Analysis

  • max time kernel
    78s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/05/2023, 18:17

General

  • Target

    cf9a4bef46815a52331b22793d008972bacf2592ba2ca1ca10d16240c72487b8.exe

  • Size

    1.0MB

  • MD5

    b209a3dc47bb50eca411c17ec5d46262

  • SHA1

    6e8e5107bd1725bed97f2347b8e63c6540ae739c

  • SHA256

    cf9a4bef46815a52331b22793d008972bacf2592ba2ca1ca10d16240c72487b8

  • SHA512

    a92048cf4c62532264a61b7080d75ec900cdebd9c0a242eb17b365f6b0ba2a5f512d6467e32d44bd927fe249a13cbe0bd0c0aeab22ec13c5add5cfa39f8a5e43

  • SSDEEP

    24576:xyXkWWEnvPuq9TOm5vxVqsskTrZqBvDqaT1B2E:kXLn3uq9pvCsr9aT6

Malware Config

Extracted

Family

redline

Botnet

mixa

C2

185.161.248.37:4138

Attributes
  • auth_value

    9d14534b25ac495ab25b59800acf3bb2

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 18 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf9a4bef46815a52331b22793d008972bacf2592ba2ca1ca10d16240c72487b8.exe
    "C:\Users\Admin\AppData\Local\Temp\cf9a4bef46815a52331b22793d008972bacf2592ba2ca1ca10d16240c72487b8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0805761.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0805761.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4060
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3096365.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3096365.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1384
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0341962.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0341962.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3220
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9102073.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9102073.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4688
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6378178.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6378178.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4196
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6378178.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6378178.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:3876
          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3228
            • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
              C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of UnmapMainImage
              PID:756
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 756 -s 12
                7⤵
                • Program crash
                PID:1972
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3365813.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3365813.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:696
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 756 -ip 756
    1⤵
      PID:2404

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3365813.exe

      Filesize

      285KB

      MD5

      b2d6493cea5d9d10727f2fcb22c67764

      SHA1

      0e99146b4abd4b8702110790842f4aa9145786bd

      SHA256

      f3742a7a3309d9dc7ebe7e5d57bd84fdf69f7b935e50268120fcf08687e988de

      SHA512

      1e60fb6df320c852eb9ca2c1114dbdd1762fb70c559b772e82fe45df0114a4ef7ba3fe081af49a45ec2838dd64c1dd314f4ab90923ed23cd48f482c1d6f2b414

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d3365813.exe

      Filesize

      285KB

      MD5

      b2d6493cea5d9d10727f2fcb22c67764

      SHA1

      0e99146b4abd4b8702110790842f4aa9145786bd

      SHA256

      f3742a7a3309d9dc7ebe7e5d57bd84fdf69f7b935e50268120fcf08687e988de

      SHA512

      1e60fb6df320c852eb9ca2c1114dbdd1762fb70c559b772e82fe45df0114a4ef7ba3fe081af49a45ec2838dd64c1dd314f4ab90923ed23cd48f482c1d6f2b414

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0805761.exe

      Filesize

      751KB

      MD5

      e64d4dea147302ce77a4eb01fec279a2

      SHA1

      a08e938a7ebc6256f98176b8c662ded30fe31841

      SHA256

      4abbb4fd1ae5666a2da88a17700f3a66d4197e051ce033ea31c6ec769a15e1bb

      SHA512

      0175b75ed848a7ccac7eca3d4abada032cb8a3a72294489d6ec90999b6e526d87371a54775e5b7c9c8ee856961da3993d44d0b1e5a3fdc54f4c4cce17bce11f6

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0805761.exe

      Filesize

      751KB

      MD5

      e64d4dea147302ce77a4eb01fec279a2

      SHA1

      a08e938a7ebc6256f98176b8c662ded30fe31841

      SHA256

      4abbb4fd1ae5666a2da88a17700f3a66d4197e051ce033ea31c6ec769a15e1bb

      SHA512

      0175b75ed848a7ccac7eca3d4abada032cb8a3a72294489d6ec90999b6e526d87371a54775e5b7c9c8ee856961da3993d44d0b1e5a3fdc54f4c4cce17bce11f6

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6378178.exe

      Filesize

      965KB

      MD5

      ec75c45379ba01d32eca0675d030f9b6

      SHA1

      b5370ede7834975f181ebc86699289427b869150

      SHA256

      b6a86ca4fb6db830bc35ed6af2adc781852076b166a4a25ce046568634d6637f

      SHA512

      27ff5f99c95950336ef8e22ae9c5647a87baa9976559f323d0d1b915ad160a31427af89dc16a31dd37a1f820b7d2540b19e51bea5dabacc2deebf50e319b303c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6378178.exe

