Analysis

  • max time kernel
    55s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20230220-en
  • resource tags

    arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    21/05/2023, 21:26

General

  • Target

    e8b83497bf60b61e3578dd46955968151e03468a567e3925d96aa3520801688a.exe

  • Size

    1.0MB

  • MD5

    ae39030730ac71b2face02c1ab5c36ea

  • SHA1

    c4f272b57d397fff6451dd85d58b93b67a992b58

  • SHA256

    e8b83497bf60b61e3578dd46955968151e03468a567e3925d96aa3520801688a

  • SHA512

    919ab70a30a5d7d639b82cd6526ed80be006fa20c93155d4467db4eea91cd434906bcb2124b25ce08bbdec57869d67a0e8cf86df38a62fa90807d4bd2be2dd51

  • SSDEEP

    24576:ryL3L1zWTAFLhMKMdeJ65iwky6Wzq7yH/iubsYI5eTAAXK6a8T4:ebL1zsGDMdu65iwoL5eTAaK6aw

Malware Config

Extracted

Family

redline

Botnet

diza

C2

185.161.248.37:4138

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 5 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8b83497bf60b61e3578dd46955968151e03468a567e3925d96aa3520801688a.exe
    "C:\Users\Admin\AppData\Local\Temp\e8b83497bf60b61e3578dd46955968151e03468a567e3925d96aa3520801688a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6047227.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6047227.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2152
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5816587.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5816587.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2316
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4040735.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4040735.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2416
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9322292.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9322292.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2832
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9934716.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9934716.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1516
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9934716.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9934716.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:4464
          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3396
            • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
              C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
              6⤵
              • Executes dropped EXE
              PID:4268
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4268 -s 24
                7⤵
                • Program crash
                PID:1516
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8730784.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8730784.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3532

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8730784.exe

    Filesize

    285KB

    MD5

    cc2a926262d7d6805f5a112831c3fe7c

    SHA1

    c28a304b6ab9b7b970044e38b347c26c877fa161

    SHA256

    b672d43c80a09ba2fc03e53c22369ebad29e704f31a1d5ed0739184c3341bd0d

    SHA512

    1073a0c6b337d21bea4069d6cb0df35fb62a136b876811cbb3ded8ad70bef16a958793e2053edc45118ec4e0c9a34c24d6abeaf0e079b78681d28bc2590a40a9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i8730784.exe

    Filesize

    285KB

    MD5

    cc2a926262d7d6805f5a112831c3fe7c

    SHA1

    c28a304b6ab9b7b970044e38b347c26c877fa161

    SHA256

    b672d43c80a09ba2fc03e53c22369ebad29e704f31a1d5ed0739184c3341bd0d

    SHA512

    1073a0c6b337d21bea4069d6cb0df35fb62a136b876811cbb3ded8ad70bef16a958793e2053edc45118ec4e0c9a34c24d6abeaf0e079b78681d28bc2590a40a9

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6047227.exe

    Filesize

    751KB

    MD5

    579c957cda016f69e180fc0dfa4c957d

    SHA1

    8d4f2083517cb6242fdcd1d231aa8e5ce641a6ef

    SHA256

    d32eab924d9df735b267885497d9eb1a6b585144663c255f2e2c273284f871c4

    SHA512

    1acf7f1f0a7c130aa65efbfa2f5539ed9ad9ab39e3d2cb6ad22d65f26405a1e4d003f17527a28f0864e4377b9bd49aa6507f0287847d41bc6e317dbadd036f6b

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6047227.exe

    Filesize

    751KB

    MD5

    579c957cda016f69e180fc0dfa4c957d

    SHA1

    8d4f2083517cb6242fdcd1d231aa8e5ce641a6ef

    SHA256

    d32eab924d9df735b267885497d9eb1a6b585144663c255f2e2c273284f871c4

    SHA512

    1acf7f1f0a7c130aa65efbfa2f5539ed9ad9ab39e3d2cb6ad22d65f26405a1e4d003f17527a28f0864e4377b9bd49aa6507f0287847d41bc6e317dbadd036f6b

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9934716.exe

    Filesize

    965KB

    MD5

    e50af0e8bb8e0cd9946542bc305c4c52

    SHA1

    309340c41e2c61f591b481a97eb42053f586960b

    SHA256

    6f085046dde275b1bedfa4c95202a5cea6b83007ab677f2ae3f626c904eb0837

    SHA512

    f474d3a89ccfce680f73187118d5d5e6e6a3815dd14eeae7624f81c655369c04fe50914b07a17f3274a0d82f49ed65ef0489eda02c8f3aa86b0d5c7a53da9722

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9934716.exe

    Filesize

    965KB

    MD5

    e50af0e8bb8e0cd9946542bc305c4c52

    SHA1

    309340c41e2c61f591b481a97eb42053f586960b

    SHA256

    6f085046dde275b1bedfa4c95202a5cea6b83007ab677f2ae3f626c904eb0837

    SHA512

    f474d3a89ccfce680f73187118d5d5e6e6a3815dd14eeae7624f81c655369c04fe50914b07a17f3274a0d82f49ed65ef0489eda02c8f3aa86b0d5c7a53da9722

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9934716.exe

    Filesize

    965KB

    MD5

    e50af0e8bb8e0cd9946542bc305c4c52

    SHA1

    309340c41e2c61f591b481a97eb42053f586960b

    SHA256

    6f085046dde275b1bedfa4c95202a5cea6b83007ab677f2ae3f626c904eb0837

    SHA512

    f474d3a89ccfce680f73187118d5d5e6e6a3815dd14eeae7624f81c655369c04fe50914b07a17f3274a0d82f49ed65ef0489eda02c8f3aa86b0d5c7a53da9722

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5816587.exe

    Filesize

    305KB

    MD5

    1ae4426fa51fa58fe8c73d59b62db979

    SHA1

    f7959bf0e34bc32c711694dade7f776fa7607c05

    SHA256

    345be20d1db8a4965fb057dfe2c334360714aedb66343fc9f25a71efd8524a47

    SHA512

    70d12451fbd1d6757453d8b6f7789ea8c9919c1b8feb14d9568b5567c09f4780a0c036f24fb2bcdb778cb11d103288d19416de3d0d3d105a59172b693cbca8ff

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5816587.exe

    Filesize

    305KB

    MD5

    1ae4426fa51fa58fe8c73d59b62db979

    SHA1

    f7959bf0e34bc32c711694dade7f776fa7607c05

    SHA256

    345be20d1db8a4965fb057dfe2c334360714aedb66343fc9f25a71efd8524a47

    SHA512

    70d12451fbd1d6757453d8b6f7789ea8c9919c1b8feb14d9568b5567c09f4780a0c036f24fb2bcdb778cb11d103288d19416de3d0d3d105a59172b693cbca8ff

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4040735.exe

    Filesize

    145KB

    MD5

    8fd866bc528f4916b677def042934609

    SHA1

    b732a23303ac469cc0bf700d372bd77457b5ec62

    SHA256

    cefbc8a2e29e8c2ee0fafb5f18101d3f050df67a936115d4c93aa77f0fa893c5

    SHA512

    a831820fec75b399d91751725274849258a297a4e8a16ede83e8b927b170199835f73bb4cfc1d8d180ed6205168c2fb1b59cc82b5c90d6bcb24c2ba99c51c9fd

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f4040735.exe

    Filesize

    145KB

    MD5

    8fd866bc528f4916b677def042934609

    SHA1

    b732a23303ac469cc0bf700d372bd77457b5ec62

    SHA256

    cefbc8a2e29e8c2ee0fafb5f18101d3f050df67a936115d4c93aa77f0fa893c5

    SHA512

    a831820fec75b399d91751725274849258a297a4e8a16ede83e8b927b170199835f73bb4cfc1d8d180ed6205168c2fb1b59cc82b5c90d6bcb24c2ba99c51c9fd

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9322292.exe

    Filesize

    186KB

    MD5

    61ebe79fe3f47f5a363f36897a273ea7

    SHA1

    8ca9b77da0b682c726c9d04246e173c17a27877d

    SHA256

    9323ccbfce81a04f0a8d900a5daa31e6c48cd708df7904dffbcdb9139494516a

    SHA512

    ebb78d7a835ad33800534d17811d225d9922cdc6e42f055be654f8a006fcf6d5af379a72ef02f952b4e57c908ed2fbd007f835049b89217fdcb38f088f702c3b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g9322292.exe

    Filesize

    186KB

    MD5

    61ebe79fe3f47f5a363f36897a273ea7

    SHA1

    8ca9b77da0b682c726c9d04246e173c17a27877d

    SHA256

    9323ccbfce81a04f0a8d900a5daa31e6c48cd708df7904dffbcdb9139494516a

    SHA512

    ebb78d7a835ad33800534d17811d225d9922cdc6e42f055be654f8a006fcf6d5af379a72ef02f952b4e57c908ed2fbd007f835049b89217fdcb38f088f702c3b

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    965KB

    MD5

    e50af0e8bb8e0cd9946542bc305c4c52

    SHA1

    309340c41e2c61f591b481a97eb42053f586960b

    SHA256

    6f085046dde275b1bedfa4c95202a5cea6b83007ab677f2ae3f626c904eb0837

    SHA512

    f474d3a89ccfce680f73187118d5d5e6e6a3815dd14eeae7624f81c655369c04fe50914b07a17f3274a0d82f49ed65ef0489eda02c8f3aa86b0d5c7a53da9722

