Analysis

  • max time kernel
    80s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 16:07

General

  • Target

    90b7fa7c886ce65f5e0f5a1146870d579d344a43395a2f0aeae0a7171a6a7443.exe

  • Size

    701KB

  • MD5

    83f9046c39ae2a70e34e8c1654c496b6

  • SHA1

    e44ae86ef34724a8f3bc12c1aa3e59b9861796ad

  • SHA256

    90b7fa7c886ce65f5e0f5a1146870d579d344a43395a2f0aeae0a7171a6a7443

  • SHA512

    97c63551f19e3ed42b7c8a5ac084470a85e814cb0fff32772552387b5daf64ae18fbf6a11d82b838558e3b284dd26556d4cbe929dea84a3f00312573073b0370

  • SSDEEP

    12288:iMrTy90edMaALDAWEvXfCn6zzyDCFCuaDzSm5701vgcBRv7xXEOYMi4:Jyt34MXfCnYzymF9aDz9YNgcPF79i4

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\90b7fa7c886ce65f5e0f5a1146870d579d344a43395a2f0aeae0a7171a6a7443.exe
    "C:\Users\Admin\AppData\Local\Temp\90b7fa7c886ce65f5e0f5a1146870d579d344a43395a2f0aeae0a7171a6a7443.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4216
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un370749.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un370749.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4648
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7424.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7424.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1964
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 1084
          4⤵
          • Program crash
          PID:848
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5635.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5635.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4436
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4436 -s 1992
          4⤵
          • Program crash
          PID:3816
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si747748.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si747748.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4268
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1964 -ip 1964
    1⤵
      PID:228
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4436 -ip 4436
      1⤵
        PID:1612

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si747748.exe

        Filesize

        175KB

        MD5

        7835ed9696209985d00249d3eafe3574

        SHA1

        d27a4c03a1db60e6fbbabe86abf7319e9153f951

        SHA256

        d4edbe1559ff05ecf7bfa54c79eff91fad00210c746329ab5c323ad671e01d3b

        SHA512

        ba6f144ea5f4761a7c7d04fabc1d88fcc1fc9e0166495bee2aa8455e3171bbd6449b6276b1106003b3a0895db544de4526cd87ae016ba2ec24c7dfb0892ed2db

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si747748.exe

        Filesize

        175KB

        MD5

        7835ed9696209985d00249d3eafe3574

        SHA1

        d27a4c03a1db60e6fbbabe86abf7319e9153f951

        SHA256

        d4edbe1559ff05ecf7bfa54c79eff91fad00210c746329ab5c323ad671e01d3b

        SHA512

        ba6f144ea5f4761a7c7d04fabc1d88fcc1fc9e0166495bee2aa8455e3171bbd6449b6276b1106003b3a0895db544de4526cd87ae016ba2ec24c7dfb0892ed2db

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un370749.exe

        Filesize

        558KB

        MD5

        ee6d6b8c8b9251544b43a32ee096cb69

        SHA1

        0b93a6a4ace67d96c6c25c1bee7d93d53befda99

        SHA256

        37cd96d43133635f2b412e89bd6d4cfbe30315ab49fef8d85c00758228cc713d

        SHA512

        40d1f1656e85b85b8fa5c02413d0c3664cee47e136d470d684702643cbd7408f8a8d732ce06824fd03f7361f5fd5738e544aea0d120ca49cab6db865ada09225

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un370749.exe

        Filesize

        558KB

        MD5

        ee6d6b8c8b9251544b43a32ee096cb69

        SHA1

        0b93a6a4ace67d96c6c25c1bee7d93d53befda99

        SHA256

        37cd96d43133635f2b412e89bd6d4cfbe30315ab49fef8d85c00758228cc713d

        SHA512

        40d1f1656e85b85b8fa5c02413d0c3664cee47e136d470d684702643cbd7408f8a8d732ce06824fd03f7361f5fd5738e544aea0d120ca49cab6db865ada09225

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7424.exe

        Filesize

        308KB

        MD5

        524f142187297c877061222d9329255c

        SHA1

        764d3a29bca15d4e401f6c7b7a8e7eb667d0fdce

        SHA256

        d175b99872a038128e20fd36c0c1ad09d7200a39b849de63be3bc54265289c64

        SHA512

        b91189da76f88734b2fa675515e9db244d0a3a4fbe8a49b15d3a7ef3b09d5e67c565c06601cdc580a3f0ea2fe908daafb92156a3d198e369a2793e08867bdbad

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro7424.exe

        Filesize

        308KB

        MD5

        524f142187297c877061222d9329255c

        SHA1

        764d3a29bca15d4e401f6c7b7a8e7eb667d0fdce

        SHA256

        d175b99872a038128e20fd36c0c1ad09d7200a39b849de63be3bc54265289c64

        SHA512

        b91189da76f88734b2fa675515e9db244d0a3a4fbe8a49b15d3a7ef3b09d5e67c565c06601cdc580a3f0ea2fe908daafb92156a3d198e369a2793e08867bdbad

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5635.exe

        Filesize

        366KB

        MD5

        6c215eb38c0c5acfda7405620bb1882e

        SHA1

        b1b20c836d78fd6747928b8d61c0d65bc50ce27f

        SHA256

        e45005fa550b6ac7d3e517b689e26ca80b477fb0442742cfd838cf464b52819c

        SHA512

        5fcc0c6ee68a6048e0122b23070cc150297b3f1478006522210ff02c424b8a93e05f514baa6143581835abe3371dbe90dee3a6f8114e54e94454be230c6de0fb

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu5635.exe

        Filesize

        366KB

        MD5

        6c215eb38c0c5acfda7405620bb1882e

        SHA1

        b1b20c836d78fd6747928b8d61c0d65bc50ce27f

        SHA256

        e45005fa550b6ac7d3e517b689e26ca80b477fb0442742cfd838cf464b52819c

        SHA512

        5fcc0c6ee68a6048e0122b23070cc150297b3f1478006522210ff02c424b8a93e05f514baa6143581835abe3371dbe90dee3a6f8114e54e94454be230c6de0fb

      • memory/1964-148-0x0000000004EE0000-0x0000000005484000-memory.dmp

        Filesize

        5.6MB

      • memory/1964-149-0x00000000007E0000-0x000000000080D000-memory.dmp

        Filesize

        180KB

      • memory/1964-150-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/1964-151-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/1964-153-0x0000000002770000-0x0000000002782000-memory.dmp

        Filesize

        72KB

      • memory/1964-152-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/1964-154-0x0000000002770000-0x0000000002782000-memory.dmp

        Filesize

        72KB

      • memory/1964-156-0x0000000002770000-0x0000000002782000-memory.dmp

        Filesize

        72KB

      • memory/1964-158-0x0000000002770000-0x0000000002782000-memory.dmp

        Filesize

        72KB

      • memory/1964-160-0x0000000002770000-0x0000000002782000-memory.dmp

        Filesize

        72KB

      • memory/1964-162-0x0000000002770000-0x0000000002782000-memory.dmp

        Filesize

        72KB

      • memory/1964-164-0x0000000002770000-0x0000000002782000-memory.dmp

        Filesize

        72KB

      • memory/1964-166-0x0000000002770000-0x0000000002782000-memory.dmp

        Filesize

        72KB

      • memory/1964-168-0x0000000002770000-0x0000000002782000-memory.dmp

        Filesize

        72KB

      • memory/1964-170-0x0000000002770000-0x0000000002782000-memory.dmp

        Filesize

        72KB

      • memory/1964-172-0x0000000002770000-0x0000000002782000-memory.dmp

        Filesize

        72KB

      • memory/1964-174-0x0000000002770000-0x0000000002782000-memory.dmp

        Filesize

        72KB

      • memory/1964-176-0x0000000002770000-0x0000000002782000-memory.dmp

        Filesize

        72KB

      • memory/1964-178-0x0000000002770000-0x0000000002782000-memory.dmp

        Filesize

        72KB

      • memory/1964-180-0x0000000002770000-0x0000000002782000-memory.dmp

        Filesize

        72KB

      • memory/1964-181-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/1964-182-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/1964-183-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/1964-184-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

        Filesize

        64KB

      • memory/1964-186-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/4268-1122-0x0000000000EB0000-0x0000000000EE2000-memory.dmp

