Analysis

  • max time kernel
    135s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-05-2023 18:39

General

  • Target

    f95c748c962febaf400470f53efb46b97d6e70101832eb79a115ebbefa10cfcc.exe

  • Size

    1.1MB

  • MD5

    221d2fc2fb3a0bc2296adf1f124ebb60

  • SHA1

    750960a6749389e5e15f9a420608ec02e4fc7849

  • SHA256

    f95c748c962febaf400470f53efb46b97d6e70101832eb79a115ebbefa10cfcc

  • SHA512

    7907aac71ceb0d3accc8858dd2f61bd2a54e6a742903b0019498f7d4c36a1f59a4ab3c73dec956f06657dcd29c0b62ea66f01e502f8c941e050614954950ac0e

  • SSDEEP

    24576:1yhRtZ71NTkbqUfYi5eJqpFAJrGWzfgxTnWsn:QhR371CbP5vFAJrGQ8zW

Malware Config

Extracted

Family

redline

Botnet

motor

C2

185.161.248.75:4132

Attributes
  • auth_value

    ec19ab9989a783983c5cbbc0e5ac4a5f

Extracted

Family

redline

Botnet

terra

C2

185.161.248.75:4132

Attributes
  • auth_value

    60df3f535f8aa4e264f78041983592d2

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f95c748c962febaf400470f53efb46b97d6e70101832eb79a115ebbefa10cfcc.exe
    "C:\Users\Admin\AppData\Local\Temp\f95c748c962febaf400470f53efb46b97d6e70101832eb79a115ebbefa10cfcc.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0857551.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0857551.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:736
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0667410.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0667410.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2932
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7050364.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7050364.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1108
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4487091.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4487091.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3500
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7069279.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7069279.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4764
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7069279.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7069279.exe
          4⤵
          • Executes dropped EXE
          PID:4812
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7069279.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7069279.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of UnmapMainImage
          PID:3880
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3880 -s 12
            5⤵
            • Program crash
            PID:4560
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9497325.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9497325.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4924
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9497325.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9497325.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of UnmapMainImage
        PID:3784
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3784 -s 12
          4⤵
          • Program crash
          PID:3888
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 3880 -ip 3880
    1⤵
      PID:4856
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 3784 -ip 3784
      1⤵
        PID:1620

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Modify Existing Service

      1
      T1031

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Disabling Security Tools

      2
      T1089

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      Query Registry

      1
      T1012

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9497325.exe
        Filesize

        905KB

        MD5

        5755475190f36d252e5a7b1bc31ae544

        SHA1

        83604392874f37116efa8cf8c3ee36fb99c6412a

        SHA256

        0ec5c6c50f92916889f178f7342f3e64a062da5eb31d8ffffc8612ab49a4998c

        SHA512

        66e11cb8537c12cfa5ccd8829b19d803636e47fbcc6d40450f8c75022fcce2b73075849855684d52c980e564a62c56b9c8ba165cad776f6ef853495e46f6651c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9497325.exe
        Filesize

        905KB

        MD5

        5755475190f36d252e5a7b1bc31ae544

        SHA1

        83604392874f37116efa8cf8c3ee36fb99c6412a

        SHA256

        0ec5c6c50f92916889f178f7342f3e64a062da5eb31d8ffffc8612ab49a4998c

        SHA512

        66e11cb8537c12cfa5ccd8829b19d803636e47fbcc6d40450f8c75022fcce2b73075849855684d52c980e564a62c56b9c8ba165cad776f6ef853495e46f6651c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9497325.exe
        Filesize

        905KB

        MD5

        5755475190f36d252e5a7b1bc31ae544

        SHA1

        83604392874f37116efa8cf8c3ee36fb99c6412a

        SHA256

        0ec5c6c50f92916889f178f7342f3e64a062da5eb31d8ffffc8612ab49a4998c

        SHA512

        66e11cb8537c12cfa5ccd8829b19d803636e47fbcc6d40450f8c75022fcce2b73075849855684d52c980e564a62c56b9c8ba165cad776f6ef853495e46f6651c