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    965KB

    MD5

    e50af0e8bb8e0cd9946542bc305c4c52

    SHA1

    309340c41e2c61f591b481a97eb42053f586960b

    SHA256

    6f085046dde275b1bedfa4c95202a5cea6b83007ab677f2ae3f626c904eb0837

    SHA512

    f474d3a89ccfce680f73187118d5d5e6e6a3815dd14eeae7624f81c655369c04fe50914b07a17f3274a0d82f49ed65ef0489eda02c8f3aa86b0d5c7a53da9722

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    965KB

    MD5

    e50af0e8bb8e0cd9946542bc305c4c52

    SHA1

    309340c41e2c61f591b481a97eb42053f586960b

    SHA256

    6f085046dde275b1bedfa4c95202a5cea6b83007ab677f2ae3f626c904eb0837

    SHA512

    f474d3a89ccfce680f73187118d5d5e6e6a3815dd14eeae7624f81c655369c04fe50914b07a17f3274a0d82f49ed65ef0489eda02c8f3aa86b0d5c7a53da9722

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    965KB

    MD5

    e50af0e8bb8e0cd9946542bc305c4c52

    SHA1

    309340c41e2c61f591b481a97eb42053f586960b

    SHA256

    6f085046dde275b1bedfa4c95202a5cea6b83007ab677f2ae3f626c904eb0837

    SHA512

    f474d3a89ccfce680f73187118d5d5e6e6a3815dd14eeae7624f81c655369c04fe50914b07a17f3274a0d82f49ed65ef0489eda02c8f3aa86b0d5c7a53da9722

  • memory/1516-198-0x00000000008E0000-0x00000000009D8000-memory.dmp

    Filesize

    992KB

  • memory/1516-199-0x00000000076D0000-0x00000000076E0000-memory.dmp

    Filesize

    64KB

  • memory/2416-144-0x00000000055C0000-0x00000000056CA000-memory.dmp

    Filesize

    1.0MB

  • memory/2416-156-0x0000000005890000-0x00000000058A0000-memory.dmp

    Filesize

    64KB

  • memory/2416-155-0x0000000007600000-0x0000000007B2C000-memory.dmp

    Filesize

    5.2MB

  • memory/2416-154-0x0000000006F00000-0x00000000070C2000-memory.dmp

    Filesize

    1.8MB

  • memory/2416-153-0x0000000006580000-0x00000000065D0000-memory.dmp

    Filesize

    320KB

  • memory/2416-152-0x0000000006500000-0x0000000006576000-memory.dmp

    Filesize

    472KB

  • memory/2416-151-0x0000000006A00000-0x0000000006EFE000-memory.dmp

    Filesize

    5.0MB

  • memory/2416-150-0x0000000006460000-0x00000000064F2000-memory.dmp

    Filesize

    584KB

  • memory/2416-149-0x00000000058A0000-0x0000000005906000-memory.dmp

    Filesize

    408KB

  • memory/2416-148-0x00000000056D0000-0x000000000571B000-memory.dmp

    Filesize

    300KB

  • memory/2416-147-0x0000000005550000-0x000000000558E000-memory.dmp

    Filesize

    248KB

  • memory/2416-146-0x0000000005890000-0x00000000058A0000-memory.dmp

    Filesize

    64KB

  • memory/2416-145-0x00000000054F0000-0x0000000005502000-memory.dmp

    Filesize

    72KB

  • memory/2416-143-0x0000000005AB0000-0x00000000060B6000-memory.dmp

    Filesize

    6.0MB

  • memory/2416-142-0x0000000000CA0000-0x0000000000CCA000-memory.dmp

    Filesize

    168KB

  • memory/2832-192-0x0000000004C10000-0x0000000004C20000-memory.dmp

    Filesize

    64KB

  • memory/2832-174-0x00000000023C0000-0x00000000023D6000-memory.dmp

    Filesize

    88KB

  • memory/2832-184-0x00000000023C0000-0x00000000023D6000-memory.dmp

    Filesize

    88KB

  • memory/2832-186-0x00000000023C0000-0x00000000023D6000-memory.dmp

    Filesize

    88KB

  • memory/2832-188-0x00000000023C0000-0x00000000023D6000-memory.dmp

    Filesize

    88KB

  • memory/2832-190-0x00000000023C0000-0x00000000023D6000-memory.dmp

    Filesize

    88KB

  • memory/2832-191-0x0000000004C10000-0x0000000004C20000-memory.dmp

    Filesize

    64KB

  • memory/2832-180-0x00000000023C0000-0x00000000023D6000-memory.dmp

    Filesize

    88KB

  • memory/2832-193-0x0000000004C10000-0x0000000004C20000-memory.dmp

    Filesize

    64KB

  • memory/2832-178-0x00000000023C0000-0x00000000023D6000-memory.dmp

    Filesize

    88KB

  • memory/2832-176-0x00000000023C0000-0x00000000023D6000-memory.dmp

    Filesize

    88KB

  • memory/2832-182-0x00000000023C0000-0x00000000023D6000-memory.dmp

    Filesize

    88KB

  • memory/2832-172-0x00000000023C0000-0x00000000023D6000-memory.dmp

    Filesize

    88KB

  • memory/2832-161-0x0000000002020000-0x000000000203E000-memory.dmp

    Filesize

    120KB

  • memory/2832-170-0x00000000023C0000-0x00000000023D6000-memory.dmp

    Filesize

    88KB

  • memory/2832-168-0x00000000023C0000-0x00000000023D6000-memory.dmp

    Filesize

    88KB

  • memory/2832-166-0x00000000023C0000-0x00000000023D6000-memory.dmp

    Filesize

    88KB

  • memory/2832-163-0x00000000023C0000-0x00000000023D6000-memory.dmp

    Filesize

    88KB

  • memory/2832-162-0x00000000023C0000-0x00000000023DC000-memory.dmp

    Filesize

    112KB

  • memory/2832-164-0x00000000023C0000-0x00000000023D6000-memory.dmp

    Filesize

    88KB

  • memory/3396-324-0x0000000006F90000-0x0000000006FA0000-memory.dmp

    Filesize

    64KB

  • memory/3532-239-0x00000000049D0000-0x0000000004A0C000-memory.dmp

    Filesize

    240KB

  • memory/3532-234-0x0000000004A30000-0x0000000004A40000-memory.dmp

    Filesize

    64KB

  • memory/3532-214-0x00000000049D0000-0x0000000004A0C000-memory.dmp

    Filesize

    240KB

  • memory/3532-216-0x00000000049D0000-0x0000000004A0C000-memory.dmp

    Filesize

    240KB

  • memory/3532-218-0x00000000049D0000-0x0000000004A0C000-memory.dmp

    Filesize

    240KB

  • memory/3532-220-0x00000000049D0000-0x0000000004A0C000-memory.dmp

    Filesize

    240KB

  • memory/3532-222-0x00000000049D0000-0x0000000004A0C000-memory.dmp

    Filesize

    240KB

  • memory/3532-224-0x00000000049D0000-0x0000000004A0C000-memory.dmp

    Filesize

    240KB

  • memory/3532-226-0x00000000049D0000-0x0000000004A0C000-memory.dmp

    Filesize

    240KB

  • memory/3532-228-0x00000000049D0000-0x0000000004A0C000-memory.dmp

    Filesize

    240KB

  • memory/3532-230-0x00000000049D0000-0x0000000004A0C000-memory.dmp

    Filesize

    240KB

  • memory/3532-233-0x00000000049D0000-0x0000000004A0C000-memory.dmp

    Filesize

    240KB

  • memory/3532-232-0x0000000004A30000-0x0000000004A40000-memory.dmp

    Filesize

    64KB

  • memory/3532-1137-0x0000000004A30000-0x0000000004A40000-memory.dmp

    Filesize

    64KB

  • memory/3532-237-0x00000000049D0000-0x0000000004A0C000-memory.dmp

    Filesize

    240KB

  • memory/3532-212-0x00000000049D0000-0x0000000004A0C000-memory.dmp

    Filesize

    240KB

  • memory/3532-211-0x00000000049D0000-0x0000000004A0C000-memory.dmp

    Filesize

    240KB

  • memory/3532-241-0x00000000049D0000-0x0000000004A0C000-memory.dmp

    Filesize

    240KB

  • memory/3532-243-0x00000000049D0000-0x0000000004A0C000-memory.dmp

    Filesize

    240KB

  • memory/3532-245-0x00000000049D0000-0x0000000004A0C000-memory.dmp

    Filesize

    240KB

  • memory/3532-210-0x00000000049D0000-0x0000000004A10000-memory.dmp

    Filesize

    256KB

  • memory/3532-1135-0x0000000004A30000-0x0000000004A40000-memory.dmp

    Filesize

    64KB

  • memory/3532-1134-0x0000000005910000-0x000000000595B000-memory.dmp

    Filesize

    300KB

  • memory/3532-208-0x00000000020F0000-0x0000000002134000-memory.dmp

    Filesize

    272KB

  • memory/4464-206-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/4464-200-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/4464-294-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/4464-207-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/4464-236-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB