Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-05-2023 18:31

General

  • Target

    c0a6e8fd3592907f68f4897c27a542a5d449bdce23d8333fc52325e1a4a361c4.exe

  • Size

    1.1MB

  • MD5

    85658a29a32dd8e2814e10523c9961b7

  • SHA1

    b96997ae100fdd88809a8e76461019ad3c8597ee

  • SHA256

    c0a6e8fd3592907f68f4897c27a542a5d449bdce23d8333fc52325e1a4a361c4

  • SHA512

    3f3df97964cf67a4a65caa5478f34eb7ae7716b4615ed5b3423daa9244c04a26d4c749448d4f0468fa66260a23bfa4f814958b5bbe24dc60d931ed8fd937bdbf

  • SSDEEP

    24576:fykJ9a+dtBLgBjwCKegUeuKOntAeP+9h5TU/gDpiqO:qkZNMBjjZpv29h5TjD

Malware Config

Extracted

Family

redline

Botnet

messi

C2

185.161.248.75:4132

Attributes
  • auth_value

    b602b28664bb738e322d37baab91db28

Extracted

Family

redline

Botnet

warum

C2

185.161.248.75:4132

Attributes
  • auth_value

    0bdb2dda91dadc65f555dee088a6a2a4

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c0a6e8fd3592907f68f4897c27a542a5d449bdce23d8333fc52325e1a4a361c4.exe
    "C:\Users\Admin\AppData\Local\Temp\c0a6e8fd3592907f68f4897c27a542a5d449bdce23d8333fc52325e1a4a361c4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1432
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5436220.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5436220.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4360
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2242042.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2242042.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:428
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a5133396.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a5133396.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5116
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8859428.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8859428.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3768
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7653705.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7653705.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2344
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7653705.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7653705.exe
          4⤵
          • Executes dropped EXE
          PID:3492
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7653705.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7653705.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of UnmapMainImage
          PID:4204
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4204 -s 12
            5⤵
            • Program crash
            PID:372
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5283192.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5283192.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4796
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5283192.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5283192.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1524
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4204 -ip 4204
    1⤵
      PID:4220

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    Query Registry

    1
    T1012

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\d5283192.exe.log
      Filesize

      425B

      MD5

      4eaca4566b22b01cd3bc115b9b0b2196

      SHA1

      e743e0792c19f71740416e7b3c061d9f1336bf94

      SHA256

      34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

      SHA512

      bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5283192.exe
      Filesize

      903KB

      MD5

      5680a66c8acd75bc696d176fb9b4be68

      SHA1

      bc5c98bdbd1a2a44ae46e66c07dc64b36716de5a

      SHA256

      cb8133880a891338ae93ad1adfbec869c1039d8935db92f371235e8c18e003eb

      SHA512

      1074590e570167cbfc13e4091f60bc254cb6a897e6fa5901c88fe1a54d7563524c7e446173a7f9ef69cde214836bb42e16fed8006f2240aee5a04af5efc7cff6

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5283192.exe
      Filesize

      903KB

      MD5

      5680a66c8acd75bc696d176fb9b4be68

      SHA1

      bc5c98bdbd1a2a44ae46e66c07dc64b36716de5a

      SHA256

      cb8133880a891338ae93ad1adfbec869c1039d8935db92f371235e8c18e003eb

      SHA512

      1074590e570167cbfc13e4091f60bc254cb6a897e6fa5901c88fe1a54d7563524c7e446173a7f9ef69cde214836bb42e16fed8006f2240aee5a04af5efc7cff6

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d5283192.exe
      Filesize

      903KB

      MD5

      5680a66c8acd75bc696d176fb9b4be68

      SHA1

      bc5c98bdbd1a2a44ae46e66c07dc64b36716de5a

      SHA256

      cb8133880a891338ae93ad1adfbec869c1039d8935db92f371235e8c18e003eb

      SHA512

      1074590e570167cbfc13e4091f60bc254cb6a897e6fa5901c88fe1a54d7563524c7e446173a7f9ef69cde214836bb42e16fed8006f2240aee5a04af5efc7cff6

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5436220.exe
      Filesize

      750KB

      MD5

      578c38d5257c4611f6dcf40e2e71dbb8

      SHA1

      b0445efd622cb9cd25caf5ffb804c15c0c60f3f0

      SHA256

      c57f490d6868fe5f8187898c51b80be8112cb47d6951ccbf10427aba5ff67c8e

      SHA512

      94f0eb70562b6a312a8fbe1ebecd67d01e4abd2edb8beb20b40e1dcbaec2cfaef1595aa43594b8cbdf8a479b3398a3d1b9bb41d95c55b23ba2827919b3b298f8

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5436220.exe
      Filesize

      750KB

      MD5

      578c38d5257c4611f6dcf40e2e71dbb8

      SHA1

      b0445efd622cb9cd25caf5ffb804c15c0c60f3f0

      SHA256

      c57f490d6868fe5f8187898c51b80be8112cb47d6951ccbf10427aba5ff67c8e

      SHA512

      94f0eb70562b6a312a8fbe1ebecd67d01e4abd2edb8beb20b40e1dcbaec2cfaef1595aa43594b8cbdf8a479b3398a3d1b9bb41d95c55b23ba2827919b3b298f8

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7653705.exe
      Filesize

      963KB

      MD5

      0395dc7886a7ed9007f996dc47b2dd27

      SHA1

      649128fd9a0f9d904b3bb0dfdb5ec24fa975742d

      SHA256

      12127b207e17bcbc65554a662de61b9d32f6a0721a4fde476969df3ae70acf78

      SHA512

      d183fb7fc1c79c8a10d2559739bc45aa79852ab6c02d04a23be405c620f76c8b60d591a92f8b09004add8d8405bab41c98668eeb12bef2d6133fe7302f101674

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7653705.exe
      Filesize

      963KB

      MD5

      0395dc7886a7ed9007f996dc47b2dd27

      SHA1

      649128fd9a0f9d904b3bb0dfdb5ec24fa975742d

      SHA256

      12127b207e17bcbc65554a662de61b9d32f6a0721a4fde476969df3ae70acf78

      SHA512

      d183fb7fc1c79c8a10d2559739bc45aa79852ab6c02d04a23be405c620f76c8b60d591a92f8b09004add8d8405bab41c98668eeb12bef2d6133fe7302f101674

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7653705.exe
      Filesize

      963KB

      MD5

      0395dc7886a7ed9007f996dc47b2dd27

      SHA1

      649128fd9a0f9d904b3bb0dfdb5ec24fa975742d

      SHA256

      12127b207e17bcbc65554a662de61b9d32f6a0721a4fde476969df3ae70acf78

      SHA512

      d183fb7fc1c79c8a10d2559739bc45aa79852ab6c02d04a23be405c620f76c8b60d591a92f8b09004add8d8405bab41c98668eeb12bef2d6133fe7302f101674

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7653705.exe
      Filesize

      963KB

      MD5

      0395dc7886a7ed9007f996dc47b2dd27

      SHA1

      649128fd9a0f9d904b3bb0dfdb5ec24fa975742d

      SHA256

      12127b207e17bcbc65554a662de61b9d32f6a0721a4fde476969df3ae70acf78

      SHA512

      d183fb7fc1c79c8a10d2559739bc45aa79852ab6c02d04a23be405c620f76c8b60d591a92f8b09004add8d8405bab41c98668eeb12bef2d6133fe7302f101674

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2242042.exe
      Filesize

      305KB

      MD5

      e383bb933aab5e9243179f0ade42a94a

      SHA1

      932ad03e396b07df89d041cd474a4263c4b6c376

      SHA256

      cc3da04e2d3fcf271cc86345eaecfc6c2a84059d86cab2e7a799b09bde9d113e

      SHA512

      b8c61cde92f5ae75e240c63ac1146d77a11fb03fb325b74fe1f2bd61795347059573c3fe5514419c9f6bd0706edc437cf8a4745d0e2cc79615c0e506eb1ce623

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v2242042.exe
      Filesize

      305KB

      MD5

      e383bb933aab5e9243179f0ade42a94a

      SHA1

      932ad03e396b07df89d041cd474a4263c4b6c376

      SHA256

      cc3da04e2d3fcf271cc86345eaecfc6c2a84059d86cab2e7a799b09bde9d113e

      SHA512

      b8c61cde92f5ae75e240c63ac1146d77a11fb03fb325b74fe1f2bd61795347059573c3fe5514419c9f6bd0706edc437cf8a4745d0e2cc79615c0e506eb1ce623

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a5133396.exe
      Filesize

      183KB

      MD5

      6f618d5c78fcb208961a9c613e5d95c2

      SHA1

      b78b9ebacfdf196c4c3cede9604d758de4fb806b

      SHA256

      c9406d36feef0c1f3e6f6d90f53573da11d2f9c466190b874cef17f65ad8c314

      SHA512

      e90c813460d807dd3e0c9625d09215c7465bf110824a7170822544055f15a83696ee4a03b5751bb544a34a30965f07ecc54d26e12d8dbe04f2cbaa60df480f1b

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a5133396.exe
      Filesize

      183KB

      MD5

      6f618d5c78fcb208961a9c613e5d95c2

      SHA1

      b78b9ebacfdf196c4c3cede9604d758de4fb806b

      SHA256

      c9406d36feef0c1f3e6f6d90f53573da11d2f9c466190b874cef17f65ad8c314

      SHA512

      e90c813460d807dd3e0c9625d09215c7465bf110824a7170822544055f15a83696ee4a03b5751bb544a34a30965f07ecc54d26e12d8dbe04f2cbaa60df480f1b

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8859428.exe
      Filesize

      145KB

      MD5

      9ecbd6b3213252c46ab163df8b5c4fa8

      SHA1

      0d8300f1ab37ccaa522d68bf28ff82583440cf2e

      SHA256

      a4fea285888bb91f190afe60056f68fa51730ba59c9393bd5fcdc2a30dd1c634

      SHA512

      6264bbee3fcfb574260debe5d38508eafb7cc8d4ea5bd62c4ead341aeffd19cccb7f622206f2153273cb13f6b2c09f528955d0e988bba6f1c233bbf753948b50

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b8859428.exe
      Filesize

      145KB

      MD5

      9ecbd6b3213252c46ab163df8b5c4fa8

      SHA1

      0d8300f1ab37ccaa522d68bf28ff82583440cf2e

      SHA256

      a4fea285888bb91f190afe60056f68fa51730ba59c9393bd5fcdc2a30dd1c634

      SHA512

      6264bbee3fcfb574260debe5d38508eafb7cc8d4ea5bd62c4ead341aeffd19cccb7f622206f2153273cb13f6b2c09f528955d0e988bba6f1c233bbf753948b50

    • memory/1524-221-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/1524-225-0x0000000005420000-0x0000000005430000-memory.dmp
      Filesize

      64KB

    • memory/2344-211-0x00000000077C0000-0x00000000077D0000-memory.dmp
      Filesize

      64KB

    • memory/2344-210-0x00000000009E0000-0x0000000000AD8000-memory.dmp
      Filesize

      992KB

    • memory/3768-204-0x00000000077E0000-0x0000000007D0C000-memory.dmp
      Filesize

      5.2MB

    • memory/3768-202-0x0000000006800000-0x0000000006850000-memory.dmp
      Filesize

      320KB

    • memory/3768-205-0x0000000005A10000-0x0000000005A20000-memory.dmp
      Filesize

      64KB

    • memory/3768-203-0x00000000070E0000-0x00000000072A2000-memory.dmp
      Filesize

      1.8MB

    • memory/3768-201-0x0000000006780000-0x00000000067F6000-memory.dmp
      Filesize

      472KB

    • memory/3768-200-0x0000000006350000-0x00000000063B6000-memory.dmp
      Filesize

      408KB

    • memory/3768-199-0x00000000062B0000-0x0000000006342000-memory.dmp
      Filesize

      584KB

    • memory/3768-198-0x0000000005A10000-0x0000000005A20000-memory.dmp
      Filesize

      64KB

    • memory/3768-197-0x0000000005790000-0x00000000057CC000-memory.dmp
      Filesize

      240KB

    • memory/3768-196-0x0000000005730000-0x0000000005742000-memory.dmp
      Filesize

      72KB

    • memory/3768-193-0x0000000000EA0000-0x0000000000ECA000-memory.dmp
      Filesize

      168KB

    • memory/3768-194-0x0000000005C90000-0x00000000062A8000-memory.dmp
      Filesize

      6.1MB

    • memory/3768-195-0x0000000005800000-0x000000000590A000-memory.dmp
      Filesize

      1.0MB

    • memory/4204-213-0x0000000000400000-0x0000000000438000-memory.dmp
      Filesize

      224KB

    • memory/4204-226-0x00000000003B0000-0x00000000003B0000-memory.dmp
    • memory/4796-220-0x0000000007740000-0x0000000007750000-memory.dmp
      Filesize

      64KB

    • memory/4796-219-0x00000000008B0000-0x0000000000998000-memory.dmp
      Filesize

      928KB

    • memory/5116-167-0x0000000004F20000-0x0000000004F36000-memory.dmp
      Filesize

      88KB

    • memory/5116-186-0x00000000024A0000-0x00000000024B0000-memory.dmp
      Filesize

      64KB

    • memory/5116-179-0x0000000004F20000-0x0000000004F36000-memory.dmp
      Filesize

      88KB

    • memory/5116-183-0x0000000004F20000-0x0000000004F36000-memory.dmp
      Filesize

      88KB

    • memory/5116-173-0x0000000004F20000-0x0000000004F36000-memory.dmp
      Filesize

      88KB

    • memory/5116-181-0x0000000004F20000-0x0000000004F36000-memory.dmp
      Filesize

      88KB

    • memory/5116-171-0x0000000004F20000-0x0000000004F36000-memory.dmp
      Filesize

      88KB

    • memory/5116-169-0x0000000004F20000-0x0000000004F36000-memory.dmp
      Filesize

      88KB

    • memory/5116-175-0x0000000004F20000-0x0000000004F36000-memory.dmp
      Filesize

      88KB

    • memory/5116-165-0x0000000004F20000-0x0000000004F36000-memory.dmp
      Filesize

      88KB

    • memory/5116-163-0x0000000004F20000-0x0000000004F36000-memory.dmp
      Filesize

      88KB

    • memory/5116-185-0x0000000004F20000-0x0000000004F36000-memory.dmp
      Filesize

      88KB

    • memory/5116-161-0x0000000004F20000-0x0000000004F36000-memory.dmp
      Filesize

      88KB

    • memory/5116-159-0x0000000004F20000-0x0000000004F36000-memory.dmp
      Filesize

      88KB

    • memory/5116-158-0x0000000004F20000-0x0000000004F36000-memory.dmp
      Filesize

      88KB

    • memory/5116-187-0x00000000024A0000-0x00000000024B0000-memory.dmp
      Filesize

      64KB

    • memory/5116-188-0x00000000024A0000-0x00000000024B0000-memory.dmp
      Filesize

      64KB

    • memory/5116-157-0x00000000024A0000-0x00000000024B0000-memory.dmp
      Filesize

      64KB

    • memory/5116-156-0x00000000024A0000-0x00000000024B0000-memory.dmp
      Filesize

      64KB

    • memory/5116-155-0x00000000024A0000-0x00000000024B0000-memory.dmp
      Filesize

      64KB

    • memory/5116-154-0x0000000004910000-0x0000000004EB4000-memory.dmp
      Filesize

      5.6MB

    • memory/5116-177-0x0000000004F20000-0x0000000004F36000-memory.dmp
      Filesize

      88KB