      Filesize

      965KB

      MD5

      ec75c45379ba01d32eca0675d030f9b6

      SHA1

      b5370ede7834975f181ebc86699289427b869150

      SHA256

      b6a86ca4fb6db830bc35ed6af2adc781852076b166a4a25ce046568634d6637f

      SHA512

      27ff5f99c95950336ef8e22ae9c5647a87baa9976559f323d0d1b915ad160a31427af89dc16a31dd37a1f820b7d2540b19e51bea5dabacc2deebf50e319b303c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6378178.exe

      Filesize

      965KB

      MD5

      ec75c45379ba01d32eca0675d030f9b6

      SHA1

      b5370ede7834975f181ebc86699289427b869150

      SHA256

      b6a86ca4fb6db830bc35ed6af2adc781852076b166a4a25ce046568634d6637f

      SHA512

      27ff5f99c95950336ef8e22ae9c5647a87baa9976559f323d0d1b915ad160a31427af89dc16a31dd37a1f820b7d2540b19e51bea5dabacc2deebf50e319b303c

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3096365.exe

      Filesize

      306KB

      MD5

      ee83bc3647f2f0754d96807582e61b84

      SHA1

      e3ed63f3fe82783bc05a8cd63e4bd4df56ab0f06

      SHA256

      f46e9cbabc2e569622dd27853906edde1a0b5e1352e9fb2457ae88318ebf00e2

      SHA512

      9ffbf5f3590bd1fe315d0e3f95f1d5e82e9f0cafdafcc1cb2267a363f94d1085a4191daf5a396f27de532e4763734f8cfddb32dc10f25b9b987f87814ab4c4bc

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v3096365.exe

      Filesize

      306KB

      MD5

      ee83bc3647f2f0754d96807582e61b84

      SHA1

      e3ed63f3fe82783bc05a8cd63e4bd4df56ab0f06

      SHA256

      f46e9cbabc2e569622dd27853906edde1a0b5e1352e9fb2457ae88318ebf00e2

      SHA512

      9ffbf5f3590bd1fe315d0e3f95f1d5e82e9f0cafdafcc1cb2267a363f94d1085a4191daf5a396f27de532e4763734f8cfddb32dc10f25b9b987f87814ab4c4bc

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0341962.exe

      Filesize

      185KB

      MD5

      a99a4c2ccec1cd1fdb7a8fbc1c079e3f

      SHA1

      1fcbf07d3136784525db8c279787c52690da74a0

      SHA256

      934f2f12545ebdbb6fca5bb549000f057f97b03211321b56217b9e2d32e67035

      SHA512

      37e72f7bc12fbb3a22076cc51e81a3f95e3767081b4cfc25b86e95be3fc805d3de078772c61ccbb7b3266f551c3036a544060c5698976fb5d346f1502b8ecfa8

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a0341962.exe

      Filesize

      185KB

      MD5

      a99a4c2ccec1cd1fdb7a8fbc1c079e3f

      SHA1

      1fcbf07d3136784525db8c279787c52690da74a0

      SHA256

      934f2f12545ebdbb6fca5bb549000f057f97b03211321b56217b9e2d32e67035

      SHA512

      37e72f7bc12fbb3a22076cc51e81a3f95e3767081b4cfc25b86e95be3fc805d3de078772c61ccbb7b3266f551c3036a544060c5698976fb5d346f1502b8ecfa8

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9102073.exe

      Filesize

      145KB

      MD5

      519c5092c8e96e6a53b79fd832e49cf0

      SHA1

      a0eb92d60ebda7140e88b16377d637fffd5497b0

      SHA256

      dd0056fcff7f7effc05b48c3f5d8026ba5031c4dbc54d77b5fe7c3867c36b077

      SHA512

      1e93775ee50f1ca7f746626cbde467ca6e7e6a33fb36ba0ebf5749db3913d1267019a303bebc21dd3eb5f8cd61095ac35bfeb3d8de36b903e9d7d4d894328842

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b9102073.exe

      Filesize

      145KB

      MD5

      519c5092c8e96e6a53b79fd832e49cf0

      SHA1

      a0eb92d60ebda7140e88b16377d637fffd5497b0

      SHA256

      dd0056fcff7f7effc05b48c3f5d8026ba5031c4dbc54d77b5fe7c3867c36b077

      SHA512

      1e93775ee50f1ca7f746626cbde467ca6e7e6a33fb36ba0ebf5749db3913d1267019a303bebc21dd3eb5f8cd61095ac35bfeb3d8de36b903e9d7d4d894328842

