Analysis

  • max time kernel
    61s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/05/2023, 01:15

General

  • Target

    0e7c75e22ea723ed0d52d5b277013063c55a8b5f00a65d903229c8f86c9ee07f.exe

  • Size

    916KB

  • MD5

    b5d99102b997ef39eb4180fd3565e2e3

  • SHA1

    07a439b39f1351f05b5ff67e68b581092c91fad0

  • SHA256

    0e7c75e22ea723ed0d52d5b277013063c55a8b5f00a65d903229c8f86c9ee07f

  • SHA512

    3db5b269aadd8b39f9d15c172a91a7aa46c714415f1edc5b39489aaba394484a4023d28a6ad2bc55c138e9f0af7ff909d67afc233b0dcaf815ddf6bb47032d30

  • SSDEEP

    24576:jy3SoM9MWf/iepFWYOBkwtkzGC3JqwomT0g7brdtSc:29MKepgYOFthXwomT7bHS

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.122:19062

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 34 IoCs
  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e7c75e22ea723ed0d52d5b277013063c55a8b5f00a65d903229c8f86c9ee07f.exe
    "C:\Users\Admin\AppData\Local\Temp\0e7c75e22ea723ed0d52d5b277013063c55a8b5f00a65d903229c8f86c9ee07f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5048
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0335738.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0335738.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2192
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5643250.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5643250.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:548
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7409386.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7409386.exe
          4⤵
          • Modifies Windows Defender Real-time Protection settings
          • Executes dropped EXE
          • Windows security modification
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4768
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5259264.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5259264.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3508
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2734227.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2734227.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4804
        • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2734227.exe
          C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2734227.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of UnmapMainImage
          PID:2896
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2896 -s 12
            5⤵
            • Program crash
            PID:2004
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8277356.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8277356.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3836
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2896 -ip 2896
    1⤵
      PID:4424

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8277356.exe

            Filesize

            285KB

            MD5

            5840d93ddf0f30dabaf87f636123e21d

            SHA1

            c7e99f0d972b6d287790c90e619ff4410a440b7e

            SHA256

            dda004091fcdcd5d1cbd565283788e213866663c6a5050aa1398262d9d854681

            SHA512

            ee9ff4857beeaa36545d9cca378c571dfe7d950a5f4ee6874d1b065048ae80f3bdbe56e82eccbdab4e755826cb61ed986a0b0b5e2cd4bc10a77a5665858187ee

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d8277356.exe

            Filesize

            285KB

            MD5

            5840d93ddf0f30dabaf87f636123e21d

            SHA1

            c7e99f0d972b6d287790c90e619ff4410a440b7e

            SHA256

            dda004091fcdcd5d1cbd565283788e213866663c6a5050aa1398262d9d854681

            SHA512

            ee9ff4857beeaa36545d9cca378c571dfe7d950a5f4ee6874d1b065048ae80f3bdbe56e82eccbdab4e755826cb61ed986a0b0b5e2cd4bc10a77a5665858187ee

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0335738.exe

            Filesize

            637KB

            MD5

            cdb30b184dd18b608090dfa7db95b150

            SHA1

            e4a9e6cef526c9b5273d07d59754f8eb67cda494

            SHA256

            71f24abd3f6e3a3a5e46e46a82b81412c65f8fba8bc6032c117fc743f56d3e90

            SHA512

            f5cc6439b58bc91aa988a33d493fc1f5b5de0712fc7a40976bbbcb09c85b96eaa9286970c62f75f6bb8bd77d82b8ceb95a5a681ea6b676a08cf733756c2d9e48

          • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v0335738.exe

            Filesize

            637KB

            MD5

            cdb30b184dd18b608090dfa7db95b150

            SHA1

            e4a9e6cef526c9b5273d07d59754f8eb67cda494

            SHA256

            71f24abd3f6e3a3a5e46e46a82b81412c65f8fba8bc6032c117fc743f56d3e90

            SHA512

            f5cc6439b58bc91aa988a33d493fc1f5b5de0712fc7a40976bbbcb09c85b96eaa9286970c62f75f6bb8bd77d82b8ceb95a5a681ea6b676a08cf733756c2d9e48

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2734227.exe

            Filesize

            968KB

            MD5

            bfa103db49ff3e84bc4fe5b13b1dc031

            SHA1

            036ccfcecd2de16973b747c4bb3cc27599e5895e

            SHA256

            c025734634d68139405849502db93b427326d27880ff9b51e52c8afc03565012

            SHA512

            a6609d2b686b148de39ba826298f55952ff6306b4a51a3cee6b79467238c68236170c9d556fbce37d2c24bf6077cf8678c8fb65c969e4a47f9095d3635f47a5d

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2734227.exe

            Filesize

            968KB

            MD5

            bfa103db49ff3e84bc4fe5b13b1dc031

            SHA1

            036ccfcecd2de16973b747c4bb3cc27599e5895e

            SHA256

            c025734634d68139405849502db93b427326d27880ff9b51e52c8afc03565012

            SHA512

            a6609d2b686b148de39ba826298f55952ff6306b4a51a3cee6b79467238c68236170c9d556fbce37d2c24bf6077cf8678c8fb65c969e4a47f9095d3635f47a5d

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c2734227.exe

            Filesize

            968KB

            MD5

            bfa103db49ff3e84bc4fe5b13b1dc031

            SHA1

            036ccfcecd2de16973b747c4bb3cc27599e5895e

            SHA256

            c025734634d68139405849502db93b427326d27880ff9b51e52c8afc03565012

            SHA512

            a6609d2b686b148de39ba826298f55952ff6306b4a51a3cee6b79467238c68236170c9d556fbce37d2c24bf6077cf8678c8fb65c969e4a47f9095d3635f47a5d

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5643250.exe

            Filesize

            192KB

            MD5

            1360f20af0708f678bd2bbc9d5ce151f

            SHA1

            82f3f2500b0e6199c749402ad0121415e67c6f86

            SHA256

            e257a84285e3dd16209a1340a713d3518d96bb2fb3874a7bcc9f591032d48d61

            SHA512

            7b4535f6a2f3aae8761418be110a0839ce9ca19033473b542692cfe5612d6fafb56eed66e24f551075789411bbb4b16ad8c2f6c63ddb29a93b4c891cc6b4e0c3

          • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v5643250.exe

            Filesize

            192KB

            MD5

            1360f20af0708f678bd2bbc9d5ce151f

            SHA1

            82f3f2500b0e6199c749402ad0121415e67c6f86

            SHA256

            e257a84285e3dd16209a1340a713d3518d96bb2fb3874a7bcc9f591032d48d61

            SHA512

            7b4535f6a2f3aae8761418be110a0839ce9ca19033473b542692cfe5612d6fafb56eed66e24f551075789411bbb4b16ad8c2f6c63ddb29a93b4c891cc6b4e0c3

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7409386.exe

            Filesize

            11KB

            MD5

            329ce153c10642b207f9c422a99d150b

            SHA1

            d36a52feca19dbff397b2c5dbd3ca2f5a3a55ea6

            SHA256

            78959e959ccb966d4100917352bbc10d34d7fe70c00f285cb80e8ce8f518ec5f

            SHA512

            8158009b0302934fbbe0b2e4ce2cb63235dc8b020bdb27f7b15914acdd1b8ca6f06fac5c4878ab3e12328952e1ef876e67b3e5fd16e5497ad2f8678b4d89254d

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a7409386.exe

            Filesize

            11KB

            MD5

            329ce153c10642b207f9c422a99d150b

            SHA1

            d36a52feca19dbff397b2c5dbd3ca2f5a3a55ea6

            SHA256

            78959e959ccb966d4100917352bbc10d34d7fe70c00f285cb80e8ce8f518ec5f

            SHA512

            8158009b0302934fbbe0b2e4ce2cb63235dc8b020bdb27f7b15914acdd1b8ca6f06fac5c4878ab3e12328952e1ef876e67b3e5fd16e5497ad2f8678b4d89254d

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5259264.exe

            Filesize

            145KB

            MD5

            e53ffdd631ca7815f2735f6f303bb2d0

            SHA1

            32d033c65bea8b5b4d9e95d5d1419a00cfa603ce

            SHA256

            98b30c901e0b2b7ba95981d524dab949bfd3ab62a3fd66b239442bb233b0ab49

            SHA512

            906f4e7206ec0259dd3da5ca1610f7549db27117d66d903e11626f8ce9e925c5d32593d1ea8fc008b9eea24242efbc93acc496f4baf6ebe267eff768a1ea1a2b

          • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b5259264.exe

            Filesize

            145KB

            MD5

            e53ffdd631ca7815f2735f6f303bb2d0

            SHA1

            32d033c65bea8b5b4d9e95d5d1419a00cfa603ce

            SHA256

            98b30c901e0b2b7ba95981d524dab949bfd3ab62a3fd66b239442bb233b0ab49

            SHA512

            906f4e7206ec0259dd3da5ca1610f7549db27117d66d903e11626f8ce9e925c5d32593d1ea8fc008b9eea24242efbc93acc496f4baf6ebe267eff768a1ea1a2b

          • memory/2896-179-0x0000000000400000-0x0000000000438000-memory.dmp

            Filesize

            224KB

          • memory/3508-162-0x00000000055B0000-0x00000000055C2000-memory.dmp

            Filesize

            72KB

          • memory/3508-163-0x0000000005610000-0x000000000564C000-memory.dmp

            Filesize

            240KB

          • memory/3508-164-0x00000000058A0000-0x00000000058B0000-memory.dmp

            Filesize

            64KB

          • memory/3508-165-0x00000000066D0000-0x0000000006C74000-memory.dmp

            Filesize

            5.6MB

          • memory/3508-166-0x0000000006120000-0x00000000061B2000-memory.dmp

            Filesize

            584KB

          • memory/3508-167-0x0000000005A60000-0x0000000005AC6000-memory.dmp

            Filesize

            408KB

          • memory/3508-168-0x00000000065D0000-0x0000000006646000-memory.dmp

            Filesize

            472KB

          • memory/3508-169-0x0000000006650000-0x00000000066A0000-memory.dmp

            Filesize

            320KB

          • memory/3508-170-0x0000000006F50000-0x0000000007112000-memory.dmp

            Filesize

            1.8MB

          • memory/3508-171-0x0000000007650000-0x0000000007B7C000-memory.dmp

            Filesize

            5.2MB

          • memory/3508-172-0x00000000058A0000-0x00000000058B0000-memory.dmp

            Filesize

            64KB

          • memory/3508-161-0x0000000005680000-0x000000000578A000-memory.dmp

            Filesize

            1.0MB

          • memory/3508-160-0x0000000005B00000-0x0000000006118000-memory.dmp

            Filesize

            6.1MB

          • memory/3508-159-0x0000000000D20000-0x0000000000D4A000-memory.dmp

            Filesize

            168KB

          • memory/3836-192-0x0000000002530000-0x000000000256C000-memory.dmp

            Filesize

            240KB

          • memory/3836-221-0x0000000004C00000-0x0000000004C10000-memory.dmp

            Filesize

            64KB

          • memory/3836-185-0x0000000002530000-0x000000000256C000-memory.dmp

            Filesize

            240KB

          • memory/3836-186-0x0000000002530000-0x000000000256C000-memory.dmp

            Filesize

            240KB

          • memory/3836-188-0x0000000002530000-0x000000000256C000-memory.dmp

            Filesize

            240KB

          • memory/3836-190-0x0000000002530000-0x000000000256C000-memory.dmp

            Filesize

            240KB

          • memory/3836-1099-0x0000000004C00000-0x0000000004C10000-memory.dmp

            Filesize

            64KB

          • memory/3836-194-0x0000000002530000-0x000000000256C000-memory.dmp

            Filesize

            240KB

          • memory/3836-196-0x0000000002530000-0x000000000256C000-memory.dmp

            Filesize

            240KB

          • memory/3836-198-0x0000000002530000-0x000000000256C000-memory.dmp

            Filesize

            240KB

          • memory/3836-200-0x0000000002530000-0x000000000256C000-memory.dmp

            Filesize

            240KB

          • memory/3836-202-0x0000000002530000-0x000000000256C000-memory.dmp

            Filesize

            240KB

          • memory/3836-204-0x0000000002530000-0x000000000256C000-memory.dmp

            Filesize

            240KB

          • memory/3836-206-0x0000000002530000-0x000000000256C000-memory.dmp

            Filesize

            240KB

          • memory/3836-208-0x0000000002530000-0x000000000256C000-memory.dmp

            Filesize

            240KB

          • memory/3836-210-0x0000000002530000-0x000000000256C000-memory.dmp

            Filesize

            240KB

          • memory/3836-212-0x0000000002530000-0x000000000256C000-memory.dmp

            Filesize

            240KB

          • memory/3836-214-0x0000000002530000-0x000000000256C000-memory.dmp

            Filesize

            240KB

          • memory/3836-216-0x0000000002530000-0x000000000256C000-memory.dmp

            Filesize

            240KB

          • memory/3836-219-0x0000000004C00000-0x0000000004C10000-memory.dmp

            Filesize

            64KB

          • memory/3836-218-0x0000000002530000-0x000000000256C000-memory.dmp

            Filesize

            240KB

          • memory/3836-1098-0x0000000004C00000-0x0000000004C10000-memory.dmp

            Filesize

            64KB

          • memory/3836-222-0x0000000004C00000-0x0000000004C10000-memory.dmp

            Filesize

            64KB

          • memory/3836-223-0x0000000002530000-0x000000000256C000-memory.dmp

            Filesize

            240KB

          • memory/3836-225-0x0000000002530000-0x000000000256C000-memory.dmp

            Filesize

            240KB

          • memory/3836-227-0x0000000002530000-0x000000000256C000-memory.dmp

            Filesize

            240KB

          • memory/3836-229-0x0000000002530000-0x000000000256C000-memory.dmp

            Filesize

            240KB

          • memory/3836-231-0x0000000002530000-0x000000000256C000-memory.dmp

            Filesize

            240KB

          • memory/3836-233-0x0000000002530000-0x000000000256C000-memory.dmp

            Filesize

            240KB

          • memory/3836-235-0x0000000002530000-0x000000000256C000-memory.dmp

            Filesize

            240KB

          • memory/3836-237-0x0000000002530000-0x000000000256C000-memory.dmp

            Filesize

            240KB

          • memory/3836-239-0x0000000002530000-0x000000000256C000-memory.dmp

            Filesize

            240KB

          • memory/3836-241-0x0000000002530000-0x000000000256C000-memory.dmp

            Filesize

            240KB

          • memory/3836-243-0x0000000002530000-0x000000000256C000-memory.dmp

            Filesize

            240KB

          • memory/3836-245-0x0000000002530000-0x000000000256C000-memory.dmp

            Filesize

            240KB

          • memory/3836-247-0x0000000002530000-0x000000000256C000-memory.dmp

            Filesize

            240KB

          • memory/3836-249-0x0000000002530000-0x000000000256C000-memory.dmp

            Filesize

            240KB

          • memory/3836-1096-0x0000000004C00000-0x0000000004C10000-memory.dmp

            Filesize

            64KB

          • memory/4768-154-0x0000000000A80000-0x0000000000A8A000-memory.dmp

            Filesize

            40KB

          • memory/4804-177-0x0000000000100000-0x00000000001F8000-memory.dmp

            Filesize

            992KB

          • memory/4804-178-0x0000000002440000-0x0000000002450000-memory.dmp

            Filesize

            64KB