Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-05-2023 07:41

General

  • Target

    9f11fafedd2431c67115fc8b1eea3acd087802f5a3770a0a57906231726cae89.exe

  • Size

    1.1MB

  • MD5

    72361b9ac961ae2ec3e94022f1ccb0a6

  • SHA1

    e93797dc19520ba933ffb860449c12b5c6beccdd

  • SHA256

    9f11fafedd2431c67115fc8b1eea3acd087802f5a3770a0a57906231726cae89

  • SHA512

    20807737781e7f55d716185ccf585658bc3d0bc4b78c52e9185742297cb5a64558e51eadecd145a232078c0e70e7cde79b088727adf00883b2d121b23e0f4b8f

  • SSDEEP

    24576:5ygV7gU38KOObckOMCYOMSNdA3kLfycOBVh1YWNmo:sgiUlOUckOMCBiUTyvY

Malware Config

Extracted

Family

redline

Botnet

luka

C2

185.161.248.75:4132

Attributes
  • auth_value

    44560bcd37d6bf076da309730fdb519a

Extracted

Family

redline

Botnet

terra

C2

185.161.248.75:4132

Attributes
  • auth_value

    60df3f535f8aa4e264f78041983592d2

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f11fafedd2431c67115fc8b1eea3acd087802f5a3770a0a57906231726cae89.exe
    "C:\Users\Admin\AppData\Local\Temp\9f11fafedd2431c67115fc8b1eea3acd087802f5a3770a0a57906231726cae89.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:228
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2427314.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2427314.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1656
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4621129.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4621129.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:652
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4121760.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4121760.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2184
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p7935157.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p7935157.exe
          4⤵
          • Executes dropped EXE
          PID:824
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 824 -s 928
            5⤵
            • Program crash
            PID:1824
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4381038.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4381038.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3296
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4381038.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4381038.exe
          4⤵
          • Executes dropped EXE
          PID:2820
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4381038.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4381038.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4464
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s9868492.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s9868492.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4944
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s9868492.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s9868492.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of UnmapMainImage
        PID:2132
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 12
          4⤵
          • Program crash
          PID:4744
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 824 -ip 824
    1⤵
      PID:1816
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2132 -ip 2132
      1⤵
        PID:1472
      • C:\Windows\system32\sc.exe
        C:\Windows\system32\sc.exe start wuauserv
        1⤵
        • Launches sc.exe
        PID:1608

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\r4381038.exe.log
        Filesize

        425B

        MD5

        4eaca4566b22b01cd3bc115b9b0b2196

        SHA1

        e743e0792c19f71740416e7b3c061d9f1336bf94

        SHA256

        34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

        SHA512

        bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s9868492.exe
        Filesize

        961KB

        MD5

        776adfc7ed3705fd0930ba7f773cb8fe

        SHA1

        79731d62afb9e8dba31e070a6e191fb54dc217ba

        SHA256

        5d7a35afdae4aa87d17028f2ab121b368fc056e9c6e225372c44fe0ed8c51960

        SHA512

        702640924022a74033e8704778572b3b486bd00defff3fe781e16572ba1c3a6ae51d2ebc8a40d858278592c04a6d36bd9c7bf05c7c7e991dc551223e64dffb78

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s9868492.exe
        Filesize

        961KB

        MD5

        776adfc7ed3705fd0930ba7f773cb8fe

        SHA1

        79731d62afb9e8dba31e070a6e191fb54dc217ba

        SHA256

        5d7a35afdae4aa87d17028f2ab121b368fc056e9c6e225372c44fe0ed8c51960

        SHA512

        702640924022a74033e8704778572b3b486bd00defff3fe781e16572ba1c3a6ae51d2ebc8a40d858278592c04a6d36bd9c7bf05c7c7e991dc551223e64dffb78

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s9868492.exe
        Filesize

        961KB

        MD5

        776adfc7ed3705fd0930ba7f773cb8fe

        SHA1

        79731d62afb9e8dba31e070a6e191fb54dc217ba

        SHA256

        5d7a35afdae4aa87d17028f2ab121b368fc056e9c6e225372c44fe0ed8c51960

        SHA512

        702640924022a74033e8704778572b3b486bd00defff3fe781e16572ba1c3a6ae51d2ebc8a40d858278592c04a6d36bd9c7bf05c7c7e991dc551223e64dffb78

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2427314.exe
        Filesize

        702KB

        MD5

        ea7e03b063b764d4a33aa050255eb572

        SHA1

        6e72363f75dc7313e239fe0d9ab4dafca909bae2

        SHA256

        da7b0beef0c648f81f511ac269b4281c981346eca1f213fb143f52c1145530bb

        SHA512

        cb14e53d0961827f3607ab7ae43076f98c0d896d6079564b7b14f416fdd1e1e4e273b743ab9dd00c623e2ff5c2a3ae31f84062cf976b24390af82ccb1cb09761

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2427314.exe
        Filesize

        702KB

        MD5

        ea7e03b063b764d4a33aa050255eb572

        SHA1

        6e72363f75dc7313e239fe0d9ab4dafca909bae2

        SHA256

        da7b0beef0c648f81f511ac269b4281c981346eca1f213fb143f52c1145530bb

        SHA512

        cb14e53d0961827f3607ab7ae43076f98c0d896d6079564b7b14f416fdd1e1e4e273b743ab9dd00c623e2ff5c2a3ae31f84062cf976b24390af82ccb1cb09761

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4381038.exe
        Filesize

        905KB

        MD5

        474d34638b034d85552ab4f3fa83dc76

        SHA1

        dc7c2218b856dc8d784c96d6d6ab858b4a69dca4

        SHA256

        bb87ec91755b9bf43da17dfad82034ac8f93a6bcf99447fde9406e8a1414cdba

        SHA512

        38caf1e224706894c53341a7e9a5ee818d1988180f93416690139051857c7d1d926926981a8a5caa2cb605f09313f773c2de41217a5d3bd6347edc6d31a153ae

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4381038.exe
        Filesize

        905KB

        MD5

        474d34638b034d85552ab4f3fa83dc76

        SHA1

        dc7c2218b856dc8d784c96d6d6ab858b4a69dca4

        SHA256

        bb87ec91755b9bf43da17dfad82034ac8f93a6bcf99447fde9406e8a1414cdba

        SHA512

        38caf1e224706894c53341a7e9a5ee818d1988180f93416690139051857c7d1d926926981a8a5caa2cb605f09313f773c2de41217a5d3bd6347edc6d31a153ae

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4381038.exe
        Filesize

        905KB

        MD5

        474d34638b034d85552ab4f3fa83dc76

        SHA1

        dc7c2218b856dc8d784c96d6d6ab858b4a69dca4

        SHA256

        bb87ec91755b9bf43da17dfad82034ac8f93a6bcf99447fde9406e8a1414cdba

        SHA512

        38caf1e224706894c53341a7e9a5ee818d1988180f93416690139051857c7d1d926926981a8a5caa2cb605f09313f773c2de41217a5d3bd6347edc6d31a153ae

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r4381038.exe
        Filesize

        905KB

        MD5

        474d34638b034d85552ab4f3fa83dc76

        SHA1

        dc7c2218b856dc8d784c96d6d6ab858b4a69dca4

        SHA256

        bb87ec91755b9bf43da17dfad82034ac8f93a6bcf99447fde9406e8a1414cdba

        SHA512

        38caf1e224706894c53341a7e9a5ee818d1988180f93416690139051857c7d1d926926981a8a5caa2cb605f09313f773c2de41217a5d3bd6347edc6d31a153ae

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4621129.exe
        Filesize

        306KB

        MD5

        11dcc7eaca5aac80005ee12173d4e8f6

        SHA1

        649c031de38c908109ffa5ace5e691fbe495ba10

        SHA256

        43af8c4054d0a07b350b4c294896f16777302f710583a319eab0d944a698ce2c

        SHA512

        145523af2c306674a9d74bb8ff44792eac7715fbb41c56e8e7fb50390c09aab63bd432df7dfe4178a7ffecb7ec6240f99c7c9a1acfc5ba181713c82b1b94f7b7

