Analysis

  • max time kernel
    135s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/05/2023, 18:48

General

  • Target

    4d8c0e0fb847546b62f289b52e1e3b0fcd422d01d3b480495fec6c9b6f58929e.exe

  • Size

    1.1MB

  • MD5

    38433902f114dceea8ce4ad909f7e19a

  • SHA1

    fcffb00a29abecb2940eb9fd99b190f9c5a1ec21

  • SHA256

    4d8c0e0fb847546b62f289b52e1e3b0fcd422d01d3b480495fec6c9b6f58929e

  • SHA512

    174fd9cd33f6ac22b8d68f039f33c3dd02eb0ffb3520707fcbf7097e70966c75dffbd81daa59902238e98ad1330ddbd98bd8aee6115bf5b3b3f692bcb2691419

  • SSDEEP

    24576:SycIv4+Matsxz67VJ1UKzhrV2bjDzSivsTU5D2Z/J1:5WH3xWRJ1U8bUDzXvsTUJ2Z/J

Malware Config

Extracted

Family

redline

Botnet

linda

C2

185.161.248.75:4132

Attributes
  • auth_value

    21cdc21d041667b9c1679f88a1146770

Extracted

Family

redline

Botnet

horor

C2

185.161.248.75:4132

Attributes
  • auth_value

    b8d506fe48db15c38fb031d07f42d529

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d8c0e0fb847546b62f289b52e1e3b0fcd422d01d3b480495fec6c9b6f58929e.exe
    "C:\Users\Admin\AppData\Local\Temp\4d8c0e0fb847546b62f289b52e1e3b0fcd422d01d3b480495fec6c9b6f58929e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1924
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6710588.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6710588.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1328
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6063623.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6063623.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4568
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1468673.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1468673.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1304
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1782449.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1782449.exe
          4⤵
          • Executes dropped EXE
          PID:1376
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 928
            5⤵
            • Program crash
            PID:3176
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1990973.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1990973.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1500
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1990973.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1990973.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4300
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6898711.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6898711.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3836
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6898711.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6898711.exe
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of WriteProcessMemory
        PID:4976
        • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
          "C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3168
          • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of UnmapMainImage
            PID:3144
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3144 -s 12
              6⤵
              • Program crash
              PID:4952
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1376 -ip 1376
    1⤵
      PID:1528
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 3144 -ip 3144
      1⤵
        PID:3616

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\r1990973.exe.log

        Filesize

        425B

        MD5

        4eaca4566b22b01cd3bc115b9b0b2196

        SHA1

        e743e0792c19f71740416e7b3c061d9f1336bf94

        SHA256

        34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

        SHA512

        bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

      • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

        Filesize

        962KB

        MD5

        ce559f3ff33c9e9084e5c67c1daf4efe

        SHA1

        869a46b96d95d7438983240c58aae138aaea60db

        SHA256

        a60ecae873b9f0bf3f65de9713aa57b73ec8345624f3a3e2de727572f9d353a4

        SHA512

        3ac8837baac0e0b697890f1ab0f0666df99d12574e64770807850a4eed24aa692d6d282131b2b20e524bd2ec27bcb3792965d8bce813e7b89130e4d9451ed24a

      • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

        Filesize

        962KB

        MD5

        ce559f3ff33c9e9084e5c67c1daf4efe

        SHA1

        869a46b96d95d7438983240c58aae138aaea60db

        SHA256

        a60ecae873b9f0bf3f65de9713aa57b73ec8345624f3a3e2de727572f9d353a4

        SHA512

        3ac8837baac0e0b697890f1ab0f0666df99d12574e64770807850a4eed24aa692d6d282131b2b20e524bd2ec27bcb3792965d8bce813e7b89130e4d9451ed24a

      • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

        Filesize

        962KB

        MD5

        ce559f3ff33c9e9084e5c67c1daf4efe

        SHA1

        869a46b96d95d7438983240c58aae138aaea60db

        SHA256

        a60ecae873b9f0bf3f65de9713aa57b73ec8345624f3a3e2de727572f9d353a4

        SHA512

        3ac8837baac0e0b697890f1ab0f0666df99d12574e64770807850a4eed24aa692d6d282131b2b20e524bd2ec27bcb3792965d8bce813e7b89130e4d9451ed24a

      • C:\Users\Admin\AppData\Local\Temp\41bde21dc7\legends.exe

        Filesize

        962KB

        MD5

        ce559f3ff33c9e9084e5c67c1daf4efe

        SHA1

        869a46b96d95d7438983240c58aae138aaea60db

        SHA256

        a60ecae873b9f0bf3f65de9713aa57b73ec8345624f3a3e2de727572f9d353a4

        SHA512

        3ac8837baac0e0b697890f1ab0f0666df99d12574e64770807850a4eed24aa692d6d282131b2b20e524bd2ec27bcb3792965d8bce813e7b89130e4d9451ed24a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6898711.exe

        Filesize

        962KB

        MD5

        ce559f3ff33c9e9084e5c67c1daf4efe

        SHA1

        869a46b96d95d7438983240c58aae138aaea60db

        SHA256

        a60ecae873b9f0bf3f65de9713aa57b73ec8345624f3a3e2de727572f9d353a4

        SHA512

        3ac8837baac0e0b697890f1ab0f0666df99d12574e64770807850a4eed24aa692d6d282131b2b20e524bd2ec27bcb3792965d8bce813e7b89130e4d9451ed24a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6898711.exe

        Filesize

        962KB

        MD5

        ce559f3ff33c9e9084e5c67c1daf4efe

        SHA1

        869a46b96d95d7438983240c58aae138aaea60db

        SHA256

        a60ecae873b9f0bf3f65de9713aa57b73ec8345624f3a3e2de727572f9d353a4

        SHA512

        3ac8837baac0e0b697890f1ab0f0666df99d12574e64770807850a4eed24aa692d6d282131b2b20e524bd2ec27bcb3792965d8bce813e7b89130e4d9451ed24a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6898711.exe

        Filesize

        962KB

        MD5

        ce559f3ff33c9e9084e5c67c1daf4efe

        SHA1

        869a46b96d95d7438983240c58aae138aaea60db

        SHA256

        a60ecae873b9f0bf3f65de9713aa57b73ec8345624f3a3e2de727572f9d353a4

        SHA512

        3ac8837baac0e0b697890f1ab0f0666df99d12574e64770807850a4eed24aa692d6d282131b2b20e524bd2ec27bcb3792965d8bce813e7b89130e4d9451ed24a

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6710588.exe

        Filesize

        702KB

        MD5

        84a43bd01017ba42a01d137322da8e99

        SHA1

        3208441654f165d52840422f9eb133e71d10e230

        SHA256

        1971901303e0ad30b51f90cc0ee995604abfb9cfa6a24e700ce8ace0ab587b51

        SHA512

        0c02a1539cfd585530910b1087fc95191201f22080a975a9d859a618e3922c2842ef9a5a6cd130334ccc14a5ec9838122a3ac08699b433723be5b8e40a489f64

      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6710588.exe

        Filesize

        702KB

        MD5

        84a43bd01017ba42a01d137322da8e99

        SHA1

        3208441654f165d52840422f9eb133e71d10e230

        SHA256

        1971901303e0ad30b51f90cc0ee995604abfb9cfa6a24e700ce8ace0ab587b51

        SHA512

        0c02a1539cfd585530910b1087fc95191201f22080a975a9d859a618e3922c2842ef9a5a6cd130334ccc14a5ec9838122a3ac08699b433723be5b8e40a489f64

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1990973.exe

        Filesize

        903KB

        MD5

        f2d1c7d55c5a9401e8ca6af3e30903e4

        SHA1

        93c35dd62ca8d997ae4726ce46bf61948c382f0e

        SHA256

        b0721f88456333c22d1190451bdbbeeb922ace13edeff6f5760c42d461ff8372

        SHA512

        cc426ff24fce1f529e6438464321e8a70f68cb442c7fcbdc016787880d75c5533bd1b46416c365d9dbce6e68da1c1360193669621a15a5652178976fb39eb795

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1990973.exe

        Filesize

        903KB

        MD5

        f2d1c7d55c5a9401e8ca6af3e30903e4

        SHA1

        93c35dd62ca8d997ae4726ce46bf61948c382f0e

        SHA256

        b0721f88456333c22d1190451bdbbeeb922ace13edeff6f5760c42d461ff8372

        SHA512

        cc426ff24fce1f529e6438464321e8a70f68cb442c7fcbdc016787880d75c5533bd1b46416c365d9dbce6e68da1c1360193669621a15a5652178976fb39eb795

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r1990973.exe

        Filesize

        903KB

        MD5

        f2d1c7d55c5a9401e8ca6af3e30903e4

        SHA1

        93c35dd62ca8d997ae4726ce46bf61948c382f0e

        SHA256

        b0721f88456333c22d1190451bdbbeeb922ace13edeff6f5760c42d461ff8372

        SHA512

        cc426ff24fce1f529e6438464321e8a70f68cb442c7fcbdc016787880d75c5533bd1b46416c365d9dbce6e68da1c1360193669621a15a5652178976fb39eb795

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6063623.exe

        Filesize

        305KB

        MD5

        33881f1f68ad7dbfa738adce1447a790

        SHA1

        06fc5feb7665d15f54762bd8a1d7d969158a5b26

        SHA256

        0d75e57de046524deb6946fa8f511dd8b8096e19da2cdfc765866e6b25fe0358

        SHA512

        7fec9e080e83c77348e52febd9b9cf689f83fbecb9cd12e8464f8b87f692fb621116f2b3e1b49b907c8ec570cb74e4220ca52b5095c2ab6e7640912c183da1e0

      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6063623.exe

        Filesize

        305KB

        MD5

        33881f1f68ad7dbfa738adce1447a790

        SHA1

        06fc5feb7665d15f54762bd8a1d7d969158a5b26

        SHA256

        0d75e57de046524deb6946fa8f511dd8b8096e19da2cdfc765866e6b25fe0358

        SHA512

        7fec9e080e83c77348e52febd9b9cf689f83fbecb9cd12e8464f8b87f692fb621116f2b3e1b49b907c8ec570cb74e4220ca52b5095c2ab6e7640912c183da1e0

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1468673.exe

        Filesize

        184KB

        MD5

        38dedbce91565e9fed66fe76844e600b

        SHA1

        ead8ce5a380cadf3e769967c8ec603838ee2a887

        SHA256

        5e696bf4eb344caeee1263fd1f0d659c55d662cecb314e1936c8f8ebd87ec3b2

        SHA512

        d1ed80077fbde0573a412f98b99b5a622e8e032fce7b8aeb37de464fa8653dca63ce29c0628604326a61e7bba529afa0fcd96ffa93c1eeff2304d67935d3b953

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o1468673.exe

        Filesize

        184KB

        MD5

        38dedbce91565e9fed66fe76844e600b

        SHA1

        ead8ce5a380cadf3e769967c8ec603838ee2a887

        SHA256

        5e696bf4eb344caeee1263fd1f0d659c55d662cecb314e1936c8f8ebd87ec3b2

        SHA512

        d1ed80077fbde0573a412f98b99b5a622e8e032fce7b8aeb37de464fa8653dca63ce29c0628604326a61e7bba529afa0fcd96ffa93c1eeff2304d67935d3b953

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1782449.exe

        Filesize

        145KB

        MD5

        da18e0e0d4664915884794f109e3cf20

        SHA1

        87fae961354869412269400936021da9e64bee98

        SHA256

        e4ccc39ae89f73c78d108cf7058ac9a9411919a8cab722e7bd0b5b3e558b45b4

        SHA512

        d0aaa75b26bde94745bfd80f0108c5f06f23acb59025f40eedf7bdc43f84086f0acd5bb72ab366b80418f18dea492fe348943b994515bed691bd828f8413001d

      • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p1782449.exe

        Filesize

        145KB

        MD5

        da18e0e0d4664915884794f109e3cf20

        SHA1

        87fae961354869412269400936021da9e64bee98

        SHA256

        e4ccc39ae89f73c78d108cf7058ac9a9411919a8cab722e7bd0b5b3e558b45b4

        SHA512

        d0aaa75b26bde94745bfd80f0108c5f06f23acb59025f40eedf7bdc43f84086f0acd5bb72ab366b80418f18dea492fe348943b994515bed691bd828f8413001d

      • memory/1304-167-0x0000000002410000-0x0000000002426000-memory.dmp

        Filesize

        88KB

      • memory/1304-186-0x0000000004A80000-0x0000000004A90000-memory.dmp

        Filesize

        64KB

      • memory/1304-169-0x0000000002410000-0x0000000002426000-memory.dmp

        Filesize

        88KB

      • memory/1304-171-0x0000000002410000-0x0000000002426000-memory.dmp

        Filesize

        88KB

      • memory/1304-173-0x0000000002410000-0x0000000002426000-memory.dmp

        Filesize

        88KB

      • memory/1304-175-0x0000000002410000-0x0000000002426000-memory.dmp

        Filesize

        88KB

      • memory/1304-177-0x0000000002410000-0x0000000002426000-memory.dmp

        Filesize

        88KB

      • memory/1304-179-0x0000000002410000-0x0000000002426000-memory.dmp

        Filesize

        88KB

      • memory/1304-181-0x0000000002410000-0x0000000002426000-memory.dmp

        Filesize

        88KB

      • memory/1304-183-0x0000000002410000-0x0000000002426000-memory.dmp

        Filesize

        88KB

      • memory/1304-185-0x0000000002410000-0x0000000002426000-memory.dmp

        Filesize

        88KB

      • memory/1304-165-0x0000000002410000-0x0000000002426000-memory.dmp

        Filesize

        88KB

      • memory/1304-187-0x0000000004A80000-0x0000000004A90000-memory.dmp

        Filesize

        64KB

      • memory/1304-163-0x0000000002410000-0x0000000002426000-memory.dmp

        Filesize

        88KB

      • memory/1304-161-0x0000000002410000-0x0000000002426000-memory.dmp

        Filesize

        88KB

      • memory/1304-159-0x0000000002410000-0x0000000002426000-memory.dmp

        Filesize

        88KB

      • memory/1304-158-0x0000000002410000-0x0000000002426000-memory.dmp

        Filesize

        88KB

      • memory/1304-157-0x0000000004A80000-0x0000000004A90000-memory.dmp

        Filesize

        64KB

      • memory/1304-156-0x0000000004A80000-0x0000000004A90000-memory.dmp

        Filesize

        64KB

      • memory/1304-154-0x0000000004A80000-0x0000000004A90000-memory.dmp

        Filesize

        64KB

      • memory/1304-155-0x0000000004A90000-0x0000000005034000-memory.dmp

        Filesize

        5.6MB

      • memory/1376-192-0x0000000000550000-0x000000000057A000-memory.dmp

        Filesize

        168KB

      • memory/1500-196-0x0000000000E50000-0x0000000000F38000-memory.dmp

        Filesize

        928KB

      • memory/1500-197-0x0000000007D40000-0x0000000007D50000-memory.dmp

        Filesize

        64KB

      • memory/3168-233-0x0000000006DC0000-0x0000000006DD0000-memory.dmp

        Filesize

        64KB

      • memory/3836-206-0x0000000007510000-0x0000000007520000-memory.dmp

        Filesize

        64KB

      • memory/3836-205-0x00000000005E0000-0x00000000006D8000-memory.dmp

        Filesize

        992KB

      • memory/4300-207-0x0000000005BA0000-0x00000000061B8000-memory.dmp

        Filesize

        6.1MB

      • memory/4300-240-0x00000000067A0000-0x0000000006816000-memory.dmp

        Filesize

        472KB

      • memory/4300-208-0x0000000005700000-0x000000000580A000-memory.dmp

        Filesize

        1.0MB

      • memory/4300-198-0x0000000000400000-0x000000000042A000-memory.dmp

        Filesize

        168KB

      • memory/4300-243-0x0000000007860000-0x0000000007D8C000-memory.dmp

        Filesize

        5.2MB

      • memory/4300-242-0x0000000007160000-0x0000000007322000-memory.dmp

        Filesize

        1.8MB

      • memory/4300-211-0x0000000005680000-0x0000000005690000-memory.dmp

        Filesize

        64KB

      • memory/4300-241-0x0000000006820000-0x0000000006870000-memory.dmp

        Filesize

        320KB

      • memory/4300-210-0x0000000005810000-0x000000000584C000-memory.dmp

        Filesize

        240KB

      • memory/4300-234-0x00000000059A0000-0x0000000005A06000-memory.dmp

        Filesize

        408KB

      • memory/4300-235-0x0000000006560000-0x00000000065F2000-memory.dmp

        Filesize

        584KB

      • memory/4300-209-0x0000000005630000-0x0000000005642000-memory.dmp

        Filesize

        72KB

      • memory/4300-239-0x0000000005680000-0x0000000005690000-memory.dmp

        Filesize

        64KB

      • memory/4976-215-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/4976-231-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/4976-212-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/4976-220-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB

      • memory/4976-216-0x0000000000400000-0x0000000000438000-memory.dmp

        Filesize

        224KB