Analysis

  • max time kernel
    95s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/05/2023, 16:12

General

  • Target

    e59ac7fb7c80fa011f500a6065ea349b01b4651c3b672031549190286c6141bf.exe

  • Size

    1.1MB

  • MD5

    cbcd9f45b2389c825a3d1db3acf49816

  • SHA1

    f333b34f47aeafe21e2c6371f7fb904c31448240

  • SHA256

    e59ac7fb7c80fa011f500a6065ea349b01b4651c3b672031549190286c6141bf

  • SHA512

    f005b13a5dd89d499be2ff10a5686441e0a02af04e3be1cb46fbc61a40e16256f16742d009eb95220bb79ce831516c68fa56a037e2c55e87060343eb35ebbdd0

  • SSDEEP

    24576:uy4HUN3lFzyjtKvPPdZjcfWtOT8kdtAgTYcCsdwWTXe:9IUByjt6jcfW+8YYG+W

Malware Config

Extracted

Family

redline

Botnet

messi

C2

185.161.248.75:4132

Attributes
  • auth_value

    b602b28664bb738e322d37baab91db28

Extracted

Family

redline

Botnet

warum

C2

185.161.248.75:4132

Attributes
  • auth_value

    0bdb2dda91dadc65f555dee088a6a2a4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e59ac7fb7c80fa011f500a6065ea349b01b4651c3b672031549190286c6141bf.exe
    "C:\Users\Admin\AppData\Local\Temp\e59ac7fb7c80fa011f500a6065ea349b01b4651c3b672031549190286c6141bf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8181139.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8181139.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4112
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0217839.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0217839.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3528
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a5988208.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a5988208.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:376
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4958343.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4958343.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1412
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5044675.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5044675.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3716
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5044675.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5044675.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of UnmapMainImage
          PID:3888
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 12
            5⤵
            • Program crash
            PID:3364
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6546237.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6546237.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2836
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6546237.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6546237.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:856
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3888 -ip 3888
    1⤵
      PID:408

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\d6546237.exe.log

            Filesize

            425B

            MD5

            4eaca4566b22b01cd3bc115b9b0b2196

            SHA1

            e743e0792c19f71740416e7b3c061d9f1336bf94

            SHA256

            34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

            SHA512

            bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6546237.exe

            Filesize

            903KB

            MD5

            ad046635f0e7246b1c96980ae5010765

            SHA1

            0617ef10ac7a2fd407f49bd40fa85be9148a4c2c

            SHA256

            1a2a79dc38292f40ad62b9962e67c780b29698a3f7981fda3d5bc0dfba230655

            SHA512

            2a9a278357fc5dd53a254e9106db91a6e3e34893da2d3a5b849589d6b8d03bbe3b9ae9cf6d68988f0789368fb9f0e324171f9b24e1501b9aa722c5762a3faade

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6546237.exe

            Filesize

            903KB

            MD5

            ad046635f0e7246b1c96980ae5010765

            SHA1

            0617ef10ac7a2fd407f49bd40fa85be9148a4c2c

            SHA256

            1a2a79dc38292f40ad62b9962e67c780b29698a3f7981fda3d5bc0dfba230655

            SHA512

            2a9a278357fc5dd53a254e9106db91a6e3e34893da2d3a5b849589d6b8d03bbe3b9ae9cf6d68988f0789368fb9f0e324171f9b24e1501b9aa722c5762a3faade

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6546237.exe

            Filesize

            903KB

            MD5

            ad046635f0e7246b1c96980ae5010765

            SHA1

            0617ef10ac7a2fd407f49bd40fa85be9148a4c2c

            SHA256

            1a2a79dc38292f40ad62b9962e67c780b29698a3f7981fda3d5bc0dfba230655

            SHA512

            2a9a278357fc5dd53a254e9106db91a6e3e34893da2d3a5b849589d6b8d03bbe3b9ae9cf6d68988f0789368fb9f0e324171f9b24e1501b9aa722c5762a3faade

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8181139.exe

            Filesize

            749KB

            MD5

            f73bbb82500a26a089516047b36d9b2f

            SHA1

            3c07df03d66858df18080a7dd4c91937b3a4a62d

            SHA256

            6f414609645c776a1c97c51c5eb197bb8a662ce88e9465b37682f1902696fc38

            SHA512

            192f3906711195f89a9fdbaddb4708b57477b01e2ff0d68cbcae080f1abcba7c826603ff047c44557518bbf712fcd575eb3a44eeff78196c7d4a0b74b88c3f8f

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8181139.exe

            Filesize

            749KB

            MD5

            f73bbb82500a26a089516047b36d9b2f

            SHA1

            3c07df03d66858df18080a7dd4c91937b3a4a62d

            SHA256

            6f414609645c776a1c97c51c5eb197bb8a662ce88e9465b37682f1902696fc38

            SHA512

            192f3906711195f89a9fdbaddb4708b57477b01e2ff0d68cbcae080f1abcba7c826603ff047c44557518bbf712fcd575eb3a44eeff78196c7d4a0b74b88c3f8f