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0857551.exe
        Filesize

        751KB

        MD5

        38cf0294577d2678e1b1bef63c9921bf

        SHA1

        4495704a70fb9eacd756855032d8fa7deb822158

        SHA256

        85560a8277b09e0da8e784e2179b0e6b495b2badd687e1c95ab61b215cdefa6e

        SHA512

        faab095dec322bb5e51004bbbc0835eea6e3f7c687bff77a7d0d7842399f64edeabc35f9b5d6d2f193d908a3f65f80ede802af3f57d241b131ed65d09c035faf

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0857551.exe
        Filesize

        751KB

        MD5

        38cf0294577d2678e1b1bef63c9921bf

        SHA1

        4495704a70fb9eacd756855032d8fa7deb822158

        SHA256

        85560a8277b09e0da8e784e2179b0e6b495b2badd687e1c95ab61b215cdefa6e

        SHA512

        faab095dec322bb5e51004bbbc0835eea6e3f7c687bff77a7d0d7842399f64edeabc35f9b5d6d2f193d908a3f65f80ede802af3f57d241b131ed65d09c035faf

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7069279.exe
        Filesize

        963KB

        MD5

        fe66235a19f65fad9ba9fd00396d2d5a

        SHA1

        ec637eecb9358dabe2c6a3e90df6973d1bd0800f

        SHA256

        80788f525be514689e3a6109a9a9f5c4ebe8893bd4ef899c1d6f4ba7d50f4611

        SHA512

        bed17467c82d229e8c13ad3eb494125efe51331b3c01a5656d71a3a4e348cfa1eda11cc49488ce1b4ad1b01ec048b923bebfefbfb9ea9d13229c24d89771d44c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7069279.exe
        Filesize

        963KB

        MD5

        fe66235a19f65fad9ba9fd00396d2d5a

        SHA1

        ec637eecb9358dabe2c6a3e90df6973d1bd0800f

        SHA256

        80788f525be514689e3a6109a9a9f5c4ebe8893bd4ef899c1d6f4ba7d50f4611

        SHA512

        bed17467c82d229e8c13ad3eb494125efe51331b3c01a5656d71a3a4e348cfa1eda11cc49488ce1b4ad1b01ec048b923bebfefbfb9ea9d13229c24d89771d44c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7069279.exe
        Filesize

        963KB

        MD5

        fe66235a19f65fad9ba9fd00396d2d5a

        SHA1

        ec637eecb9358dabe2c6a3e90df6973d1bd0800f

        SHA256

        80788f525be514689e3a6109a9a9f5c4ebe8893bd4ef899c1d6f4ba7d50f4611

        SHA512

        bed17467c82d229e8c13ad3eb494125efe51331b3c01a5656d71a3a4e348cfa1eda11cc49488ce1b4ad1b01ec048b923bebfefbfb9ea9d13229c24d89771d44c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c7069279.exe
        Filesize

        963KB

        MD5

        fe66235a19f65fad9ba9fd00396d2d5a

        SHA1

        ec637eecb9358dabe2c6a3e90df6973d1bd0800f

        SHA256

        80788f525be514689e3a6109a9a9f5c4ebe8893bd4ef899c1d6f4ba7d50f4611

        SHA512

        bed17467c82d229e8c13ad3eb494125efe51331b3c01a5656d71a3a4e348cfa1eda11cc49488ce1b4ad1b01ec048b923bebfefbfb9ea9d13229c24d89771d44c

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0667410.exe
        Filesize

        306KB

        MD5

        4c2cbe564e191655766a4608cf3f37d5

        SHA1

        921a3a9036c1c4346174ef4f0a4626c1d30e19be

        SHA256

        9f1bec16a16bd33d5f55153c61f79337984fe405d8d25a458c7d5472ad142b0a

        SHA512

        b8b420aa97f9f425da395aad5b4329053a57f7fdea9411efb99df07dce3b7b4fff0d3e840e16917a51160e9d43705ffd9a2f6f168c6584bde5e456893721dd19

