Analysis

  • max time kernel
    78s
  • max time network
    99s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2023 01:10

General

  • Target

    file.exe

  • Size

    1020KB

  • MD5

    621a84e89db114a333aae881a8a496f9

  • SHA1

    51f51a67889f4fa25ac4c695b59fd7382471493a

  • SHA256

    b3dec2c71fbda914fbe2072812aff7911a2cd9202085530716b807cbbaab0ca2

  • SHA512

    09e765dc40bcf8391dbb4f3d2e902f7a6630e535d173ec6a39b9e06f8983ae19891783f0ed6a3a966272408c47fc9e103e721ae518c325d0a877511afb9654f8

  • SSDEEP

    24576:NyRuRHOT2qoxBvDN/szVdnH33R+PRJcSKs9rGbu:oRuR4MfNyVZ3kPHHrGb

Malware Config

Extracted

Family

redline

Botnet

lupa

C2

83.97.73.122:19062

Attributes
  • auth_value

    6a764aa41830c77712442516d143bc9c

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 19 IoCs
  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5032
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6715598.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6715598.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4460
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6813358.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6813358.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1980
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o8385065.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o8385065.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3328
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p4120004.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p4120004.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2408
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5069670.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5069670.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3696
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1926613.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1926613.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4412
      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1926613.exe
        C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1926613.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of UnmapMainImage
        PID:3832
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3832 -s 12
          4⤵
          • Program crash
          PID:2900
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3832 -ip 3832
    1⤵
      PID:2452

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1926613.exe

      Filesize

      963KB

      MD5

      b4b1ce52974ac1cbfd90947f52cef639

      SHA1

      9d177d1ba86933a67fd5e10a4f274c705d39449a

      SHA256

      0c1ed5f523bf681f03d5785eb7e7bdd648225d957dd37a8ff41b81154ebb3930

      SHA512

      085239e3925bb6b55b0e7fbc4aa780ddce08b3cc74ed035f1c2dd5171f41515c930aa8ce2f31521434b79b2e05821a452a7c0daad1314df4516e301b76654248

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1926613.exe

      Filesize

      963KB

      MD5

      b4b1ce52974ac1cbfd90947f52cef639

      SHA1

      9d177d1ba86933a67fd5e10a4f274c705d39449a

      SHA256

      0c1ed5f523bf681f03d5785eb7e7bdd648225d957dd37a8ff41b81154ebb3930

      SHA512

      085239e3925bb6b55b0e7fbc4aa780ddce08b3cc74ed035f1c2dd5171f41515c930aa8ce2f31521434b79b2e05821a452a7c0daad1314df4516e301b76654248

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s1926613.exe

      Filesize

      963KB

      MD5

      b4b1ce52974ac1cbfd90947f52cef639

      SHA1

      9d177d1ba86933a67fd5e10a4f274c705d39449a

      SHA256

      0c1ed5f523bf681f03d5785eb7e7bdd648225d957dd37a8ff41b81154ebb3930

      SHA512

      085239e3925bb6b55b0e7fbc4aa780ddce08b3cc74ed035f1c2dd5171f41515c930aa8ce2f31521434b79b2e05821a452a7c0daad1314df4516e301b76654248

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6715598.exe

      Filesize

      575KB

      MD5

      4b9a3f39808e6da62d09708056480663

      SHA1

      c8c192a2b89cc704b71dc662647562cf9604b1fa

      SHA256

      b75baf2a04b188ea3a30c97e0b50bc2b6c3eb3d6e89f2cf2d6c10596f8edee62

      SHA512

      1b70da55f7e7c69202734445d683b8e23c399c4ac8ee1780af54e2b49673ca29e121befb917ebd7d33eaa2e84bb385f2c632b9fa33bbfc6dbbd7896a4ba02256

    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6715598.exe

      Filesize

      575KB

      MD5

      4b9a3f39808e6da62d09708056480663

      SHA1

      c8c192a2b89cc704b71dc662647562cf9604b1fa

      SHA256

      b75baf2a04b188ea3a30c97e0b50bc2b6c3eb3d6e89f2cf2d6c10596f8edee62

      SHA512

      1b70da55f7e7c69202734445d683b8e23c399c4ac8ee1780af54e2b49673ca29e121befb917ebd7d33eaa2e84bb385f2c632b9fa33bbfc6dbbd7896a4ba02256

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5069670.exe

      Filesize

      284KB

      MD5

      1f45b34573f4454594c473e440406a6f

      SHA1

      18639154f7258bda618d129b1a199da398d417f6

      SHA256

      bb53f9f6535ce011898d1674a5470aee3972982d73ebeb78a0f9011f2c74bccd

      SHA512

      e948afef08a56e64b407c940c4997e6c9a705a72ed1b8fcece043c1d3a34b508bbab8401cbcd662be455fa63b3559c0a98913d93d1cfdcf2fcd22515b26e7207

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\r5069670.exe

      Filesize

      284KB

      MD5

      1f45b34573f4454594c473e440406a6f

      SHA1

      18639154f7258bda618d129b1a199da398d417f6

      SHA256

      bb53f9f6535ce011898d1674a5470aee3972982d73ebeb78a0f9011f2c74bccd

      SHA512

      e948afef08a56e64b407c940c4997e6c9a705a72ed1b8fcece043c1d3a34b508bbab8401cbcd662be455fa63b3559c0a98913d93d1cfdcf2fcd22515b26e7207

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6813358.exe

      Filesize

      304KB

      MD5

      c3fa02a7532516d39b41da2d5a55a5cd

      SHA1

      8a309760643a46636dabfa50a9cf177c34163dd3

      SHA256

      54f89cc7af9911498b8ef221398baf3dfa3bb36498f5f7d4b1f76b686676e073

      SHA512

      0ab222e8d92833e456f3c2a000a1d0434667dd1e3f8671686542f092306a42a2d2baa6a043a81afe04025b510243f94a03f09f578a5732a66d1696d6f1b5ddba

    • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z6813358.exe

      Filesize

      304KB

      MD5

      c3fa02a7532516d39b41da2d5a55a5cd

      SHA1

      8a309760643a46636dabfa50a9cf177c34163dd3

      SHA256

      54f89cc7af9911498b8ef221398baf3dfa3bb36498f5f7d4b1f76b686676e073

      SHA512

      0ab222e8d92833e456f3c2a000a1d0434667dd1e3f8671686542f092306a42a2d2baa6a043a81afe04025b510243f94a03f09f578a5732a66d1696d6f1b5ddba

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o8385065.exe

      Filesize

      186KB

      MD5

      adca0c2a443a722a64df378a5c23ca96

      SHA1

      721e98a63967356ac380df9113bd1e71695faabf

      SHA256

      fb5a44f369df3675b564922ee0424916016ff76f0257b1ff84b2d2551ff12ea9

      SHA512

      5248d38b63147d8dba4e287d155d189873b8cde79ca3eddbe3e8d7304ea3910ecadb16e5a3072633c2d40eb377fc0d14290b64c95030dd16e2c7cb4508e0c9f9

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\o8385065.exe

      Filesize

      186KB

      MD5

      adca0c2a443a722a64df378a5c23ca96

      SHA1

      721e98a63967356ac380df9113bd1e71695faabf

      SHA256

      fb5a44f369df3675b564922ee0424916016ff76f0257b1ff84b2d2551ff12ea9

      SHA512

      5248d38b63147d8dba4e287d155d189873b8cde79ca3eddbe3e8d7304ea3910ecadb16e5a3072633c2d40eb377fc0d14290b64c95030dd16e2c7cb4508e0c9f9

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p4120004.exe

      Filesize

      145KB

      MD5

      67d31300ab4458c12ea3138d16fd79a3

      SHA1

      6f890d28b413d55615ece0c0213d43836cf6998b

      SHA256

      63193388ae3e77c72172133f18027abef2ce8c9d11b097d642f4bc4c43ad7c99

      SHA512

      244087d39f7a87e4d205307f982dbbb426f7366570f4f76e9a78ff711d22847603497c2dd633ec2108871fd96d276e74a55d2a22b43cd51aa93eaddec9b2257e

    • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\p4120004.exe

      Filesize

      145KB

      MD5

      67d31300ab4458c12ea3138d16fd79a3

      SHA1

      6f890d28b413d55615ece0c0213d43836cf6998b

      SHA256

      63193388ae3e77c72172133f18027abef2ce8c9d11b097d642f4bc4c43ad7c99

      SHA512

      244087d39f7a87e4d205307f982dbbb426f7366570f4f76e9a78ff711d22847603497c2dd633ec2108871fd96d276e74a55d2a22b43cd51aa93eaddec9b2257e

    • memory/2408-200-0x00000000072F0000-0x000000000781C000-memory.dmp

      Filesize

      5.2MB

    • memory/2408-201-0x00000000056D0000-0x00000000056E0000-memory.dmp

      Filesize

      64KB

    • memory/2408-199-0x0000000006BF0000-0x0000000006DB2000-memory.dmp

      Filesize

      1.8MB

    • memory/2408-198-0x0000000005EC0000-0x0000000005F26000-memory.dmp

      Filesize

      408KB

    • memory/2408-197-0x00000000057E0000-0x0000000005872000-memory.dmp

      Filesize

      584KB

    • memory/2408-202-0x0000000006B60000-0x0000000006BD6000-memory.dmp

      Filesize

      472KB

    • memory/2408-196-0x00000000056D0000-0x00000000056E0000-memory.dmp

      Filesize

      64KB

    • memory/2408-195-0x0000000005360000-0x000000000539C000-memory.dmp

      Filesize

      240KB

    • memory/2408-194-0x0000000005300000-0x0000000005312000-memory.dmp

      Filesize

      72KB

    • memory/2408-193-0x00000000053D0000-0x00000000054DA000-memory.dmp

      Filesize

      1.0MB

    • memory/2408-192-0x00000000058A0000-0x0000000005EB8000-memory.dmp

      Filesize

      6.1MB

    • memory/2408-191-0x0000000000A70000-0x0000000000A9A000-memory.dmp

      Filesize

      168KB

    • memory/2408-203-0x0000000006DC0000-0x0000000006E10000-memory.dmp

      Filesize

      320KB

    • memory/3328-175-0x00000000023A0000-0x00000000023B6000-memory.dmp

      Filesize

      88KB

    • memory/3328-186-0x00000000026C0000-0x00000000026D0000-memory.dmp

      Filesize

      64KB

    • memory/3328-185-0x00000000026C0000-0x00000000026D0000-memory.dmp

      Filesize

      64KB

    • memory/3328-184-0x00000000026C0000-0x00000000026D0000-memory.dmp

      Filesize

      64KB

    • memory/3328-183-0x00000000023A0000-0x00000000023B6000-memory.dmp

      Filesize

      88KB

    • memory/3328-181-0x00000000023A0000-0x00000000023B6000-memory.dmp

      Filesize

      88KB

    • memory/3328-179-0x00000000023A0000-0x00000000023B6000-memory.dmp

      Filesize

      88KB

    • memory/3328-177-0x00000000023A0000-0x00000000023B6000-memory.dmp

      Filesize

      88KB

    • memory/3328-173-0x00000000023A0000-0x00000000023B6000-memory.dmp

      Filesize

      88KB

    • memory/3328-171-0x00000000023A0000-0x00000000023B6000-memory.dmp

      Filesize

      88KB

    • memory/3328-169-0x00000000023A0000-0x00000000023B6000-memory.dmp

      Filesize

      88KB

    • memory/3328-167-0x00000000023A0000-0x00000000023B6000-memory.dmp

      Filesize

      88KB

    • memory/3328-165-0x00000000023A0000-0x00000000023B6000-memory.dmp

      Filesize

      88KB

    • memory/3328-163-0x00000000023A0000-0x00000000023B6000-memory.dmp

      Filesize

      88KB

    • memory/3328-161-0x00000000023A0000-0x00000000023B6000-memory.dmp

      Filesize

      88KB

    • memory/3328-159-0x00000000023A0000-0x00000000023B6000-memory.dmp

      Filesize

      88KB

    • memory/3328-157-0x00000000023A0000-0x00000000023B6000-memory.dmp

      Filesize

      88KB

    • memory/3328-154-0x00000000026C0000-0x00000000026D0000-memory.dmp

      Filesize

      64KB

    • memory/3328-155-0x0000000004C20000-0x00000000051C4000-memory.dmp

      Filesize

      5.6MB

    • memory/3328-156-0x00000000023A0000-0x00000000023B6000-memory.dmp

      Filesize

      88KB

    • memory/3696-216-0x0000000004970000-0x0000000004980000-memory.dmp

      Filesize

      64KB

    • memory/3696-236-0x0000000004F50000-0x0000000004F8C000-memory.dmp

      Filesize

      240KB

    • memory/3696-218-0x0000000004970000-0x0000000004980000-memory.dmp

      Filesize

      64KB

    • memory/3696-214-0x0000000004970000-0x0000000004980000-memory.dmp

      Filesize

      64KB

    • memory/3696-220-0x0000000004F50000-0x0000000004F8C000-memory.dmp

      Filesize

      240KB

    • memory/3696-222-0x0000000004F50000-0x0000000004F8C000-memory.dmp

      Filesize

      240KB

    • memory/3696-217-0x0000000004F50000-0x0000000004F8C000-memory.dmp

      Filesize

      240KB

    • memory/3696-224-0x0000000004F50000-0x0000000004F8C000-memory.dmp

      Filesize

      240KB

    • memory/3696-226-0x0000000004F50000-0x0000000004F8C000-memory.dmp

      Filesize

      240KB

    • memory/3696-228-0x0000000004F50000-0x0000000004F8C000-memory.dmp

      Filesize

      240KB

    • memory/3696-230-0x0000000004F50000-0x0000000004F8C000-memory.dmp

      Filesize

      240KB

    • memory/3696-232-0x0000000004F50000-0x0000000004F8C000-memory.dmp

      Filesize

      240KB

    • memory/3696-234-0x0000000004F50000-0x0000000004F8C000-memory.dmp

      Filesize

      240KB

    • memory/3696-213-0x0000000004F50000-0x0000000004F8C000-memory.dmp

      Filesize

      240KB

    • memory/3696-238-0x0000000004F50000-0x0000000004F8C000-memory.dmp

      Filesize

      240KB

    • memory/3696-240-0x0000000004F50000-0x0000000004F8C000-memory.dmp

      Filesize

      240KB

    • memory/3696-242-0x0000000004F50000-0x0000000004F8C000-memory.dmp

      Filesize

      240KB

    • memory/3696-244-0x0000000004F50000-0x0000000004F8C000-memory.dmp

      Filesize

      240KB

    • memory/3696-246-0x0000000004F50000-0x0000000004F8C000-memory.dmp

      Filesize

      240KB

    • memory/3696-1119-0x0000000004970000-0x0000000004980000-memory.dmp

      Filesize

      64KB

    • memory/3696-1120-0x0000000004970000-0x0000000004980000-memory.dmp

      Filesize

      64KB

    • memory/3696-1121-0x0000000004970000-0x0000000004980000-memory.dmp

      Filesize

      64KB

    • memory/3696-1122-0x0000000004970000-0x0000000004980000-memory.dmp

      Filesize

      64KB

    • memory/3696-211-0x0000000004F50000-0x0000000004F8C000-memory.dmp

      Filesize

      240KB

    • memory/3696-208-0x0000000004F50000-0x0000000004F8C000-memory.dmp

      Filesize

      240KB

    • memory/3696-209-0x0000000004F50000-0x0000000004F8C000-memory.dmp

      Filesize

      240KB

    • memory/4412-1128-0x00000000076F0000-0x0000000007700000-memory.dmp

      Filesize

      64KB

    • memory/4412-1127-0x0000000000800000-0x00000000008F8000-memory.dmp

      Filesize

      992KB