Analysis

  • max time kernel
    135s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/05/2023, 10:36

General

  • Target

    b028e48f7cc37b30f8e3763fca40ece34398c56d4eb329534c41d66b25510536.exe

  • Size

    1.1MB

  • MD5

    9fcbf94f8e1c3abf7145ca47b4b7cfe6

  • SHA1

    4cba592a35ead3b26c9df1cb4e31650608757f08

  • SHA256

    b028e48f7cc37b30f8e3763fca40ece34398c56d4eb329534c41d66b25510536

  • SHA512

    4f0ab46f575a06d97d979d3fcc913eacde1703b004227c598a839524ce993c36f249dfc4945670fd82a55b427c737c4bc601e4a2c29a010c8738b7700ae60a33

  • SSDEEP

    24576:gynVFdpBZ7i8bEsixWDpW1b3OzrGlYRBhES9ZZ7d7bQAMH7:nVFdpBlPEsb9W13KxES97d7bQ/

Malware Config

Extracted

Family

redline

Botnet

muxan

C2

185.161.248.75:4132

Attributes
  • auth_value

    d605be949bb645b0759bf765eb7e6a47

Extracted

Family

redline

Botnet

srala

C2

185.161.248.75:4132

Attributes
  • auth_value

    c90de493c232a904fb467fa366785cb6

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b028e48f7cc37b30f8e3763fca40ece34398c56d4eb329534c41d66b25510536.exe
    "C:\Users\Admin\AppData\Local\Temp\b028e48f7cc37b30f8e3763fca40ece34398c56d4eb329534c41d66b25510536.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4908
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0980060.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0980060.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2064
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8711039.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8711039.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3184
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4931055.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4931055.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3980
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2380151.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2380151.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2616
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c9569300.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c9569300.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1144
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c9569300.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c9569300.exe
          4⤵
          • Executes dropped EXE
          PID:3488
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c9569300.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c9569300.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of UnmapMainImage
          PID:2892
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2892 -s 12
            5⤵
            • Program crash
            PID:1444
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6381154.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6381154.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5048
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6381154.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6381154.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2000
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2892 -ip 2892
    1⤵
      PID:1076

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\d6381154.exe.log

      Filesize

      425B

      MD5

      4eaca4566b22b01cd3bc115b9b0b2196

      SHA1

      e743e0792c19f71740416e7b3c061d9f1336bf94

      SHA256

      34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

      SHA512

      bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6381154.exe

      Filesize

      903KB

      MD5

      b335535ca18b34823d653833d9385dfd

      SHA1

      fc1fa00da523d4f39fb4f35677a48993592eee4c

      SHA256

      383515f10b12aa807806106317ab888787d45accfa6ff0d65a466cb6932b7427

      SHA512

      9f6938deb2dcfe792f46957d71d98bf2e4acc86230e366f6c27d468331ceedf2d3a80a5c72d662fb1fa245e0b789e25eba0f5d4b4baac8729a3462ef511f290d

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6381154.exe

      Filesize

      903KB

      MD5

      b335535ca18b34823d653833d9385dfd

      SHA1

      fc1fa00da523d4f39fb4f35677a48993592eee4c

      SHA256

      383515f10b12aa807806106317ab888787d45accfa6ff0d65a466cb6932b7427

      SHA512

      9f6938deb2dcfe792f46957d71d98bf2e4acc86230e366f6c27d468331ceedf2d3a80a5c72d662fb1fa245e0b789e25eba0f5d4b4baac8729a3462ef511f290d

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d6381154.exe

      Filesize

      903KB

      MD5

      b335535ca18b34823d653833d9385dfd

      SHA1

      fc1fa00da523d4f39fb4f35677a48993592eee4c

      SHA256

      383515f10b12aa807806106317ab888787d45accfa6ff0d65a466cb6932b7427

      SHA512

      9f6938deb2dcfe792f46957d71d98bf2e4acc86230e366f6c27d468331ceedf2d3a80a5c72d662fb1fa245e0b789e25eba0f5d4b4baac8729a3462ef511f290d

