Analysis

  • max time kernel
    55s
  • max time network
    147s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15-05-2023 08:27

General

  • Target

    53bafacf5dbce251d4ef8411f7b60608d4891d0fcc786acb1d7b5bf0954c440b.exe

  • Size

    1.1MB

  • MD5

    5cf03847cc6a6b72695aa889b28b9616

  • SHA1

    79c28a63e445fd715b81c2c7cd9370d33d3cea51

  • SHA256

    53bafacf5dbce251d4ef8411f7b60608d4891d0fcc786acb1d7b5bf0954c440b

  • SHA512

    8f41fcdad8f1a9006e00689ac716a88f9b2a4baf1d74bf026a4b15d50416236a62825fcdc4d963bc3293cb6a4c62fdf64e3045911a04ddbd2dc757c71104489e

  • SSDEEP

    24576:EygE45A8WZVz1q9ZxvL6tgCXYTrIDiPPfMLy9tJ7E0:ThUuZ11qPotgCXCrIDWPf4y9/4

Malware Config

Extracted

Family

redline

Botnet

muza

C2

185.161.248.75:4132

Attributes
  • auth_value

    99f39e1ac98e0c0a729ab27594e72bc3

Extracted

Family

redline

Botnet

rumba

C2

185.161.248.75:4132

Attributes
  • auth_value

    35dbb4006087a5d5c211b21be41adb90

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\53bafacf5dbce251d4ef8411f7b60608d4891d0fcc786acb1d7b5bf0954c440b.exe
    "C:\Users\Admin\AppData\Local\Temp\53bafacf5dbce251d4ef8411f7b60608d4891d0fcc786acb1d7b5bf0954c440b.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4756
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0152005.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0152005.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:5096
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6593661.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6593661.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2104
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2681798.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2681798.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4108
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5939696.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5939696.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6442507.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6442507.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4512
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6442507.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6442507.exe
          4⤵
          • Executes dropped EXE
          PID:1836
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6442507.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6442507.exe
          4⤵
          • Executes dropped EXE
          PID:3000
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3000 -s 24
            5⤵
            • Program crash
            PID:2600
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7200007.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7200007.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4676
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7200007.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7200007.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3396

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\d7200007.exe.log

    Filesize

    425B

    MD5

    605f809fab8c19729d39d075f7ffdb53

    SHA1

    c546f877c9bd53563174a90312a8337fdfc5fdd9

    SHA256

    6904d540649e76c55f99530b81be17e099184bb4cad415aa9b9b39cc3677f556

    SHA512

    82cc12c3186ae23884b8d5c104638c8206272c4389ade56b926dfc1d437b03888159b3c790b188b54d277a262e731927e703e680ea642e1417faee27443fd5b3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7200007.exe

    Filesize

    904KB

    MD5

    143d21bc3dc622f18724fd5441f96062

    SHA1

    c92c5729bb1cbfb79413ee3ddc7a49803ea683e3

    SHA256

    6d0f972dc821b3806831af093fc82a91f675651b26ca8ea4e1eabe7fc24979e7

    SHA512

    0207f609b6373d5104dc4e7c474a92b622c6c5cea28f3c8b6505df4d8ad9af90f50a865ecd2763ebe9080111c292f35fba59cf7da53ccf3a1b5a1cd112aa8353

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7200007.exe

    Filesize

    904KB

    MD5

    143d21bc3dc622f18724fd5441f96062

    SHA1

    c92c5729bb1cbfb79413ee3ddc7a49803ea683e3

    SHA256

    6d0f972dc821b3806831af093fc82a91f675651b26ca8ea4e1eabe7fc24979e7

    SHA512

    0207f609b6373d5104dc4e7c474a92b622c6c5cea28f3c8b6505df4d8ad9af90f50a865ecd2763ebe9080111c292f35fba59cf7da53ccf3a1b5a1cd112aa8353

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7200007.exe

    Filesize

    904KB

    MD5

    143d21bc3dc622f18724fd5441f96062

    SHA1

    c92c5729bb1cbfb79413ee3ddc7a49803ea683e3

    SHA256

    6d0f972dc821b3806831af093fc82a91f675651b26ca8ea4e1eabe7fc24979e7

    SHA512

    0207f609b6373d5104dc4e7c474a92b622c6c5cea28f3c8b6505df4d8ad9af90f50a865ecd2763ebe9080111c292f35fba59cf7da53ccf3a1b5a1cd112aa8353

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0152005.exe

    Filesize

    750KB

    MD5

    a9bee5e9a3de8f0349100d94eab16c4f

    SHA1

    1bcb49cd1de98714eef520f9ab484c6fe54112ba

    SHA256

    6bc32fb7535be3a9bfecc9ee28d75b3afc441276893783ad89164b54c38eeaa5

    SHA512

    3bba671143e4fcec34d54ac8055cd6cad5e67496558bd007f1443d9e55e0ac967abdda9017edc7799c0f2976218e5c1556dd3093d88ecc228a4ff427ca248575

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0152005.exe

    Filesize

    750KB

    MD5

    a9bee5e9a3de8f0349100d94eab16c4f

    SHA1

    1bcb49cd1de98714eef520f9ab484c6fe54112ba

    SHA256

    6bc32fb7535be3a9bfecc9ee28d75b3afc441276893783ad89164b54c38eeaa5

    SHA512

    3bba671143e4fcec34d54ac8055cd6cad5e67496558bd007f1443d9e55e0ac967abdda9017edc7799c0f2976218e5c1556dd3093d88ecc228a4ff427ca248575

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6442507.exe

    Filesize

    963KB

    MD5

    7c6bf3252c4cfdaee8f24c396f2aa683

    SHA1

    621de026e22ac736eb0607d2e74df74ba67f5ee1

    SHA256

    9a92f5cda3b6c1b1533d789873ce0aa47592f52275c3507230e2b2bf2fa08842

    SHA512

    6222eef91750818ca59013f41a614d51805ba8210e5a65c9b2ebc94603989d613e86ab538e6ddd779be70d6df3292bffa5a2e5212a8a5d9df7f623304920a1a4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6442507.exe

    Filesize

    963KB

    MD5

    7c6bf3252c4cfdaee8f24c396f2aa683

    SHA1

    621de026e22ac736eb0607d2e74df74ba67f5ee1

    SHA256

    9a92f5cda3b6c1b1533d789873ce0aa47592f52275c3507230e2b2bf2fa08842

    SHA512

    6222eef91750818ca59013f41a614d51805ba8210e5a65c9b2ebc94603989d613e86ab538e6ddd779be70d6df3292bffa5a2e5212a8a5d9df7f623304920a1a4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6442507.exe

    Filesize

    963KB

    MD5

    7c6bf3252c4cfdaee8f24c396f2aa683

    SHA1

    621de026e22ac736eb0607d2e74df74ba67f5ee1

    SHA256

    9a92f5cda3b6c1b1533d789873ce0aa47592f52275c3507230e2b2bf2fa08842

    SHA512

    6222eef91750818ca59013f41a614d51805ba8210e5a65c9b2ebc94603989d613e86ab538e6ddd779be70d6df3292bffa5a2e5212a8a5d9df7f623304920a1a4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6442507.exe

    Filesize

    963KB

    MD5

    7c6bf3252c4cfdaee8f24c396f2aa683

    SHA1

    621de026e22ac736eb0607d2e74df74ba67f5ee1

    SHA256

    9a92f5cda3b6c1b1533d789873ce0aa47592f52275c3507230e2b2bf2fa08842

    SHA512

    6222eef91750818ca59013f41a614d51805ba8210e5a65c9b2ebc94603989d613e86ab538e6ddd779be70d6df3292bffa5a2e5212a8a5d9df7f623304920a1a4

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6593661.exe

    Filesize

    305KB

    MD5

    0adcac59a81f3cbf6c3e2d9470eba1dd

    SHA1

    1003d7aaf3ae432282df50bfe785fe7a504eeb8a

    SHA256

    c31bc07098b255706e132be1c88b7ab0af0a1f9ec93777176f241abe18d3707b

    SHA512

    35a450416351437837b879747a2abd209b525af89cde767fd7eaf5946a79033d0d5d4a556fbd6d4522b29c29538161abb360f7959b8bb3ea4fca68987551efca

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v6593661.exe

    Filesize

    305KB

    MD5

    0adcac59a81f3cbf6c3e2d9470eba1dd

    SHA1

    1003d7aaf3ae432282df50bfe785fe7a504eeb8a

    SHA256

    c31bc07098b255706e132be1c88b7ab0af0a1f9ec93777176f241abe18d3707b

    SHA512

    35a450416351437837b879747a2abd209b525af89cde767fd7eaf5946a79033d0d5d4a556fbd6d4522b29c29538161abb360f7959b8bb3ea4fca68987551efca

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2681798.exe

    Filesize

    185KB

    MD5

    d24434cc1ac38dafa7a1dbb03784fe8c

    SHA1

    ea602594a0566652b426df318be672ff85361eb5

    SHA256

    17290ac3f40c3283e78d0d5b30879382e76f51742ffa9f691bda2c7800ec4800

    SHA512

    18f60f906c4f62794981fe58a00265777b37d6893d88510a45013137dadf6ea581db1fb7a569b0eefcec91c37541f67e917eaf1a78086b386a469a4889c8003f

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2681798.exe

    Filesize

    185KB

    MD5

    d24434cc1ac38dafa7a1dbb03784fe8c

    SHA1

    ea602594a0566652b426df318be672ff85361eb5

    SHA256

    17290ac3f40c3283e78d0d5b30879382e76f51742ffa9f691bda2c7800ec4800

    SHA512

    18f60f906c4f62794981fe58a00265777b37d6893d88510a45013137dadf6ea581db1fb7a569b0eefcec91c37541f67e917eaf1a78086b386a469a4889c8003f

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5939696.exe

    Filesize

    146KB

    MD5

    a2362ea6cda447c60d1cd88804d47e6a

    SHA1

    f7c08bd2d960f033b930d6bfec3d37f4174fd998

    SHA256

    8ef1ffd850a05f60e8a02d9541a8563afbf88f515a86960fb399324a4fcb425a

    SHA512

    78f9e8789edca301eddad77481ef3ced8eb9ba0e8dd1aaff0677d8a6ce46d413a33d927dfbe243fcdff0d893541bf8fe514f238f667034202594dbe4db7a8e3a

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5939696.exe

    Filesize

    146KB

    MD5

    a2362ea6cda447c60d1cd88804d47e6a

    SHA1

    f7c08bd2d960f033b930d6bfec3d37f4174fd998

    SHA256

    8ef1ffd850a05f60e8a02d9541a8563afbf88f515a86960fb399324a4fcb425a

    SHA512

    78f9e8789edca301eddad77481ef3ced8eb9ba0e8dd1aaff0677d8a6ce46d413a33d927dfbe243fcdff0d893541bf8fe514f238f667034202594dbe4db7a8e3a

  • memory/3000-201-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/3396-210-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3396-214-0x0000000005780000-0x00000000057CB000-memory.dmp

    Filesize

    300KB

  • memory/3396-215-0x0000000005660000-0x0000000005670000-memory.dmp

    Filesize

    64KB

  • memory/4108-153-0x00000000023F0000-0x0000000002406000-memory.dmp

    Filesize

    88KB

  • memory/4108-142-0x0000000004D80000-0x000000000527E000-memory.dmp

    Filesize

    5.0MB

  • memory/4108-169-0x00000000023F0000-0x0000000002406000-memory.dmp

    Filesize

    88KB

  • memory/4108-171-0x00000000023F0000-0x0000000002406000-memory.dmp

    Filesize

    88KB

  • memory/4108-173-0x00000000023F0000-0x0000000002406000-memory.dmp

    Filesize

    88KB

  • memory/4108-174-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/4108-175-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/4108-165-0x00000000023F0000-0x0000000002406000-memory.dmp

    Filesize

    88KB

  • memory/4108-163-0x00000000023F0000-0x0000000002406000-memory.dmp

    Filesize

    88KB

  • memory/4108-141-0x00000000008F0000-0x000000000090E000-memory.dmp

    Filesize

    120KB

  • memory/4108-167-0x00000000023F0000-0x0000000002406000-memory.dmp

    Filesize

    88KB

  • memory/4108-159-0x00000000023F0000-0x0000000002406000-memory.dmp

    Filesize

    88KB

  • memory/4108-143-0x00000000023F0000-0x000000000240C000-memory.dmp

    Filesize

    112KB

  • memory/4108-144-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/4108-145-0x0000000004D70000-0x0000000004D80000-memory.dmp

    Filesize

    64KB

  • memory/4108-146-0x00000000023F0000-0x0000000002406000-memory.dmp

    Filesize

    88KB

  • memory/4108-147-0x00000000023F0000-0x0000000002406000-memory.dmp

    Filesize

    88KB

  • memory/4108-149-0x00000000023F0000-0x0000000002406000-memory.dmp

    Filesize

    88KB

  • memory/4108-151-0x00000000023F0000-0x0000000002406000-memory.dmp

    Filesize

    88KB

  • memory/4108-155-0x00000000023F0000-0x0000000002406000-memory.dmp

    Filesize

    88KB

  • memory/4108-157-0x00000000023F0000-0x0000000002406000-memory.dmp

    Filesize

    88KB

  • memory/4108-161-0x00000000023F0000-0x0000000002406000-memory.dmp

    Filesize

    88KB

  • memory/4512-198-0x0000000000B50000-0x0000000000C48000-memory.dmp

    Filesize

    992KB

  • memory/4512-199-0x0000000007920000-0x0000000007930000-memory.dmp

    Filesize

    64KB

  • memory/4600-181-0x0000000004F80000-0x0000000005586000-memory.dmp

    Filesize

    6.0MB

  • memory/4600-187-0x0000000004DC0000-0x0000000004E52000-memory.dmp

    Filesize

    584KB

  • memory/4600-192-0x0000000006430000-0x0000000006480000-memory.dmp

    Filesize

    320KB

  • memory/4600-191-0x00000000061A0000-0x0000000006216000-memory.dmp

    Filesize

    472KB

  • memory/4600-190-0x0000000006960000-0x0000000006E8C000-memory.dmp

    Filesize

    5.2MB

  • memory/4600-189-0x0000000006260000-0x0000000006422000-memory.dmp

    Filesize

    1.8MB

  • memory/4600-188-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/4600-193-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/4600-180-0x0000000000080000-0x00000000000AA000-memory.dmp

    Filesize

    168KB

  • memory/4600-186-0x0000000004D00000-0x0000000004D10000-memory.dmp

    Filesize

    64KB

  • memory/4600-182-0x0000000004AE0000-0x0000000004BEA000-memory.dmp

    Filesize

    1.0MB

  • memory/4600-185-0x0000000004BF0000-0x0000000004C3B000-memory.dmp

    Filesize

    300KB

  • memory/4600-184-0x0000000004A70000-0x0000000004AAE000-memory.dmp

    Filesize

    248KB

  • memory/4600-183-0x0000000004A10000-0x0000000004A22000-memory.dmp

    Filesize

    72KB

  • memory/4676-209-0x00000000078A0000-0x00000000078B0000-memory.dmp

    Filesize

    64KB

  • memory/4676-207-0x0000000000A00000-0x0000000000AE8000-memory.dmp

    Filesize

    928KB