Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/05/2023, 18:25

General

  • Target

    100ddd4c404dc0ac79dfba3e7b07334fd7e3be00dff91bad4a51f3d016ceba9a.exe

  • Size

    1.2MB

  • MD5

    08a94e694b988f03b214ebd2439f8986

  • SHA1

    05085b96b8935bd54a8dfcc165036ea1cbd0807c

  • SHA256

    100ddd4c404dc0ac79dfba3e7b07334fd7e3be00dff91bad4a51f3d016ceba9a

  • SHA512

    8f6ea7785860567b7e4eaa713121abca3c67756e1362763b2de374485f847f90750e62f13398f4df2c0f830aa688071de4e40cfcc646645590992392a37211ad

  • SSDEEP

    24576:yygW/ahz40l+M5iyCY12GB56F0PznAjkV+vWXKFrmR3:ZghM0lj1CYQGKF0PbAAVuL

Malware Config

Extracted

Family

redline

Botnet

doma

C2

185.161.248.75:4132

Attributes
  • auth_value

    8be53af7f78567706928d0abef953ef4

Extracted

Family

redline

Botnet

fuga

C2

185.161.248.75:4132

Attributes
  • auth_value

    7c5144ad645deb9fa21680fdaee0d51f

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\100ddd4c404dc0ac79dfba3e7b07334fd7e3be00dff91bad4a51f3d016ceba9a.exe
    "C:\Users\Admin\AppData\Local\Temp\100ddd4c404dc0ac79dfba3e7b07334fd7e3be00dff91bad4a51f3d016ceba9a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4812
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0975109.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0975109.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1276
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8291102.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8291102.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2600
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8380313.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8380313.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4304
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0543359.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0543359.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:460
          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0543359.exe
            C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0543359.exe
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:984
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1876638.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1876638.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1456
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1876638.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1876638.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of UnmapMainImage
          PID:708
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 708 -s 12
            5⤵
            • Program crash
            PID:4152
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9069447.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9069447.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1628
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9069447.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9069447.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2000
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 708 -ip 708
    1⤵
      PID:4048

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\g0543359.exe.log

            Filesize

            425B

            MD5

            4eaca4566b22b01cd3bc115b9b0b2196

            SHA1

            e743e0792c19f71740416e7b3c061d9f1336bf94

            SHA256

            34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

            SHA512

            bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\i9069447.exe.log

            Filesize

            425B

            MD5

            4eaca4566b22b01cd3bc115b9b0b2196

            SHA1

            e743e0792c19f71740416e7b3c061d9f1336bf94

            SHA256

            34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

            SHA512

            bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9069447.exe

            Filesize

            902KB

            MD5

            0f93e5cca6ee94466d0a90d59d44ee99

            SHA1

            62d751773da3c2c37b020c74dbaac5ecff853560

            SHA256

            c05f389d4a8e698de732149c8b0d040fd15576f4c631f88de305d05e6d5feb04

            SHA512

            f271d1a016dc0083f6e57d535cd6dfb3cef005d45ed415d8447d5c21db8fa23794907c80500714e6a1615200c07303c727cca41c126538af1862c25e00aff999

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9069447.exe

            Filesize

            902KB

            MD5

            0f93e5cca6ee94466d0a90d59d44ee99

            SHA1

            62d751773da3c2c37b020c74dbaac5ecff853560

            SHA256

            c05f389d4a8e698de732149c8b0d040fd15576f4c631f88de305d05e6d5feb04

            SHA512

            f271d1a016dc0083f6e57d535cd6dfb3cef005d45ed415d8447d5c21db8fa23794907c80500714e6a1615200c07303c727cca41c126538af1862c25e00aff999

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9069447.exe

            Filesize

            902KB

            MD5

            0f93e5cca6ee94466d0a90d59d44ee99

            SHA1

            62d751773da3c2c37b020c74dbaac5ecff853560

            SHA256

            c05f389d4a8e698de732149c8b0d040fd15576f4c631f88de305d05e6d5feb04

            SHA512

            f271d1a016dc0083f6e57d535cd6dfb3cef005d45ed415d8447d5c21db8fa23794907c80500714e6a1615200c07303c727cca41c126538af1862c25e00aff999

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0975109.exe

            Filesize

            868KB

            MD5

            9efbb140157014b6ba812946f0b4576e

            SHA1

            afdc94b58bb2f096c036910407071b512d146078

            SHA256

            1acdee527b7d53cc3526d7873e7cde2f1114accc43edc5438059e7fcfaddb11e

            SHA512

            59cc99f2ec15d7f4bb3ed8e29329ae2003e0eaecd7243f8dd222734a1752601fce2eccf2bcb55c66c5336739310a8f0f923a9f75f0c7d1ed582de533ccd88242

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0975109.exe

            Filesize

            868KB

            MD5

            9efbb140157014b6ba812946f0b4576e

            SHA1

            afdc94b58bb2f096c036910407071b512d146078

            SHA256

            1acdee527b7d53cc3526d7873e7cde2f1114accc43edc5438059e7fcfaddb11e

            SHA512

            59cc99f2ec15d7f4bb3ed8e29329ae2003e0eaecd7243f8dd222734a1752601fce2eccf2bcb55c66c5336739310a8f0f923a9f75f0c7d1ed582de533ccd88242

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1876638.exe

            Filesize

            962KB

            MD5

            ac9c53b2a662e8ac2708f631bff35270

            SHA1

            1a3183661087790e4dbfad999d25910ded5b2b6e

            SHA256

            eda106cd4c94d193c976495ea0ea599bececea87258c95204898c28f12e38e45

            SHA512

            27538383f0cf8d2e6715aa83aa861d0ce43c2071e2636f405f2255e8014ff57e5d824cfe31624024b266f8ec14cc23458384e82653910152e8593a41b8e512a0

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1876638.exe

            Filesize

            962KB

            MD5

            ac9c53b2a662e8ac2708f631bff35270

            SHA1

            1a3183661087790e4dbfad999d25910ded5b2b6e

            SHA256

            eda106cd4c94d193c976495ea0ea599bececea87258c95204898c28f12e38e45

            SHA512

            27538383f0cf8d2e6715aa83aa861d0ce43c2071e2636f405f2255e8014ff57e5d824cfe31624024b266f8ec14cc23458384e82653910152e8593a41b8e512a0

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1876638.exe

            Filesize

            962KB

            MD5

            ac9c53b2a662e8ac2708f631bff35270

            SHA1

            1a3183661087790e4dbfad999d25910ded5b2b6e

            SHA256

            eda106cd4c94d193c976495ea0ea599bececea87258c95204898c28f12e38e45

            SHA512

            27538383f0cf8d2e6715aa83aa861d0ce43c2071e2636f405f2255e8014ff57e5d824cfe31624024b266f8ec14cc23458384e82653910152e8593a41b8e512a0

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8291102.exe

            Filesize

            424KB

            MD5

            cfa1716124b4ba56c341e1401d312219

            SHA1

            5008bd508a83dbca99e2fe902ac891fdee9be987

            SHA256

            a482c259d5f377d48865804c04bbe0eba1cd173147ccc6da0bcb0c370f96e218

            SHA512

            73a4160b8a185de7cb5c67e53fa325b9ed295a8935c9b4c03175e593d2e2df3c73552aa27fe8f274d84d3492c078481abac007ed3c0aaf82f333c3731ce2df5c

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8291102.exe

            Filesize

            424KB

            MD5

            cfa1716124b4ba56c341e1401d312219

            SHA1

            5008bd508a83dbca99e2fe902ac891fdee9be987

            SHA256

            a482c259d5f377d48865804c04bbe0eba1cd173147ccc6da0bcb0c370f96e218

            SHA512

            73a4160b8a185de7cb5c67e53fa325b9ed295a8935c9b4c03175e593d2e2df3c73552aa27fe8f274d84d3492c078481abac007ed3c0aaf82f333c3731ce2df5c

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8380313.exe

            Filesize

            145KB

            MD5

            36279fcfbcd097e0765df001da8bd45c

            SHA1

            bddca867c2a949d44f1d5d3aae34d0d23adf027a

            SHA256

            88ae2f97bcf03f797c8e430b339cf541159f5712e09aa6f550a2296109423d3e

            SHA512

            5d2c1845e88d9da4f3361cc89808e12c71f752a2566426aa7015a620f2a5f854b658e61d15857409a7ef3e2caeb98713ecaac8b0d0ab9df8d78d43b75852b3ce

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8380313.exe

            Filesize

            145KB

            MD5

            36279fcfbcd097e0765df001da8bd45c

            SHA1

            bddca867c2a949d44f1d5d3aae34d0d23adf027a

            SHA256

            88ae2f97bcf03f797c8e430b339cf541159f5712e09aa6f550a2296109423d3e

            SHA512

            5d2c1845e88d9da4f3361cc89808e12c71f752a2566426aa7015a620f2a5f854b658e61d15857409a7ef3e2caeb98713ecaac8b0d0ab9df8d78d43b75852b3ce

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0543359.exe

            Filesize

            770KB

            MD5

            305615202ebe3728d0d21bcb7e6629bd

            SHA1

            02873403ab575ac4e095f6b1d40c492d5c327587

            SHA256

            0a7ca5475d0ba0b184ef7e0295452404871b87ff99a9fe8a795f3175621e98bd

            SHA512

            54c93ba211f1f7b07d294baed692c1d67be9bb6aeec69241eb435ab13e60aaab7a2fc71f7fe7c7a7195f8cf659dc9dcf32f5abb5a00d77b8fa2d67be51ead366

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0543359.exe

            Filesize

            770KB

            MD5

            305615202ebe3728d0d21bcb7e6629bd

            SHA1

            02873403ab575ac4e095f6b1d40c492d5c327587

            SHA256

            0a7ca5475d0ba0b184ef7e0295452404871b87ff99a9fe8a795f3175621e98bd

            SHA512

            54c93ba211f1f7b07d294baed692c1d67be9bb6aeec69241eb435ab13e60aaab7a2fc71f7fe7c7a7195f8cf659dc9dcf32f5abb5a00d77b8fa2d67be51ead366

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0543359.exe

            Filesize

            770KB

            MD5

            305615202ebe3728d0d21bcb7e6629bd

            SHA1

            02873403ab575ac4e095f6b1d40c492d5c327587

            SHA256

            0a7ca5475d0ba0b184ef7e0295452404871b87ff99a9fe8a795f3175621e98bd

            SHA512

            54c93ba211f1f7b07d294baed692c1d67be9bb6aeec69241eb435ab13e60aaab7a2fc71f7fe7c7a7195f8cf659dc9dcf32f5abb5a00d77b8fa2d67be51ead366

          • memory/460-172-0x0000000000600000-0x00000000006C6000-memory.dmp

            Filesize

            792KB

          • memory/460-173-0x00000000073C0000-0x00000000073D0000-memory.dmp

            Filesize

            64KB

          • memory/708-183-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/984-174-0x0000000000400000-0x000000000040A000-memory.dmp

            Filesize

            40KB

          • memory/1456-182-0x0000000007110000-0x0000000007120000-memory.dmp

            Filesize

            64KB

          • memory/1456-181-0x0000000000360000-0x0000000000458000-memory.dmp

            Filesize

            992KB

          • memory/1628-190-0x0000000007900000-0x0000000007910000-memory.dmp

            Filesize

            64KB

          • memory/1628-189-0x0000000000A00000-0x0000000000AE8000-memory.dmp

            Filesize

            928KB

          • memory/2000-195-0x0000000005980000-0x0000000005990000-memory.dmp

            Filesize

            64KB

          • memory/2000-191-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/4304-163-0x0000000006180000-0x0000000006342000-memory.dmp

            Filesize

            1.8MB

          • memory/4304-167-0x0000000005320000-0x0000000005330000-memory.dmp

            Filesize

            64KB

          • memory/4304-161-0x00000000063D0000-0x0000000006974000-memory.dmp

            Filesize

            5.6MB

          • memory/4304-160-0x0000000005330000-0x0000000005396000-memory.dmp

            Filesize

            408KB

          • memory/4304-159-0x0000000005320000-0x0000000005330000-memory.dmp

            Filesize

            64KB

          • memory/4304-158-0x0000000004FF0000-0x000000000502C000-memory.dmp

            Filesize

            240KB

          • memory/4304-157-0x0000000004F90000-0x0000000004FA2000-memory.dmp

            Filesize

            72KB

          • memory/4304-162-0x0000000005F00000-0x0000000005F92000-memory.dmp

            Filesize

            584KB

          • memory/4304-164-0x0000000006EB0000-0x00000000073DC000-memory.dmp

            Filesize

            5.2MB

          • memory/4304-165-0x0000000006350000-0x00000000063C6000-memory.dmp

            Filesize

            472KB

          • memory/4304-156-0x0000000005060000-0x000000000516A000-memory.dmp

            Filesize

            1.0MB

          • memory/4304-155-0x0000000005500000-0x0000000005B18000-memory.dmp

            Filesize

            6.1MB

          • memory/4304-166-0x00000000060F0000-0x0000000006140000-memory.dmp

            Filesize

            320KB

          • memory/4304-154-0x00000000005C0000-0x00000000005EA000-memory.dmp

            Filesize

            168KB