Analysis

  • max time kernel
    106s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/05/2023, 02:13

General

  • Target

    3485be0a5134e9babb29cf512d5e60dbf59057191c6e40288885b9a34738fae3.exe

  • Size

    1.1MB

  • MD5

    045e7dd30959fc4bcea29a4a4cb2cec1

  • SHA1

    5d4f243b0b0dd56a249fca8b1cedbd3f0c73b1ab

  • SHA256

    3485be0a5134e9babb29cf512d5e60dbf59057191c6e40288885b9a34738fae3

  • SHA512

    efc4f70cfaea43f4d81db269c38fd8033fce0cc6e73d2a8e121911178b7e40ad6ec32e3829626a958859d0295cff66616488776bcc72619b5e9de91b57f16733

  • SSDEEP

    24576:Cytc2V8aEVa6kfg+aRYf5hOiZbAdWfCpzINIak:ptX8g/fg5qfDKdXzICa

Malware Config

Extracted

Family

redline

Botnet

luka

C2

185.161.248.75:4132

Attributes
  • auth_value

    44560bcd37d6bf076da309730fdb519a

Extracted

Family

redline

Botnet

terra

C2

185.161.248.75:4132

Attributes
  • auth_value

    60df3f535f8aa4e264f78041983592d2

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3485be0a5134e9babb29cf512d5e60dbf59057191c6e40288885b9a34738fae3.exe
    "C:\Users\Admin\AppData\Local\Temp\3485be0a5134e9babb29cf512d5e60dbf59057191c6e40288885b9a34738fae3.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1400
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8263802.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8263802.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3549094.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3549094.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3304
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o9414700.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o9414700.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3384
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p6690329.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p6690329.exe
          4⤵
          • Executes dropped EXE
          PID:4036
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 928
            5⤵
            • Program crash
            PID:1272
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9622622.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9622622.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2672
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9622622.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9622622.exe
          4⤵
          • Executes dropped EXE
          PID:3272
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9622622.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9622622.exe
          4⤵
          • Executes dropped EXE
          PID:1948
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9622622.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9622622.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3432
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8843131.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8843131.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4280
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8843131.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8843131.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of UnmapMainImage
        PID:4576
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4576 -s 12
          4⤵
          • Program crash
          PID:2480
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 4036 -ip 4036
    1⤵
      PID:4540
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4576 -ip 4576
      1⤵
        PID:452

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\r9622622.exe.log

              Filesize

              425B

              MD5

              4eaca4566b22b01cd3bc115b9b0b2196

              SHA1

              e743e0792c19f71740416e7b3c061d9f1336bf94

              SHA256

              34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

              SHA512

              bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8843131.exe

              Filesize

              961KB

              MD5

              80fc746ab9c8ecd93489dda89fde6c51

              SHA1

              f3f913dd1919abe137efa90b6464e0421f3318f3

              SHA256

              142f09faafff988704bcef6c84d156336e1afe4d058d2cb28944c385a8872b4c

              SHA512

              611956e021c499135f88cb6de540dfc31eaa2bb47eff499e015c93b4b46a82ab7ccb479959d2b0d7cf6753644500ce97e92e9f128608e9540dd5a7f23d141ec6

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8843131.exe

              Filesize

              961KB

              MD5

              80fc746ab9c8ecd93489dda89fde6c51

              SHA1

              f3f913dd1919abe137efa90b6464e0421f3318f3

              SHA256

              142f09faafff988704bcef6c84d156336e1afe4d058d2cb28944c385a8872b4c

              SHA512

              611956e021c499135f88cb6de540dfc31eaa2bb47eff499e015c93b4b46a82ab7ccb479959d2b0d7cf6753644500ce97e92e9f128608e9540dd5a7f23d141ec6

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s8843131.exe

              Filesize

              961KB

              MD5

              80fc746ab9c8ecd93489dda89fde6c51

              SHA1

              f3f913dd1919abe137efa90b6464e0421f3318f3

              SHA256

              142f09faafff988704bcef6c84d156336e1afe4d058d2cb28944c385a8872b4c

              SHA512

              611956e021c499135f88cb6de540dfc31eaa2bb47eff499e015c93b4b46a82ab7ccb479959d2b0d7cf6753644500ce97e92e9f128608e9540dd5a7f23d141ec6

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8263802.exe

              Filesize

              703KB

              MD5

              abb4521c84b7191d709da2caf66651aa

              SHA1

              4d92a815731d9968c724c429c67a87555357b96e

              SHA256

              5910f8b988367519983118210efe9b03cf8ccd8880426c9e6c2e0b0072c36e3c

              SHA512

              f0476c29ed590ef658e963ea4933f333c93effe65757690917a73bff07f7927b30f4540fc14415772a3bd5993708159ca7ca87044b38d71d245d09103308b8c8

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z8263802.exe

              Filesize

              703KB

              MD5

              abb4521c84b7191d709da2caf66651aa

              SHA1

              4d92a815731d9968c724c429c67a87555357b96e

              SHA256

              5910f8b988367519983118210efe9b03cf8ccd8880426c9e6c2e0b0072c36e3c

              SHA512

              f0476c29ed590ef658e963ea4933f333c93effe65757690917a73bff07f7927b30f4540fc14415772a3bd5993708159ca7ca87044b38d71d245d09103308b8c8

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9622622.exe

              Filesize

              904KB

              MD5

              4e9bed069476d28628052fca3267e786

              SHA1

              86cb60592b78bffe104ebec07e9108651ade2fd0

              SHA256

              a5024028c8abce4171d7d6e31e7f05621862475e54ce89f1979e6b4ce5ffeee5

              SHA512

              dc09a87365df4732a311532cc7d8d42bb74fac31b22c2094aee08d08523f600b5f7e04db9ea7127b1bcedbc8b054287cee1264a418acb663a44b7661d7e4153a

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9622622.exe

              Filesize

              904KB

              MD5

              4e9bed069476d28628052fca3267e786

              SHA1

              86cb60592b78bffe104ebec07e9108651ade2fd0

              SHA256

              a5024028c8abce4171d7d6e31e7f05621862475e54ce89f1979e6b4ce5ffeee5

              SHA512

              dc09a87365df4732a311532cc7d8d42bb74fac31b22c2094aee08d08523f600b5f7e04db9ea7127b1bcedbc8b054287cee1264a418acb663a44b7661d7e4153a

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9622622.exe

              Filesize

              904KB

              MD5

              4e9bed069476d28628052fca3267e786

              SHA1

              86cb60592b78bffe104ebec07e9108651ade2fd0

              SHA256

              a5024028c8abce4171d7d6e31e7f05621862475e54ce89f1979e6b4ce5ffeee5

              SHA512

              dc09a87365df4732a311532cc7d8d42bb74fac31b22c2094aee08d08523f600b5f7e04db9ea7127b1bcedbc8b054287cee1264a418acb663a44b7661d7e4153a

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9622622.exe

              Filesize

              904KB

              MD5

              4e9bed069476d28628052fca3267e786

              SHA1

              86cb60592b78bffe104ebec07e9108651ade2fd0

              SHA256

              a5024028c8abce4171d7d6e31e7f05621862475e54ce89f1979e6b4ce5ffeee5

              SHA512

              dc09a87365df4732a311532cc7d8d42bb74fac31b22c2094aee08d08523f600b5f7e04db9ea7127b1bcedbc8b054287cee1264a418acb663a44b7661d7e4153a

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r9622622.exe

              Filesize

              904KB

              MD5

              4e9bed069476d28628052fca3267e786

              SHA1

              86cb60592b78bffe104ebec07e9108651ade2fd0

              SHA256

              a5024028c8abce4171d7d6e31e7f05621862475e54ce89f1979e6b4ce5ffeee5

              SHA512

              dc09a87365df4732a311532cc7d8d42bb74fac31b22c2094aee08d08523f600b5f7e04db9ea7127b1bcedbc8b054287cee1264a418acb663a44b7661d7e4153a

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3549094.exe

              Filesize

              306KB

              MD5

              7fe45f0b60489d2ed1988b95bcfb5391

              SHA1

              85b1bf9a5f88b1e70875351ad5e82272d072d3e5

              SHA256

              8bad4015557951066f24cb7f69757aad0ca51b6a28f4958969d617ee14ac1055

              SHA512

              35b5622213aacded5b56656bb4bce55ed2b83176b3f63a4a53788593f2e49c538595ba68f5dd47dfb63a63ab94025fa991d8ae981de96869fe2485a838f3e59a

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3549094.exe

              Filesize

              306KB

              MD5

              7fe45f0b60489d2ed1988b95bcfb5391

              SHA1

              85b1bf9a5f88b1e70875351ad5e82272d072d3e5

              SHA256

              8bad4015557951066f24cb7f69757aad0ca51b6a28f4958969d617ee14ac1055

              SHA512

              35b5622213aacded5b56656bb4bce55ed2b83176b3f63a4a53788593f2e49c538595ba68f5dd47dfb63a63ab94025fa991d8ae981de96869fe2485a838f3e59a

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o9414700.exe

              Filesize

              185KB

              MD5

              faf9ce533326bb2010c25a4890bcdfa4

              SHA1

              87f95424a4d4e6321c48d9a97b4bb91078ebb1e5

              SHA256

              48906c159ed84fcb77528d36a2fe48b023f52aa8032891877ce51a166b5ee6f5

              SHA512

              c3a261a1cf9ba8f410efc291802efec8a34df483b73e2050e0d540f51a412f696e5855549c5e5bfea4da4fca6257523c0d96393544a835599ed9a2c5d7c988e5

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o9414700.exe

              Filesize

              185KB

              MD5

              faf9ce533326bb2010c25a4890bcdfa4

              SHA1

              87f95424a4d4e6321c48d9a97b4bb91078ebb1e5

              SHA256

              48906c159ed84fcb77528d36a2fe48b023f52aa8032891877ce51a166b5ee6f5

              SHA512

              c3a261a1cf9ba8f410efc291802efec8a34df483b73e2050e0d540f51a412f696e5855549c5e5bfea4da4fca6257523c0d96393544a835599ed9a2c5d7c988e5

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p6690329.exe

              Filesize

              145KB

              MD5

              c38bafac28394392efbf4d3f54154071

              SHA1

              bd17dcf6b4279e9ca5f534214136d21031863ea6

              SHA256

              bf0fd7d8184acadd92df1b094c2978696edb245fc63b9784bcf683ba69bcbb1a

              SHA512

              be98c461055ce1f2b6e091a51809067803abbe8bc9404da733ab5cdab7136f8862cdd3a40f3a61dea374a2c1a78e2c75a9c7e223037314edc2bc1e42a75c6799

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p6690329.exe

              Filesize

              145KB

              MD5

              c38bafac28394392efbf4d3f54154071

              SHA1

              bd17dcf6b4279e9ca5f534214136d21031863ea6

              SHA256

              bf0fd7d8184acadd92df1b094c2978696edb245fc63b9784bcf683ba69bcbb1a

              SHA512

              be98c461055ce1f2b6e091a51809067803abbe8bc9404da733ab5cdab7136f8862cdd3a40f3a61dea374a2c1a78e2c75a9c7e223037314edc2bc1e42a75c6799

            • memory/2672-198-0x0000000007AA0000-0x0000000007AB0000-memory.dmp

              Filesize

              64KB

            • memory/2672-197-0x0000000000CB0000-0x0000000000D98000-memory.dmp

              Filesize

              928KB

            • memory/3384-165-0x0000000002420000-0x0000000002436000-memory.dmp

              Filesize

              88KB

            • memory/3384-158-0x0000000002420000-0x0000000002436000-memory.dmp

              Filesize

              88KB

            • memory/3384-179-0x0000000002420000-0x0000000002436000-memory.dmp

              Filesize

              88KB

            • memory/3384-181-0x0000000002420000-0x0000000002436000-memory.dmp

              Filesize

              88KB

            • memory/3384-183-0x0000000002420000-0x0000000002436000-memory.dmp

              Filesize

              88KB

            • memory/3384-185-0x0000000002420000-0x0000000002436000-memory.dmp

              Filesize

              88KB

            • memory/3384-186-0x00000000024E0000-0x00000000024F0000-memory.dmp

              Filesize

              64KB

            • memory/3384-187-0x00000000024E0000-0x00000000024F0000-memory.dmp

              Filesize

              64KB

            • memory/3384-188-0x00000000024E0000-0x00000000024F0000-memory.dmp

              Filesize

              64KB

            • memory/3384-175-0x0000000002420000-0x0000000002436000-memory.dmp

              Filesize

              88KB

            • memory/3384-173-0x0000000002420000-0x0000000002436000-memory.dmp

              Filesize

              88KB

            • memory/3384-154-0x0000000004A60000-0x0000000005004000-memory.dmp

              Filesize

              5.6MB

            • memory/3384-171-0x0000000002420000-0x0000000002436000-memory.dmp

              Filesize

              88KB

            • memory/3384-169-0x0000000002420000-0x0000000002436000-memory.dmp

              Filesize

              88KB

            • memory/3384-167-0x0000000002420000-0x0000000002436000-memory.dmp

              Filesize

              88KB

            • memory/3384-163-0x0000000002420000-0x0000000002436000-memory.dmp

              Filesize

              88KB

            • memory/3384-161-0x0000000002420000-0x0000000002436000-memory.dmp

              Filesize

              88KB

            • memory/3384-159-0x0000000002420000-0x0000000002436000-memory.dmp

              Filesize

              88KB

            • memory/3384-155-0x00000000024E0000-0x00000000024F0000-memory.dmp

              Filesize

              64KB

            • memory/3384-177-0x0000000002420000-0x0000000002436000-memory.dmp

              Filesize

              88KB

            • memory/3384-157-0x00000000024E0000-0x00000000024F0000-memory.dmp

              Filesize

              64KB

            • memory/3384-156-0x00000000024E0000-0x00000000024F0000-memory.dmp

              Filesize

              64KB

            • memory/3432-220-0x0000000005630000-0x0000000005696000-memory.dmp

              Filesize

              408KB

            • memory/3432-221-0x00000000068D0000-0x0000000006946000-memory.dmp

              Filesize

              472KB

            • memory/3432-225-0x0000000007220000-0x000000000774C000-memory.dmp

              Filesize

              5.2MB

            • memory/3432-210-0x00000000056D0000-0x0000000005CE8000-memory.dmp

              Filesize

              6.1MB

            • memory/3432-211-0x0000000005250000-0x000000000535A000-memory.dmp

              Filesize

              1.0MB

            • memory/3432-212-0x0000000005180000-0x0000000005192000-memory.dmp

              Filesize

              72KB

            • memory/3432-213-0x0000000005210000-0x000000000524C000-memory.dmp

              Filesize

              240KB

            • memory/3432-214-0x00000000051C0000-0x00000000051D0000-memory.dmp

              Filesize

              64KB

            • memory/3432-224-0x0000000006B20000-0x0000000006CE2000-memory.dmp

              Filesize

              1.8MB

            • memory/3432-223-0x00000000051C0000-0x00000000051D0000-memory.dmp

              Filesize

              64KB

            • memory/3432-222-0x0000000006850000-0x00000000068A0000-memory.dmp

              Filesize

              320KB

            • memory/3432-219-0x0000000005520000-0x00000000055B2000-memory.dmp

              Filesize

              584KB

            • memory/3432-201-0x0000000000400000-0x000000000042A000-memory.dmp

              Filesize

              168KB

            • memory/4036-193-0x00000000002D0000-0x00000000002FA000-memory.dmp

              Filesize

              168KB

            • memory/4280-208-0x0000000000EE0000-0x0000000000FD6000-memory.dmp

              Filesize

              984KB

            • memory/4280-209-0x0000000007DC0000-0x0000000007DD0000-memory.dmp

              Filesize

              64KB

            • memory/4576-215-0x0000000000400000-0x0000000000438000-memory.dmp

              Filesize

              224KB