

    64KB