Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-05-2023 18:31

General

  • Target

    bcebcb224dbe8bd0777174ae719cb70657a7feb1a19207098bd84d3209da5d49.exe

  • Size

    1.1MB

  • MD5

    a3e444c321fd9235a9559a1776cc5c88

  • SHA1

    a5a975a094eba5185aa58cd0964386f174890c3d

  • SHA256

    bcebcb224dbe8bd0777174ae719cb70657a7feb1a19207098bd84d3209da5d49

  • SHA512

    e043efc95a8761b49829c4d7400a2869efb8eb2f472e0c30b5d89bd40c9b1c32ee5589aee2767ef6b218b994ddcb2fdd843cbf6700970ff90740b7af899d53d1

  • SSDEEP

    24576:Zy54jzHvEhSdRlYO5LqzCpkqlFvViA3ySCjrp0nphHNWH:M4DEsjY8qzCpkqlTiA3yS869I

Malware Config

Extracted

Family

redline

Botnet

luka

C2

185.161.248.75:4132

Attributes
  • auth_value

    44560bcd37d6bf076da309730fdb519a

Extracted

Family

redline

Botnet

terra

C2

185.161.248.75:4132

Attributes
  • auth_value

    60df3f535f8aa4e264f78041983592d2

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bcebcb224dbe8bd0777174ae719cb70657a7feb1a19207098bd84d3209da5d49.exe
    "C:\Users\Admin\AppData\Local\Temp\bcebcb224dbe8bd0777174ae719cb70657a7feb1a19207098bd84d3209da5d49.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1808
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6821605.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6821605.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3824
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1924202.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1924202.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1556
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0838919.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0838919.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1268
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8814458.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8814458.exe
          4⤵
          • Executes dropped EXE
          PID:4972
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4972 -s 928
            5⤵
            • Program crash
            PID:1348
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8336394.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8336394.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5060
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8336394.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8336394.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2792
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5915211.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5915211.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:724
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5915211.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5915211.exe
        3⤵
        • Executes dropped EXE
        PID:4056
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5915211.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5915211.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of UnmapMainImage
        PID:772
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 772 -s 12
          4⤵
          • Program crash
          PID:2232
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4972 -ip 4972
    1⤵
      PID:4920
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 772 -ip 772
      1⤵
        PID:2072

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\r8336394.exe.log
        Filesize

        425B

        MD5

        4eaca4566b22b01cd3bc115b9b0b2196

        SHA1

        e743e0792c19f71740416e7b3c061d9f1336bf94

        SHA256

        34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

        SHA512

        bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5915211.exe
        Filesize

        961KB

        MD5

        956379c5c365761e4c802d99cec8f0a1

        SHA1

        f4345e01ecc36df452cda5728c7aa6c38f0cb444

        SHA256

        a22566972b71f6c4180324c24580f87cd9d0dd2ada59bef4da88669d53f8358c

        SHA512

        4576b706d1041ace1edf035cc27738268d051d37dd39f06ab1ca0b42e8f18bde36aa3258957efd155ef24a896a28ce217521cda00ffbe47c1a5e15d5abecd0ac

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5915211.exe
        Filesize

        961KB

        MD5

        956379c5c365761e4c802d99cec8f0a1

        SHA1

        f4345e01ecc36df452cda5728c7aa6c38f0cb444

        SHA256

        a22566972b71f6c4180324c24580f87cd9d0dd2ada59bef4da88669d53f8358c

        SHA512

        4576b706d1041ace1edf035cc27738268d051d37dd39f06ab1ca0b42e8f18bde36aa3258957efd155ef24a896a28ce217521cda00ffbe47c1a5e15d5abecd0ac

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5915211.exe
        Filesize

        961KB

        MD5

        956379c5c365761e4c802d99cec8f0a1

        SHA1

        f4345e01ecc36df452cda5728c7aa6c38f0cb444

        SHA256

        a22566972b71f6c4180324c24580f87cd9d0dd2ada59bef4da88669d53f8358c

        SHA512

        4576b706d1041ace1edf035cc27738268d051d37dd39f06ab1ca0b42e8f18bde36aa3258957efd155ef24a896a28ce217521cda00ffbe47c1a5e15d5abecd0ac

