Analysis

  • max time kernel
    138s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/05/2023, 21:30

General

  • Target

    97ca2de4d4d69eb262e5e857be87a2771c73239236f496fb44466a74a489aa5a.exe

  • Size

    984KB

  • MD5

    219f85d92fae9d7820499561bd0274e1

  • SHA1

    9447e3e28e6ee3d1a3771cb3485681008a4d0e3b

  • SHA256

    97ca2de4d4d69eb262e5e857be87a2771c73239236f496fb44466a74a489aa5a

  • SHA512

    a8288ff407d4545925bad8a3adcf5c32396873111594a6112350645643fc23b19c97b31bc9f8dc42addc5d9f158ab63a539d8ec2293f0a2c3dd3acd689cb910a

  • SSDEEP

    24576:EyUvaJNfON6uG16e3tT5pzhItf/qnLAtPfHzyrXiw:TUvqNIA6el5NhFngyj

Malware Config

Extracted

Family

redline

Botnet

diza

C2

83.97.73.122:19062

Attributes
  • auth_value

    0d09b419c8bc967f91c68be4a17e92ee

Extracted

Family

redline

Botnet

ebal

C2

83.97.73.122:19062

Attributes
  • auth_value

    adedb0785152892650ba0123aadb727d

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\97ca2de4d4d69eb262e5e857be87a2771c73239236f496fb44466a74a489aa5a.exe
    "C:\Users\Admin\AppData\Local\Temp\97ca2de4d4d69eb262e5e857be87a2771c73239236f496fb44466a74a489aa5a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:368
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0490971.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0490971.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2672
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4128411.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4128411.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:2200
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f6454475.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f6454475.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1472
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8034357.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8034357.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2744
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4856
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9740034.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9740034.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4232
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
          4⤵
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:820
          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
            5⤵
            • Executes dropped EXE
            PID:4684
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2346831.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2346831.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4932
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4660

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

    Filesize

    226B

    MD5

    916851e072fbabc4796d8916c5131092

    SHA1

    d48a602229a690c512d5fdaf4c8d77547a88e7a2

    SHA256

    7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

    SHA512

    07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2346831.exe

    Filesize

    329KB

    MD5

    523bc8917e057c0077015d3c89eb7715

    SHA1

    8da93dd417ad3d97255f596e8f381b95e3e431e9

    SHA256

    a37d03b86692fa3ec0393701d3cf34e84de75c6b3c2c8bf7303428b4ddac5ef6

    SHA512

    352788172acbabd0cfe96e7f40e8e26a17cbdb7189fe71312a0945c5a112b13fe1f1d250ebac5d08621f4d6a66adf78e332285e527db1943505eb5f67bbbed38

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\i2346831.exe

    Filesize

    329KB

    MD5

    523bc8917e057c0077015d3c89eb7715

    SHA1

    8da93dd417ad3d97255f596e8f381b95e3e431e9

    SHA256

    a37d03b86692fa3ec0393701d3cf34e84de75c6b3c2c8bf7303428b4ddac5ef6

    SHA512

    352788172acbabd0cfe96e7f40e8e26a17cbdb7189fe71312a0945c5a112b13fe1f1d250ebac5d08621f4d6a66adf78e332285e527db1943505eb5f67bbbed38

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0490971.exe

    Filesize

    662KB

    MD5

    09dc0573389188bb04d7959780d71e46

    SHA1

    36ba4386d2c4765af80445b6c3a971f179a5ae15

    SHA256

    e87ca428fcabd4da5e20c7b9acc9e367154d7b8c5a8c28b88b08d5525195af68

    SHA512

    9a18e32ef25cc00c36cde032195ed276622d4e2592fa400e1c25a1c6ea8cf16d6c470bae607e5f889f2586dbdd7486ab4564d51e7e8af30cd28ff48a8a702921

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x0490971.exe

    Filesize

    662KB

    MD5

    09dc0573389188bb04d7959780d71e46

    SHA1

    36ba4386d2c4765af80445b6c3a971f179a5ae15

    SHA256

    e87ca428fcabd4da5e20c7b9acc9e367154d7b8c5a8c28b88b08d5525195af68

    SHA512

    9a18e32ef25cc00c36cde032195ed276622d4e2592fa400e1c25a1c6ea8cf16d6c470bae607e5f889f2586dbdd7486ab4564d51e7e8af30cd28ff48a8a702921

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9740034.exe

    Filesize

    388KB

    MD5

    13aaf2bdacb784ff8a79da4b169b857f

    SHA1

    1f7d26b42d366bf4b8cfc4e1a986e288a3d38e57

    SHA256

    894596359dc5fdfe1d57ea68da868eef1fd8a7e2521086a452d6ad8086cf71be

    SHA512

    92a377154fd728c8e7013b51d054d1e29519e4a9383a298bcd30bd61f856ddc463c37a463111688b4d543e4deef3851b21589e699d3d690fb6e032e1248fc12a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\h9740034.exe

    Filesize

    388KB

    MD5

    13aaf2bdacb784ff8a79da4b169b857f

    SHA1

    1f7d26b42d366bf4b8cfc4e1a986e288a3d38e57

    SHA256

    894596359dc5fdfe1d57ea68da868eef1fd8a7e2521086a452d6ad8086cf71be

    SHA512

    92a377154fd728c8e7013b51d054d1e29519e4a9383a298bcd30bd61f856ddc463c37a463111688b4d543e4deef3851b21589e699d3d690fb6e032e1248fc12a

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4128411.exe

    Filesize

    280KB

    MD5

    e208f5ebc2136c1ea4836d51fa63b805

    SHA1

    7f0d09a6d73cbe733991da08c0378dc8ef49f3fe

    SHA256

    b2204e68ff7a9ee96701fd50d0c87c833d6bde0995c66e806a1ecfbcb3773b62

    SHA512

    5beab19886856e8fe971c178db9fdbea303b1af6e95ccc8db6fbcee9cd141b269c9883c7f7413c4cb76834a4a9c4143b5d2acda88290463bc28d2545e3f3b108

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4128411.exe

    Filesize

    280KB

    MD5

    e208f5ebc2136c1ea4836d51fa63b805

    SHA1

    7f0d09a6d73cbe733991da08c0378dc8ef49f3fe

    SHA256

    b2204e68ff7a9ee96701fd50d0c87c833d6bde0995c66e806a1ecfbcb3773b62

    SHA512

    5beab19886856e8fe971c178db9fdbea303b1af6e95ccc8db6fbcee9cd141b269c9883c7f7413c4cb76834a4a9c4143b5d2acda88290463bc28d2545e3f3b108

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f6454475.exe

    Filesize

    146KB

    MD5

    6559a3bcccc0f7e884d4e485a61ea34a

    SHA1

    db5816f7201a88b434e809a6883a3702b4994df3

    SHA256

    18f9fd7c28b9088e56163bfc13f6d23629fe6dd9afdef2b06047822c0d3ce3f5

    SHA512

    f723751c0110193d0ec52ff001fa9ba513d9f064ac31be922f6df9381160ae8177df835d5a01460cfd42a4e96f0035546afcf82f79e67ce9dde1765ecaf9d9ab

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\f6454475.exe

    Filesize

    146KB

    MD5

    6559a3bcccc0f7e884d4e485a61ea34a

    SHA1

    db5816f7201a88b434e809a6883a3702b4994df3

    SHA256

    18f9fd7c28b9088e56163bfc13f6d23629fe6dd9afdef2b06047822c0d3ce3f5

    SHA512

    f723751c0110193d0ec52ff001fa9ba513d9f064ac31be922f6df9381160ae8177df835d5a01460cfd42a4e96f0035546afcf82f79e67ce9dde1765ecaf9d9ab

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8034357.exe

    Filesize

    194KB

    MD5

    d39eedafcac441eec8b2b447a385e027

    SHA1

    913ff4b1a3b53c66ef740cae3baec2b3cf7e8b9c

    SHA256

    ce8ea8eeca1be0f62570a67db136682b14e1bba7a3b23923da25c4bc4b280496

    SHA512

    eac79df5f5274fdb75b8448db067f9ea9519ce30c05b14f9de4054ff963920355caeb546ad49be817866a6808d9d53c167cc7699388b6f4d12766c78d29c20ba

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g8034357.exe

    Filesize

    194KB

    MD5

    d39eedafcac441eec8b2b447a385e027

    SHA1

    913ff4b1a3b53c66ef740cae3baec2b3cf7e8b9c

    SHA256

    ce8ea8eeca1be0f62570a67db136682b14e1bba7a3b23923da25c4bc4b280496

    SHA512

    eac79df5f5274fdb75b8448db067f9ea9519ce30c05b14f9de4054ff963920355caeb546ad49be817866a6808d9d53c167cc7699388b6f4d12766c78d29c20ba

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    101KB

    MD5

    89d41e1cf478a3d3c2c701a27a5692b2

    SHA1

    691e20583ef80cb9a2fd3258560e7f02481d12fd

    SHA256

    dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac

    SHA512

    5c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    101KB

    MD5

    89d41e1cf478a3d3c2c701a27a5692b2

    SHA1

    691e20583ef80cb9a2fd3258560e7f02481d12fd

    SHA256

    dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac

    SHA512

    5c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    101KB

    MD5

    89d41e1cf478a3d3c2c701a27a5692b2

    SHA1

    691e20583ef80cb9a2fd3258560e7f02481d12fd

    SHA256

    dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac

    SHA512

    5c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc

  • memory/820-182-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/820-189-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/820-192-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/1472-157-0x00000000055D0000-0x00000000055E2000-memory.dmp

    Filesize

    72KB

  • memory/1472-160-0x0000000005940000-0x00000000059A6000-memory.dmp

    Filesize

    408KB

  • memory/1472-166-0x00000000076B0000-0x0000000007BDC000-memory.dmp

    Filesize

    5.2MB

  • memory/1472-154-0x0000000000C00000-0x0000000000C2A000-memory.dmp

    Filesize

    168KB

  • memory/1472-165-0x0000000006FB0000-0x0000000007172000-memory.dmp

    Filesize

    1.8MB

  • memory/1472-164-0x00000000065D0000-0x0000000006620000-memory.dmp

    Filesize

    320KB

  • memory/1472-163-0x0000000006650000-0x00000000066C6000-memory.dmp

    Filesize

    472KB

  • memory/1472-162-0x0000000006530000-0x00000000065C2000-memory.dmp

    Filesize

    584KB

  • memory/1472-161-0x0000000006A00000-0x0000000006FA4000-memory.dmp

    Filesize

    5.6MB

  • memory/1472-167-0x0000000005640000-0x0000000005650000-memory.dmp

    Filesize

    64KB

  • memory/1472-159-0x0000000005640000-0x0000000005650000-memory.dmp

    Filesize

    64KB

  • memory/1472-155-0x0000000005B30000-0x0000000006148000-memory.dmp

    Filesize

    6.1MB

  • memory/1472-158-0x0000000005650000-0x000000000568C000-memory.dmp

    Filesize

    240KB

  • memory/1472-156-0x00000000056A0000-0x00000000057AA000-memory.dmp

    Filesize

    1.0MB

  • memory/4660-211-0x0000000005220000-0x0000000005230000-memory.dmp

    Filesize

    64KB

  • memory/4660-195-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/4856-173-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB