Analysis

  • max time kernel
    56s
  • max time network
    58s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    16-05-2023 11:54

General

  • Target

    3fa105e9f452d1b9905b07d00d8b22d246677f2b6cd4db5e3829bdb06c298543.exe

  • Size

    1.1MB

  • MD5

    364cdf2ba04d9f0a6f609027cc66b012

  • SHA1

    ca7b3f3c3bc94bac1e4fddfdc020b974592ea526

  • SHA256

    3fa105e9f452d1b9905b07d00d8b22d246677f2b6cd4db5e3829bdb06c298543

  • SHA512

    39e8ef93f3b169e82098904bf8e32ef763968460f94532aa7a9170f27403c50e2c64085b41eebbc375dcd61a61a8885cfd2ee24e8ca5dae228a1a3cd2f247c99

  • SSDEEP

    24576:DypMqAcPuVoSw8y4PXJuwcehXXGIPWFjXO1ATDVDFKMfk7zOZj9lvN6:WpMZCuVoSwJAhceMI+FpVDFKMM78Bp

Malware Config

Extracted

Family

redline

Botnet

dopon

C2

185.161.248.75:4132

Attributes
  • auth_value

    8b75ad7ee23fb4d414b2c7174486600e

Extracted

Family

redline

Botnet

srala

C2

185.161.248.75:4132

Attributes
  • auth_value

    c90de493c232a904fb467fa366785cb6

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 10 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3fa105e9f452d1b9905b07d00d8b22d246677f2b6cd4db5e3829bdb06c298543.exe
    "C:\Users\Admin\AppData\Local\Temp\3fa105e9f452d1b9905b07d00d8b22d246677f2b6cd4db5e3829bdb06c298543.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3796
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9289031.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9289031.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4128
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6703058.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6703058.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3408
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k9690482.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k9690482.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4952
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l5156483.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l5156483.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3600
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m4364750.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m4364750.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3924
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m4364750.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m4364750.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:3608
          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4156
            • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
              C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
              6⤵
              • Executes dropped EXE
              PID:3364
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 24
                7⤵
                • Program crash
                PID:3384
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n5911491.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n5911491.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2624
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n5911491.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n5911491.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3180

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\n5911491.exe.log

    Filesize

    425B

    MD5

    605f809fab8c19729d39d075f7ffdb53

    SHA1

    c546f877c9bd53563174a90312a8337fdfc5fdd9

    SHA256

    6904d540649e76c55f99530b81be17e099184bb4cad415aa9b9b39cc3677f556

    SHA512

    82cc12c3186ae23884b8d5c104638c8206272c4389ade56b926dfc1d437b03888159b3c790b188b54d277a262e731927e703e680ea642e1417faee27443fd5b3

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n5911491.exe

    Filesize

    903KB

    MD5

    c9e3e50b089c589656f187e80fbf294b

    SHA1

    3ef2e127f5821fe7eff4028ca902c56047384ff9

    SHA256

    2f1e2349509195f2bb19fb38ec8a68cddf590e3b7e7e56ec4dd27545da2c47d1

    SHA512

    17750034e4b559d8f059ba44401575ad844284411d1ac554d6c5b6393638bcaf9c42691a6d4a9f2c6ed018a64ecf7d471efff2bb7348c2988b42d930a68a122d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n5911491.exe

    Filesize

    903KB

    MD5

    c9e3e50b089c589656f187e80fbf294b

    SHA1

    3ef2e127f5821fe7eff4028ca902c56047384ff9

    SHA256

    2f1e2349509195f2bb19fb38ec8a68cddf590e3b7e7e56ec4dd27545da2c47d1

    SHA512

    17750034e4b559d8f059ba44401575ad844284411d1ac554d6c5b6393638bcaf9c42691a6d4a9f2c6ed018a64ecf7d471efff2bb7348c2988b42d930a68a122d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n5911491.exe

    Filesize

    903KB

    MD5

    c9e3e50b089c589656f187e80fbf294b

    SHA1

    3ef2e127f5821fe7eff4028ca902c56047384ff9

    SHA256

    2f1e2349509195f2bb19fb38ec8a68cddf590e3b7e7e56ec4dd27545da2c47d1

    SHA512

    17750034e4b559d8f059ba44401575ad844284411d1ac554d6c5b6393638bcaf9c42691a6d4a9f2c6ed018a64ecf7d471efff2bb7348c2988b42d930a68a122d

