Analysis

  • max time kernel
    117s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-05-2023 12:00

General

  • Target

    config.exe

  • Size

    1.0MB

  • MD5

    a296236b4cae082d5d35f0f725e42681

  • SHA1

    922ef0ea11ac7a7a4d22fee04207ff0793ab65f5

  • SHA256

    a5f3b7b70470ed75e8bdcc9f2db015f4de4784352e53d7259aaeb0cbfc25af1b

  • SHA512

    e79422fdf250165a4ab3adeb268ed58cd3ae33b20ea4debf4b8c24e21e2cf21f322934e8373cf85f48254a9a3f6fc19a905fccb52da9e3c90f60458ef23b0532

  • SSDEEP

    24576:DyajQcJVGdY9PxNkjbu107S8yfTmzVQhLhu22ejPZlWy:WajQc7nNkjbg07S8yrmzYjPZ

Malware Config

Extracted

Family

redline

Botnet

muser

C2

77.91.68.253:19065

Attributes
  • auth_value

    ab307a8e027ba1296455e3d548f168a3

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 17 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\config.exe
    "C:\Users\Admin\AppData\Local\Temp\config.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4476
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7546165.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7546165.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2544
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7346798.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7346798.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4592
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8841520.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8841520.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3848
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1397787.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1397787.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4612
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2058391.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2058391.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4728
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2058391.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2058391.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:3764
          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:544
            • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
              C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of UnmapMainImage
              PID:2244
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2244 -s 12
                7⤵
                • Program crash
                PID:1376
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3628710.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3628710.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1800
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2244 -ip 2244
    1⤵
      PID:692

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3628710.exe

      Filesize

      284KB

      MD5

      acb51e65b346e19724fc4d0af17f54f1

      SHA1

      18af3b918f7f55779f539f2962573ad07773aa39

      SHA256

      a85414ef5d2268271d75bca0b5b892fb4fd01c95e804b776c885eafb989ec6af

      SHA512

      730ffe3d558d03bc62ceacd6e5e59bd58988377280b54b36d5690710c63f4a93c9da2f40cc089739213ee2a7f99e61435e0ce194be28898a2954b5c18a89140c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3628710.exe

      Filesize

      284KB

      MD5

      acb51e65b346e19724fc4d0af17f54f1

      SHA1

      18af3b918f7f55779f539f2962573ad07773aa39

      SHA256

      a85414ef5d2268271d75bca0b5b892fb4fd01c95e804b776c885eafb989ec6af

      SHA512

      730ffe3d558d03bc62ceacd6e5e59bd58988377280b54b36d5690710c63f4a93c9da2f40cc089739213ee2a7f99e61435e0ce194be28898a2954b5c18a89140c

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7546165.exe

      Filesize

      751KB

      MD5

      2bcd0d85f092baadd3aa8df9fb89a58d

      SHA1

      29eac4c2fd71cf43f7631508006ff5afe318d4c8

      SHA256

      f636f45996087105f51e749141d2f13707106bb435ef2f5220651a2e5178e05f

      SHA512

      ebee1472ff0cd6fdb1f59a1e87b2393f42493ca3b1ae88007201872f4334c6f32e97133e7a2591840cb017a8a776cd68e40163721d2161d83604aced11936502

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7546165.exe

      Filesize

      751KB

      MD5

      2bcd0d85f092baadd3aa8df9fb89a58d

      SHA1

      29eac4c2fd71cf43f7631508006ff5afe318d4c8

      SHA256

      f636f45996087105f51e749141d2f13707106bb435ef2f5220651a2e5178e05f

      SHA512

      ebee1472ff0cd6fdb1f59a1e87b2393f42493ca3b1ae88007201872f4334c6f32e97133e7a2591840cb017a8a776cd68e40163721d2161d83604aced11936502

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2058391.exe

      Filesize

      963KB

      MD5

      181b014ec7e875429203a2f8a5a15d0c

      SHA1

      0106677318e2bd9e1d1ba50abbbf288346a3eee6

      SHA256

      51e5520f9b6317221e6069757239b4d8155066ec80e2d7aa10e4f52e23b0eefa

      SHA512

      201a4a4d7786fb5e00ef581bd9cf73d34e1ed87942225efdb9ef7935f9d06acc41a07dc215d52cf14fbc8f49407cf0ceba07e3410a92888e2737d5edb6acbbce

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2058391.exe

      Filesize

      963KB

      MD5

      181b014ec7e875429203a2f8a5a15d0c

      SHA1

      0106677318e2bd9e1d1ba50abbbf288346a3eee6

      SHA256

      51e5520f9b6317221e6069757239b4d8155066ec80e2d7aa10e4f52e23b0eefa

      SHA512

      201a4a4d7786fb5e00ef581bd9cf73d34e1ed87942225efdb9ef7935f9d06acc41a07dc215d52cf14fbc8f49407cf0ceba07e3410a92888e2737d5edb6acbbce

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2058391.exe

      Filesize

      963KB

      MD5

      181b014ec7e875429203a2f8a5a15d0c

      SHA1

      0106677318e2bd9e1d1ba50abbbf288346a3eee6

      SHA256

      51e5520f9b6317221e6069757239b4d8155066ec80e2d7aa10e4f52e23b0eefa

      SHA512

      201a4a4d7786fb5e00ef581bd9cf73d34e1ed87942225efdb9ef7935f9d06acc41a07dc215d52cf14fbc8f49407cf0ceba07e3410a92888e2737d5edb6acbbce

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7346798.exe

      Filesize

      305KB

      MD5

      538e54016d31e297a8a23c4435f81732

      SHA1

      32c8940dcac8eabd98f4a8f798a3539c3f9f5b39

      SHA256

      576a7010dc0f7e5fcf637367fc41cc7ce804cbea8a874788ee4060dc84747b5b

      SHA512

      893bf9af4bb11dd758e395c8397cb9ac076ce5dea17f24f146e30963b4babb81f6710b4e55b21533d27178511a09447958c921399eb0ee5f0e9cf766ae858a6c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v7346798.exe

      Filesize

      305KB

      MD5

      538e54016d31e297a8a23c4435f81732

      SHA1

      32c8940dcac8eabd98f4a8f798a3539c3f9f5b39

      SHA256

      576a7010dc0f7e5fcf637367fc41cc7ce804cbea8a874788ee4060dc84747b5b

      SHA512

      893bf9af4bb11dd758e395c8397cb9ac076ce5dea17f24f146e30963b4babb81f6710b4e55b21533d27178511a09447958c921399eb0ee5f0e9cf766ae858a6c

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8841520.exe

      Filesize

      184KB

      MD5

      175c8c242008747ad34c60865a286925

      SHA1

      3d6c0cbbd1632a134f59c101c69eb2c3bbbac47a

      SHA256

      87bacb6f81f713798e445678ec34add3c69cb41b5a9674928beec32643c8d1be

      SHA512

      cfce928eba7397595fe472e010574f72d6217fee6096181fe9727bf4f1b4ed96e918993e73d93073a818a8ebeac9d80c5fe997686abbc7f2b8a7cf5581b9e764

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8841520.exe

      Filesize

      184KB

      MD5

      175c8c242008747ad34c60865a286925

      SHA1

      3d6c0cbbd1632a134f59c101c69eb2c3bbbac47a

      SHA256

      87bacb6f81f713798e445678ec34add3c69cb41b5a9674928beec32643c8d1be

      SHA512

      cfce928eba7397595fe472e010574f72d6217fee6096181fe9727bf4f1b4ed96e918993e73d93073a818a8ebeac9d80c5fe997686abbc7f2b8a7cf5581b9e764

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1397787.exe

      Filesize

      145KB

      MD5

      4488293ba13c90fe81a09ad98f05d575

      SHA1

      4e01cd6c385ebd31dd554639bd4fab73f97d570e

      SHA256

      32ba2a81480f904d40711b7dfb470ec75afac9966fe5a9f64a9f7edaaac76e8d

      SHA512

      790753e4ed69508a5e6b588fa51e58dccb7a137e5b270d65c959f63b104098cef37f5f354b4bd5787868b5fb242358fed04455123845e57bb8e4fba54975d80d

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b1397787.exe

      Filesize

      145KB

      MD5

      4488293ba13c90fe81a09ad98f05d575

      SHA1

      4e01cd6c385ebd31dd554639bd4fab73f97d570e

      SHA256

      32ba2a81480f904d40711b7dfb470ec75afac9966fe5a9f64a9f7edaaac76e8d

      SHA512

      790753e4ed69508a5e6b588fa51e58dccb7a137e5b270d65c959f63b104098cef37f5f354b4bd5787868b5fb242358fed04455123845e57bb8e4fba54975d80d

    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

      Filesize

      963KB

      MD5

      181b014ec7e875429203a2f8a5a15d0c

      SHA1

      0106677318e2bd9e1d1ba50abbbf288346a3eee6

      SHA256

      51e5520f9b6317221e6069757239b4d8155066ec80e2d7aa10e4f52e23b0eefa

      SHA512

      201a4a4d7786fb5e00ef581bd9cf73d34e1ed87942225efdb9ef7935f9d06acc41a07dc215d52cf14fbc8f49407cf0ceba07e3410a92888e2737d5edb6acbbce

    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

      Filesize

      963KB

      MD5

      181b014ec7e875429203a2f8a5a15d0c

      SHA1

      0106677318e2bd9e1d1ba50abbbf288346a3eee6

      SHA256

      51e5520f9b6317221e6069757239b4d8155066ec80e2d7aa10e4f52e23b0eefa

      SHA512

      201a4a4d7786fb5e00ef581bd9cf73d34e1ed87942225efdb9ef7935f9d06acc41a07dc215d52cf14fbc8f49407cf0ceba07e3410a92888e2737d5edb6acbbce

    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

      Filesize

      963KB

      MD5

      181b014ec7e875429203a2f8a5a15d0c

      SHA1

      0106677318e2bd9e1d1ba50abbbf288346a3eee6

      SHA256

      51e5520f9b6317221e6069757239b4d8155066ec80e2d7aa10e4f52e23b0eefa

      SHA512

      201a4a4d7786fb5e00ef581bd9cf73d34e1ed87942225efdb9ef7935f9d06acc41a07dc215d52cf14fbc8f49407cf0ceba07e3410a92888e2737d5edb6acbbce

    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

      Filesize

      963KB

      MD5

      181b014ec7e875429203a2f8a5a15d0c

      SHA1

      0106677318e2bd9e1d1ba50abbbf288346a3eee6

      SHA256

      51e5520f9b6317221e6069757239b4d8155066ec80e2d7aa10e4f52e23b0eefa

      SHA512

      201a4a4d7786fb5e00ef581bd9cf73d34e1ed87942225efdb9ef7935f9d06acc41a07dc215d52cf14fbc8f49407cf0ceba07e3410a92888e2737d5edb6acbbce

    • memory/544-377-0x0000000007950000-0x0000000007960000-memory.dmp

      Filesize

      64KB

    • memory/1800-225-0x0000000002530000-0x000000000256C000-memory.dmp

      Filesize

      240KB

    • memory/1800-229-0x0000000002530000-0x000000000256C000-memory.dmp

      Filesize

      240KB

    • memory/1800-249-0x0000000002530000-0x000000000256C000-memory.dmp

      Filesize

      240KB

    • memory/1800-246-0x0000000002530000-0x000000000256C000-memory.dmp

      Filesize

      240KB

    • memory/1800-259-0x0000000002530000-0x000000000256C000-memory.dmp

      Filesize

      240KB

    • memory/1800-243-0x0000000002530000-0x000000000256C000-memory.dmp

      Filesize

      240KB

    • memory/1800-239-0x0000000002530000-0x000000000256C000-memory.dmp

      Filesize

      240KB

    • memory/1800-269-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

      Filesize

      64KB

    • memory/1800-271-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

      Filesize

      64KB

    • memory/1800-237-0x0000000002530000-0x000000000256C000-memory.dmp

      Filesize

      240KB

    • memory/1800-235-0x0000000002530000-0x000000000256C000-memory.dmp

      Filesize

      240KB

    • memory/1800-233-0x0000000002530000-0x000000000256C000-memory.dmp

      Filesize

      240KB

    • memory/1800-231-0x0000000002530000-0x000000000256C000-memory.dmp

      Filesize

      240KB

    • memory/1800-257-0x0000000002530000-0x000000000256C000-memory.dmp

      Filesize

      240KB

    • memory/1800-227-0x0000000002530000-0x000000000256C000-memory.dmp

      Filesize

      240KB

    • memory/1800-266-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

      Filesize

      64KB

    • memory/1800-223-0x0000000002530000-0x000000000256C000-memory.dmp

      Filesize

      240KB

    • memory/1800-221-0x0000000002530000-0x000000000256C000-memory.dmp

      Filesize

      240KB

    • memory/1800-219-0x0000000002530000-0x000000000256C000-memory.dmp

      Filesize

      240KB

    • memory/1800-218-0x0000000002530000-0x000000000256C000-memory.dmp

      Filesize

      240KB

    • memory/1800-1150-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

      Filesize

      64KB

    • memory/1800-1144-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

      Filesize

      64KB

    • memory/1800-1149-0x0000000004BD0000-0x0000000004BE0000-memory.dmp

      Filesize

      64KB

    • memory/3764-263-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/3764-213-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/3764-212-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/3764-209-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/3848-177-0x0000000002530000-0x0000000002546000-memory.dmp

