Analysis

  • max time kernel
    135s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/05/2023, 14:12

General

  • Target

    820aa2d8278af28e5533ea9842ce2a78419a864878a0fc48e2c9eaf9b43b6cdf.exe

  • Size

    1.0MB

  • MD5

    74cf4e669132502821d674b556bdd033

  • SHA1

    4973bdb9335fd4f63f9caca3beb595c280e7f96d

  • SHA256

    820aa2d8278af28e5533ea9842ce2a78419a864878a0fc48e2c9eaf9b43b6cdf

  • SHA512

    9a7be627f6c5861d050cca42b9fdb1e2b51fd3b597db1395e3d7fa912171128cbf6fda2a372e12e77a1478bb0ee05a5132f76d2e088147b98a11a3bb5ba8afa5

  • SSDEEP

    24576:Zy1HF9uoiF13jMBhKhX7cYxzopap9uHIAg0meQp:M1HFHiX8kNQYxzXP0

Malware Config

Extracted

Family

redline

Botnet

deren

C2

77.91.68.253:19065

Attributes
  • auth_value

    04a169f1fb198bfbeca74d0e06ea2d54

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 17 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\820aa2d8278af28e5533ea9842ce2a78419a864878a0fc48e2c9eaf9b43b6cdf.exe
    "C:\Users\Admin\AppData\Local\Temp\820aa2d8278af28e5533ea9842ce2a78419a864878a0fc48e2c9eaf9b43b6cdf.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2636
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8296304.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8296304.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1764
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8682022.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8682022.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4792
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9725421.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9725421.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3648
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g5591028.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g5591028.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1752
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7256684.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7256684.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4236
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7256684.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7256684.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:3556
          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2872
            • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
              C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of UnmapMainImage
              PID:4552
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4552 -s 12
                7⤵
                • Program crash
                PID:1644
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5585079.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5585079.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2448
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4552 -ip 4552
    1⤵
      PID:4532

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5585079.exe

            Filesize

            284KB

            MD5

            8d2dfa8cdb6a288df95d2392eae97fe5

            SHA1

            180081526287bf3ac35acc0dc259066c124d528e

            SHA256

            03b4fac3dc43eebc0268a4774beca326e3cb686c252fedd58ae1d7e7cbed27e8

            SHA512

            d26a75aec4b7c40f16adba5c0888a84d60c1eb446893893e5bdd814dccbf420499be3967952c742d0c9cb5e67b3dea41af223d7dcc329257e267675af8a51b89

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i5585079.exe

            Filesize

            284KB

            MD5

            8d2dfa8cdb6a288df95d2392eae97fe5

            SHA1

            180081526287bf3ac35acc0dc259066c124d528e

            SHA256

            03b4fac3dc43eebc0268a4774beca326e3cb686c252fedd58ae1d7e7cbed27e8

            SHA512

            d26a75aec4b7c40f16adba5c0888a84d60c1eb446893893e5bdd814dccbf420499be3967952c742d0c9cb5e67b3dea41af223d7dcc329257e267675af8a51b89

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8296304.exe

            Filesize

            751KB

            MD5

            3b72ee51a0c63d46f987e7ec4ae56577

            SHA1

            4bba20a0e6c8061d6955600e7fa10f02032156cc

            SHA256

            18fb2442b2f932df1a60bed1a50ff5c42ada00afcbc4b7e547ae5dc75a3bd85d

            SHA512

            dfdf999db95829e9d17443150f32d09c16e0933c354cd391f94cc99353235e642a8055bcde4988b80c455a434abc69524fcbde15ac1a01302f08132e0dd2a8bd

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8296304.exe

            Filesize

            751KB

            MD5

            3b72ee51a0c63d46f987e7ec4ae56577

            SHA1

            4bba20a0e6c8061d6955600e7fa10f02032156cc

            SHA256

            18fb2442b2f932df1a60bed1a50ff5c42ada00afcbc4b7e547ae5dc75a3bd85d

            SHA512

            dfdf999db95829e9d17443150f32d09c16e0933c354cd391f94cc99353235e642a8055bcde4988b80c455a434abc69524fcbde15ac1a01302f08132e0dd2a8bd

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7256684.exe

            Filesize

            964KB

            MD5

            e0bbcbe21524789531031d537a9cf7c0

            SHA1

            6017785deb0b9813da0ff6ac1bf6e91f25c0c5bd

            SHA256

            530065155ce299fa209efdf4488bf93ce8adba347e3dbfe6cab739ec04b89f98

            SHA512

            2550b3d2295a1b1bd2df2fbb3b94c55adb1da1edf77d8dfac27959d1f148929aba9e4c785876e714e798c9b197dad7207e51a9aa07eb90df8816e5398c858ffc

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7256684.exe

            Filesize

            964KB

            MD5

            e0bbcbe21524789531031d537a9cf7c0

            SHA1

            6017785deb0b9813da0ff6ac1bf6e91f25c0c5bd

            SHA256

            530065155ce299fa209efdf4488bf93ce8adba347e3dbfe6cab739ec04b89f98

            SHA512

            2550b3d2295a1b1bd2df2fbb3b94c55adb1da1edf77d8dfac27959d1f148929aba9e4c785876e714e798c9b197dad7207e51a9aa07eb90df8816e5398c858ffc

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h7256684.exe

            Filesize

            964KB

            MD5

            e0bbcbe21524789531031d537a9cf7c0

            SHA1

            6017785deb0b9813da0ff6ac1bf6e91f25c0c5bd

            SHA256

            530065155ce299fa209efdf4488bf93ce8adba347e3dbfe6cab739ec04b89f98

            SHA512

            2550b3d2295a1b1bd2df2fbb3b94c55adb1da1edf77d8dfac27959d1f148929aba9e4c785876e714e798c9b197dad7207e51a9aa07eb90df8816e5398c858ffc

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8682022.exe

            Filesize

            306KB

            MD5

            9e3c5d74195d131f79472b4bf53abf47

            SHA1

            70eb46f53843fafdb3ac5758ccafea62fdf57c09

            SHA256

            ac8579711313e617c177fd6381b0a28a6f2ac1f60ec6a09d8ed46b0ced9639db

            SHA512

            f706f301577ca93b4903799672693cdb2ae070381855614f80172fee098dbf959d9a259ea46d79dd546823bccc480e882a88d3ea0479b3e5bbd5d22cdb1b9d46

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x8682022.exe

            Filesize

            306KB

            MD5

            9e3c5d74195d131f79472b4bf53abf47

            SHA1

            70eb46f53843fafdb3ac5758ccafea62fdf57c09

            SHA256

            ac8579711313e617c177fd6381b0a28a6f2ac1f60ec6a09d8ed46b0ced9639db

            SHA512

            f706f301577ca93b4903799672693cdb2ae070381855614f80172fee098dbf959d9a259ea46d79dd546823bccc480e882a88d3ea0479b3e5bbd5d22cdb1b9d46

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9725421.exe

            Filesize

            145KB

            MD5

            fdb30a3ddac699b9f4917005c53d492f

            SHA1

            976a11bfc9eaaecd61e92563ccb33918194c0fa9

            SHA256

            9e5d0e245ffacb32d72441f718837695b31201bb73f6752691bbb6380c0f5982

            SHA512

            0c76f7afa1dabb4113fab23a256d6e6c04506634eaba4b42cba65311e46cf395fe4d00c637e566e25e15266f236bc02a4386125be82f396fb1765aa1cb86b2ac

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f9725421.exe

            Filesize

            145KB

            MD5

            fdb30a3ddac699b9f4917005c53d492f

            SHA1

            976a11bfc9eaaecd61e92563ccb33918194c0fa9

            SHA256

            9e5d0e245ffacb32d72441f718837695b31201bb73f6752691bbb6380c0f5982

            SHA512

            0c76f7afa1dabb4113fab23a256d6e6c04506634eaba4b42cba65311e46cf395fe4d00c637e566e25e15266f236bc02a4386125be82f396fb1765aa1cb86b2ac

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g5591028.exe

            Filesize

            184KB

            MD5

            e2ee14f443cdeaa57d8f193bea40934c

            SHA1

            787a5279d1b7e803cf743572baeae9d9452c9972

            SHA256

            4e0f95c95ba85a95fc5939ae70ba6a5582c8d4cdf04858fe8fd62db5096bf98b

            SHA512

            fa0b3a00783fa4220e7dd74ee4cfd7a2f1af1771f85996544ac4ab1f2ce1724d34ca78e64c827a7e28dfc2d7308c37058ac0eba2348b93fa3d143092199b9428

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g5591028.exe

            Filesize

            184KB

            MD5

            e2ee14f443cdeaa57d8f193bea40934c

            SHA1

            787a5279d1b7e803cf743572baeae9d9452c9972

            SHA256

            4e0f95c95ba85a95fc5939ae70ba6a5582c8d4cdf04858fe8fd62db5096bf98b

            SHA512

            fa0b3a00783fa4220e7dd74ee4cfd7a2f1af1771f85996544ac4ab1f2ce1724d34ca78e64c827a7e28dfc2d7308c37058ac0eba2348b93fa3d143092199b9428

          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

            Filesize

            964KB

            MD5

            e0bbcbe21524789531031d537a9cf7c0

            SHA1

            6017785deb0b9813da0ff6ac1bf6e91f25c0c5bd

            SHA256

            530065155ce299fa209efdf4488bf93ce8adba347e3dbfe6cab739ec04b89f98

            SHA512

            2550b3d2295a1b1bd2df2fbb3b94c55adb1da1edf77d8dfac27959d1f148929aba9e4c785876e714e798c9b197dad7207e51a9aa07eb90df8816e5398c858ffc

          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

            Filesize

            964KB

            MD5

            e0bbcbe21524789531031d537a9cf7c0

            SHA1

            6017785deb0b9813da0ff6ac1bf6e91f25c0c5bd

            SHA256

            530065155ce299fa209efdf4488bf93ce8adba347e3dbfe6cab739ec04b89f98

            SHA512

            2550b3d2295a1b1bd2df2fbb3b94c55adb1da1edf77d8dfac27959d1f148929aba9e4c785876e714e798c9b197dad7207e51a9aa07eb90df8816e5398c858ffc

          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

            Filesize

            964KB

            MD5

            e0bbcbe21524789531031d537a9cf7c0

            SHA1

            6017785deb0b9813da0ff6ac1bf6e91f25c0c5bd

            SHA256

            530065155ce299fa209efdf4488bf93ce8adba347e3dbfe6cab739ec04b89f98

            SHA512

            2550b3d2295a1b1bd2df2fbb3b94c55adb1da1edf77d8dfac27959d1f148929aba9e4c785876e714e798c9b197dad7207e51a9aa07eb90df8816e5398c858ffc

          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

            Filesize

            964KB

            MD5

            e0bbcbe21524789531031d537a9cf7c0

            SHA1

            6017785deb0b9813da0ff6ac1bf6e91f25c0c5bd

            SHA256

            530065155ce299fa209efdf4488bf93ce8adba347e3dbfe6cab739ec04b89f98

            SHA512

            2550b3d2295a1b1bd2df2fbb3b94c55adb1da1edf77d8dfac27959d1f148929aba9e4c785876e714e798c9b197dad7207e51a9aa07eb90df8816e5398c858ffc

          • memory/1752-202-0x0000000000870000-0x0000000000880000-memory.dmp

            Filesize

            64KB

          • memory/1752-179-0x0000000004F20000-0x0000000004F36000-memory.dmp

            Filesize

            88KB

          • memory/1752-199-0x0000000004F20000-0x0000000004F36000-memory.dmp

            Filesize

            88KB

          • memory/1752-201-0x0000000000870000-0x0000000000880000-memory.dmp

            Filesize

            64KB

          • memory/1752-197-0x0000000004F20000-0x0000000004F36000-memory.dmp

            Filesize

            88KB

          • memory/1752-173-0x0000000004F20000-0x0000000004F36000-memory.dmp

            Filesize

            88KB

          • memory/1752-172-0x0000000004F20000-0x0000000004F36000-memory.dmp

            Filesize

            88KB

          • memory/1752-175-0x0000000004F20000-0x0000000004F36000-memory.dmp

            Filesize

            88KB

          • memory/1752-177-0x0000000004F20000-0x0000000004F36000-memory.dmp

            Filesize

            88KB

          • memory/1752-200-0x0000000000870000-0x0000000000880000-memory.dmp

            Filesize

            64KB

          • memory/1752-181-0x0000000004F20000-0x0000000004F36000-memory.dmp

            Filesize

            88KB

          • memory/1752-183-0x0000000004F20000-0x0000000004F36000-memory.dmp

            Filesize

            88KB

          • memory/1752-187-0x0000000004F20000-0x0000000004F36000-memory.dmp

            Filesize

            88KB

          • memory/1752-185-0x0000000004F20000-0x0000000004F36000-memory.dmp

            Filesize

            88KB

          • memory/1752-189-0x0000000004F20000-0x0000000004F36000-memory.dmp

            Filesize

            88KB

          • memory/1752-191-0x0000000004F20000-0x0000000004F36000-memory.dmp

            Filesize

            88KB

          • memory/1752-193-0x0000000004F20000-0x0000000004F36000-memory.dmp

            Filesize

            88KB

          • memory/1752-195-0x0000000004F20000-0x0000000004F36000-memory.dmp

            Filesize

            88KB

          • memory/2448-227-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/2448-245-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/2448-1149-0x0000000004AE0000-0x0000000004AF0000-memory.dmp

            Filesize

            64KB

          • memory/2448-1148-0x0000000004AE0000-0x0000000004AF0000-memory.dmp

            Filesize

            64KB

          • memory/2448-253-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/2448-251-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/2448-249-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/2448-247-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/2448-243-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/2448-241-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/2448-239-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/2448-237-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/2448-235-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/2448-233-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/2448-231-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/2448-229-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/2448-220-0x0000000004AE0000-0x0000000004AF0000-memory.dmp

            Filesize

            64KB

          • memory/2448-221-0x0000000004AE0000-0x0000000004AF0000-memory.dmp

            Filesize

            64KB

          • memory/2448-219-0x0000000004AE0000-0x0000000004AF0000-memory.dmp

            Filesize

            64KB

          • memory/2448-222-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/2448-223-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/2448-225-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/2872-301-0x0000000007560000-0x0000000007570000-memory.dmp

            Filesize

            64KB

          • memory/3556-209-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/3556-218-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/3556-215-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/3556-297-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/3556-212-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/3648-156-0x0000000005160000-0x000000000526A000-memory.dmp

            Filesize

            1.0MB

          • memory/3648-155-0x00000000055E0000-0x0000000005BF8000-memory.dmp

            Filesize

            6.1MB

          • memory/3648-166-0x0000000006450000-0x00000000064C6000-memory.dmp

            Filesize

            472KB

          • memory/3648-167-0x00000000064D0000-0x0000000006520000-memory.dmp

            Filesize

            320KB

          • memory/3648-165-0x0000000007230000-0x000000000775C000-memory.dmp

            Filesize

            5.2MB

          • memory/3648-162-0x0000000006100000-0x0000000006192000-memory.dmp

            Filesize

            584KB

          • memory/3648-163-0x0000000006750000-0x0000000006CF4000-memory.dmp

            Filesize

            5.6MB

          • memory/3648-164-0x0000000006550000-0x0000000006712000-memory.dmp

            Filesize

            1.8MB

          • memory/3648-157-0x0000000005090000-0x00000000050A2000-memory.dmp

            Filesize

            72KB

          • memory/3648-158-0x0000000005150000-0x0000000005160000-memory.dmp

            Filesize

            64KB

          • memory/3648-161-0x0000000005EF0000-0x0000000005F56000-memory.dmp

            Filesize

            408KB

          • memory/3648-160-0x0000000005150000-0x0000000005160000-memory.dmp

            Filesize

            64KB

          • memory/3648-159-0x00000000050F0000-0x000000000512C000-memory.dmp

            Filesize

            240KB

          • memory/3648-154-0x0000000000800000-0x000000000082A000-memory.dmp

            Filesize

            168KB

          • memory/4236-207-0x0000000000740000-0x0000000000838000-memory.dmp

            Filesize

            992KB

          • memory/4236-208-0x0000000007540000-0x0000000007550000-memory.dmp

            Filesize

            64KB