Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/05/2023, 01:44

General

  • Target

    b8e30932b420011082a4d41a9659a350a1a058a511916c4376ed848040a8f194.exe

  • Size

    1019KB

  • MD5

    c8028db09e8dbc065f1d7573f9b1c3fb

  • SHA1

    0d2ec212b2a0514f00a3b57ea62de71e4d92e4b2

  • SHA256

    b8e30932b420011082a4d41a9659a350a1a058a511916c4376ed848040a8f194

  • SHA512

    7a1139a3d74c3b3af1faac8a66cd22b7f34f4b00350872490b9823970312592343114ccb054526bbb44209d62128f1e245a4266521d8dee4a832ac747678e0fb

  • SSDEEP

    24576:jyAJhZXbm4G9Z7i9gEQsiDJtdYqq635YlnWKSTacKKJYTyYMy:2WhZXbo9Z+9g6EO56pN1KKJYW

Malware Config

Extracted

Family

redline

Botnet

lols

C2

77.91.68.253:41783

Attributes
  • auth_value

    07dccfc2986896754e6cde616a0a7868

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8e30932b420011082a4d41a9659a350a1a058a511916c4376ed848040a8f194.exe
    "C:\Users\Admin\AppData\Local\Temp\b8e30932b420011082a4d41a9659a350a1a058a511916c4376ed848040a8f194.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4484
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2269585.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2269585.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4472
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3560251.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3560251.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4676
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0514771.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0514771.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5100
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p7299189.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p7299189.exe
          4⤵
          • Executes dropped EXE
          PID:1252
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 928
            5⤵
            • Program crash
            PID:3868
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5989485.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5989485.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:224
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7282511.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7282511.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3256
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7282511.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7282511.exe
        3⤵
        • Executes dropped EXE
        PID:4004
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7282511.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7282511.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of UnmapMainImage
        PID:520
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 520 -s 12
          4⤵
          • Program crash
          PID:2496
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1252 -ip 1252
    1⤵
      PID:4388
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 520 -ip 520
      1⤵
        PID:5048

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7282511.exe

              Filesize

              962KB

              MD5

              85d9db55fa75a177bda1ab34e157fd53

              SHA1

              661660502183661768404f2dd5f6fd83706f75c8

              SHA256

              ca0849e2cb445394b35b3d569b6eba13e4f547b3222270a1d1d3e13143597d05

              SHA512

              483c3eb96496682504cd6793d033ac2a97fe6ab8a4821b90f9d66a9ba5bee0d4f0df27eecefd151577e912cafe3f2e0c270177ddfa2c15aa7b809fac8c128fcc

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7282511.exe

              Filesize

              962KB

              MD5

              85d9db55fa75a177bda1ab34e157fd53

              SHA1

              661660502183661768404f2dd5f6fd83706f75c8

              SHA256

              ca0849e2cb445394b35b3d569b6eba13e4f547b3222270a1d1d3e13143597d05

              SHA512

              483c3eb96496682504cd6793d033ac2a97fe6ab8a4821b90f9d66a9ba5bee0d4f0df27eecefd151577e912cafe3f2e0c270177ddfa2c15aa7b809fac8c128fcc

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7282511.exe

              Filesize

              962KB

              MD5

              85d9db55fa75a177bda1ab34e157fd53

              SHA1

              661660502183661768404f2dd5f6fd83706f75c8

              SHA256

              ca0849e2cb445394b35b3d569b6eba13e4f547b3222270a1d1d3e13143597d05

              SHA512

              483c3eb96496682504cd6793d033ac2a97fe6ab8a4821b90f9d66a9ba5bee0d4f0df27eecefd151577e912cafe3f2e0c270177ddfa2c15aa7b809fac8c128fcc

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s7282511.exe

              Filesize

              962KB

              MD5

              85d9db55fa75a177bda1ab34e157fd53

              SHA1

              661660502183661768404f2dd5f6fd83706f75c8

              SHA256

              ca0849e2cb445394b35b3d569b6eba13e4f547b3222270a1d1d3e13143597d05

              SHA512

              483c3eb96496682504cd6793d033ac2a97fe6ab8a4821b90f9d66a9ba5bee0d4f0df27eecefd151577e912cafe3f2e0c270177ddfa2c15aa7b809fac8c128fcc

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2269585.exe

              Filesize

              576KB

              MD5

              41313d6444d14de0d66a46dc78d24dc4

              SHA1

              8b7f29f6ff51f4268e9b5da2d908de2603d8be48

              SHA256

              d035e5a6e0da2d578e0e6b7ac4de61cb6dc23750ace8bea43db5e5f93705538e

              SHA512

              8d618645ca48deba748329fd2444d663f6ce37b81f51cb8590b619be7333e10c7da4903623e8ce95e285936c40d4479a705d334d1fcfb4b39dccb645ce4e4070

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z2269585.exe

              Filesize

              576KB

              MD5

              41313d6444d14de0d66a46dc78d24dc4

              SHA1

              8b7f29f6ff51f4268e9b5da2d908de2603d8be48

              SHA256

              d035e5a6e0da2d578e0e6b7ac4de61cb6dc23750ace8bea43db5e5f93705538e

              SHA512

              8d618645ca48deba748329fd2444d663f6ce37b81f51cb8590b619be7333e10c7da4903623e8ce95e285936c40d4479a705d334d1fcfb4b39dccb645ce4e4070

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5989485.exe

              Filesize

              284KB

              MD5

              da4e22fd4cb7a2662032ae5bf6249147

              SHA1

              b814067e6aa25b99c21d5c1e270caa4667d4317c

              SHA256

              be2407e5afc58671ce3872cfee97e20fac3682ce915b8b8b7a7ebb47fae66e30

              SHA512

              bfccc3ce40a3adf1ef88faec8dbf457b73eb12a5008d97a66d51f596fa92624a511b1857e684fc57d3a75d65e2e816d347302ae772172592207c2b0cb522eb06

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5989485.exe

              Filesize

              284KB

              MD5

              da4e22fd4cb7a2662032ae5bf6249147

              SHA1

              b814067e6aa25b99c21d5c1e270caa4667d4317c

              SHA256

              be2407e5afc58671ce3872cfee97e20fac3682ce915b8b8b7a7ebb47fae66e30

              SHA512

              bfccc3ce40a3adf1ef88faec8dbf457b73eb12a5008d97a66d51f596fa92624a511b1857e684fc57d3a75d65e2e816d347302ae772172592207c2b0cb522eb06

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3560251.exe

              Filesize

              305KB

              MD5

              d3979e7995b3a4ad902faaf46a17f320

              SHA1

              ca3628425557682b312882eb178222707964988f

              SHA256

              054ac74fbe19893a2efc0a42787b374253d35255becf09e8e455758592502fd9

              SHA512

              99da1841eb8f4e726ccdda0901c528f03632dce68869e16125aedfd791d34e686a5bfc0b57a70d7597fa9461c0f64cb39f558a4844939923461cdac9d763b182

            • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z3560251.exe

              Filesize

              305KB

              MD5

              d3979e7995b3a4ad902faaf46a17f320

              SHA1

              ca3628425557682b312882eb178222707964988f

              SHA256

              054ac74fbe19893a2efc0a42787b374253d35255becf09e8e455758592502fd9

              SHA512

              99da1841eb8f4e726ccdda0901c528f03632dce68869e16125aedfd791d34e686a5bfc0b57a70d7597fa9461c0f64cb39f558a4844939923461cdac9d763b182

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0514771.exe

              Filesize

              184KB

              MD5

              4c94e0df16c58143287479c74f3e54e7

              SHA1

              f93129b20ac587e95b91f611d4c58b3005b140a9

              SHA256

              c55f04038db70d84fe431937ecf878573a31f0777ea612ad482f76c9a9968a2f

              SHA512

              72d63fafde9940b14b6ffcad664c287adadee194d8bd3cd685916814ab2b6be4fee82cd6af2035433a1ec39609d2a4ca74cffa414a92182c06ccd4d86b085f09

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o0514771.exe

              Filesize

              184KB

              MD5

              4c94e0df16c58143287479c74f3e54e7

              SHA1

              f93129b20ac587e95b91f611d4c58b3005b140a9

              SHA256

              c55f04038db70d84fe431937ecf878573a31f0777ea612ad482f76c9a9968a2f

              SHA512

              72d63fafde9940b14b6ffcad664c287adadee194d8bd3cd685916814ab2b6be4fee82cd6af2035433a1ec39609d2a4ca74cffa414a92182c06ccd4d86b085f09

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p7299189.exe

              Filesize

              145KB

              MD5

              6633962990a012aad8ac3cc9d3b7ed8e

              SHA1

              f110187812482b500120d4c7be03c5d377f3532d

              SHA256

              d78edbeb1d5a18a5570de6e461b7400a748dd7dd6f7889387f688d564f5d0049

              SHA512

              c757735ec6b3ea5956dc011c8774e9caec1337aeab5010e49e7a100b40612c335857d963137fa0a5084a321586ef3b6d130af37dda9da8737b47faad02d7230c

            • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p7299189.exe

              Filesize

              145KB

              MD5

              6633962990a012aad8ac3cc9d3b7ed8e

              SHA1

              f110187812482b500120d4c7be03c5d377f3532d

              SHA256

              d78edbeb1d5a18a5570de6e461b7400a748dd7dd6f7889387f688d564f5d0049

              SHA512

              c757735ec6b3ea5956dc011c8774e9caec1337aeab5010e49e7a100b40612c335857d963137fa0a5084a321586ef3b6d130af37dda9da8737b47faad02d7230c

            • memory/224-1107-0x0000000005070000-0x0000000005688000-memory.dmp

              Filesize

              6.1MB

            • memory/224-1113-0x0000000005C00000-0x0000000005C66000-memory.dmp

              Filesize

              408KB

            • memory/224-1121-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

              Filesize

              64KB

            • memory/224-1120-0x00000000066F0000-0x0000000006C1C000-memory.dmp

              Filesize

              5.2MB

            • memory/224-1119-0x0000000006520000-0x00000000066E2000-memory.dmp

              Filesize

              1.8MB

            • memory/224-1118-0x0000000006490000-0x00000000064E0000-memory.dmp

              Filesize

              320KB

            • memory/224-1117-0x0000000006400000-0x0000000006476000-memory.dmp

              Filesize

              472KB

            • memory/224-1116-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

              Filesize

              64KB

            • memory/224-1115-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

              Filesize

              64KB

            • memory/224-1114-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

              Filesize

              64KB

            • memory/224-1112-0x0000000005B60000-0x0000000005BF2000-memory.dmp

              Filesize

              584KB

            • memory/224-1111-0x0000000005870000-0x00000000058AC000-memory.dmp

              Filesize

              240KB

            • memory/224-1110-0x0000000005850000-0x0000000005862000-memory.dmp

              Filesize

              72KB

            • memory/224-1109-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

              Filesize

              64KB

            • memory/224-1108-0x0000000005710000-0x000000000581A000-memory.dmp

              Filesize

              1.0MB

            • memory/224-234-0x00000000049C0000-0x00000000049FC000-memory.dmp

              Filesize

              240KB

            • memory/224-232-0x00000000049C0000-0x00000000049FC000-memory.dmp

              Filesize

              240KB

            • memory/224-230-0x00000000049C0000-0x00000000049FC000-memory.dmp

              Filesize

              240KB

            • memory/224-196-0x00000000049C0000-0x00000000049FC000-memory.dmp

              Filesize

              240KB

            • memory/224-197-0x00000000049C0000-0x00000000049FC000-memory.dmp

              Filesize

              240KB

            • memory/224-199-0x00000000049C0000-0x00000000049FC000-memory.dmp

              Filesize

              240KB

            • memory/224-201-0x00000000049C0000-0x00000000049FC000-memory.dmp

              Filesize

              240KB

            • memory/224-203-0x00000000049C0000-0x00000000049FC000-memory.dmp

              Filesize

              240KB

            • memory/224-205-0x00000000049C0000-0x00000000049FC000-memory.dmp

              Filesize

              240KB

            • memory/224-207-0x00000000049C0000-0x00000000049FC000-memory.dmp

              Filesize

              240KB

            • memory/224-209-0x00000000049C0000-0x00000000049FC000-memory.dmp

              Filesize

              240KB

            • memory/224-212-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

              Filesize

              64KB

            • memory/224-211-0x00000000049C0000-0x00000000049FC000-memory.dmp

              Filesize

              240KB

            • memory/224-214-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

              Filesize

              64KB

            • memory/224-216-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

              Filesize

              64KB

            • memory/224-215-0x00000000049C0000-0x00000000049FC000-memory.dmp

              Filesize

              240KB

            • memory/224-218-0x00000000049C0000-0x00000000049FC000-memory.dmp

              Filesize

              240KB

            • memory/224-220-0x00000000049C0000-0x00000000049FC000-memory.dmp

              Filesize

              240KB

            • memory/224-222-0x00000000049C0000-0x00000000049FC000-memory.dmp

              Filesize

              240KB

            • memory/224-224-0x00000000049C0000-0x00000000049FC000-memory.dmp

              Filesize

              240KB

            • memory/224-226-0x00000000049C0000-0x00000000049FC000-memory.dmp

              Filesize

              240KB

            • memory/224-228-0x00000000049C0000-0x00000000049FC000-memory.dmp

              Filesize

              240KB

            • memory/1252-192-0x0000000000950000-0x000000000097A000-memory.dmp

              Filesize

              168KB

            • memory/3256-1126-0x00000000007E0000-0x00000000008D8000-memory.dmp

              Filesize

              992KB

            • memory/3256-1127-0x0000000007580000-0x0000000007590000-memory.dmp

              Filesize

              64KB

            • memory/5100-179-0x0000000004960000-0x0000000004976000-memory.dmp

              Filesize

              88KB

            • memory/5100-175-0x0000000004960000-0x0000000004976000-memory.dmp

              Filesize

              88KB

            • memory/5100-165-0x0000000004960000-0x0000000004976000-memory.dmp

              Filesize

              88KB

            • memory/5100-187-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

              Filesize

              64KB

            • memory/5100-186-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

              Filesize

              64KB

            • memory/5100-185-0x0000000004960000-0x0000000004976000-memory.dmp

              Filesize

              88KB

            • memory/5100-167-0x0000000004960000-0x0000000004976000-memory.dmp

              Filesize

              88KB

            • memory/5100-183-0x0000000004960000-0x0000000004976000-memory.dmp

              Filesize

              88KB

            • memory/5100-181-0x0000000004960000-0x0000000004976000-memory.dmp

              Filesize

              88KB

            • memory/5100-159-0x0000000004960000-0x0000000004976000-memory.dmp

              Filesize

              88KB

            • memory/5100-177-0x0000000004960000-0x0000000004976000-memory.dmp

              Filesize

              88KB

            • memory/5100-163-0x0000000004960000-0x0000000004976000-memory.dmp

              Filesize

              88KB

            • memory/5100-171-0x0000000004960000-0x0000000004976000-memory.dmp

              Filesize

              88KB

            • memory/5100-173-0x0000000004960000-0x0000000004976000-memory.dmp

              Filesize

              88KB

            • memory/5100-169-0x0000000004960000-0x0000000004976000-memory.dmp

              Filesize

              88KB

            • memory/5100-154-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

              Filesize

              64KB

            • memory/5100-157-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

              Filesize

              64KB

            • memory/5100-158-0x0000000004960000-0x0000000004976000-memory.dmp

              Filesize

              88KB

            • memory/5100-161-0x0000000004960000-0x0000000004976000-memory.dmp

              Filesize

              88KB

            • memory/5100-155-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

              Filesize

              64KB

            • memory/5100-156-0x0000000004AC0000-0x0000000005064000-memory.dmp

              Filesize

              5.6MB