      Filesize

      88KB

    • memory/3848-167-0x0000000002530000-0x0000000002546000-memory.dmp

      Filesize

      88KB

    • memory/3848-154-0x0000000002380000-0x0000000002390000-memory.dmp

      Filesize

      64KB

    • memory/3848-155-0x0000000004A30000-0x0000000004FD4000-memory.dmp

      Filesize

      5.6MB

    • memory/3848-156-0x0000000002530000-0x0000000002546000-memory.dmp

      Filesize

      88KB

    • memory/3848-159-0x0000000002530000-0x0000000002546000-memory.dmp

      Filesize

      88KB

    • memory/3848-161-0x0000000002530000-0x0000000002546000-memory.dmp

      Filesize

      88KB

    • memory/3848-157-0x0000000002530000-0x0000000002546000-memory.dmp

      Filesize

      88KB

    • memory/3848-163-0x0000000002530000-0x0000000002546000-memory.dmp

      Filesize

      88KB

    • memory/3848-165-0x0000000002530000-0x0000000002546000-memory.dmp

      Filesize

      88KB

    • memory/3848-169-0x0000000002530000-0x0000000002546000-memory.dmp

      Filesize

      88KB

    • memory/3848-171-0x0000000002530000-0x0000000002546000-memory.dmp

      Filesize

      88KB

    • memory/3848-173-0x0000000002530000-0x0000000002546000-memory.dmp

      Filesize

      88KB

    • memory/3848-175-0x0000000002530000-0x0000000002546000-memory.dmp

      Filesize

      88KB

    • memory/3848-179-0x0000000002530000-0x0000000002546000-memory.dmp

      Filesize

      88KB

    • memory/3848-181-0x0000000002530000-0x0000000002546000-memory.dmp

      Filesize

      88KB

    • memory/3848-185-0x0000000002380000-0x0000000002390000-memory.dmp

      Filesize

      64KB

    • memory/3848-184-0x0000000002380000-0x0000000002390000-memory.dmp

      Filesize

      64KB

    • memory/3848-183-0x0000000002530000-0x0000000002546000-memory.dmp

      Filesize

      88KB

    • memory/4612-198-0x00000000068D0000-0x0000000006946000-memory.dmp

      Filesize

      472KB

    • memory/4612-197-0x0000000005C90000-0x0000000005CF6000-memory.dmp

      Filesize

      408KB

    • memory/4612-192-0x0000000005910000-0x0000000005A1A000-memory.dmp

      Filesize

      1.0MB

    • memory/4612-193-0x0000000005840000-0x0000000005852000-memory.dmp

      Filesize

      72KB

    • memory/4612-194-0x0000000005B40000-0x0000000005B50000-memory.dmp

      Filesize

      64KB

    • memory/4612-195-0x00000000058A0000-0x00000000058DC000-memory.dmp

      Filesize

      240KB

    • memory/4612-191-0x0000000005DD0000-0x00000000063E8000-memory.dmp

      Filesize

      6.1MB

    • memory/4612-196-0x0000000005BF0000-0x0000000005C82000-memory.dmp

      Filesize

      584KB

    • memory/4612-202-0x0000000005B40000-0x0000000005B50000-memory.dmp

      Filesize

      64KB

    • memory/4612-190-0x0000000000E70000-0x0000000000E9A000-memory.dmp

      Filesize

      168KB

    • memory/4612-199-0x0000000006850000-0x00000000068A0000-memory.dmp

      Filesize

      320KB

    • memory/4612-200-0x0000000007220000-0x00000000073E2000-memory.dmp

      Filesize

      1.8MB

    • memory/4612-201-0x0000000007920000-0x0000000007E4C000-memory.dmp

      Filesize

      5.2MB

    • memory/4728-208-0x0000000006EB0000-0x0000000006EC0000-memory.dmp

      Filesize

      64KB

    • memory/4728-207-0x0000000000010000-0x0000000000108000-memory.dmp

      Filesize

      992KB