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s5915211.exe
        Filesize

        961KB

        MD5

        956379c5c365761e4c802d99cec8f0a1

        SHA1

        f4345e01ecc36df452cda5728c7aa6c38f0cb444

        SHA256

        a22566972b71f6c4180324c24580f87cd9d0dd2ada59bef4da88669d53f8358c

        SHA512

        4576b706d1041ace1edf035cc27738268d051d37dd39f06ab1ca0b42e8f18bde36aa3258957efd155ef24a896a28ce217521cda00ffbe47c1a5e15d5abecd0ac

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6821605.exe
        Filesize

        702KB

        MD5

        47a5e61a5043e6fefb729decdd58f325

        SHA1

        15c106a33b533e6d6245aacf9b03bd53a6d6884b

        SHA256

        fc0b7f9abdd019dd374b15c3305ed686554ed14874114234524b7ccc38538b06

        SHA512

        0b64d9e13689b1a9f107c7977d63adc3734f026be7fcbd94fc95c1cad87abff2e93154295a95704a16e2a318d7a5fa26f9e8aa6298c5aa3239527d8a85bde799

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6821605.exe
        Filesize

        702KB

        MD5

        47a5e61a5043e6fefb729decdd58f325

        SHA1

        15c106a33b533e6d6245aacf9b03bd53a6d6884b

        SHA256

        fc0b7f9abdd019dd374b15c3305ed686554ed14874114234524b7ccc38538b06

        SHA512

        0b64d9e13689b1a9f107c7977d63adc3734f026be7fcbd94fc95c1cad87abff2e93154295a95704a16e2a318d7a5fa26f9e8aa6298c5aa3239527d8a85bde799

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8336394.exe
        Filesize

        904KB

        MD5

        f94ec4a4e67d1257b07b45abaa1090b5

        SHA1

        6e36f82a37ec0af39464b1f005687370b62050d6

        SHA256

        785ffd1c2db552557b294a70fb8a2187b774cac1b47f482e1789b8c002afff30

        SHA512

        b1375a3f5486b4a21cf20ae97f05cf7e95d524e53b8555ff6f4f3022498192470e12a29e8d1a12c7317c8d0c98fd8466730a2ddb132330b553ef7d0109f7e629

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8336394.exe
        Filesize

        904KB

        MD5

        f94ec4a4e67d1257b07b45abaa1090b5

        SHA1

        6e36f82a37ec0af39464b1f005687370b62050d6

        SHA256

        785ffd1c2db552557b294a70fb8a2187b774cac1b47f482e1789b8c002afff30

        SHA512

        b1375a3f5486b4a21cf20ae97f05cf7e95d524e53b8555ff6f4f3022498192470e12a29e8d1a12c7317c8d0c98fd8466730a2ddb132330b553ef7d0109f7e629

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r8336394.exe
        Filesize

        904KB

        MD5

        f94ec4a4e67d1257b07b45abaa1090b5

        SHA1

        6e36f82a37ec0af39464b1f005687370b62050d6

        SHA256

        785ffd1c2db552557b294a70fb8a2187b774cac1b47f482e1789b8c002afff30

        SHA512

        b1375a3f5486b4a21cf20ae97f05cf7e95d524e53b8555ff6f4f3022498192470e12a29e8d1a12c7317c8d0c98fd8466730a2ddb132330b553ef7d0109f7e629

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1924202.exe
        Filesize

        306KB

        MD5

        ef6fb5670c7e65b15e2832333fe25ae7

        SHA1

        42fb9f913012ee4e6231e670b5b65ad182ff8c6e

        SHA256

        5fbc81637284c876c1a8fd270e2d67338e82f3ef85ad174e5623224e7118248a

        SHA512

        5a6cc5c549f7038300d0d4595f00b31996974367015cf3edc14fc3fb08424d6ba2bc432f14b2702fdba0c013aadd3a3e8cd199fd1823eec0d8d7e2b4c581bb84

