Analysis

  • max time kernel
    135s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/05/2023, 12:40

General

  • Target

    719d9cf59f9129e81585dc0162a063c85b96e753357401a7703daa857262ca74.exe

  • Size

    1.1MB

  • MD5

    1c5c4fa02e886f815047a9b81e7f520b

  • SHA1

    e1253f2c3c9ec225d1361649ec124d242ec87650

  • SHA256

    719d9cf59f9129e81585dc0162a063c85b96e753357401a7703daa857262ca74

  • SHA512

    53adca73a4461bfe3dfa35e59f6dd1dd1951e065dc9250e62deb6d30861ddaa788a1bdb11d12c82cacf44535d80cb35afd6ab738f82fafdf97e01a37d4c6c35c

  • SSDEEP

    24576:DyQ0Vj4T496kBnzIjM/hThHn/3vbsuDzACldi0uqqvwW5+hkxbLz6:WQ0x0Nk9IOfvzAGi0uJYWQhkd

Malware Config

Extracted

Family

redline

Botnet

dopon

C2

185.161.248.75:4132

Attributes
  • auth_value

    8b75ad7ee23fb4d414b2c7174486600e

Extracted

Family

redline

Botnet

srala

C2

185.161.248.75:4132

Attributes
  • auth_value

    c90de493c232a904fb467fa366785cb6

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\719d9cf59f9129e81585dc0162a063c85b96e753357401a7703daa857262ca74.exe
    "C:\Users\Admin\AppData\Local\Temp\719d9cf59f9129e81585dc0162a063c85b96e753357401a7703daa857262ca74.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2492
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1675455.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1675455.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1432
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2030336.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2030336.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4196
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1462998.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1462998.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2024
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3146708.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3146708.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3848
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8936323.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8936323.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2308
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8936323.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8936323.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of UnmapMainImage
          PID:4404
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 4404 -s 12
            5⤵
            • Program crash
            PID:4956
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2644775.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2644775.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:392
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2644775.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2644775.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3156
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4404 -ip 4404
    1⤵
      PID:1856

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\i2644775.exe.log

            Filesize

            425B

            MD5

            4eaca4566b22b01cd3bc115b9b0b2196

            SHA1

            e743e0792c19f71740416e7b3c061d9f1336bf94

            SHA256

            34ba0ab8d1850e7825763f413142a333ccbc05fa2b5499a28a7d27b8a1c5b4bb

            SHA512

            bc2b1bf45203e3bb3009a7d37617b8f0f7ffa613680b32de2b963e39d2cf1650614d7035a0cf78f35a4f5cb17a2a439e2e07deaefd2a4275a62efd0a5c0184a1

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2644775.exe

            Filesize

            903KB

            MD5

            d296028a8e06272c540c643e63a98a49

            SHA1

            81461740dfb57f9ed8264983f6e7695573e5355a

            SHA256

            bb055454fa57de43f446e1c2769a00973d7bab028fc1f53412d610b85b543ef0

            SHA512

            0524588d3a99f01ac257a205cfeefe1e8a8b0f98527c293e5883b059d12f68912142b3069212a96b2d562002d56404e4aab19d89460d869c6d49775c7fc3e310

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2644775.exe

            Filesize

            903KB

            MD5

            d296028a8e06272c540c643e63a98a49

            SHA1

            81461740dfb57f9ed8264983f6e7695573e5355a

            SHA256

            bb055454fa57de43f446e1c2769a00973d7bab028fc1f53412d610b85b543ef0

            SHA512

            0524588d3a99f01ac257a205cfeefe1e8a8b0f98527c293e5883b059d12f68912142b3069212a96b2d562002d56404e4aab19d89460d869c6d49775c7fc3e310

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2644775.exe

            Filesize

            903KB

            MD5

            d296028a8e06272c540c643e63a98a49

            SHA1

            81461740dfb57f9ed8264983f6e7695573e5355a

            SHA256

            bb055454fa57de43f446e1c2769a00973d7bab028fc1f53412d610b85b543ef0

            SHA512

            0524588d3a99f01ac257a205cfeefe1e8a8b0f98527c293e5883b059d12f68912142b3069212a96b2d562002d56404e4aab19d89460d869c6d49775c7fc3e310

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1675455.exe

            Filesize

            750KB

            MD5

            60f8ba1a35ef60ca989e22fac9fb6644

            SHA1

            46f59afbc2788743ddf6c627a3f97db40ab0827c

            SHA256

            09a9a83262a69d15e5b040903e2e0ed7dcb1a20c57118fbd68aa838dffd4ad17

            SHA512

            fd1cdd9a528efe1f278abe90554cec370aa891fdcb720cd04df74ead81f37048c08244859d2cb8a1d56a041d676f13fd4102805b5079277d444b1004a4570c3d

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1675455.exe

            Filesize

            750KB

            MD5

            60f8ba1a35ef60ca989e22fac9fb6644

            SHA1

            46f59afbc2788743ddf6c627a3f97db40ab0827c

            SHA256

            09a9a83262a69d15e5b040903e2e0ed7dcb1a20c57118fbd68aa838dffd4ad17

            SHA512

            fd1cdd9a528efe1f278abe90554cec370aa891fdcb720cd04df74ead81f37048c08244859d2cb8a1d56a041d676f13fd4102805b5079277d444b1004a4570c3d

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8936323.exe

            Filesize

            963KB

            MD5

            44a9ee10f52600427faef93c07b80699

            SHA1

            7340f998f10432b00447226508b7547a8dfef18d

            SHA256

            4a0255db26eeb80bf02320e205a003b72dcebb462317df821e5f6562beaeba58

            SHA512

            f0df1ef53c6966a28e45e1b826b7fcbc0afde0e6c126af299134a9fe462121ba7381673a31daf4f1b788cec168f3b89ecc18c8ebcce39f01af285414d28780f4

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8936323.exe

            Filesize

            963KB

            MD5

            44a9ee10f52600427faef93c07b80699

            SHA1

            7340f998f10432b00447226508b7547a8dfef18d

            SHA256

            4a0255db26eeb80bf02320e205a003b72dcebb462317df821e5f6562beaeba58

            SHA512

            f0df1ef53c6966a28e45e1b826b7fcbc0afde0e6c126af299134a9fe462121ba7381673a31daf4f1b788cec168f3b89ecc18c8ebcce39f01af285414d28780f4

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h8936323.exe

            Filesize

            963KB

            MD5

            44a9ee10f52600427faef93c07b80699

            SHA1

            7340f998f10432b00447226508b7547a8dfef18d

            SHA256

            4a0255db26eeb80bf02320e205a003b72dcebb462317df821e5f6562beaeba58

            SHA512

            f0df1ef53c6966a28e45e1b826b7fcbc0afde0e6c126af299134a9fe462121ba7381673a31daf4f1b788cec168f3b89ecc18c8ebcce39f01af285414d28780f4

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2030336.exe

            Filesize

            306KB

            MD5

            ba669535827f829f0a7527e5a13b30cf

            SHA1

            7bd77008e1dcfcbb3a0ddfa54883f8da4e569a31

            SHA256

            47dbe10bdb5bea64be75ead8d775dac39ef481866505c0007e42a56bc9b7e74d

            SHA512

            394b6b16e8385367b7453aed26189cc3beeaf21285a189ac77a92aa99c1a9abca999231dc5934c204749a7d5d8f1d494c4c1c452782a52b792eb35b4d1a64add

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2030336.exe

            Filesize

            306KB

            MD5

            ba669535827f829f0a7527e5a13b30cf

            SHA1

            7bd77008e1dcfcbb3a0ddfa54883f8da4e569a31

            SHA256

            47dbe10bdb5bea64be75ead8d775dac39ef481866505c0007e42a56bc9b7e74d

            SHA512

            394b6b16e8385367b7453aed26189cc3beeaf21285a189ac77a92aa99c1a9abca999231dc5934c204749a7d5d8f1d494c4c1c452782a52b792eb35b4d1a64add

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1462998.exe

            Filesize

            145KB

            MD5

            f9f5aca1084766ae3229b6f0f151dd5d

            SHA1

            30cb3c12fa8ab566b2fafbd36cd96ad56ccf6329

            SHA256

            5359d0b72d9210cd4319b30a957bcc62461dc3ee55242b33297574f7636b5158

            SHA512

            8dd61168e2fe532fec9ea9a2bc654342ab6ee09e02d39d10301416e457b36d5884250f96e215632b4c421820b54efd558621214ba714326fd535af2bd754f9cb

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f1462998.exe

            Filesize

            145KB

            MD5

            f9f5aca1084766ae3229b6f0f151dd5d

            SHA1

            30cb3c12fa8ab566b2fafbd36cd96ad56ccf6329

            SHA256

            5359d0b72d9210cd4319b30a957bcc62461dc3ee55242b33297574f7636b5158

            SHA512

            8dd61168e2fe532fec9ea9a2bc654342ab6ee09e02d39d10301416e457b36d5884250f96e215632b4c421820b54efd558621214ba714326fd535af2bd754f9cb

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3146708.exe

            Filesize

            184KB

            MD5

            584f003680ab2e08199fdd049c2a0d7b

            SHA1

            d73ae2c66343d05774083994ad28187fd24e7802

            SHA256

            d23d98385213008a9f6ce2ca79dcad42e74c8ab88c5e057b3795d18cfade7866

            SHA512

            3bde3ab50dd3d5d4572ed48f9039c5182f79f32973650d149fd4523cb8502fad581299376046f6fce82ab76cefef7aee0c4cd292c0df2d8357869eca477bde03

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g3146708.exe

            Filesize

            184KB

            MD5

            584f003680ab2e08199fdd049c2a0d7b

            SHA1

            d73ae2c66343d05774083994ad28187fd24e7802

            SHA256

            d23d98385213008a9f6ce2ca79dcad42e74c8ab88c5e057b3795d18cfade7866

            SHA512

            3bde3ab50dd3d5d4572ed48f9039c5182f79f32973650d149fd4523cb8502fad581299376046f6fce82ab76cefef7aee0c4cd292c0df2d8357869eca477bde03

          • memory/392-217-0x0000000000430000-0x0000000000518000-memory.dmp

            Filesize

            928KB

          • memory/392-218-0x0000000007310000-0x0000000007320000-memory.dmp

            Filesize

            64KB

          • memory/2024-162-0x0000000005FD0000-0x0000000006062000-memory.dmp

            Filesize

            584KB

          • memory/2024-159-0x0000000005080000-0x00000000050BC000-memory.dmp

            Filesize

            240KB

          • memory/2024-167-0x0000000007190000-0x00000000076BC000-memory.dmp

            Filesize

            5.2MB

          • memory/2024-165-0x00000000053E0000-0x00000000053F0000-memory.dmp

            Filesize

            64KB

          • memory/2024-164-0x00000000061F0000-0x0000000006240000-memory.dmp

            Filesize

            320KB

          • memory/2024-161-0x00000000064E0000-0x0000000006A84000-memory.dmp

            Filesize

            5.6MB

          • memory/2024-154-0x0000000000650000-0x000000000067A000-memory.dmp

            Filesize

            168KB

          • memory/2024-155-0x0000000005610000-0x0000000005C28000-memory.dmp

            Filesize

            6.1MB

          • memory/2024-160-0x00000000053F0000-0x0000000005456000-memory.dmp

            Filesize

            408KB

          • memory/2024-156-0x0000000005100000-0x000000000520A000-memory.dmp

            Filesize

            1.0MB

          • memory/2024-166-0x0000000006A90000-0x0000000006C52000-memory.dmp

            Filesize

            1.8MB

          • memory/2024-157-0x0000000005020000-0x0000000005032000-memory.dmp

            Filesize

            72KB

          • memory/2024-158-0x00000000053E0000-0x00000000053F0000-memory.dmp

            Filesize

            64KB

          • memory/2024-163-0x0000000006170000-0x00000000061E6000-memory.dmp

            Filesize

            472KB

          • memory/2308-210-0x0000000007B40000-0x0000000007B50000-memory.dmp

            Filesize

            64KB

          • memory/2308-209-0x0000000000C70000-0x0000000000D68000-memory.dmp

            Filesize

            992KB

          • memory/3156-219-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/3156-223-0x00000000058B0000-0x00000000058C0000-memory.dmp

            Filesize

            64KB

          • memory/3848-178-0x0000000002510000-0x0000000002527000-memory.dmp

            Filesize

            92KB

          • memory/3848-176-0x0000000002510000-0x0000000002527000-memory.dmp

            Filesize

            92KB

          • memory/3848-198-0x0000000002510000-0x0000000002527000-memory.dmp

            Filesize

            92KB

          • memory/3848-200-0x0000000002510000-0x0000000002527000-memory.dmp

            Filesize

            92KB

          • memory/3848-202-0x0000000002510000-0x0000000002527000-memory.dmp

            Filesize

            92KB

          • memory/3848-203-0x0000000004B00000-0x0000000004B10000-memory.dmp

            Filesize

            64KB

          • memory/3848-204-0x0000000004B00000-0x0000000004B10000-memory.dmp

            Filesize

            64KB

          • memory/3848-194-0x0000000002510000-0x0000000002527000-memory.dmp

            Filesize

            92KB

          • memory/3848-192-0x0000000002510000-0x0000000002527000-memory.dmp

            Filesize

            92KB

          • memory/3848-190-0x0000000002510000-0x0000000002527000-memory.dmp

            Filesize

            92KB

          • memory/3848-188-0x0000000002510000-0x0000000002527000-memory.dmp

            Filesize

            92KB

          • memory/3848-172-0x0000000004B00000-0x0000000004B10000-memory.dmp

            Filesize

            64KB

          • memory/3848-186-0x0000000002510000-0x0000000002527000-memory.dmp

            Filesize

            92KB

          • memory/3848-184-0x0000000002510000-0x0000000002527000-memory.dmp

            Filesize

            92KB

          • memory/3848-182-0x0000000002510000-0x0000000002527000-memory.dmp

            Filesize

            92KB

          • memory/3848-180-0x0000000002510000-0x0000000002527000-memory.dmp

            Filesize

            92KB

          • memory/3848-196-0x0000000002510000-0x0000000002527000-memory.dmp

            Filesize

            92KB

          • memory/3848-175-0x0000000002510000-0x0000000002527000-memory.dmp

            Filesize

            92KB

          • memory/3848-174-0x0000000004B00000-0x0000000004B10000-memory.dmp

            Filesize

            64KB

          • memory/3848-173-0x0000000004B00000-0x0000000004B10000-memory.dmp

            Filesize

            64KB

          • memory/4404-211-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB