Analysis

  • max time kernel
    135s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/05/2023, 01:42

General

  • Target

    ff1968afbd96f0d20af9c43a40c602d16421e31909d6663868a0343d1cbab503.exe

  • Size

    1.1MB

  • MD5

    1a2f1a34749948fdf4b7ce3eefb2163b

  • SHA1

    ccb5fc2f056c3f68a52e1aafa754c90ef133019b

  • SHA256

    ff1968afbd96f0d20af9c43a40c602d16421e31909d6663868a0343d1cbab503

  • SHA512

    98e2d26e00a2591b2ca4d72bbd3a0240ae4d5016bcd91459fef5b5a251c9f58d3068f284b9b2ddf80a3a74da3bb79400e1dfe8fa740c3134a393701b0c69f9f3

  • SSDEEP

    24576:hyNlFgzo1sEqBkk2Cj4vUas3Zt6b4/Sly2Md1r/:UNlFr1WBkwcs13P2yBH

Malware Config

Extracted

Family

redline

Botnet

difoz

C2

185.161.248.75:4132

Attributes
  • auth_value

    ee98afda432cdf29ea1dd0464fdc94e6

Extracted

Family

redline

Botnet

horor

C2

185.161.248.75:4132

Attributes
  • auth_value

    b8d506fe48db15c38fb031d07f42d529

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ff1968afbd96f0d20af9c43a40c602d16421e31909d6663868a0343d1cbab503.exe
    "C:\Users\Admin\AppData\Local\Temp\ff1968afbd96f0d20af9c43a40c602d16421e31909d6663868a0343d1cbab503.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4524024.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4524024.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1068
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6470070.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6470070.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4336
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k0590983.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k0590983.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2536
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9599056.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9599056.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3688
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m6528092.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m6528092.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3116
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m6528092.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m6528092.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:992
          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4932
            • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
              C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of UnmapMainImage
              PID:848
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 848 -s 12
                7⤵
                • Program crash
                PID:4812
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n8264504.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n8264504.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:384
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n8264504.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n8264504.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3768
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 848 -ip 848
    1⤵
      PID:4664

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\n8264504.exe.log

      Filesize

      425B

      MD5

      4eaca4566b22b01cd3bc115b9b0b2196

      SHA1

      e743e0792c19f71740416e7b3c061d9f1336bf94

      SHA256

      34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

      SHA512

      bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n8264504.exe

      Filesize

      904KB

      MD5

      1fac4fb201ae0b904a5593dc9e33146a

      SHA1

      13a16b7892664eafef49e3d61dd3e8fa6755e56a

      SHA256

      08ffc44501e5d7596f6625bb3d5db2af1132aa2e6e3b957a400e4d43c1b79266

      SHA512

      9a8a295d4559a10a4b842289d04898dbd32e4ad27bd7e652d2ce651d6ff5eacb9899585cc332ba22e0037ff823f6d538f74b28a475d2eae41466371ebdeec119

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n8264504.exe

      Filesize

      904KB

      MD5

      1fac4fb201ae0b904a5593dc9e33146a

      SHA1

      13a16b7892664eafef49e3d61dd3e8fa6755e56a

      SHA256

      08ffc44501e5d7596f6625bb3d5db2af1132aa2e6e3b957a400e4d43c1b79266

      SHA512

      9a8a295d4559a10a4b842289d04898dbd32e4ad27bd7e652d2ce651d6ff5eacb9899585cc332ba22e0037ff823f6d538f74b28a475d2eae41466371ebdeec119

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n8264504.exe

      Filesize

      904KB

      MD5

      1fac4fb201ae0b904a5593dc9e33146a

      SHA1

      13a16b7892664eafef49e3d61dd3e8fa6755e56a

      SHA256

      08ffc44501e5d7596f6625bb3d5db2af1132aa2e6e3b957a400e4d43c1b79266

      SHA512

      9a8a295d4559a10a4b842289d04898dbd32e4ad27bd7e652d2ce651d6ff5eacb9899585cc332ba22e0037ff823f6d538f74b28a475d2eae41466371ebdeec119

