Analysis

  • max time kernel
    99s
  • max time network
    184s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-05-2023 18:45

General

  • Target

    eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf.exe

  • Size

    560KB

  • MD5

    be335d601e2c6e34197ce189533dabad

  • SHA1

    0627bb8020d664229f3e20ed56bb996bd480ce08

  • SHA256

    eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf

  • SHA512

    b2dfbba5d0578fa8d92e5496a11db6c2027c58b10a1b659683511320449ef3efe59cfa1dd7bab5521aad7d7be05150862504b60f7162071611cbeedf596fcb27

  • SSDEEP

    12288:QMrLy90YmNbZ+o+kg/rfPt1ut0w5eVHNbHMH0Np:LyOVd+kgPut0w5IeHKp

Malware Config

Extracted

Family

redline

Botnet

gogen

C2

185.161.248.75:4132

Attributes
  • auth_value

    dfb27ce11afd52277523c8e405853d53

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf.exe
    "C:\Users\Admin\AppData\Local\Temp\eef2772c37e31c9f1400ba3bb38e77922a3099771f5fcf4be669c65b9c38fdbf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a2525353.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a2525353.exe
      2⤵
      • Modifies Windows Defender Real-time Protection settings
      • Executes dropped EXE
      • Windows security modification
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2812
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9397249.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9397249.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4616
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9397249.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9397249.exe
        3⤵
        • Executes dropped EXE
        PID:4136
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9397249.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9397249.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2004

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\d9397249.exe.log

    Filesize

    425B

    MD5

    4eaca4566b22b01cd3bc115b9b0b2196

    SHA1

    e743e0792c19f71740416e7b3c061d9f1336bf94

    SHA256

    34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

    SHA512

    bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a2525353.exe

    Filesize

    184KB

    MD5

    d4c640fb500618ad6c9fc5fe7d3e784d

    SHA1

    850df0880e1685ce709b44afbbb365cab4f0fec4

    SHA256

    a511ae2083565f7f66afa9902f2d6aaa5bdf56c8a148609bfe949880a74ff44b

    SHA512

    a28a51e937a11c9d72f7450b86469609d972a1e65c176bf92a47922eaf9cf72d3a49f0d40702f6f22bfd3f2c9f9e36edfefecdd263e1d49f3546f44d4817cecd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\a2525353.exe

    Filesize

    184KB

    MD5

    d4c640fb500618ad6c9fc5fe7d3e784d

    SHA1

    850df0880e1685ce709b44afbbb365cab4f0fec4

    SHA256

    a511ae2083565f7f66afa9902f2d6aaa5bdf56c8a148609bfe949880a74ff44b

    SHA512

    a28a51e937a11c9d72f7450b86469609d972a1e65c176bf92a47922eaf9cf72d3a49f0d40702f6f22bfd3f2c9f9e36edfefecdd263e1d49f3546f44d4817cecd

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9397249.exe

    Filesize

    904KB

    MD5

    da1392ce8a745ff84066b4b89891c820

    SHA1

    da95517cc9fd2904df61fbada3268ba8b074c5f1

    SHA256

    52b27910ae22c29f0bd38aee2637554d48a65862315628dd6a27ed621a216207

    SHA512

    bca02f85a25239e1171847ab71bf1bcbe8e1d6b54892d56c4259117db2dbf31305f9e11b8dd9f5aff1ece96830534f33e92b01e6d80f0b03022f1972b8b66570

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9397249.exe

    Filesize

    904KB

    MD5

    da1392ce8a745ff84066b4b89891c820

    SHA1

    da95517cc9fd2904df61fbada3268ba8b074c5f1

    SHA256

    52b27910ae22c29f0bd38aee2637554d48a65862315628dd6a27ed621a216207

    SHA512

    bca02f85a25239e1171847ab71bf1bcbe8e1d6b54892d56c4259117db2dbf31305f9e11b8dd9f5aff1ece96830534f33e92b01e6d80f0b03022f1972b8b66570

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9397249.exe

    Filesize

    904KB

    MD5

    da1392ce8a745ff84066b4b89891c820

    SHA1

    da95517cc9fd2904df61fbada3268ba8b074c5f1

    SHA256

    52b27910ae22c29f0bd38aee2637554d48a65862315628dd6a27ed621a216207

    SHA512

    bca02f85a25239e1171847ab71bf1bcbe8e1d6b54892d56c4259117db2dbf31305f9e11b8dd9f5aff1ece96830534f33e92b01e6d80f0b03022f1972b8b66570