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0667410.exe
        Filesize

        306KB

        MD5

        4c2cbe564e191655766a4608cf3f37d5

        SHA1

        921a3a9036c1c4346174ef4f0a4626c1d30e19be

        SHA256

        9f1bec16a16bd33d5f55153c61f79337984fe405d8d25a458c7d5472ad142b0a

        SHA512

        b8b420aa97f9f425da395aad5b4329053a57f7fdea9411efb99df07dce3b7b4fff0d3e840e16917a51160e9d43705ffd9a2f6f168c6584bde5e456893721dd19

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7050364.exe
        Filesize

        185KB

        MD5

        259665eae78111f16c74e438d40cd737

        SHA1

        18a28643250a7cfd0e2cdad78abc744e0ee19f8b

        SHA256

        6eb73a7f09d7bf40e185f3b7cd10f913fac3f99c2c3a3d5de30f1790b0089038

        SHA512

        78bb474b0c8d7853dc60df1e291c7954de360244fb5561eefaaf579cfeea7af2bc592f759657a4a8b83b6f2cea5108049d524aa727489aa309cfad784801ffc6

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7050364.exe
        Filesize

        185KB

        MD5

        259665eae78111f16c74e438d40cd737

        SHA1

        18a28643250a7cfd0e2cdad78abc744e0ee19f8b

        SHA256

        6eb73a7f09d7bf40e185f3b7cd10f913fac3f99c2c3a3d5de30f1790b0089038

        SHA512

        78bb474b0c8d7853dc60df1e291c7954de360244fb5561eefaaf579cfeea7af2bc592f759657a4a8b83b6f2cea5108049d524aa727489aa309cfad784801ffc6

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4487091.exe
        Filesize

        145KB

        MD5

        9e6d29a1e0d62828b32d3c18f4556cf8

        SHA1

        ee9288b9ffb971f631824b9fb69150504547e5b2

        SHA256

        52378abce799b1a37e5d77d15fc41ba4d2d75cba46736a80386a2571cb23095a

        SHA512

        6ec35c9bf8c0fac0ee01284c0b947071f89b38634a50530dae63fb75a122c8a8b15ecc9027ee884b7e6d4486ed958b3c80058711f3a4d7e93125e0212184c7e6

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4487091.exe
        Filesize

        145KB

        MD5

        9e6d29a1e0d62828b32d3c18f4556cf8

        SHA1

        ee9288b9ffb971f631824b9fb69150504547e5b2

        SHA256

        52378abce799b1a37e5d77d15fc41ba4d2d75cba46736a80386a2571cb23095a

        SHA512

        6ec35c9bf8c0fac0ee01284c0b947071f89b38634a50530dae63fb75a122c8a8b15ecc9027ee884b7e6d4486ed958b3c80058711f3a4d7e93125e0212184c7e6

      • memory/1108-186-0x0000000004A40000-0x0000000004A50000-memory.dmp
        Filesize

        64KB

      • memory/1108-176-0x0000000004970000-0x0000000004986000-memory.dmp
        Filesize

        88KB

      • memory/1108-162-0x0000000004970000-0x0000000004986000-memory.dmp
        Filesize

        88KB

      • memory/1108-166-0x0000000004970000-0x0000000004986000-memory.dmp
        Filesize

        88KB

      • memory/1108-187-0x0000000004A40000-0x0000000004A50000-memory.dmp
        Filesize

        64KB

      • memory/1108-178-0x0000000004970000-0x0000000004986000-memory.dmp
        Filesize

        88KB

      • memory/1108-180-0x0000000004970000-0x0000000004986000-memory.dmp
        Filesize

        88KB

      • memory/1108-182-0x0000000004970000-0x0000000004986000-memory.dmp
        Filesize

        88KB

      • memory/1108-184-0x0000000004970000-0x0000000004986000-memory.dmp
        Filesize

        88KB

      • memory/1108-185-0x0000000004A40000-0x0000000004A50000-memory.dmp
        Filesize

        64KB

      • memory/1108-172-0x0000000004970000-0x0000000004986000-memory.dmp
        Filesize

        88KB

      • memory/1108-170-0x0000000004970000-0x0000000004986000-memory.dmp
        Filesize

        88KB

      • memory/1108-174-0x0000000004970000-0x0000000004986000-memory.dmp
        Filesize

        88KB

      • memory/1108-164-0x0000000004970000-0x0000000004986000-memory.dmp
        Filesize

        88KB

      • memory/1108-154-0x0000000004A40000-0x0000000004A50000-memory.dmp
        Filesize

        64KB

      • memory/1108-155-0x0000000004A50000-0x0000000004FF4000-memory.dmp
        Filesize

        5.6MB

      • memory/1108-156-0x0000000004A40000-0x0000000004A50000-memory.dmp
        Filesize

        64KB

      • memory/1108-157-0x0000000004970000-0x0000000004986000-memory.dmp
        Filesize

        88KB

      • memory/1108-160-0x0000000004970000-0x0000000004986000-memory.dmp
        Filesize

        88KB

      • memory/1108-158-0x0000000004970000-0x0000000004986000-memory.dmp
        Filesize

        88KB

      • memory/1108-168-0x0000000004970000-0x0000000004986000-memory.dmp
        Filesize

        88KB

      • memory/3500-198-0x00000000059D0000-0x00000000059E0000-memory.dmp
        Filesize

        64KB

      • memory/3500-194-0x00000000056D0000-0x00000000057DA000-memory.dmp
        Filesize

        1.0MB

      • memory/3500-201-0x0000000006FD0000-0x0000000007046000-memory.dmp
        Filesize

        472KB

      • memory/3500-202-0x0000000007050000-0x00000000070A0000-memory.dmp
        Filesize

        320KB

      • memory/3500-203-0x0000000007270000-0x0000000007432000-memory.dmp
        Filesize

        1.8MB

      • memory/3500-204-0x0000000007970000-0x0000000007E9C000-memory.dmp
        Filesize

        5.2MB

      • memory/3500-199-0x00000000064F0000-0x0000000006582000-memory.dmp
        Filesize

        584KB

      • memory/3500-197-0x0000000005660000-0x000000000569C000-memory.dmp
        Filesize

        240KB

      • memory/3500-192-0x0000000000D70000-0x0000000000D9A000-memory.dmp
        Filesize

        168KB

      • memory/3500-193-0x0000000005B90000-0x00000000061A8000-memory.dmp
        Filesize

        6.1MB

      • memory/3500-196-0x00000000059D0000-0x00000000059E0000-memory.dmp
        Filesize

        64KB

      • memory/3500-200-0x0000000006590000-0x00000000065F6000-memory.dmp
        Filesize

        408KB

      • memory/3500-195-0x0000000005600000-0x0000000005612000-memory.dmp
        Filesize

        72KB

      • memory/3784-220-0x0000000000400000-0x000000000042A000-memory.dmp
        Filesize

        168KB

      • memory/3880-212-0x0000000000400000-0x0000000000438000-memory.dmp
        Filesize

        224KB

      • memory/3880-223-0x0000000000350000-0x0000000000350000-memory.dmp
      • memory/4764-210-0x0000000007700000-0x0000000007710000-memory.dmp
        Filesize

        64KB

      • memory/4764-209-0x00000000008B0000-0x00000000009A8000-memory.dmp
        Filesize

        992KB

      • memory/4924-218-0x0000000000290000-0x0000000000378000-memory.dmp
        Filesize

        928KB

      • memory/4924-219-0x0000000007020000-0x0000000007030000-memory.dmp
        Filesize

        64KB