Analysis

  • max time kernel
    135s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-05-2023 07:04

General

  • Target

    c9388dc97b2dae1c29c91f87fe5bc3ad7c451e7f2f49b4baf6df374c718ed755.exe

  • Size

    1.1MB

  • MD5

    622b266b1e29dc459b9a97f0341cf6d9

  • SHA1

    c856cf21867f3ddbb7ed38a2f961b8424eae472c

  • SHA256

    c9388dc97b2dae1c29c91f87fe5bc3ad7c451e7f2f49b4baf6df374c718ed755

  • SHA512

    316876cdb6a2a97ae4fd965a888b79f076dc92736e2d9c2c236889aac89c0259267a80fec852f98819667ae77bb3d7ce88dd79c66b65654d3b678ba1f3332939

  • SSDEEP

    24576:+yLjpZxck7mzcHP5fAWzQ1j/YZw4z4H73G:NDH7ScH7Z

Malware Config

Extracted

Family

redline

Botnet

luka

C2

185.161.248.75:4132

Attributes
  • auth_value

    44560bcd37d6bf076da309730fdb519a

Extracted

Family

redline

Botnet

terra

C2

185.161.248.75:4132

Attributes
  • auth_value

    60df3f535f8aa4e264f78041983592d2

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c9388dc97b2dae1c29c91f87fe5bc3ad7c451e7f2f49b4baf6df374c718ed755.exe
    "C:\Users\Admin\AppData\Local\Temp\c9388dc97b2dae1c29c91f87fe5bc3ad7c451e7f2f49b4baf6df374c718ed755.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1578886.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1578886.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4912
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8496343.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8496343.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4200
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4141883.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4141883.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2388
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1678892.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1678892.exe
          4⤵
          • Executes dropped EXE
          PID:1784
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1784 -s 928
            5⤵
            • Program crash
            PID:2404
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6037784.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6037784.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1068
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6037784.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6037784.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2244
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1308547.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1308547.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3380
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1308547.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1308547.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of UnmapMainImage
        PID:556
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 556 -s 12
          4⤵
          • Program crash
          PID:4024
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1784 -ip 1784
    1⤵
      PID:1852
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 556 -ip 556
      1⤵
        PID:4524

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\r6037784.exe.log
        Filesize

        425B

        MD5

        4eaca4566b22b01cd3bc115b9b0b2196

        SHA1

        e743e0792c19f71740416e7b3c061d9f1336bf94

        SHA256

        34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

        SHA512

        bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1308547.exe
        Filesize

        961KB

        MD5

        e43ee94eb427d63aff51caf6cf853246

        SHA1

        6b2bd3b4f563a939b8845f784fb4c07c4b3df8a9

        SHA256

        b68b6bccdb475fdd1b8a5f1121caacd9628a4115236828983ae2ddf754474dd7

        SHA512

        86f26117629e39043fd56cfa8c69bec7456350fcdac66cbffc02f2617eb96a5c29d3ea49360fafefe8d598d1c7e2afcad27cbc3ec627f9e1d66711c93a537659

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1308547.exe
        Filesize

        961KB

        MD5

        e43ee94eb427d63aff51caf6cf853246

        SHA1

        6b2bd3b4f563a939b8845f784fb4c07c4b3df8a9

        SHA256

        b68b6bccdb475fdd1b8a5f1121caacd9628a4115236828983ae2ddf754474dd7

        SHA512

        86f26117629e39043fd56cfa8c69bec7456350fcdac66cbffc02f2617eb96a5c29d3ea49360fafefe8d598d1c7e2afcad27cbc3ec627f9e1d66711c93a537659

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1308547.exe
        Filesize

        961KB

        MD5

        e43ee94eb427d63aff51caf6cf853246

        SHA1

        6b2bd3b4f563a939b8845f784fb4c07c4b3df8a9

        SHA256

        b68b6bccdb475fdd1b8a5f1121caacd9628a4115236828983ae2ddf754474dd7

        SHA512

        86f26117629e39043fd56cfa8c69bec7456350fcdac66cbffc02f2617eb96a5c29d3ea49360fafefe8d598d1c7e2afcad27cbc3ec627f9e1d66711c93a537659

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1578886.exe
        Filesize

        702KB

        MD5

        9936d1f8c2f3d4300908a380b9f50f89

        SHA1

        faca5bb0220d2126cb4e737dc7f0f843044dc806

        SHA256

        c1738ea185ae8c9fe0559d48920acd6d26eb6a1ebf76f99dbbc44fe95f93a6dd

        SHA512

        5aa8d19de1eba65d959c1a63ab0acce51deea0ed7a1a2c46584d95e5a2429736097f5797e5ffe624e298b7a85df7a4dd5efb794456c3814822640939210b39e3

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z1578886.exe
        Filesize

        702KB

        MD5

        9936d1f8c2f3d4300908a380b9f50f89

        SHA1

        faca5bb0220d2126cb4e737dc7f0f843044dc806

        SHA256

        c1738ea185ae8c9fe0559d48920acd6d26eb6a1ebf76f99dbbc44fe95f93a6dd

        SHA512

        5aa8d19de1eba65d959c1a63ab0acce51deea0ed7a1a2c46584d95e5a2429736097f5797e5ffe624e298b7a85df7a4dd5efb794456c3814822640939210b39e3

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6037784.exe
        Filesize

        904KB

        MD5

        9fe14ad07deb3ad083114fb75a61e8be

        SHA1

        1a77dd3239349b4b35c81b7b0058fa6ac6b6caf0

        SHA256

        0c7410794e9e167b1b725a4a58a5dfc27b01d1030aaaed1342c15e5805090c7b

        SHA512

        12e601f36a1bfa13839ab691f81ba887064840d7d4945148bb11847e55d91b449b8f75cacfbee26d04a8c2613723efecf32011dfaa56791cc772cca09cd7726c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6037784.exe
        Filesize

        904KB

        MD5

        9fe14ad07deb3ad083114fb75a61e8be

        SHA1

        1a77dd3239349b4b35c81b7b0058fa6ac6b6caf0

        SHA256

        0c7410794e9e167b1b725a4a58a5dfc27b01d1030aaaed1342c15e5805090c7b

        SHA512

        12e601f36a1bfa13839ab691f81ba887064840d7d4945148bb11847e55d91b449b8f75cacfbee26d04a8c2613723efecf32011dfaa56791cc772cca09cd7726c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r6037784.exe
        Filesize

        904KB

        MD5

        9fe14ad07deb3ad083114fb75a61e8be

        SHA1

        1a77dd3239349b4b35c81b7b0058fa6ac6b6caf0

        SHA256

        0c7410794e9e167b1b725a4a58a5dfc27b01d1030aaaed1342c15e5805090c7b

        SHA512

        12e601f36a1bfa13839ab691f81ba887064840d7d4945148bb11847e55d91b449b8f75cacfbee26d04a8c2613723efecf32011dfaa56791cc772cca09cd7726c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8496343.exe
        Filesize

        306KB

        MD5

        d6379f14b6e52b25d0b4d75166b95cb5

        SHA1

        ab57b99ac1ec7b5abe0d81715faa7a8310a59e74

        SHA256

        57d43ceccf836b6d6e07e1f31d909927d40b7be0778911a42164f2079473e8e5

        SHA512

        2c7570c0759a180006ebcd0ce4284f74802d505ba97c6a0e0d948588a57a2d9fbc373003bb2cf2ed3aeece832c7b898931d3bac651f182733872740435c54a24

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z8496343.exe
        Filesize

        306KB

        MD5

        d6379f14b6e52b25d0b4d75166b95cb5

        SHA1

        ab57b99ac1ec7b5abe0d81715faa7a8310a59e74

        SHA256

        57d43ceccf836b6d6e07e1f31d909927d40b7be0778911a42164f2079473e8e5

        SHA512

        2c7570c0759a180006ebcd0ce4284f74802d505ba97c6a0e0d948588a57a2d9fbc373003bb2cf2ed3aeece832c7b898931d3bac651f182733872740435c54a24

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4141883.exe
        Filesize

        185KB

        MD5

        f12019dafbd39dd4e5fc49c3878738e8

        SHA1

        7306369f0c2b0d4cb13cb4656f1da908fd0f3276

        SHA256

        75ba4b28060aa7fc8f3c1f13a2ac55742e139eabf762ee34ad1c49bc0a3b2f73

        SHA512

        41affe693019daa49f7df7d09b792e3bdb0756a8517ae74d10e691e6bd5d25b21a399c3bcd95007bef64f07f41a71524cfe19f639bf04e207d581feaf72cbaee

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4141883.exe
        Filesize

        185KB

        MD5

        f12019dafbd39dd4e5fc49c3878738e8

        SHA1

        7306369f0c2b0d4cb13cb4656f1da908fd0f3276

        SHA256

        75ba4b28060aa7fc8f3c1f13a2ac55742e139eabf762ee34ad1c49bc0a3b2f73

        SHA512

        41affe693019daa49f7df7d09b792e3bdb0756a8517ae74d10e691e6bd5d25b21a399c3bcd95007bef64f07f41a71524cfe19f639bf04e207d581feaf72cbaee

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1678892.exe
        Filesize

        145KB

        MD5

        265564779b7e9fdc33bd5287e0bdbeef

        SHA1

        3fc4769be741c82a3eb77c0e4c3e34f3cc96c664

        SHA256

        50af197b07f7004cf89e3fc1f203234901e1400eedcceb5ab9325cc961b23b0f

        SHA512

        5c687f41b36f6ceacfd1449c7fb909fac8c082383682e0c04f20457ff8117aeafb1765d015382d1d5396ca859337f414ce754aa949be8254bef57c5a0cd9cfc8

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1678892.exe
        Filesize

        145KB

        MD5

        265564779b7e9fdc33bd5287e0bdbeef

        SHA1

        3fc4769be741c82a3eb77c0e4c3e34f3cc96c664

        SHA256

        50af197b07f7004cf89e3fc1f203234901e1400eedcceb5ab9325cc961b23b0f

        SHA512

        5c687f41b36f6ceacfd1449c7fb909fac8c082383682e0c04f20457ff8117aeafb1765d015382d1d5396ca859337f414ce754aa949be8254bef57c5a0cd9cfc8

      • memory/556-210-0x0000000000400000-0x0000000000438000-memory.dmp
        Filesize

        224KB

      • memory/556-215-0x0000000000360000-0x0000000000360000-memory.dmp
      • memory/1068-195-0x0000000007680000-0x0000000007690000-memory.dmp
        Filesize

        64KB

      • memory/1068-194-0x0000000000820000-0x0000000000908000-memory.dmp
        Filesize

        928KB

      • memory/1784-190-0x00000000001D0000-0x00000000001FA000-memory.dmp
        Filesize

        168KB

      • memory/2244-205-0x00000000050A0000-0x00000000051AA000-memory.dmp
        Filesize

        1.0MB

      • memory/2244-204-0x0000000005540000-0x0000000005B58000-memory.dmp
        Filesize

        6.1MB

      • memory/2244-220-0x0000000005020000-0x0000000005030000-memory.dmp
        Filesize

        64KB

      • memory/2244-219-0x0000000006810000-0x0000000006860000-memory.dmp
        Filesize

        320KB

      • memory/2244-218-0x0000000006A60000-0x0000000006AD6000-memory.dmp
        Filesize

        472KB

      • memory/2244-217-0x0000000006F90000-0x00000000074BC000-memory.dmp
        Filesize

        5.2MB

      • memory/2244-216-0x0000000006890000-0x0000000006A52000-memory.dmp
        Filesize

        1.8MB

      • memory/2244-214-0x0000000005410000-0x0000000005476000-memory.dmp
        Filesize

        408KB

      • memory/2244-213-0x0000000005370000-0x0000000005402000-memory.dmp
        Filesize

        584KB

      • memory/2244-209-0x00000000051B0000-0x00000000051EC000-memory.dmp
        Filesize

        240KB

      • memory/2244-208-0x0000000005020000-0x0000000005030000-memory.dmp
        Filesize

        64KB

      • memory/2244-206-0x0000000004FD0000-0x0000000004FE2000-memory.dmp
        Filesize

        72KB

      • memory/2244-196-0x0000000000400000-0x000000000042A000-memory.dmp
        Filesize

        168KB

      • memory/2388-155-0x0000000002090000-0x00000000020A0000-memory.dmp
        Filesize

        64KB

      • memory/2388-156-0x0000000002090000-0x00000000020A0000-memory.dmp
        Filesize

        64KB

      • memory/2388-159-0x0000000004F20000-0x0000000004F36000-memory.dmp
        Filesize

        88KB

      • memory/2388-158-0x0000000004F20000-0x0000000004F36000-memory.dmp
        Filesize

        88KB

      • memory/2388-181-0x0000000004F20000-0x0000000004F36000-memory.dmp
        Filesize

        88KB

      • memory/2388-163-0x0000000004F20000-0x0000000004F36000-memory.dmp
        Filesize

        88KB

      • memory/2388-157-0x0000000004920000-0x0000000004EC4000-memory.dmp
        Filesize

        5.6MB

      • memory/2388-165-0x0000000004F20000-0x0000000004F36000-memory.dmp
        Filesize

        88KB

      • memory/2388-183-0x0000000004F20000-0x0000000004F36000-memory.dmp
        Filesize

        88KB

      • memory/2388-167-0x0000000004F20000-0x0000000004F36000-memory.dmp
        Filesize

        88KB

      • memory/2388-169-0x0000000004F20000-0x0000000004F36000-memory.dmp
        Filesize

        88KB

      • memory/2388-161-0x0000000004F20000-0x0000000004F36000-memory.dmp
        Filesize

        88KB

      • memory/2388-179-0x0000000004F20000-0x0000000004F36000-memory.dmp
        Filesize

        88KB

      • memory/2388-171-0x0000000004F20000-0x0000000004F36000-memory.dmp
        Filesize

        88KB

      • memory/2388-173-0x0000000004F20000-0x0000000004F36000-memory.dmp
        Filesize

        88KB

      • memory/2388-154-0x0000000002090000-0x00000000020A0000-memory.dmp
        Filesize

        64KB

      • memory/2388-175-0x0000000004F20000-0x0000000004F36000-memory.dmp
        Filesize

        88KB

      • memory/2388-177-0x0000000004F20000-0x0000000004F36000-memory.dmp
        Filesize

        88KB

      • memory/2388-185-0x0000000004F20000-0x0000000004F36000-memory.dmp
        Filesize

        88KB

      • memory/3380-207-0x0000000007430000-0x0000000007440000-memory.dmp
        Filesize

        64KB

      • memory/3380-203-0x0000000000580000-0x0000000000676000-memory.dmp
        Filesize

        984KB