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9397249.exe

    Filesize

    904KB

    MD5

    da1392ce8a745ff84066b4b89891c820

    SHA1

    da95517cc9fd2904df61fbada3268ba8b074c5f1

    SHA256

    52b27910ae22c29f0bd38aee2637554d48a65862315628dd6a27ed621a216207

    SHA512

    bca02f85a25239e1171847ab71bf1bcbe8e1d6b54892d56c4259117db2dbf31305f9e11b8dd9f5aff1ece96830534f33e92b01e6d80f0b03022f1972b8b66570

  • memory/2004-192-0x00000000060A0000-0x0000000006106000-memory.dmp

    Filesize

    408KB

  • memory/2004-190-0x0000000005120000-0x0000000005130000-memory.dmp

    Filesize

    64KB

  • memory/2004-195-0x0000000006B10000-0x0000000006B86000-memory.dmp

    Filesize

    472KB

  • memory/2004-191-0x0000000005E90000-0x0000000005F22000-memory.dmp

    Filesize

    584KB

  • memory/2004-187-0x0000000005100000-0x0000000005112000-memory.dmp

    Filesize

    72KB

  • memory/2004-188-0x0000000005170000-0x00000000051AC000-memory.dmp

    Filesize

    240KB

  • memory/2004-186-0x00000000051D0000-0x00000000052DA000-memory.dmp

    Filesize

    1.0MB

  • memory/2004-185-0x0000000005650000-0x0000000005C68000-memory.dmp

    Filesize

    6.1MB

  • memory/2004-196-0x0000000006A90000-0x0000000006AE0000-memory.dmp

    Filesize

    320KB

  • memory/2004-193-0x0000000006C60000-0x0000000006E22000-memory.dmp

    Filesize

    1.8MB

  • memory/2004-181-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2004-194-0x0000000007360000-0x000000000788C000-memory.dmp

    Filesize

    5.2MB

  • memory/2004-189-0x0000000005120000-0x0000000005130000-memory.dmp

    Filesize

    64KB

  • memory/2812-157-0x0000000004F20000-0x0000000004F36000-memory.dmp

    Filesize

    88KB

  • memory/2812-149-0x0000000004F20000-0x0000000004F36000-memory.dmp

    Filesize

    88KB

  • memory/2812-173-0x0000000002000000-0x0000000002010000-memory.dmp

    Filesize

    64KB

  • memory/2812-145-0x0000000004F20000-0x0000000004F36000-memory.dmp

    Filesize

    88KB

  • memory/2812-151-0x0000000004F20000-0x0000000004F36000-memory.dmp

    Filesize

    88KB

  • memory/2812-140-0x0000000002000000-0x0000000002010000-memory.dmp

    Filesize

    64KB

  • memory/2812-142-0x0000000004930000-0x0000000004ED4000-memory.dmp

    Filesize

    5.6MB

  • memory/2812-153-0x0000000004F20000-0x0000000004F36000-memory.dmp

    Filesize

    88KB

  • memory/2812-171-0x0000000004F20000-0x0000000004F36000-memory.dmp

    Filesize

    88KB

  • memory/2812-169-0x0000000004F20000-0x0000000004F36000-memory.dmp

    Filesize

    88KB

  • memory/2812-167-0x0000000004F20000-0x0000000004F36000-memory.dmp

    Filesize

    88KB

  • memory/2812-161-0x0000000004F20000-0x0000000004F36000-memory.dmp

    Filesize

    88KB

  • memory/2812-163-0x0000000004F20000-0x0000000004F36000-memory.dmp

    Filesize

    88KB

  • memory/2812-165-0x0000000004F20000-0x0000000004F36000-memory.dmp

    Filesize

    88KB

  • memory/2812-159-0x0000000004F20000-0x0000000004F36000-memory.dmp

    Filesize

    88KB

  • memory/2812-155-0x0000000004F20000-0x0000000004F36000-memory.dmp

    Filesize

    88KB

  • memory/2812-172-0x0000000002000000-0x0000000002010000-memory.dmp

    Filesize

    64KB

  • memory/2812-147-0x0000000004F20000-0x0000000004F36000-memory.dmp

    Filesize

    88KB

  • memory/2812-144-0x0000000004F20000-0x0000000004F36000-memory.dmp

    Filesize

    88KB

  • memory/2812-143-0x0000000002000000-0x0000000002010000-memory.dmp

    Filesize

    64KB

  • memory/2812-141-0x0000000002000000-0x0000000002010000-memory.dmp

    Filesize

    64KB

  • memory/4616-179-0x0000000007010000-0x0000000007020000-memory.dmp

    Filesize

    64KB

  • memory/4616-178-0x00000000002E0000-0x00000000003C8000-memory.dmp

    Filesize

    928KB