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1924202.exe
        Filesize

        306KB

        MD5

        ef6fb5670c7e65b15e2832333fe25ae7

        SHA1

        42fb9f913012ee4e6231e670b5b65ad182ff8c6e

        SHA256

        5fbc81637284c876c1a8fd270e2d67338e82f3ef85ad174e5623224e7118248a

        SHA512

        5a6cc5c549f7038300d0d4595f00b31996974367015cf3edc14fc3fb08424d6ba2bc432f14b2702fdba0c013aadd3a3e8cd199fd1823eec0d8d7e2b4c581bb84

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0838919.exe
        Filesize

        184KB

        MD5

        a5df408c6e0485b2a91bf8357fd2b4a1

        SHA1

        6f63202577450c0b702508bcb820db760a3831f7

        SHA256

        d73092a4be110dc36fb1593e2a089b5758175c080894ecc964d16a3363a966bc

        SHA512

        ce3166f2051acd6ebb5a609e292c13f843d65094b26429dfa1d62cf4e5931071b16a9b959a5d5ccca6d0e7b15359eb76941a17cf9d3e17358d0509d519d9c900

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0838919.exe
        Filesize

        184KB

        MD5

        a5df408c6e0485b2a91bf8357fd2b4a1

        SHA1

        6f63202577450c0b702508bcb820db760a3831f7

        SHA256

        d73092a4be110dc36fb1593e2a089b5758175c080894ecc964d16a3363a966bc

        SHA512

        ce3166f2051acd6ebb5a609e292c13f843d65094b26429dfa1d62cf4e5931071b16a9b959a5d5ccca6d0e7b15359eb76941a17cf9d3e17358d0509d519d9c900

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8814458.exe
        Filesize

        145KB

        MD5

        bbf6aeb0afa97e2b71cc1ea537242a88

        SHA1

        8de88940114300c8922b57004cd8a85d243e3bf2

        SHA256

        ceecaa29c38748b532a77b70966d5e2d1117cebe26633cfc32dc3d83e892ae2b

        SHA512

        a3a0941e84e68a2cc201bf3ec88159e53f28c128723a15bc5e8aad166d23cba6d5d5924fc0cfe8bd7379145b28a2baeaa5666ae855b72a96c18577bb6e89e348

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p8814458.exe
        Filesize

        145KB

        MD5

        bbf6aeb0afa97e2b71cc1ea537242a88

        SHA1

        8de88940114300c8922b57004cd8a85d243e3bf2

        SHA256

        ceecaa29c38748b532a77b70966d5e2d1117cebe26633cfc32dc3d83e892ae2b

        SHA512

        a3a0941e84e68a2cc201bf3ec88159e53f28c128723a15bc5e8aad166d23cba6d5d5924fc0cfe8bd7379145b28a2baeaa5666ae855b72a96c18577bb6e89e348

      • memory/724-205-0x0000000000740000-0x0000000000836000-memory.dmp
        Filesize

        984KB

      • memory/724-208-0x00000000074A0000-0x00000000074B0000-memory.dmp
        Filesize

        64KB

      • memory/772-213-0x0000000000400000-0x0000000000438000-memory.dmp
        Filesize

        224KB

      • memory/772-220-0x00000000003E0000-0x00000000003E0000-memory.dmp
      • memory/1268-165-0x0000000004AC0000-0x0000000004AD6000-memory.dmp
        Filesize

        88KB

      • memory/1268-171-0x0000000004AC0000-0x0000000004AD6000-memory.dmp
        Filesize

        88KB

      • memory/1268-181-0x0000000004AC0000-0x0000000004AD6000-memory.dmp
        Filesize

        88KB

      • memory/1268-183-0x0000000004AC0000-0x0000000004AD6000-memory.dmp
        Filesize

        88KB

      • memory/1268-185-0x0000000004AC0000-0x0000000004AD6000-memory.dmp
        Filesize

        88KB

      • memory/1268-186-0x0000000004C80000-0x0000000004C90000-memory.dmp
        Filesize

        64KB

      • memory/1268-187-0x0000000004C80000-0x0000000004C90000-memory.dmp
        Filesize

        64KB

      • memory/1268-177-0x0000000004AC0000-0x0000000004AD6000-memory.dmp
        Filesize

        88KB

      • memory/1268-175-0x0000000004AC0000-0x0000000004AD6000-memory.dmp
        Filesize

        88KB

      • memory/1268-154-0x0000000004C80000-0x0000000004C90000-memory.dmp
        Filesize

        64KB

      • memory/1268-173-0x0000000004AC0000-0x0000000004AD6000-memory.dmp
        Filesize

        88KB

      • memory/1268-158-0x0000000004AC0000-0x0000000004AD6000-memory.dmp
        Filesize

        88KB

      • memory/1268-156-0x0000000004C90000-0x0000000005234000-memory.dmp
        Filesize

        5.6MB

      • memory/1268-155-0x0000000004C80000-0x0000000004C90000-memory.dmp
        Filesize

        64KB

      • memory/1268-157-0x0000000004C80000-0x0000000004C90000-memory.dmp
        Filesize

        64KB

      • memory/1268-169-0x0000000004AC0000-0x0000000004AD6000-memory.dmp
        Filesize

        88KB

      • memory/1268-167-0x0000000004AC0000-0x0000000004AD6000-memory.dmp
        Filesize

        88KB

      • memory/1268-163-0x0000000004AC0000-0x0000000004AD6000-memory.dmp
        Filesize

        88KB

      • memory/1268-159-0x0000000004AC0000-0x0000000004AD6000-memory.dmp
        Filesize

        88KB

      • memory/1268-161-0x0000000004AC0000-0x0000000004AD6000-memory.dmp
        Filesize

        88KB

      • memory/1268-179-0x0000000004AC0000-0x0000000004AD6000-memory.dmp
        Filesize

        88KB

      • memory/2792-211-0x0000000005BE0000-0x0000000005BF0000-memory.dmp
        Filesize

        64KB

      • memory/2792-218-0x00000000072B0000-0x0000000007472000-memory.dmp
        Filesize

        1.8MB

      • memory/2792-209-0x00000000058D0000-0x00000000058E2000-memory.dmp
        Filesize

        72KB

      • memory/2792-210-0x0000000005930000-0x000000000596C000-memory.dmp
        Filesize

        240KB

      • memory/2792-206-0x0000000005E20000-0x0000000006438000-memory.dmp
        Filesize

        6.1MB

      • memory/2792-198-0x0000000000400000-0x000000000042A000-memory.dmp
        Filesize

        168KB

      • memory/2792-222-0x0000000006C10000-0x0000000006C60000-memory.dmp
        Filesize

        320KB

      • memory/2792-221-0x0000000006B90000-0x0000000006C06000-memory.dmp
        Filesize

        472KB

      • memory/2792-216-0x0000000005C60000-0x0000000005CC6000-memory.dmp
        Filesize

        408KB

      • memory/2792-217-0x0000000006830000-0x00000000068C2000-memory.dmp
        Filesize

        584KB

      • memory/2792-207-0x00000000059A0000-0x0000000005AAA000-memory.dmp
        Filesize

        1.0MB

      • memory/2792-219-0x00000000079B0000-0x0000000007EDC000-memory.dmp
        Filesize

        5.2MB

      • memory/4972-192-0x0000000000160000-0x000000000018A000-memory.dmp
        Filesize

        168KB

      • memory/5060-196-0x0000000000930000-0x0000000000A18000-memory.dmp
        Filesize

        928KB

      • memory/5060-197-0x0000000007730000-0x0000000007740000-memory.dmp
        Filesize

        64KB