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0980060.exe

      Filesize

      752KB

      MD5

      d0ce397e9a6166d2fd1e3edea11240b0

      SHA1

      3916b73f9854826d68ca5de6f36d3ee2e69e2c8e

      SHA256

      98584801aee6d626e596cd820c9cef1f37785f07e3824f869a2416167c49a6c8

      SHA512

      39508c43e9669bd369fb9941f95cf43a89fc00031f3d5215e8a3c1a15eb936f8a7c86c0ac7d9d54da8010a56a1d642cb49810fe07a634556cea4996cd436ae15

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0980060.exe

      Filesize

      752KB

      MD5

      d0ce397e9a6166d2fd1e3edea11240b0

      SHA1

      3916b73f9854826d68ca5de6f36d3ee2e69e2c8e

      SHA256

      98584801aee6d626e596cd820c9cef1f37785f07e3824f869a2416167c49a6c8

      SHA512

      39508c43e9669bd369fb9941f95cf43a89fc00031f3d5215e8a3c1a15eb936f8a7c86c0ac7d9d54da8010a56a1d642cb49810fe07a634556cea4996cd436ae15

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c9569300.exe

      Filesize

      963KB

      MD5

      79b7d096423917ceb217edcb0e1d00fa

      SHA1

      84c350e00414ed17c48e944b819ab9c598a5e9a0

      SHA256

      a97c0e03801bfa91b78e19e8cf70f697cb957345add295c0a50a6f6fa3ca143a

      SHA512

      e063334b9a49d39f4fe165029c98076783ec888fb89831797062d82adc4debf1df9936bc911842f35cd13d5177f80e8d3d59073e868902c0ad01a246c17cacf1

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c9569300.exe

      Filesize

      963KB

      MD5

      79b7d096423917ceb217edcb0e1d00fa

      SHA1

      84c350e00414ed17c48e944b819ab9c598a5e9a0

      SHA256

      a97c0e03801bfa91b78e19e8cf70f697cb957345add295c0a50a6f6fa3ca143a

      SHA512

      e063334b9a49d39f4fe165029c98076783ec888fb89831797062d82adc4debf1df9936bc911842f35cd13d5177f80e8d3d59073e868902c0ad01a246c17cacf1

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c9569300.exe

      Filesize

      963KB

      MD5

      79b7d096423917ceb217edcb0e1d00fa

      SHA1

      84c350e00414ed17c48e944b819ab9c598a5e9a0

      SHA256

      a97c0e03801bfa91b78e19e8cf70f697cb957345add295c0a50a6f6fa3ca143a

      SHA512

      e063334b9a49d39f4fe165029c98076783ec888fb89831797062d82adc4debf1df9936bc911842f35cd13d5177f80e8d3d59073e868902c0ad01a246c17cacf1

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c9569300.exe

      Filesize

      963KB

      MD5

      79b7d096423917ceb217edcb0e1d00fa

      SHA1

      84c350e00414ed17c48e944b819ab9c598a5e9a0

      SHA256

      a97c0e03801bfa91b78e19e8cf70f697cb957345add295c0a50a6f6fa3ca143a

      SHA512

      e063334b9a49d39f4fe165029c98076783ec888fb89831797062d82adc4debf1df9936bc911842f35cd13d5177f80e8d3d59073e868902c0ad01a246c17cacf1

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8711039.exe

      Filesize

      306KB

      MD5

      d1ffbb56d4cf11069545e20fa8472394

      SHA1

      fe0f56e1c5eeb69e2f304fa3a65b146e9360ced7

      SHA256

      fd290bdb83eca1576c49740be5e7526c6c7256a8b7fafaea0dfa0ba48bcee60a

      SHA512

      e1670f1d77eafd1ba081061da5895575e9b225ed93aab5247c9640b70edf7d039bfe675a156789cfc125d3276d03da041010c71f9411e6ab72cd3a777d49d074

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8711039.exe

      Filesize

      306KB

      MD5

      d1ffbb56d4cf11069545e20fa8472394

      SHA1

      fe0f56e1c5eeb69e2f304fa3a65b146e9360ced7

      SHA256

      fd290bdb83eca1576c49740be5e7526c6c7256a8b7fafaea0dfa0ba48bcee60a

      SHA512

      e1670f1d77eafd1ba081061da5895575e9b225ed93aab5247c9640b70edf7d039bfe675a156789cfc125d3276d03da041010c71f9411e6ab72cd3a777d49d074

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4931055.exe

      Filesize

      184KB

      MD5

      62bb33fec51fc2cbcbf2025b3af3835a

      SHA1

      3ca9539f2bdb5c85629e86a622fcb4b02f6e8253

      SHA256

      08430b31e2bbb39ffc7940615d787465fbbb96edcc89513afc81df6746e770d5

      SHA512

      a82cbaf179b99e1f8ffb30086e6d34157e0dc0e3e01579874eab4e1b123a6a024ce19da650ae3f2e5bf49583365c8576aa14bea2fcd1594e2b10175da5f9cf95

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a4931055.exe

      Filesize

      184KB

      MD5

      62bb33fec51fc2cbcbf2025b3af3835a

      SHA1

      3ca9539f2bdb5c85629e86a622fcb4b02f6e8253

      SHA256

      08430b31e2bbb39ffc7940615d787465fbbb96edcc89513afc81df6746e770d5

      SHA512

      a82cbaf179b99e1f8ffb30086e6d34157e0dc0e3e01579874eab4e1b123a6a024ce19da650ae3f2e5bf49583365c8576aa14bea2fcd1594e2b10175da5f9cf95

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2380151.exe

      Filesize

      145KB

      MD5

      82f8806a1a8e4fe373dd8a3df8e8797c

      SHA1

      2640a412515568382ad170a9f88eb561ef1edc0c

      SHA256

      22c00c9d6a4e0fb13a0bae7d37c2b11199ead04342da1c0a2f9272ca6bb5b9ba

      SHA512

      0fea76327a084fa8d546c934e3610e3c2ad084b977086bf3ea0a3761f5c387a323c730d94235a652c36c62914e7f6986a62ad545f0d79f6138f5c9d2cab99a10

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2380151.exe

      Filesize

      145KB

      MD5

      82f8806a1a8e4fe373dd8a3df8e8797c

      SHA1

      2640a412515568382ad170a9f88eb561ef1edc0c

      SHA256

      22c00c9d6a4e0fb13a0bae7d37c2b11199ead04342da1c0a2f9272ca6bb5b9ba

      SHA512

      0fea76327a084fa8d546c934e3610e3c2ad084b977086bf3ea0a3761f5c387a323c730d94235a652c36c62914e7f6986a62ad545f0d79f6138f5c9d2cab99a10

    • memory/1144-211-0x0000000007C70000-0x0000000007C80000-memory.dmp

      Filesize

      64KB

    • memory/1144-210-0x0000000000DE0000-0x0000000000ED8000-memory.dmp

      Filesize

      992KB

    • memory/2000-221-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/2000-225-0x0000000005830000-0x0000000005840000-memory.dmp

      Filesize

      64KB

    • memory/2616-204-0x0000000006300000-0x0000000006350000-memory.dmp

      Filesize

      320KB

    • memory/2616-202-0x0000000006BD0000-0x00000000070FC000-memory.dmp

      Filesize

      5.2MB

    • memory/2616-205-0x0000000004C10000-0x0000000004C20000-memory.dmp

      Filesize

      64KB

    • memory/2616-203-0x0000000006380000-0x00000000063F6000-memory.dmp

      Filesize

      472KB

    • memory/2616-201-0x00000000064D0000-0x0000000006692000-memory.dmp

      Filesize

      1.8MB

    • memory/2616-200-0x0000000005020000-0x0000000005086000-memory.dmp

      Filesize

      408KB

    • memory/2616-199-0x0000000004F80000-0x0000000005012000-memory.dmp

      Filesize

      584KB

    • memory/2616-198-0x0000000004C10000-0x0000000004C20000-memory.dmp

      Filesize

      64KB

    • memory/2616-197-0x0000000004C60000-0x0000000004C9C000-memory.dmp

      Filesize

      240KB

    • memory/2616-196-0x0000000004BE0000-0x0000000004BF2000-memory.dmp

      Filesize

      72KB

    • memory/2616-193-0x0000000000350000-0x000000000037A000-memory.dmp

      Filesize

      168KB

    • memory/2616-194-0x0000000005180000-0x0000000005798000-memory.dmp

      Filesize

      6.1MB

    • memory/2616-195-0x0000000004CB0000-0x0000000004DBA000-memory.dmp

      Filesize

      1.0MB

    • memory/2892-213-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/3980-170-0x0000000004F20000-0x0000000004F37000-memory.dmp

      Filesize

      92KB

    • memory/3980-176-0x0000000004900000-0x0000000004910000-memory.dmp

      Filesize

      64KB

    • memory/3980-186-0x0000000004900000-0x0000000004910000-memory.dmp

      Filesize

      64KB

    • memory/3980-185-0x0000000004F20000-0x0000000004F37000-memory.dmp

      Filesize

      92KB

    • memory/3980-181-0x0000000004900000-0x0000000004910000-memory.dmp

      Filesize

      64KB

    • memory/3980-183-0x0000000004F20000-0x0000000004F37000-memory.dmp

      Filesize

      92KB

    • memory/3980-168-0x0000000004F20000-0x0000000004F37000-memory.dmp

      Filesize

      92KB

    • memory/3980-179-0x0000000004900000-0x0000000004910000-memory.dmp

      Filesize

      64KB

    • memory/3980-174-0x0000000004F20000-0x0000000004F37000-memory.dmp

      Filesize

      92KB

    • memory/3980-172-0x0000000004F20000-0x0000000004F37000-memory.dmp

      Filesize

      92KB

    • memory/3980-187-0x0000000004900000-0x0000000004910000-memory.dmp

      Filesize

      64KB

    • memory/3980-180-0x0000000004F20000-0x0000000004F37000-memory.dmp

      Filesize

      92KB

    • memory/3980-160-0x0000000004F20000-0x0000000004F37000-memory.dmp

      Filesize

      92KB

    • memory/3980-188-0x0000000004900000-0x0000000004910000-memory.dmp

      Filesize

      64KB

    • memory/3980-164-0x0000000004F20000-0x0000000004F37000-memory.dmp

      Filesize

      92KB

    • memory/3980-162-0x0000000004F20000-0x0000000004F37000-memory.dmp

      Filesize

      92KB

    • memory/3980-166-0x0000000004F20000-0x0000000004F37000-memory.dmp

      Filesize

      92KB

    • memory/3980-177-0x0000000004F20000-0x0000000004F37000-memory.dmp

      Filesize

      92KB

    • memory/3980-154-0x0000000004910000-0x0000000004EB4000-memory.dmp

      Filesize

      5.6MB

    • memory/3980-158-0x0000000004F20000-0x0000000004F37000-memory.dmp

      Filesize

      92KB

    • memory/3980-156-0x0000000004F20000-0x0000000004F37000-memory.dmp

      Filesize

      92KB

    • memory/3980-155-0x0000000004F20000-0x0000000004F37000-memory.dmp

      Filesize

      92KB

    • memory/5048-220-0x0000000007B50000-0x0000000007B60000-memory.dmp

      Filesize

      64KB

    • memory/5048-219-0x0000000000D00000-0x0000000000DE8000-memory.dmp

      Filesize

      928KB