Analysis

  • max time kernel
    59s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/05/2023, 12:27

General

  • Target

    2fd2feba6bd44c7fc88285cde61e84faea2ef90788efa583d314c2ecaa48b7b4.exe

  • Size

    1.0MB

  • MD5

    439b246eb9ffda3cbd363190f06b0d9a

  • SHA1

    e510493ca440037e544e96332246d21b80c430ea

  • SHA256

    2fd2feba6bd44c7fc88285cde61e84faea2ef90788efa583d314c2ecaa48b7b4

  • SHA512

    554aec13d3816bb2e0559f2740f71d81b74b8e669f440358b0a4787e66d7d749ea48ecbd5ceda32de9addfc8b2577ce59bb7cf16efff0cf2fd5d646e531b006b

  • SSDEEP

    24576:fyaVOx48A4yA/foh/VLryFLfYqVLIyl9iwf1g:qaVOK8A4yAY5VaVrV8y3iw

Malware Config

Extracted

Family

redline

Botnet

muser

C2

77.91.68.253:19065

Attributes
  • auth_value

    ab307a8e027ba1296455e3d548f168a3

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2fd2feba6bd44c7fc88285cde61e84faea2ef90788efa583d314c2ecaa48b7b4.exe
    "C:\Users\Admin\AppData\Local\Temp\2fd2feba6bd44c7fc88285cde61e84faea2ef90788efa583d314c2ecaa48b7b4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4932
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4365767.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4365767.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3116
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4593371.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4593371.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:3572
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1669123.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1669123.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1960
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2140038.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2140038.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4448
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1739977.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1739977.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3172
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1739977.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1739977.exe
          4⤵
          • Executes dropped EXE
          PID:5112
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1739977.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1739977.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of UnmapMainImage
          PID:5080
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 5080 -s 12
            5⤵
            • Program crash
            PID:4372
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7539028.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7539028.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5068
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 5080 -ip 5080
    1⤵
      PID:3108

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7539028.exe

            Filesize

            284KB

            MD5

            efd4292d063bd41763a7ab16d4a783f9

            SHA1

            1da780dcf0f4403d2789ae7dd8081d5a2c36dcd9

            SHA256

            5b6a00fbfcb038fe021cec2bdf35644aa600edb69a6bb7f89105f03e78815c6e

            SHA512

            7db8b007b07110951d8fd41289ce1e464f055465d3514e6e603715e97e23aa312ec59fa1a2b3a0efa1778dfa66c8700e621f5489fba0f55f1f243ae0e55e6648

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d7539028.exe

            Filesize

            284KB

            MD5

            efd4292d063bd41763a7ab16d4a783f9

            SHA1

            1da780dcf0f4403d2789ae7dd8081d5a2c36dcd9

            SHA256

            5b6a00fbfcb038fe021cec2bdf35644aa600edb69a6bb7f89105f03e78815c6e

            SHA512

            7db8b007b07110951d8fd41289ce1e464f055465d3514e6e603715e97e23aa312ec59fa1a2b3a0efa1778dfa66c8700e621f5489fba0f55f1f243ae0e55e6648

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4365767.exe

            Filesize

            750KB

            MD5

            4d0e83eb0dd042940d7625dd713886f5

            SHA1

            42244897b97ad9462eea3339aee7f978b1126be6

            SHA256

            01dc477a2bccf6e8006532bc8e686774767e066397e7c1017abd03c4cc3815af

            SHA512

            02fe9ae7880cb83b75a9a35295bdf84d4f983cb8fa8332a685b6f51611cae9883d056e98c5eec0d6e1528ec50e9da304c5f9cbdb60ac3937949e2d0a7b4dc02b

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v4365767.exe

            Filesize

            750KB

            MD5

            4d0e83eb0dd042940d7625dd713886f5

            SHA1

            42244897b97ad9462eea3339aee7f978b1126be6

            SHA256

            01dc477a2bccf6e8006532bc8e686774767e066397e7c1017abd03c4cc3815af

            SHA512

            02fe9ae7880cb83b75a9a35295bdf84d4f983cb8fa8332a685b6f51611cae9883d056e98c5eec0d6e1528ec50e9da304c5f9cbdb60ac3937949e2d0a7b4dc02b

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1739977.exe

            Filesize

            963KB

            MD5

            1c2797303780004c682b7aedb885b677

            SHA1

            98b09ba28654a987df94af4585a2648af08241bb

            SHA256

            be5bf62bea5139a428d0c188c712167487867b483c5c783492682f2edcfcaf8c

            SHA512

            ad2c3e26e26de48a04eeea39e279b88730f93d2a41768e2f88ff490961adca5139a03a439849b3746577a16c2ddf4b8fada84eeb5c9708513173ec0507a4cc1a

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1739977.exe

            Filesize

            963KB

            MD5

            1c2797303780004c682b7aedb885b677

            SHA1

            98b09ba28654a987df94af4585a2648af08241bb

            SHA256

            be5bf62bea5139a428d0c188c712167487867b483c5c783492682f2edcfcaf8c

            SHA512

            ad2c3e26e26de48a04eeea39e279b88730f93d2a41768e2f88ff490961adca5139a03a439849b3746577a16c2ddf4b8fada84eeb5c9708513173ec0507a4cc1a

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1739977.exe

            Filesize

            963KB

            MD5

            1c2797303780004c682b7aedb885b677

            SHA1

            98b09ba28654a987df94af4585a2648af08241bb

            SHA256

            be5bf62bea5139a428d0c188c712167487867b483c5c783492682f2edcfcaf8c

            SHA512

            ad2c3e26e26de48a04eeea39e279b88730f93d2a41768e2f88ff490961adca5139a03a439849b3746577a16c2ddf4b8fada84eeb5c9708513173ec0507a4cc1a

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c1739977.exe

            Filesize

            963KB

            MD5

            1c2797303780004c682b7aedb885b677

            SHA1

            98b09ba28654a987df94af4585a2648af08241bb

            SHA256

            be5bf62bea5139a428d0c188c712167487867b483c5c783492682f2edcfcaf8c

            SHA512

            ad2c3e26e26de48a04eeea39e279b88730f93d2a41768e2f88ff490961adca5139a03a439849b3746577a16c2ddf4b8fada84eeb5c9708513173ec0507a4cc1a

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4593371.exe

            Filesize

            305KB

            MD5

            0d61c85edcd904b985c3d6ff0ab77b0f

            SHA1

            ed75ebaae880158dc80ac146b05450979d194667

            SHA256

            7a6c29d6c7ee3e13f6e3ded09bbb5d51adcfc4429487a095f2d4c950de40e31d

            SHA512

            5b4b2242f646363c7d7e1e70aea2455b4451a7de3ac1f4b12101892581eec37f4ceb55e9bffdf60b9abf666ae7bfd63b0719d6bd13b23f5d51d73cf250dab542

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4593371.exe

            Filesize

            305KB

            MD5

            0d61c85edcd904b985c3d6ff0ab77b0f

            SHA1

            ed75ebaae880158dc80ac146b05450979d194667

            SHA256

            7a6c29d6c7ee3e13f6e3ded09bbb5d51adcfc4429487a095f2d4c950de40e31d

            SHA512

            5b4b2242f646363c7d7e1e70aea2455b4451a7de3ac1f4b12101892581eec37f4ceb55e9bffdf60b9abf666ae7bfd63b0719d6bd13b23f5d51d73cf250dab542

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1669123.exe

            Filesize

            184KB

            MD5

            ad8778d8924f2e9b321e7dea93de88c8

            SHA1

            1dfe8ccba36d43d7eae85e47ec785da9168e1f2e

            SHA256

            934873cb5b76933727ef914c6c4beaa6b45888226dab01da3d904bb8ba5e7f5a

            SHA512

            54bb1a2661570c88ba4b12b02cad5a1c1ecf308326a6f378e1380249404c1b5bfdf65e8127156c7839e370287f7f549b6efaaf1296dbdc0e699cb0df0a2c469d

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a1669123.exe

            Filesize

            184KB

            MD5

            ad8778d8924f2e9b321e7dea93de88c8

            SHA1

            1dfe8ccba36d43d7eae85e47ec785da9168e1f2e

            SHA256

            934873cb5b76933727ef914c6c4beaa6b45888226dab01da3d904bb8ba5e7f5a

            SHA512

            54bb1a2661570c88ba4b12b02cad5a1c1ecf308326a6f378e1380249404c1b5bfdf65e8127156c7839e370287f7f549b6efaaf1296dbdc0e699cb0df0a2c469d

