Analysis

  • max time kernel
    132s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 16:12

General

  • Target

    5627e6b8b5d82eccc45e5c80399823baa8592639b7ec45013abf0284653567cd.exe

  • Size

    700KB

  • MD5

    4501f68734fd2c74213b9f9fbfde2f78

  • SHA1

    f1a4a18b887ddcb31c6fd0226fe5c3e9980b11ed

  • SHA256

    5627e6b8b5d82eccc45e5c80399823baa8592639b7ec45013abf0284653567cd

  • SHA512

    c866cc26c5fd935a8166cd78b103892681a5445dd36c221fa0ab27d46bcda197c4dc4fd5b24c2786aa63c52ff884c54ec620643f81293c99431dd795b5645f2c

  • SSDEEP

    12288:XMrVy90Ow1l6EJbFvSy0vdGAbqG2Oa3uKvESOVGeqTfBRvg/HJDp1moV3a:Cyp4oExFvSy0UyT2OspYqTfMv53lV3a

Malware Config

Extracted

Family

redline

Botnet

sony

C2

193.233.20.33:4125

Attributes
  • auth_value

    1d93d1744381eeb4fcfd7c23ffe0f0b4

Extracted

Family

redline

Botnet

nice

C2

193.233.20.33:4125

Attributes
  • auth_value

    a7371b75699e8bc7c51fb960e8ac9e81

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5627e6b8b5d82eccc45e5c80399823baa8592639b7ec45013abf0284653567cd.exe
    "C:\Users\Admin\AppData\Local\Temp\5627e6b8b5d82eccc45e5c80399823baa8592639b7ec45013abf0284653567cd.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1348
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un507689.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un507689.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5040
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3627.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3627.exe
        3⤵
        • Modifies Windows Defender Real-time Protection settings
        • Executes dropped EXE
        • Windows security modification
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4468
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4468 -s 1084
          4⤵
          • Program crash
          PID:4648
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2691.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2691.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3312
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3312 -s 1752
          4⤵
          • Program crash
          PID:2744
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si662373.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si662373.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2416
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 4468 -ip 4468
    1⤵
      PID:4040
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3312 -ip 3312
      1⤵
        PID:2040
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:892

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si662373.exe

        Filesize

        175KB

        MD5

        73d5a0e0074778d5524d1de1f96595c6

        SHA1

        1d881849f3480550232ab030e411d1ca00d7ee8e

        SHA256

        71887326c19140fb7e5be41ade6cc28569d44e058998d01492291d02ac2ca652

        SHA512

        051bcbfc28d098bdd0a5feb42604b04a675adc59b136588be7a46f9ba913754176dd840c9166f8be03a70fb31c1c1a0b31dc68b34d377370b742bf0eb62cf390

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\si662373.exe

        Filesize

        175KB

        MD5

        73d5a0e0074778d5524d1de1f96595c6

        SHA1

        1d881849f3480550232ab030e411d1ca00d7ee8e

        SHA256

        71887326c19140fb7e5be41ade6cc28569d44e058998d01492291d02ac2ca652

        SHA512

        051bcbfc28d098bdd0a5feb42604b04a675adc59b136588be7a46f9ba913754176dd840c9166f8be03a70fb31c1c1a0b31dc68b34d377370b742bf0eb62cf390

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un507689.exe

        Filesize

        558KB

        MD5

        4efcd368dc3f59dc443ad5a67f37ac9d

        SHA1

        1341987093c817fb53b0a9750b7da06e8f4b28ba

        SHA256

        e0efe4f32eeafdf3b37ff3f20fbd9eb8f2b9a75d46159433a51b1114941900d7

        SHA512

        4ed50ee3e377f8864c5e32ca0f4ebc088ba24d6d2039059102eb6316316b1973491aaae9a2ea18ef0d12ac2bfb5b8851c4981c2663ac76cfb2fa0ca964305d63

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un507689.exe

        Filesize

        558KB

        MD5

        4efcd368dc3f59dc443ad5a67f37ac9d

        SHA1

        1341987093c817fb53b0a9750b7da06e8f4b28ba

        SHA256

        e0efe4f32eeafdf3b37ff3f20fbd9eb8f2b9a75d46159433a51b1114941900d7

        SHA512

        4ed50ee3e377f8864c5e32ca0f4ebc088ba24d6d2039059102eb6316316b1973491aaae9a2ea18ef0d12ac2bfb5b8851c4981c2663ac76cfb2fa0ca964305d63

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3627.exe

        Filesize

        308KB

        MD5

        a86b55712b830fae099adb2406d8e12a

        SHA1

        11dacc3f843d662d58a3c3b84855e190ae41b3fc

        SHA256

        3bad664bff8167ed2caf91bf40adf580489e77321b2352b62f82de02542c65ee

        SHA512

        7dd8ae9a846e1cea5c5f2da8516e366cca8f694cc0f1f8d6992e0a6cbdc43accadbc86925d92617e8b78e46fb2d9f777010bf2f37a3bf8dd1b5085856bfb6d1b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\pro3627.exe

        Filesize

        308KB

        MD5

        a86b55712b830fae099adb2406d8e12a

        SHA1

        11dacc3f843d662d58a3c3b84855e190ae41b3fc

        SHA256

        3bad664bff8167ed2caf91bf40adf580489e77321b2352b62f82de02542c65ee

        SHA512

        7dd8ae9a846e1cea5c5f2da8516e366cca8f694cc0f1f8d6992e0a6cbdc43accadbc86925d92617e8b78e46fb2d9f777010bf2f37a3bf8dd1b5085856bfb6d1b

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2691.exe

        Filesize

        366KB

        MD5

        d0ac3fb0871d107cd6ba0cb71037521a

        SHA1

        162a4db35c3a65311052a5b465c8b869d9552c19

        SHA256

        2f8b422b95ee3ab4613c749bc551846d95d8c6cfa3883da0082fdd63174aa15d

        SHA512

        b4bce6afdc50629e4e41aa06d5ed930cad0036e46243e62ccf923057d4fcdf56e6314c3e46acf28ef115517fe7c731ddcef06f7e285f9f017d9e9efc5ceac687

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\qu2691.exe

        Filesize

        366KB

        MD5

        d0ac3fb0871d107cd6ba0cb71037521a

        SHA1

        162a4db35c3a65311052a5b465c8b869d9552c19

        SHA256

        2f8b422b95ee3ab4613c749bc551846d95d8c6cfa3883da0082fdd63174aa15d

        SHA512

        b4bce6afdc50629e4e41aa06d5ed930cad0036e46243e62ccf923057d4fcdf56e6314c3e46acf28ef115517fe7c731ddcef06f7e285f9f017d9e9efc5ceac687

      • memory/2416-1123-0x0000000005410000-0x0000000005420000-memory.dmp

        Filesize

        64KB

      • memory/2416-1122-0x0000000000B50000-0x0000000000B82000-memory.dmp

        Filesize

        200KB

      • memory/3312-1102-0x0000000005A70000-0x0000000005B7A000-memory.dmp

        Filesize

        1.0MB

      • memory/3312-1104-0x0000000004E30000-0x0000000004E6C000-memory.dmp

        Filesize

        240KB

      • memory/3312-1116-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/3312-1115-0x0000000007C40000-0x000000000816C000-memory.dmp

        Filesize

        5.2MB

      • memory/3312-1114-0x0000000007A60000-0x0000000007C22000-memory.dmp

        Filesize

        1.8MB

      • memory/3312-1113-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/3312-1112-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/3312-1111-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/3312-1109-0x0000000006640000-0x0000000006690000-memory.dmp

        Filesize

        320KB

      • memory/3312-1108-0x00000000065A0000-0x0000000006616000-memory.dmp

        Filesize

        472KB

      • memory/3312-1107-0x0000000005EB0000-0x0000000005F16000-memory.dmp

        Filesize

        408KB

      • memory/3312-1106-0x0000000005E10000-0x0000000005EA2000-memory.dmp

        Filesize

        584KB

      • memory/3312-1105-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/3312-1103-0x0000000004E10000-0x0000000004E22000-memory.dmp

        Filesize

        72KB

      • memory/3312-1101-0x0000000005450000-0x0000000005A68000-memory.dmp

        Filesize

        6.1MB

      • memory/3312-228-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/3312-226-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/3312-224-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/3312-222-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/3312-220-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/3312-218-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/3312-191-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/3312-192-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/3312-194-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/3312-196-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/3312-198-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/3312-200-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/3312-202-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/3312-204-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/3312-206-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/3312-208-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/3312-211-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/3312-213-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/3312-209-0x00000000007F0000-0x000000000083B000-memory.dmp

        Filesize

        300KB

      • memory/3312-215-0x0000000004E90000-0x0000000004EA0000-memory.dmp

        Filesize

        64KB

      • memory/3312-212-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/3312-216-0x0000000004CC0000-0x0000000004CFE000-memory.dmp

        Filesize

        248KB

      • memory/4468-174-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/4468-183-0x00000000023A0000-0x00000000023B0000-memory.dmp

        Filesize

        64KB

      • memory/4468-155-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/4468-184-0x00000000023A0000-0x00000000023B0000-memory.dmp

        Filesize

        64KB

      • memory/4468-172-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/4468-182-0x00000000023A0000-0x00000000023B0000-memory.dmp

        Filesize

        64KB

      • memory/4468-181-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/4468-170-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/4468-180-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/4468-158-0x00000000023A0000-0x00000000023B0000-memory.dmp

        Filesize

        64KB

      • memory/4468-178-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/4468-176-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/4468-186-0x0000000000400000-0x0000000000710000-memory.dmp

        Filesize

        3.1MB

      • memory/4468-160-0x00000000023A0000-0x00000000023B0000-memory.dmp

        Filesize

        64KB

      • memory/4468-156-0x00000000023A0000-0x00000000023B0000-memory.dmp

        Filesize

        64KB

      • memory/4468-168-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/4468-166-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/4468-164-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/4468-162-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/4468-154-0x00000000008E0000-0x000000000090D000-memory.dmp

        Filesize

        180KB

      • memory/4468-159-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/4468-152-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/4468-150-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/4468-149-0x0000000005230000-0x0000000005242000-memory.dmp

        Filesize

        72KB

      • memory/4468-148-0x0000000004C40000-0x00000000051E4000-memory.dmp

        Filesize

        5.6MB