Analysis

  • max time kernel
    135s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2023 10:26

General

  • Target

    a3efe98d3d853ecaf2edc69edd94d489b6db4a7c8e6969b3cb2fa48a2dc337db.exe

  • Size

    873KB

  • MD5

    6561801c4d7b3989c54ed493ce06dfaa

  • SHA1

    e983f7f9d5f40069cad0008460f293d289fe22ec

  • SHA256

    a3efe98d3d853ecaf2edc69edd94d489b6db4a7c8e6969b3cb2fa48a2dc337db

  • SHA512

    bbde2137ef96e689f7df6efe56905ddb8826f92a16b9573a60f62991db455116369d0e94951b2d94bebf6bf9e7e13733d55f24bd1e2180337862b8afec92546e

  • SSDEEP

    12288:BMr/y90OYm9sJzGhb9yGnyfNp8a4uzntjZYQ3GH/Gd+rAleNkb4axCq65zEUDxe4:6yRWBeAGyfN3RGfGUUlsY4axuS6

Malware Config

Extracted

Family

redline

Botnet

maxi

C2

83.97.73.122:19062

Attributes
  • auth_value

    6a3f22e5f4209b056a3fd330dc71956a

Extracted

Family

redline

Botnet

mesu

C2

83.97.73.122:19062

Attributes
  • auth_value

    8ede6a157d1d9509a21427d10e999ba2

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • Executes dropped EXE 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3efe98d3d853ecaf2edc69edd94d489b6db4a7c8e6969b3cb2fa48a2dc337db.exe
    "C:\Users\Admin\AppData\Local\Temp\a3efe98d3d853ecaf2edc69edd94d489b6db4a7c8e6969b3cb2fa48a2dc337db.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:5076
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7876583.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7876583.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4800
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4482524.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4482524.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4808
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8655688.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8655688.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2112
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
            "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
            5⤵
            • Modifies Windows Defender Real-time Protection settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:4676
        • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4781098.exe
          C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4781098.exe
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4380
      • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6957065.exe
        C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6957065.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:264
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
          "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
          4⤵
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:3120
          • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe
            "C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe"
            5⤵
            • Executes dropped EXE
            PID:2440
    • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d0319217.exe
      C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d0319217.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1048
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
        "C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2236

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\AppLaunch.exe.log

    Filesize

    226B

    MD5

    916851e072fbabc4796d8916c5131092

    SHA1

    d48a602229a690c512d5fdaf4c8d77547a88e7a2

    SHA256

    7e750c904c43d27c89e55af809a679a96c0bb63fc511006ffbceffc2c7f6fb7d

    SHA512

    07ce4c881d6c411cac0b62364377e77950797c486804fb10d00555458716e3c47b1efc0d1f37e4cc3b7e6565bb402ca01c7ea8c963f9f9ace941a6e3883d2521

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d0319217.exe

    Filesize

    328KB

    MD5

    3638b4cc92e82dc459ae040132f12b6a

    SHA1

    97ed70093fecb894049c800df8ea973d7aa419d7

    SHA256

    0fd66ca3cb444a712c6b96dd4b51204f2c1088fca442b37bba93a1fdfae8e47a

    SHA512

    dba61c2fb0ff46b713826480a8b5e2066a53dedc3d2cff03b79a348eaa3af367523aeff82c5a87150ab4633b7e7ef91deff933fdfd344757f0aa4d27d5485fd8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\d0319217.exe

    Filesize

    328KB

    MD5

    3638b4cc92e82dc459ae040132f12b6a

    SHA1

    97ed70093fecb894049c800df8ea973d7aa419d7

    SHA256

    0fd66ca3cb444a712c6b96dd4b51204f2c1088fca442b37bba93a1fdfae8e47a

    SHA512

    dba61c2fb0ff46b713826480a8b5e2066a53dedc3d2cff03b79a348eaa3af367523aeff82c5a87150ab4633b7e7ef91deff933fdfd344757f0aa4d27d5485fd8

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7876583.exe

    Filesize

    602KB

    MD5

    4549e4a9bf9d247d74a095e3e2d46e9a

    SHA1

    a015bfd0b5941dacdf3aaaea0e479b7449e5c2f1

    SHA256

    da67288869747fd2d68c88300a05a3279400093d9e0effd3d0027e9eba9998a3

    SHA512

    6c5b05534679b17137e3cea336391809a0cc57f021adc19bbddfa4eebf3fbfc2a23ff004793073117f1268dc979153ae00843256db429247e85339a0d2c9f767

  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7876583.exe

    Filesize

    602KB

    MD5

    4549e4a9bf9d247d74a095e3e2d46e9a

    SHA1

    a015bfd0b5941dacdf3aaaea0e479b7449e5c2f1

    SHA256

    da67288869747fd2d68c88300a05a3279400093d9e0effd3d0027e9eba9998a3

    SHA512

    6c5b05534679b17137e3cea336391809a0cc57f021adc19bbddfa4eebf3fbfc2a23ff004793073117f1268dc979153ae00843256db429247e85339a0d2c9f767

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6957065.exe

    Filesize

    387KB

    MD5

    604b9561ec4ab9c8d908078cf4608507

    SHA1

    a244b2e3abe88f1ddcebd9a0d499a7f810f79323

    SHA256

    17a66240a5070b40dc859dc685e416e0de24552308c22fa85498df4b5787ceda

    SHA512

    2cbf4f9dfa4bacc3bcd82bee90fb41c172bba62157159200df81c5a799412f047b8820e7f49985630d14047604aec4baaaa55b97d386c15a174df85421bfbfa8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\c6957065.exe

    Filesize

    387KB

    MD5

    604b9561ec4ab9c8d908078cf4608507

    SHA1

    a244b2e3abe88f1ddcebd9a0d499a7f810f79323

    SHA256

    17a66240a5070b40dc859dc685e416e0de24552308c22fa85498df4b5787ceda

    SHA512

    2cbf4f9dfa4bacc3bcd82bee90fb41c172bba62157159200df81c5a799412f047b8820e7f49985630d14047604aec4baaaa55b97d386c15a174df85421bfbfa8

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4482524.exe

    Filesize

    276KB

    MD5

    30cc2717be00f5b166c7e3e04e0f2e45

    SHA1

    889667a434da1be4b07e7dbe2bdab54ecd0e07d5

    SHA256

    c452a1fba31b7ff37d5b68d9e5975335d828e57612c811dda8dab924dc472ff3

    SHA512

    b14dc55d35219a502b4d8845a9db8a2b179a6e228f60f4d41795d00dca02c9cffa4cb2b01d4db314ec3d608d73ac0af7887fca5365f0061b797b59ce50668fc6

  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v4482524.exe

    Filesize

    276KB

    MD5

    30cc2717be00f5b166c7e3e04e0f2e45

    SHA1

    889667a434da1be4b07e7dbe2bdab54ecd0e07d5

    SHA256

    c452a1fba31b7ff37d5b68d9e5975335d828e57612c811dda8dab924dc472ff3

    SHA512

    b14dc55d35219a502b4d8845a9db8a2b179a6e228f60f4d41795d00dca02c9cffa4cb2b01d4db314ec3d608d73ac0af7887fca5365f0061b797b59ce50668fc6

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8655688.exe

    Filesize

    194KB

    MD5

    3376df79785e55515cda4bf05ad2a103

    SHA1

    b190586e9e300663482b304f86d90f59bd7fe0fe

    SHA256

    2c2664d566660753460046e02590f10056b358af65a2279e270ee43e85a985df

    SHA512

    e7a55d8e048750df67dcccdbf8d01202683d6daabcca05216db8aa3bf285bab60abfc571d2f212a0e6c8559500ab24e6efeae4558fec197c0f6e03f58094701c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\a8655688.exe

    Filesize

    194KB

    MD5

    3376df79785e55515cda4bf05ad2a103

    SHA1

    b190586e9e300663482b304f86d90f59bd7fe0fe

    SHA256

    2c2664d566660753460046e02590f10056b358af65a2279e270ee43e85a985df

    SHA512

    e7a55d8e048750df67dcccdbf8d01202683d6daabcca05216db8aa3bf285bab60abfc571d2f212a0e6c8559500ab24e6efeae4558fec197c0f6e03f58094701c

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4781098.exe

    Filesize

    145KB

    MD5

    5c0ddf2a1afcb4a062fc785dc3c5173d

    SHA1

    48241c875a521a1cf4c7a5c627eb9fa955ab5a5c

    SHA256

    1da5b60e869eb4079610677e5cd285387d12cd4eaf95ba705c8746adce0288cd

    SHA512

    8ccd9b6109670cd12c6d7c1e965c6c5cc1b3104e0326e08c109aa632d55bad78729bf778051be163d33d0e2140f0b1908e49805f1c857e6ec65f49178065392b

  • C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\b4781098.exe

    Filesize

    145KB

    MD5

    5c0ddf2a1afcb4a062fc785dc3c5173d

    SHA1

    48241c875a521a1cf4c7a5c627eb9fa955ab5a5c

    SHA256

    1da5b60e869eb4079610677e5cd285387d12cd4eaf95ba705c8746adce0288cd

    SHA512

    8ccd9b6109670cd12c6d7c1e965c6c5cc1b3104e0326e08c109aa632d55bad78729bf778051be163d33d0e2140f0b1908e49805f1c857e6ec65f49178065392b

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    101KB

    MD5

    89d41e1cf478a3d3c2c701a27a5692b2

    SHA1

    691e20583ef80cb9a2fd3258560e7f02481d12fd

    SHA256

    dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac

    SHA512

    5c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    101KB

    MD5

    89d41e1cf478a3d3c2c701a27a5692b2

    SHA1

    691e20583ef80cb9a2fd3258560e7f02481d12fd

    SHA256

    dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac

    SHA512

    5c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc

  • C:\Users\Admin\AppData\Local\Temp\c3912af058\oneetx.exe

    Filesize

    101KB

    MD5

    89d41e1cf478a3d3c2c701a27a5692b2

    SHA1

    691e20583ef80cb9a2fd3258560e7f02481d12fd

    SHA256

    dc5ac8d4d6d5b230ab73415c80439b4da77da1cfde18214ef601897f661abdac

    SHA512

    5c9658f6ca0d8d067bfc76072c438ac13daa12d8c1fef33369e1bc36a592d160a2bdb22b4f3eed73e8670bb65107a4134e18e6dc604897a80cc0768769f475dc

  • memory/2236-196-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/2236-215-0x0000000005710000-0x0000000005720000-memory.dmp

    Filesize

    64KB

  • memory/3120-190-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/3120-191-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/3120-183-0x0000000000400000-0x0000000000438000-memory.dmp

    Filesize

    224KB

  • memory/4380-163-0x0000000000D50000-0x0000000000D7A000-memory.dmp

    Filesize

    168KB

  • memory/4380-177-0x0000000005750000-0x0000000005760000-memory.dmp

    Filesize

    64KB

  • memory/4380-176-0x00000000079D0000-0x0000000007EFC000-memory.dmp

    Filesize

    5.2MB

  • memory/4380-175-0x00000000072D0000-0x0000000007492000-memory.dmp

    Filesize

    1.8MB

  • memory/4380-173-0x0000000006940000-0x0000000006990000-memory.dmp

    Filesize

    320KB

  • memory/4380-172-0x00000000068C0000-0x0000000006936000-memory.dmp

    Filesize

    472KB

  • memory/4380-171-0x0000000006680000-0x0000000006712000-memory.dmp

    Filesize

    584KB

  • memory/4380-170-0x0000000006B50000-0x00000000070F4000-memory.dmp

    Filesize

    5.6MB

  • memory/4380-169-0x0000000005A90000-0x0000000005AF6000-memory.dmp

    Filesize

    408KB

  • memory/4380-168-0x0000000005750000-0x0000000005760000-memory.dmp

    Filesize

    64KB

  • memory/4380-167-0x00000000057A0000-0x00000000057DC000-memory.dmp

    Filesize

    240KB

  • memory/4380-166-0x0000000005720000-0x0000000005732000-memory.dmp

    Filesize

    72KB

  • memory/4380-165-0x00000000057F0000-0x00000000058FA000-memory.dmp

    Filesize

    1.0MB

  • memory/4380-164-0x0000000005C80000-0x0000000006298000-memory.dmp

    Filesize

    6.1MB

  • memory/4676-155-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB