Analysis

  • max time kernel
    135s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/05/2023, 17:28

General

  • Target

    33e885f6e0becebbb81fd015a24cb013da0b077bc0c081a986404293470cc356.exe

  • Size

    1.1MB

  • MD5

    b2c461e2d943176a6da0dd8225e2775e

  • SHA1

    9aab87c6191b80beabc5ed84eb6cff0cfc8e57dd

  • SHA256

    33e885f6e0becebbb81fd015a24cb013da0b077bc0c081a986404293470cc356

  • SHA512

    afd55f17cf030742505cecd71e21dd59c59d5b794a8e6faa845c10059005e781449a2b29ffc9c82668dc4a203503acd415089d353eb0d4ab49b62eb4ca4cd106

  • SSDEEP

    24576:zy81uEs6RbF30Zjo0ALEy2tICtuZld3FHmf/RhcnIveBW7BO+HS7a:GC6Kp23Ox2kZlnH6/HeU7DS7

Malware Config

Extracted

Family

redline

Botnet

motor

C2

185.161.248.75:4132

Attributes
  • auth_value

    ec19ab9989a783983c5cbbc0e5ac4a5f

Extracted

Family

redline

Botnet

terra

C2

185.161.248.75:4132

Attributes
  • auth_value

    60df3f535f8aa4e264f78041983592d2

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33e885f6e0becebbb81fd015a24cb013da0b077bc0c081a986404293470cc356.exe
    "C:\Users\Admin\AppData\Local\Temp\33e885f6e0becebbb81fd015a24cb013da0b077bc0c081a986404293470cc356.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:980
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1064941.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1064941.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4764
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7036880.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7036880.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3620
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3804811.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3804811.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5016
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7177375.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7177375.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2724
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0802220.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0802220.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:976
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0802220.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0802220.exe
          4⤵
          • Executes dropped EXE
          PID:3788
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0802220.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0802220.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of UnmapMainImage
          PID:3532
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3532 -s 12
            5⤵
            • Program crash
            PID:3588
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2728717.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2728717.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2072
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2728717.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2728717.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:368
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3532 -ip 3532
    1⤵
      PID:2164

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\d2728717.exe.log

      Filesize

      425B

      MD5

      4eaca4566b22b01cd3bc115b9b0b2196

      SHA1

      e743e0792c19f71740416e7b3c061d9f1336bf94

      SHA256

      34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

      SHA512

      bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2728717.exe

      Filesize

      904KB

      MD5

      016644d302de916560ba26618f0cfd92

      SHA1

      da3cc54d8d6910160910d32d1837b92541d8a439

      SHA256

      586744816672eab99d219e0f3791b7be2d6cd5056de7cb6bc375552e0fae21b6

      SHA512

      581287c5d98450cb2f15d594d45029b71c64e439cefdf896dbcaad9133a07b8a7e98bafa425c45bd97d882e4a04ef24f61e9562b2407dd5475b588b8906022e4

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2728717.exe

      Filesize

      904KB

      MD5

      016644d302de916560ba26618f0cfd92

      SHA1

      da3cc54d8d6910160910d32d1837b92541d8a439

      SHA256

      586744816672eab99d219e0f3791b7be2d6cd5056de7cb6bc375552e0fae21b6

      SHA512

      581287c5d98450cb2f15d594d45029b71c64e439cefdf896dbcaad9133a07b8a7e98bafa425c45bd97d882e4a04ef24f61e9562b2407dd5475b588b8906022e4

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2728717.exe

      Filesize

      904KB

      MD5

      016644d302de916560ba26618f0cfd92

      SHA1

      da3cc54d8d6910160910d32d1837b92541d8a439

      SHA256

      586744816672eab99d219e0f3791b7be2d6cd5056de7cb6bc375552e0fae21b6

      SHA512

      581287c5d98450cb2f15d594d45029b71c64e439cefdf896dbcaad9133a07b8a7e98bafa425c45bd97d882e4a04ef24f61e9562b2407dd5475b588b8906022e4

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1064941.exe

      Filesize

      750KB

      MD5

      fb9f493881a689f34e1ae630523a8620

      SHA1

      77bfcf1d8e559f634b47f80da9d17a16e3ffed54

      SHA256

      ab77edec58b439f10cfab1d3b2409ff99864b8753c5517dadb19b399fbd03116

      SHA512

      2b31b38599b1d3611fae2abd1480c1178b8e5ba14d34b4fc527488055d0699e677b556d228eb8c361a43532c07bb056c7dcf555b67dcb055e5bf0d810506b6ee

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1064941.exe

      Filesize

      750KB

      MD5

      fb9f493881a689f34e1ae630523a8620

      SHA1

      77bfcf1d8e559f634b47f80da9d17a16e3ffed54

      SHA256

      ab77edec58b439f10cfab1d3b2409ff99864b8753c5517dadb19b399fbd03116

      SHA512

      2b31b38599b1d3611fae2abd1480c1178b8e5ba14d34b4fc527488055d0699e677b556d228eb8c361a43532c07bb056c7dcf555b67dcb055e5bf0d810506b6ee

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0802220.exe

      Filesize

      962KB

      MD5

      d878469e38137d87dde3c8b5ad1096b8

      SHA1

      c684e2b486d72b4d6d76c2c07dd942f0508b9385

      SHA256

      9b881e3f4a44d15c55051d3790919c48018a40bc1e4f252fd6805f2357756490

      SHA512

      ee6e38bb6283e5992e86d1a35063f1f29586ed65a78179556fc1582583524f8e67ec91d50a6423542987309f47dffd8704b3571d028208a8b432db559647f10d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0802220.exe

      Filesize

      962KB

      MD5

      d878469e38137d87dde3c8b5ad1096b8

      SHA1

      c684e2b486d72b4d6d76c2c07dd942f0508b9385

      SHA256

      9b881e3f4a44d15c55051d3790919c48018a40bc1e4f252fd6805f2357756490

      SHA512

      ee6e38bb6283e5992e86d1a35063f1f29586ed65a78179556fc1582583524f8e67ec91d50a6423542987309f47dffd8704b3571d028208a8b432db559647f10d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0802220.exe

      Filesize

      962KB

      MD5

      d878469e38137d87dde3c8b5ad1096b8

      SHA1

      c684e2b486d72b4d6d76c2c07dd942f0508b9385

      SHA256

      9b881e3f4a44d15c55051d3790919c48018a40bc1e4f252fd6805f2357756490

      SHA512

      ee6e38bb6283e5992e86d1a35063f1f29586ed65a78179556fc1582583524f8e67ec91d50a6423542987309f47dffd8704b3571d028208a8b432db559647f10d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c0802220.exe

      Filesize

      962KB

      MD5

      d878469e38137d87dde3c8b5ad1096b8

      SHA1

      c684e2b486d72b4d6d76c2c07dd942f0508b9385

      SHA256

      9b881e3f4a44d15c55051d3790919c48018a40bc1e4f252fd6805f2357756490

      SHA512

      ee6e38bb6283e5992e86d1a35063f1f29586ed65a78179556fc1582583524f8e67ec91d50a6423542987309f47dffd8704b3571d028208a8b432db559647f10d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7036880.exe

      Filesize

      306KB

      MD5

      5aacb6a71bae9cd5bedfa8c281a58082

      SHA1

      5235aab93bfe62f2866eea431e7506c8c1008c47

      SHA256

      6ba85526ca031c3cad3fc4df16c7a2152f5e0a82591111c0293484bcb34bd1b8

      SHA512

      d8a32df2a03f2a2b45e7d18541c88bd7d6d6a230f58ddbef640cef8702412d742f278a06fe3d1b6675d6a0b5f64fba684e78c51b38b5624186d75b31a1f3908d

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7036880.exe

      Filesize

      306KB

      MD5

      5aacb6a71bae9cd5bedfa8c281a58082

      SHA1

      5235aab93bfe62f2866eea431e7506c8c1008c47

      SHA256

      6ba85526ca031c3cad3fc4df16c7a2152f5e0a82591111c0293484bcb34bd1b8

      SHA512

      d8a32df2a03f2a2b45e7d18541c88bd7d6d6a230f58ddbef640cef8702412d742f278a06fe3d1b6675d6a0b5f64fba684e78c51b38b5624186d75b31a1f3908d

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3804811.exe

      Filesize

      184KB

      MD5

      36df452fdda4179809bf54ccc450a04e

      SHA1

      82fae88df48ab2b8d2fa4850513b20e048bb9b35

      SHA256

      ee09c6495dd35cb0597a80b22ad30991c5f91a1acf2c0774cd6edbbf36c27dba

      SHA512

      61fccde76500051685ecedb2e1cd58a769439a89331166d43c22eb25ca9badcc6cf3adb6275e43972dd7e17295a0ce3d8f6cfc4df775c534c18d55a1fa4acfc5

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a3804811.exe

      Filesize

      184KB

      MD5

      36df452fdda4179809bf54ccc450a04e

      SHA1

      82fae88df48ab2b8d2fa4850513b20e048bb9b35

      SHA256

      ee09c6495dd35cb0597a80b22ad30991c5f91a1acf2c0774cd6edbbf36c27dba

      SHA512

      61fccde76500051685ecedb2e1cd58a769439a89331166d43c22eb25ca9badcc6cf3adb6275e43972dd7e17295a0ce3d8f6cfc4df775c534c18d55a1fa4acfc5

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7177375.exe

      Filesize

      145KB

      MD5

      e13ba337cdcc485d856d7fe81d4b6e53

      SHA1

      4b4830fa9472b0a46fc8b0249a144260cfc39eec

      SHA256

      15f57c4f2beb57f8a09bf6e537b143c37fde0bc1275d9366b43befc60d934c45

      SHA512

      8b0e0742cac8ae88ac4bb32e9cfcda748138ebd06fb8c683e03681c89f557e7bdc016d451334384d3ff011c50253382199dbd05223d8db14621bdc9f505cb5de

