Analysis

  • max time kernel
    76s
  • max time network
    80s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/05/2023, 07:45

General

  • Target

    f3e26a3811eb0df491fd6d357373513f951e83e0be1ceac2cfa0476ce9e5f9bc.exe

  • Size

    1.0MB

  • MD5

    98e90b98b55e836018b3ad82381064e7

  • SHA1

    88fd0d8d014ab882121b27c60ebd8ac9bfe1887a

  • SHA256

    f3e26a3811eb0df491fd6d357373513f951e83e0be1ceac2cfa0476ce9e5f9bc

  • SHA512

    18a10d3e4af17f51afee288c9563c4f2d8979b4c1ac4bfac541c7bc711663accbdffe813a08ec3bdcc9184d7d5a2f47c1d87c6a22ad143329e97594269e94c8f

  • SSDEEP

    24576:/ys7ivxKudqGB0aZ+PFofyMp2xNPZyoPQX/7l+y:KpfdqGB6PFoffpUSYm/g

Malware Config

Extracted

Family

redline

Botnet

diza

C2

185.161.248.37:4138

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 20 IoCs
  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3e26a3811eb0df491fd6d357373513f951e83e0be1ceac2cfa0476ce9e5f9bc.exe
    "C:\Users\Admin\AppData\Local\Temp\f3e26a3811eb0df491fd6d357373513f951e83e0be1ceac2cfa0476ce9e5f9bc.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:4436
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4817355.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4817355.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3960
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0225841.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0225841.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4888
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k6549314.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k6549314.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4280
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l2603139.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l2603139.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3652
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m7480678.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m7480678.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2424
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m7480678.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m7480678.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of UnmapMainImage
          PID:3872
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 12
            5⤵
            • Program crash
            PID:2644
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n4703430.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n4703430.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4712
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3872 -ip 3872
    1⤵
      PID:1692

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n4703430.exe

            Filesize

            286KB

            MD5

            899a7dee9d73f994c7d265f052250b50

            SHA1

            a080f9a67d9feb102ce3faff65500a82dd1e8274

            SHA256

            94f491ee64e6dcb860bbcd7bf3c1571773947dd3123d8f03b83b4f4e26206a72

            SHA512

            e0daf96d83a4397eac213b5650b8d73c12a9322ac5303c6da36c46a95b052dcf0a93630ade83c02bb3f584a0c196a44433d1acc7c1f55e57841375a7a6fbb2e7

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\n4703430.exe

            Filesize

            286KB

            MD5

            899a7dee9d73f994c7d265f052250b50

            SHA1

            a080f9a67d9feb102ce3faff65500a82dd1e8274

            SHA256

            94f491ee64e6dcb860bbcd7bf3c1571773947dd3123d8f03b83b4f4e26206a72

            SHA512

            e0daf96d83a4397eac213b5650b8d73c12a9322ac5303c6da36c46a95b052dcf0a93630ade83c02bb3f584a0c196a44433d1acc7c1f55e57841375a7a6fbb2e7

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4817355.exe

            Filesize

            750KB

            MD5

            9ab77dc58738b7390adde963bfcf95db

            SHA1

            69c0c82991f95694736f647942a535fdcdba571e

            SHA256

            2c215087d951feebd71870110b2d2d377a72992ba6cdea93ba62cb993bb7d46e

            SHA512

            50c7177da457bafe2b9ec4d4fbc52439855fbd3e1c1e7ffe68b2caf185cd5e9f2471a264e2cc631370c366cbf3d3ed47081449853ffde3f5d93716b3ec05e6b8

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\y4817355.exe

            Filesize

            750KB

            MD5

            9ab77dc58738b7390adde963bfcf95db

            SHA1

            69c0c82991f95694736f647942a535fdcdba571e

            SHA256

            2c215087d951feebd71870110b2d2d377a72992ba6cdea93ba62cb993bb7d46e

            SHA512

            50c7177da457bafe2b9ec4d4fbc52439855fbd3e1c1e7ffe68b2caf185cd5e9f2471a264e2cc631370c366cbf3d3ed47081449853ffde3f5d93716b3ec05e6b8

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m7480678.exe

            Filesize

            966KB

            MD5

            7c4010f62a0ecf4254042484cc2d0f18

            SHA1

            03c843b80fb4c7f391790b5e4a0467b8d01ca4c4

            SHA256

            0eb59f4356016cad1d50dad9445dd620fc8680cf6e8609979b685d604a740050

            SHA512

            16657a0fa426b8faae8514861deb37187e94ade6f38f4cae2ac518715bd632f65c5156955ac6efd7d701dbb6ac2cd818c6fcd8cd5563e58a15a61e3855bd74dc