        Filesize

        200KB

      • memory/4268-1123-0x0000000005730000-0x0000000005740000-memory.dmp

        Filesize

        64KB

      • memory/4436-194-0x00000000052A0000-0x00000000052DE000-memory.dmp

        Filesize

        248KB

      • memory/4436-226-0x00000000052A0000-0x00000000052DE000-memory.dmp

        Filesize

        248KB

      • memory/4436-193-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

        Filesize

        64KB

      • memory/4436-197-0x00000000052A0000-0x00000000052DE000-memory.dmp

        Filesize

        248KB

      • memory/4436-198-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

        Filesize

        64KB

      • memory/4436-196-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

        Filesize

        64KB

      • memory/4436-200-0x00000000052A0000-0x00000000052DE000-memory.dmp

        Filesize

        248KB

      • memory/4436-202-0x00000000052A0000-0x00000000052DE000-memory.dmp

        Filesize

        248KB

      • memory/4436-204-0x00000000052A0000-0x00000000052DE000-memory.dmp

        Filesize

        248KB

      • memory/4436-206-0x00000000052A0000-0x00000000052DE000-memory.dmp

        Filesize

        248KB

      • memory/4436-208-0x00000000052A0000-0x00000000052DE000-memory.dmp

        Filesize

        248KB

      • memory/4436-210-0x00000000052A0000-0x00000000052DE000-memory.dmp

        Filesize

        248KB

      • memory/4436-212-0x00000000052A0000-0x00000000052DE000-memory.dmp

        Filesize

        248KB

      • memory/4436-214-0x00000000052A0000-0x00000000052DE000-memory.dmp

        Filesize

        248KB

      • memory/4436-216-0x00000000052A0000-0x00000000052DE000-memory.dmp

        Filesize

        248KB

      • memory/4436-218-0x00000000052A0000-0x00000000052DE000-memory.dmp

        Filesize

        248KB

      • memory/4436-220-0x00000000052A0000-0x00000000052DE000-memory.dmp

        Filesize

        248KB

      • memory/4436-222-0x00000000052A0000-0x00000000052DE000-memory.dmp

        Filesize

        248KB

      • memory/4436-224-0x00000000052A0000-0x00000000052DE000-memory.dmp

        Filesize

        248KB

      • memory/4436-192-0x00000000052A0000-0x00000000052DE000-memory.dmp

        Filesize

        248KB

      • memory/4436-228-0x00000000052A0000-0x00000000052DE000-memory.dmp

        Filesize

        248KB

      • memory/4436-1101-0x0000000005460000-0x0000000005A78000-memory.dmp

        Filesize

        6.1MB

      • memory/4436-1102-0x0000000005B00000-0x0000000005C0A000-memory.dmp

        Filesize

        1.0MB

      • memory/4436-1103-0x0000000005C40000-0x0000000005C52000-memory.dmp

        Filesize

        72KB

      • memory/4436-1104-0x0000000005C60000-0x0000000005C9C000-memory.dmp

        Filesize

        240KB

      • memory/4436-1105-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

        Filesize

        64KB

      • memory/4436-1106-0x0000000005F50000-0x0000000005FB6000-memory.dmp

        Filesize

        408KB

      • memory/4436-1107-0x0000000006610000-0x00000000066A2000-memory.dmp

        Filesize

        584KB

      • memory/4436-1109-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

        Filesize

        64KB

      • memory/4436-1110-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

        Filesize

        64KB

      • memory/4436-1111-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

        Filesize

        64KB

      • memory/4436-1112-0x0000000006950000-0x00000000069C6000-memory.dmp

        Filesize

        472KB

      • memory/4436-1113-0x00000000069E0000-0x0000000006A30000-memory.dmp

        Filesize

        320KB

      • memory/4436-191-0x0000000000820000-0x000000000086B000-memory.dmp

        Filesize

        300KB

      • memory/4436-1114-0x0000000006A40000-0x0000000006C02000-memory.dmp

        Filesize

        1.8MB

      • memory/4436-1115-0x0000000006C20000-0x000000000714C000-memory.dmp

        Filesize

        5.2MB

      • memory/4436-1116-0x0000000004CE0000-0x0000000004CF0000-memory.dmp

        Filesize

        64KB