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b7177375.exe

      Filesize

      145KB

      MD5

      e13ba337cdcc485d856d7fe81d4b6e53

      SHA1

      4b4830fa9472b0a46fc8b0249a144260cfc39eec

      SHA256

      15f57c4f2beb57f8a09bf6e537b143c37fde0bc1275d9366b43befc60d934c45

      SHA512

      8b0e0742cac8ae88ac4bb32e9cfcda748138ebd06fb8c683e03681c89f557e7bdc016d451334384d3ff011c50253382199dbd05223d8db14621bdc9f505cb5de

    • memory/368-218-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/368-222-0x00000000056B0000-0x00000000056C0000-memory.dmp

      Filesize

      64KB

    • memory/976-209-0x0000000007C60000-0x0000000007C70000-memory.dmp

      Filesize

      64KB

    • memory/976-208-0x0000000000D90000-0x0000000000E88000-memory.dmp

      Filesize

      992KB

    • memory/2072-217-0x0000000000140000-0x0000000000228000-memory.dmp

      Filesize

      928KB

    • memory/2724-191-0x0000000000D80000-0x0000000000DAA000-memory.dmp

      Filesize

      168KB

    • memory/2724-201-0x0000000007100000-0x00000000072C2000-memory.dmp

      Filesize

      1.8MB

    • memory/2724-203-0x0000000005A70000-0x0000000005A80000-memory.dmp

      Filesize

      64KB

    • memory/2724-202-0x0000000007800000-0x0000000007D2C000-memory.dmp

      Filesize

      5.2MB

    • memory/2724-200-0x0000000006EE0000-0x0000000006F30000-memory.dmp

      Filesize

      320KB

    • memory/2724-199-0x0000000006E60000-0x0000000006ED6000-memory.dmp

      Filesize

      472KB

    • memory/2724-198-0x0000000006370000-0x00000000063D6000-memory.dmp

      Filesize

      408KB

    • memory/2724-197-0x0000000005B20000-0x0000000005BB2000-memory.dmp

      Filesize

      584KB

    • memory/2724-192-0x0000000005CE0000-0x00000000062F8000-memory.dmp

      Filesize

      6.1MB

    • memory/2724-193-0x0000000005820000-0x000000000592A000-memory.dmp

      Filesize

      1.0MB

    • memory/2724-194-0x0000000005750000-0x0000000005762000-memory.dmp

      Filesize

      72KB

    • memory/2724-195-0x00000000057B0000-0x00000000057EC000-memory.dmp

      Filesize

      240KB

    • memory/2724-196-0x0000000005A70000-0x0000000005A80000-memory.dmp

      Filesize

      64KB

    • memory/3532-211-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/5016-169-0x0000000002400000-0x0000000002416000-memory.dmp

      Filesize

      88KB

    • memory/5016-167-0x0000000002400000-0x0000000002416000-memory.dmp

      Filesize

      88KB

    • memory/5016-183-0x0000000002400000-0x0000000002416000-memory.dmp

      Filesize

      88KB

    • memory/5016-185-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

      Filesize

      64KB

    • memory/5016-184-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

      Filesize

      64KB

    • memory/5016-175-0x0000000002400000-0x0000000002416000-memory.dmp

      Filesize

      88KB

    • memory/5016-173-0x0000000002400000-0x0000000002416000-memory.dmp

      Filesize

      88KB

    • memory/5016-171-0x0000000002400000-0x0000000002416000-memory.dmp

      Filesize

      88KB

    • memory/5016-177-0x0000000002400000-0x0000000002416000-memory.dmp

      Filesize

      88KB

    • memory/5016-186-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

      Filesize

      64KB

    • memory/5016-181-0x0000000002400000-0x0000000002416000-memory.dmp

      Filesize

      88KB

    • memory/5016-165-0x0000000002400000-0x0000000002416000-memory.dmp

      Filesize

      88KB

    • memory/5016-163-0x0000000002400000-0x0000000002416000-memory.dmp

      Filesize

      88KB

    • memory/5016-161-0x0000000002400000-0x0000000002416000-memory.dmp

      Filesize

      88KB

    • memory/5016-159-0x0000000002400000-0x0000000002416000-memory.dmp

      Filesize

      88KB

    • memory/5016-157-0x0000000002400000-0x0000000002416000-memory.dmp

      Filesize

      88KB

    • memory/5016-156-0x0000000002400000-0x0000000002416000-memory.dmp

      Filesize

      88KB

    • memory/5016-155-0x0000000004BD0000-0x0000000005174000-memory.dmp

      Filesize

      5.6MB

    • memory/5016-154-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

      Filesize

      64KB

    • memory/5016-179-0x0000000002400000-0x0000000002416000-memory.dmp

      Filesize

      88KB