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m7480678.exe

            Filesize

            966KB

            MD5

            7c4010f62a0ecf4254042484cc2d0f18

            SHA1

            03c843b80fb4c7f391790b5e4a0467b8d01ca4c4

            SHA256

            0eb59f4356016cad1d50dad9445dd620fc8680cf6e8609979b685d604a740050

            SHA512

            16657a0fa426b8faae8514861deb37187e94ade6f38f4cae2ac518715bd632f65c5156955ac6efd7d701dbb6ac2cd818c6fcd8cd5563e58a15a61e3855bd74dc

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m7480678.exe

            Filesize

            966KB

            MD5

            7c4010f62a0ecf4254042484cc2d0f18

            SHA1

            03c843b80fb4c7f391790b5e4a0467b8d01ca4c4

            SHA256

            0eb59f4356016cad1d50dad9445dd620fc8680cf6e8609979b685d604a740050

            SHA512

            16657a0fa426b8faae8514861deb37187e94ade6f38f4cae2ac518715bd632f65c5156955ac6efd7d701dbb6ac2cd818c6fcd8cd5563e58a15a61e3855bd74dc

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0225841.exe

            Filesize

            305KB

            MD5

            995355e75dc872adce961aa4005a3f43

            SHA1

            1e128b0a426da1d1bce55589cbaf241db994e3c6

            SHA256

            3ea312651a2e9a4537b45c67de96ee5299364095854770ea40da589d74db516c

            SHA512

            1d3acf4289910b2f14630fabc99e025a3ae50caecb4260377f0cd95afbebc83139f3527380ebdf08afeb4c3fc67c65f986c9824ab6118968de68f907eaf2a3c2

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0225841.exe

            Filesize

            305KB

            MD5

            995355e75dc872adce961aa4005a3f43

            SHA1

            1e128b0a426da1d1bce55589cbaf241db994e3c6

            SHA256

            3ea312651a2e9a4537b45c67de96ee5299364095854770ea40da589d74db516c

            SHA512

            1d3acf4289910b2f14630fabc99e025a3ae50caecb4260377f0cd95afbebc83139f3527380ebdf08afeb4c3fc67c65f986c9824ab6118968de68f907eaf2a3c2

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k6549314.exe

            Filesize

            186KB

            MD5

            43cc4e7061add1ba38e978f4e7c79048

            SHA1

            9626cea752d305dbf7879d70a4ec8fd692129ed4

            SHA256

            45d0765bab59b4d7106fc182beac5fee838d40e67275950fa84fbc9b73b76db9

            SHA512

            4808a50b7b1ef31b972d8ff983da084d643aad2c8f76d45036614cb02f00bfa42a2e0f5f8eecd89ca24b7c537fa7ba593389cbbaa3c19bbb6a83cc8b5315e979

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\k6549314.exe

            Filesize

            186KB

            MD5

            43cc4e7061add1ba38e978f4e7c79048

            SHA1

            9626cea752d305dbf7879d70a4ec8fd692129ed4

            SHA256

            45d0765bab59b4d7106fc182beac5fee838d40e67275950fa84fbc9b73b76db9

            SHA512

            4808a50b7b1ef31b972d8ff983da084d643aad2c8f76d45036614cb02f00bfa42a2e0f5f8eecd89ca24b7c537fa7ba593389cbbaa3c19bbb6a83cc8b5315e979

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l2603139.exe

            Filesize

            146KB

            MD5

            1a335b62a7b44c7bf7e609138bb50ba2

            SHA1

            7b8abf51056793495bf85ab3384e720242f4982f

            SHA256

            ac43125c80d026a1f8ee33084a06dcc63e05f99a16b19d3516cd26b9e5cc36d5

            SHA512

            a598c0d38ebe48bede4048d09fc037686188427eae6a680d048a2de06988e371cc45d63c42f93c0e3a756cf322a2ce99140dd230feb4d9fdcc21aea1b587e9f9

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\l2603139.exe

            Filesize

            146KB

            MD5

            1a335b62a7b44c7bf7e609138bb50ba2

            SHA1

            7b8abf51056793495bf85ab3384e720242f4982f

            SHA256

            ac43125c80d026a1f8ee33084a06dcc63e05f99a16b19d3516cd26b9e5cc36d5

            SHA512

            a598c0d38ebe48bede4048d09fc037686188427eae6a680d048a2de06988e371cc45d63c42f93c0e3a756cf322a2ce99140dd230feb4d9fdcc21aea1b587e9f9

          • memory/2424-210-0x00000000075D0000-0x00000000075E0000-memory.dmp

            Filesize

            64KB

          • memory/2424-209-0x0000000000810000-0x0000000000908000-memory.dmp

            Filesize

            992KB

          • memory/3652-204-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

            Filesize

            64KB

          • memory/3652-202-0x0000000006020000-0x0000000006096000-memory.dmp

            Filesize

            472KB

          • memory/3652-201-0x0000000006BF0000-0x000000000711C000-memory.dmp

            Filesize

            5.2MB

          • memory/3652-203-0x0000000005CF0000-0x0000000005D40000-memory.dmp

            Filesize

            320KB

          • memory/3652-200-0x0000000005D50000-0x0000000005F12000-memory.dmp

            Filesize

            1.8MB

          • memory/3652-199-0x0000000005AC0000-0x0000000005B52000-memory.dmp

            Filesize

            584KB

          • memory/3652-198-0x0000000004F50000-0x0000000004FB6000-memory.dmp

            Filesize

            408KB

          • memory/3652-197-0x0000000004ED0000-0x0000000004EE0000-memory.dmp

            Filesize

            64KB

          • memory/3652-196-0x0000000004C00000-0x0000000004C3C000-memory.dmp

            Filesize

            240KB

          • memory/3652-195-0x0000000004BA0000-0x0000000004BB2000-memory.dmp

            Filesize

            72KB

          • memory/3652-194-0x0000000004C70000-0x0000000004D7A000-memory.dmp

            Filesize

            1.0MB

          • memory/3652-193-0x00000000050F0000-0x0000000005708000-memory.dmp

            Filesize

            6.1MB

          • memory/3652-192-0x00000000001D0000-0x00000000001FA000-memory.dmp

            Filesize

            168KB

          • memory/3872-211-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/4280-173-0x0000000004F30000-0x0000000004F46000-memory.dmp

            Filesize

            88KB

          • memory/4280-187-0x00000000021E0000-0x00000000021F0000-memory.dmp

            Filesize

            64KB

          • memory/4280-186-0x00000000021E0000-0x00000000021F0000-memory.dmp

            Filesize

            64KB

          • memory/4280-183-0x0000000004F30000-0x0000000004F46000-memory.dmp

            Filesize

            88KB

          • memory/4280-185-0x0000000004F30000-0x0000000004F46000-memory.dmp

            Filesize

            88KB

          • memory/4280-181-0x0000000004F30000-0x0000000004F46000-memory.dmp

            Filesize

            88KB

          • memory/4280-179-0x0000000004F30000-0x0000000004F46000-memory.dmp

            Filesize

            88KB

          • memory/4280-177-0x0000000004F30000-0x0000000004F46000-memory.dmp

            Filesize

            88KB

          • memory/4280-175-0x0000000004F30000-0x0000000004F46000-memory.dmp

            Filesize

            88KB

          • memory/4280-171-0x0000000004F30000-0x0000000004F46000-memory.dmp

            Filesize

            88KB

          • memory/4280-169-0x0000000004F30000-0x0000000004F46000-memory.dmp

            Filesize

            88KB

          • memory/4280-167-0x0000000004F30000-0x0000000004F46000-memory.dmp

            Filesize

            88KB

          • memory/4280-165-0x0000000004F30000-0x0000000004F46000-memory.dmp

            Filesize

            88KB

          • memory/4280-163-0x0000000004F30000-0x0000000004F46000-memory.dmp

            Filesize

            88KB

          • memory/4280-161-0x0000000004F30000-0x0000000004F46000-memory.dmp

            Filesize

            88KB

          • memory/4280-159-0x0000000004F30000-0x0000000004F46000-memory.dmp

            Filesize

            88KB

          • memory/4280-158-0x0000000004F30000-0x0000000004F46000-memory.dmp

            Filesize

            88KB

          • memory/4280-157-0x00000000021E0000-0x00000000021F0000-memory.dmp

            Filesize

            64KB

          • memory/4280-156-0x00000000021E0000-0x00000000021F0000-memory.dmp

            Filesize

            64KB

          • memory/4280-154-0x00000000021E0000-0x00000000021F0000-memory.dmp

            Filesize

            64KB

          • memory/4280-155-0x0000000004940000-0x0000000004EE4000-memory.dmp

            Filesize

            5.6MB

          • memory/4712-220-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/4712-242-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/4712-217-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/4712-222-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/4712-224-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/4712-226-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/4712-228-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/4712-230-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/4712-232-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/4712-234-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/4712-236-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/4712-238-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/4712-240-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/4712-218-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/4712-244-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/4712-246-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/4712-248-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/4712-250-0x0000000004990000-0x00000000049CC000-memory.dmp

            Filesize

            240KB

          • memory/4712-297-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

            Filesize

            64KB

          • memory/4712-295-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

            Filesize

            64KB

          • memory/4712-299-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

            Filesize

            64KB

          • memory/4712-1128-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

            Filesize

            64KB

          • memory/4712-1130-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

            Filesize

            64KB

          • memory/4712-1131-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

            Filesize

            64KB

          • memory/4712-1132-0x0000000004AD0000-0x0000000004AE0000-memory.dmp

            Filesize

            64KB