    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

      Filesize

      965KB

      MD5

      ec75c45379ba01d32eca0675d030f9b6

      SHA1

      b5370ede7834975f181ebc86699289427b869150

      SHA256

      b6a86ca4fb6db830bc35ed6af2adc781852076b166a4a25ce046568634d6637f

      SHA512

      27ff5f99c95950336ef8e22ae9c5647a87baa9976559f323d0d1b915ad160a31427af89dc16a31dd37a1f820b7d2540b19e51bea5dabacc2deebf50e319b303c

    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

      Filesize

      965KB

      MD5

      ec75c45379ba01d32eca0675d030f9b6

      SHA1

      b5370ede7834975f181ebc86699289427b869150

      SHA256

      b6a86ca4fb6db830bc35ed6af2adc781852076b166a4a25ce046568634d6637f

      SHA512

      27ff5f99c95950336ef8e22ae9c5647a87baa9976559f323d0d1b915ad160a31427af89dc16a31dd37a1f820b7d2540b19e51bea5dabacc2deebf50e319b303c

    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

      Filesize

      965KB

      MD5

      ec75c45379ba01d32eca0675d030f9b6

      SHA1

      b5370ede7834975f181ebc86699289427b869150

      SHA256

      b6a86ca4fb6db830bc35ed6af2adc781852076b166a4a25ce046568634d6637f

      SHA512

      27ff5f99c95950336ef8e22ae9c5647a87baa9976559f323d0d1b915ad160a31427af89dc16a31dd37a1f820b7d2540b19e51bea5dabacc2deebf50e319b303c

    • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

      Filesize

      965KB

      MD5

      ec75c45379ba01d32eca0675d030f9b6

      SHA1

      b5370ede7834975f181ebc86699289427b869150

      SHA256

      b6a86ca4fb6db830bc35ed6af2adc781852076b166a4a25ce046568634d6637f

      SHA512

      27ff5f99c95950336ef8e22ae9c5647a87baa9976559f323d0d1b915ad160a31427af89dc16a31dd37a1f820b7d2540b19e51bea5dabacc2deebf50e319b303c

    • memory/696-233-0x0000000002440000-0x000000000247C000-memory.dmp

      Filesize

      240KB

    • memory/696-253-0x0000000002440000-0x000000000247C000-memory.dmp

      Filesize

      240KB

    • memory/696-245-0x0000000002440000-0x000000000247C000-memory.dmp

      Filesize

      240KB

    • memory/696-251-0x0000000002440000-0x000000000247C000-memory.dmp

      Filesize

      240KB

    • memory/696-243-0x0000000002440000-0x000000000247C000-memory.dmp

      Filesize

      240KB

    • memory/696-241-0x0000000002440000-0x000000000247C000-memory.dmp

      Filesize

      240KB

    • memory/696-239-0x0000000002440000-0x000000000247C000-memory.dmp

      Filesize

      240KB

    • memory/696-237-0x0000000002440000-0x000000000247C000-memory.dmp

      Filesize

      240KB

    • memory/696-235-0x0000000002440000-0x000000000247C000-memory.dmp

      Filesize

      240KB

    • memory/696-255-0x0000000002440000-0x000000000247C000-memory.dmp

      Filesize

      240KB

    • memory/696-231-0x00000000024A0000-0x00000000024B0000-memory.dmp

      Filesize

      64KB

    • memory/696-247-0x0000000002440000-0x000000000247C000-memory.dmp

      Filesize

      240KB

    • memory/696-249-0x0000000002440000-0x000000000247C000-memory.dmp

      Filesize

      240KB

    • memory/696-230-0x0000000002440000-0x000000000247C000-memory.dmp

      Filesize

      240KB

    • memory/696-228-0x00000000024A0000-0x00000000024B0000-memory.dmp

      Filesize

      64KB

    • memory/696-227-0x0000000002440000-0x000000000247C000-memory.dmp

      Filesize

      240KB

    • memory/696-224-0x0000000002440000-0x000000000247C000-memory.dmp

      Filesize

      240KB

    • memory/696-222-0x0000000002440000-0x000000000247C000-memory.dmp

      Filesize

      240KB

    • memory/696-221-0x0000000002440000-0x000000000247C000-memory.dmp

      Filesize

      240KB

    • memory/696-1150-0x00000000024A0000-0x00000000024B0000-memory.dmp

      Filesize

      64KB

    • memory/696-1151-0x00000000024A0000-0x00000000024B0000-memory.dmp

      Filesize

      64KB

    • memory/696-1152-0x00000000024A0000-0x00000000024B0000-memory.dmp

      Filesize

      64KB

    • memory/696-1153-0x00000000024A0000-0x00000000024B0000-memory.dmp

      Filesize

      64KB

    • memory/3220-177-0x0000000002510000-0x0000000002526000-memory.dmp

      Filesize

      88KB

    • memory/3220-167-0x0000000002510000-0x0000000002526000-memory.dmp

      Filesize

      88KB

    • memory/3220-154-0x0000000004AF0000-0x0000000004B00000-memory.dmp

      Filesize

      64KB

    • memory/3220-155-0x0000000004AF0000-0x0000000004B00000-memory.dmp

      Filesize

      64KB

    • memory/3220-156-0x0000000004AF0000-0x0000000004B00000-memory.dmp

      Filesize

      64KB

    • memory/3220-157-0x0000000004B00000-0x00000000050A4000-memory.dmp

      Filesize

      5.6MB

    • memory/3220-158-0x0000000002510000-0x0000000002526000-memory.dmp

      Filesize

      88KB

    • memory/3220-159-0x0000000002510000-0x0000000002526000-memory.dmp

      Filesize

      88KB

    • memory/3220-161-0x0000000002510000-0x0000000002526000-memory.dmp

      Filesize

      88KB

    • memory/3220-163-0x0000000002510000-0x0000000002526000-memory.dmp

      Filesize

      88KB

    • memory/3220-165-0x0000000002510000-0x0000000002526000-memory.dmp

      Filesize

      88KB

    • memory/3220-169-0x0000000002510000-0x0000000002526000-memory.dmp

      Filesize

      88KB

    • memory/3220-171-0x0000000002510000-0x0000000002526000-memory.dmp

      Filesize

      88KB

    • memory/3220-173-0x0000000002510000-0x0000000002526000-memory.dmp

      Filesize

      88KB

    • memory/3220-175-0x0000000002510000-0x0000000002526000-memory.dmp

      Filesize

      88KB

    • memory/3220-179-0x0000000002510000-0x0000000002526000-memory.dmp

      Filesize

      88KB

    • memory/3220-181-0x0000000002510000-0x0000000002526000-memory.dmp

      Filesize

      88KB

    • memory/3220-183-0x0000000002510000-0x0000000002526000-memory.dmp

      Filesize

      88KB

    • memory/3220-185-0x0000000002510000-0x0000000002526000-memory.dmp

      Filesize

      88KB

    • memory/3220-186-0x0000000004AF0000-0x0000000004B00000-memory.dmp

      Filesize

      64KB

    • memory/3220-188-0x0000000004AF0000-0x0000000004B00000-memory.dmp

      Filesize

      64KB

    • memory/3220-187-0x0000000004AF0000-0x0000000004B00000-memory.dmp

      Filesize

      64KB

    • memory/3228-399-0x0000000007590000-0x00000000075A0000-memory.dmp

      Filesize

      64KB

    • memory/3876-216-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/3876-296-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/3876-226-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/3876-212-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/3876-215-0x0000000000400000-0x0000000000438000-memory.dmp

      Filesize

      224KB

    • memory/4196-210-0x0000000000FD0000-0x00000000010C8000-memory.dmp

      Filesize

      992KB

    • memory/4196-211-0x0000000007DF0000-0x0000000007E00000-memory.dmp

      Filesize

      64KB

    • memory/4688-198-0x0000000005040000-0x0000000005050000-memory.dmp

      Filesize

      64KB

    • memory/4688-193-0x0000000000320000-0x000000000034A000-memory.dmp

      Filesize

      168KB

    • memory/4688-195-0x0000000004DC0000-0x0000000004ECA000-memory.dmp

      Filesize

      1.0MB

    • memory/4688-201-0x00000000065E0000-0x00000000067A2000-memory.dmp

      Filesize

      1.8MB

    • memory/4688-200-0x00000000058B0000-0x0000000005916000-memory.dmp

      Filesize

      408KB

    • memory/4688-199-0x00000000051F0000-0x0000000005282000-memory.dmp

      Filesize

      584KB

    • memory/4688-204-0x0000000006410000-0x0000000006460000-memory.dmp

      Filesize

      320KB

    • memory/4688-194-0x0000000005290000-0x00000000058A8000-memory.dmp

      Filesize

      6.1MB

    • memory/4688-197-0x0000000004D50000-0x0000000004D8C000-memory.dmp

      Filesize

      240KB

    • memory/4688-196-0x0000000004CF0000-0x0000000004D02000-memory.dmp

      Filesize

      72KB

    • memory/4688-202-0x0000000006CE0000-0x000000000720C000-memory.dmp

      Filesize

      5.2MB

    • memory/4688-203-0x0000000006490000-0x0000000006506000-memory.dmp

      Filesize

      472KB

    • memory/4688-205-0x0000000005040000-0x0000000005050000-memory.dmp

      Filesize

      64KB