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9289031.exe

    Filesize

    751KB

    MD5

    74359489ae03ff2a2dbb580f6c454d6e

    SHA1

    691399491f382c3b9e4c8a6d4927b9123bc9a6c5

    SHA256

    2be4598533ed884271f265b2cfb87b5bc42e24b4208a13d2c4ca9d749b303818

    SHA512

    7fe9bfc9c02397bd54eb60bda57b29411304aa51556898b73069f507b1061a7c3dc41700b1634eeb04ae240dc26bc41b0218c8c399b934d94417399937a0377f

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y9289031.exe

    Filesize

    751KB

    MD5

    74359489ae03ff2a2dbb580f6c454d6e

    SHA1

    691399491f382c3b9e4c8a6d4927b9123bc9a6c5

    SHA256

    2be4598533ed884271f265b2cfb87b5bc42e24b4208a13d2c4ca9d749b303818

    SHA512

    7fe9bfc9c02397bd54eb60bda57b29411304aa51556898b73069f507b1061a7c3dc41700b1634eeb04ae240dc26bc41b0218c8c399b934d94417399937a0377f

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m4364750.exe

    Filesize

    963KB

    MD5

    4b14c95936ec44ee6c86d70099f23381

    SHA1

    e76f1c112cb918df71697a38184342dc15b7289f

    SHA256

    a324c108478e1845d3337dd7da1cadce6b8f07e49c24acde1e1a1eec6de454e0

    SHA512

    7fa6fa1250c32d5493ab2a82bc69fb54179378b52b3df7035147f474c2eb392fabb8acbf9cf66fff3a51493af7476bd0dc1fa425af61c1e66afb26813fbf1886

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m4364750.exe

    Filesize

    963KB

    MD5

    4b14c95936ec44ee6c86d70099f23381

    SHA1

    e76f1c112cb918df71697a38184342dc15b7289f

    SHA256

    a324c108478e1845d3337dd7da1cadce6b8f07e49c24acde1e1a1eec6de454e0

    SHA512

    7fa6fa1250c32d5493ab2a82bc69fb54179378b52b3df7035147f474c2eb392fabb8acbf9cf66fff3a51493af7476bd0dc1fa425af61c1e66afb26813fbf1886

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m4364750.exe

    Filesize

    963KB

    MD5

    4b14c95936ec44ee6c86d70099f23381

    SHA1

    e76f1c112cb918df71697a38184342dc15b7289f

    SHA256

    a324c108478e1845d3337dd7da1cadce6b8f07e49c24acde1e1a1eec6de454e0

    SHA512

    7fa6fa1250c32d5493ab2a82bc69fb54179378b52b3df7035147f474c2eb392fabb8acbf9cf66fff3a51493af7476bd0dc1fa425af61c1e66afb26813fbf1886

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6703058.exe

    Filesize

    306KB

    MD5

    c5fdaee26ca2c5339fea95a0390658f8

    SHA1

    0894ad74d45d4d719ee1168e5fa318a81cb6f1c7

    SHA256

    efb161d6468c2aedbd0da0c4b4c70d005d6202a641f13b4299d1b98c0b59b173

    SHA512

    7e13d99c515549a37695bc329f4804492a2c7b5796e8c5917b5da7689429333ea57d2cbe3740460ddfb64c39df93c9dd924f5f81293a82a093e9562503d06e60

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y6703058.exe

    Filesize

    306KB

    MD5

    c5fdaee26ca2c5339fea95a0390658f8

    SHA1

    0894ad74d45d4d719ee1168e5fa318a81cb6f1c7

    SHA256

    efb161d6468c2aedbd0da0c4b4c70d005d6202a641f13b4299d1b98c0b59b173

    SHA512

    7e13d99c515549a37695bc329f4804492a2c7b5796e8c5917b5da7689429333ea57d2cbe3740460ddfb64c39df93c9dd924f5f81293a82a093e9562503d06e60

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k9690482.exe

    Filesize

    184KB

    MD5

    1e14affc481850500b4bcbfea46a8a75

    SHA1

    6bddb1151b6bcf720ec8a680fc5de8e2d1c3343e

    SHA256

    2ff09186fded9b17ede6480fb4929b283b86f87fa67fcd4d80fad896c4a2ea19

    SHA512

    77d88a37f754d202a988f50945f931ac2e74a5226fcf6c987c9df0ec24640693e1de5d4caff4e88c7b1a1a45c2c19c22f51842fbb7c7959adbe868f6125d271b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k9690482.exe

