Analysis

  • max time kernel
    87s
  • max time network
    105s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/05/2023, 14:12

General

  • Target

    b93a2cfb44edde01b52994af62d4c940480429243e744a9dd5359076480a9ede.exe

  • Size

    1.0MB

  • MD5

    c9dbd27316f8b6801756bfc5b44ec858

  • SHA1

    b95cba21d9e9d34e0188fb7dd413d1c5b6368bee

  • SHA256

    b93a2cfb44edde01b52994af62d4c940480429243e744a9dd5359076480a9ede

  • SHA512

    5153cac69b1a349c07f6172ff971163214170192ba62d014e03e893e04a54d50e3064d953cd55debae837061a942a0133efb75795a69b5db9c6edf3f4ef78727

  • SSDEEP

    24576:GyYsGLaF/D21ACYyODReX+OukU3lsXVBFZX5E4zhCU5:VY4LCY2ut12VTx5EkC

Malware Config

Extracted

Family

redline

Botnet

duper

C2

77.91.68.253:19065

Attributes
  • auth_value

    57e17ebbdb18f4882b95fe05402ef1c8

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 17 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b93a2cfb44edde01b52994af62d4c940480429243e744a9dd5359076480a9ede.exe
    "C:\Users\Admin\AppData\Local\Temp\b93a2cfb44edde01b52994af62d4c940480429243e744a9dd5359076480a9ede.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3552
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2564634.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2564634.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6512359.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6512359.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1908
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8386952.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8386952.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4364
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0145556.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0145556.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3056
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1050543.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1050543.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1696
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1050543.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1050543.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4796
          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4280
            • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
              C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of UnmapMainImage
              PID:428
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 428 -s 12
                7⤵
                • Program crash
                PID:536
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9490151.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9490151.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3248
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 428 -ip 428
    1⤵
      PID:1368

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9490151.exe

            Filesize

            284KB

            MD5

            3dd0eee98a128f029f8bafff0539a694

            SHA1

            68061a3628d96831465ecb532d705d50c54fddf7

            SHA256

            47a2ed9faa71bb0ce56afa39e33f1f49cb9e08fa3332b8d5c42c201c8b8d4782

            SHA512

            a6e207c935853c36a15ca1f94dff17760aa6072d1b1357c7254e8d79d4f3cc82d75cc27d2e7518303582502ea2d9bed67a0ed3c52400d19dad93824cd7884981

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i9490151.exe

            Filesize

            284KB

            MD5

            3dd0eee98a128f029f8bafff0539a694

            SHA1

            68061a3628d96831465ecb532d705d50c54fddf7

            SHA256

            47a2ed9faa71bb0ce56afa39e33f1f49cb9e08fa3332b8d5c42c201c8b8d4782

            SHA512

            a6e207c935853c36a15ca1f94dff17760aa6072d1b1357c7254e8d79d4f3cc82d75cc27d2e7518303582502ea2d9bed67a0ed3c52400d19dad93824cd7884981

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2564634.exe

            Filesize

            751KB

            MD5

            f0e79b0ff5a7cb4025bd427c2c554d46

            SHA1

            17beeb4210a5bcbe20aa1d321bd2a774aebfec3c

            SHA256

            cf16c03a3719ba9dd78b3b3d06cc67de0b19a9d99b1eb7d12b1f0b48654c0ea8

            SHA512

            439e0a638983bbad06449f45a9acfc4435101e820e7db7543fbcff05833ee988d8e115e920e85e1c004f57ceb9f0a2f42a8fba1204dab386edfe7cd023cda626

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2564634.exe

            Filesize

            751KB

            MD5

            f0e79b0ff5a7cb4025bd427c2c554d46

            SHA1

            17beeb4210a5bcbe20aa1d321bd2a774aebfec3c

            SHA256

            cf16c03a3719ba9dd78b3b3d06cc67de0b19a9d99b1eb7d12b1f0b48654c0ea8

            SHA512

            439e0a638983bbad06449f45a9acfc4435101e820e7db7543fbcff05833ee988d8e115e920e85e1c004f57ceb9f0a2f42a8fba1204dab386edfe7cd023cda626

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1050543.exe

            Filesize

            963KB

            MD5

            0ad9e468b591779189982efecf77ef55

            SHA1

            f642cadf6527bbf12552686686ab7828ebe342a3

            SHA256

            bb6deb39ef037ed993474c375b632c77965b6280fd0407d31776a733eaa25324

            SHA512

            35935175e74813d50665bcffaf67ed9d8372f97984ed45adf6b38cd5e159ad1fee86ce9204effe8f3418c54b98238055cc256db83e80994a401305f84d6853d8

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1050543.exe

            Filesize

            963KB

            MD5

            0ad9e468b591779189982efecf77ef55

            SHA1

            f642cadf6527bbf12552686686ab7828ebe342a3

            SHA256

            bb6deb39ef037ed993474c375b632c77965b6280fd0407d31776a733eaa25324

            SHA512

            35935175e74813d50665bcffaf67ed9d8372f97984ed45adf6b38cd5e159ad1fee86ce9204effe8f3418c54b98238055cc256db83e80994a401305f84d6853d8

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h1050543.exe

            Filesize

            963KB

            MD5

            0ad9e468b591779189982efecf77ef55

            SHA1

            f642cadf6527bbf12552686686ab7828ebe342a3

            SHA256

            bb6deb39ef037ed993474c375b632c77965b6280fd0407d31776a733eaa25324

            SHA512

            35935175e74813d50665bcffaf67ed9d8372f97984ed45adf6b38cd5e159ad1fee86ce9204effe8f3418c54b98238055cc256db83e80994a401305f84d6853d8

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6512359.exe

            Filesize

            305KB

            MD5

            0641efcb6e8b64c02552be31698e53e6

            SHA1

            66f4a43b3857054d455d3f00092ec72269d9ccfd

            SHA256

            28d6db4b22533243c3474e2533aecc1d597ff358f2561e450c5022e847cb804c

            SHA512

            ab8617cc2ec64464464bad5a3075740e21ff75c60901982b47f2e129653237ce6c1d24badd5deff91f1ff62b55b54a1f1d0f05d9d4dd213f2fe25dd04c377467

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6512359.exe

            Filesize

            305KB

            MD5

            0641efcb6e8b64c02552be31698e53e6

            SHA1

            66f4a43b3857054d455d3f00092ec72269d9ccfd

            SHA256

            28d6db4b22533243c3474e2533aecc1d597ff358f2561e450c5022e847cb804c

            SHA512

            ab8617cc2ec64464464bad5a3075740e21ff75c60901982b47f2e129653237ce6c1d24badd5deff91f1ff62b55b54a1f1d0f05d9d4dd213f2fe25dd04c377467

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8386952.exe

            Filesize

            145KB

            MD5

            f66c27ec70940f51ba57a0e77a8b6da5

            SHA1

            f598700a52b302f76aed034468694864a99623d8

            SHA256

            f1e2e9d08daa274cd59c061d76e6ba18ad1b7d0e0a4b68bf209d298f02ab775f

            SHA512

            a4c7996f5a1e836fe18e73754c14133b5a2c7b0ce43cc48f998fdcd91b1de573a263c570564ef22dad8fcecf6dcbf70c351698d3b5d06577497ffe87c154cbee

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f8386952.exe

            Filesize

            145KB

            MD5

            f66c27ec70940f51ba57a0e77a8b6da5

            SHA1

            f598700a52b302f76aed034468694864a99623d8

            SHA256

            f1e2e9d08daa274cd59c061d76e6ba18ad1b7d0e0a4b68bf209d298f02ab775f

            SHA512

            a4c7996f5a1e836fe18e73754c14133b5a2c7b0ce43cc48f998fdcd91b1de573a263c570564ef22dad8fcecf6dcbf70c351698d3b5d06577497ffe87c154cbee

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0145556.exe

            Filesize

            184KB

            MD5

            911162c1f24a8a852962b9c7e73f0219

            SHA1

            3d39b2c2e3dc4e24fdab0aaa0053f6f7a331bf50

            SHA256

            2160c0921af137bae90ef640b4774adeae3da77379d8d1a63dcabe17129190f1

            SHA512

            121d8b6c1f8d16e2ae5cc024d51893a712e2ce3d0b575d6ff2dcf7651d1d7155544a940a378e29a40460f16d0d703ad91d7a7eeeaa6b29b1b9819586bb9717a6

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g0145556.exe

            Filesize

            184KB

            MD5

            911162c1f24a8a852962b9c7e73f0219

            SHA1

            3d39b2c2e3dc4e24fdab0aaa0053f6f7a331bf50

            SHA256

            2160c0921af137bae90ef640b4774adeae3da77379d8d1a63dcabe17129190f1

            SHA512

            121d8b6c1f8d16e2ae5cc024d51893a712e2ce3d0b575d6ff2dcf7651d1d7155544a940a378e29a40460f16d0d703ad91d7a7eeeaa6b29b1b9819586bb9717a6

          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

            Filesize

            963KB

            MD5

            0ad9e468b591779189982efecf77ef55

            SHA1

            f642cadf6527bbf12552686686ab7828ebe342a3

            SHA256

            bb6deb39ef037ed993474c375b632c77965b6280fd0407d31776a733eaa25324

            SHA512

            35935175e74813d50665bcffaf67ed9d8372f97984ed45adf6b38cd5e159ad1fee86ce9204effe8f3418c54b98238055cc256db83e80994a401305f84d6853d8

          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

            Filesize

            963KB

            MD5

            0ad9e468b591779189982efecf77ef55

            SHA1

            f642cadf6527bbf12552686686ab7828ebe342a3

            SHA256

            bb6deb39ef037ed993474c375b632c77965b6280fd0407d31776a733eaa25324

            SHA512

            35935175e74813d50665bcffaf67ed9d8372f97984ed45adf6b38cd5e159ad1fee86ce9204effe8f3418c54b98238055cc256db83e80994a401305f84d6853d8

          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

            Filesize

            963KB

            MD5

            0ad9e468b591779189982efecf77ef55

            SHA1

            f642cadf6527bbf12552686686ab7828ebe342a3

            SHA256

            bb6deb39ef037ed993474c375b632c77965b6280fd0407d31776a733eaa25324

            SHA512

            35935175e74813d50665bcffaf67ed9d8372f97984ed45adf6b38cd5e159ad1fee86ce9204effe8f3418c54b98238055cc256db83e80994a401305f84d6853d8

          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

            Filesize

            963KB

            MD5

            0ad9e468b591779189982efecf77ef55

            SHA1

            f642cadf6527bbf12552686686ab7828ebe342a3

            SHA256

            bb6deb39ef037ed993474c375b632c77965b6280fd0407d31776a733eaa25324

            SHA512

            35935175e74813d50665bcffaf67ed9d8372f97984ed45adf6b38cd5e159ad1fee86ce9204effe8f3418c54b98238055cc256db83e80994a401305f84d6853d8

          • memory/1696-207-0x0000000000FD0000-0x00000000010C8000-memory.dmp

            Filesize

            992KB

          • memory/1696-208-0x0000000007DF0000-0x0000000007E00000-memory.dmp

            Filesize

            64KB

          • memory/3056-177-0x0000000004F20000-0x0000000004F36000-memory.dmp

            Filesize

            88KB

          • memory/3056-202-0x0000000004950000-0x0000000004960000-memory.dmp

            Filesize

            64KB

          • memory/3056-201-0x0000000004950000-0x0000000004960000-memory.dmp

            Filesize

            64KB

          • memory/3056-172-0x0000000004F20000-0x0000000004F36000-memory.dmp

            Filesize

            88KB

          • memory/3056-173-0x0000000004F20000-0x0000000004F36000-memory.dmp

            Filesize

            88KB

          • memory/3056-175-0x0000000004F20000-0x0000000004F36000-memory.dmp

            Filesize

            88KB

          • memory/3056-200-0x0000000004950000-0x0000000004960000-memory.dmp

            Filesize

            64KB

          • memory/3056-179-0x0000000004F20000-0x0000000004F36000-memory.dmp

            Filesize

            88KB

          • memory/3056-181-0x0000000004F20000-0x0000000004F36000-memory.dmp

            Filesize

            88KB

          • memory/3056-183-0x0000000004F20000-0x0000000004F36000-memory.dmp

            Filesize

            88KB

          • memory/3056-185-0x0000000004F20000-0x0000000004F36000-memory.dmp

            Filesize

            88KB

          • memory/3056-187-0x0000000004F20000-0x0000000004F36000-memory.dmp

            Filesize

            88KB

          • memory/3056-189-0x0000000004F20000-0x0000000004F36000-memory.dmp

            Filesize

            88KB

          • memory/3056-191-0x0000000004F20000-0x0000000004F36000-memory.dmp

            Filesize

            88KB

          • memory/3056-193-0x0000000004F20000-0x0000000004F36000-memory.dmp

            Filesize

            88KB

          • memory/3056-195-0x0000000004F20000-0x0000000004F36000-memory.dmp

            Filesize

            88KB

          • memory/3056-197-0x0000000004F20000-0x0000000004F36000-memory.dmp

            Filesize

            88KB

          • memory/3056-199-0x0000000004F20000-0x0000000004F36000-memory.dmp

            Filesize

            88KB

          • memory/3248-247-0x0000000002370000-0x0000000002380000-memory.dmp

            Filesize

            64KB

          • memory/3248-251-0x0000000004F50000-0x0000000004F8C000-memory.dmp

            Filesize

            240KB

          • memory/3248-1151-0x0000000002370000-0x0000000002380000-memory.dmp

            Filesize

            64KB

          • memory/3248-1150-0x0000000002370000-0x0000000002380000-memory.dmp

            Filesize

            64KB

          • memory/3248-1149-0x0000000002370000-0x0000000002380000-memory.dmp

            Filesize

            64KB

          • memory/3248-1145-0x0000000002370000-0x0000000002380000-memory.dmp

            Filesize

            64KB

          • memory/3248-253-0x0000000004F50000-0x0000000004F8C000-memory.dmp

            Filesize

            240KB

          • memory/3248-243-0x0000000004F50000-0x0000000004F8C000-memory.dmp

            Filesize

            240KB

          • memory/3248-249-0x0000000002370000-0x0000000002380000-memory.dmp

            Filesize

            64KB

          • memory/3248-248-0x0000000004F50000-0x0000000004F8C000-memory.dmp

            Filesize

            240KB

          • memory/3248-245-0x0000000002370000-0x0000000002380000-memory.dmp

            Filesize

            64KB

          • memory/3248-241-0x0000000004F50000-0x0000000004F8C000-memory.dmp

            Filesize

            240KB

          • memory/3248-239-0x0000000004F50000-0x0000000004F8C000-memory.dmp

            Filesize

            240KB

          • memory/3248-218-0x0000000004F50000-0x0000000004F8C000-memory.dmp

            Filesize

            240KB

          • memory/3248-219-0x0000000004F50000-0x0000000004F8C000-memory.dmp

            Filesize

            240KB

          • memory/3248-221-0x0000000004F50000-0x0000000004F8C000-memory.dmp

            Filesize

            240KB

          • memory/3248-223-0x0000000004F50000-0x0000000004F8C000-memory.dmp

            Filesize

            240KB

          • memory/3248-225-0x0000000004F50000-0x0000000004F8C000-memory.dmp

            Filesize

            240KB

          • memory/3248-227-0x0000000004F50000-0x0000000004F8C000-memory.dmp

            Filesize

            240KB

          • memory/3248-229-0x0000000004F50000-0x0000000004F8C000-memory.dmp

            Filesize

            240KB

          • memory/3248-231-0x0000000004F50000-0x0000000004F8C000-memory.dmp

            Filesize

            240KB

          • memory/3248-233-0x0000000004F50000-0x0000000004F8C000-memory.dmp

            Filesize

            240KB

          • memory/3248-235-0x0000000004F50000-0x0000000004F8C000-memory.dmp

            Filesize

            240KB

          • memory/3248-237-0x0000000004F50000-0x0000000004F8C000-memory.dmp

            Filesize

            240KB

          • memory/4280-421-0x0000000002820000-0x0000000002830000-memory.dmp

            Filesize

            64KB

          • memory/4364-167-0x00000000073C0000-0x00000000078EC000-memory.dmp

            Filesize

            5.2MB

          • memory/4364-164-0x0000000006A20000-0x0000000006A96000-memory.dmp

            Filesize

            472KB

          • memory/4364-160-0x0000000005770000-0x0000000005802000-memory.dmp

            Filesize

            584KB

          • memory/4364-165-0x0000000006AA0000-0x0000000006AF0000-memory.dmp

            Filesize

            320KB

          • memory/4364-158-0x0000000005360000-0x000000000539C000-memory.dmp

            Filesize

            240KB

          • memory/4364-156-0x00000000053A0000-0x00000000054AA000-memory.dmp

            Filesize

            1.0MB

          • memory/4364-159-0x0000000005310000-0x0000000005320000-memory.dmp

            Filesize

            64KB

          • memory/4364-157-0x00000000052D0000-0x00000000052E2000-memory.dmp

            Filesize

            72KB

          • memory/4364-162-0x0000000005E40000-0x0000000005EA6000-memory.dmp

            Filesize

            408KB

          • memory/4364-166-0x0000000006CC0000-0x0000000006E82000-memory.dmp

            Filesize

            1.8MB

          • memory/4364-161-0x00000000063F0000-0x0000000006994000-memory.dmp

            Filesize

            5.6MB

          • memory/4364-154-0x0000000000900000-0x000000000092A000-memory.dmp

            Filesize

            168KB

          • memory/4364-163-0x0000000005310000-0x0000000005320000-memory.dmp

            Filesize

            64KB

          • memory/4364-155-0x0000000005820000-0x0000000005E38000-memory.dmp

            Filesize

            6.1MB

          • memory/4796-304-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/4796-244-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/4796-209-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/4796-212-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/4796-213-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB