Analysis

  • max time kernel
    99s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/05/2023, 17:07

General

  • Target

    Doge.exe

  • Size

    1021KB

  • MD5

    4b25f6c336e1353dce07ea8465f6a402

  • SHA1

    230ea22e604fc69d7f9f20292f9e777f86bb14af

  • SHA256

    e131109319e95f8eddbcaa79aa53a15c27fad55b15da835a2adb1a308f6cd7fa

  • SHA512

    7281d482cb22625a69778cec163108bd9e9e09f6a1b378307ed888894bde7588f16e4d67657964842c01ff94d55626ce9458b3909f956b69c278f8c01b2c7f9d

  • SSDEEP

    24576:TyXyvsbCfngyKgxxBPelDQtIS2l3F+J4yjbg:mXh1yKgxfE6Qc3b

Malware Config

Extracted

Family

redline

Botnet

muser

C2

77.91.68.253:19065

Attributes
  • auth_value

    ab307a8e027ba1296455e3d548f168a3

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Doge.exe
    "C:\Users\Admin\AppData\Local\Temp\Doge.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1696867.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1696867.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4184
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9301202.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9301202.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:956
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2078416.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2078416.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4064
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0910048.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0910048.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2648
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3555080.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3555080.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1432
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3555080.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3555080.exe
          4⤵
          • Executes dropped EXE
          PID:4948
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3555080.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3555080.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of UnmapMainImage
          PID:1392
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1392 -s 12
            5⤵
            • Program crash
            PID:3304
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9658398.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9658398.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4400
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1392 -ip 1392
    1⤵
      PID:3876

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9658398.exe

            Filesize

            284KB

            MD5

            0ea570ef230d8224dcb9cdac66e5c1a5

            SHA1

            8fe50ba24d27d2c3cbcd768353462b07c9183cf2

            SHA256

            e589ed215beb39bc9b622293424b5a88f1c235622bb81c6a2af2da19f95cb57d

            SHA512

            6039accca2818fa8370ccac7f7cdc5eed9b11ac6b48b92b6892222b90702fbd048797af4af8d7dbe8c2424ae1e7171df979ccbf76281b1af5dd107c823dc1792

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d9658398.exe

            Filesize

            284KB

            MD5

            0ea570ef230d8224dcb9cdac66e5c1a5

            SHA1

            8fe50ba24d27d2c3cbcd768353462b07c9183cf2

            SHA256

            e589ed215beb39bc9b622293424b5a88f1c235622bb81c6a2af2da19f95cb57d

            SHA512

            6039accca2818fa8370ccac7f7cdc5eed9b11ac6b48b92b6892222b90702fbd048797af4af8d7dbe8c2424ae1e7171df979ccbf76281b1af5dd107c823dc1792

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1696867.exe

            Filesize

            750KB

            MD5

            ce0d63b7ac4eb9df6ba1e10a502a32e7

            SHA1

            4c11d268822e5c2e87bf815031e269dc15a7ee94

            SHA256

            0c83333cdaf127b879185aed10f7527ba90df5c5687a1308e12fa6647ba9e55c

            SHA512

            925bcc1d8a0f60072b27fdaa1d704b7b3f86efd904529f4fa1b64b34ae97c4261e0271b1fc98dd0adb39c46368e7a156e32a03cad97fe023507cc84d14407cce

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v1696867.exe

            Filesize

            750KB

            MD5

            ce0d63b7ac4eb9df6ba1e10a502a32e7

            SHA1

            4c11d268822e5c2e87bf815031e269dc15a7ee94

            SHA256

            0c83333cdaf127b879185aed10f7527ba90df5c5687a1308e12fa6647ba9e55c

            SHA512

            925bcc1d8a0f60072b27fdaa1d704b7b3f86efd904529f4fa1b64b34ae97c4261e0271b1fc98dd0adb39c46368e7a156e32a03cad97fe023507cc84d14407cce

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3555080.exe

            Filesize

            963KB

            MD5

            6070f7622b14bd539c406c7c2c857585

            SHA1

            05419a8c069be56de6a024e23684f1a8d774817e

            SHA256

            87f98748599947ef2d2604ac6f3376bc40575a5e0860032ac04943e0d3d61aa6

            SHA512

            f521864595d5ee84dc51bbe3b60fe9a13a326afa660e55ac9d10c1f845c196fe11769b07c9573f24631cf83408526bef011112bc46b5ae16ef1cf99f66938a79

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3555080.exe

            Filesize

            963KB

            MD5

            6070f7622b14bd539c406c7c2c857585

            SHA1

            05419a8c069be56de6a024e23684f1a8d774817e

            SHA256

            87f98748599947ef2d2604ac6f3376bc40575a5e0860032ac04943e0d3d61aa6

            SHA512

            f521864595d5ee84dc51bbe3b60fe9a13a326afa660e55ac9d10c1f845c196fe11769b07c9573f24631cf83408526bef011112bc46b5ae16ef1cf99f66938a79

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3555080.exe

            Filesize

            963KB

            MD5

            6070f7622b14bd539c406c7c2c857585

            SHA1

            05419a8c069be56de6a024e23684f1a8d774817e

            SHA256

            87f98748599947ef2d2604ac6f3376bc40575a5e0860032ac04943e0d3d61aa6

            SHA512

            f521864595d5ee84dc51bbe3b60fe9a13a326afa660e55ac9d10c1f845c196fe11769b07c9573f24631cf83408526bef011112bc46b5ae16ef1cf99f66938a79

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c3555080.exe

            Filesize

            963KB

            MD5

            6070f7622b14bd539c406c7c2c857585

            SHA1

            05419a8c069be56de6a024e23684f1a8d774817e

            SHA256

            87f98748599947ef2d2604ac6f3376bc40575a5e0860032ac04943e0d3d61aa6

            SHA512

            f521864595d5ee84dc51bbe3b60fe9a13a326afa660e55ac9d10c1f845c196fe11769b07c9573f24631cf83408526bef011112bc46b5ae16ef1cf99f66938a79

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9301202.exe

            Filesize

            305KB

            MD5

            4ddff7683e53421c87dbe7d10f4c40e1

            SHA1

            b485df28ef743b632d0180d7036c9cad96c82058

            SHA256

            21d484526132a5f8c8dad0b708638a24f23df1cddf8a81723dc9ee3ffc3c8c64

            SHA512

            2824f4dd03584f310461dbcc841a554955b6e0200efa21e6f811b186a6f66adc64ea36907dc556d92fb7a05bde724ea598770dcb0fedaf146f1ebc64d5de451b

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v9301202.exe

            Filesize

            305KB

            MD5

            4ddff7683e53421c87dbe7d10f4c40e1

            SHA1

            b485df28ef743b632d0180d7036c9cad96c82058

            SHA256

            21d484526132a5f8c8dad0b708638a24f23df1cddf8a81723dc9ee3ffc3c8c64

            SHA512

            2824f4dd03584f310461dbcc841a554955b6e0200efa21e6f811b186a6f66adc64ea36907dc556d92fb7a05bde724ea598770dcb0fedaf146f1ebc64d5de451b

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2078416.exe

            Filesize

            184KB

            MD5

            302ec0f7a8a01b671d059e24ce2ebfd2

            SHA1

            5db50b739318a29cf7f9f9c9224598d1b96ca12b

            SHA256

            02d1cdce029afe7de462276ba6a0ec3b5e578c6e1fc4131c79a0faea5182ce33

            SHA512

            088ae5aefacf2688a61baef373d109aa962e703636dcdaa39a4a46c4bae5e2d2d19187503324d7613bf80a4b42cbadf73f4692359a6f883f70a2d8a5fa5dd525

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a2078416.exe

            Filesize

            184KB

            MD5

            302ec0f7a8a01b671d059e24ce2ebfd2

            SHA1

            5db50b739318a29cf7f9f9c9224598d1b96ca12b

            SHA256

            02d1cdce029afe7de462276ba6a0ec3b5e578c6e1fc4131c79a0faea5182ce33

            SHA512

            088ae5aefacf2688a61baef373d109aa962e703636dcdaa39a4a46c4bae5e2d2d19187503324d7613bf80a4b42cbadf73f4692359a6f883f70a2d8a5fa5dd525

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0910048.exe

            Filesize

            145KB

            MD5

            a6b04ae8b84b77febf44173e8652d167

            SHA1

            bd2feb72a2696f2d6fa03727c90357b56430fd2e

            SHA256

            e4f6ee48fe3eba0758d09bde4157ea9c3d33f8c3cd3ff177f3e087988ed5c5bb

            SHA512

            a326ecbac01f0ca87082598b0168b51d45185d5c8867febc17db4b050aefbc3e160297ff04647ea6bec30ddc477bdf370c082149e955daa33aa280b5e8bc9241

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b0910048.exe

            Filesize

            145KB

            MD5

            a6b04ae8b84b77febf44173e8652d167

            SHA1

            bd2feb72a2696f2d6fa03727c90357b56430fd2e

            SHA256

            e4f6ee48fe3eba0758d09bde4157ea9c3d33f8c3cd3ff177f3e087988ed5c5bb

            SHA512

            a326ecbac01f0ca87082598b0168b51d45185d5c8867febc17db4b050aefbc3e160297ff04647ea6bec30ddc477bdf370c082149e955daa33aa280b5e8bc9241

          • memory/1392-207-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/1432-205-0x0000000006E50000-0x0000000006E60000-memory.dmp

            Filesize

            64KB

          • memory/1432-204-0x0000000000010000-0x0000000000108000-memory.dmp

            Filesize

            992KB

          • memory/2648-194-0x0000000004E80000-0x0000000004F12000-memory.dmp

            Filesize

            584KB

          • memory/2648-197-0x0000000005B90000-0x0000000005BE0000-memory.dmp

            Filesize

            320KB

          • memory/2648-196-0x0000000005B10000-0x0000000005B86000-memory.dmp

            Filesize

            472KB

          • memory/2648-195-0x00000000056C0000-0x0000000005726000-memory.dmp

            Filesize

            408KB

          • memory/2648-198-0x0000000006480000-0x0000000006642000-memory.dmp

            Filesize

            1.8MB

          • memory/2648-193-0x0000000004BA0000-0x0000000004BB0000-memory.dmp

            Filesize

            64KB

          • memory/2648-199-0x0000000006B80000-0x00000000070AC000-memory.dmp

            Filesize

            5.2MB

          • memory/2648-192-0x0000000004B40000-0x0000000004B7C000-memory.dmp

            Filesize

            240KB

          • memory/2648-188-0x0000000000250000-0x000000000027A000-memory.dmp

            Filesize

            168KB

          • memory/2648-189-0x0000000005030000-0x0000000005648000-memory.dmp

            Filesize

            6.1MB

          • memory/2648-190-0x0000000004BB0000-0x0000000004CBA000-memory.dmp

            Filesize

            1.0MB

          • memory/2648-191-0x0000000004AE0000-0x0000000004AF2000-memory.dmp

            Filesize

            72KB

          • memory/4064-173-0x0000000004960000-0x0000000004976000-memory.dmp

            Filesize

            88KB

          • memory/4064-183-0x0000000004960000-0x0000000004976000-memory.dmp

            Filesize

            88KB

          • memory/4064-181-0x0000000004960000-0x0000000004976000-memory.dmp

            Filesize

            88KB

          • memory/4064-179-0x0000000004960000-0x0000000004976000-memory.dmp

            Filesize

            88KB

          • memory/4064-177-0x0000000004960000-0x0000000004976000-memory.dmp

            Filesize

            88KB

          • memory/4064-175-0x0000000004960000-0x0000000004976000-memory.dmp

            Filesize

            88KB

          • memory/4064-171-0x0000000004960000-0x0000000004976000-memory.dmp

            Filesize

            88KB

          • memory/4064-169-0x0000000004960000-0x0000000004976000-memory.dmp

            Filesize

            88KB

          • memory/4064-167-0x0000000004960000-0x0000000004976000-memory.dmp

            Filesize

            88KB

          • memory/4064-165-0x0000000004960000-0x0000000004976000-memory.dmp

            Filesize

            88KB

          • memory/4064-163-0x0000000004960000-0x0000000004976000-memory.dmp

            Filesize

            88KB

          • memory/4064-161-0x0000000004960000-0x0000000004976000-memory.dmp

            Filesize

            88KB

          • memory/4064-157-0x0000000004960000-0x0000000004976000-memory.dmp

            Filesize

            88KB

          • memory/4064-159-0x0000000004960000-0x0000000004976000-memory.dmp

            Filesize

            88KB

          • memory/4064-156-0x0000000004960000-0x0000000004976000-memory.dmp

            Filesize

            88KB

          • memory/4064-155-0x0000000004A10000-0x0000000004FB4000-memory.dmp

            Filesize

            5.6MB

          • memory/4064-154-0x0000000004A00000-0x0000000004A10000-memory.dmp

            Filesize

            64KB

          • memory/4400-220-0x00000000049A0000-0x00000000049DC000-memory.dmp

            Filesize

            240KB

          • memory/4400-234-0x00000000049A0000-0x00000000049DC000-memory.dmp

            Filesize

            240KB

          • memory/4400-216-0x00000000049A0000-0x00000000049DC000-memory.dmp

            Filesize

            240KB

          • memory/4400-218-0x00000000049A0000-0x00000000049DC000-memory.dmp

            Filesize

            240KB

          • memory/4400-213-0x00000000049A0000-0x00000000049DC000-memory.dmp

            Filesize

            240KB

          • memory/4400-222-0x00000000049A0000-0x00000000049DC000-memory.dmp

            Filesize

            240KB

          • memory/4400-224-0x00000000049A0000-0x00000000049DC000-memory.dmp

            Filesize

            240KB

          • memory/4400-226-0x00000000049A0000-0x00000000049DC000-memory.dmp

            Filesize

            240KB

          • memory/4400-228-0x00000000049A0000-0x00000000049DC000-memory.dmp

            Filesize

            240KB

          • memory/4400-230-0x00000000049A0000-0x00000000049DC000-memory.dmp

            Filesize

            240KB

          • memory/4400-232-0x00000000049A0000-0x00000000049DC000-memory.dmp

            Filesize

            240KB

          • memory/4400-214-0x00000000049A0000-0x00000000049DC000-memory.dmp

            Filesize

            240KB

          • memory/4400-236-0x00000000049A0000-0x00000000049DC000-memory.dmp

            Filesize

            240KB

          • memory/4400-238-0x00000000049A0000-0x00000000049DC000-memory.dmp

            Filesize

            240KB

          • memory/4400-240-0x00000000049A0000-0x00000000049DC000-memory.dmp

            Filesize

            240KB

          • memory/4400-242-0x00000000049A0000-0x00000000049DC000-memory.dmp

            Filesize

            240KB

          • memory/4400-244-0x00000000049A0000-0x00000000049DC000-memory.dmp

            Filesize

            240KB

          • memory/4400-246-0x00000000049A0000-0x00000000049DC000-memory.dmp

            Filesize

            240KB

          • memory/4400-290-0x0000000004B70000-0x0000000004B80000-memory.dmp

            Filesize

            64KB

          • memory/4400-291-0x0000000004B70000-0x0000000004B80000-memory.dmp

            Filesize

            64KB

          • memory/4400-1123-0x0000000004B70000-0x0000000004B80000-memory.dmp

            Filesize

            64KB

          • memory/4400-1125-0x0000000004B70000-0x0000000004B80000-memory.dmp

            Filesize

            64KB

          • memory/4400-1126-0x0000000004B70000-0x0000000004B80000-memory.dmp

            Filesize

            64KB

          • memory/4400-1127-0x0000000004B70000-0x0000000004B80000-memory.dmp

            Filesize

            64KB