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5044675.exe

            Filesize

            963KB

            MD5

            e1f514ed10f24a5cc055bc328cad9f9e

            SHA1

            f71a13e20b8d03aeacd889974a1faa9ffe2a9eb7

            SHA256

            d74e1127512afe431d1831fefcc714a0331a656ba2647e7129b6f33b0e3d9467

            SHA512

            f0772a638ba3656e7971d945835aca2ab3272fdf5e97e4a9ad6b1a622f4717cf5a57a20a50fb0a7e2aaae0cb4d2bcf5556ff13f3cbc26ab851e9af027efb534d

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5044675.exe

            Filesize

            963KB

            MD5

            e1f514ed10f24a5cc055bc328cad9f9e

            SHA1

            f71a13e20b8d03aeacd889974a1faa9ffe2a9eb7

            SHA256

            d74e1127512afe431d1831fefcc714a0331a656ba2647e7129b6f33b0e3d9467

            SHA512

            f0772a638ba3656e7971d945835aca2ab3272fdf5e97e4a9ad6b1a622f4717cf5a57a20a50fb0a7e2aaae0cb4d2bcf5556ff13f3cbc26ab851e9af027efb534d

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c5044675.exe

            Filesize

            963KB

            MD5

            e1f514ed10f24a5cc055bc328cad9f9e

            SHA1

            f71a13e20b8d03aeacd889974a1faa9ffe2a9eb7

            SHA256

            d74e1127512afe431d1831fefcc714a0331a656ba2647e7129b6f33b0e3d9467

            SHA512

            f0772a638ba3656e7971d945835aca2ab3272fdf5e97e4a9ad6b1a622f4717cf5a57a20a50fb0a7e2aaae0cb4d2bcf5556ff13f3cbc26ab851e9af027efb534d

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0217839.exe

            Filesize

            305KB

            MD5

            982c69b5a9de0b8ec090f5065425ef92

            SHA1

            0467f855f02d96ee02369b68e0b4aed8718877a8

            SHA256

            9fb0c78d67b4de88eaebb51e497678174f04252c5981ce3d24ff5dc1e04c1b6d

            SHA512

            3b009b17f4b096990681e50078c8430c3b55154568a203652b55c75d7d987e2ed20257d27dd5bfe02707d2f902bb4cdead4cb54f598f8b3d992f0ffb9f7fb1e9

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0217839.exe

            Filesize

            305KB

            MD5

            982c69b5a9de0b8ec090f5065425ef92

            SHA1

            0467f855f02d96ee02369b68e0b4aed8718877a8

            SHA256

            9fb0c78d67b4de88eaebb51e497678174f04252c5981ce3d24ff5dc1e04c1b6d

            SHA512

            3b009b17f4b096990681e50078c8430c3b55154568a203652b55c75d7d987e2ed20257d27dd5bfe02707d2f902bb4cdead4cb54f598f8b3d992f0ffb9f7fb1e9

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a5988208.exe

            Filesize

            184KB

            MD5

            2c1b6abab3f965d3aa3bfe869ce08f15

            SHA1

            859dd765afd571df77c97780a22945c8f1a57b82

            SHA256

            732567182b5990ba090af3ed635dcafe0c8f0c1600236dc8db212023eafc919f

            SHA512

            6c14df1ff4c40588d1d2aa6c24a45997c842bde2112a3f15c441a61667b15cda6840e357c861c34eaba81a248ee0bd04868ad81eb4d225e79171ec214dc725bf

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a5988208.exe

            Filesize

            184KB

            MD5

            2c1b6abab3f965d3aa3bfe869ce08f15

            SHA1

            859dd765afd571df77c97780a22945c8f1a57b82

            SHA256

            732567182b5990ba090af3ed635dcafe0c8f0c1600236dc8db212023eafc919f

            SHA512

            6c14df1ff4c40588d1d2aa6c24a45997c842bde2112a3f15c441a61667b15cda6840e357c861c34eaba81a248ee0bd04868ad81eb4d225e79171ec214dc725bf

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4958343.exe

            Filesize

            145KB

            MD5

            b1e80c3c72c516baf894a7ecacd42cbb

            SHA1

            097b99ccc7f830099bf112fdec565589cb0c8991

            SHA256

            d96f6f379adc82262d2d7c999cf6c92d6c9e3b77238c9296560a1914a9b859e9

            SHA512

            2442b1048099c35508c56b231276da6b22198aa9d462641fe6cf26808eedc38b917285437dd00d71dc0fed8c35f9e141ac7295fdacc3e74fd8a2f17a41f6af43

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4958343.exe

            Filesize

            145KB

            MD5

            b1e80c3c72c516baf894a7ecacd42cbb

            SHA1

            097b99ccc7f830099bf112fdec565589cb0c8991

            SHA256

            d96f6f379adc82262d2d7c999cf6c92d6c9e3b77238c9296560a1914a9b859e9

            SHA512

            2442b1048099c35508c56b231276da6b22198aa9d462641fe6cf26808eedc38b917285437dd00d71dc0fed8c35f9e141ac7295fdacc3e74fd8a2f17a41f6af43

          • memory/376-186-0x0000000004BF0000-0x0000000004C00000-memory.dmp

            Filesize

            64KB

          • memory/376-184-0x0000000004AB0000-0x0000000004AC6000-memory.dmp

            Filesize

            88KB

          • memory/376-172-0x0000000004AB0000-0x0000000004AC6000-memory.dmp

            Filesize

            88KB

          • memory/376-174-0x0000000004AB0000-0x0000000004AC6000-memory.dmp

            Filesize

            88KB

          • memory/376-176-0x0000000004AB0000-0x0000000004AC6000-memory.dmp

            Filesize

            88KB

          • memory/376-178-0x0000000004AB0000-0x0000000004AC6000-memory.dmp

            Filesize

            88KB

          • memory/376-180-0x0000000004AB0000-0x0000000004AC6000-memory.dmp

            Filesize

            88KB

          • memory/376-166-0x0000000004AB0000-0x0000000004AC6000-memory.dmp

            Filesize

            88KB

          • memory/376-187-0x0000000004BF0000-0x0000000004C00000-memory.dmp

            Filesize

            64KB

          • memory/376-185-0x0000000004BF0000-0x0000000004C00000-memory.dmp

            Filesize

            64KB

          • memory/376-170-0x0000000004AB0000-0x0000000004AC6000-memory.dmp

            Filesize

            88KB

          • memory/376-162-0x0000000004AB0000-0x0000000004AC6000-memory.dmp

            Filesize

            88KB

          • memory/376-182-0x0000000004AB0000-0x0000000004AC6000-memory.dmp

            Filesize

            88KB

          • memory/376-164-0x0000000004AB0000-0x0000000004AC6000-memory.dmp

            Filesize

            88KB

          • memory/376-160-0x0000000004AB0000-0x0000000004AC6000-memory.dmp

            Filesize

            88KB

          • memory/376-154-0x0000000004BF0000-0x0000000004C00000-memory.dmp

            Filesize

            64KB

          • memory/376-155-0x0000000004BF0000-0x0000000004C00000-memory.dmp

            Filesize

            64KB

          • memory/376-158-0x0000000004AB0000-0x0000000004AC6000-memory.dmp

            Filesize

            88KB

          • memory/376-156-0x0000000004C00000-0x00000000051A4000-memory.dmp

            Filesize

            5.6MB

          • memory/376-157-0x0000000004AB0000-0x0000000004AC6000-memory.dmp

            Filesize

            88KB

          • memory/376-168-0x0000000004AB0000-0x0000000004AC6000-memory.dmp

            Filesize

            88KB

          • memory/856-219-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/856-223-0x0000000005410000-0x0000000005420000-memory.dmp

            Filesize

            64KB

          • memory/1412-198-0x0000000005950000-0x00000000059B6000-memory.dmp

            Filesize

            408KB

          • memory/1412-199-0x0000000006500000-0x0000000006592000-memory.dmp

            Filesize

            584KB

          • memory/1412-203-0x0000000007630000-0x0000000007B5C000-memory.dmp

            Filesize

            5.2MB

          • memory/1412-204-0x00000000058D0000-0x00000000058E0000-memory.dmp

            Filesize

            64KB

          • memory/1412-201-0x0000000006610000-0x0000000006660000-memory.dmp

            Filesize

            320KB

          • memory/1412-200-0x0000000006690000-0x0000000006706000-memory.dmp

            Filesize

            472KB

          • memory/1412-192-0x0000000000D50000-0x0000000000D7A000-memory.dmp

            Filesize

            168KB

          • memory/1412-193-0x0000000005B30000-0x0000000006148000-memory.dmp

            Filesize

            6.1MB

          • memory/1412-194-0x00000000056B0000-0x00000000057BA000-memory.dmp

            Filesize

            1.0MB

          • memory/1412-202-0x00000000068E0000-0x0000000006AA2000-memory.dmp

            Filesize

            1.8MB

          • memory/1412-197-0x0000000005640000-0x000000000567C000-memory.dmp

            Filesize

            240KB

          • memory/1412-196-0x00000000058D0000-0x00000000058E0000-memory.dmp

            Filesize

            64KB

          • memory/1412-195-0x00000000055E0000-0x00000000055F2000-memory.dmp

            Filesize

            72KB

          • memory/2836-218-0x0000000007730000-0x0000000007740000-memory.dmp

            Filesize

            64KB

          • memory/2836-217-0x0000000000940000-0x0000000000A28000-memory.dmp

            Filesize

            928KB

          • memory/3716-210-0x0000000007830000-0x0000000007840000-memory.dmp

            Filesize

            64KB

          • memory/3716-209-0x00000000008D0000-0x00000000009C8000-memory.dmp

            Filesize

            992KB

          • memory/3888-211-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB