Analysis

  • max time kernel
    105s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/05/2023, 10:40

General

  • Target

    984b555e4c75f0e9e05f34ce61242efd870fe1c40bf05865b38830133fefa4f4.exe

  • Size

    1.1MB

  • MD5

    dd948a5403a4d6d185c0fc346db13fce

  • SHA1

    71941ff4e00b80cd171ca7cf14ca84ce5e75c333

  • SHA256

    984b555e4c75f0e9e05f34ce61242efd870fe1c40bf05865b38830133fefa4f4

  • SHA512

    407d118dd2d45b08af0efa42c8f35909c99dc44aa982a34cda1e4f6f38c89a1420cce321bed6ecd86b05c5d211b648c27540d9404f28272072aadf3e86ef1c11

  • SSDEEP

    24576:nypj8wsmyyteHDfq73bM6FaZa3kq9xNwOv0z+ydd:ypQweytKeLvfNmz9

Malware Config

Extracted

Family

redline

Botnet

derek

C2

185.161.248.75:4132

Attributes
  • auth_value

    c7030724b2b40537db5ba680b1d82ed2

Extracted

Family

redline

Botnet

warum

C2

185.161.248.75:4132

Attributes
  • auth_value

    0bdb2dda91dadc65f555dee088a6a2a4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\984b555e4c75f0e9e05f34ce61242efd870fe1c40bf05865b38830133fefa4f4.exe
    "C:\Users\Admin\AppData\Local\Temp\984b555e4c75f0e9e05f34ce61242efd870fe1c40bf05865b38830133fefa4f4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4956
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5515290.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5515290.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4276
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6859175.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6859175.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1120
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f6088459.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f6088459.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1896
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9821596.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9821596.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3556
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4065100.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4065100.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3440
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4065100.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4065100.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of UnmapMainImage
          PID:2228
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2228 -s 12
            5⤵
            • Program crash
            PID:3360
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9791747.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9791747.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2948
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9791747.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9791747.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2564
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2228 -ip 2228
    1⤵
      PID:2656

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\i9791747.exe.log

      Filesize

      425B

      MD5

      4eaca4566b22b01cd3bc115b9b0b2196

      SHA1

      e743e0792c19f71740416e7b3c061d9f1336bf94

      SHA256

      34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

      SHA512

      bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9791747.exe

      Filesize

      903KB

      MD5

      d498c13e99111875578a64b1b920ad75

      SHA1

      9b8fb73fc8d7245e110ecb997af1da3b36371617

      SHA256

      19048dfa7783c18ba97cb63db245f9b6053e2a42cd8bebbeb297567335f362f0

      SHA512

      34b688fc2471531aadc1b8235a56e5d94f5146b47bd818f915b42aae0412a8e62c484380210d212922abb4e59ed9e1f73e68105785f1e0e2ac18fe9f863bc0df

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9791747.exe

      Filesize

      903KB

      MD5

      d498c13e99111875578a64b1b920ad75

      SHA1

      9b8fb73fc8d7245e110ecb997af1da3b36371617

      SHA256

      19048dfa7783c18ba97cb63db245f9b6053e2a42cd8bebbeb297567335f362f0

      SHA512

      34b688fc2471531aadc1b8235a56e5d94f5146b47bd818f915b42aae0412a8e62c484380210d212922abb4e59ed9e1f73e68105785f1e0e2ac18fe9f863bc0df

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9791747.exe

      Filesize

      903KB

      MD5

      d498c13e99111875578a64b1b920ad75

      SHA1

      9b8fb73fc8d7245e110ecb997af1da3b36371617

      SHA256

      19048dfa7783c18ba97cb63db245f9b6053e2a42cd8bebbeb297567335f362f0

      SHA512

      34b688fc2471531aadc1b8235a56e5d94f5146b47bd818f915b42aae0412a8e62c484380210d212922abb4e59ed9e1f73e68105785f1e0e2ac18fe9f863bc0df

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5515290.exe

      Filesize

      750KB

      MD5

      08a10f62875657f1a9f0d3f410cfc1dd

      SHA1

      93635c501ceea4286930b86fb712fb4502279f48

      SHA256

      d3b9405477406003790084084f453ef095b956b625e005de0af7d3b028c50e09

      SHA512

      96909e914fd72e29a0a6096170d5f46ae26b72b3191536eb7f22c54f43ec22b9965011244788ec019589bf27af756eaab2f89e48bedfe1b359f76f0e465f4277

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5515290.exe

      Filesize

      750KB

      MD5

      08a10f62875657f1a9f0d3f410cfc1dd

      SHA1

      93635c501ceea4286930b86fb712fb4502279f48

      SHA256

      d3b9405477406003790084084f453ef095b956b625e005de0af7d3b028c50e09

      SHA512

      96909e914fd72e29a0a6096170d5f46ae26b72b3191536eb7f22c54f43ec22b9965011244788ec019589bf27af756eaab2f89e48bedfe1b359f76f0e465f4277

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4065100.exe

      Filesize

      963KB

      MD5

      b5fb9e9ebc61a5504f220dcb78583e33

      SHA1

      03f8cc6e3d0f448f37be354f9003430cc1aa12a5

      SHA256

      611917d391e559ccc3a1a822586b0a9be2b0596419582caba8186eb177d7cb53

      SHA512

      125307df9329f801df2b95c56739788982ecfa04c3c7329d8712ef517bee65a4fbb2246717b786de00439cb9ceb0ef48d370f8f191a48aaccbb536595ed30976

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4065100.exe

      Filesize

      963KB

      MD5

      b5fb9e9ebc61a5504f220dcb78583e33

      SHA1

      03f8cc6e3d0f448f37be354f9003430cc1aa12a5

      SHA256

      611917d391e559ccc3a1a822586b0a9be2b0596419582caba8186eb177d7cb53

      SHA512

      125307df9329f801df2b95c56739788982ecfa04c3c7329d8712ef517bee65a4fbb2246717b786de00439cb9ceb0ef48d370f8f191a48aaccbb536595ed30976

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h4065100.exe

      Filesize

      963KB

      MD5

      b5fb9e9ebc61a5504f220dcb78583e33

      SHA1

      03f8cc6e3d0f448f37be354f9003430cc1aa12a5

      SHA256

      611917d391e559ccc3a1a822586b0a9be2b0596419582caba8186eb177d7cb53

      SHA512

      125307df9329f801df2b95c56739788982ecfa04c3c7329d8712ef517bee65a4fbb2246717b786de00439cb9ceb0ef48d370f8f191a48aaccbb536595ed30976

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6859175.exe

      Filesize

      305KB

      MD5

      79f822e17573b198c3691b73661dc998

      SHA1

      6697096af9984acf183ac1929031e7e5f3382dae

      SHA256

      9241d7c97dddae7e5f8c1c86c1d42229a43405730df404eb33243be8deb5cfb3

      SHA512

      f5079e16bea37e00454d0bb3a239a556dc47c61aba74c9001925ce4b7e8de5130dccb9d30362d4f30a97c45c5d2c22d5b95da2093d08baf0ffbf69172031dcf0

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6859175.exe

      Filesize

      305KB

      MD5

      79f822e17573b198c3691b73661dc998

      SHA1

      6697096af9984acf183ac1929031e7e5f3382dae

      SHA256

      9241d7c97dddae7e5f8c1c86c1d42229a43405730df404eb33243be8deb5cfb3

      SHA512

      f5079e16bea37e00454d0bb3a239a556dc47c61aba74c9001925ce4b7e8de5130dccb9d30362d4f30a97c45c5d2c22d5b95da2093d08baf0ffbf69172031dcf0

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f6088459.exe

      Filesize

      145KB

      MD5

      b882aaff224bbbf637e9703f1c1a61fe

      SHA1

      4f46ff45340be70b4adc07c37f1ac4c575b348e4

      SHA256

      7d6f4a634ab38cb6c07272b0b6d3c1909e85be4a5b5dc1dcb2fca4e226fb82ca

      SHA512

      2291f05ae73d1716d11e5ce65568e5d06799cce7c563c11b6f0715d7fe1057345cd1ad3ca0ffc6d5f168ef8180c545b970e756fb91be73d19964fced2a384a47

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f6088459.exe

      Filesize

      145KB

      MD5

      b882aaff224bbbf637e9703f1c1a61fe

      SHA1

      4f46ff45340be70b4adc07c37f1ac4c575b348e4

      SHA256

      7d6f4a634ab38cb6c07272b0b6d3c1909e85be4a5b5dc1dcb2fca4e226fb82ca

      SHA512

      2291f05ae73d1716d11e5ce65568e5d06799cce7c563c11b6f0715d7fe1057345cd1ad3ca0ffc6d5f168ef8180c545b970e756fb91be73d19964fced2a384a47

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9821596.exe

      Filesize

      183KB

      MD5

      dd8ec52d28b50877ea6d31ede51616f5

      SHA1

      06aa6872085340fcb034587c187e55dabd4f662d

      SHA256

      e7c3a7bcc77eae312029350d92687a293f92c0ce901ed86096e82660a8b79dab

      SHA512

      e43d7f58ac1e2d45e21e6dd7374b5cde02c86ece362f374918eb5c3b76e50616a3552d8d2cf82208fbb99af1abc83b6b34af633037c79493169da862ab8b085b

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9821596.exe

      Filesize

      183KB

      MD5

      dd8ec52d28b50877ea6d31ede51616f5

      SHA1

      06aa6872085340fcb034587c187e55dabd4f662d

      SHA256

      e7c3a7bcc77eae312029350d92687a293f92c0ce901ed86096e82660a8b79dab

      SHA512

      e43d7f58ac1e2d45e21e6dd7374b5cde02c86ece362f374918eb5c3b76e50616a3552d8d2cf82208fbb99af1abc83b6b34af633037c79493169da862ab8b085b

    • memory/1896-166-0x0000000006F80000-0x00000000074AC000-memory.dmp

      Filesize

      5.2MB

    • memory/1896-158-0x0000000004F00000-0x0000000004F3C000-memory.dmp

      Filesize

      240KB

    • memory/1896-165-0x0000000006880000-0x0000000006A42000-memory.dmp

      Filesize

      1.8MB

    • memory/1896-163-0x0000000005F20000-0x0000000005F96000-memory.dmp

      Filesize

      472KB

    • memory/1896-167-0x0000000005250000-0x0000000005260000-memory.dmp

      Filesize

      64KB

    • memory/1896-162-0x0000000005E00000-0x0000000005E92000-memory.dmp

      Filesize

      584KB

    • memory/1896-161-0x00000000062D0000-0x0000000006874000-memory.dmp

      Filesize

      5.6MB

    • memory/1896-154-0x00000000004D0000-0x00000000004FA000-memory.dmp

      Filesize

      168KB

    • memory/1896-155-0x00000000053F0000-0x0000000005A08000-memory.dmp

      Filesize

      6.1MB

    • memory/1896-160-0x0000000005360000-0x00000000053C6000-memory.dmp

      Filesize

      408KB

    • memory/1896-159-0x0000000005250000-0x0000000005260000-memory.dmp

      Filesize

      64KB

    • memory/1896-164-0x0000000005FA0000-0x0000000005FF0000-memory.dmp

      Filesize

      320KB

    • memory/1896-156-0x0000000004F70000-0x000000000507A000-memory.dmp

      Filesize

      1.0MB

    • memory/1896-157-0x0000000004EA0000-0x0000000004EB2000-memory.dmp

      Filesize

      72KB

    • memory/2228-209-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/2564-217-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2564-221-0x0000000005280000-0x0000000005290000-memory.dmp

      Filesize

      64KB

    • memory/2948-215-0x0000000000D60000-0x0000000000E48000-memory.dmp

      Filesize

      928KB

    • memory/2948-216-0x0000000007C20000-0x0000000007C30000-memory.dmp

      Filesize

      64KB

    • memory/3440-208-0x0000000006EC0000-0x0000000006ED0000-memory.dmp

      Filesize

      64KB

    • memory/3440-207-0x0000000000050000-0x0000000000148000-memory.dmp

      Filesize

      992KB

    • memory/3556-179-0x0000000004F20000-0x0000000004F36000-memory.dmp

      Filesize

      88KB

    • memory/3556-200-0x0000000004910000-0x0000000004920000-memory.dmp

      Filesize

      64KB

    • memory/3556-202-0x0000000004910000-0x0000000004920000-memory.dmp

      Filesize

      64KB

    • memory/3556-201-0x0000000004910000-0x0000000004920000-memory.dmp

      Filesize

      64KB

    • memory/3556-199-0x0000000004F20000-0x0000000004F36000-memory.dmp

      Filesize

      88KB

    • memory/3556-197-0x0000000004F20000-0x0000000004F36000-memory.dmp

      Filesize

      88KB

    • memory/3556-195-0x0000000004F20000-0x0000000004F36000-memory.dmp

      Filesize

      88KB

    • memory/3556-193-0x0000000004F20000-0x0000000004F36000-memory.dmp

      Filesize

      88KB

    • memory/3556-191-0x0000000004F20000-0x0000000004F36000-memory.dmp

      Filesize

      88KB

    • memory/3556-189-0x0000000004F20000-0x0000000004F36000-memory.dmp

      Filesize

      88KB

    • memory/3556-187-0x0000000004F20000-0x0000000004F36000-memory.dmp

      Filesize

      88KB

    • memory/3556-185-0x0000000004F20000-0x0000000004F36000-memory.dmp

      Filesize

      88KB

    • memory/3556-183-0x0000000004F20000-0x0000000004F36000-memory.dmp

      Filesize

      88KB

    • memory/3556-181-0x0000000004F20000-0x0000000004F36000-memory.dmp

      Filesize

      88KB

    • memory/3556-177-0x0000000004F20000-0x0000000004F36000-memory.dmp

      Filesize

      88KB

    • memory/3556-175-0x0000000004F20000-0x0000000004F36000-memory.dmp

      Filesize

      88KB

    • memory/3556-173-0x0000000004F20000-0x0000000004F36000-memory.dmp

      Filesize

      88KB

    • memory/3556-172-0x0000000004F20000-0x0000000004F36000-memory.dmp

      Filesize

      88KB