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2140038.exe

            Filesize

            145KB

            MD5

            408f0a28976e118c292bb603819e48cc

            SHA1

            2c99769d994b569dd186fd40dea1830588f307a0

            SHA256

            847b96aa5a09d2171565c0318d3218ceb03899b8656d52ad1f05e6daf9a5ed55

            SHA512

            242c341a0aff5a1a3e7d6b5ec6544e1819673e7da0382dcd06bf66a39fe2624f243826ccc2b241b4a0b0d3629b66912dff66ca60a3c2f64f7b2c0e261cda9c7e

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b2140038.exe

            Filesize

            145KB

            MD5

            408f0a28976e118c292bb603819e48cc

            SHA1

            2c99769d994b569dd186fd40dea1830588f307a0

            SHA256

            847b96aa5a09d2171565c0318d3218ceb03899b8656d52ad1f05e6daf9a5ed55

            SHA512

            242c341a0aff5a1a3e7d6b5ec6544e1819673e7da0382dcd06bf66a39fe2624f243826ccc2b241b4a0b0d3629b66912dff66ca60a3c2f64f7b2c0e261cda9c7e

          • memory/1960-166-0x0000000002610000-0x0000000002626000-memory.dmp

            Filesize

            88KB

          • memory/1960-180-0x0000000002610000-0x0000000002626000-memory.dmp

            Filesize

            88KB

          • memory/1960-162-0x0000000002610000-0x0000000002626000-memory.dmp

            Filesize

            88KB

          • memory/1960-164-0x0000000002610000-0x0000000002626000-memory.dmp

            Filesize

            88KB

          • memory/1960-158-0x0000000002610000-0x0000000002626000-memory.dmp

            Filesize

            88KB

          • memory/1960-168-0x0000000002610000-0x0000000002626000-memory.dmp

            Filesize

            88KB

          • memory/1960-170-0x0000000002610000-0x0000000002626000-memory.dmp

            Filesize

            88KB

          • memory/1960-172-0x0000000002610000-0x0000000002626000-memory.dmp

            Filesize

            88KB

          • memory/1960-174-0x0000000002610000-0x0000000002626000-memory.dmp

            Filesize

            88KB

          • memory/1960-176-0x0000000002610000-0x0000000002626000-memory.dmp

            Filesize

            88KB

          • memory/1960-178-0x0000000002610000-0x0000000002626000-memory.dmp

            Filesize

            88KB

          • memory/1960-160-0x0000000002610000-0x0000000002626000-memory.dmp

            Filesize

            88KB

          • memory/1960-182-0x0000000002610000-0x0000000002626000-memory.dmp

            Filesize

            88KB

          • memory/1960-184-0x0000000002610000-0x0000000002626000-memory.dmp

            Filesize

            88KB

          • memory/1960-185-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

            Filesize

            64KB

          • memory/1960-186-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

            Filesize

            64KB

          • memory/1960-187-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

            Filesize

            64KB

          • memory/1960-154-0x0000000004AC0000-0x0000000005064000-memory.dmp

            Filesize

            5.6MB

          • memory/1960-157-0x0000000002610000-0x0000000002626000-memory.dmp

            Filesize

            88KB

          • memory/1960-156-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

            Filesize

            64KB

          • memory/1960-155-0x0000000004AB0000-0x0000000004AC0000-memory.dmp

            Filesize

            64KB

          • memory/3172-209-0x00000000001E0000-0x00000000002D8000-memory.dmp

            Filesize

            992KB

          • memory/3172-210-0x00000000070F0000-0x0000000007100000-memory.dmp

            Filesize

            64KB

          • memory/4448-198-0x0000000005710000-0x0000000005776000-memory.dmp

            Filesize

            408KB

          • memory/4448-192-0x00000000009D0000-0x00000000009FA000-memory.dmp

            Filesize

            168KB

          • memory/4448-199-0x0000000006300000-0x0000000006392000-memory.dmp

            Filesize

            584KB

          • memory/4448-200-0x0000000006570000-0x0000000006732000-memory.dmp

            Filesize

            1.8MB

          • memory/4448-201-0x00000000072B0000-0x00000000077DC000-memory.dmp

            Filesize

            5.2MB

          • memory/4448-196-0x0000000005410000-0x000000000544C000-memory.dmp

            Filesize

            240KB

          • memory/4448-195-0x00000000053B0000-0x00000000053C2000-memory.dmp

            Filesize

            72KB

          • memory/4448-202-0x0000000006740000-0x00000000067B6000-memory.dmp

            Filesize

            472KB

          • memory/4448-203-0x0000000006E80000-0x0000000006ED0000-memory.dmp

            Filesize

            320KB

          • memory/4448-204-0x0000000005380000-0x0000000005390000-memory.dmp

            Filesize

            64KB

          • memory/4448-197-0x0000000005380000-0x0000000005390000-memory.dmp

            Filesize

            64KB

          • memory/4448-194-0x0000000005470000-0x000000000557A000-memory.dmp

            Filesize

            1.0MB

          • memory/4448-193-0x00000000058F0000-0x0000000005F08000-memory.dmp

            Filesize

            6.1MB

          • memory/5068-242-0x0000000004AD0000-0x0000000004B0C000-memory.dmp

            Filesize

            240KB

          • memory/5068-238-0x0000000004AD0000-0x0000000004B0C000-memory.dmp

            Filesize

            240KB

          • memory/5068-219-0x0000000004AD0000-0x0000000004B0C000-memory.dmp

            Filesize

            240KB

          • memory/5068-221-0x0000000004AD0000-0x0000000004B0C000-memory.dmp

            Filesize

            240KB

          • memory/5068-223-0x0000000004B10000-0x0000000004B20000-memory.dmp

            Filesize

            64KB

          • memory/5068-225-0x0000000004B10000-0x0000000004B20000-memory.dmp

            Filesize

            64KB

          • memory/5068-227-0x0000000004AD0000-0x0000000004B0C000-memory.dmp

            Filesize

            240KB

          • memory/5068-228-0x0000000004B10000-0x0000000004B20000-memory.dmp

            Filesize

            64KB

          • memory/5068-230-0x0000000004AD0000-0x0000000004B0C000-memory.dmp

            Filesize

            240KB

          • memory/5068-224-0x0000000004AD0000-0x0000000004B0C000-memory.dmp

            Filesize

            240KB

          • memory/5068-232-0x0000000004AD0000-0x0000000004B0C000-memory.dmp

            Filesize

            240KB

          • memory/5068-234-0x0000000004AD0000-0x0000000004B0C000-memory.dmp

            Filesize

            240KB

          • memory/5068-236-0x0000000004AD0000-0x0000000004B0C000-memory.dmp

            Filesize

            240KB

          • memory/5068-218-0x0000000004AD0000-0x0000000004B0C000-memory.dmp

            Filesize

            240KB

          • memory/5068-240-0x0000000004AD0000-0x0000000004B0C000-memory.dmp

            Filesize

            240KB

          • memory/5068-1133-0x0000000004B10000-0x0000000004B20000-memory.dmp

            Filesize

            64KB

          • memory/5068-244-0x0000000004AD0000-0x0000000004B0C000-memory.dmp

            Filesize

            240KB

          • memory/5068-246-0x0000000004AD0000-0x0000000004B0C000-memory.dmp

            Filesize

            240KB

          • memory/5068-248-0x0000000004AD0000-0x0000000004B0C000-memory.dmp

            Filesize

            240KB

          • memory/5068-250-0x0000000004AD0000-0x0000000004B0C000-memory.dmp

            Filesize

            240KB

          • memory/5068-252-0x0000000004AD0000-0x0000000004B0C000-memory.dmp

            Filesize

            240KB

          • memory/5068-254-0x0000000004AD0000-0x0000000004B0C000-memory.dmp

            Filesize

            240KB

          • memory/5068-1129-0x0000000004B10000-0x0000000004B20000-memory.dmp

            Filesize

            64KB

          • memory/5068-1132-0x0000000004B10000-0x0000000004B20000-memory.dmp

            Filesize

            64KB

          • memory/5068-1131-0x0000000004B10000-0x0000000004B20000-memory.dmp

            Filesize

            64KB

          • memory/5080-212-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB