Analysis

  • max time kernel
    135s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-05-2023 10:59

General

  • Target

    pdf-readers565.exe

  • Size

    1.0MB

  • MD5

    60bb31528c97d9c52b0db0fe05c55a4b

  • SHA1

    a832db2e136737db2b57c94d29739fa39df8114f

  • SHA256

    caa744c8e12d2e63bad721fc8703218fa753d6e9ebffc4445366f3d57197e4ef

  • SHA512

    43747b03b7426dd5365eff6e1b23b512ff3b15222ac85eb815aff25cf95c7ad293e5e2f38e22500ce3ec31e8ffee53286fa14849b59b5ad8c3a3ec592f64c670

  • SSDEEP

    24576:ryMo2fYVymxN1nqvynTrsewrjlPnsMhPMuWsjbW4RE/tw:ed3XRqvyT/wvRsMRWsjs/

Malware Config

Extracted

Family

redline

Botnet

mixa

C2

185.161.248.37:4138

Attributes
  • auth_value

    9d14534b25ac495ab25b59800acf3bb2

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Executes dropped EXE 8 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\pdf-readers565.exe
    "C:\Users\Admin\AppData\Local\Temp\pdf-readers565.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2636
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8641376.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8641376.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1136
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0196661.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0196661.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2692
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0954287.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0954287.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4348
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5507194.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5507194.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1984
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6381172.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6381172.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3876
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6381172.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6381172.exe
          4⤵
          • Executes dropped EXE
          PID:2176
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6381172.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6381172.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of UnmapMainImage
          PID:2284
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2284 -s 12
            5⤵
            • Program crash
            PID:3848
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2230385.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2230385.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1476
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 2284 -ip 2284
    1⤵
      PID:2124

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2230385.exe

      Filesize

      285KB

      MD5

      6cdd8da4a29cb566f5627e70ec54ed77

      SHA1

      f31685199678d95c1409d878c02d9ec567a7a225

      SHA256

      4e02ef164ca6c374d665d15963c1370632678945ec40d927f0515f0e08341e02

      SHA512

      67802cad6bddfc0911bb1fa8fdac24f537ed4a5970025af01cdf881e11988031de1109a1eb69d737c9614a7af3166b32a6f1cb14ebd5dba868f0796a625a8045

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d2230385.exe

      Filesize

      285KB

      MD5

      6cdd8da4a29cb566f5627e70ec54ed77

      SHA1

      f31685199678d95c1409d878c02d9ec567a7a225

      SHA256

      4e02ef164ca6c374d665d15963c1370632678945ec40d927f0515f0e08341e02

      SHA512

      67802cad6bddfc0911bb1fa8fdac24f537ed4a5970025af01cdf881e11988031de1109a1eb69d737c9614a7af3166b32a6f1cb14ebd5dba868f0796a625a8045

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8641376.exe

      Filesize

      751KB

      MD5

      cb09cb55e0913eed9d66a259087cd0f5

      SHA1

      4308f523eff6bf4f09e35c436edbac139d3a75a1

      SHA256

      fb56ab84ed92e17be0e73a0ddb380ebbd4cfb9f119ea7e4d324b92d554243bd5

      SHA512

      ef3be05890c9a1430ac4d2bd982cb6ead0eb84735dd66665aa338fe7c9157a01fa628d15dcef86776c338cea0714f9b2775438ffd65cb164f02f24ce4fcd5a33

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8641376.exe

      Filesize

      751KB

      MD5

      cb09cb55e0913eed9d66a259087cd0f5

      SHA1

      4308f523eff6bf4f09e35c436edbac139d3a75a1

      SHA256

      fb56ab84ed92e17be0e73a0ddb380ebbd4cfb9f119ea7e4d324b92d554243bd5

      SHA512

      ef3be05890c9a1430ac4d2bd982cb6ead0eb84735dd66665aa338fe7c9157a01fa628d15dcef86776c338cea0714f9b2775438ffd65cb164f02f24ce4fcd5a33

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6381172.exe

      Filesize

      965KB

      MD5

      7893a3ea3c445d5d0e20944ec4b44bba

      SHA1

      e60d9e47a9bda98039ad55672b8cb2111be4d469

      SHA256

      f0fd20c84bdc712e6360048fcb880804914ea52967d1b4bbf730451abcd6880f

      SHA512

      9e764428bf43f71efb5b2a828f5ab2ff1d808cf901b20adde5a3ee4b919fb24a2eedadf4597f5d2bfcbceef56f2f1e7a5b5c063a191f124eedef1ddb2036da28

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6381172.exe

      Filesize

      965KB

      MD5

      7893a3ea3c445d5d0e20944ec4b44bba

      SHA1

      e60d9e47a9bda98039ad55672b8cb2111be4d469

      SHA256

      f0fd20c84bdc712e6360048fcb880804914ea52967d1b4bbf730451abcd6880f

      SHA512

      9e764428bf43f71efb5b2a828f5ab2ff1d808cf901b20adde5a3ee4b919fb24a2eedadf4597f5d2bfcbceef56f2f1e7a5b5c063a191f124eedef1ddb2036da28

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6381172.exe

      Filesize

      965KB

      MD5

      7893a3ea3c445d5d0e20944ec4b44bba

      SHA1

      e60d9e47a9bda98039ad55672b8cb2111be4d469

      SHA256

      f0fd20c84bdc712e6360048fcb880804914ea52967d1b4bbf730451abcd6880f

      SHA512

      9e764428bf43f71efb5b2a828f5ab2ff1d808cf901b20adde5a3ee4b919fb24a2eedadf4597f5d2bfcbceef56f2f1e7a5b5c063a191f124eedef1ddb2036da28

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6381172.exe

      Filesize

      965KB

      MD5

      7893a3ea3c445d5d0e20944ec4b44bba

      SHA1

      e60d9e47a9bda98039ad55672b8cb2111be4d469

      SHA256

      f0fd20c84bdc712e6360048fcb880804914ea52967d1b4bbf730451abcd6880f

      SHA512

      9e764428bf43f71efb5b2a828f5ab2ff1d808cf901b20adde5a3ee4b919fb24a2eedadf4597f5d2bfcbceef56f2f1e7a5b5c063a191f124eedef1ddb2036da28

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0196661.exe

      Filesize

      306KB

      MD5

      887b05646c1e38bf5aa538027f566988

      SHA1

      4b83f120ebc863c2c551a0d0d22f4be8aa7e70bf

      SHA256

      c65bb171affbd824b2c1dbde8c10c385e27e243b466e8913603d06aa7bd26e19

      SHA512

      19cb8c3d5979ee37fd87e70c9d0af7b96f6b90dcfee45d9ab5fcb546e7ae0455724c3cddb4d29fff5283d0877df24585a7c2e5829aef764b3214ac39d28b4675

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0196661.exe

      Filesize

      306KB

      MD5

      887b05646c1e38bf5aa538027f566988

      SHA1

      4b83f120ebc863c2c551a0d0d22f4be8aa7e70bf

      SHA256

      c65bb171affbd824b2c1dbde8c10c385e27e243b466e8913603d06aa7bd26e19

      SHA512

      19cb8c3d5979ee37fd87e70c9d0af7b96f6b90dcfee45d9ab5fcb546e7ae0455724c3cddb4d29fff5283d0877df24585a7c2e5829aef764b3214ac39d28b4675

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0954287.exe

      Filesize

      185KB

      MD5

      10b31473f0e9d752c01bbb62dac18690

      SHA1

      2c70dfcf25f56dd366d3bdb77a8220a9b237743b

      SHA256

      6611273426b6e12ce8ef36ec0151d342fe7230a13a167bd7bb11ac842d392255

      SHA512

      562f3b76ea47a45cbaa02bdf3c7a280710263ef3aff3235d6b70b841c9de9bbbf216af955a31b0f4e25b8e81912da4094a5987b7212c0e3ff0381293781aaf78

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0954287.exe

      Filesize

      185KB

      MD5

      10b31473f0e9d752c01bbb62dac18690

      SHA1

      2c70dfcf25f56dd366d3bdb77a8220a9b237743b

      SHA256

      6611273426b6e12ce8ef36ec0151d342fe7230a13a167bd7bb11ac842d392255

      SHA512

      562f3b76ea47a45cbaa02bdf3c7a280710263ef3aff3235d6b70b841c9de9bbbf216af955a31b0f4e25b8e81912da4094a5987b7212c0e3ff0381293781aaf78

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5507194.exe

      Filesize

      145KB

      MD5

      6aa7aaadc0385eddab4e750e9a6f5796

      SHA1

      2bab8c2cf900d9d1d9ce07d83b0fec461c1f4a44

      SHA256

      4caa561174355ea7865e4126cb12d202786647509550c8715dde5d422cb6cf1e

      SHA512

      b8df3a97c3d7b026b3366f7a3b6421d7a6b85cc615ec3ee03bcaedd8f79948ab5342a2721dbd41a02626094d253aba4ea31e24d2d1a9306a7276142dc50451fc

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5507194.exe

      Filesize

      145KB

      MD5

      6aa7aaadc0385eddab4e750e9a6f5796

      SHA1

      2bab8c2cf900d9d1d9ce07d83b0fec461c1f4a44

      SHA256

      4caa561174355ea7865e4126cb12d202786647509550c8715dde5d422cb6cf1e

      SHA512

      b8df3a97c3d7b026b3366f7a3b6421d7a6b85cc615ec3ee03bcaedd8f79948ab5342a2721dbd41a02626094d253aba4ea31e24d2d1a9306a7276142dc50451fc

    • memory/1476-1129-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

      Filesize

      64KB

    • memory/1476-248-0x0000000002540000-0x000000000257C000-memory.dmp

      Filesize

      240KB

    • memory/1476-242-0x0000000002540000-0x000000000257C000-memory.dmp

      Filesize

      240KB

    • memory/1476-240-0x0000000002540000-0x000000000257C000-memory.dmp

      Filesize

      240KB

    • memory/1476-238-0x0000000002540000-0x000000000257C000-memory.dmp

      Filesize

      240KB

    • memory/1476-236-0x0000000002540000-0x000000000257C000-memory.dmp

      Filesize

      240KB

    • memory/1476-234-0x0000000002540000-0x000000000257C000-memory.dmp

      Filesize

      240KB

    • memory/1476-232-0x0000000002540000-0x000000000257C000-memory.dmp

      Filesize

      240KB

    • memory/1476-230-0x0000000002540000-0x000000000257C000-memory.dmp

      Filesize

      240KB

    • memory/1476-228-0x0000000002540000-0x000000000257C000-memory.dmp

      Filesize

      240KB

    • memory/1476-226-0x0000000002540000-0x000000000257C000-memory.dmp

      Filesize

      240KB

    • memory/1476-224-0x0000000002540000-0x000000000257C000-memory.dmp

      Filesize

      240KB

    • memory/1476-221-0x0000000002540000-0x000000000257C000-memory.dmp

      Filesize

      240KB

    • memory/1476-244-0x0000000002540000-0x000000000257C000-memory.dmp

      Filesize

      240KB

    • memory/1476-246-0x0000000002540000-0x000000000257C000-memory.dmp

      Filesize

      240KB

    • memory/1476-222-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

      Filesize

      64KB

    • memory/1476-219-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

      Filesize

      64KB

    • memory/1476-220-0x0000000002540000-0x000000000257C000-memory.dmp

      Filesize

      240KB

    • memory/1476-218-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

      Filesize

      64KB

    • memory/1476-250-0x0000000002540000-0x000000000257C000-memory.dmp

      Filesize

      240KB

    • memory/1476-252-0x0000000002540000-0x000000000257C000-memory.dmp

      Filesize

      240KB

    • memory/1476-254-0x0000000002540000-0x000000000257C000-memory.dmp

      Filesize

      240KB

    • memory/1476-1131-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

      Filesize

      64KB

    • memory/1476-1132-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

      Filesize

      64KB

    • memory/1476-1133-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

      Filesize

      64KB

    • memory/1984-201-0x0000000006330000-0x0000000006380000-memory.dmp

      Filesize

      320KB

    • memory/1984-199-0x0000000006240000-0x00000000062D2000-memory.dmp

      Filesize

      584KB

    • memory/1984-204-0x0000000005350000-0x0000000005360000-memory.dmp

      Filesize

      64KB

    • memory/1984-202-0x0000000006E40000-0x0000000007002000-memory.dmp

      Filesize

      1.8MB

    • memory/1984-200-0x00000000064D0000-0x0000000006546000-memory.dmp

      Filesize

      472KB

    • memory/1984-192-0x0000000000940000-0x000000000096A000-memory.dmp

      Filesize

      168KB

    • memory/1984-193-0x0000000005880000-0x0000000005E98000-memory.dmp

      Filesize

      6.1MB

    • memory/1984-203-0x0000000007540000-0x0000000007A6C000-memory.dmp

      Filesize

      5.2MB

    • memory/1984-194-0x00000000053E0000-0x00000000054EA000-memory.dmp

      Filesize

      1.0MB

    • memory/1984-198-0x0000000005680000-0x00000000056E6000-memory.dmp

      Filesize

      408KB

    • memory/1984-197-0x0000000005350000-0x0000000005360000-memory.dmp

      Filesize

      64KB

    • memory/1984-196-0x00000000053A0000-0x00000000053DC000-memory.dmp

      Filesize

      240KB

    • memory/1984-195-0x0000000005310000-0x0000000005322000-memory.dmp

      Filesize

      72KB

    • memory/2284-212-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/3876-210-0x0000000006E10000-0x0000000006E20000-memory.dmp

      Filesize

      64KB

    • memory/3876-209-0x00000000000A0000-0x0000000000198000-memory.dmp

      Filesize

      992KB

    • memory/4348-184-0x0000000004AB0000-0x0000000004AC6000-memory.dmp

      Filesize

      88KB

    • memory/4348-168-0x0000000004AB0000-0x0000000004AC6000-memory.dmp

      Filesize

      88KB

    • memory/4348-185-0x0000000004B20000-0x0000000004B30000-memory.dmp

      Filesize

      64KB

    • memory/4348-187-0x0000000004B20000-0x0000000004B30000-memory.dmp

      Filesize

      64KB

    • memory/4348-182-0x0000000004AB0000-0x0000000004AC6000-memory.dmp

      Filesize

      88KB

    • memory/4348-180-0x0000000004AB0000-0x0000000004AC6000-memory.dmp

      Filesize

      88KB

    • memory/4348-178-0x0000000004AB0000-0x0000000004AC6000-memory.dmp

      Filesize

      88KB

    • memory/4348-176-0x0000000004AB0000-0x0000000004AC6000-memory.dmp

      Filesize

      88KB

    • memory/4348-174-0x0000000004AB0000-0x0000000004AC6000-memory.dmp

      Filesize

      88KB

    • memory/4348-172-0x0000000004AB0000-0x0000000004AC6000-memory.dmp

      Filesize

      88KB

    • memory/4348-170-0x0000000004AB0000-0x0000000004AC6000-memory.dmp

      Filesize

      88KB

    • memory/4348-186-0x0000000004B20000-0x0000000004B30000-memory.dmp

      Filesize

      64KB

    • memory/4348-166-0x0000000004AB0000-0x0000000004AC6000-memory.dmp

      Filesize

      88KB

    • memory/4348-164-0x0000000004AB0000-0x0000000004AC6000-memory.dmp

      Filesize

      88KB

    • memory/4348-162-0x0000000004AB0000-0x0000000004AC6000-memory.dmp

      Filesize

      88KB

    • memory/4348-160-0x0000000004AB0000-0x0000000004AC6000-memory.dmp

      Filesize

      88KB

    • memory/4348-158-0x0000000004AB0000-0x0000000004AC6000-memory.dmp

      Filesize

      88KB

    • memory/4348-157-0x0000000004AB0000-0x0000000004AC6000-memory.dmp

      Filesize

      88KB

    • memory/4348-156-0x0000000004B20000-0x0000000004B30000-memory.dmp

      Filesize

      64KB

    • memory/4348-155-0x0000000004B20000-0x0000000004B30000-memory.dmp

      Filesize

      64KB

    • memory/4348-154-0x0000000004B30000-0x00000000050D4000-memory.dmp

      Filesize

      5.6MB