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4621129.exe
        Filesize

        306KB

        MD5

        11dcc7eaca5aac80005ee12173d4e8f6

        SHA1

        649c031de38c908109ffa5ace5e691fbe495ba10

        SHA256

        43af8c4054d0a07b350b4c294896f16777302f710583a319eab0d944a698ce2c

        SHA512

        145523af2c306674a9d74bb8ff44792eac7715fbb41c56e8e7fb50390c09aab63bd432df7dfe4178a7ffecb7ec6240f99c7c9a1acfc5ba181713c82b1b94f7b7

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4121760.exe
        Filesize

        185KB

        MD5

        56205c6f5577698cff55e2d9f4a12b6d

        SHA1

        661ca413a809e4944b8062d3af90b3465c6904fa

        SHA256

        e3d17d5fcaba58bd0ed2fdc24107554d55b17f0fecc441c2ca8105f31c3ac07d

        SHA512

        78ac675c4bfb2a560c5b30b3b244e6a0eb03b88174aae85b643da81d5e84bf716b63dd11b2f8a2920e9e85e66850311a71a2a5b8203fcaa5338cca89e0612b98

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o4121760.exe
        Filesize

        185KB

        MD5

        56205c6f5577698cff55e2d9f4a12b6d

        SHA1

        661ca413a809e4944b8062d3af90b3465c6904fa

        SHA256

        e3d17d5fcaba58bd0ed2fdc24107554d55b17f0fecc441c2ca8105f31c3ac07d

        SHA512

        78ac675c4bfb2a560c5b30b3b244e6a0eb03b88174aae85b643da81d5e84bf716b63dd11b2f8a2920e9e85e66850311a71a2a5b8203fcaa5338cca89e0612b98

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p7935157.exe
        Filesize

        145KB

        MD5

        0c487bf083aceca95866ac96176bbc4d

        SHA1

        98edd695b88dfe5c9a6277e0b36264cd9371517a

        SHA256

        bfc4a3a03a2ba1d1c0c2702319aac204ba4d09406002ed267eb8ed114cb9206c

        SHA512

        c288e1dabf9fe60048511dd55de32827b9be806cba02ad58eb5fb5380d959f42df4acbd88f0aea88dbf99374f2a22c9625812b20d6754f6ddf0f7d0a15b8140e

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p7935157.exe
        Filesize

        145KB

        MD5

        0c487bf083aceca95866ac96176bbc4d

        SHA1

        98edd695b88dfe5c9a6277e0b36264cd9371517a

        SHA256

        bfc4a3a03a2ba1d1c0c2702319aac204ba4d09406002ed267eb8ed114cb9206c

        SHA512

        c288e1dabf9fe60048511dd55de32827b9be806cba02ad58eb5fb5380d959f42df4acbd88f0aea88dbf99374f2a22c9625812b20d6754f6ddf0f7d0a15b8140e

      • memory/824-193-0x0000000000EA0000-0x0000000000ECA000-memory.dmp
        Filesize

        168KB

      • memory/2132-214-0x0000000000400000-0x0000000000438000-memory.dmp
        Filesize

        224KB

      • memory/2132-218-0x0000000000340000-0x0000000000340000-memory.dmp
      • memory/2184-165-0x0000000004AA0000-0x0000000004AB6000-memory.dmp
        Filesize

        88KB

      • memory/2184-158-0x0000000004AA0000-0x0000000004AB6000-memory.dmp
        Filesize

        88KB

      • memory/2184-179-0x0000000004AA0000-0x0000000004AB6000-memory.dmp
        Filesize

        88KB

      • memory/2184-181-0x0000000004AA0000-0x0000000004AB6000-memory.dmp
        Filesize

        88KB

      • memory/2184-183-0x0000000004AA0000-0x0000000004AB6000-memory.dmp
        Filesize

        88KB

      • memory/2184-185-0x0000000004AA0000-0x0000000004AB6000-memory.dmp
        Filesize

        88KB

      • memory/2184-186-0x0000000004B50000-0x0000000004B60000-memory.dmp
        Filesize

        64KB

      • memory/2184-187-0x0000000004B50000-0x0000000004B60000-memory.dmp
        Filesize

        64KB

      • memory/2184-188-0x0000000004B50000-0x0000000004B60000-memory.dmp
        Filesize

        64KB

      • memory/2184-175-0x0000000004AA0000-0x0000000004AB6000-memory.dmp
        Filesize

        88KB

      • memory/2184-173-0x0000000004AA0000-0x0000000004AB6000-memory.dmp
        Filesize

        88KB

      • memory/2184-171-0x0000000004AA0000-0x0000000004AB6000-memory.dmp
        Filesize

        88KB

      • memory/2184-169-0x0000000004AA0000-0x0000000004AB6000-memory.dmp
        Filesize

        88KB

      • memory/2184-167-0x0000000004AA0000-0x0000000004AB6000-memory.dmp
        Filesize

        88KB

      • memory/2184-154-0x0000000004B60000-0x0000000005104000-memory.dmp
        Filesize

        5.6MB

      • memory/2184-155-0x0000000004B50000-0x0000000004B60000-memory.dmp
        Filesize

        64KB

      • memory/2184-163-0x0000000004AA0000-0x0000000004AB6000-memory.dmp
        Filesize

        88KB

      • memory/2184-156-0x0000000004B50000-0x0000000004B60000-memory.dmp
        Filesize

        64KB

      • memory/2184-161-0x0000000004AA0000-0x0000000004AB6000-memory.dmp
        Filesize

        88KB

      • memory/2184-177-0x0000000004AA0000-0x0000000004AB6000-memory.dmp
        Filesize

        88KB

      • memory/2184-159-0x0000000004AA0000-0x0000000004AB6000-memory.dmp
        Filesize

        88KB

      • memory/2184-157-0x0000000004B50000-0x0000000004B60000-memory.dmp
        Filesize

        64KB

      • memory/3296-198-0x0000000006E10000-0x0000000006E20000-memory.dmp
        Filesize

        64KB

      • memory/3296-197-0x0000000000070000-0x0000000000158000-memory.dmp
        Filesize

        928KB

      • memory/4464-211-0x0000000005040000-0x0000000005052000-memory.dmp
        Filesize

        72KB

      • memory/4464-208-0x0000000005590000-0x0000000005BA8000-memory.dmp
        Filesize

        6.1MB

      • memory/4464-225-0x00000000061C0000-0x0000000006210000-memory.dmp
        Filesize

        320KB

      • memory/4464-212-0x00000000050A0000-0x00000000050DC000-memory.dmp
        Filesize

        240KB

      • memory/4464-213-0x0000000005390000-0x00000000053A0000-memory.dmp
        Filesize

        64KB

      • memory/4464-200-0x0000000000400000-0x000000000042A000-memory.dmp
        Filesize

        168KB

      • memory/4464-224-0x00000000063F0000-0x0000000006466000-memory.dmp
        Filesize

        472KB

      • memory/4464-210-0x0000000005110000-0x000000000521A000-memory.dmp
        Filesize

        1.0MB

      • memory/4464-219-0x0000000005410000-0x0000000005476000-memory.dmp
        Filesize

        408KB

      • memory/4464-220-0x0000000005FA0000-0x0000000006032000-memory.dmp
        Filesize

        584KB

      • memory/4464-221-0x0000000006220000-0x00000000063E2000-memory.dmp
        Filesize

        1.8MB

      • memory/4464-222-0x0000000006F50000-0x000000000747C000-memory.dmp
        Filesize

        5.2MB

      • memory/4464-223-0x0000000005390000-0x00000000053A0000-memory.dmp
        Filesize

        64KB

      • memory/4944-209-0x0000000007C30000-0x0000000007C40000-memory.dmp
        Filesize

        64KB

      • memory/4944-207-0x0000000000D40000-0x0000000000E36000-memory.dmp
        Filesize

        984KB