    Filesize

    184KB

    MD5

    1e14affc481850500b4bcbfea46a8a75

    SHA1

    6bddb1151b6bcf720ec8a680fc5de8e2d1c3343e

    SHA256

    2ff09186fded9b17ede6480fb4929b283b86f87fa67fcd4d80fad896c4a2ea19

    SHA512

    77d88a37f754d202a988f50945f931ac2e74a5226fcf6c987c9df0ec24640693e1de5d4caff4e88c7b1a1a45c2c19c22f51842fbb7c7959adbe868f6125d271b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l5156483.exe

    Filesize

    145KB

    MD5

    e408a6c4426af31cfdeb1563cbfe2746

    SHA1

    8b1e8a5a1bed1654669ad70e08ce1de78dd93a67

    SHA256

    8ccaf8f87c5209100bbd0a709e3d8fbd4805763a78570db264e330cf65aaca75

    SHA512

    3b6b3d634452523a8d0466a5c0de43e55c807fc4ae2b728a4f536f68387e2332218e770ad4e3e743f897ea890b914f82791129d1ab5145744bd3780b6df7e199

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l5156483.exe

    Filesize

    145KB

    MD5

    e408a6c4426af31cfdeb1563cbfe2746

    SHA1

    8b1e8a5a1bed1654669ad70e08ce1de78dd93a67

    SHA256

    8ccaf8f87c5209100bbd0a709e3d8fbd4805763a78570db264e330cf65aaca75

    SHA512

    3b6b3d634452523a8d0466a5c0de43e55c807fc4ae2b728a4f536f68387e2332218e770ad4e3e743f897ea890b914f82791129d1ab5145744bd3780b6df7e199

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    963KB

    MD5

    4b14c95936ec44ee6c86d70099f23381

    SHA1

    e76f1c112cb918df71697a38184342dc15b7289f

    SHA256

    a324c108478e1845d3337dd7da1cadce6b8f07e49c24acde1e1a1eec6de454e0

    SHA512

    7fa6fa1250c32d5493ab2a82bc69fb54179378b52b3df7035147f474c2eb392fabb8acbf9cf66fff3a51493af7476bd0dc1fa425af61c1e66afb26813fbf1886

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    963KB

    MD5

    4b14c95936ec44ee6c86d70099f23381

    SHA1

    e76f1c112cb918df71697a38184342dc15b7289f

    SHA256

    a324c108478e1845d3337dd7da1cadce6b8f07e49c24acde1e1a1eec6de454e0

    SHA512

    7fa6fa1250c32d5493ab2a82bc69fb54179378b52b3df7035147f474c2eb392fabb8acbf9cf66fff3a51493af7476bd0dc1fa425af61c1e66afb26813fbf1886

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    963KB

    MD5

    4b14c95936ec44ee6c86d70099f23381

    SHA1

    e76f1c112cb918df71697a38184342dc15b7289f

    SHA256

    a324c108478e1845d3337dd7da1cadce6b8f07e49c24acde1e1a1eec6de454e0

    SHA512

    7fa6fa1250c32d5493ab2a82bc69fb54179378b52b3df7035147f474c2eb392fabb8acbf9cf66fff3a51493af7476bd0dc1fa425af61c1e66afb26813fbf1886

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    963KB

    MD5

    4b14c95936ec44ee6c86d70099f23381

    SHA1

    e76f1c112cb918df71697a38184342dc15b7289f

    SHA256

    a324c108478e1845d3337dd7da1cadce6b8f07e49c24acde1e1a1eec6de454e0

    SHA512

    7fa6fa1250c32d5493ab2a82bc69fb54179378b52b3df7035147f474c2eb392fabb8acbf9cf66fff3a51493af7476bd0dc1fa425af61c1e66afb26813fbf1886

  • memory/2624-214-0x0000000007840000-0x0000000007850000-memory.dmp

    Filesize

    64KB

  • memory/2624-213-0x0000000000930000-0x0000000000A18000-memory.dmp

    Filesize

    928KB

  • memory/3180-228-0x0000000004FF0000-0x000000000503B000-memory.dmp

    Filesize

    300KB

  • memory/3180-224-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/3180-229-0x0000000004DF0000-0x0000000004E00000-memory.dmp

    Filesize

    64KB

  • memory/3600-194-0x0000000006E20000-0x000000000734C000-memory.dmp

    Filesize

    5.2MB

  • memory/3600-183-0x00000000006B0000-0x00000000006DA000-memory.dmp

    Filesize

    168KB

  • memory/3600-193-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

    Filesize

    64KB

  • memory/3600-192-0x0000000006720000-0x00000000068E2000-memory.dmp

    Filesize

    1.8MB

  • memory/3600-191-0x0000000005350000-0x00000000053B6000-memory.dmp

    Filesize

    408KB

  • memory/3600-196-0x00000000068F0000-0x0000000006940000-memory.dmp

    Filesize

    320KB

  • memory/3600-190-0x00000000052B0000-0x0000000005342000-memory.dmp

    Filesize

    584KB

  • memory/3600-195-0x0000000006690000-0x0000000006706000-memory.dmp

    Filesize

    472KB

  • memory/3600-184-0x0000000005440000-0x0000000005A46000-memory.dmp

    Filesize

    6.0MB

  • memory/3600-185-0x0000000004FD0000-0x00000000050DA000-memory.dmp

    Filesize

    1.0MB

  • memory/3600-186-0x0000000004F00000-0x0000000004F12000-memory.dmp

    Filesize

    72KB

  • memory/3600-187-0x0000000004F60000-0x0000000004F9E000-memory.dmp

    Filesize

    248KB

  • memory/3600-188-0x00000000050E0000-0x000000000512B000-memory.dmp

    Filesize

    300KB

  • memory/3600-189-0x0000000004FB0000-0x0000000004FC0000-memory.dmp

    Filesize

    64KB

  • memory/3608-203-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/3608-222-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/3608-212-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/3608-207-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/3608-206-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/3924-201-0x0000000000690000-0x0000000000788000-memory.dmp

    Filesize

    992KB

  • memory/3924-202-0x0000000007430000-0x0000000007440000-memory.dmp

    Filesize

    64KB

  • memory/4156-223-0x0000000006DE0000-0x0000000006DF0000-memory.dmp

    Filesize

    64KB

  • memory/4952-163-0x00000000023E0000-0x00000000023F7000-memory.dmp

    Filesize

    92KB

  • memory/4952-157-0x00000000023E0000-0x00000000023F7000-memory.dmp

    Filesize

    92KB

  • memory/4952-169-0x00000000023E0000-0x00000000023F7000-memory.dmp

    Filesize

    92KB

  • memory/4952-171-0x00000000023E0000-0x00000000023F7000-memory.dmp

    Filesize

    92KB

  • memory/4952-173-0x00000000023E0000-0x00000000023F7000-memory.dmp

    Filesize

    92KB

  • memory/4952-167-0x00000000023E0000-0x00000000023F7000-memory.dmp

    Filesize

    92KB

  • memory/4952-161-0x00000000023E0000-0x00000000023F7000-memory.dmp

    Filesize

    92KB

  • memory/4952-178-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

    Filesize

    64KB

  • memory/4952-165-0x00000000023E0000-0x00000000023F7000-memory.dmp

    Filesize

    92KB

  • memory/4952-155-0x00000000023E0000-0x00000000023F7000-memory.dmp

    Filesize

    92KB

  • memory/4952-159-0x00000000023E0000-0x00000000023F7000-memory.dmp

    Filesize

    92KB

  • memory/4952-175-0x00000000023E0000-0x00000000023F7000-memory.dmp

    Filesize

    92KB

  • memory/4952-153-0x00000000023E0000-0x00000000023F7000-memory.dmp

    Filesize

    92KB

  • memory/4952-151-0x00000000023E0000-0x00000000023F7000-memory.dmp

    Filesize

    92KB

  • memory/4952-149-0x00000000023E0000-0x00000000023F7000-memory.dmp

    Filesize

    92KB

  • memory/4952-176-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

    Filesize

    64KB

  • memory/4952-177-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

    Filesize

    64KB

  • memory/4952-148-0x00000000023E0000-0x00000000023F7000-memory.dmp

    Filesize

    92KB

  • memory/4952-146-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

    Filesize

    64KB

  • memory/4952-147-0x00000000023E0000-0x00000000023FC000-memory.dmp

    Filesize

    112KB

  • memory/4952-145-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

    Filesize

    64KB

  • memory/4952-144-0x0000000004BB0000-0x0000000004BC0000-memory.dmp

    Filesize

    64KB

  • memory/4952-143-0x0000000004BC0000-0x00000000050BE000-memory.dmp

    Filesize

    5.0MB

  • memory/4952-142-0x0000000002280000-0x000000000229E000-memory.dmp

    Filesize

    120KB