Analysis

  • max time kernel
    91s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/05/2023, 13:42

General

  • Target

    1ad962f6abf057f0a842298ea76484c808a4171cc92d6cd595edfa153aa3143c.exe

  • Size

    1.0MB

  • MD5

    51be1f13d729bd2d8cf4b925e4880f1d

  • SHA1

    c539b7d8b5be101f9a711209de104c7b59b32e65

  • SHA256

    1ad962f6abf057f0a842298ea76484c808a4171cc92d6cd595edfa153aa3143c

  • SHA512

    462680afe03ffa1be58de8f67d888c5b805a6c70a07442670f0644f7a4cf6a8a1ffdd86134219445dbfe1bf5fa8533b79a99692d24db8ffefc6c37265395dcba

  • SSDEEP

    24576:vyq+Bp+oRUb47ROMjHpIBR7H+KEyt94CzeIwTNUx6pT/WSG:6qxomb4rJIPH+KEyrNAq8pT

Malware Config

Extracted

Family

redline

Botnet

dream

C2

77.91.68.253:4138

Attributes
  • auth_value

    7b4f26a4ca794e30cee1032d5cb62f5c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ad962f6abf057f0a842298ea76484c808a4171cc92d6cd595edfa153aa3143c.exe
    "C:\Users\Admin\AppData\Local\Temp\1ad962f6abf057f0a842298ea76484c808a4171cc92d6cd595edfa153aa3143c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4980
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3610483.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3610483.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1940
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7631986.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7631986.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1128
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k7754722.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k7754722.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4000
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9226878.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9226878.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2252
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m5484426.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m5484426.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4464
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m5484426.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m5484426.exe
          4⤵
          • Executes dropped EXE
          PID:512
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m5484426.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m5484426.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of UnmapMainImage
          PID:404
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 404 -s 12
            5⤵
            • Program crash
            PID:632
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n6844534.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n6844534.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3540
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 404 -ip 404
    1⤵
      PID:2236

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n6844534.exe

            Filesize

            284KB

            MD5

            46f2bd2fc47b72e39701a3e32fd290e5

            SHA1

            2e9aabb3fbfa6bc98bf1e19688c95f3c1d8f9ea6

            SHA256

            63770c12d06562fdc23d6d613fb57c5bfdbad829dc8970abf4b5313e2c4ec242

            SHA512

            864660469bf69c984cabaafbf3f41c4dc1010220457e715563e42e0de6ecc21da8b83c94609fe0eaf31d892232507d22d80021ba336897dbc647b4b0923186c6

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n6844534.exe

            Filesize

            284KB

            MD5

            46f2bd2fc47b72e39701a3e32fd290e5

            SHA1

            2e9aabb3fbfa6bc98bf1e19688c95f3c1d8f9ea6

            SHA256

            63770c12d06562fdc23d6d613fb57c5bfdbad829dc8970abf4b5313e2c4ec242

            SHA512

            864660469bf69c984cabaafbf3f41c4dc1010220457e715563e42e0de6ecc21da8b83c94609fe0eaf31d892232507d22d80021ba336897dbc647b4b0923186c6

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3610483.exe

            Filesize

            751KB

            MD5

            7df151a6d662d621a1ff28ebf5a2080e

            SHA1

            aebcaff8f5dea886e552d2128df313ef90685b62

            SHA256

            407a2917e82d2d5bf8976fee16241c958db98b04caac8dce15afc63384232261

            SHA512

            e7f2b82adc05695b249e84fb84f7ed35f032314f84933fc2b81e57aa9a5c319983259e7522bde5c177dfa85797d8303b097f55a62d7f50a0afa9aa3bacdc6e35

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y3610483.exe

            Filesize

            751KB

            MD5

            7df151a6d662d621a1ff28ebf5a2080e

            SHA1

            aebcaff8f5dea886e552d2128df313ef90685b62

            SHA256

            407a2917e82d2d5bf8976fee16241c958db98b04caac8dce15afc63384232261

            SHA512

            e7f2b82adc05695b249e84fb84f7ed35f032314f84933fc2b81e57aa9a5c319983259e7522bde5c177dfa85797d8303b097f55a62d7f50a0afa9aa3bacdc6e35

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m5484426.exe

            Filesize

            963KB

            MD5

            c1c1b33e6338e381af9e557ce0a223ce

            SHA1

            c6bfb50e11c95a3959feb371051dda81681f085e

            SHA256

            bb7c19411838c5b7c721e490f005970e8b381019626ce9f8a40e28acecb71079

            SHA512

            69a86cb87dc88251fed741816956ece0d239f159b35abe3d4320a7cc14f932a78c51ee4d8594158b524c484d5418a1f77386cc59dd99149b9e3fdecd34bde831

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m5484426.exe

            Filesize

            963KB

            MD5

            c1c1b33e6338e381af9e557ce0a223ce

            SHA1

            c6bfb50e11c95a3959feb371051dda81681f085e

            SHA256

            bb7c19411838c5b7c721e490f005970e8b381019626ce9f8a40e28acecb71079

            SHA512

            69a86cb87dc88251fed741816956ece0d239f159b35abe3d4320a7cc14f932a78c51ee4d8594158b524c484d5418a1f77386cc59dd99149b9e3fdecd34bde831

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m5484426.exe

            Filesize

            963KB

            MD5

            c1c1b33e6338e381af9e557ce0a223ce

            SHA1

            c6bfb50e11c95a3959feb371051dda81681f085e

            SHA256

            bb7c19411838c5b7c721e490f005970e8b381019626ce9f8a40e28acecb71079

            SHA512

            69a86cb87dc88251fed741816956ece0d239f159b35abe3d4320a7cc14f932a78c51ee4d8594158b524c484d5418a1f77386cc59dd99149b9e3fdecd34bde831

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m5484426.exe

            Filesize

            963KB

            MD5

            c1c1b33e6338e381af9e557ce0a223ce

            SHA1

            c6bfb50e11c95a3959feb371051dda81681f085e

            SHA256

            bb7c19411838c5b7c721e490f005970e8b381019626ce9f8a40e28acecb71079

            SHA512

            69a86cb87dc88251fed741816956ece0d239f159b35abe3d4320a7cc14f932a78c51ee4d8594158b524c484d5418a1f77386cc59dd99149b9e3fdecd34bde831

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7631986.exe

            Filesize

            305KB

            MD5

            a5e832d50572dd75fa7f370b79782d74

            SHA1

            e7544c8ed3573e191c9054b31a9b8b6bdbfdd7e3

            SHA256

            d7e27bc45778f109d5eb3a529800648e35499ee9611c137e37c716b3dffd3f1e

            SHA512

            520e79d9a11251c9bdd5a93097d83221da7a36f4e3840625e4c7a3dc6dc810927aa363ca4f98df351941d14511375426942f91ea5aa95dbb7956626d096487dd

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y7631986.exe

            Filesize

            305KB

            MD5

            a5e832d50572dd75fa7f370b79782d74

            SHA1

            e7544c8ed3573e191c9054b31a9b8b6bdbfdd7e3

            SHA256

            d7e27bc45778f109d5eb3a529800648e35499ee9611c137e37c716b3dffd3f1e

            SHA512

            520e79d9a11251c9bdd5a93097d83221da7a36f4e3840625e4c7a3dc6dc810927aa363ca4f98df351941d14511375426942f91ea5aa95dbb7956626d096487dd

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k7754722.exe

            Filesize

            184KB

            MD5

            994043e64669093ce3bd7b559e0eb25e

            SHA1

            8d34811da1c2659b5c54e557d7ae492514e8bedf

            SHA256

            8e6f5e3cd0dd81ccff5e61cc5161ced66b70129775b6d28a70b08ebe41b8dce8

            SHA512

            1158e9c9e2d727bee96df75896525ba92ce7f862e57860bd65ca825a91699c2c8362fa9e3eb6bda5c8f0cb64db151a78c370b552da0020a90560282afa64f113

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k7754722.exe

            Filesize

            184KB

            MD5

            994043e64669093ce3bd7b559e0eb25e

            SHA1

            8d34811da1c2659b5c54e557d7ae492514e8bedf

            SHA256

            8e6f5e3cd0dd81ccff5e61cc5161ced66b70129775b6d28a70b08ebe41b8dce8

            SHA512

            1158e9c9e2d727bee96df75896525ba92ce7f862e57860bd65ca825a91699c2c8362fa9e3eb6bda5c8f0cb64db151a78c370b552da0020a90560282afa64f113

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9226878.exe

            Filesize

            145KB

            MD5

            f51d164aaca43ad8dc88fe0c0ab8f4a6

            SHA1

            debed4bd8754bb7b91dc57affd188e88911c90ad

            SHA256

            c93d8757c8ae9a66a024594a16bec196de427690c2392f015f99288b3add75c5

            SHA512

            3e29c6b32d50fb559d5ad61b014fd67e0f4b6ea7e297132a42e1ecce3efdb8fb4d38d2f38d2f0e2e848d0f52fed4030989b77332e18f92125ebb89a19f6882b3

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l9226878.exe

            Filesize

            145KB

            MD5

            f51d164aaca43ad8dc88fe0c0ab8f4a6

            SHA1

            debed4bd8754bb7b91dc57affd188e88911c90ad

            SHA256

            c93d8757c8ae9a66a024594a16bec196de427690c2392f015f99288b3add75c5

            SHA512

            3e29c6b32d50fb559d5ad61b014fd67e0f4b6ea7e297132a42e1ecce3efdb8fb4d38d2f38d2f0e2e848d0f52fed4030989b77332e18f92125ebb89a19f6882b3

          • memory/404-213-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/2252-205-0x0000000005220000-0x0000000005230000-memory.dmp

            Filesize

            64KB

          • memory/2252-203-0x0000000006D10000-0x0000000006ED2000-memory.dmp

            Filesize

            1.8MB

          • memory/2252-202-0x00000000061B0000-0x0000000006200000-memory.dmp

            Filesize

            320KB

          • memory/2252-201-0x0000000006260000-0x00000000062D6000-memory.dmp

            Filesize

            472KB

          • memory/2252-200-0x0000000006110000-0x00000000061A2000-memory.dmp

            Filesize

            584KB

          • memory/2252-199-0x0000000005620000-0x0000000005686000-memory.dmp

            Filesize

            408KB

          • memory/2252-198-0x0000000005230000-0x000000000526C000-memory.dmp

            Filesize

            240KB

          • memory/2252-197-0x0000000005220000-0x0000000005230000-memory.dmp

            Filesize

            64KB

          • memory/2252-196-0x00000000051B0000-0x00000000051C2000-memory.dmp

            Filesize

            72KB

          • memory/2252-195-0x0000000005280000-0x000000000538A000-memory.dmp

            Filesize

            1.0MB

          • memory/2252-194-0x0000000005750000-0x0000000005D68000-memory.dmp

            Filesize

            6.1MB

          • memory/2252-193-0x00000000007E0000-0x000000000080A000-memory.dmp

            Filesize

            168KB

          • memory/2252-204-0x0000000007410000-0x000000000793C000-memory.dmp

            Filesize

            5.2MB

          • memory/3540-223-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/3540-241-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/3540-1134-0x0000000004A30000-0x0000000004A40000-memory.dmp

            Filesize

            64KB

          • memory/3540-1133-0x0000000004A30000-0x0000000004A40000-memory.dmp

            Filesize

            64KB

          • memory/3540-1132-0x0000000004A30000-0x0000000004A40000-memory.dmp

            Filesize

            64KB

          • memory/3540-1130-0x0000000004A30000-0x0000000004A40000-memory.dmp

            Filesize

            64KB

          • memory/3540-255-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/3540-253-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/3540-251-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/3540-249-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/3540-247-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/3540-245-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/3540-243-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/3540-239-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/3540-237-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/3540-235-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/3540-233-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/3540-231-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/3540-229-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/3540-227-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/3540-225-0x0000000004A30000-0x0000000004A40000-memory.dmp

            Filesize

            64KB

          • memory/3540-224-0x0000000004A30000-0x0000000004A40000-memory.dmp

            Filesize

            64KB

          • memory/3540-222-0x0000000004A30000-0x0000000004A40000-memory.dmp

            Filesize

            64KB

          • memory/3540-220-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/3540-219-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/4000-179-0x0000000004F20000-0x0000000004F37000-memory.dmp

            Filesize

            92KB

          • memory/4000-188-0x0000000000900000-0x0000000000910000-memory.dmp

            Filesize

            64KB

          • memory/4000-157-0x0000000000900000-0x0000000000910000-memory.dmp

            Filesize

            64KB

          • memory/4000-158-0x0000000004F20000-0x0000000004F37000-memory.dmp

            Filesize

            92KB

          • memory/4000-154-0x0000000004910000-0x0000000004EB4000-memory.dmp

            Filesize

            5.6MB

          • memory/4000-159-0x0000000004F20000-0x0000000004F37000-memory.dmp

            Filesize

            92KB

          • memory/4000-167-0x0000000004F20000-0x0000000004F37000-memory.dmp

            Filesize

            92KB

          • memory/4000-187-0x0000000000900000-0x0000000000910000-memory.dmp

            Filesize

            64KB

          • memory/4000-161-0x0000000004F20000-0x0000000004F37000-memory.dmp

            Filesize

            92KB

          • memory/4000-163-0x0000000004F20000-0x0000000004F37000-memory.dmp

            Filesize

            92KB

          • memory/4000-156-0x0000000000900000-0x0000000000910000-memory.dmp

            Filesize

            64KB

          • memory/4000-186-0x0000000000900000-0x0000000000910000-memory.dmp

            Filesize

            64KB

          • memory/4000-175-0x0000000004F20000-0x0000000004F37000-memory.dmp

            Filesize

            92KB

          • memory/4000-169-0x0000000004F20000-0x0000000004F37000-memory.dmp

            Filesize

            92KB

          • memory/4000-171-0x0000000004F20000-0x0000000004F37000-memory.dmp

            Filesize

            92KB

          • memory/4000-173-0x0000000004F20000-0x0000000004F37000-memory.dmp

            Filesize

            92KB

          • memory/4000-165-0x0000000004F20000-0x0000000004F37000-memory.dmp

            Filesize

            92KB

          • memory/4000-177-0x0000000004F20000-0x0000000004F37000-memory.dmp

            Filesize

            92KB

          • memory/4000-155-0x0000000000900000-0x0000000000910000-memory.dmp

            Filesize

            64KB

          • memory/4000-183-0x0000000004F20000-0x0000000004F37000-memory.dmp

            Filesize

            92KB

          • memory/4000-181-0x0000000004F20000-0x0000000004F37000-memory.dmp

            Filesize

            92KB

          • memory/4000-185-0x0000000004F20000-0x0000000004F37000-memory.dmp

            Filesize

            92KB

          • memory/4464-211-0x0000000007B20000-0x0000000007B30000-memory.dmp

            Filesize

            64KB

          • memory/4464-210-0x0000000000CE0000-0x0000000000DD8000-memory.dmp

            Filesize

            992KB