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4524024.exe

      Filesize

      751KB

      MD5

      a104262f6f9c5420ad55ec098edec664

      SHA1

      bf6c3718dec034fc4e4895ed4a6092b7033d7a49

      SHA256

      fdfc84c5ed5ad9ad831827212595c13b8361cac314b289769c1ce5ccfb6fbcf1

      SHA512

      d771d1496b9209f5892daf2e6c7e6069a7d00ae719edfeb352dacc9b4e0a2189a92c5b90957659366e86efa13091fb3b47ae01f115d92c6ce397103285c54b93

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4524024.exe

      Filesize

      751KB

      MD5

      a104262f6f9c5420ad55ec098edec664

      SHA1

      bf6c3718dec034fc4e4895ed4a6092b7033d7a49

      SHA256

      fdfc84c5ed5ad9ad831827212595c13b8361cac314b289769c1ce5ccfb6fbcf1

      SHA512

      d771d1496b9209f5892daf2e6c7e6069a7d00ae719edfeb352dacc9b4e0a2189a92c5b90957659366e86efa13091fb3b47ae01f115d92c6ce397103285c54b93

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m6528092.exe

      Filesize

      963KB

      MD5

      9e1614489ff9a56be195701a91a726c6

      SHA1

      9526f44e65d1b9a1d83f287621fa34c1040162e3

      SHA256

      19fd98efed9dbb8c63cedc192d3dd860dd6be50f226b60fc304823895500ac63

      SHA512

      05bb94117723cc97a2426ece1785f5036173e73fc661f1fe961180f58f9e776fa0f6abd0070289d3f56de822ad126c16d94e588b0314201359eec83f80b73ced

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m6528092.exe

      Filesize

      963KB

      MD5

      9e1614489ff9a56be195701a91a726c6

      SHA1

      9526f44e65d1b9a1d83f287621fa34c1040162e3

      SHA256

      19fd98efed9dbb8c63cedc192d3dd860dd6be50f226b60fc304823895500ac63

      SHA512

      05bb94117723cc97a2426ece1785f5036173e73fc661f1fe961180f58f9e776fa0f6abd0070289d3f56de822ad126c16d94e588b0314201359eec83f80b73ced

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m6528092.exe

      Filesize

      963KB

      MD5

      9e1614489ff9a56be195701a91a726c6

      SHA1

      9526f44e65d1b9a1d83f287621fa34c1040162e3

      SHA256

      19fd98efed9dbb8c63cedc192d3dd860dd6be50f226b60fc304823895500ac63

      SHA512

      05bb94117723cc97a2426ece1785f5036173e73fc661f1fe961180f58f9e776fa0f6abd0070289d3f56de822ad126c16d94e588b0314201359eec83f80b73ced

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6470070.exe

      Filesize

      305KB

      MD5

      4ab989541e1f2eaa33a62d378efbe6f9

      SHA1

      b1ead1be4254bab658bc1065fee41e62066f4e9f

      SHA256

      4bf5062b977fec8e37fb7e6dde6a9debc7c8ecfde2adb9e221f6e9aba3c2303d

      SHA512

      d417879f6e5b828ebe4105e5375eefd1ced1b310d3480e38421887285adbfefc756881f43c347b8f02ca388a8b55b1281c27c7274f984df8069462ff1b4fdcb1

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6470070.exe

      Filesize

      305KB

      MD5

      4ab989541e1f2eaa33a62d378efbe6f9

      SHA1

      b1ead1be4254bab658bc1065fee41e62066f4e9f

      SHA256

      4bf5062b977fec8e37fb7e6dde6a9debc7c8ecfde2adb9e221f6e9aba3c2303d

      SHA512

      d417879f6e5b828ebe4105e5375eefd1ced1b310d3480e38421887285adbfefc756881f43c347b8f02ca388a8b55b1281c27c7274f984df8069462ff1b4fdcb1

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k0590983.exe

      Filesize

      184KB

      MD5

      9c3b5573d27ee780f71c41f02e0a2f08

      SHA1

      d768f49d36f069095e1c61841da88163bc8142c1

      SHA256

      a4187a922c0824620877573b7fd2972e7b90c127d2ca8db20623dc44ff6703fd

      SHA512

      e8b8af523c365463c769d617f854cb4c6b331648a2402494947eab72240bf1c0c743e298090cb0f49e48841d1fe655153254cda67477e2c45ab80b3fe3c93737

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k0590983.exe

      Filesize

      184KB

      MD5

      9c3b5573d27ee780f71c41f02e0a2f08

      SHA1

      d768f49d36f069095e1c61841da88163bc8142c1

      SHA256

      a4187a922c0824620877573b7fd2972e7b90c127d2ca8db20623dc44ff6703fd

      SHA512

      e8b8af523c365463c769d617f854cb4c6b331648a2402494947eab72240bf1c0c743e298090cb0f49e48841d1fe655153254cda67477e2c45ab80b3fe3c93737

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9599056.exe

      Filesize

      145KB

      MD5

      0b6ea061929a9fbd2ed1079277998132

      SHA1

      2dcf49c5734c47332e1b2d645e0898eff6b90614

      SHA256

      c77d3d5624bf2f3614f6e7171903b25241a5e3adaea1faf69f13ce98e1adf737

      SHA512

      9620ddc25edbaa1667d7bfb06dbdc725aa26e79702ccffa4377e9bfc65f2e097653c29096300dab6d582240a8f1b58606c303b645620a4a15d0ccab7a8ff84c6

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9599056.exe

      Filesize

      145KB

      MD5

      0b6ea061929a9fbd2ed1079277998132

      SHA1

      2dcf49c5734c47332e1b2d645e0898eff6b90614

      SHA256

      c77d3d5624bf2f3614f6e7171903b25241a5e3adaea1faf69f13ce98e1adf737

      SHA512

      9620ddc25edbaa1667d7bfb06dbdc725aa26e79702ccffa4377e9bfc65f2e097653c29096300dab6d582240a8f1b58606c303b645620a4a15d0ccab7a8ff84c6

    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

      Filesize

      963KB

      MD5

      9e1614489ff9a56be195701a91a726c6

      SHA1

      9526f44e65d1b9a1d83f287621fa34c1040162e3

      SHA256

      19fd98efed9dbb8c63cedc192d3dd860dd6be50f226b60fc304823895500ac63

      SHA512

      05bb94117723cc97a2426ece1785f5036173e73fc661f1fe961180f58f9e776fa0f6abd0070289d3f56de822ad126c16d94e588b0314201359eec83f80b73ced

    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

      Filesize

      963KB

      MD5

      9e1614489ff9a56be195701a91a726c6

      SHA1

      9526f44e65d1b9a1d83f287621fa34c1040162e3

      SHA256

      19fd98efed9dbb8c63cedc192d3dd860dd6be50f226b60fc304823895500ac63

      SHA512

      05bb94117723cc97a2426ece1785f5036173e73fc661f1fe961180f58f9e776fa0f6abd0070289d3f56de822ad126c16d94e588b0314201359eec83f80b73ced

    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

      Filesize

      963KB

      MD5

      9e1614489ff9a56be195701a91a726c6

      SHA1

      9526f44e65d1b9a1d83f287621fa34c1040162e3

      SHA256

      19fd98efed9dbb8c63cedc192d3dd860dd6be50f226b60fc304823895500ac63

      SHA512

      05bb94117723cc97a2426ece1785f5036173e73fc661f1fe961180f58f9e776fa0f6abd0070289d3f56de822ad126c16d94e588b0314201359eec83f80b73ced

    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

      Filesize

      963KB

      MD5

      9e1614489ff9a56be195701a91a726c6

      SHA1

      9526f44e65d1b9a1d83f287621fa34c1040162e3

      SHA256

      19fd98efed9dbb8c63cedc192d3dd860dd6be50f226b60fc304823895500ac63

      SHA512

      05bb94117723cc97a2426ece1785f5036173e73fc661f1fe961180f58f9e776fa0f6abd0070289d3f56de822ad126c16d94e588b0314201359eec83f80b73ced

    • memory/384-221-0x00000000001B0000-0x0000000000298000-memory.dmp

      Filesize

      928KB

    • memory/384-223-0x0000000007070000-0x0000000007080000-memory.dmp

      Filesize

      64KB

    • memory/992-222-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/992-216-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/992-215-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/992-212-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/992-237-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/2536-171-0x0000000002410000-0x0000000002426000-memory.dmp

      Filesize

      88KB

    • memory/2536-167-0x0000000002410000-0x0000000002426000-memory.dmp

      Filesize

      88KB

    • memory/2536-187-0x0000000004B60000-0x0000000004B70000-memory.dmp

      Filesize

      64KB

    • memory/2536-154-0x0000000004B70000-0x0000000005114000-memory.dmp

      Filesize

      5.6MB

    • memory/2536-155-0x0000000002410000-0x0000000002426000-memory.dmp

      Filesize

      88KB

    • memory/2536-156-0x0000000002410000-0x0000000002426000-memory.dmp

      Filesize

      88KB

    • memory/2536-158-0x0000000002410000-0x0000000002426000-memory.dmp

      Filesize

      88KB

    • memory/2536-161-0x0000000004B60000-0x0000000004B70000-memory.dmp

      Filesize

      64KB

    • memory/2536-163-0x0000000004B60000-0x0000000004B70000-memory.dmp

      Filesize

      64KB

    • memory/2536-164-0x0000000002410000-0x0000000002426000-memory.dmp

      Filesize

      88KB

    • memory/2536-160-0x0000000002410000-0x0000000002426000-memory.dmp

      Filesize

      88KB

    • memory/2536-179-0x0000000002410000-0x0000000002426000-memory.dmp

      Filesize

      88KB

    • memory/2536-165-0x0000000004B60000-0x0000000004B70000-memory.dmp

      Filesize

      64KB

    • memory/2536-169-0x0000000002410000-0x0000000002426000-memory.dmp

      Filesize

      88KB

    • memory/2536-173-0x0000000002410000-0x0000000002426000-memory.dmp

      Filesize

      88KB

    • memory/2536-175-0x0000000002410000-0x0000000002426000-memory.dmp

      Filesize

      88KB

    • memory/2536-186-0x0000000004B60000-0x0000000004B70000-memory.dmp

      Filesize

      64KB

    • memory/2536-185-0x0000000002410000-0x0000000002426000-memory.dmp

      Filesize

      88KB

    • memory/2536-177-0x0000000002410000-0x0000000002426000-memory.dmp

      Filesize

      88KB

    • memory/2536-188-0x0000000004B60000-0x0000000004B70000-memory.dmp

      Filesize

      64KB

    • memory/2536-183-0x0000000002410000-0x0000000002426000-memory.dmp

      Filesize

      88KB

    • memory/2536-181-0x0000000002410000-0x0000000002426000-memory.dmp

      Filesize

      88KB

    • memory/3116-211-0x0000000007400000-0x0000000007410000-memory.dmp

      Filesize

      64KB

    • memory/3116-210-0x00000000005E0000-0x00000000006D8000-memory.dmp

      Filesize

      992KB

    • memory/3688-198-0x00000000051B0000-0x00000000051EC000-memory.dmp

      Filesize

      240KB

    • memory/3688-194-0x00000000056C0000-0x0000000005CD8000-memory.dmp

      Filesize

      6.1MB

    • memory/3688-203-0x0000000005460000-0x0000000005470000-memory.dmp

      Filesize

      64KB

    • memory/3688-202-0x0000000007110000-0x000000000763C000-memory.dmp

      Filesize

      5.2MB

    • memory/3688-201-0x0000000006A10000-0x0000000006BD2000-memory.dmp

      Filesize

      1.8MB

    • memory/3688-200-0x0000000005CE0000-0x0000000005D46000-memory.dmp

      Filesize

      408KB

    • memory/3688-204-0x0000000006BE0000-0x0000000006C56000-memory.dmp

      Filesize

      472KB

    • memory/3688-193-0x0000000000780000-0x00000000007AA000-memory.dmp

      Filesize

      168KB

    • memory/3688-197-0x0000000005460000-0x0000000005470000-memory.dmp

      Filesize

      64KB

    • memory/3688-205-0x0000000006990000-0x00000000069E0000-memory.dmp

      Filesize

      320KB

    • memory/3688-199-0x0000000005620000-0x00000000056B2000-memory.dmp

      Filesize

      584KB

    • memory/3688-196-0x0000000005150000-0x0000000005162000-memory.dmp

      Filesize

      72KB

    • memory/3688-195-0x0000000005220000-0x000000000532A000-memory.dmp

      Filesize

      1.0MB

    • memory/3768-239-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/3768-243-0x0000000005780000-0x0000000005790000-memory.dmp

      Filesize

      64KB

    • memory/4932-238-0x0000000007C90000-0x0000000007CA0000-memory.dmp

      Filesize

      64KB